An online shadowed clustering algorithm applied to risk visualization in Territorial Security

The identification and processing of the risk sources that prevail in a sensor-monitored area is crucial to guarantee the uninterrupted and efficient operation of the surveillance system. In particular, a time-varying schematic depiction of the risk associated with each object will allow the human expert to draw meaningful conclusions about the system dynamics. In this paper, we introduce an online clustering algorithm for risk visualization in a Territorial Security environment. The clustering machinery leans upon shadowed sets due to their robustness and interpretability. The proposed algorithm is able to process data arriving in real time as it only memorizes a small subset of them. It is strong to noisy and abnormal samples and represents each cluster as a shadowed set. Experiments conducted in a simulated Critical Infrastructure Protection scenario confirm the feasibility and robustness of the proposed technique.

[1]  Witold Pedrycz,et al.  Shadowed c-means: Integrating fuzzy and rough clustering , 2010, Pattern Recognit..

[2]  Lawrence O. Hall,et al.  A fuzzy c means variant for clustering evolving data streams , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.

[3]  James M. Keller,et al.  A possibilistic fuzzy c-means clustering algorithm , 2005, IEEE Transactions on Fuzzy Systems.

[4]  Witold Pedrycz,et al.  From fuzzy sets to shadowed sets: Interpretation and computing , 2009, Int. J. Intell. Syst..

[5]  Ivan Stojmenovic,et al.  The one-commodity traveling salesman problem with selective pickup and delivery: An ant colony approach , 2010, IEEE Congress on Evolutionary Computation.

[6]  L.O. Hall,et al.  Online fuzzy c means , 2008, NAFIPS 2008 - 2008 Annual Meeting of the North American Fuzzy Information Processing Society.

[7]  James C. Bezdek,et al.  Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.

[8]  Amiya Nayak,et al.  An evolving risk management framework for wireless sensor networks , 2011, 2011 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA) Proceedings.

[9]  Andrzej Skowron,et al.  Rough-Fuzzy Hybridization: A New Trend in Decision Making , 1999 .

[10]  Kjetil Haslum,et al.  Multisensor Real-time Risk Assessment using Continuous-time Hidden Markov Models , 2006, 2006 International Conference on Computational Intelligence and Security.

[11]  Bor-Chen Kuo,et al.  A New Adaptive Fuzzy Clustering Algorithm for Remotely Sensed Images , 2008, IGARSS 2008 - 2008 IEEE International Geoscience and Remote Sensing Symposium.

[12]  Hongsheng Xi,et al.  Using hidden markov models to evaluate the real-time risks of network , 2008, 2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop.

[13]  Witold Pedrycz,et al.  Evolvable fuzzy systems: some insights and challenges , 2010, Evol. Syst..

[14]  L. Hall,et al.  Creating Streaming Iterative Soft Clustering Algorithms , 2007, NAFIPS 2007 - 2007 Annual Meeting of the North American Fuzzy Information Processing Society.

[15]  Benjamin Gâteau,et al.  Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures , 2010, 2010 International Conference on Availability, Reliability and Security.