Intelligent Threat Assessment Processor (ITAP) using Genetic Algorithms and Fuzzy Logic
|
|
|
- Francine Perkins
- 9 years ago
- Views:
Transcription
1 Intelligent Threat Processor (ITAP) using Genetic Algorithms and Fuzzy Logic Paul Gonsalves Rachel Cunningham Nick Ton Dennis Okon Principal Scientist Scientist Software Engineer Research Associate Charles River Analytics, Inc. Cambridge, MA, U.S.A. Abstract - The explosive growth in the area of information technology provides a tremendous opportunity for enhancing military warfighting capabilities. The management and processing of military intelligence information, the requisite assessment of enemy capabilities, intent, and objectives, and the generation of appropriate response recommendations form a critical element of battlespace operations. Here, we develop an Intelligent Threat Processor (ITAP) for enhancing tactical threat assessment. Our novel system integrates a genetic algorithm approach to predicting enemy courses of action (ecoas), a fuzzy logic-based analysis of predicted ecoas to infer enemy intent and objectives, and in conjunction with our ongoing development of an Intelligent Fusion and Asset Management Processor (IFAMP), provides the necessary functionality to support multi-level data fusion. We see considerable potential for this approach in enhancing existing tactical decision-aiding systems and addressing future information dominated battlespace requirements. Keywords: Data fusion, threat assessment, genetic algorithms, fuzzy logic. 1 Introduction Recent military operations and future battlefield requirements illustrate the importance of information superiority and the subsidiary need to provide enhanced battlespace awareness for the warfighter. However, with the promulgation of various inter-service information collection and dissemination mechanisms, a major challenge to achieve information dominance is how best to process and correlate data rapidly form many sources to generate a cohesive accurate picture of the battlespace and generate appropriate response recommendations, i.e., data fusion and visualization and decision-aiding remain critical processes. The overall goal of data fusion is to combine data from multiple sources into information that has greater benefit than would have been derived from each of the contributing parts [1]. An obvious analogy exists between data fusion and human cognitive processing, in particular, the way humans process multi-sensory information (i.e., sight, sound, smell,...etc.) to make inferences regarding the external environment. Current fusion methods for target location and track determination are based on parametric data association, and the use of either batch or sequential estimation techniques [2]. For target identification fusion, various methods have been applied, including parametric based, statistical, and clustering based algorithms, and model-based simulation and estimation. Efforts for higher-level fusion processing, including situation assessment and threat assessment, have relied on more cognitive and symbolic processing methods. However, these efforts have not been totally successful due to inflexibility to changing external environment conditions, non-repeatability of the target signatures, limited use of a priori information regarding sensor/asset capabilities/limitations, and inability to address the distributed nature of future battlespace systems. To address these issues we have developed an Intelligent Threat Processor (ITAP) to provide prediction and interpretation of enemy courses of actions (ecoas). A course of action is defined in military terms as a possible plan related to the accomplishment of a mission. The ITAP architecture integrates two specific elements: a genetic algorithms (GAs) based module for determination of likely ecoas, and a fuzzy logic-based module to analyze and interpret predicted ecoas and to infer enemy intent and objectives and enemy capabilities and vulnerabilities, and a visualization and decisionaiding module for generating response recommendations and enhancing battlespace awareness. The course of action prediction module builds on our on-going work with a GA-based military planning tool dubbed FOX [3]. Additionally, ITAP makes extensive use as well as enhances our Intelligent Fusion and Asset Management Processor (IFAMP) project [4]. The goal of IFAMP is to develop an integrated software application that can fuse information from disparate sources and provide the capability to detect, track, classify, and engage targets and provide timely assessment of the situation. Additionally, IFAMP supports functionality for the control and management of sensor and information assets. IFAMP incorporates the following components: a fuzzy logic low level fusion manager, fuzzy logic event detection, belief networks for situation assessment, and a fuzzy-based asset management component. There is a
2 natural fit between IFAMP and ITAP. Specifically, the Bayesian belief network based situation assessment can provide the GA ecoa predictor with the necessary current disposition and composition of enemy forces. Conversely, outputs of the ITAP, such as ecoa and enemy intent and capabilities, can be fed back to the IFAMP belief network component to post as evidence. Additionally, this threat evidence can facilitate a speculative analysis mode for the belief network where the goal is to determine what information is critical to answer the high-level information requirements (e.g. where enemy s main attack will be concentrated). Such information provides specific focus for the asset management module of IFAMP. The paper is organized as follows. Section 2 introduces the scope and overall architecture of ITAP. Section 3 details the major components of ITAP including the GAbased generation of enemy courses of action and a the fuzzy logic approach to ecoa decomposition and overall threat assetment. Section 4 presents ITAP sample results for a given military tactical battlefield scenario. Section 5 concludes the paper with relevant conclusions and a discussion of future work. 2 System Description 2.1 Levels of Data Fusion The Joint Directors of Laboratories (JDL) Data Fusion Subpanel have identified five levels of fusion processing products [5]: Level 0 (Sub-Object ): Fused estimates of object signals or features Level 1 (Object ): Fused position and identity estimates Level 2 (Situation ): Friendly or hostile military situation assessments Level 3 (Impact ): Hostile force threat assessments Level 4 DF (Process Refinement): Control of assets via process refinement Across these levels of information products, the generality of the results increases from the very specific (e.g., wheeled vehicles detected at location X ) to the more general (e.g., enemy s main attack will at location X ). Level 0 processing includes signal detection and feature extraction. At level 1, also referred to as object assessment, numeric procedures such as estimation (e.g., Kalman filtering) or pattern recognition dominate the processing operations. Object assessment information products arise from single and multi-source processing (such as target tracking) by sampling the external environment with available sensors and other information sources. The products of this processing are position and identity estimates for targets or platforms in the composite field of view. Symbolic reasoning processes involving higher levels of abstraction and inference dominate the level 2 (situation assessment) and 3 (impact assessment) fusion operations. Situation abstraction is the construction of a generalized situation representation from incomplete data sets to yield a contextual interpretation of level 1 products. This level of inference is concerned with deriving knowledge from some type of pattern analysis of level 1 data. Whereas levels 1 through 3 concern themselves with processing and refining information or what can be termed estimation functions, level 4, or process refinement, involves the integrated management and coordination of the available sensor and information assets, or what can be termed as control functions. Process refinement functions seek to enhance estimation performance including earlier target detection and recognition, improved tracking, increased situation assessment, and timely threat assessment. ITAP deals specifically with level 3 impact or threat assessment. The distinction between levels 2 and 3 is that level 3 products attempt to quantify the threat s capability and predict its intent by projecting into the future, whereas level 2 results seek to indicate current hostile behavior patterns. Elements of level 3 include determining enemy capabilities and vulnerabilities based on the current assessment and awareness of enemy and friendly composition and disposition. A major element threat refinement is the prediction and evaluation of enemy courses of actions (ecoas). A COA is defined as a plan to accomplish a mission or related to the accomplishment of a mission. Five elements are inherent in COAS: 1) type of operation (WHAT), 2) timing of the operation (WHEN); 3) location (WHERE); 4) employment of assets (HOW); and overall objectives and goals (WHY). Any method that seeks to determine or predict possible enemy COAs (ecoas) provides a valuable information source and planning tool for not only in the scope of data fusion (specifically for the collection management or process refinement), but more in the operational or command and control domain. Both of these areas are addressed in ITAP. 2.2 ITAP Scope Figure 1 shows the overall scope of our ITAP system for threat assessment processing within the overall context of the different levels of data and information fusion. Figure 1 also illustrates how ITAP relates to our on-going IFAMP effort. As shown, we begin with a specification of the external environment. This includes the specification of all friendly, hostile, and neutral forces, as well as a description of the local terrain and current weather conditions. The collection assets sense information about the external environment. Figure 1 lists a common set of platforms including J-STARS, UAVs, AWACS, etc. Data from these sensors/assets are then fused (object assessment) within IFAMP level 1 processing to generate individual target tracks and to classify and characterize targets. The situation assessment module of IFAMP uses this fused track data to generate a current situational state from detected events. The total situation assessment state is then forwarded to the ITAP module. The ITAP module is responsible for inferring enemy intent and objectives, as well as enemy/friendly capabilities and vulnerabilities. In particular, ITAP provides a means to predict enemy
3 IFAMP Scope ITAP Scope External Environment Collection Assets Object Situation Impact Data Alignment Event Detection Enemy Intent/Objectives Hostile/Friendly Forces J-STARS AWACS Data Association Target Tracking Target Classification Hypothesis Generation Situation Enemy/Friendly Capabilities & Vulnerabilities Threat COA Prediction & Analysis Terrain UAV Asset Management Weather Others Asset Coordination Process Refinement Figure 1 : Scope of ITAP pgg courses of actions (ecoas). These ecoas are then analyzed to infer enemy high-level information, specifically, high-level evidence concerning enemy intent, enemy mission objectives, and enemy capabilities, and vulnerabilities. This high-level threat assessment evidence is then fed back to the IFAMP level 2 module. ITAP s scope also goes beyond the four levels of data and information fusion, by addressing decision-aiding and battlefield visualization aspects. These two aspects were not addressed in the research presented here, but but have been proposed for a follow-on effort to support the operations planning and execution phases. 2.3 ITAP Architecture Figure 2 shows the Intelligent Threat Processor (ITAP) architecture and how it interfaces with our on-going IFAMP effort. ITAP consists of two main modules: a GA based ecoa prediction module based on the FOX military planning tool and an ecoa IFAMP enemy composition Belief Network Based & disposition Situation Belief Network Based Speculative Analysis ecoa evidence intent & objectives evidence ITAP FOX (ecoa Generation) ecoa state vectors ecoa Decomposition Figure 2: ITAP Architecture enemy intent capabilities & vulnerabilities (to C 2 systems) decomposition inferencing module based on fuzzy logic expert systems. As shown in Figure 2, IFAMP level 2 belief networks supply the FOX tool with initial specification of enemy disposition and composition, so as to constrain the GA-based search. After decomposition of predicted ecoa into enemy intent/objectives and capabilities/vulnerabilities within ITAP s fuzzy logic-based ecoa decomposition module, (dubbed the Fuzzy logic Post Processor (FLP2) the information is passed on to command and control (C2) decision-aiding systems and, in turn back to IFAMP level 2 belief networks. The high level enemy information is used within IFAMP in a speculative manner to determine critical information requirements a vital element of the collection management process. Details relevant to GAs and the FOX tool for ecoa prediction are provided in section 3.1, and decomposition using fuzzy logic of FOX generated ecoa state vector is discussed in section ITAP Component Descriptions 3.1 Enemy Course of Action (ecoa) Generation Systems design problems that require optimizing a function depending on a large number of parameters pose a significant challenge. Such problems (of which ecoa generation is an example) possess a large parametric space from which to choose, the possibility of large infeasible and non-uniform areas, and the presence of numerous local minima or maxima. To solve these problems, one generally resorts to either analytical gradients or numerical searches. Some of these techniques may be time consuming either in developing the optimization approach or in their execution, and may lead only to
4 locally optimal solutions. In some instances, the problem is simplified to satisfy the optimization technique, resulting in a solution that is optimal for only an approximate problem. Recently, genetic algorithms (GAs) have gained popularity in solving optimization problems while treating the function to be optimized as a black box [6]. Genetic algorithms are parameter search procedures based upon the mechanics of natural genetics. They combine a Darwinian survival-of-the-fittest philosophy with a random, yet structured information exchange among a population of artificial chromosomes. GAs have been shown to do well on problems that are difficult to solve using traditional techniques [7] [8]. FOX [3] is a genetic algorithms (GA)-based planning support tool for assisting military intelligence and maneuver battlestaff in rapidly generating and assessing battlefield courses of actions (COAs). FOX s efficiency in generating large numbers of potential COAs stems from its high-level (abstract) representation of the battlespace and forces. Wargaming at a high representational level enables a rapid search through the COA-space for generally desirable solutions. In FOX s current configuration, these high-level candidate COAs are then presented to human analysts for a more in-depth analysis and detailed planning effort needed to fully define the COAs. However, this COA planning and analysis process could be further accelerated by a decision support tool to help generate detailed operation plans. Whereas, our ongoing FOX work has concentrated on development of friendly COAs for planning purposes, for ITAP we have transitioned FOX to support the generation of enemy COAs to support threat assessment as shown in figure 3. The three major components of FOX are: 1) the GA optimization software itself; 2) a Wargamer which plays out GA generated enemy COAs against a representative set of friendly COAs; and 3) a Performance Evaluator (or fitness function in GA parlance) that assigns a score or fitness of a given string or solution. FOX employs a high-level representation of battlefield engagements. It assumes a generic maneuver box (or area of interest) having several parallel avenues of approach (AAs), which are orthogonal to several lines of defensible terrain (LDTs). An LDT is a string of roughly adjacent choke points cutting across all the AAs providing a naturally strong defensive position. The offensive forces are modeled as moving from tactical assembly areas (TAAs) behind the forward edge of the battle area (FEBA) toward an envisioned limit of advance (LOA) beyond the furthest LDT. Thus far, FOX has been developed as an offensive COA generation tool but can be generalized to generate optimized defensive COAs as well. FOX currently supports common ground forces including mechanized infantry and armored units. However, given the essential similarity of features used to describe functional elements across all echelons (e.g., firepower, speed of movement, size, etc.), adaptation to other scenarios is expected to be straightforward. In the current version of FOX for ecoa generation, ecoas are characterized in terms of the specific allocation of subordinate units (resolved down to the level of companies) to avenues of approach and the assigned missions of those units, the allocation of general (brigadelevel) resources to subordinate units, and the specifics of doctrinal rules of combat (e.g., criteria for use of reserve forces etc.). FOX takes as input a configuration of enemy units (companies) along a particular LDT and then searches through the space of possible ecoas to find one maximizing a fitness measure reflecting remaining endgame enemy strength and amount of terrain captured. The optimization is accomplished using the framework of genetic algorithms (GAs) via the following process: 1) an initial population of offensive or defensive (enemy) ecoas is created; 2) each of these ecoas is wargamed against a range of offensive (friendly) COAs; 3) each ecoa s fitness function is evaluated; 4) the least fit ecoas are removed from the population; 5) the genetic variation operator (e.g., mutation, cross-over) is applied, Inputs Genetic Algorithm GA parameters # of generations population size crossover rate mutation rate Fitness Performance Evaluator (Fitness Function) Enemy COA genotype Wargamer Mission/Objective Risk level Baseline unit strengths Reserve use policy Order of battle State vector Battlespace AA-0 AA-1 AA-2 LDT-2 LDT-1 LDT-0 Friendly OPFOR COA Generator (e.g., Hound) Friendly Friendly COA 1 COA j Representative set of fixed Friendly COAs Friendly COA k Figure 3 : FOX Genetic Algorithms-based ecoa Generation pgg00-007
5 resulting in a new population. This cycle is repeated until the fitness functions show no further improvement in outcome. Initial results using the generic scenario described above indicate that FOX can produce a variety of good ecoas, as assessed by military intelligence analysts [3]. 3.2 Fuzzy Logic for ecoa Decomposition and Threat Fuzzy logic as proposed by Lofti Zadeh [9] provides a mathematical concept to deal with uncertainty in human decision-making. Zadeh was concerned with how humans can process imprecise non-numerical, or linguistic, information (i.e., big, small, very fast, heavy, etc.) to perform a given task. He argued that if a human can perform complex tasks with this imprecise knowledge, then a machine would also benefit from such an approach. Fuzzy logic has been successfully applied in such areas as statistical analysis, pattern recognition, image analysis, robotics, decision theory, and control theory. Within the ITAP system, fuzzy logic is employed within the Fuzzy Logic Post-Processor (FLP2) module to perform decomposition of the FOX ecoa state vector and overall threat assessment. Specifically, the FLP2 parses and analyzes the FOX ecoa state vector to infer threat assessment information including: most likely location of enemy s main effort; which avenue of approach is more likely; does either faction have especially favorable conditions (i.e. does one finish the battle in a strong position, when the other is especially weak); and comparitive advantage of opposing forces at the end of the engagement. Based on these results, the FLP2 then updates the relative situation assessment states as specied in the IFAMP belief networks [4]. 4 Performance Demonstration Performance demonstration of the ITAP system involved addressing threat assessment for a specific tactical scenario. The scenario is a ground force-on-force friendly offensive/enemy defensive tactical scenario in which a regimental size enemy force will be defending in region somewhere between demarcated by four phase lines (PL). The friendly brigade task force s mission is to seize a key piece of terrain dubbed OBJ JODI. Demonstration reults are presented in turn for the FOX ecoa generation and for the FLP2 ecoa decomposition and threat assessment. 4.1 FOX Performance Demonstration FOX was run with varying inputs, specifically related to likely friendly COAs, initial strength level for enemy forces, and whether enemy forces were dug in for defensive purposes or were mobile for attack purposes. Friendly COA variation is related to which avenue of approach (or route) the friendly forces choice to attack, i.e., either attacking from the north or south. Initial strength level for enemy forces was based on an assumption of the effectiveness of prior friendly force infiltration attack as specified by the scenario. Figure 4 shows the final frame from a FOX generated ecoa. The ecoa here is assuming that friendly forces (denoted by the darker colored unit icons) take a southerly approach and enemy (denoted by the lighter colored unit icons) forces are in an attack mode. In the course of this ecoa, enemy forces take the northern avenue of approach to engage a friendly supporting attack, whilst leaving the key terrain area (OBJ JODI) undefended. What results in the final frame of this ecoa, as shown in figure 4, is that the friendly forces are able to take the objective area (labeled OBJ JODI), albeit with some losses. The end strengths of the individual units is denoted by the bar level on the right side of the individual unit icons. A level the same height as the icon denotes full unit strength, while no level denotes that unit has been destroyed (e.g. the three enemy units located near the objective area). Figure 5 shows the corresponding final frame when the enemy forces stay in a purely defensive posture. The assumption here is that the friendly main attack effort is proceeding from the southerly route with a support attack in the northerly route. As shown, the enemy forces inflict heavy damage on the friendly forces and are able to defend the key terrain area. Similar results are also noted Figure 4: Example FOX Generated ecoa from Tactical Scenario Enemy Attacking
6 Figure 5: Example FOX Generated ecoa from Tactical Scenario Enemy Defending when the friendly main and support attacks switch approaches. Using the FOX GA-based optimizations of enemy COAs provides an automated method for the generation of viable and distinctive ecoas. These ecoas are optimized for the given situation (e.g. initial unit strengths, current avenue of approach taken, etc.) and order of battle. With the GA mechanism, the capability exists to wargame thousands of ecoas, thus providing a valuable tool for threat assessment. Additionally, capability exists to use this mechanism to enhance perception management functionally. That is, use the tool in a what-if mode by iteratively determining the input friendly COA that will generate a desired (form the friendly perspective) ecoa. The issue then becomes how can the friendly forces make the enemy forces perceive that the determined friendly COA is the one currently being executed, i.e. a perception management problem. 4.2 FLP2 Performance Demonstration Figure 6 shows FLP2 sample performance demonstration results for decomposing FOX ecoa information into threat assessment information. The output compares two generated ecoas and determines how best to update a belief network for situation assessment. The rulebase implemented for this demonstration had approximately thirty rules for ecoa decomposition. Specific elements addressed within the rulebase included avenue of approaches taken by enemy forces, comparison of initial versus end strengths for both opposing forces, types of units employed in the ecoa, determination of main effort, possible location of obstacles (e.g. tank barriers), and vulnerability analysis. All this information was weighted and a determination of which ecoa to pick was based on the favorability from the enemy forces' perspective. From our preliminary research, we conclude that the human-like reasoning provided by fuzzy rule-based processing provides a strong method for post-processing enemy courses of action and identifying their weaknesses Processing enemy's course of action... First ecoa: Blue has 4 units in conflict with 4 red units. The blue force retains some to most of its initial strength. The red force retains some to most of its initial strength. Final strength comparison: blue and red forces are of similar strength. General information: South AA is left undefended in this scenario. Conditions appear equally favorable for both forces. Main resistance is likely to be in the north AA. Processing enemy's course of action... Second ecoa: Blue has 4 units in conflict with 4 red units. The blue force retains some to most of its initial strength. The red force retains some to most of its initial strength. Final strength comparison: blue forces are somewhat weaker than red forces. General information: North AA is left undefended in this scenario. Conditions appear equally favorable for both forces. Main resistance is likely to be in the south AA. Comparison of ecoas: Updated the main effort and obstacle location nodes of the belief net based on the second COA, which had a higher enemy end strength. The main effort node was updated with a 2.25 to 1.0 ratio of AA livelihoods, and the obstacle node was updated with a 1.1 to 1.0 ratio. Figure 6: FLP2 Sample Results for ecoa Decomposition
7 and strengths. The rulebase proved itself consistently able to judge whether one or another side had a distinct advantage in battle, and where an avenue of attack was left unguarded. Future expansions of the rulebase will include more extensive pattern-matching algorithms to more accurately characterize enemy attack patterns. 5 Conclusions The performance demonstration results demonstrate the feasibility of the genetic algorithm paradigm for predicting the most likely course of battle in a tactical scenario. FOX's capacity to wargame thousands of ecoa instances greatly enhances the overall threat assessment capability of IFAMP/ITAP, and has significant potential as a perception management tool. The genetic algorithm allows for the generation of viable, optimized COAs in a short span of time, and functions as a valuable aid to the human cognition process. The preliminary GA-based methodology for ecoa prediction described in this paper can be enhanced in many ways. The two most promising enhancement paths are extension of the wargamer to allow for different types of units that are not currently supported (e.g. air assets) while incorporating additional features such as terrain detail, and expanding FOX to address non-standard scenarios such as asymmetric warfare. From this preliminary research, one can also conclude that the human-like reasoning provided by fuzzy rulebased processing provides a strong method for postprocessing enemy courses of action and identifying their weaknesses and strengths. The rulebase proved itself consistently able to judge whether one or another side had a distinct advantage in battle, and where an avenue of attack was left unguarded. Future expansions of the rulebase will include more extensive pattern-matching algorithms to more accurately characterize enemy attack patterns. Information Fusion, 2 nd Internation Conference on Information Fusion, Sunnyvale, CA, [5] A. Steinberg, C. Bowman, and F. White, Revisions to the JDL Data Fusion Model, Joint NATO/IRIS Conference, Quebec, Canada, [6] D. Goldberg, Genetic Algorithms: In Search, Optimization, and Machine Learning, Addison Wesley Publishing Company, [7] K. KrishnaKumar, and D. Goldberg, Genetic Algorithms in Control System Optimization, Journal of Guidance, Control, and Dynamics, [8] Z. Michalewicz, Genetic Algorithms + Data Structures = Evolution Programs, Springer-Verlag, [9] L. Zadeh, Fuzzy Sets, Information and Control, Acknowledgements The work detailed in this paper was performed under USAF Contract C C The authors thank the Technical Monitor, Mr. Michael Hinman, of the Air Force Research Laboratory Information Directorate (Rome, NY) for his guidance and support. References [1] E. Waltz and J. Llinas, Multisensor Data Fusion, Artech House, Inc., [2] D. Hall, Mathematical Techniques in Multisensor Data Fusion, Artech House, [3] J. Schlabach, C. Hayes, and D. Goldberg, SHAKA- GA: A Genetic Algorithm for Generating and Analyzing Battlefield Courses of Action, University of Illinois UC (White Paper ), [4] P. Gonsalves, G. Rinkus, and N. Ton, A Hybrid Artificial Intelligence Architecture for Battlefield
Troops Time Planner and Simulation Models For Military
SUPPORTING COURSES OF ACTION PLANNING WITH INTELLIGENT MANAGEMENT OF Contact Information: CELESTINE A. NTUEN & EUI H. PARK The Institute for Human-Machine Studies North Carolina A&T State University Greensboro,
EXECUTIVE SUPPORT SYSTEMS (ESS) STRATEGIC INFORMATION SYSTEM DESIGNED FOR UNSTRUCTURED DECISION MAKING THROUGH ADVANCED GRAPHICS AND COMMUNICATIONS *
EXECUTIVE SUPPORT SYSTEMS (ESS) STRATEGIC INFORMATION SYSTEM DESIGNED FOR UNSTRUCTURED DECISION MAKING THROUGH ADVANCED GRAPHICS AND COMMUNICATIONS * EXECUTIVE SUPPORT SYSTEMS DRILL DOWN: ability to move
D A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Multisensor Data Fusion and Applications
Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: [email protected]
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
Investment Analysis using the Portfolio Analysis Machine (PALMA 1 ) Tool by Richard A. Moynihan 21 July 2005
Investment Analysis using the Portfolio Analysis Machine (PALMA 1 ) Tool by Richard A. Moynihan 21 July 2005 Government Investment Analysis Guidance Current Government acquisition guidelines mandate the
Data Isn't Everything
June 17, 2015 Innovate Forward Data Isn't Everything The Challenges of Big Data, Advanced Analytics, and Advance Computation Devices for Transportation Agencies. Using Data to Support Mission, Administration,
Predictive Cyber Defense A Strategic Thought Paper
Predictive Cyber Defense A Strategic Thought Paper Don Adams Vice President, Chief Technology Officer, Worldwide Government TIBCO Software Federal, Inc 2 Summary The art and science of multi-sensor data
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Introduction to Data Mining Techniques
Introduction to Data Mining Techniques Dr. Rajni Jain 1 Introduction The last decade has experienced a revolution in information availability and exchange via the internet. In the same spirit, more and
Navy Information Dominance Industry Day
Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Improving Decision Making and Managing Knowledge
Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,
Cognitive and Organizational Challenges of Big Data in Cyber Defense
Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory [email protected], [email protected] The cognitive and organizational
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
Sensor Integration in the Security Domain
Sensor Integration in the Security Domain Bastian Köhler, Felix Opitz, Kaeye Dästner, Guy Kouemou Defence & Communications Systems Defence Electronics Integrated Systems / Air Dominance & Sensor Data Fusion
TDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.
Previews of TDWI course books are provided as an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews can not be printed. TDWI strives
Army Doctrine Update
Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near
Better decision making under uncertain conditions using Monte Carlo Simulation
IBM Software Business Analytics IBM SPSS Statistics Better decision making under uncertain conditions using Monte Carlo Simulation Monte Carlo simulation and risk analysis techniques in IBM SPSS Statistics
ICT Perspectives on Big Data: Well Sorted Materials
ICT Perspectives on Big Data: Well Sorted Materials 3 March 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations in
Project Time Management
Project Time Management Study Notes PMI, PMP, CAPM, PMBOK, PM Network and the PMI Registered Education Provider logo are registered marks of the Project Management Institute, Inc. Points to Note Please
Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment,
Uncertainty Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment, E.g., loss of sensory information such as vision Incorrectness in
Information Visualization WS 2013/14 11 Visual Analytics
1 11.1 Definitions and Motivation Lot of research and papers in this emerging field: Visual Analytics: Scope and Challenges of Keim et al. Illuminating the path of Thomas and Cook 2 11.1 Definitions and
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
Data Intensive Science and Computing
DEFENSE LABORATORIES ACADEMIA TRANSFORMATIVE SCIENCE Efficient, effective and agile research system INDUSTRY Data Intensive Science and Computing Advanced Computing & Computational Sciences Division University
Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao
Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated
Marine Corps Tank Employment MCWP 3-12 (CD) Appendix F. Scout and TOW Platoons
Appendix F Scout and TOW Platoons Section 1. Scout Platoon Section 2. TOW Platoon F - 1 Section 1. Scout Platoon. Mission. The battalion scout platoon performs reconnaissance, provides limited security,
Random forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
Automatic parameter regulation for a tracking system with an auto-critical function
Automatic parameter regulation for a tracking system with an auto-critical function Daniela Hall INRIA Rhône-Alpes, St. Ismier, France Email: [email protected] Abstract In this article we propose
U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview
U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture
Doctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques
Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,
14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)
Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,
Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:[email protected]
Applications of mobile ad-hoc networks my article applications of mobile ad-hoc networks at http://www.computingunplugged.com/issues/issue2004 09/00001371001.html Humayun Bakht School of Computing and
Bio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
Chapter Managing Knowledge in the Digital Firm
Chapter Managing Knowledge in the Digital Firm Essay Questions: 1. What is knowledge management? Briefly outline the knowledge management chain. 2. Identify the three major types of knowledge management
A Client-Server Interactive Tool for Integrated Artificial Intelligence Curriculum
A Client-Server Interactive Tool for Integrated Artificial Intelligence Curriculum Diane J. Cook and Lawrence B. Holder Department of Computer Science and Engineering Box 19015 University of Texas at Arlington
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Leran Wang and Tom Kazmierski {lw04r,tjk}@ecs.soton.ac.uk
BMAS 2005 VHDL-AMS based genetic optimization of a fuzzy logic controller for automotive active suspension systems Leran Wang and Tom Kazmierski {lw04r,tjk}@ecs.soton.ac.uk Outline Introduction and system
Set-Based Design: A Decision-Theoretic Perspective
Set-Based Design: A Decision-Theoretic Perspective Chris Paredis, Jason Aughenbaugh, Rich Malak, Steve Rekuc Product and Systems Lifecycle Management Center G.W. Woodruff School of Mechanical Engineering
Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci
1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks
A Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Introduction. Chapter 1. 1.1 Scope of Electrical Engineering
Chapter 1 Introduction 1.1 Scope of Electrical Engineering In today s world, it s hard to go through a day without encountering some aspect of technology developed by electrical engineers. The impact has
Some Thoughts on the Future of Cyber-security
Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions
SureSense Software Suite Overview
SureSense Software Overview Eliminate Failures, Increase Reliability and Safety, Reduce Costs and Predict Remaining Useful Life for Critical Assets Using SureSense and Health Monitoring Software What SureSense
Contents. Dedication List of Figures List of Tables. Acknowledgments
Contents Dedication List of Figures List of Tables Foreword Preface Acknowledgments v xiii xvii xix xxi xxv Part I Concepts and Techniques 1. INTRODUCTION 3 1 The Quest for Knowledge 3 2 Problem Description
About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013
About the Author The Role of Artificial Intelligence in Software Engineering By: Mark Harman Presented by: Jacob Lear Mark Harman is a Professor of Software Engineering at University College London Director
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
Business Intelligence and Decision Support Systems
Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley
A Cognitive Approach to Vision for a Mobile Robot
A Cognitive Approach to Vision for a Mobile Robot D. Paul Benjamin Christopher Funk Pace University, 1 Pace Plaza, New York, New York 10038, 212-346-1012 [email protected] Damian Lyons Fordham University,
Fault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Architecture Modeling Approach for Net-Centric Enterprise Services (C4ISR/C2 Architecture Track)
A Paper submitted to the 10th International Command and Control Research and Technology Symposium "The Future of C2" Architecture Modeling Approach for Net-Centric Enterprise s (C4ISR/C2 Architecture Track)
Neural Networks and Back Propagation Algorithm
Neural Networks and Back Propagation Algorithm Mirza Cilimkovic Institute of Technology Blanchardstown Blanchardstown Road North Dublin 15 Ireland [email protected] Abstract Neural Networks (NN) are important
Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach
Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST
Master of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
EL Program: Smart Manufacturing Systems Design and Analysis
EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical
WORKFLOW ENGINE FOR CLOUDS
WORKFLOW ENGINE FOR CLOUDS By SURAJ PANDEY, DILEBAN KARUNAMOORTHY, and RAJKUMAR BUYYA Prepared by: Dr. Faramarz Safi Islamic Azad University, Najafabad Branch, Esfahan, Iran. Workflow Engine for clouds
01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
Providing On-Demand Situational Awareness
ITT Exelis Geospatial Intelligence Solutions Providing On-Demand Situational Awareness Use of U.S. Department of Defense (DoD) and U.S. Army imagery in this brochure does not constitute or imply DoD or
Masters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
Oracle Real Time Decisions
A Product Review James Taylor CEO CONTENTS Introducing Decision Management Systems Oracle Real Time Decisions Product Architecture Key Features Availability Conclusion Oracle Real Time Decisions (RTD)
A STRATEGIC PLANNER FOR ROBOT EXCAVATION' by Humberto Romero-Lois, Research Assistant, Department of Civil Engineering
A STRATEGIC PLANNER FOR ROBOT EXCAVATION' by Humberto Romero-Lois, Research Assistant, Department of Civil Engineering Chris Hendrickson, Professor, Department of Civil Engineering, and Irving Oppenheim,
Security visualisation
Security visualisation This thesis provides a guideline of how to generate a visual representation of a given dataset and use visualisation in the evaluation of known security vulnerabilities by Marco
Spatial Data Mining Methods and Problems
Spatial Data Mining Methods and Problems Abstract Use summarizing method,characteristics of each spatial data mining and spatial data mining method applied in GIS,Pointed out that the space limitations
Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC
Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, [email protected] Technical POC: George Romas, [email protected]
CHAPTER 8 THE METHOD-DRIVEN idesign FOR COLLABORATIVE SERVICE SYSTEM DESIGN
CHAPTER 8 THE METHOD-DRIVEN idesign FOR COLLABORATIVE SERVICE SYSTEM DESIGN Central to this research is how the service industry or service providers use idesign as a new methodology to analyze, design,
Model, Analyze and Optimize the Supply Chain
Model, Analyze and Optimize the Supply Chain Optimize networks Improve product flow Right-size inventory Simulate service Balance production Optimize routes The Leading Supply Chain Design and Analysis
MODELING AND SIMULATION IN DEFENSE AND SECURITY
Author: Editorial Title: Modeling and Simulation in Defense and Security. NATO Context. Year of issuance: 1999 Issue: Information & Security. Volume 3, 1999 Hard copy: ISSN 1311-1493 MODELING AND SIMULATION
Chapter 11. Managing Knowledge
Chapter 11 Managing Knowledge VIDEO CASES Video Case 1: How IBM s Watson Became a Jeopardy Champion. Video Case 2: Tour: Alfresco: Open Source Document Management System Video Case 3: L'Oréal: Knowledge
PROGRAM DIRECTOR: Arthur O Connor Email Contact: URL : THE PROGRAM Careers in Data Analytics Admissions Criteria CURRICULUM Program Requirements
Data Analytics (MS) PROGRAM DIRECTOR: Arthur O Connor CUNY School of Professional Studies 101 West 31 st Street, 7 th Floor New York, NY 10001 Email Contact: Arthur O Connor, [email protected] URL:
Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189
CALL FOR PAPERS for the IST/SET-126 Symposium on Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 to be held in Norfolk Virginia,
The Challenge of Productivity Measurement
Proceedings: Pacific Northwest Software Quality Conference, 2006 The Challenge of Productivity Measurement David N. Card Q-Labs, Inc [email protected] Biography- David N. Card is a fellow of Q-Labs, a subsidiary
Introduction. Chapter 1
1 Chapter 1 Introduction Robotics and automation have undergone an outstanding development in the manufacturing industry over the last decades owing to the increasing demand for higher levels of productivity
Attack graph analysis using parallel algorithm
Attack graph analysis using parallel algorithm Dr. Jamali Mohammad ([email protected]) Ashraf Vahid, MA student of computer software, Shabestar Azad University ([email protected]) Ashraf Vida, MA
Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski [email protected]
Introduction to Machine Learning and Data Mining Prof. Dr. Igor Trakovski [email protected] Neural Networks 2 Neural Networks Analogy to biological neural systems, the most robust learning systems
Big Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,
Numerical Research on Distributed Genetic Algorithm with Redundant
Numerical Research on Distributed Genetic Algorithm with Redundant Binary Number 1 Sayori Seto, 2 Akinori Kanasugi 1,2 Graduate School of Engineering, Tokyo Denki University, Japan [email protected],
