HomelandSecurityCongressionalTalk9-15-04

HomelandSecurityCongressionalTalk9-15-04 - Homeland...

Info iconThis preview shows pages 1–18. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Homeland Security What Can Mathematics Do? Fred Roberts Professor of Mathematics, Rutgers University Chair, RU Homeland Security Research Initiative Director, DIMACS Center
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Mathematical methods have become important tools in preparing plans for defense against terrorist attacks, especially when combined with powerful, modern computer methods for analysis and simulation.
Background image of page 2
3 Are you Serious?? What Can Mathematics Do For Us?
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4
Background image of page 4
5 . After Pearl Harbor: Mathematics and mathematicians played a vitally important role in the US World War II effort.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Critical War-Effort Contributions Included: Code breaking. Creation of the mathematics-based field of Operations Research: logistics optimal scheduling inventory strategic planning Enigma machine
Background image of page 6
7 But: Terrorism is Different. Can Mathematics Really Help? 5 + 2 = ? 1, 2, 3, …
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 I’ll Illustrate with Mathematics Projects I’m Involved in. There are Many Others Bioterrorism Sensor Location Monitoring Message Streams Identification of Authors Detecting a Bioterrorist Attack through “Syndromic Surveillance”
Background image of page 8
9 OUTLINE Bioterrorism Sensor Location Monitoring Message Streams Identification of Authors Detecting a Bioterrorist Attack through “Syndromic Surveillance”
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 The Bioterrorism Sensor Location Problem
Background image of page 10
11 Early warning is critical in defense against terrorism This is a crucial factor underlying the government’s plans to place networks of sensors/detectors to warn of a bioterrorist attack The BASIS System – Salt Lake City
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
12 Locating Sensors is not Easy Sensors are expensive How do we select them and where do we place them to maximize “coverage,” expedite an alarm, and keep the cost down? Approaches that improve upon existing, ad hoc location methods could save countless lives in the case of an attack and also money in capital and operational costs.
Background image of page 12
13 Two Fundamental Problems Sensor Location Problem Choose an appropriate mix of sensors decide where to locate them for best protection and early warning
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
14 Two Fundamental Problems Pattern Interpretation Problem: When sensors set off an alarm, help public health decision makers decide Has an attack taken place? What additional monitoring is needed? What was its extent and location? What is an appropriate response?
Background image of page 14
15 The Sensor Location Problem Approach is to develop new algorithmic methods . Developing new algorithms involves fundamental mathematical analysis. Analyzing how efficient algorithms are involves fundamental mathematical methods. Implementing the algorithms on a computer is often a separate problem – which needs to go hand in hand with the basic mathematics of algorithm development.
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
16 Algorithmic Approaches I : Greedy Algorithms
Background image of page 16
17 Greedy Algorithms Find the most important location first and locate a sensor there. Find second-most important location.
Background image of page 17

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 18
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 69

HomelandSecurityCongressionalTalk9-15-04 - Homeland...

This preview shows document pages 1 - 18. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online