Distributed Radiation Detection Daniel Obenshain Arthur Rock SURF Fellow.

Slides:



Advertisements
Similar presentations
Estimating the detector coverage in a negative selection algorithm Zhou Ji St. Jude Childrens Research Hospital Dipankar Dasgupta The University of Memphis.
Advertisements

Foundations and Strategies Attention Investment CS352.
QR Code Recognition Based On Image Processing
Chapter 7 - Local Stabilization1 Chapter 7: roadmap 7.1 Super stabilization 7.2 Self-Stabilizing Fault-Containing Algorithms 7.3 Error-Detection Codes.
1 COMM 301: Empirical Research in Communication Lecture 15 – Hypothesis Testing Kwan M Lee.
CS 551 / CS 645 Antialiasing. What is a pixel? A pixel is not… –A box –A disk –A teeny tiny little light A pixel is a point –It has no dimension –It occupies.
Statistical Techniques I EXST7005 Lets go Power and Types of Errors.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
1 Reinforcement Learning Introduction & Passive Learning Alan Fern * Based in part on slides by Daniel Weld.
Paper Discussion: “Simultaneous Localization and Environmental Mapping with a Sensor Network”, Marinakis et. al. ICRA 2011.
Project: – Several options for bid: Bid our signal Develop several strategies Develop stable bidding strategy Simulating Normal Random Variables.
UNIVERSITY OF JYVÄSKYLÄ Yevgeniy Ivanchenko Yevgeniy Ivanchenko University of Jyväskylä
Geographic Gossip: Efficient Aggregations for Sensor Networks Author: Alex Dimakis, Anand Sarwate, Martin Wainwright University: UC Berkeley Venue: IPSN.
1 The Basics of Regression Regression is a statistical technique that can ultimately be used for forecasting.
Robust Mechanisms for Information Elicitation Aviv Zohar & Jeffrey S. Rosenschein The Hebrew University.
A second example of Chi Square Imagine that the managers of a particular factory are interested in whether each line in their assembly process is equally.
Diffraction Physics 202 Professor Lee Carkner Lecture 26.
Math Calculus I Part 8 Power series, Taylor series.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Non-Perfect Squares Learning Goal:
Confidence Intervals W&W, Chapter 8. Confidence Intervals Although on average, M (the sample mean) is on target (or unbiased), the specific sample mean.
CIRCUMFERENCE OF CIRCLES. What is the definition of a circle? A flat shape whose points are all the same distance away from the center This distance from.
Optimizing the Placement of Chemical and Biological Agent Sensors Daniel L. Schafer Thomas Jefferson High School for Science and Technology Defense Threat.
CS Reinforcement Learning1 Reinforcement Learning Variation on Supervised Learning Exact target outputs are not given Some variation of reward is.
Intermediate Statistical Analysis Professor K. Leppel.
1 Constant Following Distance Simulations CS547 Final Project December 6, 1999 Jeremy Elson.
Training materials for wireless trainers
CHAPTER 8 Estimating with Confidence
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
Trust-Aware Optimal Crowdsourcing With Budget Constraint Xiangyang Liu 1, He He 2, and John S. Baras 1 1 Institute for Systems Research and Department.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Chapter 7: Data for Decisions Lesson Plan Sampling Bad Sampling Methods Simple Random Samples Cautions About Sample Surveys Experiments Thinking About.
CSC321: 2011 Introduction to Neural Networks and Machine Learning Lecture 11: Bayesian learning continued Geoffrey Hinton.
Hypotheses tests for means
Lesson 10 The Fields of Accelerating Charges. Class 29 Today we will: learn about threads and stubs of accelerating point charges. learn that accelerating.
Submitted by: Giorgio Tabarani, Christian Galinski Supervised by: Amir Geva CIS and ISL Laboratory, Technion.
PICTORIAL DRAWINGS.
Optimising Cuts for HLT George Talbot Supervisor: Stewart Martin-Haugh.
How far away something is gets complicated at high z How far it is now? How far it was then? How far light travelled? How distant it looks? Let’s call.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
LSSG Black Belt Training Estimation: Central Limit Theorem and Confidence Intervals.
Type I and Type II Errors. An analogy may help us to understand two types of errors we can make with inference. Consider the judicial system in the US.
Charge Sharing & Hit Identification & Cluster Information.
Robotics Club: 5:30 this evening
Network Computing Laboratory 1 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published.
COMP 417 – Jan 12 th, 2006 Guest Lecturer: David Meger Topic: Camera Networks for Robot Localization.
Selection of Behavioral Parameters: Integration of Case-Based Reasoning with Learning Momentum Brian Lee, Maxim Likhachev, and Ronald C. Arkin Mobile Robot.
Computer Science 1 Using Clustering Information for Sensor Network Localization Haowen Chan, Mark Luk, and Adrian Perrig Carnegie Mellon University
1 GPS-Free-Free Positioning System for Wireless Sensor Networks Farid Benbadis, Timur Friedman, Marcelo Dias de Amorim, and Serge Fdida IEEE WCCN 2005.
Visual Tracking by Cluster Analysis Arthur Pece Department of Computer Science University of Copenhagen
 Assumptions are an essential part of statistics and the process of building and testing models.  There are many different assumptions across the range.
Abstract Representation of Power System Networks as a Function of Regularity Properties ESREL 2014 A.B. Svendsen, T. Tollefsen, R.F. Pedersen & K.P. Petursson.
Communications Range Analysis Simulation Set Up –Single Biological Threat placed in Soldier Field –Communication range varied from meters –Sensor.
Robust Localization Kalman Filter & LADAR Scans
The accuracy of averages We learned how to make inference from the sample to the population: Counting the percentages. Here we begin to learn how to make.
Chapter 8: Estimating with Confidence
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Minimum spanning tree diameter estimation in random sensor networks in fractal dimension Students: Arthur Romm Daniel Kozlov Supervisor: Dr.Zvi Lotker.
Electric Force and Electric FieldS
Psychology Unit Research Methods - Statistics
CHAPTER 8 Estimating with Confidence
Lookahead pathology in real-time pathfinding
3 + 2c³ Finding Areas of Triangles 4c
Update on TB 2007 Xtal Irradiation Studies at H4
Counting Statistics and Error Prediction
Estimating with Confidence
Modeling Rainfall using a Cellular Automata
Presentation transcript:

Distributed Radiation Detection Daniel Obenshain Arthur Rock SURF Fellow

Motivation Professor Ryan McLean and others at Caltech have developed a new, cheaper radiation sensor using CdZnTe materials. Professor K. Mani Chandy and the Infospheres research group have developed algorithms for aggregating the data collected by many of these sensors working in concert. This paper considers the optimal placement for such sensors.

Motivation The threat of nuclear proliferation and dirty bombs is very real. It is our goal to combat this threat through better radiation detection.

Motivation Professor Ryan McLean and others at Caltech have developed a new, cheaper radiation sensor using CdZnTe materials.

Motivation Professor K. Mani Chandy and the Infospheres research group have developed algorithms for aggregating the data collected by many of these sensors working in concert.

Motivation In this SURF, I examined the implications of these algorithms on stationary sensor grids.

The Situation A single terrorist carrying a dirty bomb is somewhere in a field. Several stationary agents are attempting to locate the terrorist.

The Situation The agents communicate fully in real time. The terrorist does not move.

Simulation Methodology The simulation stores a heat map of probabilities for possible terrorist locations. Initially, all probabilities are equal. After each iteration, the Baysian update formula is applied.

Simulation Methodology After 50% of the total probability on the heat map is confined to 1% of the total area, the terrorist is considered to be found. In each simulation, neither the terrorist nor the agents may move.

Bayesian Update The probability that the terrorist is in a specific cell (x,y) of the heat map is approximated as ((((lambda * T) ^ n) * e ^ (-lambda * T)))/ n! where lambda * T is the expected number of hits (assuming the terrorist is in that cell) and n is the actual number of hits.

Bayesian Update The probability is found this way for each agent. The probabilities are multiplied together to get the whole network’s probability. This probability is multiplied by the old entry in the heat map to update the heat map.

Bayesian Update The heat map is then normalized to a total probability of 1, to correct for errors. The process is repeated until the terrorist is found.

What this means If the terrorist is in the cell (x,y), the number of hits received will closely match the number of hits expected (within a margin of error). Thus, the probability will increase for (x,y).

What this means If the terrorist is not in the cell (x,y), the number of hits will not closely match the number of hits expected. Thus, the probability will decrease for (x,y).

What this means Since radiation goes as 1/r^2, the closer a sensor is to the source, the better resolution there is between different cells in the heat map. If the radiation source is far away, there is very little radiation (1/r^2 ~ 0), and thus little information about the location.

Four Experiments These four experiments will show some of the implications of this algorithm.

Line Experiment A group of sensors is trying to determine a radiation source’s position. The sensors spread out in a line. For simplicity, assume neither the sensors nor the source can move.

Line Experiment Nine agents in a line One terrorist The terrorist is some fixed distance perpendicularly away from the line of sensors

Results

Results – Explanation The time to interdiction increases exponentially! So, having many sensors in a line is a bad sensor placement.

Expanding Field Here, we examine how increased field size affects interdiction time. For simplicity, we place one sensor on each corner of the field.

Expanding Field One terrorist in the center of the field Four agents at the four corners of the field Fixed field size L x L

Results

Results – Explanation So, as we increase field size, the time to interdict goes as L^2. This is reasonable, since we are also increasing the area by L^2. Not promising, since low interdiction times are important.

Expanding Sensor Grid Given a certain field of fixed size, how should we place sensors? We consider several different size square sensor grids.

Expanding Sensor Grid Fixed field size of 300 m x 300 m One terrorist in the center of the field Four agents in a square of fixed size L x L, where L <= 300 m

Results

Results - Explanation Dip at 2/3 of Field length. Appeared in many different field sizes. Caused by edge effects. Still not very good interdiction time. Interdiction time goes exponentially.

Off-center Radiation Source What if the terrorist isn’t in the center? We consider several different size square sensor grids, with the source at different distances from center.

Off-center Radiation Source Fixed field size of 300 m x 300 m. One terrorist, off- center by some distance S. Four agents in a square of fixed side length L.

Results

Results – Explanation 15 and 20 meters from center were different because of edge effects. Interdiction time still goes exponentially.

Conclusion Because the time to interdiction increases so quickly with distance, it is imperative that some sensors be close to the terrorist. Static sensors would have to be ubiquitous for this to be true, which is not cost effective.

Conclusion Instead, mobile sensors should be used. Since mobile sensors can react in real time, they would be able to approach the radiation source to gain more information and decrease interdiction time.

Further Work Mobile sensors Dealing with background radiation Screening for false positives (medical radiation, smoke detectors, etc.)

Acknowledgements Many thanks to Professor Mani Chandy, Professor Ryan McLean, Annie Liu, Mathew Wu, Concetta Pilotto, Mason Smith, the Arthur Rock Foundation, and everyone else who contributed to this project.