1 Evaluation of TEWA in a Ground Based Air Defense Environment Presenters: Basie Kok, Andries Heyns Supervisor: Prof. Jan van Vuuren.

Slides:



Advertisements
Similar presentations
Adaptive Support using Cognitive Models of Trust Robbert-Jan Beun (UU), Jurriaan van Diggelen (TNO), Mark Hoogendoorn (VU), Syed Waqar Jaffry (VU), Peter-Paul.
Advertisements

Recommender System A Brief Survey.
Large Scale Knowledge Management across Media Prof. Fabio Ciravegna, Department of Computer Science University of Sheffield
2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
Hadi Goudarzi and Massoud Pedram
Multi‑Criteria Decision Making
We build generic tools for automated diagnosis & reconfiguration of distributed dynamic systems Model-Based Supervision of Composite Systems Modularity.
Probability of Attack of Fixed Wing Aircraft in a Ground Based Air Defence Environment Presentation by Jacques du Toit and Willa Lotz Division of Applied.
All Hands Meeting, 2006 Title: Grid Workflow Scheduling in WOSE (Workflow Optimisation Services for e- Science Applications) Authors: Yash Patel, Andrew.
March 2013 ESSnet DWH - Workshop IV DATA LINKING ASPECTS OF COMBINING DATA INCLUDING OPTIONS FOR VARIOUS HIERARCHIES (S-DWH CONTEXT)
Constructing the Future with Intelligent Agents Raju Pathmeswaran Dr Vian Ahmed Prof Ghassan Aouad.
Gizem ALAGÖZ. Simulation optimization has received considerable attention from both simulation researchers and practitioners. Both continuous and discrete.
Decision Making: An Introduction 1. 2 Decision Making Decision Making is a process of choosing among two or more alternative courses of action for the.
1 CISR-consultancy Challenges “Customer ask us what to do next” Keywords: “Customer ask us what to do next” From Policy to Practise The world is going.
Presenter: David Fleeman { D. Juedes, F. Drews, L. Welch and D. Fleeman Center for Intelligent, Distributed & Dependable.
University of Minho School of Engineering Centre Algoritmi Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 a 27 de Outubro de 2011.
1 Chapter 12: Decision-Support Systems for Supply Chain Management CASE: Supply Chain Management Smooths Production Flow Prepared by Hoon Lee Date on 14.
JACK Intelligent Agents and Applications Hitesh Bhambhani CSE 6362, SPRING 2003 Dr. Lawrence B. Holder.
Intelligent Agent for Delivering Learning Materials Department of Computer Science and Engineering University of Nebraska Co-Sponsored by Great Plains.
Strategic Decisions Using Dynamic Programming
Effective Gaussian mixture learning for video background subtraction Dar-Shyang Lee, Member, IEEE.
A Value-Based Approach for Quantifying Scientific Problem Solving Effectiveness Within and Across Educational Systems Ron Stevens, Ph.D. IMMEX Project.
Project Risk Management EECS811: IT Project Management Presenter: Gavaskar Ramanathan.
DECISION SUPPORT FOR RE-PLANNING OF SOFTWARE PRODUCT RELEASES S. M. Didar-Al-Alam Dept. of Computer Science University of Calgary, Calgary, AB, Canada.
Maintenance Forecasting and Capacity Planning
What is Business Analysis Planning & Monitoring?
1 Software Quality Engineering CS410 Class 5 Seven Basic Quality Tools.
Scheduling and Scheduling Philosophies By Nilesh Sivaramakrishnan For IEM 5303.
Chapter 1 Introduction to Simulation
Outline Terminology –Typical Expert System –Typical Decision Support System –Techniques Taken From Management Science and Artificial Intelligence Overall.
CRESCENDO Full virtuality in design and product development within the extended enterprise Naples, 28 Nov
Bayesian parameter estimation in cosmology with Population Monte Carlo By Darell Moodley (UKZN) Supervisor: Prof. K Moodley (UKZN) SKA Postgraduate conference,
NSF Critical Infrastructures Workshop Nov , 2006 Kannan Ramchandran University of California at Berkeley Current research interests related to workshop.
Business Analysis An Overview of Business Decision Making.
Helsinki University of Technology Systems Analysis Laboratory Determining cost-effective portfolios of weapon systems Juuso Liesiö, Ahti Salo and Jussi.
A Practical Process for Simulation Component Reuse Dissertation Proposal Presentation by Robert G. Bartholet 27 May 2005.
CS4730 Real-Time Systems and Modeling Fall 2010 José M. Garrido Department of Computer Science & Information Systems Kennesaw State University.
Lesley Charles November 23, 2009.
Managerial Decision Making and Problem Solving
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
STELLENBOSCH UNIVERSITY
Threat Evaluation & Weapon Assignment Centre of Excellence Jaco Roux* & JH van Vuuren* 27 November 2008 STELLENBOSCH UNIVERSITY LEDGER Conference ‘08.
MBA7025_01.ppt/Jan 13, 2015/Page 1 Georgia State University - Confidential MBA 7025 Statistical Business Analysis Introduction - Why Business Analysis.
Towards Coastal Threat Evaluation Decision Support Presentation by Jacques du Toit Operational Research University of Stellenbosch 3 December 2010.
MBA7020_01.ppt/June 13, 2005/Page 1 Georgia State University - Confidential MBA 7020 Business Analysis Foundations Introduction - Why Business Analysis.
1 CHAPTER 2 Decision Making, Systems, Modeling, and Support.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
1 S ystems Analysis Laboratory Helsinki University of Technology Kai Virtanen, Janne Karelahti, Tuomas Raivio, and Raimo P. Hämäläinen Systems Analysis.
Advanced Decision Architectures Collaborative Technology Alliance An Interactive Decision Support Architecture for Visualizing Robust Solutions in High-Risk.
Solution methodologies for the classical Grant van Dieman Friday 30 th November 2007 Supervisor: Prof. JH van Vuuren Co-supervisor: Mr JN Roux assignment.
Assessing the Military Benefits of NEC Using a Generic Kill-Chain Approach David Nevell QinetiQ Malvern 21 ISMOR September 2004.
SOFTWARE PROJECT MANAGEMENT
Process Quality in ONS Rachel Skentelbery, Rachael Viles & Sarah Green
Software Architecture Evaluation Methodologies Presented By: Anthony Register.
MROrder: Flexible Job Ordering Optimization for Online MapReduce Workloads School of Computer Engineering Nanyang Technological University 30 th Aug 2013.
Helsinki University of Technology Systems Analysis Laboratory Portfolio and Scenario Analysis in the Cost-Effectiveness Evaluation of Weapon Systems Jussi.
Unclassified//For Official Use Only 1 RAPID: Representation and Analysis of Probabilistic Intelligence Data Carnegie Mellon University PI : Prof. Jaime.
Csci 418/618 Simulation Models Dr. Ken Nygard, IACC 262B
© The Delos Partnership 2005 Dairygold Workshop Strategic Sourcing Process.
Hierarchical Management Architecture for Multi-Access Networks Dzmitry Kliazovich, Tiia Sutinen, Heli Kokkoniemi- Tarkkanen, Jukka Mäkelä & Seppo Horsmanheimo.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
Asset accounting-29.pptx This course will give an overview of the following Workbreakdown Structure Network Project Builder Project Planning.
Learning of Coordination of a Quad-Rotors Team for the Construction of Multiple Structures. Sérgio Ronaldo Barros dos Santos. Supervisor: Cairo Lúcio Nascimento.
Modeling and Simulation (An Introduction)
Kai Virtanen, Janne Karelahti, Tuomas Raivio, and Raimo P. Hämäläinen
Modeling and Analysis Tutorial
UPTIME & SEMANTIC WEB STANDARDS
Chapter 12 Analyzing Semistructured Decision Support Systems
Kostas Kolomvatsos, Christos Anagnostopoulos
MSE 606A Engineering Operations Research
Presentation transcript:

1 Evaluation of TEWA in a Ground Based Air Defense Environment Presenters: Basie Kok, Andries Heyns Supervisor: Prof. Jan van Vuuren

2 Overview Context and motivation Evaluation Overview Modelling TEWA components Simulation evaluation of TEWA Proposed measures of performance Demonstration Status / Further Work

3 Context and Motivation Forms part of TEWA program underway at the University of Stellenbosch. Aim: To evaluate a fully fledged TEWA system in a GBADS environment. High-stress environments of particular interest in GBADS application Collaborators: RRS, IMT, UDDC, CSIR… –Duvenhage B & le Roux WH, A Peer-to-Peer Simulation Architecture, Proceedings of the 2007 High Performance Computing and Simulation Conference, pp , –le Roux WH, Implementing a Low Cost Distributed Architecture for Real-Time Behavioural Modelling and Simulation, Proceedings of the 2006 European Simulation Interoperability Workshop, Stockholm, pp , June –Roux J & van Vuuren JH, Threat evaluation and weapon assignment decision support: A review of the state of the art, Orion Journal of Operations Research, Submitted June Evaluation of TEWA models to date an imperative step in producing an effective system: –Investigation of computational costs (i.e. line of sight calculations) –Effectiveness and relevance of various model sub-components Prototype testing often infeasible due to high cost. Evaluation of large complex systems in the design phase often involves simulation: –Repetition (statistical certainty) –Variation (realistic scope traversal)

4 Evaluation Overview Objectives: –Demonstrate workability of system –Evaluate performance of various TE and WA methodologies in different contexts –Evaluate system performance as a whole and identify focus areas for future development Overview: 1.Model TEWA components Threat evaluation models Combining threat lists Weapon assignment models 2.Simulate scenarios using repetition and statistical variation Robustness of components Performance of components 3.Performance measure analysis

5 1. Modelling TEWA Threat Evaluation (TE) Flagging Models / Qualititive Deterministic / Quantitive –Projected Passing Distance –Bearing towards Assets –Course towards Assets (2D & 3D) –Time to asset Probabilistic [Jacques du Toit & Willa Lotz, Jaco Roux & Jan van Vuuren] Weapon Assignment (WA) Rule Based / Heuristic [Francois du Toit & Cobus Potgieter] Mathematical / Computational [Grant van Dieman]

6 TE: Flagging Models Provide information regarding major changes in attributes of monitored threats: –Speed (Afterburner) –Altitude (Pitch) –Course (Maneuvers) Binary output Calibration options: –Absolute –Dynamic

77 TE Models Course Projected Passing Distance Course Variation Bearing Estimated Time-To-Weapon-Release (TTWR) Determine threat values between 0 (minimum) and 1 (maximum)

8 TE Model Threat Lists Threat Rank AircraftThreat Value Course a d c b Threat Rank AircraftThreat Value 1a0.9 2c0.8 3b0.4 4d0.0

9 TE Model Threat Lists Threat Rank AircraftThreat Value PPD a d c b Threat Rank AircraftThreat Value 1a0.8 2c0.7 3b0.1 4d0.0

10 TE Model Threat Lists Threat Rank AircraftThreat Value Course Variation a d c b Threat Rank AircraftThreat Value 1c0.9 2a0.4 3d0.3 4b0.0

11 TE Model Threat Lists Threat Rank AircraftThreat Value Bearing a d c b Threat Rank AircraftThreat Value 1b0.9 2a0.4 3c0.2 4d0.1

12 TE Model Threat Lists Threat Rank AircraftThreat Value TTWR a d c b Threat Rank AircraftThreat Value 1b0.9 2c0.7 3a0.6 4d0.1

13 Combined Asset Threat List RankAircraftThreat Value 1d0.8 2b0.5 3c0.3 4a0.1 RankAircraftThreat Value 1d0.9 2b0.7 3a0.4 4c0.1 RankAircraftThreat Value 1c0.8 2a0.7 3d0.6 4b0.2 RankAircraftThreat Value 1a0.9 2c0.8 3b0.6 4d0.0 RankAircraftThreat Value 1a0.8 2c0.7 3b0.5 4d0.0 CoursePPDCVBearingTTWR RankAircraftThreat Value 1a0.8 2c0.7 3b0.5 4d0.0 Asset

14 Asset Threat Lists Asset a d c b Threat Rank AircraftThreat Value 1a0.8 2c0.7 3b0.5 4d0.2

15 Asset Threat Lists Asset a d c b Threat Rank AircraftThreat Value 1a0.9 2c0.7 3d0.3 4b0.1

16 Combined System Threat List RankAircraftThreat Value 1d0.9 2c0.7 3d0.3 4b0.1 RankAircraftThreat Value 1a0.8 2c0.7 3b0.5 4d0.2 Asset aAsset b RankAircraftThreat Value 1a0.9 2c0.7 3d0.3 4b0.2 System

17 System Threat Lists System a d c b Threat Rank AircraftThreat Value 1a0.9 2c0.7 3d0.3 4b0.2

18 Combination Procedures Maximize Agreement Heuristic, Distance-Based Solution, Additive Model, Analytic Hierarchy Process Adapted from inustrial applications to be applied to TEWA TE model importance and Asset priorities taken into account by weighting Aim to maximize flexibility to satisfy end-user requirements

19 2. Simulation of TEWA Constructive discrete event simulation –Hill RR, Miller JO & McIntyre, Applications of discrete event simulation modelling to military problems, Proceedings of the 2001 Winter Simulation Conference, –Clymer JR, System design and evaluation using discrete-event simulation with artificial intelligence, Proceedings of the 1993 Winter Simulation Conference, System components –Defended Assets –Weapon sensors & effectors –Terrain –Monitored Threats (Fixed wing aircraft) System track (3D) Attack technique [Jacques du Toit & Willa Lotz]

20 System Infrastructure

21 3. Performance Measures Asset preservation Resource utilisation –Weapon cache / asset preservation ratio Threat evaluation accuracy –Intent vs action –Estimated capability vs actual capability Assignment optimality –Temporal optimality –Weapon allocation optimality –Weapon assignment optimality Expert analysis Challenges: –Performance measures difficult to quantify!

22 Demonstration

23 HMI

24 Status / Further Work TE: Flagging model and deterministic model infrastructure implemented for multiple assets and multiple aircraft. Threat list generation and system threat calculation implemented. Probabilistic threat models, WA, and discrete event simulation of multiple aircraft and multiple assets in various attack scenarios will follow thereafter in order to evaluate TEWA models.

25 References Duvenhage B & le Roux WH, A Peer-to-Peer Simulation Architecture, Proceedings of the 2007 High Performance Computing and Simulation Conference, pp , le Roux WH, Implementing a Low Cost Distributed Architecture for Real-Time Behavioural Modelling and Simulation, Proceedings of the 2006 European Simulation Interoperability Workshop, Stockholm, pp , June Roux J & van Vuuren JH, Threat evaluation and weapon assignment decision support: A review of the state of the art, Orion Journal of Operations Research, Submitted June Hill RR, Miller JO & McIntyre, Applications of discrete event simulation modelling to military problems, Proceedings of the 2001 Winter Simulation Conference, Clymer JR, System design and evaluation using discrete-event simulation with artificial intelligence, Proceedings of the 1993 Winter Simulation Conference, 1993.