Threat Density Map Modeling for Combat Simulations
|
|
|
- Holly Stevens
- 9 years ago
- Views:
Transcription
1 Threat Density Map Modeling for Combat Simulations Francisco R. Baez Christian J. Daren Modeling, Virtual Environments, and Simulation (MOVES) Institute Naval Postgraduate School 700 Dyer Road, Watins Ext. 265 Monterey, CA Keywords: Threat Modeling, Combat Simulations, Probability Theory ABSTRACT: The modeling and simulation community has used probability threat maps and other similar approaches to address search problems and improve decision-maing. Probability threat maps describe the probability of a location containing one or more enemy entities at a particular time. Although useful, they only describe the lielihood that the location is occupied without addressing the degree to which it is occupied. Thus, we investigate whether threat density maps that describe the searcher s expectation of seeing a number of target agents at a certain location in a given time interval are a viable method for improving synthetic behaviors in combat simulations. As a proof of principle, this paper introduces a probability model which quantifies the searcher agent s subjective belief about the number of enemy entities in a location, given the initial information described by a prior density function and the information provided by the assumed sensing model. In addition, this paper discusses a framewor for initializing the model, as well as the model s ey advantages and current limitations. 1. Introduction A probability threat map is a nowledge representation of the search environment as a discrete probability distribution, which provides a snapshot in time of unobserved threat locations. More specifically, probability threat maps are models of the perceived threat that describe the probability that any given one of a number of unseen entities that are moving independently is in a location (Daren, McCue, & Guerrero, 2010). They have been applied successfully to drive the synthetic behaviors for target scanning in military training simulations by prioritizing locations that are most liely to contain targets (Daren et al., 2010; Evangelista, Ruc, Balogh, & Daren, 2011). Probability threat maps are derivatives of probabilistic occupancy maps used by game developers for opponent and target tracing (Isla & Blumberg, 2002; Isla, 2006); in addition, they use methods and techniques originally developed for mobile robotics designed to improve localization, search, navigation, and decision-maing behaviors (Elfes, 1989; Thrun 2003). Others analogous approaches have been applied to investigate search problems with incomplete and uncertain information using unmanned aerial sensors and autonomous ground sensors (Bertucelli & How, 2005, 2006; Chung & Burdic, 2008, 2012; Chung, Kress, & Royset, 2009; Kagan & Ben Gal, 2013). Existing probability threat maps approaches for military simulations (Daren et al., 2010; Evangelista et al., 2011) provide simulated entities with subjective nowledge of liely enemy locations over a defined area, which is then used to carry out search decisions and search behaviors (e.g., select the next search area, modify movement, change tactical formations, path planning). These methods successfully improved the representation of search based on situational awareness and environmental factors in military simulations. However, there is a stated need and interest for expanding these methods essentially to enhance the representation of search, reasoning, and decisionmaing behaviors in combat simulations. We believe that the current implementation of probability threat maps could be augmented with additional subjective nowledge of the threat necessary to model and simulate combat scenarios. Probability threat maps use statistical description of liely enemy locations but lac the ability to infer the number of the enemy from observed data and prior information. Ideally, the searcher should gain whatever information he can during the search process and then assess his subjective belief to infer the liely disposition (i.e. location and number of entities) of the threat. A threat density map is a nowledge representation of the expected number of the enemy entities located inside each subdivision of the simulated area. More specifically, it quantifies the searcher agent s expectation of finding a number of enemy entities at a particular location in a time interval. The purpose threat density maps is to augment combat simulations
2 with actionable subjective nowledge that can be exploited by the simulated entities for reasoning and decision-maing in response to the threat and environment circumstances. In contrast to probability threat maps, threat density maps provide the searcher agent with additional data needed in combat simulated scenarios to mae better decisions amongst different courses of action consistent with the situation presented by the enemy forces (Pew & Mavor, 1998). For instance, depending on the size of the enemy forces the searcher agent can decide whether to defend, assault, attac, withdraw, avoid combat, or bypass. Such decisions would control other behaviors such as searching techniques, path planning, patrolling strategies, etc. In this context, simulated entities would have additional threat nowledge to reason and act upon. In this paper, we introduce a threat density map model as a proof of principle. We build on current probability threat maps approaches to model the searcher s subjective belief regarding the threat size as a posterior density map instead of a discrete probability distribution. The main contribution of this paper is the formulation of the proposed threat density map model for combat simulations. This introductory section is followed, in Section 2, with a description of the problem and the model formulation. Section 3 describes the advantages and limitations of the current state of the model. Section 4 provides concluding remars and discusses the direction of the future research. 2. Problem Description and Formulation A threat density map, tm, is a random variable defined over a finite set of locations, X, which assigns a score to each individual cell x X, i = 1,, C, at a certain time step t describing the expected number of enemy entities in each cell. The set of locations, X, represents the area of operations discretized into a twodimensional grid comprising C total cells, which can either be unoccupied or occupied by one or more enemy entities. The random variable tm = tm,, tm denotes the state of the threat density map, where the random variable tm indicates the number of enemy entities in cell x. Let Z be the grand total number of enemy entities across all cells in X, namely, = tm. Our fundamental problem is to infer the unnown value of tm, namely the unnown number of enemy entities located in the individual cells, based on a sequence of sensing outcomes and assumptions about the success of those sensing actions. To accomplish this, we first initialize each cell with a prior density function, p tm, based on how the searcher believes the enemy is spatially distributed and the certainty of prior information available. This prior information is then combined with the data from our assumed sensing model, p s tm, which is the probability density function of the number of enemy entities sensed in cell x at time step t, s, conditional on tm. Finally, for each individual cell we update the prior p tm to the posterior, p tm δ, with the data from the sensing model, p s tm, and infer the expected number of enemy entities through successive Bayesian updates. It is important to define ey assumptions required for our framewor. First, the total number of enemy entities in the set of locations is a priori unnown but bounded by enemy entities. Second, the spatial distribution of the enemy entities across the set of locations can be represented with a prior density function. Third, the number of enemy entities in any given cell is independent of the number of entities in all other cells. Lastly, sensing actions within the same cell are conditionally independent from other sensing actions whether in the same cell or in other cells. Clearly, the assumptions of independence and conditional independence may not be realistic as the nowledge that a cell is occupied or not at a particular time can help figure out the state of it and other cells at the current and future times. However, these assumptions, commonly used in related literature, reduce computational complexities and allow us to decompose the problem for solving threat density maps for the individual cells independently (Thrun, 2003; Merali & Barfoot, 2013) Initializing Threat Density Maps To initialize tm at time step t = 0, we choose a prior density function, p tm, for every cell to represent the searcher s subjective belief about the enemy s spatial distribution in the location set previous to initiating the search. This prior density function summarizes the probability that the random variable tm taes on any given values n, which we can write explicitly as p tm = n. Defining sensible prior density functions varies by the type of prior information (i.e. specific, vague, insufficient) about the enemy and the unnown parameter tm. Information regarding the enemy (e.g., size, composition, nown or suspected locations, liely formations and movement) normally exists in military scenarios for combat simulations and should be used to initialize priors for each cell. Exact or credible intelligence data available (e.g., intelligence reports, situation reports, satellite imagery) of the enemy and the environment can be useful to define and strong priors and perhaps to define other aspects of the world (e.g., liely movement routes, probable employment areas, ey terrain, obstacles). On the other hand, with
3 vague intelligence data we might have to assume a prior based on general considerations (e.g. most probable or most dangerous enemy disposition). In brief, we have distinct cases of prior information available (i.e. specific, vague, and no prior information available) to consider when specifying p tm. The inclusion of prior information into the prior p tm is one of the benefits of our approach because it leads to stronger inferences about tm. Regardless of the level of certainty, we can specify a prior to quantify uncertainty around the spatial distribution of the enemy entities and express what is believed or nown about tm before inspecting any cell x X. Below we discuss a discrete prior density function that can be used to initialize the p tm with prior information Discrete Prior Density Function Consider the case in which the search agent lacs or has vague prior information. A common practice in such situation is to define a conventional prior, such as the discrete uniform, that does not favor any particular value. However, as previously mentioned prior information for combat simulation scenarios is typically available. Therefore, it is then sensible to define a prior density function that can account for a broad range of possibilities fundamental to combat simulated scenarios. For this particular problem, with no idea about the distribution of tm we define a discrete prior assuming that any cell in X could contain up to targets evenly distributed but more liely for the enemy to be nonexistent in some cells. Accordingly, tm is a discrete random variable with a finite range bounded by, i.e., 0, 1,,. Further, we assume that the prior is defined for each cell such that p tm = 1 for n = 1,,. However, our prior subjective belief inclines us to anticipate that many cells will be empty rather than occupied because enemy forces tend to cluster together whether they operate as cohesive large element or as smaller dispersed elements. To represent such belief we define the parameter ε such that each of the values in the range 1 n occurs with probability ε 1 and 1 ε for n = 0. That is, the unconditional prior probability distribution for an individual cell is given by the following probability density function: p( tm i = n) = ε ( 1 ), n = 1, 2,..., 1 ε, n = 0 0, otherwise (1) The expected value of the random variable tm for cell x at time step t = 0 is: ( ) = ε ( +1 2 ) µ tmi = E(tm i ) = nε 1 (2) n=1 Although the choice of ε is subjective it is also suitable to initialize p tm when specific prior information is available. For instance, suppose we now the mean number of enemy entities for some specific cells. In this case, we do not have any difficulty incorporating this information in p tm. We simply solve Eq. (2) for ε, i.e., ε = 2μ ( + 1), for ε [0,1], and use this value to define the prior of tm for those particular cells Sensing Model Sensing actions, namely, observing or inspecting cells, are nowledge-producing events that changes the searcher s subjective belief of the threat. The searcher s ability to observe enemy entities in a cell is modeled using the combat simulation s target detection model, which specifies the probability of detecting a target, P, as a function of the brightness of the target, the brightness of the target s bacground, and the subjective size of the target given that one or more targets are present in the location. Although P varies by type of target, it is generally constant for targets of the same type and size, and against a particular bacground. In our framewor, sensing actions represent binomial trials with + 1 possible outcomes (i.e. observing between zero and enemy entities) of the actual number of entities in the cell. They return the number of enemy entities sensed, s, in cell x at time step t. Therefore, we specify a binomial sampling model, p s tm, which describes the searcher s ability to gain subjective nowledge regarding tm. This sampling model provides the conditional probability that s is b conditioned on tm and given P, i.e., p s tm = p s = b tm = n, expressed as p s t n ( i = b tm i = n) = ( b ( n b) P d ) b ( 1 P d ) n b (3) for b = 0, 1,, and 0 P 1. In Eq. (3) the binomial coefficient n b n b describes the number of combinations of n things taen b at a time without regard of their order; P is the lielihood of b detections given P ; and 1 P is the probability of missing n b of the possible detections.
4 2.3. Multiple Sensing Actions Above we focused on the probability for a single sensing action at time step t. However, our goal is to infer tm based on all cell inspections through time step t. Let p δ tm indicate the distribution of the sensing outcomes for cell x up to time step t and let δ = s,, s denote the history of the number of enemy entities sensed through time step t. Assuming multiple inspections of cell x at different time steps, s, j = 1,, t, represents the number of enemy entities sensed at time τ. As previously stated, the probability of each sensing action is conditionally independent of other sensing actions; specifically, s and δ are conditionally independent given tm. In other words, if tm is nown, additional nowledge of δ does not change the searcher s belief about how many enemy entities he will see at the next observation (s ). Therefore, the probability of the data set (i.e. history of the enemy entities sensed) is given by: p( δ t i tm i ) = p( s t i,δ i tm i ) = p( s t i tm i ) p( δ i tm i ) (4) 2.4. Updating Threat Density Maps We now discuss how to update probabilities after a new sensing action is performed. According to Bayesian inference, we can estimate the posterior through time step t, p tm δ, given a prior on tm and the data resulting from the sensing model, p s tm. Applying Bayes rule to the terms p δ tm and p δ tm in Eq. (4) and with the conditional independence assumption of the sensing actions results in the posterior density function p tm δ of tm given the history of enemy entities sensed in cell x through time step t. The posterior density is given by ( ) = p ( s i t tm i ) p tm i δ p s it δ p tm i δ i t (5) where p s tm is obtained from the sensing model in Eq. (3); p tm δ represents either a prior at time step t = 0, i.e., p tm, or a posterior without the most recent sensing action result; and p s δ is the normalization factor resulting from marginalizing over tm and applying the foregoing conditional independence assumption of sensing actions given tm : ( ) = p( s t i tm i = n) p s it δ i p tm i = n δ. (6) n=0 Substituting Eq. (6) in Eq. (5), the individual cell beliefs can be updated using the following: p tm i δ t = p( s t i tm i ) p tm i δ. (7) p( s t i tm i = n) p tm i = n δ n=0 Eq. (7) results in a distribution of the unnown number of enemy forces in the cell conditioned on the observed sample data. Thus we have a probability model that quantifies the searcher s new state of subjective belief about tm, given the initial information described by the prior p tm and the information provided by the sensing model p s tm Inference about the Number of Enemy Entities During initialization we estimate the expected number of enemy entities for every cell from the prior probabilities and maintain this during runtime until the cell posterior distribution is updated after a sensing action. Once the posterior is computed, we utilize Eq. (8) to determine the expected number of entities x. ( ) = np tm i = n δ t E tm i δ i t. (8) n=0 3. Advantages of Threat Density Maps In this section we discuss the advantages of providing simulated entities with threat density maps as well as the limitations of the current state of the model. Simply put, the main advantage of the proposed approach as compared to probability threat maps is that a threat density map provides a probability distribution of the unnown number of enemy entities and the expected number of enemy entities in a cell, which can be influenced by a detailed prior distribution. To conceptualize the notion of threat density maps applied to combat simulations and to demonstrate its practicality and advantages, we coded and implemented in a rudimentary JavaScript simulation the aforementioned threat density map and for comparison, an adaptation of the probability threat maps (see Appendix 1) discussed in Daren et al. (2010). The notional scenario consists of a simulated infantry soldier (searcher) searching for an enemy fireteam to either engage them or to report their disposition, location, and actions. From intelligence data the searcher nows that enemy fireteam (targets) is not moving and consists of three entities close together and one scout far ahead. Figure 2(a) shows the targets actual distribution, i.e., x = 1, x " = 3, which is
5 unnown to the searcher. Based on their doctrinal spatial dispersion and the size of a cell we initialized threat density maps for the individual cells assuming that any cell could contain one or three targets but not two or four, yet being free of enemy entities is even more probable than occupation by one or three. Figure 1 shows an example of this prior for a single cell. Finally, we assumed a uniform prior to initialize the probability threat map and the probability of detection remained constant for the simulation, i.e., P = of the liely state of cell x. This more detailed representation of threat nowledge provides the searcher the basis for a more confident course of action selection. (a) (b) Figure 1: Discrete prior distribution of tm for cell x with ε = 0.4 assuming that it is more liely that the cell is occupied (containing either one or three targets) than empty. One of the main advantages of our Bayesian approach to threat density maps is the availability of a posterior distribution of the unnown number of targets in a cell rather than a single value as in the probability threat map approach. For example, consider the situation shown in Figure 2 in which the searcher sensed zero targets after inspecting cell x. The low probability value in the probability threat map [Figure 2(b)] indicates that cell x is less liely to contain one or more targets when compared to the other cells. However, the searcher lacs nowledge about the degree to which the cell x is occupied, when in fact it can be empty or occupied by one or three targets because cell inspections are not perfect. The coarse threat nowledge provided by the probability threat map, although useful for search decisions is not sufficient for maing decisions related to tactical courses of action. On the other hand, the threat density map posterior distribution summarizes the state of nowledge about the unnown number of targets in the cell conditional on the prior and sensing data. In contrast to the probability threat map, the threat density map in Figure 2(d) suggests that although cell x is more liely to be empty there is still a chance to find one or three targets in the cell. In this situation, the posterior distribution of tm provides the searcher with a more accurate picture (c) (d) Figure 2: Screenshot of the simulated scenario at time step t = 0.25 where the searcher is depicted in blue and the targets are depicted in red (a), the probability threat map (b) and threat density map consisting of the expected number of targets (c) and the related probability distributions of the number of targets (d). Consider the situation in Figure 3 in which the searcher after inspecting several cells sensed two targets (dar red entities) in cell x ". For such situation, it would be difficult for the searcher to select a course of action that provides the best possibility of success based solely on the probability threat map. Therefore, it is appealing to quantify the searcher s expectation of finding a number of targets at the cell. Updating the threat density map s prior information with sensed data, provides interpretable answers, such as the event that tm " equals three has probability of one [Figure 3(d)] thus, the searcher could expect to see three targets in the cell [Figure 3(c)]. Then, he can exploit this subjective nowledge to mae reasonable decisions consistent with the liely state of the threat, for example, decide to search the cell for the unobserved target or to move out of the cell and avoid combat. Liewise, threat density map data can also be used to support reasoning. Consider a separate simulation run (Figure 4) in which the searcher sensed one target (dar red entity) in cell x given P = 0.9. Based on the threat density map the searcher could assume with a high degree of certainty that he found the scout entity of the enemy fireteam and hence could use this belief for identifying the neighboring cell that could contain
6 the remaining three targets and to determine how he deploys, orient, and engages the remaining targets. available for combat simulated scenarios. Regardless of the level of certainty of the prior information, we can use the aforementioned discrete prior density function or other suitable discrete distributions to describe uncertainty for tm in a mathematical model. However, from a modeling perspective the difficulty is in how to effectively integrate prior information from different sources (e.g., intelligence, doctrine, environment) using a prior density function (Blasco, 2007). (a) (b) In Figure 1 above we already demonstrated an example for initializing threat density maps given prior information and intelligence data (i.e. the total number of targets and their tactical formation). Below we briefly discuss two cases of prior information available common to combat simulated scenarios for initializing threat density maps. (c) (d) Figure 3: Screenshot of the scenario and the state of subjective threat nowledge in which the searcher sensed two targets (depicted in dar red) in cell x ". First, presume that the prior information available consists only of the total number of enemy entities (a fireteam of four entities) and their posture (not moving) but neither their actual location nor their tactical formation is nown. In this situation of vague prior information is sensible to assume that any cell could contain up to four enemy entities and logically we can expect that many cells will be empty instead of occupied. Accordingly, we could set the value of ε to be 0.75 and utilize Eq. (1) to initialize threat density maps for each cell x X. Figure 5 shows the prior distribution for cell x. (a) (b) (c) Figure 4: Screenshot of the scenario and the state of subjective nowledge in which the searcher sensed one target (depicted in dar red) in cell x Integrating Prior Information (d) The incorporation of a prior density function for tm with prior information is the final favorable feature of the threat density map that differentiates it from the probability threat map. As previously mentioned, intelligence data or prior information is typically Figure 5: Discrete prior distribution of tm for cell x assuming that it is more probable to be empty and equally liely to be occupied by at least one and no more than four targets. The plot in Figure 5 shows that it is more liely for a cell to be unoccupied and equally possible to be occupied by one, two, three, or four enemy entities. The expected number of enemy entities in each cell is 1.875, thus the searcher can expect to find approximately two enemy entities in any particular cell at the next time step.
7 Second, specific prior information can easily be incorporated through the prior density function. For example, suppose that from the most current intelligence data available it is nown that there is a squad-size element in a linear defense, arrayed from the southwest corner of the area of operations to the northeast corner, heavily concentrated in cell x, defending the southeast sector of the area of operations, as depicted in Figure 6. Incorporating this prior information into the model can be done in a flexible manner and inferences can be compared under different priors in order to choose a prior that characterizes the most liely threat situation. One alternative, for example, is to set the value of ε equal to one for the cells nown to be occupied and zero otherwise. Such an approach can be efficient but it does not account for the possibility that the situation could change before the searcher reaches any of these cells. Therefore, one could select other values of ε for the cells of interest. Perhaps another alternative is to deduce from doctrine and terrain data the maximum number of enemy entities that can occupy a cell and other relevant factors to initialize the priors for each cells that produce E tm," = 2, E tm = 5, and zero otherwise. Figure 6: Screenshot of the location set with ground truth data. The searcher is depicted in blue and the targets in a linear defense, heavily concentrated in cell x, are depicted in red Current Limitations of Threat Density Maps As we have seen in the previous examples, there are significant advantages of augmenting combat simulated scenarios with threat density maps as they provide simulated entities with actionable subjective nowledge to mae course of action decisions, which in turn determines other search, movement, and path planning behaviors. However, the proposed approach has some fundamental limitations. While the assumptions of independence and conditional independence, described in Section 2, allows us to solve the threat density maps for the individual cells, the model excludes features for modeling spatial dependencies and temporal effects. This limitation is evident in Figure 3(c) and 3(d) as the model properly estimates the expected number of enemy entities in the cell, i.e. E tm " = 3.0, essentially due to the inclusion of prior information into the model; however, it fails to exploit this information for estimating tm for the other cells. 4. Conclusions and Future Directions In this paper we proposed a threat modeling approach for estimating the number of the enemy entities at a certain location in a given time interval. The model estimates the expected number of enemy entities as a posterior density map, can be initialized with intelligence reports and prior information, and wors for any number of enemy entities and their spatial distribution. Although a threat density map approach is not required for all combat simulation models and scenarios, they offer several important advantages over probability threat maps that mae them suitable for implementation in combat simulations for improving the representation of search, reasoning, and decisionmaing behaviors. Efforts are underway to introduce probability distributions that can model threat movement. Furthermore, future wor will focus on addressing nown limitations and extending the proposed model by introducing spatial and temporal dependencies and interactions, and developing hierarchical threat density map representations. Finally, we plan to experiment with and characterize the utility of the model for improving the capabilities of simulated entities in a combat simulation scenario for different threat conditions. 6. References Bertuccelli, L. F., & How, J. P. (2005). Robust UAV search for environments with imprecise probability maps. 44th IEEE Conference on Decision and Control, and the 2005 European Control Conference, Bertuccelli, L. F., & How, J. P. (2006). Search for dynamic targets with uncertain probability maps. Proceedings of the 2006 American Control Conference. Blasco, A. (2007). Bayesian statistic course. Retrieved from the web October 15, Cuantitativa 3/LECTURE NOTES.pdf Chung, T. H., & Burdic, J. W. (2008). Multi-agent probabilistic search in a sequential decisiontheoretic framewor. IEEE International Conference on Robotics and Automation, Chung, T. H., & Burdic, J. W. (2012). Analysis of search decision maing using probabilistic search strategies. IEEE Transactions on Robotics, 28(1),
8 Chung, T. H., Kress, M., & Royset, J. O. (2009). Probabilistic search optimization and mission assignment for heterogeneous autonomous agents. IEEE International Conference on Robotics and Automation, Daren, C. J., & Anderegg, B. G. (2008). Particle filters and simulacra for more realistic opponent tracing. Game AI Programming Wisdom 4. Daren, C. J., McCue, D., & Guerrero, M. (2010). Realistic fireteam movement in urban environments. Elfes, A. (1989). Using occupancy grids for mobile robot perception and navigation. Computer, 22(6), Evangelista, P. F., Ruc, J., Balogh, I., & Daren, C. J. (2011). Visual awareness in combat models. Proceedings of the 20th Behavior Representation in Modeling and Simulation. Isla, D. A., & Blumberg, B. M. (2002). Object persistence for synthetic creatures. Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, Isla, D. (2006). Probabilistic target tracing and search using occupancy maps. AI Game Programming Wisdom, 3, Kagan, E., & Ben Gal, I. (2013). Problem of search for static and moving targets. In Probabilistic Search for Tracing Targets: Theory and Modern Applications. Chichester, UK: John Wiley & Sons, Ltd. Merali, R.S., & Barfoot, T. D. (2012). Patch map: A benchmar for occupancy grid algorithm evaluation IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Pew, R. W., & Mavor, A. S. (1998). Modeling human and organizational behavior: Application to military simulations. National Academies Press. Thrun, S. (2003). Learning occupancy grid maps with forward sensor models. Autonomous robots, 15(2), Appendix 1: Probability Threat Map Adaptation In this section we briefly describe our basic adaptation of the probability threat maps approach discussed in Daren et al. (2010). Let q be the conditional probability that an unseen enemy entity is present in cell x X and after inspecting cell x, where x x, q is the estimated probability before inspecting cell x, and P is the probability of detecting a target (see Section 2.2). According to the axioms of probability theory, 0 q 1 and the total probability over all C cells is q = 1. Suppose the searcher inspects cell x, assuming that cell inspections are independent of neighboring cells, then, q taes the form ( )( 1 I i ) ( ) q q i = i I i + q j 1 P d C q i' I i' + q j 1 P d i'=1 (9) where the term I is an indicator function that equals to zero if x = x and equals to one otherwise. Author Biographies Francisco R. Baez is a Lieutenant Colonel in the U.S. Army where he serves as an Operations Research (OR) Analyst. He is currently a Ph.D. student at the U.S. Naval Postgraduate School s (NPS) MOVES Institute, holds an M.S. in OR from NPS, and a B.S. in Logistics from the University of Puerto Rico. His is [email protected]. Christian J. Daren, Ph.D., is an Associate Professor of Computer Science at NPS, where he is an affiliate of the MOVES Institute. His current research interests include human behavior simulation for military applications and approaches to artificial intelligence inspired by developmental learning. His is [email protected].
Chapter 14 Managing Operational Risks with Bayesian Networks
Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian
On Fleet Size Optimization for Multi-Robot Frontier-Based Exploration
On Fleet Size Optimization for Multi-Robot Frontier-Based Exploration N. Bouraqadi L. Fabresse A. Doniec http://car.mines-douai.fr Université de Lille Nord de France, Ecole des Mines de Douai Abstract
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
A Client-Server Interactive Tool for Integrated Artificial Intelligence Curriculum
A Client-Server Interactive Tool for Integrated Artificial Intelligence Curriculum Diane J. Cook and Lawrence B. Holder Department of Computer Science and Engineering Box 19015 University of Texas at Arlington
About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013
About the Author The Role of Artificial Intelligence in Software Engineering By: Mark Harman Presented by: Jacob Lear Mark Harman is a Professor of Software Engineering at University College London Director
Troops Time Planner and Simulation Models For Military
SUPPORTING COURSES OF ACTION PLANNING WITH INTELLIGENT MANAGEMENT OF Contact Information: CELESTINE A. NTUEN & EUI H. PARK The Institute for Human-Machine Studies North Carolina A&T State University Greensboro,
Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci
1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks
A Reliability Point and Kalman Filter-based Vehicle Tracking Technique
A Reliability Point and Kalman Filter-based Vehicle Tracing Technique Soo Siang Teoh and Thomas Bräunl Abstract This paper introduces a technique for tracing the movement of vehicles in consecutive video
Analysis of Load Frequency Control Performance Assessment Criteria
520 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 16, NO. 3, AUGUST 2001 Analysis of Load Frequency Control Performance Assessment Criteria George Gross, Fellow, IEEE and Jeong Woo Lee Abstract This paper presents
BASIC STATISTICAL METHODS FOR GENOMIC DATA ANALYSIS
BASIC STATISTICAL METHODS FOR GENOMIC DATA ANALYSIS SEEMA JAGGI Indian Agricultural Statistics Research Institute Library Avenue, New Delhi-110 012 [email protected] Genomics A genome is an organism s
Probability Hypothesis Density filter versus Multiple Hypothesis Tracking
Probability Hypothesis Density filter versus Multiple Hypothesis Tracing Kusha Panta a, Ba-Ngu Vo a, Sumeetpal Singh a and Arnaud Doucet b a Co-operative Research Centre for Sensor and Information Processing
A STRATEGIC PLANNER FOR ROBOT EXCAVATION' by Humberto Romero-Lois, Research Assistant, Department of Civil Engineering
A STRATEGIC PLANNER FOR ROBOT EXCAVATION' by Humberto Romero-Lois, Research Assistant, Department of Civil Engineering Chris Hendrickson, Professor, Department of Civil Engineering, and Irving Oppenheim,
Bayesian Analysis for the Social Sciences
Bayesian Analysis for the Social Sciences Simon Jackman Stanford University http://jackman.stanford.edu/bass November 9, 2012 Simon Jackman (Stanford) Bayesian Analysis for the Social Sciences November
Fixed-Effect Versus Random-Effects Models
CHAPTER 13 Fixed-Effect Versus Random-Effects Models Introduction Definition of a summary effect Estimating the summary effect Extreme effect size in a large study or a small study Confidence interval
Agents: Rationality (2)
Agents: Intro Agent is entity that perceives and acts Perception occurs via sensors Percept is one unit of sensory input Percept sequence is complete history of agent s percepts In general, agent s actions
The Bass Model: Marketing Engineering Technical Note 1
The Bass Model: Marketing Engineering Technical Note 1 Table of Contents Introduction Description of the Bass model Generalized Bass model Estimating the Bass model parameters Using Bass Model Estimates
Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina
Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures
Tracking of Small Unmanned Aerial Vehicles
Tracking of Small Unmanned Aerial Vehicles Steven Krukowski Adrien Perkins Aeronautics and Astronautics Stanford University Stanford, CA 94305 Email: [email protected] Aeronautics and Astronautics Stanford
Measuring the Performance of an Agent
25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational
Safe robot motion planning in dynamic, uncertain environments
Safe robot motion planning in dynamic, uncertain environments RSS 2011 Workshop: Guaranteeing Motion Safety for Robots June 27, 2011 Noel du Toit and Joel Burdick California Institute of Technology Dynamic,
A Cognitive Approach to Vision for a Mobile Robot
A Cognitive Approach to Vision for a Mobile Robot D. Paul Benjamin Christopher Funk Pace University, 1 Pace Plaza, New York, New York 10038, 212-346-1012 [email protected] Damian Lyons Fordham University,
Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities
Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities Oscar Kipersztok Mathematics and Computing Technology Phantom Works, The Boeing Company P.O.Box 3707, MC: 7L-44 Seattle, WA 98124
Measurement Information Model
mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides
U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview
U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture
CHAPTER 2 Estimating Probabilities
CHAPTER 2 Estimating Probabilities Machine Learning Copyright c 2016. Tom M. Mitchell. All rights reserved. *DRAFT OF January 24, 2016* *PLEASE DO NOT DISTRIBUTE WITHOUT AUTHOR S PERMISSION* This is a
Kristine L. Bell and Harry L. Van Trees. Center of Excellence in C 3 I George Mason University Fairfax, VA 22030-4444, USA [email protected], hlv@gmu.
POSERIOR CRAMÉR-RAO BOUND FOR RACKING ARGE BEARING Kristine L. Bell and Harry L. Van rees Center of Excellence in C 3 I George Mason University Fairfax, VA 22030-4444, USA [email protected], [email protected] ABSRAC
Review. Bayesianism and Reliability. Today s Class
Review Bayesianism and Reliability Models and Simulations in Philosophy April 14th, 2014 Last Class: Difference between individual and social epistemology Why simulations are particularly useful for social
A joint control framework for supply chain planning
17 th European Symposium on Computer Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 A joint control framework for supply chain planning
DECISION MAKING UNDER UNCERTAINTY:
DECISION MAKING UNDER UNCERTAINTY: Models and Choices Charles A. Holloway Stanford University TECHNISCHE HOCHSCHULE DARMSTADT Fachbereich 1 Gesamtbibliothek Betrtebswirtscrtaftslehre tnventar-nr. :...2>2&,...S'.?S7.
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
54 Robinson 3 THE DIFFICULTIES OF VALIDATION
SIMULATION MODEL VERIFICATION AND VALIDATION: INCREASING THE USERS CONFIDENCE Stewart Robinson Operations and Information Management Group Aston Business School Aston University Birmingham, B4 7ET, UNITED
Fairfield Public Schools
Mathematics Fairfield Public Schools AP Statistics AP Statistics BOE Approved 04/08/2014 1 AP STATISTICS Critical Areas of Focus AP Statistics is a rigorous course that offers advanced students an opportunity
Coverity White Paper. Effective Management of Static Analysis Vulnerabilities and Defects
Effective Management of Static Analysis Vulnerabilities and Defects Introduction According to a recent industry study, companies are increasingly expanding their development testing efforts to lower their
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 13. Random Variables: Distribution and Expectation
CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 3 Random Variables: Distribution and Expectation Random Variables Question: The homeworks of 20 students are collected
(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
A Statistical Framework for Operational Infrasound Monitoring
A Statistical Framework for Operational Infrasound Monitoring Stephen J. Arrowsmith Rod W. Whitaker LA-UR 11-03040 The views expressed here do not necessarily reflect the views of the United States Government,
Lecture Note 1 Set and Probability Theory. MIT 14.30 Spring 2006 Herman Bennett
Lecture Note 1 Set and Probability Theory MIT 14.30 Spring 2006 Herman Bennett 1 Set Theory 1.1 Definitions and Theorems 1. Experiment: any action or process whose outcome is subject to uncertainty. 2.
Methods for Assessing Vulnerability of Critical Infrastructure
March 2010 Methods for Assessing Vulnerability of Critical Infrastructure Project Leads Eric Solano, PhD, PE, RTI International Statement of Problem Several events in the recent past, including the attacks
A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes
A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences
Discrete Frobenius-Perron Tracking
Discrete Frobenius-Perron Tracing Barend J. van Wy and Michaël A. van Wy French South-African Technical Institute in Electronics at the Tshwane University of Technology Staatsartillerie Road, Pretoria,
Fuzzy Probability Distributions in Bayesian Analysis
Fuzzy Probability Distributions in Bayesian Analysis Reinhard Viertl and Owat Sunanta Department of Statistics and Probability Theory Vienna University of Technology, Vienna, Austria Corresponding author:
On Path Planning Strategies for Networked Unmanned Aerial Vehicles
On Path Planning Strategies for etworked Unmanned Aerial Vehicles Evşen Yanmaz, Robert Kuschnig, Markus Quaritsch, Christian Bettstetter +, and Bernhard Rinner Institute of etworked and Embedded Systems
Evaluating the Lead Time Demand Distribution for (r, Q) Policies Under Intermittent Demand
Proceedings of the 2009 Industrial Engineering Research Conference Evaluating the Lead Time Demand Distribution for (r, Q) Policies Under Intermittent Demand Yasin Unlu, Manuel D. Rossetti Department of
P r oba bi l i sti c R oboti cs. Yrd. Doç. Dr. SIRMA YAVUZ [email protected] Room 130
P r oba bi l i sti c R oboti cs Yrd. Doç. Dr. SIRMA YAVUZ [email protected] Room 130 Orgazinational Lecture: Thursday 13:00 15:50 Office Hours: Tuesday 13:00-14:00 Thursday 11:00-12:00 Exams: 1 Midterm
City University of Hong Kong
City University of Hong Kong Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015 Part I Course Title: AI Game Programming Course Code: CS4386 Course
Worksheet for Teaching Module Probability (Lesson 1)
Worksheet for Teaching Module Probability (Lesson 1) Topic: Basic Concepts and Definitions Equipment needed for each student 1 computer with internet connection Introduction In the regular lectures in
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
BINOMIAL OPTIONS PRICING MODEL. Mark Ioffe. Abstract
BINOMIAL OPTIONS PRICING MODEL Mark Ioffe Abstract Binomial option pricing model is a widespread numerical method of calculating price of American options. In terms of applied mathematics this is simple
Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015
Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students
CSC384 Intro to Artificial Intelligence
CSC384 Intro to Artificial Intelligence What is Artificial Intelligence? What is Intelligence? Are these Intelligent? CSC384, University of Toronto 3 What is Intelligence? Webster says: The capacity to
LOOKING FOR A GOOD TIME TO BET
LOOKING FOR A GOOD TIME TO BET LAURENT SERLET Abstract. Suppose that the cards of a well shuffled deck of cards are turned up one after another. At any time-but once only- you may bet that the next card
An Application of Inverse Reinforcement Learning to Medical Records of Diabetes Treatment
An Application of Inverse Reinforcement Learning to Medical Records of Diabetes Treatment Hideki Asoh 1, Masanori Shiro 1 Shotaro Akaho 1, Toshihiro Kamishima 1, Koiti Hasida 1, Eiji Aramaki 2, and Takahide
CCNY. BME I5100: Biomedical Signal Processing. Linear Discrimination. Lucas C. Parra Biomedical Engineering Department City College of New York
BME I5100: Biomedical Signal Processing Linear Discrimination Lucas C. Parra Biomedical Engineering Department CCNY 1 Schedule Week 1: Introduction Linear, stationary, normal - the stuff biology is not
Similarity Search and Mining in Uncertain Spatial and Spatio Temporal Databases. Andreas Züfle
Similarity Search and Mining in Uncertain Spatial and Spatio Temporal Databases Andreas Züfle Geo Spatial Data Huge flood of geo spatial data Modern technology New user mentality Great research potential
Supplement to Call Centers with Delay Information: Models and Insights
Supplement to Call Centers with Delay Information: Models and Insights Oualid Jouini 1 Zeynep Akşin 2 Yves Dallery 1 1 Laboratoire Genie Industriel, Ecole Centrale Paris, Grande Voie des Vignes, 92290
15-381: Artificial Intelligence. Probabilistic Reasoning and Inference
5-38: Artificial Intelligence robabilistic Reasoning and Inference Advantages of probabilistic reasoning Appropriate for complex, uncertain, environments - Will it rain tomorrow? Applies naturally to many
MOBILITY DATA MODELING AND REPRESENTATION
PART I MOBILITY DATA MODELING AND REPRESENTATION 1 Trajectories and Their Representations Stefano Spaccapietra, Christine Parent, and Laura Spinsanti 1.1 Introduction For a long time, applications have
CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
CONTENTS OF DAY 2. II. Why Random Sampling is Important 9 A myth, an urban legend, and the real reason NOTES FOR SUMMER STATISTICS INSTITUTE COURSE
1 2 CONTENTS OF DAY 2 I. More Precise Definition of Simple Random Sample 3 Connection with independent random variables 3 Problems with small populations 8 II. Why Random Sampling is Important 9 A myth,
Principles of Data Mining by Hand&Mannila&Smyth
Principles of Data Mining by Hand&Mannila&Smyth Slides for Textbook Ari Visa,, Institute of Signal Processing Tampere University of Technology October 4, 2010 Data Mining: Concepts and Techniques 1 Differences
THE CONTROL OF AN INTEGRATED PRODUCTION-INVENTORY SYSTEM WITH JOB SHOP ROUTINGS AND STOCHASTIC ARRIVAL AND PROCESSING TIMES
THE ONTROL OF AN INTEGRATED RODUTION-INVENTORY SYSTEM WITH JOB SHO ROUTINGS AND STOHASTI ARRIVAL AND ROESSING TIMES LM Van Nyen 1 * JWM Bertrand 1 HG Van Ooijen 1 NJ Vandaele 2 1 2 Technische Universiteit
Optimization under fuzzy if-then rules
Optimization under fuzzy if-then rules Christer Carlsson [email protected] Robert Fullér [email protected] Abstract The aim of this paper is to introduce a novel statement of fuzzy mathematical programming
Procedia Computer Science 00 (2012) 1 21. Trieu Minh Nhut Le, Jinli Cao, and Zhen He. [email protected], [email protected], [email protected].
Procedia Computer Science 00 (2012) 1 21 Procedia Computer Science Top-k best probability queries and semantics ranking properties on probabilistic databases Trieu Minh Nhut Le, Jinli Cao, and Zhen He
SAMPLE SELECTION BIAS IN CREDIT SCORING MODELS
SAMPLE SELECTION BIAS IN CREDIT SCORING MODELS John Banasik, Jonathan Crook Credit Research Centre, University of Edinburgh Lyn Thomas University of Southampton ssm0 The Problem We wish to estimate an
A C T R esearcli R e p o rt S eries 2 0 0 5. Using ACT Assessment Scores to Set Benchmarks for College Readiness. IJeff Allen.
A C T R esearcli R e p o rt S eries 2 0 0 5 Using ACT Assessment Scores to Set Benchmarks for College Readiness IJeff Allen Jim Sconing ACT August 2005 For additional copies write: ACT Research Report
Kalman Filter Applied to a Active Queue Management Problem
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 4 Ver. III (Jul Aug. 2014), PP 23-27 Jyoti Pandey 1 and Prof. Aashih Hiradhar 2 Department
Simulation and Risk Analysis
Simulation and Risk Analysis Using Analytic Solver Platform REVIEW BASED ON MANAGEMENT SCIENCE What We ll Cover Today Introduction Frontline Systems Session Ι Beta Training Program Goals Overview of Analytic
Multi-ultrasonic sensor fusion for autonomous mobile robots
Multi-ultrasonic sensor fusion for autonomous mobile robots Zou Yi *, Ho Yeong Khing, Chua Chin Seng, and Zhou Xiao Wei School of Electrical and Electronic Engineering Nanyang Technological University
Evaluation of Processor Health within Hierarchical Condition Monitoring System
Evaluation of Processor Health within Hierarchical Condition Monitoring System Lenka Pavelková and Ladislav Jirsa Department of Adaptive Systems, Institute of Information Theory and Automation, Czech Academy
Master of Science Service Oriented Architecture for Enterprise. Courses description
Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,
Likelihood Approaches for Trial Designs in Early Phase Oncology
Likelihood Approaches for Trial Designs in Early Phase Oncology Clinical Trials Elizabeth Garrett-Mayer, PhD Cody Chiuzan, PhD Hollings Cancer Center Department of Public Health Sciences Medical University
Better planning and forecasting with IBM Predictive Analytics
IBM Software Business Analytics SPSS Predictive Analytics Better planning and forecasting with IBM Predictive Analytics Using IBM Cognos TM1 with IBM SPSS Predictive Analytics to build better plans and
Learning in Abstract Memory Schemes for Dynamic Optimization
Fourth International Conference on Natural Computation Learning in Abstract Memory Schemes for Dynamic Optimization Hendrik Richter HTWK Leipzig, Fachbereich Elektrotechnik und Informationstechnik, Institut
ASSESSMENT OF VISUALIZATION SOFTWARE FOR SUPPORT OF CONSTRUCTION SITE INSPECTION TASKS USING DATA COLLECTED FROM REALITY CAPTURE TECHNOLOGIES
ASSESSMENT OF VISUALIZATION SOFTWARE FOR SUPPORT OF CONSTRUCTION SITE INSPECTION TASKS USING DATA COLLECTED FROM REALITY CAPTURE TECHNOLOGIES ABSTRACT Chris Gordon 1, Burcu Akinci 2, Frank Boukamp 3, and
Summary of GAO Cost Estimate Development Best Practices and GAO Cost Estimate Audit Criteria
Characteristic Best Practice Estimate Package Component / GAO Audit Criteria Comprehensive Step 2: Develop the estimating plan Documented in BOE or Separate Appendix to BOE. An analytic approach to cost
10-601. Machine Learning. http://www.cs.cmu.edu/afs/cs/academic/class/10601-f10/index.html
10-601 Machine Learning http://www.cs.cmu.edu/afs/cs/academic/class/10601-f10/index.html Course data All up-to-date info is on the course web page: http://www.cs.cmu.edu/afs/cs/academic/class/10601-f10/index.html
Gibbs Sampling and Online Learning Introduction
Statistical Techniques in Robotics (16-831, F14) Lecture#10(Tuesday, September 30) Gibbs Sampling and Online Learning Introduction Lecturer: Drew Bagnell Scribes: {Shichao Yang} 1 1 Sampling Samples are
Integrating Cognitive Models Based on Different Computational Methods
Integrating Cognitive Models Based on Different Computational Methods Nicholas L. Cassimatis ([email protected]) Rensselaer Polytechnic Institute Department of Cognitive Science 110 8 th Street Troy, NY 12180
Labor Economics, 14.661. Lecture 3: Education, Selection, and Signaling
Labor Economics, 14.661. Lecture 3: Education, Selection, and Signaling Daron Acemoglu MIT November 3, 2011. Daron Acemoglu (MIT) Education, Selection, and Signaling November 3, 2011. 1 / 31 Introduction
Message-passing sequential detection of multiple change points in networks
Message-passing sequential detection of multiple change points in networks Long Nguyen, Arash Amini Ram Rajagopal University of Michigan Stanford University ISIT, Boston, July 2012 Nguyen/Amini/Rajagopal
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
CONTROL SYSTEMS, ROBOTICS AND AUTOMATION Vol. XVI - Fault Accomodation Using Model Predictive Methods - Jovan D. Bošković and Raman K.
FAULT ACCOMMODATION USING MODEL PREDICTIVE METHODS Scientific Systems Company, Inc., Woburn, Massachusetts, USA. Keywords: Fault accommodation, Model Predictive Control (MPC), Failure Detection, Identification
What is Artificial Intelligence?
CSE 3401: Intro to Artificial Intelligence & Logic Programming Introduction Required Readings: Russell & Norvig Chapters 1 & 2. Lecture slides adapted from those of Fahiem Bacchus. 1 What is AI? What is
Network quality control
Network quality control Network quality control P.J.G. Teunissen Delft Institute of Earth Observation and Space systems (DEOS) Delft University of Technology VSSD iv Series on Mathematical Geodesy and
Randomization in Clinical Trials
in Clinical Trials Versio.0 May 2011 1. Simple 2. Block randomization 3. Minimization method Stratification RELATED ISSUES 1. Accidental Bias 2. Selection Bias 3. Prognostic Factors 4. Random selection
How Many Times Will the Fed Raise Interest Rates in 2016?
IN PARTNERSHIP WITH How Many Times Will the Fed Raise Interest Rates in 2016? Applying Agent-Based Modeling and Game Theory for Estimating FOMC Behavior FEBRUARY 11 2016 Global Impact Strategies deploys
Introduction to time series analysis
Introduction to time series analysis Margherita Gerolimetto November 3, 2010 1 What is a time series? A time series is a collection of observations ordered following a parameter that for us is time. Examples
