ha ha in united states over 2 million reported burglaries
play

Ha Ha ! In United States: Over 2 million reported burglaries in 2009 - PowerPoint PPT Presentation

Santanu Guha* , Kurt Plarre*, Daniel Lissner*, Somnath Mitra*, Bhagavathy Krishna*, Prabal Dutta~, Santosh Kumar* *University of Memphis ~University of Michigan Ha Ha ! In United States: Over 2 million reported burglaries in 2009 ~ An average $ 2000


  1. Santanu Guha* , Kurt Plarre*, Daniel Lissner*, Somnath Mitra*, Bhagavathy Krishna*, Prabal Dutta~, Santosh Kumar* *University of Memphis ~University of Michigan Ha Ha !

  2. In United States: Over 2 million reported burglaries in 2009 ~ An average $ 2000 loss per incident

  3. Existing Theft Detection Systems • Either deter or detect burglary incidents

  4. Existing Tracking Systems • Radio Outages • Unsuitable for smaller assets

  5. We need a system that is… Stealthy 2 years 1 year Long Life Immune to Radio Outages

  6. Our “AutoWitness” system Detects Burglary Autonomously • Using Vehicular Movement as an identifier of theft Tracks Asset, Pinpoints Final Location • Using a HMM based model to track burglars using only inertial estimates.

  7. AutoWitness Tag Node Server Embedded in Used for Map expensive items Matching

  8. How does AutoWitness work ? Autonomous Detection of Burglary by the Tag Node

  9. Vehicular Movement Indicates Theft

  10. How does AutoWitness work ? Autonomous Detection of Burglary by the Tag Node Detection of Theft initiates tracking of assets

  11. Cell Tower Map Matching • HMM • City Map AutoWitness Server

  12. How does AutoWitness work? Autonomous Detection of Burglary by the Tag Node Detection of Theft initiates tracking of assets Track is provided to law enforcement officials when cell tower is available completing the process of asset recovery

  13. Cell Tower Map Matching Asset • HMM Location • City Map AutoWitness Server

  14. Thank you AutoWitness ! • Classifies Theft by Detecting Vehicular Signature • Produce inertial estimates using accelerometers and gyroscopes • Computes track of burglar using a HMM • Informs the Police

  15. Key System Challenges: AutoWitness Real Life Deployment presents several system challenges Challenges • Tag Node • Server

  16. Key System Challenges: Tag Node Producing Accurate Inertial Estimates Choosing Re ‐ orientating appropriate Tag Node Hardware Developing Theft Classifier

  17. Choice of Hardware for Tag Node Wake Up Circuit Vibration Dosimeter • Filters out insignificant vibrations and prolongs tag node lifetime

  18. Choice of Hardware for Tag Node Distance = d Angle = Θ • 3 axis accelerometer • 3 axis Gyroscope

  19. Choice of Hardware for Tag Node Choice of Hardware for Tag Node Cell Tower AutoWitness Server • A GSM \ GPRS modem All integrated in a Epic Core Platform

  20. Light Weight detection of burglary on Tag Node Vehicular movement is taken Significant as indicator of theft Vibrations Accelerometers Extensive Data Collected for different movement Decision scenarios Tree Classifier Built using 10 fold Theft cross validation in Weka

  21. Producing Accurate Inertial Estimates Producing accurate inertial estimates • Distance Computation using inertial sensors ‐ Remove noise ‐ Re ‐ orient Tag Node ‐ Correct for Radial Acceleration ‐ Correct for drift

  22. Distance Computation • Remove Noise • Subtract Mean between stops to correct drift • Double Integrate Also remove component radial acceleration for curves

  23. Distance Computation All Filtration Distance Error < 12.6 % Steps No Reorientation No Radial Acceleration Correction No Drift Correction

  24. Key System Challenges: Server Side Using only Inertial Estimates Pinpoint the Reconstruct the asset’s final path driven by location burglar

  25. Reconstruct Path driven by Burglar Hidden Markov Model Start P (Si|Start) Existing Systems using HMM for State i State j map matching require GPS P (Oi|State i) coordinates as P (State j|State i) inputs Observable i

  26. Start Probabilities Start states emerge from Intersections within uncertainty range Stolen item No of Intersections = 4 original location Start Probability = 1/4

  27. Transition Probabilities (TPs) We want to Error Range of Distance Computation Gets highest TP assign TPs since closest to measured distance From the system’s d perspective Gets TP proportional to their distance States are from actual Road measured dist Segments

  28. Observables Speed of the Car ? Curvatures of Roads ? Sequence of distances between every pair of turns and/or stops experienced by the burglar’s car

  29. Let’s say there are two road Road Segment A segments of identical length Discrimination using location Road Segment B of traffic lights on roads

  30. Real Life Test

  31. Real Life Test ‐ Return Path

  32. Evaluations at Scale Set up for the evaluations: • We used Openstreetmap.org GIS data base • Chose 100 different locations through out the city as our starting locations • Fort each stating location chose 10 different directions for a fixed travelled distance • Created synthetic paths from the database marking a set of intersections as STOP

  33. Evaluations of Map Matching 92 % 73 % Max Distance Computation Error Stopping Sequence, Localization at Destination

  34. Evaluations of Map Matching 98 % 93 % Max Distance Computation Error Stopping Sequence, Localization at each Turn

  35. Conclusions • Achieves over 90% accuracy in identifying the path driven by the burglar using inertial estimates • Immune to Radio Outages • Life Time prolonged due to filtration by Vibration Dosimeter Future Work • Locate apartment or house of the burglar

  36. Traffic light pinned as it falls within error margin Road Segment A Stopping estimates refined by pinning to matched traffic lights RS B pruned as no Road Segment B Stops traffic light matched

  37. Both lights within the error range Branch 1 Branch 2

  38. Evaluations of Map Matching 91 % Chance Cumulative Prob. of correct path in K top weighted paths

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend