Driver of Innovation Through Intelligent Systems Research CONTACT

Size: px
Start display at page:

Download "Driver of Innovation Through Intelligent Systems Research CONTACT"

Transcription

1 Driver of Innovation Through Intelligent Systems Research CONTACT Kalyan Moy Gupta, PhD, President 163 Waterfront St., Suite 440, National Harbor, MD x700

2 LEADERSHIP STATEMENT Intelligent systems automate and simplify knowledge-intensive tasks and decision making, learn from their mistakes, and adapt to unexpected situations, offering capabilities beyond conventional systems. We provide intelligent systems R&D services, focusing on provable innovation, to help our customers develop novel products and processes. OUR MISSION is to deliver intelligent software solutions that measurably improve decision support effectiveness and autonomy levels. Our solutions shall provide sustained competitive advantage to cost-conscious providers of decision support, autonomous, and training systems. We will accomplish this by pioneering research and development in artificial intelligence techniques in close cooperation with customers. OUR VISION is that communicative autonomous and decision support systems for national security and commercial applications are widespread, modular, safe, reliable, and affordable.

3 VALUES EXCELLENCE: Leave no stone unturned and chase the last grain of rice in the lunch box in the quest for excellence in delivery of products and services. INTEGRITY: Interact with customers, partners, and team members with utmost integrity and respect. DEPENDABILITY: Strive for a reputation of utmost dependability with quality, schedule, and cost in sight at all times. TECHNICAL COURAGE, PERSISTENCE, AND COLLECTIVE INTELLIGENCE: Innovate with courage to decimate the-state-of-the-art, which may be our own, and maintain a strong sense of optimism supported by an equal measure of perseverance, and trust in the power of collective intelligence and teamwork to develop robust, lasting solutions to hard problems. EMPATHY: Empathize with customers and teammates to truly understand their point of view and develop effective solutions. ENJOYMENT: Create and sustain a work environment where innovation and research thrive and are a continuous source of purpose, enjoyment, and fulfillment. CORE COMPETENCIES BASIC AND APPLIED RESEARCH We conduct basic and applied research on a variety of artificial intelligence (AI) topics such as goaldriven autonomy, communicative autonomy, natural language understanding, relational learning, learning and acting in virtual environments and automated web services brokering. We work with you to disseminate research findings via scientific publications and presentations. PROOF-OF-CONCEPT DEVELOPMENT We develop prototypes to showcase and evaluate AI R&D products. We employ software engineering best practices to architect stand-alone and embedded cross-platform systems that can be easily transitioned to production systems. We integrate products from multiple performer teams of research programs for demonstration and evaluation. TEST-BED DEVELOPMENT We develop testbeds for evaluating AI R&D products. Our testbeds provide easy access to extensible components; test problem sets, plug-and-play interfaces for target algorithms, and evaluation metrics. These enable benchmarking and comparison of a family of AI algorithms and technologies. TEST AND EVALUATION We test and evaluate AI methods and software systems at individual performer and research program levels. We design evaluation methods and experiments, collect and prepare test data with crowdsourcing techniques if appropriate, develop evaluation software, conduct experiments, analyze observations, and report findings.

4 SAMPLE PROJECTS Spatio-Temporal Cognition SPATIO-TEMPORAL COGNITION FOR LANGUAGE & SCENE UNDERSTANDING Given a vague spoken command such as Go into the building, how should an autonomous ground vehicle (AGV) or a robot figure out where exactly in the building it should go and which way it should face, or, what it should do once it gets there? How should it respond when asked Where are you? Understanding such commands and responding to such questions requires complex spatiotemporal reasoning. In an ONR-funded basic research program, we have developed two patent pending adaptive algorithms for such reasoning tasks. Our algorithms build on psycholinguistic theories and novel AI approaches to connect perception to action through conceptualization using the ability to elegantly utilize contextualized world knowledge. We have demonstrated the effectiveness of our algorithms in virtual AGVs. Our algorithms and findings provide a strong foundation for the development of robust autonomous agents that can communicate in plain English. Keywords/Captions: Basic Research, Communicative Autonomy, Patents, Learning. Behavior Recognition for Threat Analysis BEHAVIOR RECOGNITION FOR THREAT ANALYSIS A conventional approach to maritime asset protection is to set up a defense perimeter around a high-value asset. However, this is a good approach is a crowded riverine location where enemy could be performing coordinated hostile activity? In an ONR-funded applied research program, and in cooperation with the Naval Research Laboratory, we investigated such questions and demonstrated that algorithms that learn to detect subtle changes in expected behaviors and intents of agents are better at detecting threats and reducing false alarms than perimeter-defense algorithms. We demonstrated the effectiveness of our algorithms on scenarios where multiple sentry unmanned sea surface vehicles (USSVs) protect a high-value maritime asset against multiple attackers. We published our findings in three peer-reviewed conference proceedings; IEEE, SPIE, & FLAIRS. Keywords/Captions: Applied Research, Publications, Behavior Analysis, Threat Detection, Learning Behavior Recognition for Threat Analysis Federated Architecture FEDERATED ARCHITECTURE FOR ANALYSIS OF SOCIO-CULTURAL CONTENT IN LANGUAGE Social elements in a conversation could reveal items of interest such as leadership and the power structure of members engaged in the conversation. Intelligence Advanced Projects Activity (IARPA) ran a basic research program where five leading research teams developed systems that could learn to analyze such conversations to detect power structures and influences. One question was how can the outputs of multiple systems be merged and presented in an intuitive way for intelligence analysts? We responded to this technical challenge by developing the SCIL Test and Evaluation Platform (STEP), a service-oriented architecture for federated rea-

5 soning systems that included a decision-merging algorithm. We also delivered a web user interface (UI) for intelligence analysts to visualize member relationships and access the decision justifications in a web browser. STEP, along with its UI was successfully used by the IARPA program to showcase the effectiveness and the utility of innovative S&T products of its research program. Another question we answered was can test data for such complex interpretive tasks can be cost effectively gathered using a crowdsourcing approach? We ran a series of investigative experiments to confirm that, indeed, a crowdsourcing approach can be used to reliably prepare test data for such tasks in much larger scales, in weeks as opposed to months and at a fraction of the cost it takes to prepare such data manually using in-house subject matter experts. Keywords/Captions: Government R&D program support, Applied Research, Federated Decision Support System, Intelligence Analysis, Crowdsourcing, Science & Technology showcase, Testbeds. Federated Architecture INTERACTIVE DATA MAPPING Some government agencies such as USTRANSCOM must efficiently and accurately broker data between their vendors and customers. This is challenging when vendors and customers subscribe to non-standard and different database schemata. Our client, CDM Technology Inc, now Tapestry Solutions Inc., approached us for a technological solution to reduce the effort in maintaining schema mappings and improve data quality. We delivered a robust and powerful AI symbol and semantic matching technology to support schema mapping, which CDM embedded in their tool, called IMT, and evaluated at USTRANSCOM. We showed that with IMT TRANSCOM would save over 1 person year to improve the data quality. Keywords/Captions: Applied Research, Automated Schema Mapping, Embedded Algorithms ADMINISTRATIVE INFORMATION MANAGEMENT SYSTEM (AIMS) Administrative processes in an organization can span long periods of time and multiple divisions, leading to poor service, errors, and unacceptably long delays. We are re-engineering and overhauling our client s administrative processes to dramatically improve their service quality and process transparency. To support this objective, we have developed and deployed AIMS, a powerful enterprise process engine, to the Information Technology Division of the Naval Research Laboratory to automate their administrative processes. Over 130 users are using it to perform tasks such as process funding documents and reporting scientific project accomplishments. With AIMS, we have dramatically reduced the number of data errors the associated duplicate work, and, at the same time, improved the quality of collected data. Keywords/Captions: Business Process Re-Engineering, Enterprise System, Administrative information. Interactive Data Mapping Administrative Information Management System (AIMS)

6 MARKETS AND CUSTOMERS NAVAL RESEARCH LABORATORY» Code 5510 (Navy Center for Applied Research in Artificial Intelligence)» Code 5501 (Information Technology Division) OFFICE OF NAVAL RESEARCH (ONR)» Code 341 (Human and Bio-Engineering Systems)» Code 311 (Image Analysis and Understanding Program)» Code 32 (Ocean & Battlespace Sensing) Defense Advanced Research Projects Agency (DARPA) (Defense Sciences Office) Intelligence Advanced Research Projects Activity (IARPA) (Incisive Analysis) Tapestry Solutions Inc. a Boeing Company COMPANY PROFILE Knexus Research Corp. is a privately owned company dedicated to providing intelligent systems R&D services to the government and private sectors. Our offices are located in Springfield, Virginia and National Harbor, Maryland. Dr. Kalyan Moy Gupta, an intelligent systems researcher and information technology services professional with over two decades of experience, founded Knexus Research in Since then, it has grown to 10 full-time and 1 part-time employees. Our employees hold advanced degrees (3 PhDs, 5 Masters, and 3 Bachelors) in computer and information science, business, and engineering. Their professional experience ranges from 2-25 years. ACCOMPLISHMENTS & AWARDS Our members specialize in a variety of AI topics such as goal-directed autonomy, communicative autonomy, spatial reasoning and cognition, natural language understanding, information extraction and knowledge discovery, autonomous planning, transfer learning, relational pattern learning, and object classification.» Within a short span of 7 years, along with our clients, we have pioneered the research on many of these topics, and published over 30 articles in leading journals (e.g., the Journal of Machine Learning Research and the Journal of Information Technology and Web Engineering) and peer reviewed conferences (e.g., AAAI & ICCBR).» We have received two Best Research Paper Awards. We received the Best Overall AI Video award in the International Joint Conference on AI in 2009.» For IARPA, we integrated state-of-the-art question answering algorithms from three performer teams into a next-generation Intelligent Question Answering (INQA) system for Intelligence Analysts which was demonstrated to the US Congress.

7 MANAGEMENT KALYAN MOY GUPTA, PHD, FOUNDER & PRESIDENT Kalyan Gupta is an AI Scientist and Entrepreneur with over 20 years of innovation and product development experience. A veteran of two startups, Dr. Gupta acquires funds, leads and conducts intelligent systems research to develop advanced software prototypes and transition them into commercially viable intelligent systems. He has pioneered artificial intelligence (AI) techniques on a wide range of topics such as communicative autonomy, spatial reasoning, anomaly detection, relational learning, information extraction, conversational case-based reasoning, natural language processing, and knowledge management. He has developed intelligent systems applications for activity and threat recognition, multimodal interaction with virtual agents, adaptive web-service brokering, communications prioritization, and conversational diagnosis. Dr. Gupta has over forty publications in reputed journals and peer reviewed conferences on these topics. He has four published patents and two more are pending. Dr. Gupta has lead or contributed to the development of nineteen scientific and research prototypes and six products. Products from his efforts are in use in manufacturing companies such as DuPont, Bombardier, Information Extraction companies such as Cymfony, Inc. and decision support companies such as Tapestry Solutions. He has a Ph.D. in Business Administration from McMaster University, Canada and a Masters Degree in Industrial Engineering from Indian Institute of Technology, Kharagpur, India. MEMBERSHIPS» Association of Computing Machinery» American Association of Artificial Intelligence» Cognitive Science Society» National Defense Industry Association ACCOUNTING SYSTEM» DCCA Approved SECURITY» Facilities Cleared at Secret level

8 Contact Information Kalyan Moy Gupta, PhD President 163 Waterfront Street, Suite 440, National Harbor, MD Ph: x700 KNEXUS RESEARCH Kalyan Moy Gupta, PhD, President 163 Waterfront St., Suite 440, National Harbor, MD x700

The Future of Mobile Robots In 2020, 26 Million Mobile Robots Will Enable Autonomy in Smart Factories, Unmanned Transportation, and Connected Homes

The Future of Mobile Robots In 2020, 26 Million Mobile Robots Will Enable Autonomy in Smart Factories, Unmanned Transportation, and Connected Homes The Future of Mobile Robots In 2020, 26 Million Mobile Robots Will Enable Autonomy in Smart Factories, Unmanned Transportation, and Connected Homes NE5C-MT January 2015 NE5C-MT 1 Contents Section Slide

More information

SatCom For Net-Centric Warfare July/August 2011. MilsatMagazine

SatCom For Net-Centric Warfare July/August 2011. MilsatMagazine SatCom For Net-Centric Warfare July/August 2011 MilsatMagazine Emergency Communications C-COM, Hughes Boeing GPS II-F IvySys Technologies Command Center Guardian Mobility idirect Government Technologies

More information

Detect, Contain and Control Cyberthreats

Detect, Contain and Control Cyberthreats A SANS Whitepaper Written by Eric Cole, PhD June 2015 Sponsored by Raytheon Websense 2015 SANS Institute Introduction Dwell Time Relates to damage because the longer a system is compromised, the bigger

More information

Project abstracts (not edited) of winners of Phase 1 of the SBRI call on Adaptive Autonomous Ocean Sampling Networks

Project abstracts (not edited) of winners of Phase 1 of the SBRI call on Adaptive Autonomous Ocean Sampling Networks Project abstracts (not edited) of winners of Phase 1 of the SBRI call on Adaptive Autonomous Ocean Sampling Networks NOC-DSTL-Innovate UK SBRI team Version 1: 01.04.2015 SBRI NOC-AAOSN-205 - Extending

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

Appendices master s degree programme Artificial Intelligence 2014-2015

Appendices master s degree programme Artificial Intelligence 2014-2015 Appendices master s degree programme Artificial Intelligence 2014-2015 Appendix I Teaching outcomes of the degree programme (art. 1.3) 1. The master demonstrates knowledge, understanding and the ability

More information

PROPOSED BACHELOR OF SCIENCE DEGREE IN COMPUTER ENGINEERING

PROPOSED BACHELOR OF SCIENCE DEGREE IN COMPUTER ENGINEERING Shepherd University Board of Governors Meeting of April 13, 2006 Agenda Item No. 3 PROPOSED BACHELOR OF SCIENCE DEGREE IN COMPUTER ENGINEERING A new Bachelor of Science Degree in Computer Engineering is

More information

Bachelor Degree in Informatics Engineering Master courses

Bachelor Degree in Informatics Engineering Master courses Bachelor Degree in Informatics Engineering Master courses Donostia School of Informatics The University of the Basque Country, UPV/EHU For more information: Universidad del País Vasco / Euskal Herriko

More information

Michael E. Cleary. Curriculum Vitae. Charles Stark Draper Laboratory 555 Technology Square, M/S 3F Cambridge, MA 02139 617-258-2032 mcleary@draper.

Michael E. Cleary. Curriculum Vitae. Charles Stark Draper Laboratory 555 Technology Square, M/S 3F Cambridge, MA 02139 617-258-2032 mcleary@draper. Michael E. Cleary Curriculum Vitae Charles Stark Draper Laboratory 555 Technology Square, M/S 3F Cambridge, MA 02139 617-258-2032 mcleary@draper.com Educational History Ph.D. Received September 1997, in

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first

More information

Important dimensions of knowledge Knowledge is a firm asset: Knowledge has different forms Knowledge has a location Knowledge is situational Wisdom:

Important dimensions of knowledge Knowledge is a firm asset: Knowledge has different forms Knowledge has a location Knowledge is situational Wisdom: Southern Company Electricity Generators uses Content Management System (CMS). Important dimensions of knowledge: Knowledge is a firm asset: Intangible. Creation of knowledge from data, information, requires

More information

Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia

Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia As of today, the issue of Big Data processing is still of high importance. Data flow is increasingly growing. Processing methods

More information

The Big Data methodology in computer vision systems

The Big Data methodology in computer vision systems The Big Data methodology in computer vision systems Popov S.B. Samara State Aerospace University, Image Processing Systems Institute, Russian Academy of Sciences Abstract. I consider the advantages of

More information

Achieving Workforce Optimization: Merging Strategy and Technology

Achieving Workforce Optimization: Merging Strategy and Technology Achieving Workforce Optimization: Merging Strategy and Technology The healthcare industry is experiencing unprecedented change, and leaders are facing some of the most difficult challenges in the history

More information

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing

More information

Master of Artificial Intelligence

Master of Artificial Intelligence Faculty of Engineering Faculty of Science Master of Artificial Intelligence Options: Engineering and Computer Science (ECS) Speech and Language Technology (SLT) Cognitive Science (CS) K.U.Leuven Masters.

More information

A Cognitive Approach to Vision for a Mobile Robot

A Cognitive Approach to Vision for a Mobile Robot A Cognitive Approach to Vision for a Mobile Robot D. Paul Benjamin Christopher Funk Pace University, 1 Pace Plaza, New York, New York 10038, 212-346-1012 benjamin@pace.edu Damian Lyons Fordham University,

More information

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours. (International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models

More information

Concept and Project Objectives

Concept and Project Objectives 3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the

More information

Maritime Threat Detection Using Probabilistic Graphical Models

Maritime Threat Detection Using Probabilistic Graphical Models Proceedings of the Twenty-Fifth International Florida Artificial Intelligence Research Society Conference Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander 1, Kalyan Moy Gupta

More information

Increase Software Development Productivity:

Increase Software Development Productivity: Increase Software Development Productivity: Equations for Efficiency By Adam Kolawa, Parasoft Co-Founder and CEO Why Productivity Matters In today s economy, software development is a great expense for

More information

Ensighten Data Layer (EDL) The Missing Link in Data Management

Ensighten Data Layer (EDL) The Missing Link in Data Management The Missing Link in Data Management Introduction Digital properties are a nexus of customer centric data from multiple vectors and sources. This is a wealthy source of business-relevant data that can be

More information

Internship Opportunities Xerox Research Centre India (XRCI), Bangalore Analytics Research Group

Internship Opportunities Xerox Research Centre India (XRCI), Bangalore Analytics Research Group Analytics Research Group The Analytics Research Group in Xerox Research Centre India (XRCI) is seeking bright Undergraduate, Masters and PhD students for research internships to participate in exciting

More information

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments

More information

Tools for Managing and Measuring the Value of Big Data Projects

Tools for Managing and Measuring the Value of Big Data Projects Tools for Managing and Measuring the Value of Big Data Projects Abstract Big Data and analytics focused projects have undetermined scope and changing requirements at their core. There is high risk of loss

More information

Division of Information Technology. Strategic Plan 2012 THE GEORGE WASHINGTON UNIVERSITY

Division of Information Technology. Strategic Plan 2012 THE GEORGE WASHINGTON UNIVERSITY Division of Information Technology Strategic Plan 2012 THE GEORGE WASHINGTON UNIVERSITY 1 FROM THE CHIEF INFORMATION OFFICER FROM THE CHIEF INFORMATION OFFICER Dear Colleagues, The George Washington University

More information

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci 1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks

More information

KEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE

KEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE KEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE RAMONA-MIHAELA MATEI Ph.D. student, Academy of Economic Studies, Bucharest, Romania ramona.matei1982@gmail.com Abstract In this rapidly

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

How To Become A Data Scientist

How To Become A Data Scientist Programme Specification Awarding Body/Institution Teaching Institution Queen Mary, University of London Queen Mary, University of London Name of Final Award and Programme Title Master of Science (MSc)

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15

Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15 Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15 GENIVI is a registered trademark of the GENIVI Alliance in the USA and other countries Copyright GENIVI Alliance

More information

Master Data Management Drivers: Fantasy, Reality and Quality

Master Data Management Drivers: Fantasy, Reality and Quality Solutions for Customer Intelligence, Communications and Care. Master Data Management Drivers: Fantasy, Reality and Quality A Review and Classification of Potential Benefits of Implementing Master Data

More information

Human Dimension in Cyber Operations Research and Development Priorities

Human Dimension in Cyber Operations Research and Development Priorities Human Dimension in Cyber Operations Research and Development Priorities Chris Forsythe a, Austin Silva a, Susan Stevens-Adams a, Jeffrey Bradshaw b a Sandia National Laboratories, Albuquerque, NM, USA,

More information

Malay A. Dalal Madhav Erraguntla Perakath Benjamin. Knowledge Based Systems, Inc. (KBSI) College Station, TX 77840, U.S.A.

Malay A. Dalal Madhav Erraguntla Perakath Benjamin. Knowledge Based Systems, Inc. (KBSI) College Station, TX 77840, U.S.A. AN INTRODUCTION TO USING PROSIM FOR BUSINESS PROCESS SIMULATION AND ANALYSIS Malay A. Dalal Madhav Erraguntla Perakath Benjamin Knowledge Based Systems, Inc. (KBSI) College Station, TX 77840, U.S.A. ABSTRACT

More information

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA Panel Chair: Dr. Susan M. Bridges, Mississippi State University Panelists: Dr. Blaine W. Burnham, Georgia Tech Dr. Dipankar Dasgupta,

More information

State of the Art Observations: Maritime Information Systems

State of the Art Observations: Maritime Information Systems State of the Art Observations: Maritime Information Systems Global Maritime Information Sharing Symposium Baltimore, MD 14-16 SEP 2010 John Mittleman, PhD Naval Research Laboratory Washington DC Where

More information

IAI/Malat Solutions for the Maritime Arena

IAI/Malat Solutions for the Maritime Arena IAI/Malat Solutions for the Maritime Arena Any country with a proximity to the sea has an important operational need to positively and unambiguously identify, in time, threats that originate in the maritime

More information

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures

More information

Making critical connections: predictive analytics in government

Making critical connections: predictive analytics in government Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse

More information

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, jfeasel@t-sciences.com Technical POC: George Romas, gromas@t-sciences.com

More information

Presented By: Leah R. Smith, PMP. Ju ly, 2 011

Presented By: Leah R. Smith, PMP. Ju ly, 2 011 Presented By: Leah R. Smith, PMP Ju ly, 2 011 Business Intelligence is commonly defined as "the process of analyzing large amounts of corporate data, usually stored in large scale databases (such as a

More information

Applications of Deep Learning to the GEOINT mission. June 2015

Applications of Deep Learning to the GEOINT mission. June 2015 Applications of Deep Learning to the GEOINT mission June 2015 Overview Motivation Deep Learning Recap GEOINT applications: Imagery exploitation OSINT exploitation Geospatial and activity based analytics

More information

Integrating Enterprise Reporting Seamlessly Using Actuate Web Services API

Integrating Enterprise Reporting Seamlessly Using Actuate Web Services API Any User. Any Data. Any Deployment. Technical White Paper Integrating Enterprise Reporting Seamlessly Using Actuate Web Services API How Web Services Can Be Used to Perform Fast, Efficient, Future-Proof

More information

Dr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory. The Nation s Premier Laboratory for Land Forces UNCLASSIFIED

Dr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory. The Nation s Premier Laboratory for Land Forces UNCLASSIFIED Dr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory 21 st Century Research Continuum Theory Theory embodied in computation Hypotheses tested through experiment SCIENTIFIC METHODS

More information

WHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective

WHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective WHITE PAPER OCTOBER 2014 Unified Monitoring A Business Perspective 2 WHITE PAPER: UNIFIED MONITORING ca.com Table of Contents Introduction 3 Section 1: Today s Emerging Computing Environments 4 Section

More information

SMAL BUSINESS INNOVATIVE RESEARCH

SMAL BUSINESS INNOVATIVE RESEARCH POSITION STATEMENT SMAL BUSINESS INNOVATIVE RESEARCH Adopted by the IEEE-USA Board of Directors, 18 Sept. 2014 The Small Business Innovation Research (SBIR) and related Small Business Technology Transfer

More information

Doctoral Programs. the globally networked management school

Doctoral Programs. the globally networked management school Doctoral Programs the globally networked management school Accreditation Accreditation is the review of the quality of higher education institutions and programs. Why is accreditation important? It is

More information

USING SECURITY METRICS TO ASSESS RISK MANAGEMENT CAPABILITIES

USING SECURITY METRICS TO ASSESS RISK MANAGEMENT CAPABILITIES Christina Kormos National Agency Phone: (410)854-6094 Fax: (410)854-4661 ckormos@radium.ncsc.mil Lisa A. Gallagher (POC) Arca Systems, Inc. Phone: (410)309-1780 Fax: (410)309-1781 gallagher@arca.com USING

More information

TITUS Data Security for Cloud Email Identify and Control Sensitive Data Sent to the Cloud

TITUS Data Security for Cloud Email Identify and Control Sensitive Data Sent to the Cloud Business Brief TITUS Data Security for Cloud Email Identify and Control Sensitive Data Sent to the Cloud Nine out of 10 businesses cite security as the top obstacle for cloud adoption. - IDC Control Data

More information

Michael W. Floyd. Education

Michael W. Floyd. Education Michael W. Floyd Education Carleton University, Ottawa, Canada Ph.D., Electrical and Computer Engineering (2013), Supervisor: Prof. Babak Esfandiari Medal for Outstanding Academic Achievement (awarded

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology

More information

GSAW 98. COTS AI Technologies for Satellite Control

GSAW 98. COTS AI Technologies for Satellite Control GSAW 98 COTS AI Technologies for Satellite Control Capt Steve Lindsay Satellite Autonomy Program Lead Air Force Research Laboratory lindsays@plk.af.mil 505/853-4140 (DSN 263) Overview Position: identifying

More information

Introduction to SOA governance and service lifecycle management.

Introduction to SOA governance and service lifecycle management. -oriented architecture White paper March 2009 Introduction to SOA governance and Best practices for development and deployment Bill Brown, executive IT architect, worldwide SOA governance SGMM lead, SOA

More information

Gian Luca Sacco Marketing Director South & Central Europe. Smarter decisions, better products.

Gian Luca Sacco Marketing Director South & Central Europe. Smarter decisions, better products. Gian Luca Sacco Marketing Director South & Central Europe Smarter decisions, better products Smarter decisions, better products. Today s Product Challenges are More Difficult Than Ever Before Landing on

More information

Business Process Services. White Paper. Improving Efficiency in Business Process Services through User Interface Re-engineering

Business Process Services. White Paper. Improving Efficiency in Business Process Services through User Interface Re-engineering Business Process Services White Paper Improving Efficiency in Business Process Services through User Interface Re-engineering About the Authors Mahesh Kshirsagar Mahesh has a vast experience of about 24

More information

PROP OSAL FOR A GRA DUA TE CE RTIFIC ATE P ROG RAM IN COGNITIVE SCIENCE AT THE UNIVERSITY OF MASSACH USETTS/AMHE RST

PROP OSAL FOR A GRA DUA TE CE RTIFIC ATE P ROG RAM IN COGNITIVE SCIENCE AT THE UNIVERSITY OF MASSACH USETTS/AMHE RST PROPOSAL FOR A GRADUATE CERTIFICATE PROGRAM IN COGNITIVE SCIENCE AT THE UNIVERSITY OF MASSACHUSETTS/AMHERST May 30, 2000 (errors corrected and amendments added December 3, 2000, and May 23, 2001) Proposing

More information

Invenio: A Modern Digital Library for Grey Literature

Invenio: A Modern Digital Library for Grey Literature Invenio: A Modern Digital Library for Grey Literature Jérôme Caffaro, CERN Samuele Kaplun, CERN November 25, 2010 Abstract Grey literature has historically played a key role for researchers in the field

More information

System Specification. Author: CMU Team

System Specification. Author: CMU Team System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect

More information

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

Visual Interfaces for the Development of Event-based Web Agents in the IRobot System

Visual Interfaces for the Development of Event-based Web Agents in the IRobot System Visual Interfaces for the Development of Event-based Web Agents in the IRobot System Liangyou Chen ACM Member chen_liangyou@yahoo.com Abstract. Timely integration and analysis of information from the World-Wide

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

Information and Understanding (IFU) Overview

Information and Understanding (IFU) Overview Information and Understanding (IFU) Overview Jun 8 th, 2010 Mark Pronobis IFU CTC Lead AFRL/RIEF mark.pronobis@rl.af.mil Approved for Public Release; Distribution Unlimited: 88ABW-2010-2619 dated 13 May

More information

Position Title: Business Development Manager (BDM) Department: Business Development. Reports to: Vice President, Business Development

Position Title: Business Development Manager (BDM) Department: Business Development. Reports to: Vice President, Business Development Position Title: Business Development Manager (BDM) Department: Business Development Reports to: Vice President, Business Development Overall Responsibilities The Business Development Manager is responsible

More information

Best Practices to Improve Breach Readiness

Best Practices to Improve Breach Readiness Best Practices to Improve Breach Readiness Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC http://blog.emc2.de/trust-security @RobtWesGriffin 1 Security Breaches 2 Security

More information

WMD Incident Management Simulation and Tutor

WMD Incident Management Simulation and Tutor WMD Incident Management Simulation and Tutor NIEHS 30 March 2007 Presented by: Jim Ong ong@stottlerhenke.com 650 931 2710 http://www.stottlerhenke.com Project Team Stottler Henke - Artificial intelligence

More information

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,

More information

Senior Business Intelligence/Engineering Analyst

Senior Business Intelligence/Engineering Analyst We are very interested in urgently hiring 3-4 current or recently graduated Computer Science graduate and/or undergraduate students and/or double majors. NetworkofOne is an online video content fund. We

More information

Opportunities for Joint International Doctoral Candidates in Law, Science and Technology at the University of Pittsburgh Intelligent Systems Program

Opportunities for Joint International Doctoral Candidates in Law, Science and Technology at the University of Pittsburgh Intelligent Systems Program Opportunities for Joint International Doctoral Candidates in Law, Science and Technology at the University of Pittsburgh Intelligent Systems Program Kevin Ashley Professor of Law and Intelligent Systems

More information

Vertafore Analytics: Turning Raw Data Into Revenue A CASE STUDY

Vertafore Analytics: Turning Raw Data Into Revenue A CASE STUDY Vertafore Analytics: Turning Raw Data Into Revenue A CASE STUDY Summary OPPORTUNITY Turn raw data into an analytics product Overview When Vertafore wanted to turn raw data into Vertafore Analytics an intelligence

More information

PIVOTAL CRM. CRM that does what you want it to do BROCHURE

PIVOTAL CRM. CRM that does what you want it to do BROCHURE PIVOTAL CRM CRM that does what you want it to do BROCHURE THE PIVOTAL CRM PHILOSOPHY THE PIVOTAL ADVANTAGE Today s business world is a fast moving and dynamic environment one in which your teams expect

More information

WHITE PAPER. Build or Buy. Assessing the Gaps, Risks & Opportunites

WHITE PAPER. Build or Buy. Assessing the Gaps, Risks & Opportunites Build or Buy Assessing the Gaps, Risks & Opportunites Introduction Companies today face a significant challenge in growing sales and squeezing out more margin across multiple sales and distribution channels,

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many

More information

II. TOPIC DESCRIPTION

II. TOPIC DESCRIPTION Special Notice N00014-16-R-SN02 Special Program Announcement for 2016 Office of Naval Research Research Opportunity: Undersea Technologies for Autonomous Detection and Communications I. INTRODUCTION This

More information

Windows Embedded Security and Surveillance Solutions

Windows Embedded Security and Surveillance Solutions Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

White Paper: SAS and Apache Hadoop For Government. Inside: Unlocking Higher Value From Business Analytics to Further the Mission

White Paper: SAS and Apache Hadoop For Government. Inside: Unlocking Higher Value From Business Analytics to Further the Mission White Paper: SAS and Apache Hadoop For Government Unlocking Higher Value From Business Analytics to Further the Mission Inside: Using SAS and Hadoop Together Design Considerations for Your SAS and Hadoop

More information

CRM Solutions. Banking Sector

CRM Solutions. Banking Sector CRM Solutions Banking Sector BY COMMUNICATION PROGRESS Agenda Changing Sales/Marketing Trends Distinct Markets Banks Strategic Goals Introduction to CRM CRM as a Business Strategy Design an effective segmentation

More information

Using Data Mining to Detect Insurance Fraud

Using Data Mining to Detect Insurance Fraud IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts

More information

Create Operational Flexibility with Cost-Effective Cloud Computing

Create Operational Flexibility with Cost-Effective Cloud Computing IBM Sales and Distribution White paper Create Operational Flexibility with Cost-Effective Cloud Computing Chemicals and petroleum 2 Create Operational Flexibility with Cost-Effective Cloud Computing Executive

More information

UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES. Approved by SBA General Faculty (April 2012)

UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES. Approved by SBA General Faculty (April 2012) UNIVERSITY OF MIAMI SCHOOL OF BUSINESS ADMINISTRATION MISSION, VISION & STRATEGIC PRIORITIES Approved by SBA General Faculty (April 2012) Introduction In 1926, we embarked on a noble experiment the creation

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Background The command over cloud computing infrastructure is increasing with the growing demands of IT infrastructure during the changed business scenario of the 21 st Century.

More information

Making Business Intelligence Relevant for Mid-sized Companies. Improving Business Results through Performance Management

Making Business Intelligence Relevant for Mid-sized Companies. Improving Business Results through Performance Management Making Business Intelligence Relevant for Mid-sized Companies Improving Business Results through Performance Management mydials Inc. 2009 www.mydials.com - 1 Contents Contents... 2 Executive Summary...

More information

Ethar Ibrahim Elsaka

Ethar Ibrahim Elsaka ethar.elsaka@gmail.com 9348 Cherry Hill Rd., Apt 621 College Park MD, 20740 USA Tel: 240 581 2664 Ethar Ibrahim Elsaka Education PhD Student, Department of Computer Science, University of Maryland at College

More information

Maritime Threat Detection using Plan Recognition

Maritime Threat Detection using Plan Recognition Maritime Threat Detection using Plan Recognition Bryan Auslander 1, Kalyan Moy Gupta 1, & David W. Aha 2 1 Knexus Research Corp.; 163 Waterfront Street; National Harbor, MD 20745 2 Navy Center for Applied

More information

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 info@coresecurity.com www.coresecurity.com blog.coresecurity.com Preempting

More information

The Three Lenses ORGANIZATION. Managerial Psychology Fall, 2006 John S. Carroll. Strategic Design Lens. Political Lens.

The Three Lenses ORGANIZATION. Managerial Psychology Fall, 2006 John S. Carroll. Strategic Design Lens. Political Lens. The Three Lenses Strategic Design Lens Managerial Psychology Fall, 2006 John S. Carroll Political Lens ORGANIZATION Cultural Lens Goals For Today Introduce the idea that organizations are a context for

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

How To Understand The Power Of Decision Science In Insurance

How To Understand The Power Of Decision Science In Insurance INFINILYTICS, INC. NEXT GENERATION DECISION SCIENCE FOR the INSURANCE INDUSTRY Whitepaper series: Big Data, Data Science, Fact-based Decisions, Machine Learning and Advanced Analytics: An Introduction

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

Turning Strategic Insight Into Business Impact

Turning Strategic Insight Into Business Impact Turning Strategic Insight Into Business Impact VMware Accelerate Advisory Services Identify Opportunities and Create Strategies for the Journey to IT as a Service No longer relegated to simply keeping

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Engineering and Applied Science Programs for Professionals

Engineering and Applied Science Programs for Professionals Engineering and Applied Science Programs for Professionals Allan W. Bjerkaas The Engineering and Applied Science Programs for Professionals (EPP), a part of the Whiting School of Engineering, has the mission

More information

Service Oriented Architecture (SOA) An Introduction

Service Oriented Architecture (SOA) An Introduction Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

CENTRE FOR MARITIME RESEARCH AND EXPERIMENTATION

CENTRE FOR MARITIME RESEARCH AND EXPERIMENTATION CENTRE FOR MARITIME RESEARCH AND EXPERIMENTATION Gabriel Grenon, Dr.Alain Maguer Per Arne Sletner Head, Autonomous Unmanned Vehicles Section Dronitaly Slide 1 Mission CMRE organises and conducts scientific

More information