Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group
  • Journal of Lightwave Technology
  • Vol. 36,
  • Issue 11,
  • pp. 2069-2075
  • (2018)

Probabilistic Event Discrimination Algorithm for Fiber Optic Perimeter Security Systems

Not Accessible

Your library or personal account may give you access

Abstract

This paper proposes an event discrimination algorithm with probabilistic output for fiber optic perimeter security systems. Multiscale permutation entropy and the zero-crossing rate are employed to increase the efficiency of the algorithm and extract intrusion features. A probabilistic support vector machine is used to calculate multiple event probabilities by solving a convex quadratic programming problem. The experimental results demonstrate that the proposed algorithm can distinguish six intrusion events at an average recognition rate of 92.68% and in a processing time of 0.32 s. Compared with traditional discrimination methods, the proposed algorithm obtains more detailed information (probabilities) of intrusion events. The recognition results are obtained after analyzing the probabilities, which not only reduces the decision-making costs but also reduces the losses from erroneous decisions. Therefore, the proposed high-efficiency feature extraction method and reliable discrimination algorithm can be used to improve the monitoring efficiency of fiber optic perimeter security systems.

© 2018 IEEE

PDF Article
More Like This
Intelligent water perimeter security event recognition based on NAM-MAE and distributed optic fiber acoustic sensing system

Mingyang Sun, Miao Yu, Haoran Wang, Kaiwen Song, Xinyu Guo, Songfeng Xue, Hongwei Zhang, Yanbin Shao, Hongliang Cui, Tianying Chang, and Tianyu Zhang
Opt. Express 31(22) 37058-37073 (2023)

Surface intrusion event identification for subway tunnels using ultra-weak FBG array based fiber sensing

Liping Xin, Zhengying Li, Xin Gui, Xuelei Fu, Minlang Fan, Jiaqi Wang, and Honghai Wang
Opt. Express 28(5) 6794-6805 (2020)

Intrusion behavior classification method applied in a perimeter security monitoring system

Qiushi Mi, Houdan Yu, Qian Xiao, and Hongyan Wu
Opt. Express 29(6) 8592-8605 (2021)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.