5,634 research outputs found

    When Is Information Sufficient for Action? Search with Unreliable yet Informative Intelligence

    Get PDF
    We analyze a variant of the whereabouts search problem, in which a searcher looks for a target hiding in one of n possible locations. Unlike in the classic version, our searcher does not pursue the target by actively moving from one location to the next. Instead, the searcher receives a stream of intelligence about the location of the target. At any time, the searcher can engage the location he thinks contains the target or wait for more intelligence. The searcher incurs costs when he engages the wrong location, based on insufficient intelligence, or waits too long in the hopes of gaining better situational awareness, which allows the target to either execute his plot or disappear. We formulate the searcher’s decision as an optimal stopping problem and establish conditions for optimally executing this search-and-interdict mission

    Privacy risks in trajectory data publishing: reconstructing private trajectories from continuous properties

    Get PDF
    Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-processed to obtain trajectories which are sequences of spatio-temporal data points belonging to a moving object. Recently, advanced data mining techniques have been developed for extracting patterns from moving object trajectories to enable applications such as city traffic planning, identification of evacuation routes, trend detection, and many more. However, when special care is not taken, trajectories of individuals may also pose serious privacy risks even after they are de-identified or mapped into other forms. In this paper, we show that an unknown private trajectory can be reconstructed from knowledge of its properties released for data mining, which at first glance may not seem to pose any privacy threats. In particular, we propose a technique to demonstrate how private trajectories can be re-constructed from knowledge of their distances to a bounded set of known trajectories. Experiments performed on real data sets show that the number of known samples is surprisingly smaller than the actual theoretical bounds

    Node discovery in a networked organization

    Full text link
    In this paper, I present a method to solve a node discovery problem in a networked organization. Covert nodes refer to the nodes which are not observable directly. They affect social interactions, but do not appear in the surveillance logs which record the participants of the social interactions. Discovering the covert nodes is defined as identifying the suspicious logs where the covert nodes would appear if the covert nodes became overt. A mathematical model is developed for the maximal likelihood estimation of the network behind the social interactions and for the identification of the suspicious logs. Precision, recall, and F measure characteristics are demonstrated with the dataset generated from a real organization and the computationally synthesized datasets. The performance is close to the theoretical limit for any covert nodes in the networks of any topologies and sizes if the ratio of the number of observation to the number of possible communication patterns is large

    Using Multiattribute Utility Copulas in Support of UAV Search and Destroy Operations

    Get PDF
    The multiattribute utility copula is an emerging form of utility function used by decision analysts to study decisions with dependent attributes. Failure to properly address attribute dependence may cause errors in selecting the optimal policy. This research examines two scenarios of interest to the modern warfighter. The first scenario employs a utility copula to determine the type, quantity, and altitude of UAVs to be sent to strike a stationary target. The second scenario employs a utility copula to examine the impact of attribute dependence on the optimal routing of UAVs in a contested operational environment when performing a search and destroy mission against a Markovian target. Routing decisions involve a tradeoff between risk of UAV exposure to the enemy and the ability to strike the target. This research informs decision makers and analysts with respect to the tactics, techniques, and procedures employed in UAV search and destroy missions. An ever increasing UAV operations tempo suggests such research becoming increasingly relevant to the warfighter

    Search and Pursuit-Evasion in Mobile Robotics, A survey

    Get PDF
    This paper surveys recent results in pursuitevasion and autonomous search relevant to applications in mobile robotics. We provide a taxonomy of search problems that highlights the differences resulting from varying assumptions on the searchers, targets, and the environment. We then list a number of fundamental results in the areas of pursuit-evasion and probabilistic search, and we discuss field implementations on mobile robotic systems. In addition, we highlight current open problems in the area and explore avenues for future work

    Multi-user navigation: a 3D mobile device interactive support

    Get PDF
    Multi-User navigation within an environment with the aid of 3D mobile support provides end users with additional mobility thought and improves mobility services’ efficiency. A necessary approach of using mobile device for navigation aid is to display only a section of the view-front and to let users control the portion shown by conceptually moving on the orientation. There is a need for multiple users to be able to interact with themselves when they are within an environment and navigating with the aid of 3D mobile devices support, in order to meet-up with an appointment or to be aware of the locations of each other. Unfortunately, the predominant 3D mobile navigation system does not provide multi-user interactive services. Users cannot be aware of other users navigating within same environment using the same system on their mobile devices at the same time. This paper presents multi-user 3D mobile navigation system for providing multiple user awareness. The analysis of the results provides a unique visualization of multiple users using mobile devices to help them navigate to a target location by being aware of their whereabouts

    Optimisation of Mobile Communication Networks - OMCO NET

    Get PDF
    The mini conference “Optimisation of Mobile Communication Networks” focuses on advanced methods for search and optimisation applied to wireless communication networks. It is sponsored by Research & Enterprise Fund Southampton Solent University. The conference strives to widen knowledge on advanced search methods capable of optimisation of wireless communications networks. The aim is to provide a forum for exchange of recent knowledge, new ideas and trends in this progressive and challenging area. The conference will popularise new successful approaches on resolving hard tasks such as minimisation of transmit power, cooperative and optimal routing

    Discovering private trajectories using background information

    Get PDF
    Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques. Applications like city traffic planning, identification of evacuation routes, trend detection, and many more can benefit from trajectory mining. However, the trajectories of individuals often contain private and sensitive information, so anyone who possess trajectory data must take special care when disclosing this data. Removing identifiers from trajectories before the release is not effective against linkage type attacks, and rich sources of background information make it even worse. An alternative is to apply transformation techniques to map the given set of trajectories into another set where the distances are preserved. This way, the actual trajectories are not released, but the distance information can still be used for data mining techniques such as clustering. In this paper, we show that an unknown private trajectory can be reconstructed using the available background information together with the mutual distances released for data mining purposes. The background knowledge is in the form of known trajectories and extra information such as the speed limit. We provide analytical results which bound the number of the known trajectories needed to reconstruct private trajectories. Experiments performed on real trajectory data sets show that the number of known samples is surprisingly smaller than the actual theoretical bounds
    corecore