UW Computer Science Department Strategies for Multi-Asset Surveillance Dr. William M. Spears Dimitri Zarzhitsky Suranga Hettiarachchi Wesley Kerr University.

Slides:



Advertisements
Similar presentations
V-Detector: A Negative Selection Algorithm Zhou Ji, advised by Prof. Dasgupta Computer Science Research Day The University of Memphis March 25, 2005.
Advertisements

By Neil Kruger Supervisor: Prof. KD Palmer University of Stellenbosch
HPC - High Performance Productivity Computing and Future Computational Systems: A Research Engineer’s Perspective Dr. Robert C. Singleterry Jr. NASA Langley.
BLAST, PSI-BLAST and position- specific scoring matrices Prof. William Stafford Noble Department of Genome Sciences Department of Computer Science and.
Iowa State University Department of Computer Science, Iowa State University Artificial Intelligence Research Laboratory Center for Computational Intelligence,
Intelligent Patrolling Sarit Kraus Department of Computer Science Bar-Ilan University Collaborators: Noa Agmon, Gal Kaminka, Efrat Sless 1.
MMS SWG 27 March MMS SWG –27 March 2014 MMS Mission Design March Launch Comparison (slides for the Telecon on 4 April 2014) Stephen A. Fuselier.
Target Tracking Algorithm based on Minimal Contour in Wireless Sensor Networks Jaehoon Jeong, Taehyun Hwang, Tian He, and David Du Department of Computer.
POC, POD, POS Minnesota Wing Air Branch Director Course.
1 Vertically Integrated Seismic Analysis Stuart Russell Computer Science Division, UC Berkeley Nimar Arora, Erik Sudderth, Nick Hay.
The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.
Visibility-based Motion Planning Lecture slides for COMP presented by Georgi Tsankov.
Real-Time Tracking of an Unpredictable Target Amidst Unknown Obstacles Cheng-Yu Lee Hector Gonzalez-Baños* Jean-Claude Latombe Computer Science Department.
Iterative Optimization of Hierarchical Clusterings Doug Fisher Department of Computer Science, Vanderbilt University Journal of Artificial Intelligence.
Mobility Improves Coverage of Sensor Networks Benyuan Liu*, Peter Brass, Olivier Dousse, Philippe Nain, Don Towsley * Department of Computer Science University.
Design of Optimal Multiple Spaced Seeds for Homology Search Jinbo Xu School of Computer Science, University of Waterloo Joint work with D. Brown, M. Li.
Deployment Strategies for Differentiated Detection in Wireless Sensor Network Jingbin Zhang, Ting Yan, and Sang H. Son University of Virginia From SECON.
1 Motion Planning Algorithms : BUG-family. 2 To plan a path  find a continuous trajectory leading from initial position of the automaton (a mobile robot)
100 Chart EALRS & GLES EALR 1: The student understands and applies the concepts and procedures of mathematics. –Component 1.1: Understand and apply concepts.
Optimal Foraging Strategies Trever, Costas and Bill “International team of mystery” Plants Virtuatum computata. Simulate the movement of insects on a ring.
CSE182-L12 Gene Finding.
UW Computer Science Department Swarm Robotics at the University of Wyoming Dr. William M. Spears Dr. Diana F. Spears Computer Science Department University.
Module C9 Simulation Concepts. NEED FOR SIMULATION Mathematical models we have studied thus far have “closed form” solutions –Obtained from formulas --
UW Computer Science Department Optimizing Interaction Potentials for Multi-Agent Surveillance Dr. William M. Spears Dr. Diana F. Spears Wesley Kerr Suranga.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
Optimizing the Placement of Chemical and Biological Agent Sensors Daniel L. Schafer Thomas Jefferson High School for Science and Technology Defense Threat.
Proposal Instead of doing whole brain nonlinear registration, only register a cropped region – Previously we used a template to speed the registration.
1 CE 530 Molecular Simulation Lecture 7 David A. Kofke Department of Chemical Engineering SUNY Buffalo
Layer-finding in Radar Echograms using Probabilistic Graphical Models David Crandall Geoffrey C. Fox School of Informatics and Computing Indiana University,
1 Statistical Mechanics and Multi- Scale Simulation Methods ChBE Prof. C. Heath Turner Lecture 11 Some materials adapted from Prof. Keith E. Gubbins:
The Cat and The Mouse -- The Case of Mobile Sensors and Targets David K. Y. Yau Lab for Advanced Network Systems Dept of Computer Science Purdue University.
Key words: rate, ratio, per, proportion, exchange, yield, interest. Purpose: This unit is designed to help tutors who teach courses in which working with.
GRADUATE PROGRAM IN COMMUNICATIONS AND SIGNAL PROCESSING Dr Joseph Noonan.
PINTS Network. Multiple Target Tracking Nonlinear Filtering Used for detection, tracking, and prediction of a target in a noisy environment Based entirely.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
LOGO Ensemble Learning Lecturer: Dr. Bo Yuan
Dept. of Computer and Information Sciences : University of Delaware John Cavazos Department of Computer and Information Sciences University of Delaware.
CS CM124/224 & HG CM124/224 DISCUSSION SECTION (JUN 6, 2013) TA: Farhad Hormozdiari.
2009/11/14GPW20091 Analysis of the Behavior of People Solving Sudoku Puzzles Reijer Grimbergen School of Computer Science, Tokyo University of Technology.
Event-based Verification and Evaluation of NWS Gridded Products: The EVENT Tool Missy Petty Forecast Impact and Quality Assessment Section NOAA/ESRL/GSD.
Co-Grid: an Efficient Coverage Maintenance Protocol for Distributed Sensor Networks Guoliang Xing; Chenyang Lu; Robert Pless; Joseph A. O ’ Sullivan Department.
HPC Checkers By Andy Block Ryan Egan. Table of Contents Overview of Checkers ▫Overview of Checkers ▫Rules of the Game AI Theory The Program ▫Board ▫Sample.
1 Virtual Patrol : A New Power Conservation Design for Surveillance Using Sensor Networks Prasant Mohapatra, Chao Gui Computer Science Dept. Univ. California,
Game-Theoretic Analysis of Mobile Network Coverage David K.Y. Yau.
CropMetrics – data management service For more advanced precision irrigation prescriptions.
Intensity Transformations (Histogram Processing)
Optimal Bayes Classification
Page 1 HEND science after 9 years in space. page 2 HEND/2001 Mars Odyssey HEND ( High Energy Neutron Detector ) was developed in Space Research Institute.
D. M. J. Tax and R. P. W. Duin. Presented by Mihajlo Grbovic Support Vector Data Description.
Risk Management with Coherent Measures of Risk IPAM Conference on Financial Mathematics: Risk Management, Modeling and Numerical Methods January 2001.
1 Planted-model evaluation of algorithms for identifying differences between spreadsheets Anna Harutyunyan, Glencora Borradaile, Christopher Chambers,
Where to install IGUANA Active tracking Surveillance System.
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
Layer-finding in Radar Echograms using Probabilistic Graphical Models David Crandall Geoffrey C. Fox School of Informatics and Computing Indiana University,
Problem Description: One line explanation of the problem to be solved Problem Description: One line explanation of the problem to be solved Proposed Solution:
Eco 6380 Predictive Analytics For Economists Spring 2016 Professor Tom Fomby Department of Economics SMU.
GRAPHS & FORMULAS PAGES Chapter 6. To find an average (or arithmetic mean) add all the quantities to be averaged (if a quantity is repeated,
Maths in Biosciences – Strategic sampling. Find the infected ash tree Column vector Coordinate Ash dieback DiseaseFungus epidemic.
Jane W. S. Liu Institute of Information Science, Academia Sinica Fusion of Human Sensor Data and Physical Sensor Data.
Multiplication Find the missing value x __ = 32.
CS b659: Intelligent Robotics
Advanced Algorithms Analysis and Design
CSE182-L12 Gene Finding.
Dalton’s Atomic Theory
Image Processing, Lecture #10
Area Models A strategy for Multiplication
Attentional Modulations Related to Spatial Gating but Not to Allocation of Limited Resources in Primate V1  Yuzhi Chen, Eyal Seidemann  Neuron  Volume.
Teacher Page Weather Fronts Science 7th Grade.
Teacher Page Weather Fronts Science 7th Grade.
Overview: Chapter 2 Localization and Tracking
Presentation transcript:

UW Computer Science Department Strategies for Multi-Asset Surveillance Dr. William M. Spears Dimitri Zarzhitsky Suranga Hettiarachchi Wesley Kerr University of Wyoming

UW Computer Science Department Scenario Foliage detector Target detector Maximize the number of T targets found by α assets.

UW Computer Science Department Forest Generator L x L environment with T targets and foliage.

UW Computer Science Department Asset Control Behavior-based asset controllers. –Straight Line (SL) Assets “bounce” off boundary walls. Ignores foliage. –Straight Line Avoid Forest (SLAF) Like SL but also reverse course if encounter foliage. –Super Straight Line Avoid Forest (SSLAF) Like SLAF but move opposite to center of mass of foliage (a more sophisticated foliage sensor).

UW Computer Science Department Target Control Stationary targets for baseline study. “Hiding Gollum” target controller: –Targets try to cross from left to right through environment while hiding in foliage.

UW Computer Science Department Stationary Targets Why is SLAF so poor and SSLAF so good?

UW Computer Science Department Asset Coverage Maps SLSLAFSSLAF SL provides uniform coverage of the space. SSLAF provides increased uniform coverage of the non-foliage space. But SLAF misses entire regions.

UW Computer Science Department Gedanken Experiment What if the targets move slowly from left to right? Will the prior results change?

UW Computer Science Department Gollum Targets Why is SLAF so good?

UW Computer Science Department Probabilistic Analysis Controller 1: Uniformly cover whole area (like SL). Controller 4: Uniformly cover one row (worst case SLAF). Controller 2: Uniformly cover one column (best case SLAF). Controller 3: Uniformly cover one diagonal (average case SLAF).

UW Computer Science Department Area Controller Expected number of time steps for asset to cover area. Visibility time of target.

UW Computer Science Department Column Controller

UW Computer Science Department Diagonal Controller

UW Computer Science Department Row Controller

UW Computer Science Department Comparison of Controllers SLAF works well on moving targets because diagonal controller performance is like column controller performance.

UW Computer Science Department Summary Developing predictive mathematical theory for multiple assets performing surveillance. –Currently includes number of assets, their speed, target speed, and environment size. –Working on including probability of detection (a noisy sensor), percentage of foliage, and time limits on mission length. Goal is to provide mathematical tools to yield an optimal strategy for a surveillance mission.