Abstract
The main source of knowledge is processing data. Data comes from sensors. Within a limited budget, it is extremely important to make sure that the use of the sensors is optimized so that we get the largest possible amount of useful data from these sensors. Traditionally, most data comes from stationary sensors, i.e., sensors which we place at fixed locations . For such sensors, it is important to come up with the optimal placement , the placement which would lead to the largest amount of useful data. We analyze this problem in Sect. 2.1, on the example of placing bio-weapon detectors, and in Sect. 2.2, on the example of placing environmental sensors. The problem of optimal use becomes more technically challenging if we take into account the possibility of using mobile sensors , i.e., sensors which we can move along different trajectories. In this case, it is important to come up with optimal trajectories, i.e., the trajectories which would lead to the largest amount of useful data. We analyze this problem in Sect. 2.3, on the example of Unmanned Aerial Vehicles (UAVs) patrolling the border . In all these cases, it is important to make sure that not only we have an algorithm producing the optimal placement or optimal trajectory: we also need to make sure that the corresponding algorithms are computationally efficient, i.e., that the corresponding optimization algorithms can produce the resulting optimal setting in reasonable time. The more sensors we need to place, the more computations we need and therefore, the more important it is for the computation time to be reasonable. This is especially important in situations of big data , when the amount of data is so huge that the traditional numerical methods are not applicable [1,2,3,4]. We analyze this problem in Sect. 2.4, again on the example of security problems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
B. Baesens, Analytics in a Big Data World: The Essential Guide to Data Science and its Applications (Wiley, Hoboken, New Jersey, 2014)
B. Marr, Big Data: Using SMART Big Data, Analytics and Metrics To Make Better Decisions and Improve Performance (Wiley, Chichester, UK, 2015)
N. Marz, J. Warren, Big Data: Principles and Best Practices of Scalable Realtime Data Systems (Manning Publication, Shelter Island, New York, 2015)
V. Mayer-Schönberger, K. Cukier, Big Data: A Revolution That Will Transform How We Live, Work, and Think (John Murray Publication, London, UK, 2013)
C. Kiekintveld, O. Lerma, Towards optimal placement of bio-weapon detectors, in Proceedings of the 30th Annual Conference of the North American Fuzzy Information Processing Society NAFIPS’2011, El Paso, Texas, 18–20 Mar 2011
R. Kershner, The number of circles covering a set. Am. J. Math. 61(3), 665–671 (1939)
R.B. Myerson, Game Theory: Analysis of Conflict (Harvard University Press, Harvard, Massachusesst, 1997)
M. Koshelev, O. Lerma, C. Tweedie, Towards optimal few-parametric representation of spatial variation: geometric approach and environmental applications. Geombinatorics 21(1), 15–24 (2011)
D.J. Sheskin, Handbook of Parametric and Nonparametric Statistical Procedures (Chapman & Hall/CRC, Boca Raton, Florida, 2011)
S. Li, Y. Ogura, V. Kreinovich, Limit Theorems and Applications of Set Valued and Fuzzy Valued Random Variables (Kluwer Academic Publishers, Dordrecht, 2002)
H. Busemann, Geometry of Geodesics (Dover, New York, 2005)
J. Aczel, Lectures on Functional Equations and Their Applications (Dover, New York, 2006)
M.G. Averill, K.C. Miller, G.R. Keller, V. Kreinovich, R. Araiza, S.A. Starks, Using expert knowledge in solving the seismic inverse problem. Int. J. Approx. Reason. 45(3), 564–587 (2007)
P.C. Fishburn, Utility Theory for Decision Making (Wiley, New York, 1969)
P.C. Fishburn, Nonlinear Preference and Utility Theory (The John Hopkins Press, Baltimore, Maryland, 1988)
R.L. Keeney, H. Raiffa, Decisions with Multiple Objectives (Wiley, New York, 1976)
R.D. Luce, R. Raiffa, Games and Decisions: Introduction and Critical Survey (Dover, New York, 1989)
H. Raiffa, Decision Analysis (Addison-Wesley, Reading, Massachusetts, 1970)
C. Kiekintveld, M. Jain, J. Tsai, J. Pita, F. Ordonez, M. Tambe, Computing optimal randomized resource allocations for massive security games, in Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems AAMAS’09, Budapest, Hungary, 10–15 May 2009
T.H. Cormen, C.E. Leiserson, R.L. Rivest, C. Stein, Introduction to Algorithms (MIT Press, Cambridge, Massachusetts, 2009)
G. Klir, B. Yuan, Fuzzy Sets and Fuzzy Logic: Theory and Applications (Prentice Hall, Upper Saddle River, New Jersey, 1995)
H.T. Nguyen, E.A. Walker, First Course on Fuzzy Logic (CRC Press, Boca Raton, Florida, 2006)
O. Lerma, V. Kreinovich, C. Kiekintveld, Linear-time resource allocation in security games with identical fully protective resources, in Proceedings of the AAAI Workshop on Applied Adversarial Reasoning and Risk Modeling AARM’11, San Francisco, California, 7 Aug 2011
T. Sandler, D.G. Arce, Terrorism and game theory, in Simulation and Gaming, vol. 34, no. 3 (2003), pp. 319–337
V.M. Bier, Choosing what to protect. Risk Analysis 27(3), 607–620 (2007)
T. Alpcan, T. Basar, A game theoretic approach to decision and analysis in network intrusion detection, in Proceedings of the 42nd IEEE Conference on Decision and Control CDC’2003, Maui, Hawaii, Maui, 9–12 Dec 2003, pp. 2595–2600
K.C. Nguyen, T.A.T. Basar, Security games with incomplete information, in Proceedings of IEEE International Conference on Communications ICC’09, Dresden, Germany, 14–18 June 2009
V. Srivastava, J. Neel, A.-B. MacKenzie, R. Menon, L.A. Dasilva, J.E. Hicks, J.H. Reed, R.P. Gilles, Using game theory to analyze wireless ad hoc networks. IEEE Commun. Surv. Tutor. 7(4), 46–56 (2005)
N. Gatti, Game theoretical insights in strategic patrolling: model and algorithm in normal-form, in Proceedings of the 18th European Conference on Artificial Intelligence ECAI’08, Patras, Greece, 21–25 July 2008, pp. 403–407
N. Agmon, S. Kraus, G.A. Kaminka, V. Sadov, Adversarial uncertainty in multi-robot patrol, in Proceedings of the 21st International Joint Conference on Artificial Intelligence IJCAI’09, Pasadena, California, 11–17 July 2009
E. Halvorson, V. Conitzer, R. Parr, Multi-step multi-sensor hider-seeker games, in Proceedings of the 21st International Joint Conference on Artificial Intelligence IJCAI’09, Pasadena, California, 11–17 July 2009
T. Roughgarden, Stackelberg scheduling strategies. SIAM J. Comput. 33(2), 332–350 (2004)
J. Pita, M. Jain, C. Western, C. Portway, M. Tambe, F. Ordonez, S. Kraus, P. Parachuri, Deployed ARMOR protection: the application of a game-theoretic model for security at the Los Angeles International Airport, in Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems AAMAS’08, Estoril, Portugal, 12–16 May 2008
J. Tsai, S. Rathi, C. Kiekintveld, F. Ordóñez, M. Tambe, IRIS—A tool for strategic security allocation in transportation networks, in Proceedings of the Eighth International Conference on Autonomous Agents and Multiagent Systems AAMAS’09, Budapest, Hungary, 10–15 May 2009
J. Pita, M. Tambe, C. Kiekintveld, S. Cullen, E. Steigerwald, Guards—game theoretic security allocation on a national scale, in Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems AAMAS’11, Taipei, Taiwan, 2–6 May 2011
V. Conitzer, T. Sandholm, Computing the optimal strategy to commit to, in Proceedings of the 7th ACM Conference on Electronic Commerce EC’06, Ann Arbor, Michigan, 11–15 June 2006, pp. 82–90
P. Paruchuri, J.P. Pearce, J. Marecki, M. Tambe, F. Ordonez, S. Kraus, Playing games with security: an efficient exact algorithm for Bayesian Stackelberg games, in Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems AAMAS’08, Estoril, Portugal, 12–16 May 2008, pp. 895–902
M. Jain, E. Kardes, C. Kiekintveld, M. Tambe, F. Ordonez, Security games with arbitrary schedules: a branch and price approach, in Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence AAAI’10, Atlanta, Georgia, 11–15 July 2010
H. von Stackelberg, Marktform und Gleichgewicht (Springer Verlag, Vienna, 1934)
G. Leitmann, On generalized Stackelberg strategies. Optim. Theory Appl. 26(4), 637–643 (1978)
T. Basar, G.J. Olsder, Dynamic Noncooperative Game Theory (Academic Press, San Diego, California, 1995)
B. von Stengel, S. Zamir, Leadership with commitment to mixed strategies, London School of Economics LSE, Computational, Discrete, and Applied Mathematics (CDAM) Report Series, Technical Report LSE-CDAM-2004-01 (2004)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Lerma, L.O., Kreinovich, V. (2018). Data Acquisition: Towards Optimal Use of Sensors. In: Towards Analytical Techniques for Optimizing Knowledge Acquisition, Processing, Propagation, and Use in Cyberinfrastructure and Big Data. Studies in Big Data, vol 29. Springer, Cham. https://doi.org/10.1007/978-3-319-61349-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-61349-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61348-2
Online ISBN: 978-3-319-61349-9
eBook Packages: EngineeringEngineering (R0)