Net-centric User Knowledge Assessment Chris Isgrig CMSC 601_SP11.

Slides:



Advertisements
Similar presentations
Developing online Learning Dr Derek France Department of Geography Chester College of H.E. GEES.
Advertisements

1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.
An Introduction to Computer- assisted Assessment Joanna Bull and Ian Hesketh CAA Centre Teaching and Learning Directorate.
Department of Electronic Engineering Challenges & Proposals INFSO Information Day Research Networking Test-beds 26/27 May 2005,
The 20th International Conference on Software Engineering and Knowledge Engineering (SEKE2008) Department of Electrical and Computer Engineering
DoD Information Enterprise Architecture v2.0
1 Copyright © 2010 AQA and its licensors. All rights reserved. Introduction to the new specification GCSE Computer Science Paul Varey.
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 1998 by Carnegie Mellon.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
4.1 Blended approaches: Information Engineering IMS Information Systems Development Practices.
Connecting People With Information Conclusions DoD Net-Centric Data Strategy (DS) and Community of Interest (COI) Training For further information .
Latent Semantic Analysis
Build Air Force OneSource in the Cloud for the Data.Gov and Open Government Vocabulary Teams UDEF Deployment Workshop Planning Meeting at the Open Group.
Software Engineering Techniques for the Development of System of Systems Seminar of “Component Base Software Engineering” course By : Marzieh Khalouzadeh.
Saudi Aramco Industrial Security Operation’s C2 Roadmap
Latent Semantic Analysis (LSA). Introduction to LSA Learning Model Uses Singular Value Decomposition (SVD) to simulate human learning of word and passage.
TALOE – Time to Assess Learning Outcomes in E-learning
Solid Catalysts – Synthesis and Characterisation Techniques Emmanuel Iro.
Usability Evaluation of Digital Libraries Stacey Greenaway Submitted to University of Wolverhampton module Dec 15 th 2006.
Leveraging Collaborative Technologies for Sharing Tacit Knowledge: An Integrative Model (Research in progress) Vikas Sahasrabudhe
Introduction.  Classification based on function role in classroom instruction  Placement assessment: administered at the beginning of instruction 
A Net-Centric DoD NII/CIO Power to the Edge 1 October, 2003 Harriet Riofrio DASD(DCIO), OASD(NII) (703)
28 August 2015T Kari Laitinen1 T Seminar on Wireless Future 3 ECTS cr Dr. Kari Laitinen Principal Lecturer Oulu University of Applied Sciences.
DoD Architecture Registry System DARS 16 September 2009 Walt Okon Senior Architect Engineer Senior Architect Engineer for Information Sharing Enterprise.
Global Information Literacy Moves Toward Web 3.0 by Valerie Hill, PhD by Valerie Hill, PhD TWU School of Library & Information Studies, LISD School Librarian.
A National Resource Working in the Public Interest © 2006 The MITRE Corporation. All rights reserved. KM at MITRE Jean Tatalias KM TEM, December 2007.
1 Blended Training Solutions  2001 Bradley Lambert, Inc. Leveraging Blended Training Solutions Presented by Marla Bradley, CEO BRADLEY LAMBERT, INC. Los.
1 IEEE TRANSACTION ON KNOWLEDGE AND DATA ENGINEERING, VOL. 15 NO.5, SEPTEMBER/OCTOBER 2003 Manuscript received 10 July 2000; received 2 Jan. 2001; accept.
Human and Institutional Capacity Development Project in Rwanda (HICD-R) CORE TEAM KM WORKSHOP February 26, 2015 Delivered by Courtney Roberts.
CMMi What is CMMi? Basic terms Levels Common Features Assessment process List of KPAs for each level.
Requirements Engineering CSE-305 Requirements Engineering Process Tasks Lecture-5.
The Evolution of WebPA, an online peer moderated marking system, at Loughborough Melanie Bates, Learning Technology Co- ordinator Loughborough University.
Use of Hierarchical Keywords for Easy Data Management on HUBzero HUBbub Conference 2013 September 6 th, 2013 Gaurav Nanda, Jonathan Tan, Peter Auyeung,
CSC-532 Term Paper INTEROPERABILITY MODELS Hitesh Nagda.
D1.HGE.CL7.01 D1.HGA.CL6.08 Slide 1. Introduction Design, prepare and present reports  Classroom schedule  Trainer contact details  Assessments  Resources:
Gifted Referral Process and Other Important Information
1 Services and Cloud Computing Work Groups: Status Update Brand Niemann US EPA December 18, 2009.
Signal Processing Emphasis Group Robert Moorhead Roger King Joe Picone Nick Younan Jim Fowler Lori Bruce Jenny Du.
CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241.
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
CONCLUSION & FUTURE WORK Normally, users perform search tasks using multiple applications in concert: a search engine interface presents lists of potentially.
EDUCAUSE 2005 Annual Conference October 19, 2005.
Defense Information Systems Agency A Combat Support Agency E3 Engineering Division 13 December 2011 Defense Information Systems Agency A Combat Support.
Mobility in the UK Government Statistical Service Anne Foulger.
A Deception Framework for Survivability Against Next Generation Cyber Attacks Ruchika Mehresh and Shambhu Upadhyaya Department of Computer Science and.
Advanced Computer and Network Security Fall 2014 Instructor: Haining Wang.
Harvesting Social Knowledge from Folksonomies Harris Wu, Mohammad Zubair, Kurt Maly, Harvesting social knowledge from folksonomies, Proceedings of the.
Requirement Engineering. Recap Elaboration Behavioral Modeling State Diagram Sequence Diagram Negotiation.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
Leveraging Drupal to Move to a Distributed Authorship Model.
Unit for the Enhancement of Learning and Teaching Assessment Development.
From NARS to a Thinking Machine Pei Wang Temple University.
By: Niraj Kumar Automatic Essay Grading Novelty Detection 1. 2.
Cloud Multi-domain Access Control Model Based on Role and Trust-degree Lixia Xie Chong Wang School of Computer Science and Technology Civil Aviation University.
A Simple English-to-Punjabi Translation System By : Shailendra Singh.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Automated Essay Scoring The IntelliMetric® Way
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
Development of Assessment Literacy Knowledge Base
Program Executive Office GIG Enterprise Services (PEO-GES)
ASSESSMENT OF STUDENT LEARNING
Enterprise Productivity Services
Design & Technology Department Port Glasgow High School
PEDAGOGY OF SCIENCE AT THE TERTIARTY LEVEL IN NIGERIA
Smart Learning concepts to enhance SMART Universities in Africa
Jana Diesner, PhD Associate Professor, UIUC
Ensuring Success through Assessment – Introduction
IT Management Services Infrastructure Services
SOCIAL LEARNING analytics
Presentation transcript:

Net-centric User Knowledge Assessment Chris Isgrig CMSC 601_SP11

Introduction Over the past 20-years, the Department of Defense (DoD) has had the goal of evolved from being “platform- centric” to becoming “network-centric” (net-centric). The enabling technology for the net-centric concept is Quality of Service (QoS) Networked systems are causing people to loose contact The cloud is made out of people Personnel structures are more distributed as “matrixed” organizations and “virtual” teams. How are the people in the “cloud” going to be selected, trained or promoted?

DIKW Hierarch

Theoretical Framework and Enabling Concepts QoS

Technical or Social The stated intent of the net-centric concept is to have systems and organizations that are built around human and organizational behavior. The stated goal is to change human and organizational behavior through technology

Problem The net-centric concept requires that all of the data be visible and available to the users Some of the system’s data and all of the system’s knowledge is in the users’ heads. It there a way to find out what the users know?

Selected References "Net-Centric Checklist", Version 2.1.3, May 12, DOD OASD NII DCIO. Alberts, D. S., Garstka, J., & Stein, F. (1999). Network Centric Warfare: Developing and Leveraging Information Superiority. Wasshington, DC: CCRP. Alberts, D. S., & Hayes, R. E. (2003). Power to the edge : command and control in the information age Washington, DC. Attali, Y., Bridgeman, B., & Trapani, C. (2010). Performance of a Generic Approach in Automated Essay Scoring. Journal of Technology, Learning, and Assessment, 10(3). Bentham, J. (1787). The Panopticon Writings. London: Verso. Christie, J. (2003). Automated essay marking for content ~ does it work. Loughborough, UK: Loughborough University. Clariana, R. B.(2010). Multi-decision Approaches for Eliciting Knowledge Structure. New York, NY: Springer. Kaplan, J. M. (2006). A New Conceptual Framework for Net-Centric, Enterprise-Wide, System-of-Systems Engineering, National Defense Univ Washington DC Center For Technology National Security Policy. Ft. Belvoir. Lajis, A., & Aziz, N. A. (2010). NL Scoring Technique for the Assessment of Learners' Understanding. Paper presented at the Second International Conference on Computer Research and Development, 2010 Kuala Lumpur. Landauer, T. K., Foltz, P., & Laham, D. (1998). An Introduction to Latent Semantic Analysis. Discourse Processes, 25, Page, E. B. (1967). Statistical and linguistic strategies in the computer grading of essays. Paper presented at the Proceedings of the 1967 conference on Computational linguistics. Phister, P. W., & Plonish, I. G. (2004). Information and Knowledge Centric Warfare: The Next Steps in the Evolution of Warfare. Rome, NY.

Approach Assess current systems to determine if it is currently possible to locate knowledge on a network. Develop a method that provides progress toward that goal.

AES Methods Statistical Analysis of Features Latent Semantic Analysis (LSA) Natural Language Processing (NLP) “Bag of Features” “Bag of Words” “Bag of Triples”

Measuring Conformity Which is the better Mona Lisa? Which would an automated system give the higher score?

Can it “Get” a Joke “ I met a man who said he had not had a bite in three days…so I bit him…” I Met Given Food Given Bite Man Wants Food Wants Bite Ambiguity

Human Scoring Subjective Inconsistent Can be modeled

Bloom’s Taxonomy

Current AES Ability

Questions ?