Multi-Perspective Enemy Course of Action Maintenance
|
|
- Ralf Chandler
- 5 years ago
- Views:
Transcription
1 Distribution ment A: Approved for public release; distribution is unlimited. Multi-Perspective Enemy Course of Action Maintenance June 10, 2004 William J. Farrell III, Benjamin Grooters, and Frank Vetesi Lockheed Martin Advanced Technology Laboratories Cherry Hill, New Jersey [wfarrell, bgrooter, ABSTACT Estimation of the Enemy s Course of Action (ECA) is required for assessing enemy intent and mission impact, both of which are key functional components embodied in the Joint Directors of Laboratories (JDL) Level (Threat efinement) processing description. Most ECA estimation approaches assume that the set of ECA hypotheses are enumerated in advance and therefore reduce the problem of ECA maintenance to a hypothesis test performed over time. However, when asymmetric threats are present, ECA hypotheses cannot generally be enumerated in advanced and therefore need to be dynamically generated, decomposed, and evaluated in near real-time. Lockheed Martin Advanced Technology Laboratories has developed a multi-perspective approach to ECA maintenance that employs Threat Perspective Models for the generation, decomposition, and evaluation of ECA hypotheses. Each Threat Perspective Model generates hypotheses based upon feasibility and utility, decomposes hypotheses into sub-tasks using a Hierarchical Task Network (HTN), and evaluates hypotheses based upon observations of ECA sub-tasks. This approach is justified by a goal-directed task analyses performed on Army Intelligence Analysts, which indicate that human analysts maintain ECA hypotheses by viewing the battlefield from multiple perspectives such as terrain, weather, armament, doctrine, etc. This multiperspective approach makes the ECA maintenance problem more tractable and allows for seamless incorporation of new Threat Perspective Models. The multiperspective ECA maintenance approach presented in this paper is being incorporated into Army Fusion &D programs aimed at providing Level Fusion at multiple echelons. 1. Motivation Military analysts expend an extraordinary amount of resources and manpower attempting to determine the intended actions of an adversary. Even with conventional adversaries, where tactics and capabilities are typically well known, analysts struggle to predict the actions that an adversary might take. As the battle space evolves and becomes occupied by creative, asymmetric threats whose tactics and capabilities are not well known, the military analyst is faced with a nearly impossible task.
2 To aid the military analyst, significant effort has been focused on understanding the process by which human analysts attempt to predict adversary actions [1]. Lockheed Martin Advanced Technology Laboratories (ATL) has developed an architecture for estimating the Enemy Course of Action (ECA) using a multi-perspective approach [2]. ATL's approach is based on the realization that military analysts perform their analysis from various perspectives and combine the results to arrive at a conclusion. This is typically a manual process performed using a sequence of tactical overlays. As an illustration, an analyst may create a tactical overlay of the battle space terrain on a map. Then, another analyst may construct an additional overlay indicating cultural structures such as military facilities. Finally, another analyst may generate an overlay depicting a threat region by considering the enemy s likely weaponry. Collecting all of these overlays, the analyst attempts to deduce a potential ambush location. The Multi-Perspective ECA Maintenance approach outlined in this paper attempts to mimic the cognitive tasks performed by military analysts. 2. Background Concepts This section introduces the definitions and concepts that will be employed throughout the remainder of this paper. First, a definition and representation for an Enemy Course of Action (ECA) is presented. Secondly, the Hierarchical Task Network (HTN) is introduced as a framework for ECA Decomposition. Finally, this section presents the concept of Threat Perspective Models. 2.1 Enemy Course of Action epresentation An Enemy Course of Action (ECA) is a planned task performed by an adversary. An ECA can be represented as a triplet []. This triplet consists of a esource, an Action Verb, and an bjective. The semantics of the ECA triplet are (Figure 1): A esource performs an Action Verb focused on an bjective. As an example, an ECA might be: The 52 nd Infantry Division (esource) secures (Action Verb) Hill 12 (bjective). In the context of this paper, it is assumed that the esource is always an adversary entity while the bjective is assumed to be a friendly asset. This representation of an ECA is used throughout the remainder of this paper. ESUCE PEDICATE BJECTIVE PEDICATE ESUCE performs ACTIN VEB focused on BJECTIVE E5 E2 E9 AV 1 AV 2 E4 E8 AV AV 4 E Adversary Aggregate AV 5 AV n Feasible Set of Actions Friendly Asset (Assumed Known) Figure 1. ECA epresentation and Semantics 2
3 2.2 Hierarchical Task Networks Figure 1 is the simplest ECA that can be represented. It consists of only one task. Depending upon the military echelon, this description may be insufficient. For example, a commander of theatrewide operations may find that an ECA such as The 52 nd Infantry Division secures Hill 12 is sufficiently useful to support planning and decision-making. However, at the platoon echelon, this ECA is insufficient for planning friendly actions and responses. Because the required specificity of an ECA can vary with military echelon, the ECA representation should also be capable of various levels of specificity. A construct known as the Hierarchical Task Network (HTN) provides a representation of tasks at various levels of specificity [4]. Figure 2 illustrates an example of an HTN. The HTN not only mimics the variation in specificity found in military echelons, it also allows a computational construct for analyzing ECAs. In the Multi-Perspective ECA Maintenance algorithm presented in Sections 4-5, the HTN is employed to provide a method for decomposing high-level ECAs into more specific tasks. Directly Engage Enemy Locate Enemy Move to Contact Fire on Enemy Move to iver Cross Bridge Use Tunnel Move to Contact Figure 2. Decomposable tasks represented using a Hierarchical Task Network The HTN representation is the basis of most modern planning algorithms. It is based on the concept that humans plan by decomposing tasks into smaller ones until a sequence of atomic tasks are found that satisfy the objective. Within the context of this paper, the atomic tasks are the tasks that the Fusion processes attempt to infer or observe directly. 2.2 Threat Perspective Models As mentioned in Section 1, ATL has developed an approach to ECA maintenance that attempts to mimic the military analysts adversarial reasoning process [1]. Human analysts examine the state of the battle space from multiple perspectives, such as naval, land, air, weather, etc. Subsequently, ECAs are generated and decomposed using each perspective. Then, using inferred results from each perspective, the likelihood of each ECA is evaluated.
4 In order to mimic and automate the human process, a construct for a perspective must be developed. These constructs are called Threat Perspective Models. The functional role of a Threat Perspective Model (TPM) is to provide support for ECA maintenance by examining a subset of the battle space environment. A TPM assists in the generation, decomposition, and evaluation of ECA hypotheses. The precise implementation of a TPM (Bayesian Network, ule-based Expert System, etc) is not of particular concern. TPMs allow ECA maintenance to be simplified by partitioning and decoupling the analysis. TPMs come in two different varieties (perhaps indicating the specifics of the implementation). First, there are Fundamental Threat Perspective Models. These models consider physics-based aspects of the environment such as mobility, weather, weapons effectiveness, etc. The Fundamental TPMs are used to evaluate the feasibility of possible ECAs by imposing quantifiable constraints on the adversary s actions. Secondly, there are Domain Threat Perspective Models. These models consider domain-specific aspects of the environment such as armament, logistics, tactics, doctrine, etc. The Domain TPMs are used to evaluate the utility of ECAs by applying domain-specific rules to the entities observed within the battle space. As presented in the following sections, TPMs assist in the ECA maintenance process in several ways, but always with a restricted view of the environment.. ECA Generation The first requirement for Multi-Perspective ECA Maintenance is the ability to generate ECA hypotheses. This step is similar to the process of Track Initiation in Level 1 Fusion [5]. Here, the current state of friendly/adversary forces and friendly objectives/goals are used to generate ECA hypotheses (Figure ). ECA HYPTHESES Adversary (ED) perational Picture ECA Generation X X Friendly (BLUE) perational Picture X Friendly (BLUE) bjectives/s Figure. Generation of ECA Hypotheses Fundamental TPMs provide measures of Feasibility while Domain TPMs provide measures of Utility in order to rank and prune the hypothesis set (Figures 4-5). 4
5 BJECTIVE PEDICATE ESUCE performs ACTIN VEB focused on BJECTIVE TACTICAL EFFECTS BJECTIVE VALUE ACTIN VEBS BJECTIVES BJECTIVE PEDICATES UTILITY anking/pruning uses TACTICAL EFFECTS and BJECTIVE VALUE Figure 4. anking ECAs using Utility Measures provided by Domain Threat Perspective Models ESUCE PEDICATE BJECTIVE PEDICATE ESUCE performs ACTIN VEB focused on BJECTIVE ESUCE HLDINGS ACTIN EQUIED CAPABILITIES TACTICAL EFFECTS BJECTIVE VALUE ESUCES BJECTIVE PEDICATES ECA HYPTHESES FEASIBILITY anking/pruning uses ACTIN EQUIED CAPABILITIES and ESUCE HLDINGS 1 5 Figure 5. anking ECAs using Feasibility Measures provided by Fundamental Threat Perspective Models The order in which the ranking of hypotheses is performed (Feasibility-Utility or Utility-Feasibility) can dramatically affect the results of this process. To mitigate this sensitivity, a method such as Fuzzy Partial rdering [5] should be applied. This approach avoids the pitfalls of simple linear ordering approaches. In particular, each TPM may apply a Fuzzy Inference approach to assess the set membership for Feasible or Useful and then Fuzzy Partial rdering can be applied to rank the results using the Boolean criteria Feasible and Useful. The set of ECA hypotheses resulting from this process are decomposed and evaluated. In addition, the ECA generation process is re-invoked (either entirely or in part) whenever incoming information does not support any currently available ECA hypothesis. Again, this general procedure mimics Track Initiation (Level 1 Fusion) where measurements are used to initiate a new track when they do not associate with any existing tracks. 5
6 4. ECA Decomposition nce the ECA hypotheses have been generated from the process outlined in Section, the ECA Maintenance system must evaluate them. However, since the generated hypotheses are not directly observable, they are not suitable for hypothesis testing. As with any hypothesis test, observables must be identified. These observables act as indicators to refute or support ECA hypotheses. A Hierarchical Task Network (HTN) planner [4] is employed to decompose ECA hypotheses into observable task sequences. The Threat Perspective Models play an important role within the ECA Decomposition process (Figure 6). They are responsible for observing (inferring) certain tasks within the HTN. For example, a Mobility Threat Perspective Model might be responsible for observing the task A move to B for an arbitrary pair of entities A and B. In effect, the Threat Perspective Models define which tasks are considered to be atomic. The ECA Decomposition can be performed in a sequential manner, performing decomposition using only the Domain Threat Perspective Models followed by decomposition using only the Fundamental Threat Perspectives. AV activate radar Domain Threat Perspective Models Logistics Armament Fundamental Threat Perspective Models Mobility Weather reach area #1 reach area #2 pass north of lake pass south of lake cross bridge activate radar pass north of mountain reach area #1 reach area #2 Figure 6. Sequential ECA Decomposition using Threat Perspective Models nce the ECA hypotheses have been decomposed into observable tasks, it is the responsibility of the Threat Perspective Models to evaluate the current belief that the observable tasks are being performed. 5. ECA Evaluation The final major component of the proposed Multi-Perspective ECA Maintenance approach is ECA Evaluation. Analogous to Level 1 Fusion, this is the Track Maintenance process [5] where the system attempts to associate observed information with each ECA hypothesis over time. The goal is to determine which ECA hypothesis most strongly supports the observed information. Again, the TPMs play an important role in the evaluation process. Each TPM is responsible for inferring and/or observing a sub-set of tasks within each decomposed ECA hypothesis. Together, the TPMs collaborate, much as military analysts exchange information, in order to evaluate the current belief of each ECA hypothesis. Figures 7-8 illustrate this process by example. 6
7 Fundamental Perspective Models Mobility Weather pass north of lake cross bridge #1 mountain lake cross bridge #2 pass north of mountain Domain Perspective Models Logistics Armament reach area #1 pass south of lake reach area #2 pass north of lake cross cross pass south pass south bridge #1 bridge #2 of mountain activate of lake reach radar area # breach river Figure 7. Threat Perspective Models contributing to ECA Evaluation Fundamental Perspective Models Mobility Weather pass south of lake cross bridge #1 mountain lake cross bridge #2 pass north of mountain Domain Perspective Models Logistics Armament reach area #1 reach area #2 activate radar pass south of lake cross cross pass south bridge #1 bridge #2 of mountain reach area # Figure 8. Threat Perspective Models contributing to ECA Evaluation In Figure 7, there are two hypothetical ECAs being evaluated. After some time has elapsed, the Fundamental Threat Perspective Models have inferred the actions taken by the adversary: 1) Passed South of Lake, and 2) Crossed Bridge #1. At this point, both ECAs seem equally likely because no discriminating information has been obtained. However, as time elapses further (Figure 8), the Threat Perspective Models contribute additional inferences: 1) Crossed Bridge #2, 2) Passed South of Mountain, and ) Enemy Activated adar. At this point, the second ECA appears more likely. In general, the role of the Threat Perspective Models is to monitor the atomic tasks generated by the HTN planner (see Section 4). Subsequently, ECA hypotheses can be evaluated and the belief in each hypothesis is revised. 7
8 ne quantitative approach to maintaining ECA beliefs employs Fuzzy Finite Machines (FFSM) [5]. In particular, the HTN (see Section 4) used for ECA Decomposition is cast into a hierarchical network of Fuzzy Finite Machines representing the causal-temporal relationships between tasks. By maintaining the state of these Fuzzy Finite Machines, the beliefs for each ECA hypothesis is maintained. Figure 9 illustrates the hierarchical FFSM used for ECA Evaluation. Fuzzy Finite Machines ECA t t2 t Hierarchical Task Network Figure 9. Hierarchical Fuzzy Finite Machines for ECA Evaluation The steps for ECA Evaluation using Hierarchical FFSMs are: 1. Transition Possibilities: Compute transition possibilities for each node 2. Predict FFSM: Predict Fuzzy states for each node. Modus Tollen: Make partial observations using modus tollens logic 4. Fuzzy Innovations: Compute fuzzy innovations for the FFSM 5. Update Fuzzy s: Compute revised states in the FFSM This process is reminiscent of Kalman Filtering with the exception of the observation process. Since the observations made about the states of the FFSM are logical, Modus Tollens is applied in replacement of the Kalman bservation function. Transition Possibilities are computed for each node in the FFSM. These possibilities represent the belief that the FFSM will remain in a given node's state. A non-zero transition possibility represents belief leaving a given node in the FFSM. These transition possibilities are denoted by: τ ( t s, xˆ ) µ (1) where s is the state represented by a node in the FFSM and xˆ is the current state of the enemy. As an example, one of the states (s=1) in the FFSM may be: <Time-to-Go> is <Long> (2) and the current state of the enemy is: [ ange angeate ] T x ˆ = () then, the transition possibility conditioned on the FFSM state (Equation 2) and the enemy state (Equation ) is: 8
9 τ ( t s = 1, xˆ = [ ange angeate ] ) T µ (4) which is the Sojourn Time [6] for remaining in the state represented by Equation 2. FFSM prediction is accomplished by Fuzzy Functional Composition [5]. The equation for predicting the FFSM state into the future is given by: (5) where S is the FFSM state vector, µ τ is the transition possibility, and δ represents a perturbative input into the system over the prediction interval. The perturbative input can be used to represent changes in external states such as friendly actions. Modus Tollens is now applied to make observations of the FFSM. Modus Tollens is the procedure of logical backward inference. This step is analogous to computing the Likelihood Function in a Kalman filter. Here, however, the observation process is logical: Sˆ t xˆ ) = if ( s) is < Possible > (6) then ( observation is < Y > The Threat Perspective Models contribute, once again, to ECA Maintenance by performing Modus Tollens. nce observations have been made, the Fuzzy Innovations are computed. These innovations measure the degree to which the predicted FFSM states (Equation 5) agree with the observations (Equation 6). The Fuzzy Innovations are computed by: m S ~ St xˆ t Sˆ = (7) and the null state residual is: t (8) Finally, to complete an iteration of the FFSM update, the Fuzzy states are updated according to: ˆ + S k 1 = St m~ + (9) S t and the null state update equation is: (10) Equations 1 through 10 outline the steps for performing an update of a FFSM. The hierarchical FFSMs illustrated in Figure 9 are updated in this fashion. Thus, an approach for sequential ECA hypothesis belief maintenance is presented. 9
10 6. Conclusions Driven by a -Directed Task Analysis of the military intelligence analyst, Multi-Perspective ECA Maintenance attempts to mimic the problem solving approach employed by these analysts. The Multi- Perspective ECA Maintenance approach has three functional components: ECA Generation, ECA Decomposition, and ECA Evaluation. Supporting each of these components are models called Threat Perspective Models that provide restricted view of the battle space environment. The use of these Threat Perspective Models not only mimics the human military analyst, but also allows for a simplified computational architecture. In addition to the Multi-Perspective ECA Maintenance architecture presented in this paper, a novel approach to ECA hypothesis belief maintenance based upon hierarchical Fuzzy Finite Machines was presented. eferences [1] SA Technologies. Directed Task Analysis of the Brigade Intelligence fficer, Fusion Based Knowledge for the bjective Force, June 200. [2] Angela Pawlowski, Sergio Gigili, and Frank Vetesi. Situation and Threat efinement Approach for Combating the Asymmetric Threat, Military Sensing Symposia, National Symposium on Sensor and Data Fusion 2002, San Diego, CA, August 1-15, [] North Atlantic Treaty rganization. The Land C2 Information Exchange Data Model, ATCCIS Baseline 2.0, March 18, [4] K. Erol, D. Nau, J. Hendler. HTN Planning: Complexity and Expressivity In AAAI-94, Seattle, July, [5] S. Blackman, Design and Analysis of Modern Tracking Systems, Artech House, [6] Y. Bar-Shalom, X.. Li, T. Kirubarajan, Estimation with Applications to Tracking and Navigation, Jon Wiley & Sons, 2001, pp &
Context Based Shared Understanding for Situation Awareness
Distribution Statement A: Approved for public release; distribution is unlimited. Context Based Shared Understanding for Situation Awareness June 9, 2004 David G. Cooper Lockheed Martin Advanced Technology
More informationDynamic Context Maintenance in Human Terrain
Distribution A: Approved for public release; distribution is unlimited. Dynamic Context Maintenance in Human Terrain July 14, 2009 Nadya Belov, Jeff Patti, and Angela Pawlowski Lockheed Martin Advanced
More informationUNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY
More informationGame Theoretic Solutions to Cyber Attack and Network Defense Problems
Game Theoretic Solutions to Cyber Attack and Network Defense Problems 12 th ICCRTS "Adapting C2 to the 21st Century Newport, Rhode Island, June 19-21, 2007 Automation, Inc Dan Shen, Genshe Chen Cruz &
More informationtfinal t 3 results projected from t 1
Proceedings of the 2004 Winter Simulation Conference R.G. Ingalls, M. D. Rossetti, J. S. Smith, and B. A. Peters, eds. AN URBAN TERRAIN ABSTRACTION TO SUPPORT DECISIONMAKING USING RECURSIVE SIMULATION
More informationMethodology for Automatic Synthesis of Wargame Simulator using DEVS
Methodology for Automatic Synthesis of Wargame Simulator using DEVS Kim Ju Young, Shim Kwang Hyun ETRI kimjy1113@etri.re.kr, shimkh@etri.re.kr Abstract In specific domain such as wargame, simulator developers
More informationCoalition Interoperability Ontology:
Coalition Interoperability Ontology: Sharing Situational Awareness with Allies and Agents Erik Chaum Naval Undersea Warfare Center, Division Newport, TTCP, Maritime Systems Group, TP1 US National Leader
More informationFusion of Radar and EO-sensors for Surveillance
of Radar and EO-sensors for Surveillance L.J.H.M. Kester, A. Theil TNO Physics and Electronics Laboratory P.O. Box 96864, 2509 JG The Hague, The Netherlands kester@fel.tno.nl, theil@fel.tno.nl Abstract
More informationSystem of Systems Architecture Generation and Evaluation using Evolutionary Algorithms
SysCon 2008 IEEE International Systems Conference Montreal, Canada, April 7 10, 2008 System of Systems Architecture Generation and Evaluation using Evolutionary Algorithms Joseph J. Simpson 1, Dr. Cihan
More informationUser Defined Operational Pictures for Tailored Situation Awareness
User Defined Operational Pictures for Tailored Situation Awareness Sandeep Mulgund, Ph.D. Seth Landsman, Ph.D. {smulgund, landsman}@mitre.org The MITRE Corporation Bedford, MA 01730 June 19, 2007 Overview
More informationIntelligence Preparation of the Cyber Environment. Rob Dartnall Director Cyber Intelligence
Intelligence Preparation of the Cyber Rob Dartnall Director Cyber Intelligence Rob is a CREST Certified Threat Intelligence Manager (CCTIM) and Cyber Intelligence Director/CEO of Security Alliance - a
More informationSpace and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)
Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project
More informationApproaches and Tools to Quantifying Facility Security Risk. Steve Fogarty, CSO
Approaches and Tools to Quantifying Facility Security Risk Steve Fogarty, CSO ARES Security Corporation ARES is a high-performing Technology Solutions provider with more than 20 offices around the world.
More informationImplementing Net-Centric Tactical Warfare Systems
Implementing Net-Centric Tactical Warfare Systems Gordon Hunt gordon.hunt@rti.com Real Time Innovations, Inc. 385 Moffett Park Drive, Sunnyvale, CA 94089 The tactical battlefield has long been characterized
More informationNAVIGATION AND ELECTRO-OPTIC SENSOR INTEGRATION TECHNOLOGY FOR FUSION OF IMAGERY AND DIGITAL MAPPING PRODUCTS. Alison Brown, NAVSYS Corporation
NAVIGATION AND ELECTRO-OPTIC SENSOR INTEGRATION TECHNOLOGY FOR FUSION OF IMAGERY AND DIGITAL MAPPING PRODUCTS Alison Brown, NAVSYS Corporation Paul Olson, CECOM Abstract Several military and commercial
More informationUBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT
2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer
More informationCyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016
Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete
More informationArchitectures for Distributed Information Fusion To Support Situation Awareness on the Digital Battlefield
Architectures for Distributed Information To Support Situation Awareness on the Digital Battlefield Stephen M. Jameson Artificial Intelligence Laboratory Lockheed Martin Advanced Technology Laboratories
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationLittoral Environment Visualization Tool
Littoral Environment Visualization Tool Mr. Richard Swiontek Sonalysts, Inc 215 Parkway North, Post Office Box 280 Waterford, CT 06385 Phone: (860) 326-3616 Fax: (860) 326-3862 Email: dswiontek@sonalysts.com
More informationClient Perspective: Implementing C2SIM in a Client Dr. Robert Wittman APPROVED FOR PUBLIC RELEASE
Client Perspective: Implementing C2SIM in a Client Dr. Robert Wittman APPROVED FOR PUBLIC RELEASE Slide 1 Topics Why use C2SIM (MSDL & ) The Crawl, Walk, Run Implementation Approach An Coalition Example
More informationHETEROGENEOUS COMPUTING
HETEROGENEOUS COMPUTING Shoukat Ali, Tracy D. Braun, Howard Jay Siegel, and Anthony A. Maciejewski School of Electrical and Computer Engineering, Purdue University Heterogeneous computing is a set of techniques
More informationThe Literature: Self-Synchronization and Shared Awareness
Enabling Adaptive C2 via Semantic Communication and Smart Push: A Model-based Network Communication Approach LtCol Carl Oros, USMC Brief to AFCEA-GMU C4I Center Symposium Critical Issues in C4I Fairfax,
More informationSimulating Information Warfare
Civil Affairs Simulating Information Warfare Simulating Information Warfare Roger Smith Vice President of Technology rdsmith@btg.com 407-977-3310 Full Spectrum IO Conducting Information Operations means...
More informationCyber Security CRA Overview
Cyber Security CRA Overview Patrick McDaniel (PM, PSU) & Edward Colbert (CAM, ARL) cra.psu.edu Approved for public release; distribution is unlimited. Cyber Security Collaborative Research Alliance A Collaborative
More informationKnowledge Base Formation Using Integrated Complex Information
Knowledge Base Formation Using Integrated Complex Information Douglas S. Lange SPAWARSYSCEN 53560 Hull Street San Diego, CA 92152-5001 dlange@spawar.navy.mil Abstract An intelligence support system has
More informationAC2 CTC Investment Strategy. Capt Brandon Keller, AFRL/RIS Acting CTC Lead
AC2 CTC Investment Strategy Capt Brandon Keller, AFRL/RIS Acting CTC Lead Scope Covers monitor, assess, plan, and execute processes within and across air, space, cyber domains Addresses four key goals:
More informationTopological Abstraction and Planning for the Pursuit-Evasion Problem
Topological Abstraction and Planning for the Pursuit-Evasion Problem Alberto Speranzon*, Siddharth Srivastava (UTRC) Robert Ghrist, Vidit Nanda (UPenn) IMA 1/1/2015 *Now at Honeywell Aerospace Advanced
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More informationThe Success of the AMRAAM DBMS/DAS
The Success of the AMRAAM DBMS/DAS John Gerdine Wyle Laboratories Inc. Niceville Florida 32579 U.S.A. 1 Overview Asymmetric Threat AMRAAM Development Test and Evaluation (T&E) History Current AMRAAM Production
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationA Design Method for Composition and Reuse Oriented Weaponry Model Architecture Meng Zhang1, a, Hong Wang1, Yiping Yao1, 2
2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) A Design Method for Composition and Reuse Oriented Weaponry Model Architecture Meng Zhang1, a,
More informationRiskSense Attack Surface Validation for IoT Systems
RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing
More informationMODELING THE COMMUNICATIONS CAPABILITIES OF THE INFANTRY SOLDIER
MODELING THE COMMUNICATIONS CAPABILITIES OF THE INFANTRY SOLDIER ANDREW HALL JOHN SURDU FERNANDO MAYMI ASHOK DEB KRISTIN FREBERG Keywords: Wearable computer systems, Land Warrior, personal area network,
More informationGREEN DEFENCE FRAMEWORK
GREEN DEFENCE FRAMEWORK Approved by the North Atlantic Council in February 2014 GREEN DEFENCE FRAMEWORK OVERVIEW 1. Green Defence could, at this stage, be defined as a multifaceted endeavour cutting across
More informationBriefing Date. Purpose
Applying the Systems Engineering Method for the Joint Capabilities Integration and Development System (JCIDS) Chris Ryder and Dave Flanigan 27 October 2005 Purpose JCIDS prescribes a joint forces approach
More informationAI algorithms and new approaches to wargame simulation
July 14 AI algorithms and new approaches to wargame simulation S Lucek, NSC S Collander- Brown, Dstl 31 ISMOR Overview Mission Planner: combat decision-making (AI) toolset Supports Dstl high intensity
More informationIntegrating Soar into the OneSAF Models Framework. Dr. Doug Reece
Integrating Soar into the OneSAF Models Framework Dr. Doug Reece Outline OneSAF Modeling Infrastructure (MI) overview Emphasis on entity architecture Ideas for integrating Soar Not interfacing 2 OneSAF
More informationThe Generalized Weapon Target Assignment Problem
10th International Command and Control Research and Technology Symposium The Future of C2 June 13-16, 2005, McLean, VA The Generalized Weapon Target Assignment Problem Jay M. Rosenberger Hee Su Hwang Ratna
More informationCybersecurity Testing
Cybersecurity Testing Tim Palmer Chief Technical Advisor, SAS Business Unit Torch Technologies, Inc. EXPERTISE // INNOVATION // CUSTOMER FOCUS // EXCELLENCE // INTEGRITY // COOPERATION // RELIABILITY About
More informationTIPS A System for Contextual Prioritization of Tactical Messages
TIPS A System for Contextual Prioritization of Tactical Messages 14 th ICCRTS 16 June 2009 Robert E. Marmelstein, Ph.D. East Stroudsburg University East Stroudsburg, PA 18301 Sponsored by: AFRL/IFSB (Rome,
More informationIntroducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence
Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Ratko Orlandic Department of Computer Science and Applied Math Illinois Institute of Technology
More informationMULTI-VIEW TARGET CLASSIFICATION IN SYNTHETIC APERTURE SONAR IMAGERY
MULTI-VIEW TARGET CLASSIFICATION IN SYNTHETIC APERTURE SONAR IMAGERY David Williams a, Johannes Groen b ab NATO Undersea Research Centre, Viale San Bartolomeo 400, 19126 La Spezia, Italy Contact Author:
More informationNetwork Mission Assurance Phoenix Challenge 2002 Conference
Phoenix Challenge 2002 Conference Lockheed Martin Advanced Technology Laboratories Distributed Processing Laboratory 1 Federal Street A&E Building 3W Camden, New Jersey 08102 Mike Junod mjunod@atl.lmco.com
More informationDEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS
DEVELOPING AN INTELLIGENCE ANALYSIS PROCESS THROUGH SOCIAL NETWORK ANALYSIS Todd Waskiewicz and Peter LaMonica Air Force Research Laboratory Information and Intelligence Exploitation Division {Todd.Waskiewicz,
More informationMassachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms for Inference Fall 2014
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms for Inference Fall 2014 1 Course Overview This course is about performing inference in complex
More informationComposable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems
Composable Architecture & Design Applying Product Line and Systems of Systems Concepts to the Design of Unique, Complex Cyber-Physical Systems 12/03/2014 Christopher Oster About Me B.S. Computer Science,
More informationRaytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40
Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40 Dale Anglin Erik Baumgarten John Dinh Mark Hall Bert Schneider May 13, 2008 Cleared for public release
More informationDesign of Distributed Command and Control for Collaborative Situation Assessment
18th ICCRTS Title of Paper: Design of Distributed Command and Control for Collaborative Situation Assessment Topic(s): Primary: o Topic 7: Modeling and Simulation Alternatives: o Topic 3: Data, Information,
More informationto-end System Test Architecture
End-to to-end System Test Architecture Sr. Manager, Lockheed Martin SSC masuma.ahmed@lmco.com (408) 742-2553 2553 1 Net-Centric Mission Operations Features Fully Synchronized Interoperable, of ed Systems
More informationIntroduction. Chapter 1. What Is Visual Modeling? The Triangle for Success. The Role of Notation. History of the UML. The Role of Process
Quatrani_Ch.01.fm Page 1 Friday, October 27, 2000 9:02 AM Chapter 1 Introduction What Is Visual Modeling? The Triangle for Success The Role of Notation History of the UML The Role of Process What Is Iterative
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationRegularization and model selection
CS229 Lecture notes Andrew Ng Part VI Regularization and model selection Suppose we are trying select among several different models for a learning problem. For instance, we might be using a polynomial
More informationChapter : Analysis Modeling
Chapter : Analysis Modeling Requirements Analysis Requirements analysis Specifies software s operational characteristics Indicates software's interface with other system elements Establishes constraints
More informationData Verification and Validation (V&V) for New Simulations
Data Verification and Validation (V&V) for New Simulations RPG Special Topic 9/15/06 1 Table of Contents Introduction 1 Data V&V Activities During M&S Development 1 Determine M&S Requirements Phase 2 V&V
More informationScott Philips, Edward Kao, Michael Yee and Christian Anderson. Graph Exploitation Symposium August 9 th 2011
Activity-Based Community Detection Scott Philips, Edward Kao, Michael Yee and Christian Anderson Graph Exploitation Symposium August 9 th 2011 23-1 This work is sponsored by the Office of Naval Research
More informationSituation Assessment via Bayesian Belief Networks
Situation Assessment via Bayesian Belief Networks Subrata Das, Rachel Grey, and Paul Gonsalves Charles River Analytics, Inc. 625 Mt. Auburn St. Cambridge, MA 02138 {sdas, rgrey, pgonsalves}@cra.com Abstract
More informationApplication of Clustering Techniques to Energy Data to Enhance Analysts Productivity
Application of Clustering Techniques to Energy Data to Enhance Analysts Productivity Wendy Foslien, Honeywell Labs Valerie Guralnik, Honeywell Labs Steve Harp, Honeywell Labs William Koran, Honeywell Atrium
More informationComputer Vision 2 Lecture 8
Computer Vision 2 Lecture 8 Multi-Object Tracking (30.05.2016) leibe@vision.rwth-aachen.de, stueckler@vision.rwth-aachen.de RWTH Aachen University, Computer Vision Group http://www.vision.rwth-aachen.de
More informationAFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey
AFCEA Welcome/Opening Keynote Speech Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey A Turkish Perspective on the Challenges of Security in a Network-Enabled Environment I would like to
More informationSTA 4273H: Statistical Machine Learning
STA 4273H: Statistical Machine Learning Russ Salakhutdinov Department of Statistics! rsalakhu@utstat.toronto.edu! http://www.utstat.utoronto.ca/~rsalakhu/ Sidney Smith Hall, Room 6002 Lecture 5 Inference
More information1 Executive Overview The Benefits and Objectives of BPDM
1 Executive Overview The Benefits and Objectives of BPDM This is an excerpt from the Final Submission BPDM document posted to OMG members on November 13 th 2006. The full version of the specification will
More informationAUTOMATED SCENARIO GENERATION SYSTEM FINAL REPORT. Final Report for the Project
SCENARIST TM AUTOMATED SCENARIO GENERATION SYSTEM FINAL REPORT Final Report for the Project Research in Artificial Intelligence for Noncommunications Electronic Warfare Systems Contract No. DAAB07-89-C-P017
More informationISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description
INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference
More informationActionable User Intentions for Real-Time Mobile Assistant Applications
Actionable User Intentions for Real-Time Mobile Assistant Applications Thimios Panagos, Shoshana Loeb, Ben Falchuk Applied Research, Telcordia Technologies One Telcordia Drive, Piscataway, New Jersey,
More informationA Practical Approach to Data Modeling using CCO (Common Core Ontologies) Rod Moten, PhD Chief Scientist Datanova Scientific, LLC
A Practical Approach to Data Modeling using CCO (Common Core Ontologies) Rod Moten, PhD Chief Scientist Datanova Scientific, LLC Motivation for our Research We are involved in several US Army projects
More informationShared Situation Awareness For Army Applications
Approved for public release; distribution is unlimited. Shared Situation Awareness For Army Applications June 2003 William J. Farrell III, Stephen Jameson, and Craig Stoneking Lockheed Martin Advanced
More informationFormatted Message Exchange in a Multinational Environment
ABSTRACT Formatted Message Exchange in a Multinational Environment Col. Dr. Murat Ucuncu Lt. Jr. M. Umut Demirezen (M.Sc.) Turkish General Staff Information Systems Division Ankara TURKEY murat.ucuncu@tr.net
More informationNetwork Based Hard/Soft Information Fusion Stochastic Graph Analytics
Network Based Hard/Soft Information Fusion Stochastic Graph Analytics Geoff Gross, Kedar Sambhoos, Rakesh Nagi (PI) Tel. (716) 645-3471, Email: gagross@buffalo.edu Objectives Represent soft data uncertainties
More informationOutline. Target Tracking: Lecture 1 Course Info + Introduction to TT. Course Info. Course Info. Course info Introduction to Target Tracking
REGLERTEKNIK Outline AUTOMATIC CONTROL Target Tracking: Lecture 1 Course Info + Introduction to TT Emre Özkan emre@isy.liu.se Course info Introduction to Target Tracking Division of Automatic Control Department
More informationUsing Group Knowledge for Multitarget Terrain-Based State Estimation
Using Group Knowledge for Multitarget Terrain-Based State Estimation Edward Sobiesk 1, Maria Gini 2, and John A. Marin 3 1 Dept of Electrical Engineering and Computer Science, United States Military Academy,
More informationDefense Engineering Excellence
Defense Engineering Excellence Kristen J. Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering, OUSD(AT&L) 18th Annual NDIA Systems Engineering Conference
More informationOptimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks
Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,
More informationJoint Entity Resolution
Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute
More informationOperationalizing Cyber Security Risk Assessments for the Dams Sector
Operationalizing Cyber Security Risk Assessments for the Dams Sector Kevin Burns, Jason Dechant, Darrell Morgeson, and Reginald Meeson, Jr. The Problem To evaluate vulnerability to the postulated threat,
More information7. Collinearity and Model Selection
Sociology 740 John Fox Lecture Notes 7. Collinearity and Model Selection Copyright 2014 by John Fox Collinearity and Model Selection 1 1. Introduction I When there is a perfect linear relationship among
More informationA MATLAB TOOL FOR DEVELOPMENT AND TESTING OF TRACK INITIATION AND MULTIPLE TARGET TRACKING ALGORITHMS
I&S A MATLAB TOOL FOR DEVELOPMENT AND TESTING OF TRACK INITIATION AND MULTIPLE TARGET TRACKING ALGORITHMS Kiril ALEXIEV 1. Introduction Digital computer simulation is a valuable tool, used for the design,
More informationNet-Centric Systems Test Focus Area
Test and Evaluation/Science and Technology Program Net-Centric Systems Test Focus Area PREdictive Smart Synchronization (PRESS) Algorithms; Removing Data Bias from the Virtual Test Range Farrokh Vatan
More informationGT "Calcul Ensembliste"
GT "Calcul Ensembliste" Beyond the bounded error framework for non linear state estimation Fahed Abdallah Université de Technologie de Compiègne 9 Décembre 2010 Fahed Abdallah GT "Calcul Ensembliste" 9
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($
More informationOutline. EE793 Target Tracking: Lecture 2 Introduction to Target Tracking. Introduction to Target Tracking (TT) A Conventional TT System
Outline EE793 Target Tracking: Lecture 2 Introduction to Target Tracking Umut Orguner umut@metu.edu.tr room: EZ-12 tel: 4425 Department of Electrical & Electronics Engineering Middle East Technical University
More informationAdvanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018
Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 The Homeland Security Systems Engineering and Development Institute (HSSEDI ) is a trademark of the U.S. Department of Homeland
More informationDirected Energy Using High-Power Microwave Technology
Directed Energy High-Power Microwave Directed Energy Using High-Power By Jacob Walker and Matthew McQuage 78 The Directed Energy Warfare Office (DEWO) and Directed Energy Division at the Naval Surface
More informationBizagi Process Management Suite as an Application of the Model Driven Architecture Approach for Developing Information Systems
Bizagi Process Management Suite as an Application of the Model Driven Architecture Approach for Developing Information Systems Doi:10.5901/ajis.2014.v3n6p475 Abstract Oskeol Gjoni PHD Student at European
More informationCombat Effectiveness Testing of System of Systems in the Face of Cyber Threat
Combat Effectiveness Testing of System of Systems in the Face of Cyber Threat Presented at National Defense Industrial Association Conference March 3, 2010 Jon Payne USJFCOM IO Range 256.842.0156 Jonathon.payne@jfcom.mil
More informationPROBABILITY OF FAILURE ANALYSIS STANDARDS AND GUIDELINES FOR ELVS
PROBABILITY OF FAILURE ANALYSIS STANDARDS AND GUIDELINES FOR ELVS Federal Aviation Administration 6th IAASS Conference Session 10: Launch Safety Part 1 By:, Elisabeth Morse (Valador Inc.), Paul Rosati
More informationCan Real-Time Operate in an SOA Environment?
Can Real-Time Operate in an SOA Environment? Precision Strike Technology Symposium Charles Kille, Raytheon John Link, VOLVOX, Inc. October 23-25, 2007 Copyright 2007 Raytheon Company. All rights reserved.
More informationMetrics for Feature-Aided Track Association
Metrics for eature-aided rack Association Chee-Yee Chong BAE Systems Los Altos, CA, U.S.A. chee.chong@baesystems.com Shozo Mori BAE Systems Los Altos, CA, U.S.A. shozo.mori@baesystems.com Abstract: rack
More informationGeospatial Engineering
ATP 3-34.80, C1 Change 1 Army Techniques Publication No. 3-34.80 Headquarters Department of the Army Washington, DC, 15 September 2014 Geospatial Engineering 1. This change replaces incorrect figures in
More information08 An Introduction to Dense Continuous Robotic Mapping
NAVARCH/EECS 568, ROB 530 - Winter 2018 08 An Introduction to Dense Continuous Robotic Mapping Maani Ghaffari March 14, 2018 Previously: Occupancy Grid Maps Pose SLAM graph and its associated dense occupancy
More informationNAVIGATION AND ELECTRO-OPTIC SENSOR INTEGRATION TECHNOLOGY FOR FUSION OF IMAGERY AND DIGITAL MAPPING PRODUCTS. Alison Brown, NAVSYS Corporation
NAVIGATION AND ELECTRO-OPTIC SENSOR INTEGRATION TECHNOLOGY FOR FUSION OF IMAGERY AND DIGITAL MAPPING PRODUCTS Alison Brown, NAVSYS Corporation Paul Olson, CECOM Abstract Several military and commercial
More informationInformation systems design: a procedural approach
Information systems design: a procedural approach G. Haramis 1, G. Pavlidis 2, Th. Fotiadis 1, Ch. Vassiliadis 1 & Ch. Tsialtas 1 University of Macedonia 2 University of Patras Abstract The procedure of
More informationMetaData for Database Mining
MetaData for Database Mining John Cleary, Geoffrey Holmes, Sally Jo Cunningham, and Ian H. Witten Department of Computer Science University of Waikato Hamilton, New Zealand. Abstract: At present, a machine
More informationUNCLASSIFIED. ADF Tactical Data Link Authority Ground Network Capability Assurance Services UNCLASSIFIED
UNCLASSIFIED MilCIS 2013 TDL Stream, Session 2.5a ADF Tactical Data Link Authority Ground Network Capability Assurance Services Mr. Josh Roth Ground Networks Manager joshua.roth1@defence.gov.au 02 626
More informationCyberspace: New Frontiers in Technology Insertion
Cyberspace: New Frontiers in Technology Insertion Dr. John S. Bay, ST Chief Scientist, Air Force Research Laboratory, Information Directorate AFRL Structure AFRL Maj Gen C Bedke Staff XP Air Vehicles Space
More informationThe Joint Live Virtual Constructive Data Translator Framework Interoperability for a Seamless Joint Training Environment
Framework Interoperability for a Seamless Joint Training Environment Warren Bizub Technical Division Chief US Joint Forces Command Joint Warfighting Center warren.bizub@jfcom.mil Derek Bryan Experimentation
More informationIntegration of Fuzzy Shannon s Entropy with fuzzy TOPSIS for industrial robotic system selection
JIEM, 2012 5(1):102-114 Online ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.397 Integration of Fuzzy Shannon s Entropy with fuzzy TOPSIS for industrial robotic system selection
More informationParametric Behavior Modeling Framework for War Game Models Development Using OO Co-Modeling Methodology
Parametric Behavior Modeling Framework for War Game Models Development Using OO Co-Modeling Methodology Jae-Hyun Kim* and Tag Gon Kim** Department of EECS KAIST 373-1 Kusong-dong, Yusong-gu Daejeon, Korea
More informationAN ONTOLOGICAL EVALUATION OF JACKSON'S SYSTEM DEVELOPMENT MODEL. Fiona Rohde. Department of Commerce The University of Queensland, 4072.
AN ONTOLOGICAL EVALUATION OF JACKSON'S SYSTEM DEVELOPMENT MODEL Fiona Rohde Department of Commerce The University of Queensland, 4072. Australia ABSTRACT Within the discipline of information systems, numerous
More information