Sensor-Mission Assignment: A Scenario-Driven Walkthrough

Slides:



Advertisements
Similar presentations
Geoinformatics 2008 Fox Semantic Provenance 1 Semantic Provenance for Image Data Processing Peter Fox (HAO/ESSL/NCAR) Deborah McGuinness (RPI) Jose Garcia,
Advertisements

Service Oriented Architecture Reference Model
1 Probability and the Web Ken Baclawski Northeastern University VIStology, Inc.
Web Service Modelling Ontology (WSMO)
…to Ontology Repositories Mathieu dAquin Knowledge Media Institute, The Open University From…
Doc.: IEEE /0046r0 Submission July 2009 Ari Ahtiainen, NokiaSlide 1 A Cooperation Mechanism for Coexistence between Secondary User Networks on.
Fuzzy Angle Fuzzy Distance + Angle AG = 90 DG = 1 Annual Conference of ITA ACITA 2009 Exact and Fuzzy Sensor Assignment Hosam Rowaih 1 Matthew P. Johnson.
Baltimore April 2012 International Technology Alliance in Network and Information Sciences Tasking and Sharing Sensing Assets Using Controlled Natural.
Fall Meeting October 2013 International Technology Alliance in Network and Information Sciences Human-Machine Conversations to Support Coalition Missions.
Reasoning and Resource Allocation for Sensor- Mission Assignment in a Coalition Context A. Preece, D. Pizzocaro, K. Borowiecki (Cardiff University, UK)
Annual Conference of ITA ACITA 2009 Knowledge-Driven Agile Sensor-Mission Assignment A. Preece*, D. Pizzocaro*, K. Borowiecki*, G. de Mel, W. Vasconcelos,
International Technology Alliance in Network & Information Sciences Dave Braines, John Ibbotson, Graham White (IBM UK) SPIE Defense Security & Sensing.
Armstrong Process Group, Inc. Copyright © , Armstrong Process Group, Inc., and others All rights reserved Armstrong Process.
SOA for EGovernment 1 Emergency Services Enterprise Framework: A Service-Oriented Approach Sukumar Dwarkanath COMCARE Michael Daconta Oberon Associates.
Designing Services for Grid-based Knowledge Discovery A. Congiusta, A. Pugliese, Domenico Talia, P. Trunfio DEIS University of Calabria ITALY
Scoping the Framework Guidelines on Interoperability Rules for European Gas Transmission Geert Van Hauwermeiren Workshop, Ljubljana, 13 Sept 2011.
Bio-mimetic Control Research Center, RIKEN Guided learning from images using an uncertain granular model and bio-mimicry of the human fovea Jonathan Rossiter.
Database Design: ER Modelling (Continued)
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences Paul Smart, Ali.
1 Computational Asset Description for Cyber Experiment Support using OWL Telcordia Contact: Marian Nodine Telcordia Technologies Applied Research
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 14 Slide 1 Object-oriented Design 1.
© 2009 IBM Corporation iEA16 Defining and Aligning Requirements using System Architect and DOORs Paul W. Johnson CEO / President Pragmatica Innovations.
Configuration management
Software change management
Configuration management
Chapter 5 – Enterprise Analysis
A Roadmap to Successful Implementation Management Plans.
Safety Cases: Purpose, Process and Prospects John McDermid, OBE FREng University of York UK.
Testing Workflow Purpose
June, 2006 The 11th CAiSE06 International Workshop on Exploring Modeling Methods in Systems Analysis and Design (EMMSAD06), Luxembourg Ontological.
Ontology-based User Modeling for Web-based Information Systems Anton Andrejko, Michal Barla and Mária Bieliková {andrejko, barla,
Describing Complex Products as Configurations using APL Arrays.
“The Honeywell Web-based Corrective Action Solution”
Proposal by CA Technologies, IBM, SAP, Vnomic
1 Towards Building Generic Grid Services Platform A component oriented approach Jeyarajan Thiyagalingam Stavros Isaiadis, Vladimir Getov Distributed and.
TU e technische universiteit eindhoven / department of mathematics and computer science 1 Empirical Evaluation of Learning Styles Adaptation Language Natalia.
The World Wide Web. 2 The Web is an infrastructure of distributed information combined with software that uses networks as a vehicle to exchange that.
Directions for this Template  Use the Slide Master to make universal changes to the presentation, including inserting your organization’s logo –“View”
Directions for this Template  Use the Slide Master to make universal changes to the presentation, including inserting your organization’s logo –“View”
The 20th International Conference on Software Engineering and Knowledge Engineering (SEKE2008) Department of Electrical and Computer Engineering
Lecture 6: Software Design (Part I)
Systems Analysis and Design with UML Version 2.0, Second Edition
Internal Control–Integrated Framework
Intelligent Architectures for Electronic Commerce Part 1.5: Symbolic Reasoning Agents.
Functional Areas & Positions
Chapter 2 Entity-Relationship Data Modeling: Tools and Techniques
Learning Outcomes Participants will be able to analyze assessments
A System Architecture for Exploiting Mission Information Requirement and Resource Allocation Fangfei Chen a, Thomas La Porta a, Diego Pizzocaro b, Alun.
Ontological Logic Programming by Murat Sensoy, Geeth de Mel, Wamberto Vasconcelos and Timothy J. Norman Computing Science, University of Aberdeen, UK 1.
The Experience Factory May 2004 Leonardo Vaccaro.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences Paul R. Smart,
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
Semantic Information Fusion Shashi Phoha, PI Head, Information Science and Technology Division Applied Research Laboratory The Pennsylvania State.
Engineering System Design
Semantic Interoperability Berlin, 25 March 2008 Semantically Enhanced Resource Allocator Marc de Palol Jorge Ejarque, Iñigo Goiri, Ferran Julià, Jordi.
Headquarters U. S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e © 2008 The MITRE Corporation. All rights reserved From Throw Away.
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
95-843: Service Oriented Architecture 1 Master of Information System Management Service Oriented Architecture Lecture 3: SOA Reference Model OASIS 2006.
Chapter 10 Analysis and Design Discipline. 2 Purpose The purpose is to translate the requirements into a specification that describes how to implement.
A Cross-Sensor Evaluation of Three Commercial Iris Cameras for Iris Biometrics Ryan Connaughton and Amanda Sgroi June 20, 2011 CVPR Biometrics Workshop.
Personalized Interaction With Semantic Information Portals Eric Schwarzkopf DFKI
Service Service metadata what Service is who responsible for service constraints service creation service maintenance service deployment rules rules processing.
PMI-Planning Process Group Lecture 08 Ms Saba Sahar.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Prof Alun Preece.
Technology Demonstration Opportunities Annual Conference of ITA Project 8 Semantic integration of sensor asset datasets; application of match- making techniques.
1 SOA Seminar Seminar on Service Oriented Architecture SOA Reference Model OASIS 2006.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
Technische Universität München © Prof. Dr. H. Krcmar An Ontology-based Platform to Collaboratively Manage Supply Chains Tobias Engel, Manoj Bhat, Vasudhara.
© Copyright 2010 Rockwell Collins, Inc. All rights reserved. Practical SysML Applications: A Method to Describe the Problem Space Ray Jorgensen David Lempia.
Presentation transcript:

Sensor-Mission Assignment: A Scenario-Driven Walkthrough International Technology Alliance in Network & Information Sciences Sensor-Mission Assignment: A Scenario-Driven Walkthrough Alun Preece (Cardiff University, UK) Michael Jackson (SEA, UK) Gavin Pearson (Dstl, UK) Tien Pham (ARL, US) TA3-P8

Context & motivation To provide an end-to-end walkthrough of sensor-mission assignment techniques being developed in ITA Project 8 starting with information requirements ending with delivery of actionable information and intelligence Situated within scenarios currently under development in TA3 and TA4. Aims: To facilitate integration of P8 approaches, together with aspects of P9 and P12 To align the P8 work with wider activities that use the TA3 and TA4 scenarios To highlight open questions and issues “Does it all fit together?”

The Scenario The walkthrough is designed to be compatible with two scenarios: the TA3 “border site” scenario involving, among other things, protection of a main supply route (MSR) which is under threat by insurgents the TA4 “humanitarian intervention” scenario involving, among other things, a road in an earthquake-hit region that is of great tactical significance to insurgent forces We consider the TA3 MSR and TA4 road as the same location. Thanks to Paul Smart for this image, taken from the TA4 scenario.

Sensor-Mission Assignment Defined as: allocating a collection of intelligence, surveillance, and reconnaissance (ISR) assets (including sensors and sensor platforms) to one or more missions in an attempt to satisfy the information requirements (IRs) of the various tasks comprising the missions. Project 8 is developing a suite of solution components intended to fit together to solve the larger sensor-mission assignment problem, including: a knowledge-based reasoner for sensor-task matching a collection of sensor-task allocation algorithms the Sensor Fabric

Our big picture Is there suspicious activity on the MSR? Are there suspicious vehicles, etc, on the MSR? Our big picture ISR assets available in theatre Logistical information sensor/platform type location readiness Mission planning Requirements Define IRs & SSIRs Derive interpretation tasks Sensor-task matching Emergence of new tasks Recommendation of feasible solutions Status updating Sensor-task allocation Deployment configuration Monitoring Sensor Fabric S1 Information dissemination & delivery B D A S2 E S3 C S4

Conceptual architecture

Step-by-step Define a set of information requirements (IREQs) for the mission(s) Derive a set of scenario-specific information requirements (SSIRs) from the set of IREQs Derive a set of interpretability tasks (ITs) from the set of SSIRs Match each IT to sensing requirements determine the INT types and NIIRS-style ratings where possible Apply the knowledge-based reasoner to identify package configurations (PCs) which satisfy the sensing requirements factor in availability, weather, type-level policies, etc Apply the sensor-task allocation algorithms to instantiate PCs factor-in location, utility, cost, etc Deploy using the Sensor Fabric Filter, deliver and disseminate actionable information and intelligence (I2) Based on received I2, add, modify or delete IREQs; go to step (2) and repeat

Steps 1 & 2 Step 1 The coalition commanders will identify many information requirements. We will focus on just one example IREQ and examine in detail how the sensor-mission assignment techniques attempt to meet this requirement: “Is there suspicious activity on the MSR road?” Step 2 Each IREQ is broken down to a set of scenario-specific information requirements (SSIRs), for example: “Are there suspicious vehicles on the road?” “Is there suspicious pedestrian activity along the roadside?” “Are there suspicious objects located near the road?” etc

Step 3 The SSIRs need to be broken down further before we can match them to sensing types. We need to identify the interpretation tasks within each: what kinds of things do we need to detect, identify, distinguish, construct, etc. The results of this breakdown will look more like a set of pseudo-database queries: “detect vehicles where vehicle type or behaviour is suspicious” “detect people where person type or behaviour is suspicious” “detect object where object type is suspicious” etc Our aim is to identify all sources relevant to these pseudo-queries.

Step 4 We need to know the kinds of data that are interpretable to answer the ITs: for example, visible imaging, radar, acoustic, etc. An established way way to do this is to use the National Imagery Interpretability Rating Scale (NIIRS). We have built a proof-of-concept knowledge base (KB), allowing a user to select interpretation tasks in terms of three operations (detect, identify, distinguish) a range of “detectables” (ground and air vehicles, buildings, etc) The KB infers which imagery types and NIIRS rating levels are appropriate for each interpretation task. For example: Identify(Vehicles)  { Visible-4, Radar-6 } Note that in steps 3-4 we are moving from a set of “soft” (human-interpretable) information requirements to a set of “hard” (machine-processable) requirements.

Step 5 The SAM (Sensor Assignment to Missions) application allows a user to indicate their areas of interest (AoIs) on a map, and specify the ISR capabilities required in each AoI. The application then recommends a ranked list of PCs, in which each PC collectively provides the whole set of required ISR capabilities across all the AoIs.

Step 5 (cont’d) We don't have access to NIIRS-style ratings for acoustic intelligence. However, for the vehicle identification task, there is work in P9 that uses ACINT (from acoustic sensor arrays). Adding this knowledge to our KB would allow SAM to suggest (at least) three platform configurations to meet the first SSIR: UAV with Camera (rated ≥ NIIRS 4) UAV with SAR (rated ≥ NIIRS 6) AcousticArray with ACINTSensors (The last assumes AcousticArray is the platform, and ACINTSensors the sensor type.)

Step 5 (cont’d) Meeting the SSIRs is likely to involve not only direct sensing but also post-processing and fusion. We intend to identify the need for information processing and fusion assets in package configurations (though our knowledge bases currently don't include them). For example, the acoustic array solution requires analysis of the data, such as provided by the ontologically-mediated classifier from P9 (we’ll call the “P9 Vehicle Classifier”, or P9VC). Performance of the P9VC also depends on the availability of semantic data such as weather, position, threat level which ought also to be factored-into the package (we’ll call these assets “P9VC Semantic Data”, or P9VCSD). So the full PC description could be something like: AcousticArray with { ACINTSensors, P9VC, P9VCSD }

Step 6 The allocation algorithms generate and assign “bundles” of instances, as specified by the PCs. The space of possible bundles is significantly reduced by introducing the notion of a bundle type (BT). A BT is an intensional definition of a set of bundles of sensors that can satisfy a task, in the form of a set of constraints defining the structure of a bundle, including the types of sensor a bundle should contain, and cardinalities. In our current approach, BTs are created by post-processing the PCs produced in Step 5, to add the cardinality constraints, using pre-defined configuration knowledge, for example: at least 1 UAV with at least 1 Camera at least 1 UAV with at least 1 SAR at least 1 AcousticArray with exactly 2 ACINTSensors

Step 7 Once we've assigned instances we can deploy them by configuring a topology on the Sensor Fabric. For example, in the acoustic solution case, there could be something like: S1 and S2 are ACINTSensor instances, S3 is P9VCSD (semantic data), all three of which feed into E which is a P9VC instance, which in turn relays data to B then A, both of which are set up to handle dissemination and filtering operations.

Steps 8 & 9 Step 8 Users can subscribe to sources on the Fabric to meet their I2 needs. Basic subscription functionality is currently offered by the SAM application. Depending on who this user is, the data may be delivered, filtered, and/or presented differently. Filtering can be accommodated in Step 7 by appropriate configuration of the Fabric. Step 9 As the situation evolves, new IREQs appear... Back to step 1!

Analysis I The walkthrough has highlighted a number of issues: Currently we offer no support for articulating, analysing, and breaking down IREQs to SSIRs to ITs in Steps 1-3. If the tasks are machine-processable only at IT level, we may miss opportunities to make maximum use of the available assets in a flexible, agile way. At the asset allocation level, the issue is to maximise utility to the interpretation tasks: that is, give the maximum interpretable data to the SSIRs. We need to share data among SSIRs wherever possible. Another gap in our current approach is the retrieval and reuse of previously-collected information ("collect once, use often").

Analysis II More work is needed to incorporate information processing and fusion components into the overall approach. There is also the open question of resource scheduling. We may need a collection of sensing types to provide a complete set of interpretable data for some SSIR, but not all at the same time. Finally, more work is needed on the integration of matching and allocation with dissemination and the Fabric, in the context of policies on access to resources.

See also… End-To-End Sensor-Mission Assignment (P8 T1/T3) Please visit our demo: End-To-End Sensor-Mission Assignment (P8 T1/T3) Geeth de Mel & Wamberto Vasconcelos (Aberdeen) Alun Preece, Konrad Borowiecki & Diego Pizzocaro (Cardiff) Christopher Gibson (IBM UK) We will show how: a commander's information requirements (IREQs) can be specified in a machine-processable way, using interpretation tasks from the NIIRS scale these tasks can be matched against available sensor and platform ISR asset types using our ontology/knowledge-based approach (the 'Sensor Assignment to Missions' tool, SAM) individual instances of sensor/platform assets can be allocated to tasks using near-optimal algorithms, taking into account access rights on the assets a user can subscribe to these instances and receive information delivered via the ITA Fabric

Finally… Any questions? Contact: Alun Preece, A.D.Preece@cs.cf.ac.uk Acknowledgements: Thanks to Iris Firmin (SEA), Diego Pizzocaro (Cardiff), Wamberto Vasconcelos (Aberdeen), and an anonymous external subject-matter expert for helpful comments on the first draft. Specifics of the scenario owe much to discussions with Paul Smart and Mark Nixon (Soton). The NIIRS KB is the work of Geeth de Mel at Aberdeen; the SAM application was developed by Konrad Borowiecki (Cardiff), building on the original SAM reasoner developed by Geeth de Mel and Mario Gomez (Aberdeen). Research was sponsored by the U.S. Army Research Laboratory and the U.K. Ministry of Defence and was accomplished under Agreement Number W911NF-06-3-0001. The views and conclusions contained in this document are those of the author(s) and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Army Research Laboratory, the U.S. Government, the U.K. Ministry of Defence or the U.K. Government. The U.S. and U.K. Governments are authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation hereon.