A Bernoulli filter approach to detection and estimation of hidden Markov models using cluttered observation sequences

Hidden Markov Models (HMMs) are powerful statistical techniques with many applications, and in this paper they are used for modeling asymmetric threats. The observations generated by such HMMs are generally cluttered with observations that are not related to the HMM. In this paper a Bernoulli filter is proposed, which processes cluttered observations and is capable of detecting if there is an HMM present, and if so, estimate the state of the HMM. Results show that the proposed filter is capable of detecting and estimating an HMM except in circumstances where the probability of observing the HMM is lower than the probability of receiving a clutter observation.

[1]  Krishna R. Pattipati,et al.  Information integration via hierarchical and hybrid bayesian networks , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[2]  Krishna R. Pattipati,et al.  Anomaly Detection via Feature-Aided Tracking and Hidden Markov Models , 2007, 2007 IEEE Aerospace Conference.

[3]  Frank Barnaby How to Build a Nuclear Bomb: And Other Weapons of Mass Destruction , 2003 .

[4]  Ronald P. S. Mahler,et al.  Statistical Multisource-Multitarget Information Fusion , 2007 .

[5]  Philip A. Schrodt Pattern Recognition of International Crises using Hidden Markov Models , 2007 .

[6]  Ba-Ngu Vo,et al.  A Tutorial on Bernoulli Filters: Theory, Implementation and Applications , 2013, IEEE Transactions on Signal Processing.

[7]  Alex Bateman,et al.  An introduction to hidden Markov models. , 2007, Current protocols in bioinformatics.

[8]  Roger C Herdman,et al.  Technologies Underlying Weapons of Mass Destruction , 1993 .

[9]  Leonard S. Spector,et al.  Nuclear Ambitions: The Spread Of Nuclear Weapons 1989-1990 , 1990 .

[10]  Richard R Paternoster Nuclear weapon proliferation indicators and observables , 1992 .

[11]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[12]  Krishna R. Pattipati,et al.  An Advanced System for Modeling Asymmetric Threats , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.

[13]  P. Willett,et al.  Modeling threats , 2004, IEEE Potentials.

[14]  Fredrik Gustafsson,et al.  Random Set Methods: Estimation of Multiple Extended Objects , 2014, IEEE Robotics & Automation Magazine.

[15]  T.R. Coffman,et al.  Dynamic classification of groups through social network analysis and HMMs , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).