Skip to main content

Part of the book series: Studies in Big Data ((SBD,volume 29))

  • 560 Accesses

Abstract

The main source of knowledge is processing data. Data comes from sensors. Within a limited budget, it is extremely important to make sure that the use of the sensors is optimized so that we get the largest possible amount of useful data from these sensors. Traditionally, most data comes from stationary sensors, i.e., sensors which we place at fixed locations . For such sensors, it is important to come up with the optimal placement , the placement which would lead to the largest amount of useful data. We analyze this problem in Sect. 2.1, on the example of placing bio-weapon detectors, and in Sect. 2.2, on the example of placing environmental sensors. The problem of optimal use becomes more technically challenging if we take into account the possibility of using mobile sensors , i.e., sensors which we can move along different trajectories. In this case, it is important to come up with optimal trajectories, i.e., the trajectories which would lead to the largest amount of useful data. We analyze this problem in Sect. 2.3, on the example of Unmanned Aerial Vehicles (UAVs) patrolling the border . In all these cases, it is important to make sure that not only we have an algorithm producing the optimal placement or optimal trajectory: we also need to make sure that the corresponding algorithms are computationally efficient, i.e., that the corresponding optimization algorithms can produce the resulting optimal setting in reasonable time. The more sensors we need to place, the more computations we need and therefore, the more important it is for the computation time to be reasonable. This is especially important in situations of big data , when the amount of data is so huge that the traditional numerical methods are not applicable [1,2,3,4]. We analyze this problem in Sect. 2.4, again on the example of security problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. B. Baesens, Analytics in a Big Data World: The Essential Guide to Data Science and its Applications (Wiley, Hoboken, New Jersey, 2014)

    Google Scholar 

  2. B. Marr, Big Data: Using SMART Big Data, Analytics and Metrics To Make Better Decisions and Improve Performance (Wiley, Chichester, UK, 2015)

    Google Scholar 

  3. N. Marz, J. Warren, Big Data: Principles and Best Practices of Scalable Realtime Data Systems (Manning Publication, Shelter Island, New York, 2015)

    Google Scholar 

  4. V. Mayer-Schönberger, K. Cukier, Big Data: A Revolution That Will Transform How We Live, Work, and Think (John Murray Publication, London, UK, 2013)

    Google Scholar 

  5. C. Kiekintveld, O. Lerma, Towards optimal placement of bio-weapon detectors, in Proceedings of the 30th Annual Conference of the North American Fuzzy Information Processing Society NAFIPS’2011, El Paso, Texas, 18–20 Mar 2011

    Google Scholar 

  6. R. Kershner, The number of circles covering a set. Am. J. Math. 61(3), 665–671 (1939)

    Article  MathSciNet  MATH  Google Scholar 

  7. R.B. Myerson, Game Theory: Analysis of Conflict (Harvard University Press, Harvard, Massachusesst, 1997)

    MATH  Google Scholar 

  8. M. Koshelev, O. Lerma, C. Tweedie, Towards optimal few-parametric representation of spatial variation: geometric approach and environmental applications. Geombinatorics 21(1), 15–24 (2011)

    MathSciNet  MATH  Google Scholar 

  9. D.J. Sheskin, Handbook of Parametric and Nonparametric Statistical Procedures (Chapman & Hall/CRC, Boca Raton, Florida, 2011)

    MATH  Google Scholar 

  10. S. Li, Y. Ogura, V. Kreinovich, Limit Theorems and Applications of Set Valued and Fuzzy Valued Random Variables (Kluwer Academic Publishers, Dordrecht, 2002)

    Book  MATH  Google Scholar 

  11. H. Busemann, Geometry of Geodesics (Dover, New York, 2005)

    MATH  Google Scholar 

  12. J. Aczel, Lectures on Functional Equations and Their Applications (Dover, New York, 2006)

    MATH  Google Scholar 

  13. M.G. Averill, K.C. Miller, G.R. Keller, V. Kreinovich, R. Araiza, S.A. Starks, Using expert knowledge in solving the seismic inverse problem. Int. J. Approx. Reason. 45(3), 564–587 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  14. P.C. Fishburn, Utility Theory for Decision Making (Wiley, New York, 1969)

    MATH  Google Scholar 

  15. P.C. Fishburn, Nonlinear Preference and Utility Theory (The John Hopkins Press, Baltimore, Maryland, 1988)

    MATH  Google Scholar 

  16. R.L. Keeney, H. Raiffa, Decisions with Multiple Objectives (Wiley, New York, 1976)

    MATH  Google Scholar 

  17. R.D. Luce, R. Raiffa, Games and Decisions: Introduction and Critical Survey (Dover, New York, 1989)

    MATH  Google Scholar 

  18. H. Raiffa, Decision Analysis (Addison-Wesley, Reading, Massachusetts, 1970)

    MATH  Google Scholar 

  19. C. Kiekintveld, M. Jain, J. Tsai, J. Pita, F. Ordonez, M. Tambe, Computing optimal randomized resource allocations for massive security games, in Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems AAMAS’09, Budapest, Hungary, 10–15 May 2009

    Google Scholar 

  20. T.H. Cormen, C.E. Leiserson, R.L. Rivest, C. Stein, Introduction to Algorithms (MIT Press, Cambridge, Massachusetts, 2009)

    MATH  Google Scholar 

  21. G. Klir, B. Yuan, Fuzzy Sets and Fuzzy Logic: Theory and Applications (Prentice Hall, Upper Saddle River, New Jersey, 1995)

    MATH  Google Scholar 

  22. H.T. Nguyen, E.A. Walker, First Course on Fuzzy Logic (CRC Press, Boca Raton, Florida, 2006)

    Google Scholar 

  23. O. Lerma, V. Kreinovich, C. Kiekintveld, Linear-time resource allocation in security games with identical fully protective resources, in Proceedings of the AAAI Workshop on Applied Adversarial Reasoning and Risk Modeling AARM’11, San Francisco, California, 7 Aug 2011

    Google Scholar 

  24. T. Sandler, D.G. Arce, Terrorism and game theory, in Simulation and Gaming, vol. 34, no. 3 (2003), pp. 319–337

    Google Scholar 

  25. V.M. Bier, Choosing what to protect. Risk Analysis 27(3), 607–620 (2007)

    Article  Google Scholar 

  26. T. Alpcan, T. Basar, A game theoretic approach to decision and analysis in network intrusion detection, in Proceedings of the 42nd IEEE Conference on Decision and Control CDC’2003, Maui, Hawaii, Maui, 9–12 Dec 2003, pp. 2595–2600

    Google Scholar 

  27. K.C. Nguyen, T.A.T. Basar, Security games with incomplete information, in Proceedings of IEEE International Conference on Communications ICC’09, Dresden, Germany, 14–18 June 2009

    Google Scholar 

  28. V. Srivastava, J. Neel, A.-B. MacKenzie, R. Menon, L.A. Dasilva, J.E. Hicks, J.H. Reed, R.P. Gilles, Using game theory to analyze wireless ad hoc networks. IEEE Commun. Surv. Tutor. 7(4), 46–56 (2005)

    Article  Google Scholar 

  29. N. Gatti, Game theoretical insights in strategic patrolling: model and algorithm in normal-form, in Proceedings of the 18th European Conference on Artificial Intelligence ECAI’08, Patras, Greece, 21–25 July 2008, pp. 403–407

    Google Scholar 

  30. N. Agmon, S. Kraus, G.A. Kaminka, V. Sadov, Adversarial uncertainty in multi-robot patrol, in Proceedings of the 21st International Joint Conference on Artificial Intelligence IJCAI’09, Pasadena, California, 11–17 July 2009

    Google Scholar 

  31. E. Halvorson, V. Conitzer, R. Parr, Multi-step multi-sensor hider-seeker games, in Proceedings of the 21st International Joint Conference on Artificial Intelligence IJCAI’09, Pasadena, California, 11–17 July 2009

    Google Scholar 

  32. T. Roughgarden, Stackelberg scheduling strategies. SIAM J. Comput. 33(2), 332–350 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  33. J. Pita, M. Jain, C. Western, C. Portway, M. Tambe, F. Ordonez, S. Kraus, P. Parachuri, Deployed ARMOR protection: the application of a game-theoretic model for security at the Los Angeles International Airport, in Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems AAMAS’08, Estoril, Portugal, 12–16 May 2008

    Google Scholar 

  34. J. Tsai, S. Rathi, C. Kiekintveld, F. Ordóñez, M. Tambe, IRIS—A tool for strategic security allocation in transportation networks, in Proceedings of the Eighth International Conference on Autonomous Agents and Multiagent Systems AAMAS’09, Budapest, Hungary, 10–15 May 2009

    Google Scholar 

  35. J. Pita, M. Tambe, C. Kiekintveld, S. Cullen, E. Steigerwald, Guards—game theoretic security allocation on a national scale, in Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems AAMAS’11, Taipei, Taiwan, 2–6 May 2011

    Google Scholar 

  36. V. Conitzer, T. Sandholm, Computing the optimal strategy to commit to, in Proceedings of the 7th ACM Conference on Electronic Commerce EC’06, Ann Arbor, Michigan, 11–15 June 2006, pp. 82–90

    Google Scholar 

  37. P. Paruchuri, J.P. Pearce, J. Marecki, M. Tambe, F. Ordonez, S. Kraus, Playing games with security: an efficient exact algorithm for Bayesian Stackelberg games, in Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems AAMAS’08, Estoril, Portugal, 12–16 May 2008, pp. 895–902

    Google Scholar 

  38. M. Jain, E. Kardes, C. Kiekintveld, M. Tambe, F. Ordonez, Security games with arbitrary schedules: a branch and price approach, in Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence AAAI’10, Atlanta, Georgia, 11–15 July 2010

    Google Scholar 

  39. H. von Stackelberg, Marktform und Gleichgewicht (Springer Verlag, Vienna, 1934)

    Google Scholar 

  40. G. Leitmann, On generalized Stackelberg strategies. Optim. Theory Appl. 26(4), 637–643 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  41. T. Basar, G.J. Olsder, Dynamic Noncooperative Game Theory (Academic Press, San Diego, California, 1995)

    MATH  Google Scholar 

  42. B. von Stengel, S. Zamir, Leadership with commitment to mixed strategies, London School of Economics LSE, Computational, Discrete, and Applied Mathematics (CDAM) Report Series, Technical Report LSE-CDAM-2004-01 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. Octavio Lerma .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Lerma, L.O., Kreinovich, V. (2018). Data Acquisition: Towards Optimal Use of Sensors. In: Towards Analytical Techniques for Optimizing Knowledge Acquisition, Processing, Propagation, and Use in Cyberinfrastructure and Big Data. Studies in Big Data, vol 29. Springer, Cham. https://doi.org/10.1007/978-3-319-61349-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61349-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61348-2

  • Online ISBN: 978-3-319-61349-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics