640 likes | 653 Views
The Bioterrorism Sensor Location Problem. Early warning is critical This is a crucial factor underlying government’s plans to place networks of sensors/detectors to warn of a bioterrorist attack. The BASIS System. Locating Sensors is not Easy. Networks of sensors are expensive
E N D
Early warning is critical • This is a crucial factor underlying government’s plans to place networks of sensors/detectors to warn of a bioterrorist attack The BASIS System
Locating Sensors is not Easy • Networks of sensors are expensive • Ways to locate them to maximize “coverage” and expedite an alarm are not easy to determine • Approaches that improve upon existing, ad hoc location methods could save countless lives in the case of an attack and also moneyin capital and operational costs.
Two Fundamental Problems • Sensor Location Problem (SLP): • Choose an appropriate mix of sensors • decide where to locate them for best protection and early warning
Two Fundamental Problems • Pattern Interpretation Problem (PIP): When sensors set off an alarm, help public health decision makers decide • Has an attack taken place? • What additional monitoring is needed? • What was its extent and location? • What is an appropriate response?
Two Fundamental Problems • The SLP and PIP are ripe for: • Precise formulation • Mathematical modeling • Algorithmic analysis • Applications of powerful new statistical methods
Two Fundamental Problems • Relevant tools include: • Network design • Network analysis • Location theory • Reliability theory • Data mining • Fluid dynamic modeling • Source-to-dose modeling • Time series analysis
Types of Sensors • There are many types of sensors. Portal shield Dry filtration unt (portable) Bioparticulate counter/detector
The SLP • Sensor technology is changing rapidly • Sensors come with a variety of characteristics • A good sensor location methodology should not be dependent upon particular sensor technologies.
The SLP: What is a Measure of Success of a Solution? • A modeling problem. • Needs to be made precise. • Many possible formulations.
The SLP: What is a Measure of Success of a Solution? • Identify and ameliorate false alarms. • Defending against a “worst case” attack or an “average case” attack. • Minimize time to first alarm? (Worst case? (Average case?) • Maximize “coverage” of the area. • Minimize geographical area not covered • Minimize size of population not covered • Minimize probability of missing an attack
The SLP: What is a Measure of Success of a Solution? • Cost: Given a mix of available sensors and a fixed budget, what mix will best accomplish our other goals?
The SLP: What is a Measure of Success of a Solution? • It’s hard to separate the goals. • Even a small number of sensors might detect an attack if there is no constraint on time to alarm. • Without budgetary restrictions, a lot more can be accomplished.
Modeling Issues: Types of Sensors • Sensor technology is changing rapidly. • Methods we develop should not be dependent upon today’s technology. Much of present technology depends upon hand-held rapid PCR assay together with software for BW agent identification
Modeling Issues: Types of Sensors Sensors differ as to: • Response • Accuracy and reliability • Stationarity vs. mobility • Constraints on their location • Cost • How sensor data is reported
Reporting of Sensor Data • Do humans physically examine collection devices?
Reporting of Sensor Data • Is the data electronically reported? • Reporting at discrete times? • Reporting continuously?
Other Relevant Modeling Issues • Probability of Release at Different Locations • Geography • Buildings • Weather • Population Distribution
Greedy Algorithms • Find the most important location first and locate a sensor there. • Find second-most important location. • Etc. • Builds on earlier work at IDA (Grotte, Platt) • Steepest ascent approach. • No guarantee of optimality. • In practice, peak of objective function is rather flat, so not hard to get close to optima.
Algorithmic Approaches II : Variants of Classic Location and Clustering Methods
Algorithmic Approaches II : Variants of Classic Location and Clustering Methods • Location theory: locate facilities (sensors) to be used by users located in a region. • Cluster analysis: Given points in a metric space, partition them into groups or clusters so points within clusters are relatively close. • Clusters correspond to points covered by a facility (sensor).
Variants of Classic Location and Clustering Methods • k-median clustering: Given k sensors, place them so each point in the city is within x feet of a sensor. • Complications: More dimensions: location affects sensitivity, wind strength enters, sensors have different characteristics, etc. • This higher-dimensional k-median clustering problem is hard! Best-known algorithms are due to Rafail Ostrovsky.
Variants of Classic Location and Clustering Methods • Further complications make this even more challenging: • Different costs of different sensors • Restrictions on where we can place different sensors • Is it better to have every point within x feet of some sensor or every point within y feet of at least three sensors (y > x)? • Approximation methods due to Chuzhoy, Ostrovsky, and Rabani and to Guha, Tardos, and Shmoys are relevant.
Algorithmic Approaches III : Variants of Highway Sensor Network Algorithms
Variants of Highway Sensor Network Algorithms • Sensors located along highways and nearby pathways measure atmospheric and road conditions. • Muthukrishnan, et al. have developed very efficient algorithms for sensor location. • Based on “bichromatic clustering” and “bichromatic facility location” (color nodes corresponding to sensors red, nodes corresponding to sensor messages blue)
Variants of Highway Sensor Network Algorithms • These algorithms apply to situations with many more sensors than the bioterrorism sensor location problem. • As BT sensor technology changes, we can envision a myriad of miniature sensors distributed around a city, making this work all the more relevant.
Algorithmic Approaches IV : Variants of Air Pollution Monitoring Models
Variants of Air Pollution Monitoring Models • Long history of using models to locate air pollution monitors. • MENTOR: Modeling Environment for Total Risk; developed by team at Rutgers and R.W.J. Medical School (Panos Georgopoulos, Paul Lioy) at Center for Exposure and Risk Modeling
Variants of Air Pollution Monitoring Models • MENTOR builds on • personal exposures • Source-to-dose modeling • Environmental conditions • Weather • MENTOR is a powerful computational tool. • However, the models it uses are not nearly as large or as complex as those traditionally used in nuclear weapons research at Los Alamos and elsewhere.
Variants of Air Pollution Monitoring Models • Combine air pollution monitor placement modeling tools like MENTOR with iteration/simulation tools. • Piecewise heuristic approach developed by Tom Boucher, David Coit, E. Elsayed • Based on initial simulation results, divide problem into subproblems and repeat local optimization algorithms • Method recently applied to counter-terrorism applications by Pate-Cornell.
Algorithmic Approaches V : Building on Equipment Placing Algorithms
Building on Equipment Placing Algorithms • The “Node Placement Problem” is problem of determining locations or nodes to install certain types of networking equipment. • “Coverage” and cost are a major consideration. • Researchers at Telcordia Technologies have studied variations of this problem arising from broadband access technologies.
The Broadband Access Node Placement Problem • There are inherent range limitations that drive placement. • E.g.: customer for DSL service must be within xx feet of an assigned multiplexer. • Multiplexer = sensor. • Problem solved using dynamic programming algorithms. (Tamra Carpenter, Martin Eiger,David Shallcross, Paul Seymour)
The Broadband Access Node Placement Problem: Complications • Restrictions on types of equipment that can be placed at a given node. • Constraints on how far a signal from a given piece of equipment can travel. • Cost and profit maximization considerations. • Relevance of work on general integer programming, the knapsack cover problem, and local access network expansion problems.
The Pattern Interpretation Problem • It will be up to the Decision Maker to decide how to respond to an alarm from the sensor network.
The Pattern Interpretation Problem • Little has been done to develop analytical models for rapid evaluation of a positive alarm or pattern of alarms from a sensor network. • How can this pattern be used to minimize false alarms? • Given an alarm, what other surveillance measures can be used to confirm an attack, locate areas of major threat, and guide public health interventions?
The Pattern Interpretation Problem (PIP) • Close connection to the SLP. • How we interpret a pattern of alarms will affect how we place the sensors. • The same simulation models used to place the sensors can help us in tracing back from an alarm to a triggering attack.
Approaching the PIP: Minimizing False Alarms • One approach: Redundancy. Require two or more sensors to make a detection before an alarm is considered confirmed.
Approaching the PIP: Minimizing False Alarms • Portal Shield: requires two positives for the same agent during a specific time period. • Redundancy II: Place two or more sensors at or near the same location. Require two proximate sensors to give off an alarm before we consider it confirmed. • Redundancy drawbacks: cost, delay in confirming an alarm.
Approaching the PIP: Using Decision Rules • Existing sensors come with a sensitivity level specified and sound an alarm when the number of particles collected is sufficiently high – above threshold.
Approaching the PIP: Using Decision Rules • Alternative decision rule: alarm if two sensors reach 90% of threshold, three reach 75% of threshold, etc. • One approach: use clustering algorithms for sounding an alarm based on a given distribution of clusters of sensors reaching a percentage of threshold.
Approaching the PIP: Using Decision Rules • When sensors are to be used jointly, the rules for “tuning” each sensor should be optimized to take advantage of the fact that each is part of a network. • The optimal tuning depends on the decision rule applied to reach an overall decision given the sensor inputs.
Approaching the PIP: Using Decision Rules • Prior work along these lines in missile detection (Cherikh and Kantor)
Approaching the PIP: Using Decision Rules • Most work has concentrated on the case of stochastic independence of information available at two sensors – clearly violated in BT sensor location problems. • Even with stochastic independence, finding “optimal” decision rules is nontrivial. • Recent promising approaches of Paul Kantor: study fusion of multiple methods for monitoring message streams.
Approaching the PIP: Spatio-Temporal Mining of Sensor Data • Sensors provide observations of the state of the world localized in space and time. • Finding trends in data from individual sensors: time series data mining. • PIP: detecting general correlations in multiple time series of observations. • This has been studied in statistics, database theory, knowledge discovery, data mining. • Complications: proximity relationships based ongeography; complex chronological effects.
Approaching the PIP: Spatio-Temporal Mining of Sensor Data • Sensor technology is evolving rapidly. • It makes sense to consider idealized settings where data are collected continuously and communicated instantly. • Then, modern methods of spatio-temporal data mining due to Muthukrishnan and others are relevant.