Pub Date : 2014-06-23DOI: 10.1109/INISTA.2014.6873609
F. Castaldo, F. Palmieri
System modeling with Probabilistic Graphical Models (PGM) has become increasingly popular in the last years. In this paper we design a Multiple Target Tracker based on the probabilistic architecture of Normal Factor Graph. Belief propagation makes best use of data coming from different branches of the graph and yields the tracks via messages fusion. The issues of data association, track life-cycle management and data fusion from heterogeneous sensor modalities are resolved at each time step by propagating and combining forward and backward probabilistic messages. Inexpensive cameras deployed in the scene under surveillance are the primary sensor modality, even if the framework has been designed to receive data from a wide range of sensors such as Radars, Infrared cameras, etc. The framework has been tested by calculating the tracks of different ships moving in an harbour framed by three cameras.
{"title":"A multi-camera Multi-Target Tracker based on Factor Graphs","authors":"F. Castaldo, F. Palmieri","doi":"10.1109/INISTA.2014.6873609","DOIUrl":"https://doi.org/10.1109/INISTA.2014.6873609","url":null,"abstract":"System modeling with Probabilistic Graphical Models (PGM) has become increasingly popular in the last years. In this paper we design a Multiple Target Tracker based on the probabilistic architecture of Normal Factor Graph. Belief propagation makes best use of data coming from different branches of the graph and yields the tracks via messages fusion. The issues of data association, track life-cycle management and data fusion from heterogeneous sensor modalities are resolved at each time step by propagating and combining forward and backward probabilistic messages. Inexpensive cameras deployed in the scene under surveillance are the primary sensor modality, even if the framework has been designed to receive data from a wide range of sensors such as Radars, Infrared cameras, etc. The framework has been tested by calculating the tracks of different ships moving in an harbour framed by three cameras.","PeriodicalId":339652,"journal":{"name":"2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131319946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-23DOI: 10.1109/INISTA.2014.6873643
F. Ugranli, E. Karatepe
Increasing penetration level of wind turbines in power systems reveal new challenges for the power system planners. Transmission expansion planning is one of the most important planning problems to maintain secure and reliable operation of power systems. In this study, a new transmission expansion planning methodology considering N-1 contingency conditions is proposed to find the location of new transmission lines while minimizing investment cost and curtailed wind energy. To deal with the uncertainty of load and output power of wind turbines, fuzzy clustering based probabilistic method is used for determination of load and wind scenarios. Proposed methodology uses the DC-power flow equations based optimal power flow and integer genetic algorithm to determine the locations of new assets and it is applied to the modified IEEE 24-bus test system.
{"title":"Transmission expansion planning for wind turbine integrated power systems considering contingencies","authors":"F. Ugranli, E. Karatepe","doi":"10.1109/INISTA.2014.6873643","DOIUrl":"https://doi.org/10.1109/INISTA.2014.6873643","url":null,"abstract":"Increasing penetration level of wind turbines in power systems reveal new challenges for the power system planners. Transmission expansion planning is one of the most important planning problems to maintain secure and reliable operation of power systems. In this study, a new transmission expansion planning methodology considering N-1 contingency conditions is proposed to find the location of new transmission lines while minimizing investment cost and curtailed wind energy. To deal with the uncertainty of load and output power of wind turbines, fuzzy clustering based probabilistic method is used for determination of load and wind scenarios. Proposed methodology uses the DC-power flow equations based optimal power flow and integer genetic algorithm to determine the locations of new assets and it is applied to the modified IEEE 24-bus test system.","PeriodicalId":339652,"journal":{"name":"2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings","volume":"72 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131613492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-23DOI: 10.1109/INISTA.2014.6873593
A. Hajiloo, W. Xie
The problem of multi-objective feedback controller design of nonlinear systems is solved in this paper. The T-S fuzzy model is adopted to describe the nonlinear systems and genetic algorithm is used to identify the T-S fuzzy model. The identified T-S fuzzy model is reduced by applying Higher Order Singular Value Decomposition (HOSVD) method. Based on the reduced T-S fuzzy model, an optimal state feedback controller is designed by achieving the trade-off among three conflicting object functions using the optimal Pareto frontier. The simulation results reveal the effectiveness of the proposed method.
{"title":"Multi-objective control design of the nonlinear systems using genetic algorithm","authors":"A. Hajiloo, W. Xie","doi":"10.1109/INISTA.2014.6873593","DOIUrl":"https://doi.org/10.1109/INISTA.2014.6873593","url":null,"abstract":"The problem of multi-objective feedback controller design of nonlinear systems is solved in this paper. The T-S fuzzy model is adopted to describe the nonlinear systems and genetic algorithm is used to identify the T-S fuzzy model. The identified T-S fuzzy model is reduced by applying Higher Order Singular Value Decomposition (HOSVD) method. Based on the reduced T-S fuzzy model, an optimal state feedback controller is designed by achieving the trade-off among three conflicting object functions using the optimal Pareto frontier. The simulation results reveal the effectiveness of the proposed method.","PeriodicalId":339652,"journal":{"name":"2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130637340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-23DOI: 10.1109/INISTA.2014.6873656
B. Altinel, M. Ganiz, B. Diri
The bag of words (BOW) representation of documents is very common in text classification systems. However, the BOW approach ignores the position of the words in the document and more importantly, the semantic relations between the words. In this study, we present a simple semantic kernel for Support Vector Machines (SVM) algorithm. This kernel uses higher-order relations between terms in order to incorporate semantic information into the SVM. This is an easy to implement algorithm which forms a basis for future improvements. We perform a serious of experiments on different well known textual datasets. Experiment results show that classification performance improves over the traditional kernels used in SVM such as linear kernel which is commonly used in text classification.
{"title":"A simple semantic kernel approach for SVM using higher-order paths","authors":"B. Altinel, M. Ganiz, B. Diri","doi":"10.1109/INISTA.2014.6873656","DOIUrl":"https://doi.org/10.1109/INISTA.2014.6873656","url":null,"abstract":"The bag of words (BOW) representation of documents is very common in text classification systems. However, the BOW approach ignores the position of the words in the document and more importantly, the semantic relations between the words. In this study, we present a simple semantic kernel for Support Vector Machines (SVM) algorithm. This kernel uses higher-order relations between terms in order to incorporate semantic information into the SVM. This is an easy to implement algorithm which forms a basis for future improvements. We perform a serious of experiments on different well known textual datasets. Experiment results show that classification performance improves over the traditional kernels used in SVM such as linear kernel which is commonly used in text classification.","PeriodicalId":339652,"journal":{"name":"2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131802005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-23DOI: 10.1109/INISTA.2014.6873611
Cristian Ramírez-Atencia, Gema Bello Orgaz, M. Rodríguez-Moreno, David Camacho
The problem of Mission Planning for a large number of Unmanned Air Vehicles (UAV) can be formulated as a Temporal Constraint Satisfaction Problem (TCSP). It consists on a set of locations that should visit in different time windows, and the actions that the vehicle can perform based on its features such as the payload, speed or fuel capacity. In this paper, a temporal constraint model is implemented and tested by performing Backtracking search in several missions where its complexity has been incrementally modified. The experimental phase consists on two different phases. On the one hand, several mission simulations containing (n) UAVs using different sensors and characteristics located in different waypoints, and (m) requested tasks varying mission priorities have been carried out. On the other hand, the second experimental phase uses a backtracking algorithm to look through the whole solutions space to measure the scalability of the problem. This scalability has been measured as a relation between the number of tasks to be performed in the mission and the number of UAVs needed to perform it.
{"title":"A simple CSP-based model for Unmanned Air Vehicle Mission Planning","authors":"Cristian Ramírez-Atencia, Gema Bello Orgaz, M. Rodríguez-Moreno, David Camacho","doi":"10.1109/INISTA.2014.6873611","DOIUrl":"https://doi.org/10.1109/INISTA.2014.6873611","url":null,"abstract":"The problem of Mission Planning for a large number of Unmanned Air Vehicles (UAV) can be formulated as a Temporal Constraint Satisfaction Problem (TCSP). It consists on a set of locations that should visit in different time windows, and the actions that the vehicle can perform based on its features such as the payload, speed or fuel capacity. In this paper, a temporal constraint model is implemented and tested by performing Backtracking search in several missions where its complexity has been incrementally modified. The experimental phase consists on two different phases. On the one hand, several mission simulations containing (n) UAVs using different sensors and characteristics located in different waypoints, and (m) requested tasks varying mission priorities have been carried out. On the other hand, the second experimental phase uses a backtracking algorithm to look through the whole solutions space to measure the scalability of the problem. This scalability has been measured as a relation between the number of tasks to be performed in the mission and the number of UAVs needed to perform it.","PeriodicalId":339652,"journal":{"name":"2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131867986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-23DOI: 10.1109/INISTA.2014.6873618
M. Hussain, Sahar Q. Saleh, Hatim Aboalsamh, Muhammad Ghulam, G. Bebis
Due to the availability of easy-to-use and powerful image editing tools, the authentication of digital images cannot be taken for granted and it gives rise to non-intrusive forgery detection problem because all imaging devices do not embed watermark. We investigated the detection of copy-move and splicing, the two harmful types of image forgery, using textural properties of images. Tampering distorts the texture micro-patterns in an image and texture descriptors can be employed to detect tampering. We did comparative study to examine the effect of two state-of-the-art best texture descriptors: Multiscale Local Binary Pattern (Multi-LBP) and Multiscale Weber Law Descriptor (Multi-WLD). Multiscale texture descriptors extracted from the chrominance components of an image are passed to Support Vector Machine (SVM) to identify it as authentic or forged. The performance comparison reveals that Multi-WLD performs better than Multi-LBP in detecting copy-move and splicing forgeries. Multi-WLD also outperforms state-of-the-art passive forgery detection techniques.
{"title":"Comparison between WLD and LBP descriptors for non-intrusive image forgery detection","authors":"M. Hussain, Sahar Q. Saleh, Hatim Aboalsamh, Muhammad Ghulam, G. Bebis","doi":"10.1109/INISTA.2014.6873618","DOIUrl":"https://doi.org/10.1109/INISTA.2014.6873618","url":null,"abstract":"Due to the availability of easy-to-use and powerful image editing tools, the authentication of digital images cannot be taken for granted and it gives rise to non-intrusive forgery detection problem because all imaging devices do not embed watermark. We investigated the detection of copy-move and splicing, the two harmful types of image forgery, using textural properties of images. Tampering distorts the texture micro-patterns in an image and texture descriptors can be employed to detect tampering. We did comparative study to examine the effect of two state-of-the-art best texture descriptors: Multiscale Local Binary Pattern (Multi-LBP) and Multiscale Weber Law Descriptor (Multi-WLD). Multiscale texture descriptors extracted from the chrominance components of an image are passed to Support Vector Machine (SVM) to identify it as authentic or forged. The performance comparison reveals that Multi-WLD performs better than Multi-LBP in detecting copy-move and splicing forgeries. Multi-WLD also outperforms state-of-the-art passive forgery detection techniques.","PeriodicalId":339652,"journal":{"name":"2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129398253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-23DOI: 10.1109/INISTA.2014.6873616
Vitoantonio Bevilacqua, D. Barone, Francesco Cipriani, Gaetano D'Onghia, Giuseppe Mastrandrea, G. Mastronardi, M. Suma, Dario D'Ambruoso
Introduction and objective: the purpose of this work is to design and implement an innovative tool to recognize 16 different human gestural actions and use them to predict 7 different emotional states. The solution proposed in this paper is based on RGB and depth information of 2D/3D images acquired from a commercial RGB-D sensor called Kinect. Materials: the dataset is a collection of several human actions made by different actors. Each action is performed by each actor for three times in each video. 20 actors perform 16 different actions, both seated and upright, totalling 40 videos per actor. Methods: human gestural actions are recognized by means feature extractions as angles and distances related to joints of human skeleton from RGB and depth images. Emotions are selected according to the state-of-the-art. Experimental results: despite truly similar actions, the overall-accuracy reached is approximately 80%. Conclusions and future works: the proposed work seems to be back-ground- and speed-independent, and it will be used in the future as part of a multimodal emotion recognition software based on facial expressions and speech analysis as well.
{"title":"A new tool for gestural action recognition to support decisions in emotional framework","authors":"Vitoantonio Bevilacqua, D. Barone, Francesco Cipriani, Gaetano D'Onghia, Giuseppe Mastrandrea, G. Mastronardi, M. Suma, Dario D'Ambruoso","doi":"10.1109/INISTA.2014.6873616","DOIUrl":"https://doi.org/10.1109/INISTA.2014.6873616","url":null,"abstract":"Introduction and objective: the purpose of this work is to design and implement an innovative tool to recognize 16 different human gestural actions and use them to predict 7 different emotional states. The solution proposed in this paper is based on RGB and depth information of 2D/3D images acquired from a commercial RGB-D sensor called Kinect. Materials: the dataset is a collection of several human actions made by different actors. Each action is performed by each actor for three times in each video. 20 actors perform 16 different actions, both seated and upright, totalling 40 videos per actor. Methods: human gestural actions are recognized by means feature extractions as angles and distances related to joints of human skeleton from RGB and depth images. Emotions are selected according to the state-of-the-art. Experimental results: despite truly similar actions, the overall-accuracy reached is approximately 80%. Conclusions and future works: the proposed work seems to be back-ground- and speed-independent, and it will be used in the future as part of a multimodal emotion recognition software based on facial expressions and speech analysis as well.","PeriodicalId":339652,"journal":{"name":"2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134098448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-23DOI: 10.1109/INISTA.2014.6873591
R. Precup, Radu-Codrut David, A. Stînean, M. Radac, E. Petriu
This paper introduces an innovative adaptive hybrid Particle Swarm Optimization (PSO)-Gravitational Search Algorithm (GSA) dedicated to the optimal tuning of Takagi-Sugeno-Kang PI-fuzzy controllers (T-S-K PI-FCs). The adaptive hybrid PSO-GSA is comprised from five stages, which support the solving of optimization problems with objective functions that depend on the control error and on the output sensitivity function, and the variables of the objective functions are the fuzzy controller tuning parameters. The adaptive hybrid PSO-GSA is included in the controller tuning to offer control systems with T-S-K PI-FCs that ensure a reduced process parametric sensitivity. Digital simulation and experimental results are given to validate the fuzzy controller tuning in a laboratory nonlinear servo system application.
本文介绍了一种创新的自适应混合粒子群优化(PSO)-引力搜索算法(GSA),用于对Takagi-Sugeno-Kang pi -模糊控制器(T-S-K pi - fc)进行最优整定。该自适应混合PSO-GSA分为5个阶段,支持求解目标函数依赖于控制误差和输出灵敏度函数的优化问题,目标函数的变量为模糊控制器整定参数。自适应混合PSO-GSA包含在控制器调谐中,以提供具有T-S-K pi - fc的控制系统,确保降低过程参数灵敏度。给出了数字仿真和实验结果,验证了模糊控制器整定在实验室非线性伺服系统中的应用。
{"title":"Adaptive hybrid Particle Swarm Optimization-Gravitational Search Algorithm for fuzzy controller tuning","authors":"R. Precup, Radu-Codrut David, A. Stînean, M. Radac, E. Petriu","doi":"10.1109/INISTA.2014.6873591","DOIUrl":"https://doi.org/10.1109/INISTA.2014.6873591","url":null,"abstract":"This paper introduces an innovative adaptive hybrid Particle Swarm Optimization (PSO)-Gravitational Search Algorithm (GSA) dedicated to the optimal tuning of Takagi-Sugeno-Kang PI-fuzzy controllers (T-S-K PI-FCs). The adaptive hybrid PSO-GSA is comprised from five stages, which support the solving of optimization problems with objective functions that depend on the control error and on the output sensitivity function, and the variables of the objective functions are the fuzzy controller tuning parameters. The adaptive hybrid PSO-GSA is included in the controller tuning to offer control systems with T-S-K PI-FCs that ensure a reduced process parametric sensitivity. Digital simulation and experimental results are given to validate the fuzzy controller tuning in a laboratory nonlinear servo system application.","PeriodicalId":339652,"journal":{"name":"2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134514955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-23DOI: 10.1109/INISTA.2014.6873614
M. Koit
We investigate communicative strategies used by humans in negotiation dialogues. The empirical material of the study is a small sub-corpus of telemarketing calls. Our aim is to develop software for automatic pragmatic analysis of dialogues which can be used by linguists for recognition of dialogue acts, communicative strategies and the structure of a dialogue. The further aim is to implement the results in a dialogue system that interacts with a user in natural language and is intended for training negotiation skills of the user.
{"title":"Towards automatic recognition of the negotiation strategies: Analysis of human-human dialogues","authors":"M. Koit","doi":"10.1109/INISTA.2014.6873614","DOIUrl":"https://doi.org/10.1109/INISTA.2014.6873614","url":null,"abstract":"We investigate communicative strategies used by humans in negotiation dialogues. The empirical material of the study is a small sub-corpus of telemarketing calls. Our aim is to develop software for automatic pragmatic analysis of dialogues which can be used by linguists for recognition of dialogue acts, communicative strategies and the structure of a dialogue. The further aim is to implement the results in a dialogue system that interacts with a user in natural language and is intended for training negotiation skills of the user.","PeriodicalId":339652,"journal":{"name":"2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings","volume":"24 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123505685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-23DOI: 10.1109/INISTA.2014.6873594
F. Bandiera, A. Coluccia, G. Ricci
In this paper, we use the tools of statistical hypothesis testing to determine whether or not the different links of a WSN are homogeneous. At the design stage we use a statistical path loss law to model the RSS measurements. More precisely, in the homogeneous case all links share one and the same attenuation factor while in the non-homogeneous one the attenuation factors of the various links are different. We thus derive a GLRT-based decision rule for the considered problem and compute its distribution. Some numerical examples are finally presented to evaluate the potential to discriminate between the two hypotheses.
{"title":"A test of homogeneity for RSS measurements within a wireless sensor network","authors":"F. Bandiera, A. Coluccia, G. Ricci","doi":"10.1109/INISTA.2014.6873594","DOIUrl":"https://doi.org/10.1109/INISTA.2014.6873594","url":null,"abstract":"In this paper, we use the tools of statistical hypothesis testing to determine whether or not the different links of a WSN are homogeneous. At the design stage we use a statistical path loss law to model the RSS measurements. More precisely, in the homogeneous case all links share one and the same attenuation factor while in the non-homogeneous one the attenuation factors of the various links are different. We thus derive a GLRT-based decision rule for the considered problem and compute its distribution. Some numerical examples are finally presented to evaluate the potential to discriminate between the two hypotheses.","PeriodicalId":339652,"journal":{"name":"2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127169149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}