Havva Alizadeh Ferdowsi University of Mashhad, WTLab Spring 2011 1.

Slides:



Advertisements
Similar presentations
Office of SA to CNS GeoIntelligence Introduction Data Mining vs Image Mining Image Mining - Issues and Challenges CBIR Image Mining Process Ontology.
Advertisements

The 20th International Conference on Software Engineering and Knowledge Engineering (SEKE2008) Department of Electrical and Computer Engineering
Modeling Human Reasoning About Meta-Information Presented By: Scott Langevin Jingsong Wang.
Fusion and Automation Fusion and Automation Human Cognitive and Visualization Issues Jean-Remi Duquet Marc Gregoire Maura Lohrenz Kesh Kesavados Elisa.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
WRSTA, 13 August, 2006 Rough Sets in Hybrid Intelligent Systems For Breast Cancer Detection By Aboul Ella Hassanien Cairo University, Faculty of Computer.
SSP Re-hosting System Development: CLBM Overview and Module Recognition SSP Team Department of ECE Stevens Institute of Technology Presented by Hongbing.
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 8 Slide 1 System models.
Neural Networks Basic concepts ArchitectureOperation.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
16722 Sensing and Sensors Mel Siegel )
Information Fusion for Wireless Sensor Networks: Methods, Models, and Classifications 姓 名 : 尤淑孟 學 號 : 指導教授 : 溫志煜.
Requirements Analysis Concepts & Principles
Semantics For the Semantic Web: The Implicit, the Formal and The Powerful Amit Sheth, Cartic Ramakrishnan, Christopher Thomas CS751 Spring 2005 Presenter:
Modified from Sommerville’s originalsSoftware Engineering, 7th edition. Chapter 8 Slide 1 System models.
Report on Multi-agent Data Fusion System: Design and implementation issues 1 By Ganesh Godavari.
Building Knowledge-Driven DSS and Mining Data
Data Mining – Intro.
Chapter 10: Architectural Design
The chapter will address the following questions:
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
Chapter 6: The Traditional Approach to Requirements
System Analysis Overview Document functional requirements by creating models Two concepts help identify functional requirements in the traditional approach.
Chapter 10 Architectural Design
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence From Data Mining To Knowledge.
Chapter 9 Database Planning, Design, and Administration Sungchul Hong.
Information Fusion in Continuous Assurance Johan Perols University of San Diego Uday Murthy University of South Florida UWCISA Symposium October 2, 2009.
Soft Computing Lecture 20 Review of HIS Combined Numerical and Linguistic Knowledge Representation and Its Application to Medical Diagnosis.
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
Chapter 4 System Models A description of the various models that can be used to specify software systems.
System models Abstract descriptions of systems whose requirements are being analysed Abstract descriptions of systems whose requirements are being analysed.
Object-Oriented Design Yonsei University 2 nd Semester, 2014 Woo-Cheol Kim.
ITEC224 Database Programming
Database Design - Lecture 2
Outline What Neural Networks are and why they are desirable Historical background Applications Strengths neural networks and advantages Status N.N and.
© 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang 5-1 Chapter 5 Business Intelligence: Data.
Data Mining Chapter 1 Introduction -- Basic Data Mining Tasks -- Related Concepts -- Data Mining Techniques.
Time Series Data Analysis - I Yaji Sripada. Dept. of Computing Science, University of Aberdeen2 In this lecture you learn What are Time Series? How to.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Dimitrios Skoutas Alkis Simitsis
Chapter 7 System models.
Slide 1 System models. Slide 2 Objectives l To explain why the context of a system should be modelled as part of the RE process l To describe behavioural.
System models l Abstract descriptions of systems whose requirements are being analysed.
Data Mining – Intro. Course Overview Spatial Databases Temporal and Spatio-Temporal Databases Multimedia Databases Data Mining.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Object Oriented Multi-Database Systems An Overview of Chapters 4 and 5.
Database Environment Chapter 2. Data Independence Sometimes the way data are physically organized depends on the requirements of the application. Result:
K. Kolomvatsos 1, C. Anagnostopoulos 2, and S. Hadjiefthymiades 1 An Efficient Environmental Monitoring System adopting Data Fusion, Prediction & Fuzzy.
Data Mining BY JEMINI ISLAM. Data Mining Outline: What is data mining? Why use data mining? How does data mining work The process of data mining Tools.
Background Information systems requiring sensor data input must generally include means for sensor data fusion as well as powerful mechanisms for user.
Generic Tasks by Ihab M. Amer Graduate Student Computer Science Dept. AUC, Cairo, Egypt.
ReSeTrus Development of a digital library technology based on redundancy elimination and semantic elevation, with special emphasis on trust management.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 8 Slide 1 System models.
Issues in Ontology-based Information integration By Zhan Cui, Dean Jones and Paul O’Brien.
Semantic Web Knowledge Fusion Jennifer Sleeman University of Maryland, Baltimore County Motivation Definitions Methodology Evaluation Future Work Based.
OPERATING SYSTEMS CS 3530 Summer 2014 Systems and Models Chapter 03.
Data Mining and Decision Support
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
Instructor : Dr. Powsiri Klinkhachorn
 To explain why the context of a system should be modelled as part of the RE process  To describe behavioural modelling, data modelling and object modelling.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
Pattern Recognition. What is Pattern Recognition? Pattern recognition is a sub-topic of machine learning. PR is the science that concerns the description.
VERA AULIA ( ).  Oil palm is one of the major edible oil traded in the global market.  Oil palm tree will start to produce fruits within three.
Www. infofusion.se Information Fusion Requirements on Databases Ronnie Johansson.
Network Management Lecture 13. MACHINE LEARNING TECHNIQUES 2 Dr. Atiq Ahmed Université de Balouchistan.
Chapter 9 Architectural Design. Why Architecture? The architecture is not the operational software. Rather, it is a representation that enables a software.
CHAPTER 2 CREATING AN ARCHITECTURAL DESIGN.
Ontology-Based Approaches to Data Integration
Presentation transcript:

Havva Alizadeh Ferdowsi University of Mashhad, WTLab Spring

Outline Introduction Definition of information fusion Classifying information fusion Architectures and models Ontology + fusion Semantic JDL Future works 2

introduction In a nutshell, information fusion can be defined as the combination of multiple sources to obtain improved information. information fusion is used in different application: Robotics Military Intrusion detection WSN (Wireless Sensor Network) DoS (Denial of Service) 3

Definition of information fusion Hall and Linas : “the combination of data from multiplesensors, and related information provided by associated databases, to achieve improved accuracy and more specific inferences than could be achieved by the use of a single sensor alone.” Joint Directors of Laboratories (JDL): “multilevel, multifaceted process dealing with the automatic detection, association, correlation, estimation, and combination of data and information from multiple sources.” 4

Classifying information fusion Information fusion can be categorized based on several aspects : Classification Based on Relationship Among the Sources(e.g., cooperative, redundant, and complementary data). the abstraction level of the manipulated data during the fusion process (measurement, signal, feature, decision) based on input and output of a fusion process 5

Classification Based on Relationship Among the Sources 6

Complementary : When information provided by the sources represents different portions of a broader scene, information fusion can be applied to obtain a piece of information that is more complete. Redundant. If two or more independent sources provide the same piece of information, these pieces can be fused to increase the associated confidence. ( to obtain more accurate information) Cooperative. Two independent sources are cooperative when the information provided by them is fused into new information (usually more complex than the original data) that, from the application perspective, better represents the reality. 7

Classification Based on Levels of Abstraction According to the abstraction level of the manipulated data, information fusion can be classified: Low-Level Fusion. Also referred to as signal (measurement) level fusion. Raw data are provided as inputs, combined into new piece of data that is more accurate (reduced noise) than the individual inputs. (filters) Medium-Level Fusion. Attributes or features of an entity (e.g., shape, texture, position) are fused to obtain a feature map that may be used for other tasks (detection of an object). This type of fusion is also known as feature/attribute level fusion. High-Level Fusion. Also known as symbol or decision level fusion. It takes decisions or symbolic representations as input and combines them to obtain a more confident and/or a global decision. An example of high- level fusion is the Bayesian approach. 8

Classification Based on Input and Output Data In–Data Out (DAI-DAO). deals with raw data and the result is also raw data, possibly more accurate or reliable. Data In–Feature Out (DAI-FEO). uses raw data from sources to extract features or attributes that describe an entity. Here, “entity” means any object, situation, or world abstraction. Feature In–Feature Out (FEI-FEO). works on a set of features to improve/refine a feature, or extract new ones. Feature In–Decision Out (FEI-DEO). takes a set of features of an entity generating a symbolic representation or a decision. Decision In–Decision Out (DEI-DEO). Decisions can be fused in order to obtain new decisions or give emphasis on previous ones. 9

Architectures and models Information-Based Models JDL DFD Activity-Based Models Boyd Control Loop Intelligence Cycle Omnibus model Role-Based Models Object Oriented Model Frankel-Bedworth Architecture 10

JDL Model (Information based models) 11

JDL Model (Information based models) JDL is a popular model in the fusion research community. It was originally proposed by the Joint Directors of Laboratories (JDL) and the Department of Defense (DoD). Sources. providing the input information, and can be sensors, a priori knowledge, databases, or human input. Human Computer Interaction (HCI). HCI is a mechanism that allows human input, such as commands and queries, and the notification of fusion results through alarms, displays, graphics, and sounds. Commonly (query-based interfaces) 12

Level 0 (Source Preprocessing). Various preprocessing of data is needed, e.g. normalization of signal measurements, handling of missing values in the data set, handling of incomplete data sets, filtering out low quality measurements. Level 1 (Object Refinement). Object refinement transforms the data into a consistent structure. attempts to locate and identify objects. Level 2 (Situation Refinement). Situation refinement tries to provide a contextual description of the relationship among objects and observed events. It uses a priori knowledge and environmental information to identify a situation. 13 JDL Model (Information based models)

Level 3 (Threat Refinement). evaluates the current situation projecting it into the future to identify possible threats, vulnerabilities, and opportunities for operations. Level 4 (Process Refinement). This is a meta-process, responsible for monitoring the system performance and allocating the sources according to the specified goals. (e.g. QoS, Energy maps in WSN) 14 JDL Model (Information based models)

λ- JDL 15

16 Elements of Situation Assessment

17 Elements of Threat Assessment

18 SAW High-Level Ontology

Battlefield Relations Ontology 19

The Boyd Control Loop or OODA (Observe, Orient, Decide,Act) Loop is a cyclic model composed of four stages: Observe. Information gathering from the available sources. Orient. Gathered information is fused to obtain current situation. Decide. Specify an action plan in response to understanding of situation. Act. The plan is executed. 20 OODA Loop (Activity based models)

21 OODA Loop (Activity based models) Level 1,2,3 JDL Level 0 JDL Level 4 JDL It is n’t in JDL

Object-oriented model provided by Kokar et al. [2000] in which four roles are identified: Actor. Responsible for the interaction with the world, collecting information and acting on the environment. Perceiver. Once information is gathered, the perceiver assesses such information providing a contextualized analysis to the director. Director. Based on the analysis provided by the perceiver, the director builds an action plan specifying the system’s goals. Manager. The manager controls the actors to execute the plans formulated by the director. 22 Object-Oriented Model (Role-Based Models)

23 Object-Oriented Model (Role-Based Models)

METHODS, TECHNIQUES, AND ALGORITHMS Inference : Bayesian Inference Dempster-Shafer Inference Fuzzy Logic Neural Networks: (also for Automatic Target Recognition (ATR)) Abductive Reasoning Estimation : Maximum Likelihood Maximum A Posteriori (MAP) Least Squares Moving Average Filter Kalman Filter Particle Filter 24 Reliable Abstract Sensors Fault-Tolerant Averaging The Fault-Tolerant Interval Function

25

heterogeneity of the data within distributed systems : Structural heterogeneity : means that different information systems store their data in different structures. Semantic heterogeneity : considers the content of an information item and its intended meaning. In order to achieve semantic interoperability in a heterogeneous information system, the meaning of the information that is interchanged has to be understood across the systems. 26 Motivation to ontology

Three main causes for semantic heterogeneity: Confounding conflicts : occur when information items seem to have the same meaning, but differ in reality. Scaling conflicts : occur when different reference systems are used to measure a value. Examples are different currencies. Naming conflicts : occur when naming schemes of information differ significantly. (homonyms and synonyms) The use of ontologies for the explication of implicit and hidden knowledge is a possible approach to overcome the problem of semantic heterogeneity. 27 Motivation to ontology

Ontologies introduced as ”explicit specification of a conceptualization” Therefore, ontologies can be used in an fusion task to: describe the semantics of the information sources to make the content explicit they can be used for the identification and association of semantically corresponding information concepts. 28 The Role of Ontologies

29 Semantic information fusion system based on JDL

Single Ontology approaches: use one global ontology providing a shared vocabulary for the specification of the semantics All information sources are related to one global ontology. Single ontology approaches can be applied to integration problems where all information sources provide nearly the same view on a domain. single ontology approaches are susceptible for changes in the information sources which can affect the conceptualization of the domain represented in the ontology. 30 Three main ontology architectures

Multiple Ontologies approaches: Each information source is described by its own ontology Each source ontology can be developed their ontologies easily. The lack of a common vocabulary makes it difficult to compare different source ontologies. To overcome this problem, the inter-ontology mapping is needed. Inter-Ontology Mapping approaches: Defined Mappings Lexical Relations Top-Level Grounding Semantic Correspondences 31 Three main ontology architectures

Hybrid Approaches : Similar to multiple ontology approaches the semantics of each source is described by its own ontology. But in order to make the local ontologies comparable to each other they are built from a global shared vocabulary. 32 Three main ontology architectures

Provide dataset (military,medical, weather,…) Provide related ontologies Provide Rule database (by simulator and then data mining) Ontology-based object detection Ontology-based Situation awareness Semantic threat refinement Evaluation (correct result, time to answer) 33 Steps of work

34 Thanks a lot ?