ATTENTION: The works hosted here are being migrated to a new repository that will consolidate resources, improve discoverability, and better show UTA's research impact on the global community. We will update authors as the migration progresses. Please see MavMatrix for more information.
Show simple item record
dc.contributor.author | Krishnamoorthy, Pranav | en_US |
dc.date.accessioned | 2010-07-19T19:55:02Z | |
dc.date.available | 2010-07-19T19:55:02Z | |
dc.date.issued | 2010-07-19 | |
dc.date.submitted | January 2010 | en_US |
dc.identifier.other | DISS-10683 | en_US |
dc.identifier.uri | http://hdl.handle.net/10106/4947 | |
dc.description.abstract | A priority task for homeland security is the coverage of large spans of open border that cannot be continuously physically monitored for intrusion. Low-cost monitoring solutions based on wireless sensor networks have been identified as an effective means to perform perimeter monitoring. An ad-hoc wireless sensor network scattered near a border could be used to perform surveillance over a large area with relatively little human intervention. Determining the effectiveness of such an autonomous network in detecting and thwarting an intelligent intruder is a difficult task. We propose a model for an intelligent attacker that attempts to find a detection-free path in a region with sparse sensing coverage. In particular, we apply reinforcement learning (RL) - a machine learning approach, for our model. RL algorithms are well suited for scenarios in which specifying and finding an optimal solution is difficult. By using RL, our attacker can easily adapt to new scenarios by translating constraints into rewards. We compare our RL-based technique to a reasonable heuristic in simulation. Our results suggest that our RL-based attacker model is significantly more effective, and therefore more realistic, than the heuristic approach. | en_US |
dc.description.sponsorship | Wright, Matthew | en_US |
dc.language.iso | EN | en_US |
dc.publisher | Computer Science & Engineering | en_US |
dc.title | Towards Modeling The Behavior Of Physical Intruders In A Region Monitored By A Wireless Sensor Network | en_US |
dc.type | M.S. | en_US |
dc.contributor.committeeChair | Wright, Matthew | en_US |
dc.degree.department | Computer Science & Engineering | en_US |
dc.degree.discipline | Computer Science & Engineering | en_US |
dc.degree.grantor | University of Texas at Arlington | en_US |
dc.degree.level | masters | en_US |
dc.degree.name | M.S. | en_US |
dc.identifier.externalLink | https://www.uta.edu/ra/real/editprofile.php?onlyview=1&pid=215 | |
dc.identifier.externalLinkDescription | Link to Research Profiles | |
Files in this item
- Name:
- Krishnamoorthy_uta_2502M_10683.pdf
- Size:
- 210.2Kb
- Format:
- PDF
This item appears in the following Collection(s)
Show simple item record