A System Architecture for Exploiting Mission Information Requirement and Resource Allocation Fangfei Chen a, Thomas La Porta a, Diego Pizzocaro b, Alun.

Slides:



Advertisements
Similar presentations
Fuzzy Angle Fuzzy Distance + Angle AG = 90 DG = 1 Annual Conference of ITA ACITA 2009 Exact and Fuzzy Sensor Assignment Hosam Rowaih 1 Matthew P. Johnson.
Advertisements

Baltimore April 2012 International Technology Alliance in Network and Information Sciences Tasking and Sharing Sensing Assets Using Controlled Natural.
Fall Meeting October 2013 International Technology Alliance in Network and Information Sciences Human-Machine Conversations to Support Coalition Missions.
Annual Conference of ITA ACITA 2009 Knowledge-Driven Agile Sensor-Mission Assignment A. Preece*, D. Pizzocaro*, K. Borowiecki*, G. de Mel, W. Vasconcelos,
Génération de jeux de test pour les programmes de règles 1 er juillet 2009 ILOG Chair of Software Engineering Freiburg Universität Bruno Berstel
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
ARCHITECTURES FOR ARTIFICIAL INTELLIGENCE SYSTEMS
Exact Inference. Inference Basic task for inference: – Compute a posterior distribution for some query variables given some observed evidence – Sum out.
Hadi Goudarzi and Massoud Pedram
CS240A: Databases and Knowledge Bases Temporal Applications and SQL:1999 Carlo Zaniolo Department of Computer Science University of California, Los Angeles.
Modeling Rich Vehicle Routing Problems TIEJ601 Postgraduate Seminar Tuukka Puranen October 19 th 2009.
Activity Based Costing within a collaborative estimating framework Association of Cost Engineers 17 th February 2004 Grahame Jones, UK Manager, PRICE Systems.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
SIGMETRICS 2008: Introduction to Control Theory. Abdelzaher, Diao, Hellerstein, Lu, and Zhu. CPU Utilization Control in Distributed Real-Time Systems Chenyang.
Dynamic Routing and Wavelength Assignment Scheme for Protection against Node Failure Ying Wang1, Tee Hiang Cheng1,2 and Biswanath Mukherjee3 1School of.
A Heuristic Bidding Strategy for Multiple Heterogeneous Auctions Patricia Anthony & Nicholas R. Jennings Dept. of Electronics and Computer Science University.
1 Ivan Lanese Computer Science Department University of Bologna Roberto Bruni Computer Science Department University of Pisa A mobile calculus with parametric.
Brent Dingle Marco A. Morales Texas A&M University, Spring 2002
1 2TN – Linear Programming  Linear Programming. 2 Linear Programming Discussion  Requirements of a Linear Programming Problem  Formulate:  Determine:Graphical.
Multicast Routing in ATM Networks with Multiple Classes of QoS Ren-Hung Hwang, Min-Xiou Chen, and Youn-Chen Sun Department of Computer Science & Information.
Specifying Globally, Controlling Locally E RIC K LAVINS Department of Computer Science California Institute of Technology.
1 Optimizing Utility in Cloud Computing through Autonomic Workload Execution Reporter : Lin Kelly Date : 2010/11/24.
LECTURE-6. Lets remember What do mean by Objectives ? What about Nature of Objectives And Business Sub-System LECTURE-5 OBJECTIVE OF TODAY’S LECTURE Today.
University of California San Diego Locality Phase Prediction Xipeng Shen, Yutao Zhong, Chen Ding Computer Science Department, University of Rochester Class.
1 Target-Oriented Scheduling in Directional Sensor Networks Yanli Cai, Wei Lou, Minglu Li,and Xiang-Yang Li* The Hong Kong Polytechnic University, Hong.
Teachers Name : Suman Sarker Telecommunication Technology Subject Name : Computer Controller System & Robotics Subject Code : 6872 Semester :7th Department.
Jim Basney Computer Sciences Department University of Wisconsin-Madison Managing Network Resources in.
Lines and Linear EquationsProjector Resources Lines and Linear Equations Projector Resources.
Chapter 10 Artificial Intelligence. © 2005 Pearson Addison-Wesley. All rights reserved 10-2 Chapter 10: Artificial Intelligence 10.1 Intelligence and.
Business Analysis and Essential Competencies
Implicit An Agent-Based Recommendation System for Web Search Presented by Shaun McQuaker Presentation based on paper Implicit:
On QoS Guarantees with Reward Optimization for Servicing Multiple Priority Class in Wireless Networks YaoChing Peng Eunyoung Chang.
EmNet: Satisfying The Individual User Through Empathic Home Networks J. Scott Miller, John R. Lange & Peter A. Dinda Department of Electrical Engineering.
Chapter 10 Information Systems Analysis and Design
Jan 20-21, 2005Weiss and Amyot, MCETECH 051 Designing and Evolving Business Models with the User Requirements Notation Michael Weiss (Carleton University)
Using Information Technology Pertemuan 12 Chapter 11 Information Systems.
Balanced k-Coverage in Visual Sensor Networks Md. Muntakim Sadik, Sakib Md. Bin Malek { mms, Department.
Energy Aware Task Mapping Algorithm For Heterogeneous MPSoC Based Architectures Amr M. A. Hussien¹, Ahmed M. Eltawil¹, Rahul Amin 2 and Jim Martin 2 ¹Wireless.
Modeling and simulation of systems Model building Slovak University of Technology Faculty of Material Science and Technology in Trnava.
Capacity Planning Tool Jeffery K. Cochran, PhD Kevin T. Roche, MS.
Embedding Constraint Satisfaction using Parallel Soft-Core Processors on FPGAs Prasad Subramanian, Brandon Eames, Department of Electrical Engineering,
Designing software architectures to achieve quality attribute requirements F. Bachmann, L. Bass, M. Klein and C. Shelton IEE Proceedings Software Tzu-Chin.
A Node and Load Allocation Algorithm for Resilient CPSs under Energy-Exhaustion Attack Tam Chantem and Ryan M. Gerdes Electrical and Computer Engineering.
USC Search Space Properties for Pipelined FPGA Applications University of Southern California Information Sciences Institute Heidi Ziegler, Mary Hall,
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
1 SYNTHESIS of PIPELINED SYSTEMS for the CONTEMPORANEOUS EXECUTION of PERIODIC and APERIODIC TASKS with HARD REAL-TIME CONSTRAINTS Paolo Palazzari Luca.
NP-Complete Problems. Running Time v.s. Input Size Concern with problems whose complexity may be described by exponential functions. Tractable problems.
Dynamic Pricing of Internet Bandwidth via Chance Constrained Programming Xin Guo IBM Watson Research Center John Tomlin IBM Almaden Research.
Run-time Adaptive on-chip Communication Scheme 林孟諭 Dept. of Electrical Engineering National Cheng Kung University Tainan, Taiwan, R.O.C.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Adaptive Resource Management Architecture for DRE Systems Nishanth Shankaran
Introduction to Operations Research. MATH Mathematical Modeling 2 Introduction to Operations Research Operations research/management science –Winston:
Dzmitry Kliazovich University of Luxembourg, Luxembourg
Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China.
Residual Energy Scan for Monitoring Sensor Network Yonggang Jerry Zhao,Ramesh Govindan Computer Science Department/ISI University of Southern CaliforniaLos.
1 Optimization Techniques Constrained Optimization by Linear Programming updated NTU SY-521-N SMU EMIS 5300/7300 Systems Analysis Methods Dr.
George Goguadze, Eric Andrès Universität des Saarlandes Johan Jeuring, Bastiaan Heeren Open Universiteit Nederland Generation of Interactive Exercises.
1 Comparative Study of two Genetic Algorithms Based Task Allocation Models in Distributed Computing System Oğuzhan TAŞ 2005.
Virtual Disaster Management Information Repository Based on Linked Open Data Yi-Lung Chen 1, Jyun-You Lin 1, Tsung-Hsien Chu 1, Jane Win-Shih Liu 2, IEEE.
© 2008 Thomson South-Western. All Rights Reserved Slides by JOHN LOUCKS St. Edward’s University.
WATCHMAN: A Data Warehouse Intelligent Cache Manager Peter ScheuermannJunho ShimRadek Vingralek Presentation by: Akash Jain.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 1 Sriram Chellappan, Xiaole Bai, Bin Ma ‡ and Dong Xuan Presented by Sriram.
MANAGEMENT ACCOUNTING
Cost Accounting and Reporting Systems
CS4311 Spring 2011 Process Improvement Dr
Traffic Engineering with AIMD in MPLS Networks
Chapter Two.
The Nature of Probability and Statistics
Jigar.B.Katariya (08291A0531) E.Mahesh (08291A0542)
Dr. Arslan Ornek MATHEMATICAL MODELS
Presentation transcript:

A System Architecture for Exploiting Mission Information Requirement and Resource Allocation Fangfei Chen a, Thomas La Porta a, Diego Pizzocaro b, Alun Preece b and Mani B. Srivastava c a Dept. of Computer Science and Engineering, The Penn State University, USA b School of Computer Science and Informatics, Cardiff University, UK c Electrical Engineering Department, University of California Los Angeles, USA

Motivation Previous work: Sensor Assignment to Missions (SAM), tasking in terms of what rather than how, data dissemination Need a complete system to support (ISR) decision-making “Decision-to-data” coverage, from describing the commander’s intent to resource allocation and mission admission control

Concepts and Definitions A mission is a collection of tasks with temporal and causal relations Resources can be sensors, vehicles, bandwidth, with limited capacities Each task requires multiple resources A mission is admitted when all resource requirements of its tasks are satisfied

Basic Idea: Feedback Loop Commanders submit requests to the system Mission resource requirements are analyzed Admission decision is sent back to commanders If satisfactory, mission gets executed; otherwise, requests are revised and resubmitted

System Architecture

Information Flow in the System 1.Commanders send requests to a knowledge base describing the mission 2.Knowledge base matches mission with existing task-transition graph 3.The task transition graph is confirmed or adjusted by an analyst

Task Transition Graph Identifies task relations of a mission

Information Flow in the System 4.Tasks of a mission are analysed by SAM reasoner, and resource requirements per task are derived 5.This process results in a Resource Matching Graph

Resource Matching Graph Identifies mission resource requirements

Information Flow in the System 6.A resource inventory (with resource capacity), together with the task transition graph and mission resource matching graph are sent as input to a resource allocation problem solver 7.Decision on which mission is admitted is sent back to the commander 8.If decision is satisfactory, missions get executed; otherwise, adjusted requests are sent to the knowledge base again

Resource Allocation Problem A set M of m missions, each with a profit p j A set R resources, each with capacity c i M j requires D ij (random variable) of resource R i x j =1 if M j is admitted

Resource Allocation Problem An allowable over flow probability ρ In the form of a chance-constrained program Proposed detailed solution in DCOSS’12

System Architecture

An Example Scenario “Track any high value target on Vertical/Horizontal Rd”

Scenario —Task Transition Graph Two missions are of the same type.

Scenario—Mission Matching Graph

Scenario—Resource Allocation For this particular problem, the only resource that two missions compete for is Camera3 One mission does not necessarily occupy Camera3 all the time If each mission uses Camera3 for only a fraction of the time, these two missions may be both admitted with only a small chance of conflict

Conclusion We designed a system architecture for exploiting mission resource requirement and assisting mission admission control The system forms an information loop starting from requests by commanders, from which the system determines task relation & mission matching graphs, and then sends these as input to a resource allocation problem solver Decision from the solver is sent back to the commander Negative results leads to new requests to the system The loop converges when the resource utilization is maximized