Technology Applicability for Prediction & Recognition of Piracy Efforts NATO ASI September 2011 Salamanca, Spain.

Slides:



Advertisements
Similar presentations
Technology Module: Technology Readiness Levels (TRLs) Space Systems Engineering, version 1.0 SOURCE INFORMATION: The material contained in this lecture.
Advertisements

Technology readiness levels in a nutshell
Ergonomics and Information Systems RESEARCH INSTITUTE FOR COMMUNICATION, INFORMATION PROCESSING, AND ERGONOMICS FGAN A Knowledge-based Human-Machine Interface.
Bridgette Parsons Megan Tarter Eva Millan, Tomasz Loboda, Jose Luis Perez-de-la-Cruz Bayesian Networks for Student Model Engineering.
Intelligent Surface Threat Identification System (ISTIS) IEEE Aerospace Conference 2007 Presented by:Robert Richards, Ph.D.
National Biosurveillance Integration System (NBIS) Prepared for: Biosurveillance Information Exchange Working Group February 22, 2006.
Modeling Human Reasoning About Meta-Information Presented By: Scott Langevin Jingsong Wang.
W5HH Principle As applied to Software Projects
Decision Making: An Introduction 1. 2 Decision Making Decision Making is a process of choosing among two or more alternative courses of action for the.
1 CISR-consultancy Challenges “Customer ask us what to do next” Keywords: “Customer ask us what to do next” From Policy to Practise The world is going.
Presented to ISMORS September 2009 Dr. David S. Alberts Director, Research OASD/NII – DoD CIO Redefining the “M” in MOR st Century OR Challenges.
NATO Network Enabled Capabilities
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Process Query Systems ENGS 112 Lecture 7. Process Query Systems (PQS) vs Data Base Systems (DBS) Data Base System Process Query System Data Sources Data.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
12 -1 Lecture 12 User Modeling Topics –Basics –Example User Model –Construction of User Models –Updating of User Models –Applications.
Sylnovie Merchant, Ph.D MIS 210 Fall 2004 Lecture 1: The Systems Analyst Project Management MIS 210 Information Systems I.
Learning Outcomes at the University of North Alabama Dr. Andrew L. Luna Institutional Research, Planning, and Assessment.
Copyright R. Weber INFO 629 Concepts in Artificial Intelligence Fall 2004 Professor: Dr. Rosina Weber.
Self-Learning Ontologies Presented to the 25 th Soar Workshop Ann Arbor, MI June 15-17, 2005 Tim Darr, Ph. D. University of Michigan AI Lab ‘96.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Understanding Data Analytics and Data Mining Introduction.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
1 Lyle H. Ungar, University of Pennsylvania What is AI? “Artificial Intelligence is the study of how to make computers do things at which, at the moment,
Trust-based Multi-Objective Optimization for Node-to-Task Assignment in Coalition Networks 1 Jin-Hee Cho, Ing-Ray Chen, Yating Wang, and Kevin S. Chan.
Technology Input Formats and Background Appendix B.
Business Analysis and Essential Competencies
Overview of the ARIES “Pathways” Program Farrokh Najmabadi UC San Diego US-Japan Workshop on Power Plants Study and Related Advanced Technologies with.
Software Project Management Lecture # 7. Outline Project Scheduling.
Data Users Needs & Capacity Building International Programs National Agricultural Statistics Service United States Department of Agriculture November 2009.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Measuring the Quality of Decisionmaking and Planning Framed in the Context of IBC Experimentation February 9, 2007 Evidence Based Research, Inc.
Ocean Observatories Initiative OOI Cyberinfrastructure Architecture Overview Michael Meisinger September 29, 2009.
The Center for Space Research Programs CSRP Technology Readiness Level.
Brea-out Sessions Objectives. Breakout Sessions Starting from day 2 of the ARW there will be presentations in the morning and break-out sessions in the.
Understanding the Human Network Martin Kruger LCDR Jodie Gooby November 2008.
SponsorProblem AssessRisk SolutionStrategy Measures of Merit (MoM) Human & OrganisationalIssues Scenarios Methods & Tools Data Products
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
AN INTELLIGENT AGENT is a software entity that senses its environment and then carries out some operations on behalf of a user, with a certain degree of.
Practical Investment Assurance Framework PIAF Copyright © 2009 Group Joy Pty. Ltd. All rights reserved. Recommended for C- Level Executives.
1 MRL Assist Tool Website Access the MRL Assist Tool at
CS532 TERM PAPER MEASUREMENT IN SOFTWARE ENGINEERING NAVEEN KUMAR SOMA.
EUCISE 2020 EUCISE 2020 has received funding from the European Union’s seventh framework programme under grant agreement no: Participating Countries:
National Council of Teachers of Mathematics Principles and Standards for grades pre-K-2.
Software Architecture Evaluation Methodologies Presented By: Anthony Register.
LEADER AND POWER AKTIVITI: SEJAUH MANA ANDA BERKUASA ATAU BERPENGARUH? 1.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
1 1 Title of Proposal Programme/Topic Number: SSH Type of Proposal; Collaborative Project (Small) Proposal Number: Programme/Topic Number: SSH
Assessment of Fusion Development Path: Initial Results of the ARIES “Pathways” Program Farrokh Najmabadi UC San Diego ANS 18 th Topical Meeting on the.
1 Power to the Edge Agility Focus and Convergence Adapting C2 to the 21 st Century presented to the Focus, Agility and Convergence Team Inaugural Meeting.
 CMMI  REQUIREMENT DEVELOPMENT  SPECIFIC AND GENERIC GOALS  SG1: Develop CUSTOMER Requirement  SG2: Develop Product Requirement  SG3: Analyze.
SSE3 Knowledge mangement concepts 1. Agenda What is knowledge management Classification of knowledge Knowledge management process Common/shared information.
Cross-Domain Semantic Interoperability ~ Via Common Upper Ontologies ~ Presentation to: Expedition Workshop #53 15 Aug 2006 James Schoening
Network Centric Planning ---- Campaign of Experimentation Program of Research IAMWG Dr. David S. Alberts September 2005.
OUTCOMES OBJECTIVES FUNCTIONS ACTIONS TERRITORIES LOCATIONS MARKET SEGMENTS TIME LINESCHALLENGE IMPACT RESOURCESACTIVITIESCHANNELS RELATIONS PARTNERS CUSTOMERS.
What are your thoughts about Diverse Cultural Perspectives; particularly the section on Aboriginal Learners. Do you feel this is a true account of Mi'kmaq-Maliseet.
1 Chapter 1 Introduction to Accounting Information Systems Chapter 2 Intelligent Systems and Knowledge Management.
Functionality of objects through observation and Interaction Ruzena Bajcsy based on Luca Bogoni’s Ph.D thesis April 2016.
Stages of Research and Development
Dr. Thomas D. Fiorino November 2002
Technology Readiness Assessment (TRA)
NDIA Architecture Analysis for System-of-System (SoS) Interoperability Assessment Karen L. Lauro, Ph.D Oct 21, 2003.
Cyber Security coordination in Europe CERT-EU’s perspective
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Software Project Sizing and Cost Estimation
Concept Idea Title Summary of the effort to include:
LEADER AND POWER AKTIVITI: SEJAUH MANA ANDA BERKUASA ATAU BERPENGARUH?
Counter UAV program within NATO Joint Capability Group on Ground Based Air Defence by Fred Klumpers (NLD-MoD) Chairman JCGGBAD NATO UNCLASSIFIED.
G. Technology Readiness Levels (TRL*)
Presentation transcript:

Technology Applicability for Prediction & Recognition of Piracy Efforts NATO ASI September 2011 Salamanca, Spain

Approach Decompose the process of predicting and characterizing piracy attacks (the mission) into a set of technical issues (i.e. needed capabilities which technology might help provide) For each such issue, list potential technical solutions in terms of their maturity and potential effectiveness in resolving the issue

Definitions and Metrics (1 of 2) Mission Capability: the ability to predict and recognize piracy efforts sufficiently to support effective responses Issue: A technical problem relevant to achieving the mission capability Criticality: the degree to which achieving the mission capability depends on resolving the given issue: i.e. finding a solution to the given problem: Analogous Applications: other mission capabilities that involve related technical issues MostLeast

Definitions and Metrics (2 of 2) Applicable Techniques: technologies or designs that might be used to solve the given issue Effectiveness: the degree to which the given technique could provide a solution to the given problem: Maturity: the technology readiness level (TRL) of the given technique (defined in the next chart): Recommendations: Suggested actions for NATO or NATO members to solve the given issues LeastMost TRL 0-1TRL 2-3TRL 4-5TRL 6-7TRL 8-9

Technology Readiness Levels TRL 1Basic principles observed & reported TRL 2Technology concept & application formulated TRL 3Proof of concept TRL 4Component validated in lab environment TRL 5Component validated in relevant environment TRL 6Prototype demonstration in relevant environment TRL 7Prototype demonstration in operations environment TRL 8System completed and qualified through test & demonstration TRL 9System proven through successful mission operations

Technology Applicability to Counter Piracy: Lower-Level Knowledge Development (1 of 2) Issue Criticality Analogous Applications Applicable Techniques Effective ness Maturity Recommen dations Wide Area Sensor Coverage Cooperative (e.g. AIS) Patrol Aircraft\ Long Endurance UAV Space Imagery Data Dissemination Data Alignment Multi-INT registration Poisson Point registr. Evidence conditioning Uncertainty Representation Bayesian Evidential Semantic Data Association MHT (J)PDA PHD

Technology Applicability to Counter Piracy: Lower-Level Knowledge Development (2 of 2) Issue Criticality Analogous Applications Applicable Techniques Effective ness Maturity Recommen dations Target Detection Model-Based Anomaly-Based Target Location/ Tracking KF, EKF, IMM Particle Filter PDF Target Type Classification Statistical Pattern Rec Syntactic Neural Net Explanation-Based Target Attributes Syntactic Explanation-Based Target Activity Case-Based Correlation-Based

Technology Applicability to Counter Piracy: Higher-Level Knowledge Development (1 of 2) Issue Criticality Analogous Applications Applicable Techniques Effective ness Maturity Recommen dations Data Mining Semantic Extraction Numeric/Symbolic Data Fusion Complexity Management Situation Representation Ontology Management Situation Model Management

Technology Applicability to Counter Piracy: Higher-Level Knowledge Development (2 of 2) Issue Criticality Analogous Applications Applicable Techniques Effective ness Maturity Recommen dations Relationship Characterization Network Characterization Situation Characterization Situation Tracking Scenario Recognition Threat Event Prediction Indications and Warning

Technology Applicability to Counter Piracy: Decision Support Issue Criticality Analogous Applications Applicable Techniques Effective ness Maturity Recommen dations Situation Presentation Presentation of Situation Dynamics Uncertainty Presentation Conditional/Counter- factual Presentation Data Entry Hard/ Soft Data Fusion Operator Control Collaboration Tools

Threat Assessment Functions Threat Event Prediction: Determining likely threat events (“threatened events” or “attacks”): who, what, where, when, why, how Indications and Warning: Recognition that an attack is imminent or under way Threat Entity Detection and Characterization: determining the identities, attributes, composition, location/track, activity capability, intent of agents and other entities involved in a threatened or current attack Attack (or Threat Event) Assessment: –Responsible parties (country, organization, individuals, etc.) and attack roles; –Intended target(s) of attack; –Intended effect (e.g. physical, political, economic, psychological effects); –Threat capability (e.g. weapon and delivery system characteristics); –Force composition, coordination and tactics (goal and plan decomposition); Consequence Assessment: Estimation & prediction of event outcome states (threatened situations) and cost/utility to the responsible parties, to affected parties or to system user. Can include both intended & unintended consequences