A stochastic process algebraic abstraction of detection evidence fusion in tactical sensor networks Dave Thornley International Technology Alliance

Slides:



Advertisements
Similar presentations
Fall Meeting October 2013 International Technology Alliance in Network and Information Sciences Human-Machine Conversations to Support Coalition Missions.
Advertisements

Toward mission-specific service utility estimation using analytic stochastic process models Dave Thornley International Technology Alliance
Week 2 The Object-Oriented Approach to Requirements
Evaluating the Benefit of Networked EW Systems
V-1 Part V: Collaborative Signal Processing Akbar Sayeed.
Screen 1 of 20 Reporting Food Security Information Reporting for Results Learning Objectives At the end of this lesson you will be able to: understand.
Planning: Processes and Techniques
Lecture # 2 : Process Models
Reliability Software1 Reliability Software Minimum requirements & Best practices Frank Macedo - FERC Technical Conference July 14, 2004.
1 ORESTEIA IST Consortium King’s College National Technical University of Athens University of Milan ALTEC S.A. Imperial College London Queen’s.
Intaver Institute Inc. 303, 6707, Elbow Drive S.W., Calgary AB Canada T2V 0E5 Quantitative Risk Analysis for Aerospace Industry.
1 Reinforcement Learning Introduction & Passive Learning Alan Fern * Based in part on slides by Daniel Weld.
Engineering Economic Analysis Canadian Edition
Multiple Criteria for Evaluating Land Cover Classification Algorithms Summary of a paper by R.S. DeFries and Jonathan Cheung-Wai Chan April, 2000 Remote.
FIN 685: Risk Management Topic 5: Simulation Larry Schrenk, Instructor.
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology.
ECE 7340: Building Intelligent Robots QUALITATIVE NAVIGATION FOR MOBILE ROBOTS Tod S. Levitt Daryl T. Lawton Presented by: Aniket Samant.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Development Processes UML just is a modeling technique, yet for using it we need to know: »what do we model in an analysis model? »what do we model in.
Chapter 2 Succeeding as a Systems Analyst
Distributed Reinforcement Learning for a Traffic Engineering Application Mark D. Pendrith DaimlerChrysler Research & Technology Center Presented by: Christina.
Orion Overview. We build an internal model of the world, so we can predict future behaviour - we make the model out of active structure so it is interoperable.
Enterprise Architecture
An Intelligent Tutoring System (ITS) for Future Combat Systems (FCS) Robotic Vehicle Command I/ITSEC 2003 Presented by:Randy Jensen
Modeling and Simulation
California Common Operating Picture (Cal COP) for Public Safety
Copyright © Cengage Learning. All rights reserved. 8 Tests of Hypotheses Based on a Single Sample.
1 COMP541 State Machines Montek Singh Feb 8, 2012.
HAWKES LEARNING SYSTEMS Students Matter. Success Counts. Copyright © 2013 by Hawkes Learning Systems/Quant Systems, Inc. All rights reserved. Section 10.2.
(C) 2009 J. M. Garrido1 Object Oriented Simulation with Java.
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
Verification & Validation
Outline Terminology –Typical Expert System –Typical Decision Support System –Techniques Taken From Management Science and Artificial Intelligence Overall.
Finding the draft curriculum edu.au/Home.
Towards Appropriate Selection of Analysis Tools and Methods.
Progression in ICT Key Stage 1 - Children learn how to…... explore ICT; use it confidently and purposefully to achieve outcomes; use ICT to develop their.
 Platform Independent Petri net Editor 2 (PIPE2) CS2650 Distributed Multimedia Systems Wen Xu November 23 rd, 2010.
MARCH 1 Risk Management Why carry out Risk Assessment? l Is the project too risky? l Threat intensity? l Improve decision making l Clarification of terms.
Mapping and Localization with RFID Technology Matthai Philipose, Kenneth P Fishkin, Dieter Fox, Dirk Hahnel, Wolfram Burgard Presenter: Aniket Shah.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences Process algebras.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Engineering Economic Analysis Canadian Edition
Fast Simulation Techniques for Design Space Exploration Daniel Knorreck, Ludovic Apvrille, Renaud Pacalet
Crystal Ball: Risk Analysis  Risk analysis uses analytical decision models or Monte Carlo simulation models based on the probability distributions to.
A Brief Review of Theory for Information Fusion in Sensor Networks Xiaoling Wang February 19, 2004.
Advanced Controls and Sensors David G. Hansen. Advanced Controls and Sensors Planning Process.
A new technique to address CID and IFF studies David Dean, Kathryn Hynd, Beejal Mistry, Alasdair Vincent and Paul Syms Dstl IMD and LSD 22 ISMOR, September.
Grades: 6-8 Subject: Artificial Intelligence An Introduction to the Turing Test.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
Software Architecture Evaluation Methodologies Presented By: Anthony Register.
The Problem of Location Determination and Tracking in Networked Systems Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University.
U SER I NTERFACE L ABORATORY Situation Awareness a state of knowledge, from the processes used to achieve that state (situation assessment) not encompass.
Boeing-MIT Collaborative Time- Sensitive Targeting Project July 28, 2006 Stacey Scott, M. L. Cummings (PI) Humans and Automation Laboratory
By: Aaron Dyreson Supervising Professor: Dr. Ioannis Schizas
1 Chapter 17 2 nd Part Making Complex Decisions --- Decision-theoretic Agent Design Xin Lu 11/04/2002.
UML - Development Process 1 Software Development Process Using UML.
Refining the Use Cases 1. How Use Cases Evolve  Early efforts typically define most of the major use cases.  The refining stages complete the process.
REPORT 2 Estimating the population size of mobile organisms – Mark Recapture methods There are two parts to this practical. In the first (PART ONE), you.
 Simulation enables the study of complex system.  Simulation is a good approach when analytic study of a system is not possible or very complex.  Informational,
Uncertainty and confidence Although the sample mean,, is a unique number for any particular sample, if you pick a different sample you will probably get.
Why does it need? [USN] ( 주 ) 한백전자 Background Wireless Sensor Network (WSN)  Relationship between Sensor and WSN Individual sensors are very limited.
Policies Controlling Risk
Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University
LEGO Robotics Ultrasonic Sensor
Quantitative Risk Analysis for Aerospace Industry
Radio Propagation Simulation Based on Automatic 3D Environment Reconstruction D. He A novel method to simulate radio propagation is presented. The method.
ATLAST Deployment &Push Pack Spares Optimizer
Knowing When to Stop: An Examination of Methods to Minimize the False Negative Risk of Automated Abort Triggers RAM XI Training Summit October 2018 Patrick.
Software Development Process Using UML Recap
Exploring Cognitive Services
Presentation transcript:

A stochastic process algebraic abstraction of detection evidence fusion in tactical sensor networks Dave Thornley International Technology Alliance Imperial College London

The paper Example stochastic process algebra model that abstracts a decision maker and information sources Sequence taken from INCIDER example slides Appropriate detail to measure… –Situational awareness evolution over time –Fratricide risk as a function of timing of decision Full PEPA code and excerpts of pre-processing and Matlab scripts.

Analytic stochastic modeling Constructive simulation –produces example traces of evolutions of the system –Repeated Monte Carlo simulation enables estimation of distributions Analytic times stochastic modeling –Directly calculate distributions as equilibria, or transient functions of time

Scenario - simplified decision sequence Decision maker tasked with screen a la INCIDER –Hypothesize Blue and Red, refine opinion as necessary Available information –Briefing High confidence in Red Low confidence in Blue –Electro optical detect/classify with ranges Single detection event after Far range reached Single classification event after Mid range reached –Call HQ for update Imposes minimal confidence on Blue if none in region Increases confidence in Blue if local activity –Send scout to eyeball at Mid range Returns opinion to raise confidence in Red or Blue Entities are either Red or Blue, entering Far, proceeding to Mid, through Near to Decide We focus on fratricide risk – erroneous CID of true Blue entity

Modeling Scheme - MARS Mission Abstraction, Requirements and Structure (MARS) Federated Analytic Traffic drives the system (FAT) Passive SA components driven by intelligence sources Intelligence sources query physics Decision maker –interrogates SA –Selects actions that in turn drive some of the physics

Scenario components FAT ( (Sensors SA) DM ) Policy includes orders and tests Signals include EO interpretation, TID comms, Scout vision and HQ picture Evidence raises, lowers or sets confidence in Red and Blue hypotheses Model that can generate Red and Blue traffic, and the SA maintenance and decision making sequences for each has 1597 states with a 5 phase Erlang FAT transition process

Example component: HQ HQ_History_Zero = (call_HQ_update, infty).HQ_History_Called; HQ_History_Called = (HQ_called,infty).HQ_History_Called + (SA_set_CBL,infty).HQ_History_Reported + (SA_raise_CB,infty).HQ_History_Reported; HQ_History_Reported = (HQ_reported, infty).HQ_History_Reported ; HQ_Idle = (call_HQ_update, infty).HQ_Refer; HQ_Refer = (see_blue, say_blue_present_rate).HQ_Blue_Present + (see_red, say_blue_absent_rate).HQ_Blue_Absent; HQ_Blue_Present = (SA_raise_CB, high_rate).HQ_Idle; HQ_Blue_Absent = (SA_set_CBL, high_rate).HQ_Idle;

Starting states for transient analysis (DM_Idle|SA_CBL|SA_CRM|HQ_Idle|HQ_History_Zero|Scout_Near| Scout_History_Zero|TID_Listening|EO_Idle|FAT_Blue_Far|FAT_TC_0) (DM_Gather|SA_CBL|SA_CRM|HQ_Idle|HQ_History_Zero|Scout_Near| Scout_History_Zero|TID_Listening|EO_Detected|FAT_Blue_Far|FAT_TC_0) From the instant of arrival of a Blue entity in range Far: 1(DM_Idle|SA_CBL|SA_CRM|HQ_Idle|HQ_History_Zero|Scout_Near|Scout_History_Zero|TID_Listening|EO_Idle|FAT_Idle|FAT_TC_0) 2(DM_Idle|SA_CBL|SA_CRM|HQ_Idle|HQ_History_Zero|Scout_Near|Scout_History_Zero|TID_Listening|EO_Idle|FAT_Red_Far|FAT_TC_0) 3(DM_Idle|SA_CBL|SA_CRM|HQ_Idle|HQ_History_Zero|Scout_Near|Scout_History_Zero|TID_Listening|EO_Idle|FAT_Blue_Far|FAT_TC_0) 4(DM_Idle|SA_CBL|SA_CRM|HQ_Idle|HQ_History_Zero|Scout_Near|Scout_History_Zero|TID_Listening|EO_Idle|FAT_Red_Far|FAT_TC_1) 5(DM_Idle|SA_CBL|SA_CRM|HQ_Idle|HQ_History_Zero|Scout_Near|Scout_History_Zero|TID_Listening|EO_Detectable|FAT_Red_Far|FAT_TC_0) 6(DM_Idle|SA_CBL|SA_CRM|HQ_Idle|HQ_History_Zero|Scout_Near|Scout_History_Zero|TID_Listening|EO_Idle|FAT_Red_Far|FAT_TC_2) 7(DM_Idle|SA_CBL|SA_CRM|HQ_Idle|HQ_History_Zero|Scout_Near|Scout_History_Zero|TID_Listening|EO_Detectable|FAT_Red_Far|FAT_TC_1) 8(DM_Idle|SA_CBL|SA_CRM|HQ_Idle|HQ_History_Zero|Scout_Near|Scout_History_Zero|TID_Listening|EO_Idle|FAT_Red_Far|FAT_TC_3) 9(DM_Idle|SA_CBL|SA_CRM|HQ_Idle|HQ_History_Zero|Scout_Near|Scout_History_Zero|TID_Listening|EO_Detectable|FAT_Red_Far|FAT_TC_2) 10……

FAT traffic progress

Evolution of SA and decisions

Decision QoI

Future work Multiple entities per scenario –Collapse symmetries to control state space size Automated construction of fusion abstraction –e.g. CART-like analysis to select boundaries between states of approximately constant implications Automate model generation from mission descriptions –Situational awareness pattern triggers –Stochastic probe formulation

Thank you – questions… Tell me more about PEPA. Why are you not using Moebius/DNAmaca/xyz? What are you going to do about accuracy of timing? This is all very smeary. Surely the state space of any mission of realistic size will be unmanageable? Why did you keep rattling on about QoI? When will I get this as a tool?