advisor
play

Advisor: Tayfur Altiok, Professor, Rutgers University, NJ - PowerPoint PPT Presentation

Presented by: Amir Ghafoori, PhD Student, Rutgers University, NJ Advisor: Tayfur Altiok, Professor, Rutgers University, NJ CAIT-DIMACS Laboratory for Port Security Divers AUVs Hull mounted objects 2 Infeasibility of


  1. Presented by: Amir Ghafoori, PhD Student, Rutgers University, NJ Advisor: Tayfur Altiok, Professor, Rutgers University, NJ CAIT-DIMACS Laboratory for Port Security

  2.  Divers  AUV’s  Hull mounted objects 2

  3.  Infeasibility of electromagnetic sensors  A type of sensor called SONAR (SO SOund NA NAvigation and Ranging) is used  Sonars work based on sound waves 3

  4.  Electromagnetic waves get stuck in sea water  Sound waves can travel in sea water even for tens of miles

  5.  Active  Passive

  6.  A Risk Minimization problem, with integer (binary) decision variables  With: ◦ Multiple coverage ◦ Detection probability reduces by distance from the sonar ◦ Various properties of sonars ◦ Different sonar types Are considered in the model.  Discretization 6

  7. ? 7

  8. 8

  9. 9

  10.  , a characteristicvalueof cell i j ij  p detection probabilityof asonar  c budget for placing sonars  n numberof cellsasonarcancover  NC set of neighboring cellsof i, j that a sonar ij positioned at celli, j cancoverincluding i, jitself  1 , if a sonaris placed at celli j  x ij  0 otherwise  1 if celli, j iscovered by a sonar  y ij  0 otherwise

  11. Objective   (1 . ) Min a p y Function ij ij i j   . (1) n x y ij kl Placement  , k l NC ij Constraints   (2) y x ij kl  , k l NC ij Cost   (3) c x b Constraint ij i j   Decision y  , 0,1 x ij ij Variables

  12.   (1 . ) Min a p y ij ij i j This objective function minimizes a risk-like measure according to cell coverage and also the importance of cells (a ij values)     [ ] [ | ] ( ) R E C E C Successful Attack P Successful Attack      [ | ] ( | ) ( ) E C Successful Attack P Successful Attack Attack Happens P Attack Happens C V T

  13.  Featuring ◦ Multiple detection of sonars ◦ Range dependent detection probability ◦ Various types of sonars 13

  14.         {1 [((1 ) ) ]} Min a t dp y t dp max ij ij n ijn ij i j n     : , , , St d x y i j m n mn ijm kln Placement  ( , ) k l N ijmn Constraints     , , y x i j n ijn klm  ( , ) m k l N ijmn Cost    c x b Constraint m ijm i j m      1 , y M t i j Multiple ijn ij n Coverage  Constraints     (1 ) 2 , M t y i j ij ijn n   Decision t  , , 0,1 x y ijm ijn ij Variables 14

  15.  1 ( , ) if a sonar of type m is placed incell i j  x ijm  0 otherwise  1 ( ) if cell i, j iscovered bycoveragetype n  y ijn  0 otherwise  1 ( , ) if cell i j iscoverd by morethanonesonar  t ij  0 otherwise 15

  16. Te Test st Case se New w Yo York Ha Harbor bor (as an example) 16

  17. 17

  18. 18

  19. 19

  20. 20

  21. 21

  22. Thank you! 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend