August 27, 2012 ETM 607 Slide 1 ETM 607 Application of Monte Carlo Simulation: Scheduling Radar Warning Receivers (RWRs) Scott R. Schultz Mercer University.

Slides:



Advertisements
Similar presentations
Introduction to Monte Carlo Markov chain (MCMC) methods
Advertisements

Lecture 18: Temporal-Difference Learning
Random Number Generation. Random Number Generators Without random numbers, we cannot do Stochastic Simulation Most computer languages have a subroutine,
Modeling and Simulation Monte carlo simulation 1 Arwa Ibrahim Ahmed Princess Nora University.
1 Dynamic Scan Scheduling Specification Bruno Dutertre System Design Laboratory SRI International
May 31, 2009 Industrial Engineering Research Conference Slide 1 Scheduling Radar Warning Receivers (RWRs) Scott R. Schultz Mercer University / Mercer.
Planning under Uncertainty
Computing the Posterior Probability The posterior probability distribution contains the complete information concerning the parameters, but need often.
Importance Sampling. What is Importance Sampling ? A simulation technique Used when we are interested in rare events Examples: Bit Error Rate on a channel,
Resampling techniques Why resampling? Jacknife Cross-validation Bootstrap Examples of application of bootstrap.
1 On the Statistical Analysis of Dirty Pictures Julian Besag.
Data Broadcast in Asymmetric Wireless Environments Nitin H. Vaidya Sohail Hameed.
Simulation.
Evaluating Hypotheses
(1) Feature-point matching by D.J.Duff for CompVis Online: Feature Point Matching Detection, Extraction.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
Chapter 6: Temporal Difference Learning
Copyright © 1998 Wanda Kunkle Computer Organization 1 Chapter 2.1 Introduction.
Introduction to Boosting Aristotelis Tsirigos SCLT seminar - NYU Computer Science.
Reinforcement Learning: Learning algorithms Yishay Mansour Tel-Aviv University.
CSCE Monte Carlo Methods When you can’t do the math, simulate the process with random numbers Numerical integration to get areas/volumes Particle.
Sequence Alignments Revisited
Learning HMM parameters Sushmita Roy BMI/CS 576 Oct 21 st, 2014.
Lehrstuhl für Informatik 2 Gabriella Kókai: Maschine Learning 1 Evaluating Hypotheses.
Learning and Recognizing Activities in Streams of Video Dinesh Govindaraju.
Monté Carlo Simulation MGS 3100 – Chapter 9. Simulation Defined A computer-based model used to run experiments on a real system.  Typically done on a.
1 Time Scales Virtual Clocks and Algorithms Ricardo José de Carvalho National Observatory Time Service Division February 06, 2008.
Radial Basis Function Networks
History-Dependent Graphical Multiagent Models Quang Duong Michael P. Wellman Satinder Singh Computer Science and Engineering University of Michigan, USA.
CSCE 2100: Computing Foundations 1 Probability Theory Tamara Schneider Summer 2013.
Monte Carlo Simulation and Personal Finance Jacob Foley.
“WHY ARE PROJECTS ALWAYS LATE?” (“and what can the Project Manager DO about that?) Craig Henderson, MBA, PMP ARVEST Bank Operations.
Monte Carlo Methods1 T Special Course In Information Science II Tomas Ukkonen
Brian Macpherson Ph.D, Professor of Statistics, University of Manitoba Tom Bingham Statistician, The Boeing Company.
Forward-Scan Sonar Tomographic Reconstruction PHD Filter Multiple Target Tracking Bayesian Multiple Target Tracking in Forward Scan Sonar.
A Comparison of Two MCMC Algorithms for Hierarchical Mixture Models Russell Almond Florida State University College of Education Educational Psychology.
Outline of Chapter 9: Using Simulation to Solve Decision Problems Real world decisions are often too complex to be analyzed effectively using influence.
Simulation is the process of studying the behavior of a real system by using a model that replicates the behavior of the system under different scenarios.
Monté Carlo Simulation  Understand the concept of Monté Carlo Simulation  Learn how to use Monté Carlo Simulation to make good decisions  Learn how.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. 1.
Stable Multi-Target Tracking in Real-Time Surveillance Video
CMSC 471 Fall 2009 Temporal Difference Learning Prof. Marie desJardins Class #25 – Tuesday, 11/24 Thanks to Rich Sutton and Andy Barto for the use of their.
Simulation is the process of studying the behavior of a real system by using a model that replicates the system under different scenarios. A simulation.
Chapter 10 Introducing Probability BPS - 5th Ed. Chapter 101.
Fast calculation methods. Addition  Add 137,95 Solution: = (137-5)+100= = 232.
Economics 173 Business Statistics Lecture 26 © Fall 2001, Professor J. Petry
1 1 Slide Simulation Professor Ahmadi. 2 2 Slide Simulation Chapter Outline n Computer Simulation n Simulation Modeling n Random Variables and Pseudo-Random.
MONTE CARLO ANALYSIS When a system contains elements that exhibit chance in their behavior, the Monte Carlo method of simulation may be applied.
CS774. Markov Random Field : Theory and Application Lecture 15 Kyomin Jung KAIST Oct
Reinforcement Learning: Learning algorithms Yishay Mansour Tel-Aviv University.
A Glass Float Line Simulation: Modeling Methodology and Applications Scott R. Schultz - Mercer University, Macon, GA.
Hidden Markov Model Parameter Estimation BMI/CS 576 Colin Dewey Fall 2015.
Machine Learning in Practice Lecture 9 Carolyn Penstein Rosé Language Technologies Institute/ Human-Computer Interaction Institute.
1 Chapter 2 Algorithm Analysis Reading: Chapter 2.
Kevin Stevenson AST 4762/5765. What is MCMC?  Random sampling algorithm  Estimates model parameters and their uncertainty  Only samples regions of.
Deep Learning and Deep Reinforcement Learning. Topics 1.Deep learning with convolutional neural networks 2.Learning to play Atari video games with Deep.
Accurate WiFi Packet Delivery Rate Estimation and Applications Owais Khan and Lili Qiu. The University of Texas at Austin 1 Infocom 2016, San Francisco.
Graphical Models for Segmenting and Labeling Sequence Data Manoj Kumar Chinnakotla NLP-AI Seminar.
Machine Learning in Practice Lecture 9 Carolyn Penstein Rosé Language Technologies Institute/ Human-Computer Interaction Institute.
Towards Optimal Sleep Scheduling in Sensor Networks for Rare-Event Detection Qing Cao, Tarek Abdelzaher, Tian He, John Stankovic Department of Computer.
Randomized Algorithm (Lecture 2: Randomized Min_Cut)
Chapter 6: Temporal Difference Learning
Robert Johnson W. Atwood, M. Ziegler, B. Baughman U.C. Santa Cruz and
Soft Error Detection for Iterative Applications Using Offline Training
NanoBPM Status and Multibunch Mark Slater, Cambridge University
October 6, 2011 Dr. Itamar Arel College of Engineering
Chapter 6: Temporal Difference Learning
Systematic Observation:
Discussion Section Week 9
Scheduling Radar Warning Receivers (RWRs)
Presentation transcript:

August 27, 2012 ETM 607 Slide 1 ETM 607 Application of Monte Carlo Simulation: Scheduling Radar Warning Receivers (RWRs) Scott R. Schultz Mercer University

August 27, 2012 ETM 607 Slide 2 Problem Statement  Develop an RWR scheduler that minimizes the time to detect multiple threats across multiple frequency bands.

August 27, 2012 ETM 607 Slide 3 RWR Scheduling Definitions Pulse Width (PW) Revisit Time (RT) Illumination Time (IT) Pulse Repetition Interval (PRI) Beam Width (BW) Definitions: Revisit Time (RT) – time to rotate 360 degrees (rotating radar) Illumination Time (IT) – function of RT and BW Pulse Width (PW) – length of time while target is energized Pulse Repetition Interval (PRI) – time between pulses Time

August 27, 2012 ETM 607 Slide 4 Example RWR Schedule RWR Schedule – a series of dwells on different frequency bands: sequence and length

August 27, 2012 ETM 607 Slide 5 RWR Scheduling Problem Objective – detect all threats as fast as possible (protect the pilot) How to sequence dwells? How to determine dwell length? How to evaluate / score schedules? Meta-Heuristics Simulation

August 27, 2012 ETM 607 Slide 6 Need for Simulation Given that the offset for each threat pulse train is unknown. Determine:MTDAT - expected time to detect all threats, MaxDAT - maximum time to detect all threats Note different offsets Threat detected in cycle 1 Threat detected in cycle 2

August 27, 2012 ETM 607 Slide 7 Simulation Algorithm n = 1 i = 1 Generate offset for threat i ~ U(0,RT i ) Determine time when RWR schedule coincides with threat i i = i + 1 i < I Objective: Evaluate / Score a single RWR schedule. N – number of iterations I – number of threats n = n + 1 Update MTDAT, MaxDAT n < N Done Yes No

August 27, 2012 ETM 607 Slide 8 Simulation iterations - N When does the MTDAT running average begin to converge? MTDAT running average: 3 threats MTDAT running average: 5 threats MTDAT running average: 10 threats

August 27, 2012 ETM 607 Slide 9 Simulation Run-Time How long does simulation run to evaluate a single schedule?

August 27, 2012 ETM 607 Slide 10 Empirical Density Functions Can we take advantage of the distribution function of MTDAT to avoid costly simulation?

August 27, 2012 ETM 607 Slide 11 POI Theory – 2 pulse trains Enter: Kelly, Noone, and Perkins (1996) –The probability of intercept can be divided into four regions, associated with the pulse count, n, of the shorter periodic pulse train. where P 1 = (  1 +  2 - 2d + 1)/T 2, and assumes T 1 < T 2. * Note, Kelly Noone and Perkins did not add the 1, we believe trailing edge triggered.

August 27, 2012 ETM 607 Slide 12 MTD - Mean Time to Detect Our contribution: Knowing that, MTD = E[n] =, where t(n) is the intercept time for pulse n. What is t(n) for all n?

August 27, 2012 ETM 607 Slide 13 MTD - Mean Time to Detect Observation: When threat starts in positions -1,0,1, or 2, intercept occurs on pulse 1 of RWR. When threat starts in position 3, 4 or 5 intercept occurs on pulse 4, 7 and 10 respectively. Intercept time occurs at T 1 (n-1) + d + i, where n is the RWR pulse count and i is 0 if threat starts before start of cycle, else i is amount of time elapsed between start of RWR pulse and start of threat. d = 2 T 2 = 20T 1 = 7 Time of Intercept Start Time of Threat      ThreatRWR

August 27, 2012 ETM 607 Slide 14 MTD - Mean Time to Detect Expected times t(n) per cycle n: where  is an indeterminate error bounded by: and, MTD = where E is the total error bounded by:

August 27, 2012 ETM 607 Slide 15 MTD - Mean Time to Detect Is there error, E, a concern? RWRThreatCoincidenceMTD T1tau1T2tau2dRPTEnumeration (1)Simulation (2)%Error (3) E[n]  t(n)p(n) %Error (4) % % % % % % % % % % % % % % % % % % (1) Enumeration - by hand, correct value (2) Simulated for 10,000 iterations (3) %Error = ABS(Enumeration - Simulation)/Enumeration (4) %Error = (Enumeration -  t(n)p(n))/Enumeration Note: calculated E[n] is better and faster than Simulated value.

August 27, 2012 ETM 607 Slide 16 Summary and Limitations Summary: An innovative closed form approach for determining the mean time for coincidence of periodic pulse trains has been developed using POI theory and insight on the coincidence of periodic pulse trains. The approach is computationally faster and more accurate than a previous presented Monte Carlo simulation approach. Limitations: This method is limited to threats which exhibit strictly periodic pulse train behavior (e.g. rotating beacons). Still need method to determine MaxDAT Future: An enumerative approach is being evaluated for non-periodic pulse trains.