A Brownian bridge movement model to track mobile targets
Cheng, Chun Chieh
Singham, Dashi I.
Atkinson, Michael P.
MetadataShow full item record
The Brownian bridge movement model (BBMM) models target movement between two known points as a Brownian bridge. This thesis extended the BBMM to account for multiple starting and ending points and to account for intelligence inputs midway through the target movement. The BBMM is applied to a military scenario where U.S. forces are conducting surveillance to monitor the breakout of Chinese forces in the South China Sea. Probability heat maps, depicting the probability of a target location at discrete times, are generated through simulations in MATLAB. Using the heat maps, this thesis developed an algorithm to automate the placement of sensors to detect the target. This thesis focused on the use of a network of unmanned sensors as the means for target detection. The relationship between the sensors' attributes and the probability of detection is explored through a meta-experiment. The experiment utilizes a three-stage algorithm that generates heat maps, deploys sensors and randomizes intelligence inputs, and measures the probability of detection. A trade-off analysis was conducted and showed that to achieve a higher probability of detection, it is more effective to have sensors cover a wider area at fewer discrete points in time than to have a greater number of discrete looks using sensors covering smaller areas.
RightsCopyright is reserved by the copyright owner.
Showing items related by title, author, creator and subject.
Lim, Jun Jie (Monterey, CA; Naval Postgraduate School, 2018-09);Target tracking and monitoring plays a crucial role in the intelligence collection domain. With the advancement of intelligence collection and data analysis methods, we can sometimes obtain a target’s initial and end ...
Blau, Joseph A.; Johnson, Bonnie W.; Cohn, Keith; Green, John (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N003-ADirected Energy Weapons (DEW) will proliferate and become a threat exploited by adversaries due to high potential mission success and low cost compared to traditional weapons. Counter DEW (CDEW) methods and capabilities ...
Mobile sensor networks a discrete event simulation of WMD threat detection in urban traffic schemes Hyink, Jeffrey F. (Monterey, California. Naval Postgraduate School, 2007-03);The rise of the threat of WMD attack on American soil necessitates new and innovative approaches to homeland security. A layered security model has been proposed in which an attacker must successfully penetrate multiple ...