Intelligent Surface Threat Identification System (ISTIS) IEEE Aerospace Conference 2007 Presented by:Robert Richards, Ph.D.

Slides:



Advertisements
Similar presentations
Some Reflections on Augmented Cognition Eric Horvitz ISAT & Microsoft Research November 2000 Some Reflections on Augmented Cognition Eric Horvitz ISAT.
Advertisements

Visualisation issues in the context of Information Fusion Jean-Rémi Duquet Lockheed Martin Canada Jean-Yves Fiset Systèmes Humains-Machines Inc Hélène.
Ergonomics and Information Systems RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING, AND ERGONOMICS FGAN A Knowledge-based Human-Machine Interface.
OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
Systems Analysis and Design 9th Edition
Systems Analysis and Design 8 th Edition Chapter 3 Managing Systems Projects.
Becerra-Fernandez, et al. -- Knowledge Management 1/e -- © 2004 Prentice Hall Chapter 7 Technologies to Manage Knowledge: Artificial Intelligence.
Systems Analysis and Design 8th Edition
Chapter 11 Artificial Intelligence and Expert Systems.
Process Query Systems ENGS 112 Lecture 7. Process Query Systems (PQS) vs Data Base Systems (DBS) Data Base System Process Query System Data Sources Data.
Automated Changes of Problem Representation Eugene Fink LTI Retreat 2007.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Decision Support Systems Decision Support MIS and DSS Artificial Intelligence Expert Systems Chapter 9 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill.
A Decision Support System For Civil Protection Prof. Thanasis Ziliaskopoulos University of Thessaly Hellenic Institute of Transport International Conference.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 7: Expert Systems and Artificial Intelligence Decision Support.
Review 4 Chapters 8, 9, 10.
1/1/ Designing an Ontology-based Intelligent Tutoring Agent with Instant Messaging Min-Yuh Day 1,2, Chun-Hung Lu 1,3, Jin-Tan David Yang 4, Guey-Fa Chiou.
Chapter 12: Intelligent Systems in Business
“Get outa here!”.
Eleventh Edition 1 Introduction to Essentials for Information Systems Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Eleventh Edition 1 Introduction to Essentials for Information Systems Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Feasibility Criteria for Investigating Potential Application Areas of AI Planning T.L.McCluskey, The University of Huddersfield,UK
Business Intelligence in Crime Ji Zhang Lucas Matecki Lamont Davis Jenny Brunnert.
Using the Engaging Networks tools Ghazal Vaghedi Toronto February 21, 2012 #12ENCONF.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Enabling the Organization – Decision Making CHAPTER 09 Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Chapter 11 Managing Knowledge. Dimensions of Knowledge.
Expert Systems Infsy 540 Dr. Ocker. Expert Systems n computer systems which try to mimic human expertise n produce a decision that does not require judgment.
C OLUMBIA U NIVERSITY Lightwave Research Laboratory Embedding Real-Time Substrate Measurements for Cross-Layer Communications Caroline Lai, Franz Fidler,
California Common Operating Picture (Cal COP) for Public Safety
© Copyright 2005 Synthosys Synthosys 1 Federal Street L3 Ops Communications Bldg - ACIN Camden, NJ Contact: Linda Yu, President CEO (610)
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
Technology Applicability for Prediction & Recognition of Piracy Efforts NATO ASI September 2011 Salamanca, Spain.
Succeeding with Technology Information, Decision Support… Decision Making and Problem Solving Management Information Systems Decision Support Systems Group.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Chapter 14: Artificial Intelligence Invitation to Computer Science, C++ Version, Third Edition.
Fault Diagnosis System for Wireless Sensor Networks Praharshana Perera Supervisors: Luciana Moreira Sá de Souza Christian Decker.
Business Analysis and Essential Competencies
PLUG IT IN 5 Intelligent Systems. 1.Introduction to intelligent systems 2.Expert Systems 3.Neural Networks 4.Fuzzy Logic 5.Genetic Algorithms 6.Intelligent.
11 C H A P T E R Artificial Intelligence and Expert Systems.
Presented by Abirami Poonkundran.  Introduction  Current Work  Current Tools  Solution  Tesseract  Tesseract Usage Scenarios  Information Flow.
© 2007 Tom Beckman Features:  Are autonomous software entities that act as a user’s assistant to perform discrete tasks, simplifying or completely automating.
Central Monitoring Station Marketing Dept. July 2005.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Artificial intelligence systems form a broad and diverse set of.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Advanced Decision Architectures Collaborative Technology Alliance Regulating the Exchange of Tactical Information Using the KAoS Policy Services Framework.
Polymorphous Computing Architectures Run-time Environment And Design Application for Polymorphous Technology Verification & Validation (READAPT V&V) Lockheed.
Management Platforms. SMFA In TMN the intent is to define a realitivly common set of what can be supported by CMISE network elements and managed via a.
Understanding the Human Network Martin Kruger LCDR Jodie Gooby November 2008.
PLUG IT IN 5 Intelligent Systems. 1.Introduction to intelligent systems 2.Expert Systems 3.Neural Networks 4.Fuzzy Logic 5.Genetic Algorithms 6.Intelligent.
 Dr. Syed Noman Hasany.  Review of known methodologies  Analysis of software requirements  Real-time software  Software cost, quality, testing and.
Fundamentals of Information Systems, Third Edition1 The Knowledge Base Stores all relevant information, data, rules, cases, and relationships used by the.
Eleventh Edition 1 Introduction to Essentials for Information Systems Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
PowerPoint Presentation by Charlie Cook Copyright © 2004 South-Western. All rights reserved. Chapter 5 Business Intelligence and and Knowledge Management.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 Click to edit Master title style What is Business Analysis Body of Knowledge?
Unclassified//For Official Use Only 1 RAPID: Representation and Analysis of Probabilistic Intelligence Data Carnegie Mellon University PI : Prof. Jaime.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
ITEC 1010 Information and Organizations Chapter V Expert Systems.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
GTECH 361 Lecture 09 Features in the Geodatabase.
WORKSHOP ON ACCREDITATION OF BODIES CERTIFYING MEDICAL DEVICES INT MARKET TOPIC 9 CH 8 ISO MEASUREMENT, ANALYSIS AND IMPROVEMENT INTERNAL AUDITS.
Avivim TA’s Mobility management system. Urban Mobility Management Concept Transportation objectives often conflict  Accessibility Vs. Mobility  Efficiency.
U.S. DOT Next Generation Project: A National Framework and Deployment Plan Summit for Large Cities Chicago, IL – May 21, 2009.
CHAPTER ELEVEN MANAGING KNOWLEGE. Objectives We have been through some of this already Role of knowledge management Types of knowledge management systems.
Use of Soar for Modeling Cyber Operations 36 th Soar Workshop Ann Arbor, Michigan Denise Nicholson, Ph.D., Director of X Ryan O’Grady, Software Engineer.
Artificial Intelligence, P.I
Cyber Security coordination in Europe CERT-EU’s perspective
MANAGING KNOWLEDGE FOR THE DIGITAL FIRM
Geospatial and Problem Specific Semantics Danielle Forsyth, CEO and Co-Founder Thetus Corporation 20 June, 2006.
Presentation transcript:

Intelligent Surface Threat Identification System (ISTIS) IEEE Aerospace Conference 2007 Presented by:Robert Richards, Ph.D.

Objectives Improve Littoral ID Process, quality, and efficiency – Better ID estimations from available data – Sooner ID determinations – Prevention of ID “Surprises” – Better use of scarce ID resources Investigate littoral, surface ID techniques Implement in the Intelligent Surface Threat ID System (ISTIS)

Related Projects Intelligent Identification Software Module (IISM) LCS Undersea Threat Assessment TAO ITS and ITS authoring tool GRTS TAO ITS Navy Tactics Representation and Execution System (TRES) Visual Intelligent Behavior Authoring (SimBionic) Advanced Early Warning Real-Time Advisory System (AEW/RTAS)

Motivation: Current Identification Problems Wide variation in ID abilities Knowing whose-who even after ID information received Track Split/Merge Maintaining Competing Hypotheses for a track Classified Automatic Track ID Problems Remembering Track History (both short and long-term) Analyzing behavior/correlations Correlating new tracks with previous tracks Knowing/Executing Optimal ID Procedures Quickly Assessing Threat

Architecture

AI Techniques Truth MaintenanceTruth Maintenance Case-Based ReasoningCase-Based Reasoning Behavior Transition Networks (BTNs)Behavior Transition Networks (BTNs) Fuzzy LogicFuzzy Logic Pattern Recognition/LearningPattern Recognition/Learning Constraint-Based Planning, Scheduling, and Resource OptimizationConstraint-Based Planning, Scheduling, and Resource Optimization Knowledge Elicitation / Cognitive Task AnalysisKnowledge Elicitation / Cognitive Task Analysis Expert SystemsExpert Systems

Example of Density of Contacts that Need Monitoring and Assessing

Example Scenario 1

Example Scenario 2.1

Example Scenario 2.2

Example Scenario 2.3

Example Scenario 2.4

Example Scenario 2.5 (Pause)

Example Scenario 2

ISTIS Capabilities Intelligent Tactical Memory:  Track attributes (position, velocity, ID information, History)  Associate previous tracks with new track information.  Complete track history (track merge or ID swap)  Past Relevant Tracks/Patterns used to recommend/warn  Definable ID, Threat Assessment, & Notification Criteria  Intelligent Track History Analysis (position/velocity/proximity/interactions/behavior correlations) to estimate associations & hostile intentions  Multiple Competing Hypotheses for ID (type/owner country) with Hierarchy of possible ID values (type, color/country)

ISTIS Capabilities (More & Re-stated) Merge-Split Processing for Radar Merges and Track Fades and Reasoning through Multiple Hypotheses Maneuver Correlation Detection Surface ID Processing, Fusion, and Behavior Analysis Action Recommendation based on Heuristics Route Planning to ID a Set of Contacts and/or Search an Area Ability of Tactical Personnel to Edit and Change ID, Alerting, and Recommendation Behaviors in Real-time

ISTIS Dynamic Map Display

ISTIS Track Information, Recommendations, and Alerts Display

Demonstration Strait of Malacca Alerts: Leaving commercial lanes / intercepting Merge-Split: automatic reasoning backward and forward Multiple hypothesis / Hierarchical reasoning Intercept/formation maneuver correlations Heading and UAV recommendations Immediate Threat alert Demo video

Conclusion ISTIS is an AI system that improves the Littoral ID Process, quality, and efficiency by – Better ID estimations from available data Tracking ambiguous signals storing and handling past target data – Sooner ID determinations – Prevention of ID “Surprises” assessing threat levels & notifying users of alert conditions – Better use of scarce ID resources filtering out insane data keeping track of multiple track hypotheses based on the fusion of evidence from multiple sources Capable today and continuing to be enhanced Lockheed Martin (a LCS Builder) is partner Interested in other potential users or partners

Intelligent Surface Threat Identification System (ISTIS) IEEE Aerospace Conference 2007 Presented by:Robert Richards, Ph.D.