Multi-Perspective Enemy Course of Action Maintenance

Size: px
Start display at page:

Download "Multi-Perspective Enemy Course of Action Maintenance"

Transcription

1 Distribution ment A: Approved for public release; distribution is unlimited. Multi-Perspective Enemy Course of Action Maintenance June 10, 2004 William J. Farrell III, Benjamin Grooters, and Frank Vetesi Lockheed Martin Advanced Technology Laboratories Cherry Hill, New Jersey [wfarrell, bgrooter, ABSTACT Estimation of the Enemy s Course of Action (ECA) is required for assessing enemy intent and mission impact, both of which are key functional components embodied in the Joint Directors of Laboratories (JDL) Level (Threat efinement) processing description. Most ECA estimation approaches assume that the set of ECA hypotheses are enumerated in advance and therefore reduce the problem of ECA maintenance to a hypothesis test performed over time. However, when asymmetric threats are present, ECA hypotheses cannot generally be enumerated in advanced and therefore need to be dynamically generated, decomposed, and evaluated in near real-time. Lockheed Martin Advanced Technology Laboratories has developed a multi-perspective approach to ECA maintenance that employs Threat Perspective Models for the generation, decomposition, and evaluation of ECA hypotheses. Each Threat Perspective Model generates hypotheses based upon feasibility and utility, decomposes hypotheses into sub-tasks using a Hierarchical Task Network (HTN), and evaluates hypotheses based upon observations of ECA sub-tasks. This approach is justified by a goal-directed task analyses performed on Army Intelligence Analysts, which indicate that human analysts maintain ECA hypotheses by viewing the battlefield from multiple perspectives such as terrain, weather, armament, doctrine, etc. This multiperspective approach makes the ECA maintenance problem more tractable and allows for seamless incorporation of new Threat Perspective Models. The multiperspective ECA maintenance approach presented in this paper is being incorporated into Army Fusion &D programs aimed at providing Level Fusion at multiple echelons. 1. Motivation Military analysts expend an extraordinary amount of resources and manpower attempting to determine the intended actions of an adversary. Even with conventional adversaries, where tactics and capabilities are typically well known, analysts struggle to predict the actions that an adversary might take. As the battle space evolves and becomes occupied by creative, asymmetric threats whose tactics and capabilities are not well known, the military analyst is faced with a nearly impossible task.

2 To aid the military analyst, significant effort has been focused on understanding the process by which human analysts attempt to predict adversary actions [1]. Lockheed Martin Advanced Technology Laboratories (ATL) has developed an architecture for estimating the Enemy Course of Action (ECA) using a multi-perspective approach [2]. ATL's approach is based on the realization that military analysts perform their analysis from various perspectives and combine the results to arrive at a conclusion. This is typically a manual process performed using a sequence of tactical overlays. As an illustration, an analyst may create a tactical overlay of the battle space terrain on a map. Then, another analyst may construct an additional overlay indicating cultural structures such as military facilities. Finally, another analyst may generate an overlay depicting a threat region by considering the enemy s likely weaponry. Collecting all of these overlays, the analyst attempts to deduce a potential ambush location. The Multi-Perspective ECA Maintenance approach outlined in this paper attempts to mimic the cognitive tasks performed by military analysts. 2. Background Concepts This section introduces the definitions and concepts that will be employed throughout the remainder of this paper. First, a definition and representation for an Enemy Course of Action (ECA) is presented. Secondly, the Hierarchical Task Network (HTN) is introduced as a framework for ECA Decomposition. Finally, this section presents the concept of Threat Perspective Models. 2.1 Enemy Course of Action epresentation An Enemy Course of Action (ECA) is a planned task performed by an adversary. An ECA can be represented as a triplet []. This triplet consists of a esource, an Action Verb, and an bjective. The semantics of the ECA triplet are (Figure 1): A esource performs an Action Verb focused on an bjective. As an example, an ECA might be: The 52 nd Infantry Division (esource) secures (Action Verb) Hill 12 (bjective). In the context of this paper, it is assumed that the esource is always an adversary entity while the bjective is assumed to be a friendly asset. This representation of an ECA is used throughout the remainder of this paper. ESUCE PEDICATE BJECTIVE PEDICATE ESUCE performs ACTIN VEB focused on BJECTIVE E5 E2 E9 AV 1 AV 2 E4 E8 AV AV 4 E Adversary Aggregate AV 5 AV n Feasible Set of Actions Friendly Asset (Assumed Known) Figure 1. ECA epresentation and Semantics 2

3 2.2 Hierarchical Task Networks Figure 1 is the simplest ECA that can be represented. It consists of only one task. Depending upon the military echelon, this description may be insufficient. For example, a commander of theatrewide operations may find that an ECA such as The 52 nd Infantry Division secures Hill 12 is sufficiently useful to support planning and decision-making. However, at the platoon echelon, this ECA is insufficient for planning friendly actions and responses. Because the required specificity of an ECA can vary with military echelon, the ECA representation should also be capable of various levels of specificity. A construct known as the Hierarchical Task Network (HTN) provides a representation of tasks at various levels of specificity [4]. Figure 2 illustrates an example of an HTN. The HTN not only mimics the variation in specificity found in military echelons, it also allows a computational construct for analyzing ECAs. In the Multi-Perspective ECA Maintenance algorithm presented in Sections 4-5, the HTN is employed to provide a method for decomposing high-level ECAs into more specific tasks. Directly Engage Enemy Locate Enemy Move to Contact Fire on Enemy Move to iver Cross Bridge Use Tunnel Move to Contact Figure 2. Decomposable tasks represented using a Hierarchical Task Network The HTN representation is the basis of most modern planning algorithms. It is based on the concept that humans plan by decomposing tasks into smaller ones until a sequence of atomic tasks are found that satisfy the objective. Within the context of this paper, the atomic tasks are the tasks that the Fusion processes attempt to infer or observe directly. 2.2 Threat Perspective Models As mentioned in Section 1, ATL has developed an approach to ECA maintenance that attempts to mimic the military analysts adversarial reasoning process [1]. Human analysts examine the state of the battle space from multiple perspectives, such as naval, land, air, weather, etc. Subsequently, ECAs are generated and decomposed using each perspective. Then, using inferred results from each perspective, the likelihood of each ECA is evaluated.

4 In order to mimic and automate the human process, a construct for a perspective must be developed. These constructs are called Threat Perspective Models. The functional role of a Threat Perspective Model (TPM) is to provide support for ECA maintenance by examining a subset of the battle space environment. A TPM assists in the generation, decomposition, and evaluation of ECA hypotheses. The precise implementation of a TPM (Bayesian Network, ule-based Expert System, etc) is not of particular concern. TPMs allow ECA maintenance to be simplified by partitioning and decoupling the analysis. TPMs come in two different varieties (perhaps indicating the specifics of the implementation). First, there are Fundamental Threat Perspective Models. These models consider physics-based aspects of the environment such as mobility, weather, weapons effectiveness, etc. The Fundamental TPMs are used to evaluate the feasibility of possible ECAs by imposing quantifiable constraints on the adversary s actions. Secondly, there are Domain Threat Perspective Models. These models consider domain-specific aspects of the environment such as armament, logistics, tactics, doctrine, etc. The Domain TPMs are used to evaluate the utility of ECAs by applying domain-specific rules to the entities observed within the battle space. As presented in the following sections, TPMs assist in the ECA maintenance process in several ways, but always with a restricted view of the environment.. ECA Generation The first requirement for Multi-Perspective ECA Maintenance is the ability to generate ECA hypotheses. This step is similar to the process of Track Initiation in Level 1 Fusion [5]. Here, the current state of friendly/adversary forces and friendly objectives/goals are used to generate ECA hypotheses (Figure ). ECA HYPTHESES Adversary (ED) perational Picture ECA Generation X X Friendly (BLUE) perational Picture X Friendly (BLUE) bjectives/s Figure. Generation of ECA Hypotheses Fundamental TPMs provide measures of Feasibility while Domain TPMs provide measures of Utility in order to rank and prune the hypothesis set (Figures 4-5). 4

5 BJECTIVE PEDICATE ESUCE performs ACTIN VEB focused on BJECTIVE TACTICAL EFFECTS BJECTIVE VALUE ACTIN VEBS BJECTIVES BJECTIVE PEDICATES UTILITY anking/pruning uses TACTICAL EFFECTS and BJECTIVE VALUE Figure 4. anking ECAs using Utility Measures provided by Domain Threat Perspective Models ESUCE PEDICATE BJECTIVE PEDICATE ESUCE performs ACTIN VEB focused on BJECTIVE ESUCE HLDINGS ACTIN EQUIED CAPABILITIES TACTICAL EFFECTS BJECTIVE VALUE ESUCES BJECTIVE PEDICATES ECA HYPTHESES FEASIBILITY anking/pruning uses ACTIN EQUIED CAPABILITIES and ESUCE HLDINGS 1 5 Figure 5. anking ECAs using Feasibility Measures provided by Fundamental Threat Perspective Models The order in which the ranking of hypotheses is performed (Feasibility-Utility or Utility-Feasibility) can dramatically affect the results of this process. To mitigate this sensitivity, a method such as Fuzzy Partial rdering [5] should be applied. This approach avoids the pitfalls of simple linear ordering approaches. In particular, each TPM may apply a Fuzzy Inference approach to assess the set membership for Feasible or Useful and then Fuzzy Partial rdering can be applied to rank the results using the Boolean criteria Feasible and Useful. The set of ECA hypotheses resulting from this process are decomposed and evaluated. In addition, the ECA generation process is re-invoked (either entirely or in part) whenever incoming information does not support any currently available ECA hypothesis. Again, this general procedure mimics Track Initiation (Level 1 Fusion) where measurements are used to initiate a new track when they do not associate with any existing tracks. 5

6 4. ECA Decomposition nce the ECA hypotheses have been generated from the process outlined in Section, the ECA Maintenance system must evaluate them. However, since the generated hypotheses are not directly observable, they are not suitable for hypothesis testing. As with any hypothesis test, observables must be identified. These observables act as indicators to refute or support ECA hypotheses. A Hierarchical Task Network (HTN) planner [4] is employed to decompose ECA hypotheses into observable task sequences. The Threat Perspective Models play an important role within the ECA Decomposition process (Figure 6). They are responsible for observing (inferring) certain tasks within the HTN. For example, a Mobility Threat Perspective Model might be responsible for observing the task A move to B for an arbitrary pair of entities A and B. In effect, the Threat Perspective Models define which tasks are considered to be atomic. The ECA Decomposition can be performed in a sequential manner, performing decomposition using only the Domain Threat Perspective Models followed by decomposition using only the Fundamental Threat Perspectives. AV activate radar Domain Threat Perspective Models Logistics Armament Fundamental Threat Perspective Models Mobility Weather reach area #1 reach area #2 pass north of lake pass south of lake cross bridge activate radar pass north of mountain reach area #1 reach area #2 Figure 6. Sequential ECA Decomposition using Threat Perspective Models nce the ECA hypotheses have been decomposed into observable tasks, it is the responsibility of the Threat Perspective Models to evaluate the current belief that the observable tasks are being performed. 5. ECA Evaluation The final major component of the proposed Multi-Perspective ECA Maintenance approach is ECA Evaluation. Analogous to Level 1 Fusion, this is the Track Maintenance process [5] where the system attempts to associate observed information with each ECA hypothesis over time. The goal is to determine which ECA hypothesis most strongly supports the observed information. Again, the TPMs play an important role in the evaluation process. Each TPM is responsible for inferring and/or observing a sub-set of tasks within each decomposed ECA hypothesis. Together, the TPMs collaborate, much as military analysts exchange information, in order to evaluate the current belief of each ECA hypothesis. Figures 7-8 illustrate this process by example. 6

7 Fundamental Perspective Models Mobility Weather pass north of lake cross bridge #1 mountain lake cross bridge #2 pass north of mountain Domain Perspective Models Logistics Armament reach area #1 pass south of lake reach area #2 pass north of lake cross cross pass south pass south bridge #1 bridge #2 of mountain activate of lake reach radar area # breach river Figure 7. Threat Perspective Models contributing to ECA Evaluation Fundamental Perspective Models Mobility Weather pass south of lake cross bridge #1 mountain lake cross bridge #2 pass north of mountain Domain Perspective Models Logistics Armament reach area #1 reach area #2 activate radar pass south of lake cross cross pass south bridge #1 bridge #2 of mountain reach area # Figure 8. Threat Perspective Models contributing to ECA Evaluation In Figure 7, there are two hypothetical ECAs being evaluated. After some time has elapsed, the Fundamental Threat Perspective Models have inferred the actions taken by the adversary: 1) Passed South of Lake, and 2) Crossed Bridge #1. At this point, both ECAs seem equally likely because no discriminating information has been obtained. However, as time elapses further (Figure 8), the Threat Perspective Models contribute additional inferences: 1) Crossed Bridge #2, 2) Passed South of Mountain, and ) Enemy Activated adar. At this point, the second ECA appears more likely. In general, the role of the Threat Perspective Models is to monitor the atomic tasks generated by the HTN planner (see Section 4). Subsequently, ECA hypotheses can be evaluated and the belief in each hypothesis is revised. 7

8 ne quantitative approach to maintaining ECA beliefs employs Fuzzy Finite Machines (FFSM) [5]. In particular, the HTN (see Section 4) used for ECA Decomposition is cast into a hierarchical network of Fuzzy Finite Machines representing the causal-temporal relationships between tasks. By maintaining the state of these Fuzzy Finite Machines, the beliefs for each ECA hypothesis is maintained. Figure 9 illustrates the hierarchical FFSM used for ECA Evaluation. Fuzzy Finite Machines ECA t t2 t Hierarchical Task Network Figure 9. Hierarchical Fuzzy Finite Machines for ECA Evaluation The steps for ECA Evaluation using Hierarchical FFSMs are: 1. Transition Possibilities: Compute transition possibilities for each node 2. Predict FFSM: Predict Fuzzy states for each node. Modus Tollen: Make partial observations using modus tollens logic 4. Fuzzy Innovations: Compute fuzzy innovations for the FFSM 5. Update Fuzzy s: Compute revised states in the FFSM This process is reminiscent of Kalman Filtering with the exception of the observation process. Since the observations made about the states of the FFSM are logical, Modus Tollens is applied in replacement of the Kalman bservation function. Transition Possibilities are computed for each node in the FFSM. These possibilities represent the belief that the FFSM will remain in a given node's state. A non-zero transition possibility represents belief leaving a given node in the FFSM. These transition possibilities are denoted by: τ ( t s, xˆ ) µ (1) where s is the state represented by a node in the FFSM and xˆ is the current state of the enemy. As an example, one of the states (s=1) in the FFSM may be: <Time-to-Go> is <Long> (2) and the current state of the enemy is: [ ange angeate ] T x ˆ = () then, the transition possibility conditioned on the FFSM state (Equation 2) and the enemy state (Equation ) is: 8

9 τ ( t s = 1, xˆ = [ ange angeate ] ) T µ (4) which is the Sojourn Time [6] for remaining in the state represented by Equation 2. FFSM prediction is accomplished by Fuzzy Functional Composition [5]. The equation for predicting the FFSM state into the future is given by: (5) where S is the FFSM state vector, µ τ is the transition possibility, and δ represents a perturbative input into the system over the prediction interval. The perturbative input can be used to represent changes in external states such as friendly actions. Modus Tollens is now applied to make observations of the FFSM. Modus Tollens is the procedure of logical backward inference. This step is analogous to computing the Likelihood Function in a Kalman filter. Here, however, the observation process is logical: Sˆ t xˆ ) = if ( s) is < Possible > (6) then ( observation is < Y > The Threat Perspective Models contribute, once again, to ECA Maintenance by performing Modus Tollens. nce observations have been made, the Fuzzy Innovations are computed. These innovations measure the degree to which the predicted FFSM states (Equation 5) agree with the observations (Equation 6). The Fuzzy Innovations are computed by: m S ~ St xˆ t Sˆ = (7) and the null state residual is: t (8) Finally, to complete an iteration of the FFSM update, the Fuzzy states are updated according to: ˆ + S k 1 = St m~ + (9) S t and the null state update equation is: (10) Equations 1 through 10 outline the steps for performing an update of a FFSM. The hierarchical FFSMs illustrated in Figure 9 are updated in this fashion. Thus, an approach for sequential ECA hypothesis belief maintenance is presented. 9

10 6. Conclusions Driven by a -Directed Task Analysis of the military intelligence analyst, Multi-Perspective ECA Maintenance attempts to mimic the problem solving approach employed by these analysts. The Multi- Perspective ECA Maintenance approach has three functional components: ECA Generation, ECA Decomposition, and ECA Evaluation. Supporting each of these components are models called Threat Perspective Models that provide restricted view of the battle space environment. The use of these Threat Perspective Models not only mimics the human military analyst, but also allows for a simplified computational architecture. In addition to the Multi-Perspective ECA Maintenance architecture presented in this paper, a novel approach to ECA hypothesis belief maintenance based upon hierarchical Fuzzy Finite Machines was presented. eferences [1] SA Technologies. Directed Task Analysis of the Brigade Intelligence fficer, Fusion Based Knowledge for the bjective Force, June 200. [2] Angela Pawlowski, Sergio Gigili, and Frank Vetesi. Situation and Threat efinement Approach for Combating the Asymmetric Threat, Military Sensing Symposia, National Symposium on Sensor and Data Fusion 2002, San Diego, CA, August 1-15, [] North Atlantic Treaty rganization. The Land C2 Information Exchange Data Model, ATCCIS Baseline 2.0, March 18, [4] K. Erol, D. Nau, J. Hendler. HTN Planning: Complexity and Expressivity In AAAI-94, Seattle, July, [5] S. Blackman, Design and Analysis of Modern Tracking Systems, Artech House, [6] Y. Bar-Shalom, X.. Li, T. Kirubarajan, Estimation with Applications to Tracking and Navigation, Jon Wiley & Sons, 2001, pp &

Context Based Shared Understanding for Situation Awareness

Context Based Shared Understanding for Situation Awareness Distribution Statement A: Approved for public release; distribution is unlimited. Context Based Shared Understanding for Situation Awareness June 9, 2004 David G. Cooper Lockheed Martin Advanced Technology

More information

Dynamic Context Maintenance in Human Terrain

Dynamic Context Maintenance in Human Terrain Distribution A: Approved for public release; distribution is unlimited. Dynamic Context Maintenance in Human Terrain July 14, 2009 Nadya Belov, Jeff Patti, and Angela Pawlowski Lockheed Martin Advanced

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY

More information

Game Theoretic Solutions to Cyber Attack and Network Defense Problems

Game Theoretic Solutions to Cyber Attack and Network Defense Problems Game Theoretic Solutions to Cyber Attack and Network Defense Problems 12 th ICCRTS "Adapting C2 to the 21st Century Newport, Rhode Island, June 19-21, 2007 Automation, Inc Dan Shen, Genshe Chen Cruz &

More information

tfinal t 3 results projected from t 1

tfinal t 3 results projected from t 1 Proceedings of the 2004 Winter Simulation Conference R.G. Ingalls, M. D. Rossetti, J. S. Smith, and B. A. Peters, eds. AN URBAN TERRAIN ABSTRACTION TO SUPPORT DECISIONMAKING USING RECURSIVE SIMULATION

More information

Methodology for Automatic Synthesis of Wargame Simulator using DEVS

Methodology for Automatic Synthesis of Wargame Simulator using DEVS Methodology for Automatic Synthesis of Wargame Simulator using DEVS Kim Ju Young, Shim Kwang Hyun ETRI kimjy1113@etri.re.kr, shimkh@etri.re.kr Abstract In specific domain such as wargame, simulator developers

More information

Coalition Interoperability Ontology:

Coalition Interoperability Ontology: Coalition Interoperability Ontology: Sharing Situational Awareness with Allies and Agents Erik Chaum Naval Undersea Warfare Center, Division Newport, TTCP, Maritime Systems Group, TP1 US National Leader

More information

Fusion of Radar and EO-sensors for Surveillance

Fusion of Radar and EO-sensors for Surveillance of Radar and EO-sensors for Surveillance L.J.H.M. Kester, A. Theil TNO Physics and Electronics Laboratory P.O. Box 96864, 2509 JG The Hague, The Netherlands kester@fel.tno.nl, theil@fel.tno.nl Abstract

More information

System of Systems Architecture Generation and Evaluation using Evolutionary Algorithms

System of Systems Architecture Generation and Evaluation using Evolutionary Algorithms SysCon 2008 IEEE International Systems Conference Montreal, Canada, April 7 10, 2008 System of Systems Architecture Generation and Evaluation using Evolutionary Algorithms Joseph J. Simpson 1, Dr. Cihan

More information

User Defined Operational Pictures for Tailored Situation Awareness

User Defined Operational Pictures for Tailored Situation Awareness User Defined Operational Pictures for Tailored Situation Awareness Sandeep Mulgund, Ph.D. Seth Landsman, Ph.D. {smulgund, landsman}@mitre.org The MITRE Corporation Bedford, MA 01730 June 19, 2007 Overview

More information

Intelligence Preparation of the Cyber Environment. Rob Dartnall Director Cyber Intelligence

Intelligence Preparation of the Cyber Environment. Rob Dartnall Director Cyber Intelligence Intelligence Preparation of the Cyber Rob Dartnall Director Cyber Intelligence Rob is a CREST Certified Threat Intelligence Manager (CCTIM) and Cyber Intelligence Director/CEO of Security Alliance - a

More information

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project

More information

Approaches and Tools to Quantifying Facility Security Risk. Steve Fogarty, CSO

Approaches and Tools to Quantifying Facility Security Risk. Steve Fogarty, CSO Approaches and Tools to Quantifying Facility Security Risk Steve Fogarty, CSO ARES Security Corporation ARES is a high-performing Technology Solutions provider with more than 20 offices around the world.

More information

Implementing Net-Centric Tactical Warfare Systems

Implementing Net-Centric Tactical Warfare Systems Implementing Net-Centric Tactical Warfare Systems Gordon Hunt gordon.hunt@rti.com Real Time Innovations, Inc. 385 Moffett Park Drive, Sunnyvale, CA 94089 The tactical battlefield has long been characterized

More information

NAVIGATION AND ELECTRO-OPTIC SENSOR INTEGRATION TECHNOLOGY FOR FUSION OF IMAGERY AND DIGITAL MAPPING PRODUCTS. Alison Brown, NAVSYS Corporation

NAVIGATION AND ELECTRO-OPTIC SENSOR INTEGRATION TECHNOLOGY FOR FUSION OF IMAGERY AND DIGITAL MAPPING PRODUCTS. Alison Brown, NAVSYS Corporation NAVIGATION AND ELECTRO-OPTIC SENSOR INTEGRATION TECHNOLOGY FOR FUSION OF IMAGERY AND DIGITAL MAPPING PRODUCTS Alison Brown, NAVSYS Corporation Paul Olson, CECOM Abstract Several military and commercial

More information

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT 2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer

More information

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016 Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete

More information

Architectures for Distributed Information Fusion To Support Situation Awareness on the Digital Battlefield

Architectures for Distributed Information Fusion To Support Situation Awareness on the Digital Battlefield Architectures for Distributed Information To Support Situation Awareness on the Digital Battlefield Stephen M. Jameson Artificial Intelligence Laboratory Lockheed Martin Advanced Technology Laboratories

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior

More information

Littoral Environment Visualization Tool

Littoral Environment Visualization Tool Littoral Environment Visualization Tool Mr. Richard Swiontek Sonalysts, Inc 215 Parkway North, Post Office Box 280 Waterford, CT 06385 Phone: (860) 326-3616 Fax: (860) 326-3862 Email: dswiontek@sonalysts.com

More information

Client Perspective: Implementing C2SIM in a Client Dr. Robert Wittman APPROVED FOR PUBLIC RELEASE

Client Perspective: Implementing C2SIM in a Client Dr. Robert Wittman APPROVED FOR PUBLIC RELEASE Client Perspective: Implementing C2SIM in a Client Dr. Robert Wittman APPROVED FOR PUBLIC RELEASE Slide 1 Topics Why use C2SIM (MSDL & ) The Crawl, Walk, Run Implementation Approach An Coalition Example

More information

HETEROGENEOUS COMPUTING

HETEROGENEOUS COMPUTING HETEROGENEOUS COMPUTING Shoukat Ali, Tracy D. Braun, Howard Jay Siegel, and Anthony A. Maciejewski School of Electrical and Computer Engineering, Purdue University Heterogeneous computing is a set of techniques

More information

The Literature: Self-Synchronization and Shared Awareness

The Literature: Self-Synchronization and Shared Awareness Enabling Adaptive C2 via Semantic Communication and Smart Push: A Model-based Network Communication Approach LtCol Carl Oros, USMC Brief to AFCEA-GMU C4I Center Symposium Critical Issues in C4I Fairfax,

More information

Simulating Information Warfare

Simulating Information Warfare Civil Affairs Simulating Information Warfare Simulating Information Warfare Roger Smith Vice President of Technology rdsmith@btg.com 407-977-3310 Full Spectrum IO Conducting Information Operations means...

More information

Cyber Security CRA Overview

Cyber Security CRA Overview Cyber Security CRA Overview Patrick McDaniel (PM, PSU) & Edward Colbert (CAM, ARL) cra.psu.edu Approved for public release; distribution is unlimited. Cyber Security Collaborative Research Alliance A Collaborative

More information

Knowledge Base Formation Using Integrated Complex Information

Knowledge Base Formation Using Integrated Complex Information Knowledge Base Formation Using Integrated Complex Information Douglas S. Lange SPAWARSYSCEN 53560 Hull Street San Diego, CA 92152-5001 dlange@spawar.navy.mil Abstract An intelligence support system has

More information

AC2 CTC Investment Strategy. Capt Brandon Keller, AFRL/RIS Acting CTC Lead

AC2 CTC Investment Strategy. Capt Brandon Keller, AFRL/RIS Acting CTC Lead AC2 CTC Investment Strategy Capt Brandon Keller, AFRL/RIS Acting CTC Lead Scope Covers monitor, assess, plan, and execute processes within and across air, space, cyber domains Addresses four key goals:

More information

Topological Abstraction and Planning for the Pursuit-Evasion Problem

Topological Abstraction and Planning for the Pursuit-Evasion Problem Topological Abstraction and Planning for the Pursuit-Evasion Problem Alberto Speranzon*, Siddharth Srivastava (UTRC) Robert Ghrist, Vidit Nanda (UPenn) IMA 1/1/2015 *Now at Honeywell Aerospace Advanced

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.

More information

The Success of the AMRAAM DBMS/DAS

The Success of the AMRAAM DBMS/DAS The Success of the AMRAAM DBMS/DAS John Gerdine Wyle Laboratories Inc. Niceville Florida 32579 U.S.A. 1 Overview Asymmetric Threat AMRAAM Development Test and Evaluation (T&E) History Current AMRAAM Production

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information

A Design Method for Composition and Reuse Oriented Weaponry Model Architecture Meng Zhang1, a, Hong Wang1, Yiping Yao1, 2

A Design Method for Composition and Reuse Oriented Weaponry Model Architecture Meng Zhang1, a, Hong Wang1, Yiping Yao1, 2 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) A Design Method for Composition and Reuse Oriented Weaponry Model Architecture Meng Zhang1, a,

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

MODELING THE COMMUNICATIONS CAPABILITIES OF THE INFANTRY SOLDIER

MODELING THE COMMUNICATIONS CAPABILITIES OF THE INFANTRY SOLDIER MODELING THE COMMUNICATIONS CAPABILITIES OF THE INFANTRY SOLDIER ANDREW HALL JOHN SURDU FERNANDO MAYMI ASHOK DEB KRISTIN FREBERG Keywords: Wearable computer systems, Land Warrior, personal area network,

More information

GREEN DEFENCE FRAMEWORK

GREEN DEFENCE FRAMEWORK GREEN DEFENCE FRAMEWORK Approved by the North Atlantic Council in February 2014 GREEN DEFENCE FRAMEWORK OVERVIEW 1. Green Defence could, at this stage, be defined as a multifaceted endeavour cutting across

More information

Briefing Date. Purpose

Briefing Date. Purpose Applying the Systems Engineering Method for the Joint Capabilities Integration and Development System (JCIDS) Chris Ryder and Dave Flanigan 27 October 2005 Purpose JCIDS prescribes a joint forces approach

More information

AI algorithms and new approaches to wargame simulation

AI algorithms and new approaches to wargame simulation July 14 AI algorithms and new approaches to wargame simulation S Lucek, NSC S Collander- Brown, Dstl 31 ISMOR Overview Mission Planner: combat decision-making (AI) toolset Supports Dstl high intensity

More information

Integrating Soar into the OneSAF Models Framework. Dr. Doug Reece

Integrating Soar into the OneSAF Models Framework. Dr. Doug Reece Integrating Soar into the OneSAF Models Framework Dr. Doug Reece Outline OneSAF Modeling Infrastructure (MI) overview Emphasis on entity architecture Ideas for integrating Soar Not interfacing 2 OneSAF

More information

The Generalized Weapon Target Assignment Problem

The Generalized Weapon Target Assignment Problem 10th International Command and Control Research and Technology Symposium The Future of C2 June 13-16, 2005, McLean, VA The Generalized Weapon Target Assignment Problem Jay M. Rosenberger Hee Su Hwang Ratna

More information

Cybersecurity Testing

Cybersecurity Testing Cybersecurity Testing Tim Palmer Chief Technical Advisor, SAS Business Unit Torch Technologies, Inc. EXPERTISE // INNOVATION // CUSTOMER FOCUS // EXCELLENCE // INTEGRITY // COOPERATION // RELIABILITY About

More information

TIPS A System for Contextual Prioritization of Tactical Messages

TIPS A System for Contextual Prioritization of Tactical Messages TIPS A System for Contextual Prioritization of Tactical Messages 14 th ICCRTS 16 June 2009 Robert E. Marmelstein, Ph.D. East Stroudsburg University East Stroudsburg, PA 18301 Sponsored by: AFRL/IFSB (Rome,

More information

Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence

Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Ratko Orlandic Department of Computer Science and Applied Math Illinois Institute of Technology

More information

MULTI-VIEW TARGET CLASSIFICATION IN SYNTHETIC APERTURE SONAR IMAGERY

MULTI-VIEW TARGET CLASSIFICATION IN SYNTHETIC APERTURE SONAR IMAGERY MULTI-VIEW TARGET CLASSIFICATION IN SYNTHETIC APERTURE SONAR IMAGERY David Williams a, Johannes Groen b ab NATO Undersea Research Centre, Viale San Bartolomeo 400, 19126 La Spezia, Italy Contact Author:

More information

Network Mission Assurance Phoenix Challenge 2002 Conference

Network Mission Assurance Phoenix Challenge 2002 Conference Phoenix Challenge 2002 Conference Lockheed Martin Advanced Technology Laboratories Distributed Processing Laboratory 1 Federal Street A&E Building 3W Camden, New Jersey 08102 Mike Junod mjunod@atl.lmco.com

More information

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS

DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS Todd Waskiewicz and Peter LaMonica Air Force Research Laboratory Information and Intelligence Exploitation Division {Todd.Waskiewicz,

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms for Inference Fall 2014

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms for Inference Fall 2014 Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms for Inference Fall 2014 1 Course Overview This course is about performing inference in complex

More information

Composable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems

Composable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems Composable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems 12/03/2014 Christopher Oster About Me B.S. Computer Science,

More information

Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40

Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Dale Anglin Erik Baumgarten John Dinh Mark Hall Bert Schneider May 13, 2008 Cleared for public release

More information

Design of Distributed Command and Control for Collaborative Situation Assessment

Design of Distributed Command and Control for Collaborative Situation Assessment 18th ICCRTS Title of Paper: Design of Distributed Command and Control for Collaborative Situation Assessment Topic(s): Primary: o Topic 7: Modeling and Simulation Alternatives: o Topic 3: Data, Information,

More information

to-end System Test Architecture

to-end System Test Architecture End-to to-end System Test Architecture Sr. Manager, Lockheed Martin SSC masuma.ahmed@lmco.com (408) 742-2553 2553 1 Net-Centric Mission Operations Features Fully Synchronized Interoperable, of ed Systems

More information

Introduction. Chapter 1. What Is Visual Modeling? The Triangle for Success. The Role of Notation. History of the UML. The Role of Process

Introduction. Chapter 1. What Is Visual Modeling? The Triangle for Success. The Role of Notation. History of the UML. The Role of Process Quatrani_Ch.01.fm Page 1 Friday, October 27, 2000 9:02 AM Chapter 1 Introduction What Is Visual Modeling? The Triangle for Success The Role of Notation History of the UML The Role of Process What Is Iterative

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Regularization and model selection

Regularization and model selection CS229 Lecture notes Andrew Ng Part VI Regularization and model selection Suppose we are trying select among several different models for a learning problem. For instance, we might be using a polynomial

More information

Chapter : Analysis Modeling

Chapter : Analysis Modeling Chapter : Analysis Modeling Requirements Analysis Requirements analysis Specifies software s operational characteristics Indicates software's interface with other system elements Establishes constraints

More information

Data Verification and Validation (V&V) for New Simulations

Data Verification and Validation (V&V) for New Simulations Data Verification and Validation (V&V) for New Simulations RPG Special Topic 9/15/06 1 Table of Contents Introduction 1 Data V&V Activities During M&S Development 1 Determine M&S Requirements Phase 2 V&V

More information

Scott Philips, Edward Kao, Michael Yee and Christian Anderson. Graph Exploitation Symposium August 9 th 2011

Scott Philips, Edward Kao, Michael Yee and Christian Anderson. Graph Exploitation Symposium August 9 th 2011 Activity-Based Community Detection Scott Philips, Edward Kao, Michael Yee and Christian Anderson Graph Exploitation Symposium August 9 th 2011 23-1 This work is sponsored by the Office of Naval Research

More information

Situation Assessment via Bayesian Belief Networks

Situation Assessment via Bayesian Belief Networks Situation Assessment via Bayesian Belief Networks Subrata Das, Rachel Grey, and Paul Gonsalves Charles River Analytics, Inc. 625 Mt. Auburn St. Cambridge, MA 02138 {sdas, rgrey, pgonsalves}@cra.com Abstract

More information

Application of Clustering Techniques to Energy Data to Enhance Analysts Productivity

Application of Clustering Techniques to Energy Data to Enhance Analysts Productivity Application of Clustering Techniques to Energy Data to Enhance Analysts Productivity Wendy Foslien, Honeywell Labs Valerie Guralnik, Honeywell Labs Steve Harp, Honeywell Labs William Koran, Honeywell Atrium

More information

Computer Vision 2 Lecture 8

Computer Vision 2 Lecture 8 Computer Vision 2 Lecture 8 Multi-Object Tracking (30.05.2016) leibe@vision.rwth-aachen.de, stueckler@vision.rwth-aachen.de RWTH Aachen University, Computer Vision Group http://www.vision.rwth-aachen.de

More information

AFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey

AFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey AFCEA Welcome/Opening Keynote Speech Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey A Turkish Perspective on the Challenges of Security in a Network-Enabled Environment I would like to

More information

STA 4273H: Statistical Machine Learning

STA 4273H: Statistical Machine Learning STA 4273H: Statistical Machine Learning Russ Salakhutdinov Department of Statistics! rsalakhu@utstat.toronto.edu! http://www.utstat.utoronto.ca/~rsalakhu/ Sidney Smith Hall, Room 6002 Lecture 5 Inference

More information

1 Executive Overview The Benefits and Objectives of BPDM

1 Executive Overview The Benefits and Objectives of BPDM 1 Executive Overview The Benefits and Objectives of BPDM This is an excerpt from the Final Submission BPDM document posted to OMG members on November 13 th 2006. The full version of the specification will

More information

AUTOMATED SCENARIO GENERATION SYSTEM FINAL REPORT. Final Report for the Project

AUTOMATED SCENARIO GENERATION SYSTEM FINAL REPORT. Final Report for the Project SCENARIST TM AUTOMATED SCENARIO GENERATION SYSTEM FINAL REPORT Final Report for the Project Research in Artificial Intelligence for Noncommunications Electronic Warfare Systems Contract No. DAAB07-89-C-P017

More information

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference

More information

Actionable User Intentions for Real-Time Mobile Assistant Applications

Actionable User Intentions for Real-Time Mobile Assistant Applications Actionable User Intentions for Real-Time Mobile Assistant Applications Thimios Panagos, Shoshana Loeb, Ben Falchuk Applied Research, Telcordia Technologies One Telcordia Drive, Piscataway, New Jersey,

More information

A Practical Approach to Data Modeling using CCO (Common Core Ontologies) Rod Moten, PhD Chief Scientist Datanova Scientific, LLC

A Practical Approach to Data Modeling using CCO (Common Core Ontologies) Rod Moten, PhD Chief Scientist Datanova Scientific, LLC A Practical Approach to Data Modeling using CCO (Common Core Ontologies) Rod Moten, PhD Chief Scientist Datanova Scientific, LLC Motivation for our Research We are involved in several US Army projects

More information

Shared Situation Awareness For Army Applications

Shared Situation Awareness For Army Applications Approved for public release; distribution is unlimited. Shared Situation Awareness For Army Applications June 2003 William J. Farrell III, Stephen Jameson, and Craig Stoneking Lockheed Martin Advanced

More information

Formatted Message Exchange in a Multinational Environment

Formatted Message Exchange in a Multinational Environment ABSTRACT Formatted Message Exchange in a Multinational Environment Col. Dr. Murat Ucuncu Lt. Jr. M. Umut Demirezen (M.Sc.) Turkish General Staff Information Systems Division Ankara TURKEY murat.ucuncu@tr.net

More information

Network Based Hard/Soft Information Fusion Stochastic Graph Analytics

Network Based Hard/Soft Information Fusion Stochastic Graph Analytics Network Based Hard/Soft Information Fusion Stochastic Graph Analytics Geoff Gross, Kedar Sambhoos, Rakesh Nagi (PI) Tel. (716) 645-3471, Email: gagross@buffalo.edu Objectives Represent soft data uncertainties

More information

Outline. Target Tracking: Lecture 1 Course Info + Introduction to TT. Course Info. Course Info. Course info Introduction to Target Tracking

Outline. Target Tracking: Lecture 1 Course Info + Introduction to TT. Course Info. Course Info. Course info Introduction to Target Tracking REGLERTEKNIK Outline AUTOMATIC CONTROL Target Tracking: Lecture 1 Course Info + Introduction to TT Emre Özkan emre@isy.liu.se Course info Introduction to Target Tracking Division of Automatic Control Department

More information

Using Group Knowledge for Multitarget Terrain-Based State Estimation

Using Group Knowledge for Multitarget Terrain-Based State Estimation Using Group Knowledge for Multitarget Terrain-Based State Estimation Edward Sobiesk 1, Maria Gini 2, and John A. Marin 3 1 Dept of Electrical Engineering and Computer Science, United States Military Academy,

More information

Defense Engineering Excellence

Defense Engineering Excellence Defense Engineering Excellence Kristen J. Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering, OUSD(AT&L) 18th Annual NDIA Systems Engineering Conference

More information

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Operationalizing Cyber Security Risk Assessments for the Dams Sector

Operationalizing Cyber Security Risk Assessments for the Dams Sector Operationalizing Cyber Security Risk Assessments for the Dams Sector Kevin Burns, Jason Dechant, Darrell Morgeson, and Reginald Meeson, Jr. The Problem To evaluate vulnerability to the postulated threat,

More information

7. Collinearity and Model Selection

7. Collinearity and Model Selection Sociology 740 John Fox Lecture Notes 7. Collinearity and Model Selection Copyright 2014 by John Fox Collinearity and Model Selection 1 1. Introduction I When there is a perfect linear relationship among

More information

A MATLAB TOOL FOR DEVELOPMENT AND TESTING OF TRACK INITIATION AND MULTIPLE TARGET TRACKING ALGORITHMS

A MATLAB TOOL FOR DEVELOPMENT AND TESTING OF TRACK INITIATION AND MULTIPLE TARGET TRACKING ALGORITHMS I&S A MATLAB TOOL FOR DEVELOPMENT AND TESTING OF TRACK INITIATION AND MULTIPLE TARGET TRACKING ALGORITHMS Kiril ALEXIEV 1. Introduction Digital computer simulation is a valuable tool, used for the design,

More information

Net-Centric Systems Test Focus Area

Net-Centric Systems Test Focus Area Test and Evaluation/Science and Technology Program Net-Centric Systems Test Focus Area PREdictive Smart Synchronization (PRESS) Algorithms; Removing Data Bias from the Virtual Test Range Farrokh Vatan

More information

GT "Calcul Ensembliste"

GT Calcul Ensembliste GT "Calcul Ensembliste" Beyond the bounded error framework for non linear state estimation Fahed Abdallah Université de Technologie de Compiègne 9 Décembre 2010 Fahed Abdallah GT "Calcul Ensembliste" 9

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($

More information

Outline. EE793 Target Tracking: Lecture 2 Introduction to Target Tracking. Introduction to Target Tracking (TT) A Conventional TT System

Outline. EE793 Target Tracking: Lecture 2 Introduction to Target Tracking. Introduction to Target Tracking (TT) A Conventional TT System Outline EE793 Target Tracking: Lecture 2 Introduction to Target Tracking Umut Orguner umut@metu.edu.tr room: EZ-12 tel: 4425 Department of Electrical & Electronics Engineering Middle East Technical University

More information

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 The Homeland Security Systems Engineering and Development Institute (HSSEDI ) is a trademark of the U.S. Department of Homeland

More information

Directed Energy Using High-Power Microwave Technology

Directed Energy Using High-Power Microwave Technology Directed Energy High-Power Microwave Directed Energy Using High-Power By Jacob Walker and Matthew McQuage 78 The Directed Energy Warfare Office (DEWO) and Directed Energy Division at the Naval Surface

More information

Bizagi Process Management Suite as an Application of the Model Driven Architecture Approach for Developing Information Systems

Bizagi Process Management Suite as an Application of the Model Driven Architecture Approach for Developing Information Systems Bizagi Process Management Suite as an Application of the Model Driven Architecture Approach for Developing Information Systems Doi:10.5901/ajis.2014.v3n6p475 Abstract Oskeol Gjoni PHD Student at European

More information

Combat Effectiveness Testing of System of Systems in the Face of Cyber Threat

Combat Effectiveness Testing of System of Systems in the Face of Cyber Threat Combat Effectiveness Testing of System of Systems in the Face of Cyber Threat Presented at National Defense Industrial Association Conference March 3, 2010 Jon Payne USJFCOM IO Range 256.842.0156 Jonathon.payne@jfcom.mil

More information

PROBABILITY OF FAILURE ANALYSIS STANDARDS AND GUIDELINES FOR ELVS

PROBABILITY OF FAILURE ANALYSIS STANDARDS AND GUIDELINES FOR ELVS PROBABILITY OF FAILURE ANALYSIS STANDARDS AND GUIDELINES FOR ELVS Federal Aviation Administration 6th IAASS Conference Session 10: Launch Safety Part 1 By:, Elisabeth Morse (Valador Inc.), Paul Rosati

More information

Can Real-Time Operate in an SOA Environment?

Can Real-Time Operate in an SOA Environment? Can Real-Time Operate in an SOA Environment? Precision Strike Technology Symposium Charles Kille, Raytheon John Link, VOLVOX, Inc. October 23-25, 2007 Copyright 2007 Raytheon Company. All rights reserved.

More information

Metrics for Feature-Aided Track Association

Metrics for Feature-Aided Track Association Metrics for eature-aided rack Association Chee-Yee Chong BAE Systems Los Altos, CA, U.S.A. chee.chong@baesystems.com Shozo Mori BAE Systems Los Altos, CA, U.S.A. shozo.mori@baesystems.com Abstract: rack

More information

Geospatial Engineering

Geospatial Engineering ATP 3-34.80, C1 Change 1 Army Techniques Publication No. 3-34.80 Headquarters Department of the Army Washington, DC, 15 September 2014 Geospatial Engineering 1. This change replaces incorrect figures in

More information

08 An Introduction to Dense Continuous Robotic Mapping

08 An Introduction to Dense Continuous Robotic Mapping NAVARCH/EECS 568, ROB 530 - Winter 2018 08 An Introduction to Dense Continuous Robotic Mapping Maani Ghaffari March 14, 2018 Previously: Occupancy Grid Maps Pose SLAM graph and its associated dense occupancy

More information

NAVIGATION AND ELECTRO-OPTIC SENSOR INTEGRATION TECHNOLOGY FOR FUSION OF IMAGERY AND DIGITAL MAPPING PRODUCTS. Alison Brown, NAVSYS Corporation

NAVIGATION AND ELECTRO-OPTIC SENSOR INTEGRATION TECHNOLOGY FOR FUSION OF IMAGERY AND DIGITAL MAPPING PRODUCTS. Alison Brown, NAVSYS Corporation NAVIGATION AND ELECTRO-OPTIC SENSOR INTEGRATION TECHNOLOGY FOR FUSION OF IMAGERY AND DIGITAL MAPPING PRODUCTS Alison Brown, NAVSYS Corporation Paul Olson, CECOM Abstract Several military and commercial

More information

Information systems design: a procedural approach

Information systems design: a procedural approach Information systems design: a procedural approach G. Haramis 1, G. Pavlidis 2, Th. Fotiadis 1, Ch. Vassiliadis 1 & Ch. Tsialtas 1 University of Macedonia 2 University of Patras Abstract The procedure of

More information

MetaData for Database Mining

MetaData for Database Mining MetaData for Database Mining John Cleary, Geoffrey Holmes, Sally Jo Cunningham, and Ian H. Witten Department of Computer Science University of Waikato Hamilton, New Zealand. Abstract: At present, a machine

More information

UNCLASSIFIED. ADF Tactical Data Link Authority Ground Network Capability Assurance Services UNCLASSIFIED

UNCLASSIFIED. ADF Tactical Data Link Authority Ground Network Capability Assurance Services UNCLASSIFIED UNCLASSIFIED MilCIS 2013 TDL Stream, Session 2.5a ADF Tactical Data Link Authority Ground Network Capability Assurance Services Mr. Josh Roth Ground Networks Manager joshua.roth1@defence.gov.au 02 626

More information

Cyberspace: New Frontiers in Technology Insertion

Cyberspace: New Frontiers in Technology Insertion Cyberspace: New Frontiers in Technology Insertion Dr. John S. Bay, ST Chief Scientist, Air Force Research Laboratory, Information Directorate AFRL Structure AFRL Maj Gen C Bedke Staff XP Air Vehicles Space

More information

The Joint Live Virtual Constructive Data Translator Framework Interoperability for a Seamless Joint Training Environment

The Joint Live Virtual Constructive Data Translator Framework Interoperability for a Seamless Joint Training Environment Framework Interoperability for a Seamless Joint Training Environment Warren Bizub Technical Division Chief US Joint Forces Command Joint Warfighting Center warren.bizub@jfcom.mil Derek Bryan Experimentation

More information

Integration of Fuzzy Shannon s Entropy with fuzzy TOPSIS for industrial robotic system selection

Integration of Fuzzy Shannon s Entropy with fuzzy TOPSIS for industrial robotic system selection JIEM, 2012 5(1):102-114 Online ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.397 Integration of Fuzzy Shannon s Entropy with fuzzy TOPSIS for industrial robotic system selection

More information

Parametric Behavior Modeling Framework for War Game Models Development Using OO Co-Modeling Methodology

Parametric Behavior Modeling Framework for War Game Models Development Using OO Co-Modeling Methodology Parametric Behavior Modeling Framework for War Game Models Development Using OO Co-Modeling Methodology Jae-Hyun Kim* and Tag Gon Kim** Department of EECS KAIST 373-1 Kusong-dong, Yusong-gu Daejeon, Korea

More information

AN ONTOLOGICAL EVALUATION OF JACKSON'S SYSTEM DEVELOPMENT MODEL. Fiona Rohde. Department of Commerce The University of Queensland, 4072.

AN ONTOLOGICAL EVALUATION OF JACKSON'S SYSTEM DEVELOPMENT MODEL. Fiona Rohde. Department of Commerce The University of Queensland, 4072. AN ONTOLOGICAL EVALUATION OF JACKSON'S SYSTEM DEVELOPMENT MODEL Fiona Rohde Department of Commerce The University of Queensland, 4072. Australia ABSTRACT Within the discipline of information systems, numerous

More information