8th CGF & BR Conference 11 - 13 May 1999 Copyright 1999 Institute for Simulation & Training Deriving Priority Intelligence Requirements for Synthetic Command.

Slides:



Advertisements
Similar presentations
Tactical Operations Orders
Advertisements

Intelligent Architectures for Electronic Commerce Part 1.5: Symbolic Reasoning Agents.
C2 Integration Division Marine Corps Combat Development Command
JSIMS 28-Jan-99 1 JOINT SIMULATION SYSTEM Modeling Command and Control (C2) with Collaborative Planning Agents Randall Hill and Jonathan Gratch University.
OntoPlan: Knowledge Fusion Using Semantic Web Ontologies Héctor Muñoz-Avila Jeff Heflin.
Information Flow: Tactical Network Design and Bandwidth Management University XXI Texas A&M University University of Texas United States Army.
JSIMS / ASTT Workshop 14 May 1999 Command and Control Modeling for Joint Synthetic Battlespaces Randall W. Hill, Jr. Jonathan Gratch USC Information Sciences.
OASIS Reference Model for Service Oriented Architecture 1.0
LVC-ITE “Expand Your Battle-space” Combined Arms Battalion (CATS) STAFFEX: Conduct an Attack / Movement to Contact 71-TS-1001 UNCLASSIFED
Software Testing and Quality Assurance
TEXAS A&M UNIVERSITY AND THE UNIVERSITY OF TEXAS AT AUSTIN Army Digitization Research Initiative Dr. Richard A. Volz (Computer Science) Dr. Tom Ioerger.
JACK Intelligent Agents and Applications Hitesh Bhambhani CSE 6362, SPRING 2003 Dr. Lawrence B. Holder.
9th CGF & BR Conference May 2000 Copyright 1998 Institute for Simulation & Training Modeling Cooperative, Reactive Behaviors on the Battlefield.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 7: Expert Systems and Artificial Intelligence Decision Support.
Ideas for Explainable AI
Military Decision Making Process (MDMP)
Security Assessments FITSP-M Module 5. Security control assessments are not about checklists, simple pass-fail results, or generating paperwork to pass.
An Intelligent Tutoring System (ITS) for Future Combat Systems (FCS) Robotic Vehicle Command I/ITSEC 2003 Presented by:Randy Jensen
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Security Assessments FITSP-A Module 5
8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Modeling Perceptual Attention in Virtual Humans Randall W.
Integrating COIN and Full Spectrum Training LtCol M. B. Barry 23 Sep 2010.
© 2007 Tom Beckman Features:  Are autonomous software entities that act as a user’s assistant to perform discrete tasks, simplifying or completely automating.
-UNCLASSIFIED- Missile Defense Exercise Planning Presented By: Mr. Ohad Elbahar Israel Missile Defense Organization May First Annual Israel Multinational.
1 These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 5/e and are provided with permission by.
Space-Based Network Centric Operations Research. Secure Autonomous Integrated Controller for Distributed Sensor Webs Objective Develop architectures and.
Command and Control Modeling in Soar Randall W. Hill, Jr. Jonathan Gratch USC Information Sciences Institute.
8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Continuous Planning and Collaboration for Command and Control.
Intelligent Large Scale Sensing Systems (ILS 3 ) initiative Initiative Status and Activities Kevin M. McNeill, PhD Research Assoc. Professor Director,
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
1-1 System Development Process System development process – a set of activities, methods, best practices, deliverables, and automated tools that stakeholders.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
1 USC INFORMATION SCIENCES INSTITUTE CALO, 8/8/03 Acquiring advice (that may use complex expressions) and action specifications Acquiring planning advice,
1 Introduction to Software Engineering Lecture 1.
Boundary Assertion in Behavior-Based Robotics Stephen Cohorn - Dept. of Math, Physics & Engineering, Tarleton State University Mentor: Dr. Mircea Agapie.
Large Scale Visualization Environment and Decision-Centered Visualization Cdr. Robert Barton Naval Undersea Warfare Center Newport, Rhode Island USA L.
THE ROLE AND USE OF MILITARY HISTORY. Integrate Historical Awareness and Critical Thinking Skills Derived from Military History Methodologies into the.
Leaders Training Program, JRTC TOC OPERATIONS. Leaders Training Program, JRTC CONSIDERATIONS DON’T BE TOO AUSTERE. MUST HAVE SUFFICIENT ROOM AND PEOPLE.
Military Decision-Making Process
Information & Decision Superiority Case studies in applying AI planning technologies to military & civil applications Dr Roberto Desimone Innovations.
Advances in Decision Modeling: The DMSO Vector Lt Col Eileen A. Bjorkman Chief, Concepts Application Division Zach Furness C4I Program Manager 31 July.
Woburn, MA ▪ Washington, DC © 2008, Aptima, Inc. Mission Plan Recognition: Developing Smart Automated Opposing Forces for Battlefield Simulations.
Assessing the Military Benefits of NEC Using a Generic Kill-Chain Approach David Nevell QinetiQ Malvern 21 ISMOR September 2004.
Integrated Framework for Decision Support in Planning OSU LAIR in collaboration with Richard Kaste and Mike Barnes (ARL) and Patricia McDermott (MAAD)
Military Decision Making Process (MDMP)
Welcome to the Military Decision Making Process (MDMP) Class. There are seven parts to the MDMP class. This class covers part 1, Receipt of Mission. Review.
Measuring Performance Why Measures:- What can not be measures - it cannot be managed.
Tatiana Kichkaylo with Dave Barnhart and Lucy Hoag USC Information Sciences Institute.
Reconnaissance and Surveillance Leader Course OPFOR TTP.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Synthetic Forces Behavioral Architecture Ian Page
By CPT Robert L. Crabtree
Boeing-MIT Collaborative Time- Sensitive Targeting Project July 28, 2006 Stacey Scott, M. L. Cummings (PI) Humans and Automation Laboratory
JNTC Joint Management Office
THIRD FLEET COMTHIRDFLT Crisis Planning & HA/DR Exercise Strong Angel THIRD FLEET HA/DR Team COMTHIRDFLT COMTHIRDFLT.
National Training Center
TRAIN THE FORCE AVIATION TRAINERS AIR-GROUND INTEGRATION EAGLE TEAM.
HR Elements for HR Practitioners 1 Lesson 7: Performance Management Duration: 1 hour, 30 minutes Performance Management Slide 7- 1.
Flexible Group Behavior USC/ISI 1-5 November 1999 Synthetic Forces Advanced Simulation Technology Thrust Final Program Review Flexible Group Behavior Randall.
Action Editor Storyboard
Passage of Lines. Passage of Lines Purpose To provide guidance and de-conflict Passage of Lines procedures for the 505th RCT Light/Heavy Task Force.
Material available from the HPKB COA challenge problem
UNCLASSIFIED MASA Sword UNCLASSIFIED.
Model-Driven Analysis Frameworks for Embedded Systems
Role and Plan - Demand Demand Team assesses the scope of this capability and the levels of usefulness. Step 1 – Read relevant articles and After-Action.
Alternate Scenario 3 Sustainment Brigade
COA critiquing through normative simulation
PERFORMING AS ADA LNO.
Presentation transcript:

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Deriving Priority Intelligence Requirements for Synthetic Command Entities Jonathan Gratch, Stacy Marsella, Randall Hill, Jr. USC Information Sciences Institute LTC George Stone III JSIMS JPO

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Project Goals Develop autonomous command forces –Act autonomously for days at a time Reduce load on human operators –Behave in human-like manner Produce realistic training environment –Perform C 3 I functions Reduce the number of human operators Create realistic organizational interactions

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Command Force Requirements Intelligence –Identifying intelligence requirements –Focusing intelligence collection –Modeling intel constraints on planning Companion paper: –Continuous Planning and Collaboration for Command and Control in Joint Synthetic Battlespaces

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Motivation Good progress in simulating C 2 –e.g. DARPA’s CFOR and ASTT Programs Largely ignored intelligence issues e.g. STOW program did model Sensor platforms like JSTARS Information networks like CGS Intelligence system Did not model How information transformed into intelligence Collection management

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Intelligence critical for realistic C 2 Close interplay between intelligence and COA Development Intelligence guides COA development COA development drives intelligence needs Intelligence availability constrains actions –Some COA must be abandoned if one can’t gather adequate intelligence

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Intelligence critical for realistic C 2 Intelligence constrains pace of battle When can a satellite observe? How long to insert surveillance (LRSU)? How long before I must commit to COA?

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Intelligence critical for realistic C 2 Intelligence collection must be focused –Commanders must: Prioritize their intelligence needs Understand higher-level intelligence priorities Provide intelligence guidance to subordinates e.g. Simulation Information Filtering Tool [Stone et. al]

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Priority Intelligence Requirements Focus on specification and use of PIR Information that directly feeds the key decisions that will determine the success or failure of the mission –Key component of Army mission planning Specified in CCIR section of Operation Orders –Specifies what Cdr wants to know about OPFOR –Drives position of sensors and observation posts

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training PIR Examples When will OPFOR first echelon reach our defenses Where is OPFOR main attack Where is the location of air defense units

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Software Requirements Allow human operator to specify PIR –To focus/prioritize reporting –To drive sensor placement Allow C 2 agents to identify own PIR –To ensure valid COA development –To ensure realistic pace of battle –To generate requests for external sensing assets e.g., satellites

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Example: Deep Attack Mission* Aviation brigade plans attack Attack as TD leaves assembly area TD Forward Assembly Area Corps intent: attack 2 nd echelon tank division (TD) * From FM 1-112

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Brigade Planning (simplified) –Identify Engagement Area (EA Pad) Should canalize OPFOR and restrict movement –Identify launch time Require 2-hour notice EA Pad AA Lincoln

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training PL ECHO Brigade PIR –When will TD leave AA Lincoln? Verifies enemy intent –When will TD reach PL Echo? Satisfies the need for 2-hour notice Further verifies enemy intent Location of PL Echo driven by PIR EA Pad AA Lincoln 2hrs

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training EA Pad PL ECHO Intelligence Plan SLAR Monitor movement from assembly area LRSU Trigger attack: TD 2hrs from EA Pad Assembly Area

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Final Brigade Plan Execute Mission Arrive at EA Break Contact Decision Point H H+2 H+3H-8 H-10 Insert LRSULRSU monitor PL Echo Deep Attack SLAR monitor AA

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Implementation Build on Soar-CFOR –Developed under CFOR and ASTT programs –Command agent modeling architecture –Have modeled Battalion and Company aviation C 2 Current Status –Building prototype of PIR capabilities –Initial focus on Army attack helicopter battalion

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Soar-CFOR Planner Continuous and collaborative planning Represents task hierarchies Records task dependencies –e.g. Task preconditions: To engage OPFOR, we must be at EA Pad at same time Represents planning assumptions –OPFOR unexpected during ingress

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Automating PIR Identify PIR in my own plans –Find preconditions, assumptions, and triggering conditions that are dependent on OPFOR behavior Extract PIR from higher echelon orders –Specialize as appropriate for my areas of operation Derive tasks for satisfying PIR –Sensor placement Ensure consistency of augmented plans

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Identifying PIR Examine COA dependencies on OPFOR –e.g. Precondition of engaging: OPFOR will-be-at EA Pad at time H+2 Look for dependencies that: –Are not under my direct control –Are uncertain Implemented with PIR recognition schema: –Abstract rules that scan plans and assert PIR Some domain-independent, some domain-specific

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Interpreting Higher-level Guidance Need to convert into PIR at my echelon –e.g. Brigade’s PIR: When will lead regiment reach forward defense becomes Battalion PIR When will lead battalion of lead regiment reach fwd def Implemented by specialization rules –Encode doctrinal and terrain relationships

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Deriving Sensor Plans Implemented via tactical planning mechanism –PIR represented as “knowledge goals” –Domain theory augmented with sensing tasks Sensing tasks achieve knowledge goals Tasks encode maneuver / temporal dependencies –Planning process fills in details Sensing tasks added to achieve knowledge goals –e.g. Observe TD activity near PL_ECHO Other tasks added to satisfy maneuver dependencies –e.g. Use UH-60 to insert LRSU near PL_ECHO

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Ensuring Consistency Implemented via tactical planning mechanism –If PIR goals cannot be satisfied, COA is invalid or Use unsatisfied PIR to request external assets Sensing plans constrain timing of events –If temporal constraints inconsistent, COA is invalid

8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Summary Goal: increase realism of training environment Approach: Model intelligence capabilities –Model interplay between intel and planning –Model intel constraints on pace of battle –Accept and obey intel priorities