Optimizing the Placement of Chemical and Biological Agent Sensors Daniel L. Schafer Thomas Jefferson High School for Science and Technology Defense Threat.

Slides:



Advertisements
Similar presentations
ELLIOTT BAY INDUSTRIES
Advertisements

AI Pathfinding Representing the Search Space
Todd W. Neller Gettysburg College
Lecture 5 Memory Management Part I. Lecture Highlights  Introduction to Memory Management  What is memory management  Related Problems of Redundancy,
Learning Trajectory Patterns by Clustering: Comparative Evaluation Group D.
CSC 421: Algorithm Design & Analysis
Inpainting Assigment – Tips and Hints Outline how to design a good test plan selection of dimensions to test along selection of values for each dimension.
Algorithms Analysis Lecture 6 Quicksort. Quick Sort Divide and Conquer.
New Mexico Computer Science For All Designing and Running Simulations Maureen Psaila-Dombrowski.
CSCE 580 ANDREW SMITH JOHNNY FLOWERS IDA* and Memory-Bounded Search Algorithms.
Simulation Operations -- Prof. Juran.
System Design System Design - Mr. Ahmad Al-Ghoul System Analysis and Design.
CMPT 225 Sorting Algorithms Algorithm Analysis: Big O Notation.
QuickSort 4 February QuickSort(S) Fast divide and conquer algorithm first discovered by C. A. R. Hoare in If the number of elements in.
1 Optimization of Routing Algorithms Summer Science Research By: Kumar Chheda Research Mentor: Dr. Sean McCulloch.
Data Structures Data Structures Topic #13. Today’s Agenda Sorting Algorithms: Recursive –mergesort –quicksort As we learn about each sorting algorithm,
 1 Sorting. For computer, sorting is the process of ordering data. [ ]  [ ] [ “Tom”, “Michael”, “Betty” ]  [ “Betty”, “Michael”,
Online Performance Auditing Using Hot Optimizations Without Getting Burned Jeremy Lau (UCSD, IBM) Matthew Arnold (IBM) Michael Hind (IBM) Brad Calder (UCSD)
Intelligent Detection of Malicious Script Code CS194, Benson Luk Eyal Reuveni Kamron Farrokh Advisor: Adnan Darwiche.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
DAST, Spring © L. Joskowicz 1 Data Structures – LECTURE 1 Introduction Motivation: algorithms and abstract data types Easy problems, hard problems.
Simulated Annealing 10/7/2005.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
By: Jamie McPeek. 1. Background Information 1. Metasearch 2. Sets 3. Surface Web/Deep Web 4. The Problem 5. Application Goals.
Sensor Network Security: Actuation Attacks and the Possible Outcomes Whitney Longsine, Graduate Advisor: Alexandra Czarlinska, Faculty Advisor: Dr. Deepa.
DATA STRUCTURE Subject Code -14B11CI211.
PJSISSTA '001 Black-Box Test Reduction Using Input-Output Analysis ISSTA ‘00 Patrick J. Schroeder, Bogdan Korel Department of Computer Science Illinois.
Unit 3a Industrial Control Systems
Bottom-Up Coordination in the El Farol Game: an agent-based model Shu-Heng Chen, Umberto Gostoli.
Computer Process Control Application. Computer process control In computer process control, a digital computer is used to direct the operations of a manufacturing.
Self-Organizing Agents for Grid Load Balancing Junwei Cao Fifth IEEE/ACM International Workshop on Grid Computing (GRID'04)
Civ89 Instructions for PowerPoint. Getting Started Civ89 is a game of military, technological, and economic conquest played with two people, identified.
Week 11 Introduction to Computer Science and Object-Oriented Programming COMP 111 George Basham.
Computer Security and Penetration Testing
Othello Artificial Intelligence With Machine Learning
Event Management & ITIL V3
Introduction Algorithms and Conventions The design and analysis of algorithms is the core subject matter of Computer Science. Given a problem, we want.
DATA STRUCTURE & ALGORITHMS (BCS 1223) CHAPTER 8 : SEARCHING.
Reinforcement Learning for the game of Tetris using Cross Entropy
Data Structures Week 8 Further Data Structures The story so far  Saw some fundamental operations as well as advanced operations on arrays, stacks, and.
Games. Adversaries Consider the process of reasoning when an adversary is trying to defeat our efforts In game playing situations one searches down the.
CSC 211 Data Structures Lecture 13
2005MEE Software Engineering Lecture 11 – Optimisation Techniques.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Advanced Speed Guidance for Merging and Sequencing Techniques Chris Sweeney Thomas Jefferson High School for Science and Technology MITRE Corporation Center.
U NIVERSITY OF D ELAWARE C OMPUTER & I NFORMATION S CIENCES D EPARTMENT Optimizing Compilers CISC 673 Spring 2009 Overview of Compilers and JikesRVM John.
Review 1 Arrays & Strings Array Array Elements Accessing array elements Declaring an array Initializing an array Two-dimensional Array Array of Structure.
Synthesizing Natural Textures Michael Ashikhmin University of Utah.
Tetris Agent Optimization Using Harmony Search Algorithm
Decision Theoretic Planning. Decisions Under Uncertainty  Some areas of AI (e.g., planning) focus on decision making in domains where the environment.
Coevolutionary Automated Software Correction Josh Wilkerson PhD Candidate in Computer Science Missouri S&T.
Bitwise Sort By Matt Hannon. What is Bitwise Sort It is an algorithm that works with the individual bits of each entry in order to place them in groups.
The Design of Statistical Specifications for a Test Mark D. Reckase Michigan State University.
Path Planning Based on Ant Colony Algorithm and Distributed Local Navigation for Multi-Robot Systems International Conference on Mechatronics and Automation.
Optimizing Parallel Programming with MPI Michael Chen TJHSST Computer Systems Lab Abstract: With more and more computationally- intense problems.
Adversarial Search 2 (Game Playing)
Copyright © 2014 Curt Hill Algorithms From the Mathematical Perspective.
CS-ROSETTA Yang Shen et al. Presented by Jonathan Jou.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
CMPT 120 Topic: Searching – Part 2 and Intro to Time Complexity (Algorithm Analysis)
On the Ability of Graph Coloring Heuristics to Find Substructures in Social Networks David Chalupa By, Tejaswini Nallagatla.
Working Efficiently with Large SAS® Datasets Vishal Jain Senior Programmer.
This has been created by QA InfoTech. Choose QA InfoTech as your Automated testing partner. Visit for more information.
Hirophysics.com The Genetic Algorithm vs. Simulated Annealing Charles Barnes PHY 327.
Warehouse Lending Optimization Paul Parker (2016).
Prof. Yu-Chee Tseng Department of Computer Science
Placement and Routing With Congestion Control
Kevin Mason Michael Suggs
Excursions into Parallel Programming
Presentation transcript:

Optimizing the Placement of Chemical and Biological Agent Sensors Daniel L. Schafer Thomas Jefferson High School for Science and Technology Defense Threat Reduction Agency TDOA OR Mentor: George D. Gunn, PhD Purpose Weapons of Mass Effect pose a threat to any facility, especially military targets. Sensors exist that can detect biological and chemical assaults, allowing the base to either avoid the attack or treat any affected individuals and equipment. It is necessary to determine the most effective sensor placement to ensure that a base is well protected; unfortunately, as many of the tools that simulate such incidents are extremely detailed and complicated, running simulations on them to determine optimal sensor placement can take a prohibitively long amount of time. The software to quickly simulate many attacks existed in a C++ program, which randomly placed 500 potential biological attacks on a target to determine how effective the sensor arrangement was at detecting the attacks. A new program was developed, which used the basic methodology of the original program to automatically sample different sensor configurations until an optimal one could be determined. DataResults and Conclusions The data gathered through the optimizations showed that the length of the plume relative to the size of the base played a major role in deciding which sensor arrangement would be best. In the initial optimization efforts, uniform and Dice-5 grids were best against a small plume. However, perimeter arrangements were clearly superior for the large plume situations, where the plume would undoubtedly stretch across the entire base. In these cases, the plume was small enough to go undetected when it reaches the first edge, but it was quite large when it reached the second edge, and a perimeter setup had many sensors in the part of the second edge covered. Data in a plume spawn region analysis showed a similar trend. With the large plumes, a perimeter setup was preferred until the plume spawn region began getting large. Once the plume spawn region reached a large enough size, the plumes were not able to entirely cross the defended area, and the preferred grid changed to uniform. With the small plumes, it is apparent that regardless of the size of the plume spawn region, the plumes are never able to entirely cross the defended area, and thus the small plumes nearly always preferred the uniform or Dice-5 configurations. The one exception was using a non-area-weighted scoring method with a large plume spawn region. Here, many plumes spawned far from the base, and thus were quite large when they reach even the first edge, meaning that they were detected by many perimeter sensors. However, these plumes did not cover much of the base, which explains why they had little effect on the area-weighted algorithm’s results. After analyzing the program’s speed and efficiency, it is clear that the design requirements for the program were met. The program is able to complete an entire analysis in a reasonable amount of time, and is also able to perform different types of optimizations depending on the situation. The program is also flexible enough to deal with any sort of input parameters, allowing it to be used on many different bases. Scoring MethodPlacementAllocation Large Threshold Allocation Small Threshold 1 One Hit (7,8) 56 sensors (Uniform) margin. Score: 0.96 (6,5) 27 sensors (Dice-5) margin. Score: (3,5) 15 sensors (Uniform) margin. Score: Multi-Hit (8,8) 60 sensors (Dice-5) margin. Score: (7,6) 42 sensors (Uniform) margin. Score: (5,7) 35 sensors (Uniform) margin. Score: Area-Weight (7,9) 60 sensors (Dice-5) margin. Score: (6,7) 39 sensors (Dice-5) margin. Score: (5,6) 30 sensors (Uniform) margin. Score: Power Law (7,8) 56 sensors (Uniform) margin. Score: (5,7) 35 sensors (Uniform) margin. Score: sensors (Perimeter) margin. Score: Scoring MethodPlacementAllocation Large Threshold Allocation Small Threshold 1 One Hit 59 sensors (Perimeter) margin. Score: sensors (Perimeter) margin. Score: sensors (Perimeter) margin. Score: Multi-Hit 60 sensors (Perimeter) margin. Score: sensors (Perimeter) margin. Score: sensors (Perimeter) margin. Score: Area-Weight 60 sensors (Perimeter) margin. Score: sensors (Perimeter) 0.56 margin. Score: sensors (Perimeter) margin. Score: Power Law 59 sensors (Perimeter) margin. Score: sensors (Perimeter) margin. Score: sensors (Perimeter) margin. Score: Optimization Results (Small Plume) Optimization Results (Large Plume) The above data was generated using default program settings, with the plumes all spawning within 2 km of the 16 km x 19 km base trials were done instead of the default 500, to ensure accurate results. Abstract A computer program was designed and implemented in Java to optimize the placement of chemical and biological (CB) agent sensors to best protect an installation. This was accomplished through the use of various optimization algorithms, combined with a Monte Carlo simulation method which determined relative utility functions for various sensor arrangements. Minimizing Sensors This method minimizes the number of sensors needed to keep the performance level above a certain threshold, using a Binary Search. (Graph from GCalc.net) Optimizing Margin This method finds the margin that maximizes the performance of a sensor grid for a certain number of sensors, using a Golden Section search. (Graph from GCalc.net) Procedures The two algorithms considered in the program are Placement, which decides how to place a certain number of sensors, and Allocation, which finds the fewest number of sensors needed to keep a certain performance level. The Placement algorithm is rather simple, as it merely scans the arrays with the most sensors, given that few sensor grids have better performance than an equivalent one with fewer sensors. The Allocation algorithm, however, first needs to optimize the margin, then the number of sensors, for which it uses variants on two search functions: Golden Section Search and Binary Search. CB Sensor MarginSample Plume Defended Region Plume Spawn Region Start - Max/Min Number of Sensors Find Middle Number of Sensors Find Optimal Margin for Middle Number of Sensors Find Score with Optimal Margin Set Max Sensors to Middle Sensors Set Min Sensors to Middle Sensors Score < Threshold Score ≥ Threshold Max Sensors > Min Sensors Max Sensors ≤ Min Sensors End -Return Mid Sensors Start - Max/Min Margin Find/Evaluate 1 st Middle Point Find/Evaluate 2 nd Middle Point Set Min Margin to 1 st point Set 1 st point to 2 nd point Find/Evaluate 2 nd Middle Point Find/Evaluate 1 st Middle Point 1 st Middle Score ≥ 2 nd Middle Score 1 st Middle Score < 2 nd Middle Score End - Return Min Margin Set Max Margin to 2 nd point Set 2 nd point to 1 st point Max – Min Margin ≥ Tolerance Max – Min Margin < Tolerance Performance vs. Number of Sensors Performance Threshold Performance vs. Margin