2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications最新文献

筛选
英文 中文
Toward Automating Airspace Management 迈向空域管理自动化
Glenn Taylor, Brian S. Stensrud, Susan Eitelman, C. Dunham, Echo A. Harger
{"title":"Toward Automating Airspace Management","authors":"Glenn Taylor, Brian S. Stensrud, Susan Eitelman, C. Dunham, Echo A. Harger","doi":"10.1109/CISDA.2007.368144","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368144","url":null,"abstract":"Military airspace is increasingly crowded with traditional aircraft competing with new loitering munitions and UAVs. Managing the airspace is therefore more challenging, requiring closer coordination among all the stakeholders. In this paper, we describe the motivation and design of a knowledge-based system that attempts to automate aspects of airspace management, including the detection and resolution of airspace conflicts. We then describe a formative evaluation of the system as compared to human performance of the same task, the evaluation setup, results, and analysis","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117177603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Temporal Risk Assessment Framework for Planning A Future Force Structure 规划未来部队结构的时间风险评估框架
M. Barlow, Ang Yang, H. Abbass
{"title":"A Temporal Risk Assessment Framework for Planning A Future Force Structure","authors":"M. Barlow, Ang Yang, H. Abbass","doi":"10.1109/CISDA.2007.368141","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368141","url":null,"abstract":"Planning future force structures is usually associated with a high, but difficult to quantify, risk factor. Among many other reasons for the importance of this planning process, the defence industry requires the military establishment to communicate their decisions on the capabilities needed in the future. This communication enables the industry to shape their R&D programs and tailor their production plans. Overall, the decision maker needs to anticipate the state(s) of the environment across a relatively long time frame. The process of anticipation is surrounded with many risk factors. Moreover, transforming a force structure is not a single-step process. Intermediate force structures need also to lake into account threats in the medium future. This paper presents a temporal risk assessment methodology for planning future force structure. The methodology relics on constructing a topological structure of interfiled into force structures with transitions based on the proximity of these structures to each other and budget constraints. The path with minimal maximum risk is then identified using a dynamic programming min-max path finder algorithm. The methodology is demonstrated with two simple examples","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126877206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Next Generation End-To-End Logistics Decision Support Tools. Evolutionary Logistics Planning 下一代端到端物流决策支持工具。进化物流规划
Beth DePass
{"title":"Next Generation End-To-End Logistics Decision Support Tools. Evolutionary Logistics Planning","authors":"Beth DePass","doi":"10.1109/CISDA.2007.368134","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368134","url":null,"abstract":"Logistics planning and decision support systems have traditionally focused on planning large scale military operations with limited forecasting and execution tools causing many military logistics support tools to fall short of providing a true end-to-end solution. A true end-to-end solution will yield a system that can be used for logistics training, long-term logistics planning operations, real-time logistics planning and execution during an operation, and real-time decision support for immediate replanning and response to ongoing operations for all echelons of a military hierarchy. In this paper we will explore technologies that will provide flexible and accurate plan development leading to better plans, increased decision support, and ultimately better execution of military logistic plans. Advanced logistics planning and forecasting tools built by DARPA projects such as the Advanced Logistics Program (ALP), Ultra*Log, and Network Centric Logistics (NCL) successfully implemented capabilities that provide portions of an end-to-end logistics solution. These systems were built using the cognitive agent architecture (COUGAAR) which provides support for large multi-agent systems that require distributed processing and allow for numerous applications and technologies to be seamlessly integrated into large scale logistics systems. In order to provide the next generation of forecasting and execution utilities that will lead to an end-to-end solution, large multi- agent systems will need to incorporate technologies that provide the following attributes: technologies that isolate and focus on specific areas of a plan, technologies that provide greater flexibility in planning and technologies that will provide a mechanism for human interactions. Under the solutions section of this paper four technical solution areas are discussed: 1) Optimized distribution 2) Evolutionary planning 3)Focused forecasting 4) Execution and simulation. Existing and new techniques in these areas will provide the necessary logistics planning attributes for the next generation of logistics decision support systems","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133908143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cognitive Approach to Intrusion Detection 一种入侵检测的认知方法
D. Benjamin
{"title":"A Cognitive Approach to Intrusion Detection","authors":"D. Benjamin","doi":"10.1109/CISDA.2007.368149","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368149","url":null,"abstract":"The VMSoar project at Pace University is building a cognitive agent for cybersecurity. The project's objective is to create an intelligent agent that can model and understand the activities of users who are on the network, and that can communicate with network administrators in English to alert them to illegal or suspicious activities. VMSoar can understand users' activities because it is capable of performing these activities itself. It knows how to perform both legal and illegal activities, and uses this knowledge to explore simulations of the activity on a network. It can also probe information stored on a machine to assess the legality of past activity. Research in cybersecurity is difficult is due to the extremely large amount of data that must be analyzed to detect illegal activities. In addition, new exploits are developed frequently. Most current projects in this area are attempting to build some level of intelligence into their systems; however, those projects are focusing primarily on statistical data mining approaches. The VMSoar project is unique in its approach to building an intelligent security agent. The VMSoar agent is based on Soar, a mature cognitive architecture that is used in universities and corporations around the world","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Toward Open-Set Text-Independent Speaker Identification in Tactical Communications 战术通信中开集文本无关说话人识别研究
Matt B. Wolf, W. Park, J. Oh, Misty K. Blowers
{"title":"Toward Open-Set Text-Independent Speaker Identification in Tactical Communications","authors":"Matt B. Wolf, W. Park, J. Oh, Misty K. Blowers","doi":"10.1109/CISDA.2007.368129","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368129","url":null,"abstract":"We present the design and implementation of an open-set text-independent speaker identification system using genetic learning classifier systems (LCS). We examine the use of this system in a real-number problem domain, where there is strong interest in its application to tactical communications. We investigate different encoding methods for representing real-number knowledge and study the efficacy of each method for speaker identification. We also identify several difficulties in solving the speaker identification problems with LCS and introduce new approaches to resolve the difficulties. Experimental results show that our system successfully learns 200 voice features at accuracies of 90 % to 100 % and 15,000 features to more than 80% for the closed-set problem, which is considered a strong result in the speaker identification community. The open-set capability is also comparable to existing numeric-based methods","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"1986 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125471576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation 对抗游戏的算法工具:使用进化计算进行意图分析
Tasha Vanesian, K. Kreutz-Delgado
{"title":"Algorithmic Tools for Adversarial Games: Intent Analysis Using Evolutionary Computation","authors":"Tasha Vanesian, K. Kreutz-Delgado","doi":"10.1109/CISDA.2007.368142","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368142","url":null,"abstract":"Determining adversarial intent is important on a battlefield. In this paper, we propose a method for intent analysis using evolutionary computation. The proposed approach defines the model as an optimization problem then gives an algorithm for determining the parameters of the model in a Valuated State Spacereg domain. Example experiments using simulation data are discussed","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125133920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Use of Trust Vectors for CyberCraft and the Limits of Usable Data History for Trust Vectors 网络技术中信任向量的使用及信任向量可用历史数据的限制
Michael Stevens, Paul D. Williams
{"title":"Use of Trust Vectors for CyberCraft and the Limits of Usable Data History for Trust Vectors","authors":"Michael Stevens, Paul D. Williams","doi":"10.1109/CISDA.2007.368153","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368153","url":null,"abstract":"The CyberCraft initiative is designing a system of agents to provide command and control of future air force information systems. In such a distributed environment, trust between agents becomes pertinent to provide a combatant commander an accurate picture of the network by merging conflicting data and giving the commander confidence in the control of their network. The trust vector model breaks from traditional trust models as it provides a range of trust values for data, enabling the system to describe partial trust in data rather than binary values of trust or no trust, and from that build confidence intervals in fused data. The trust vector model builds trust based on current and historical data, but does not address the limits of utility of the historical data. This research provides implementors of the trust vector model input as to how much historical data should be stored to balance accuracy of trust with limits of storage","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128091310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Review of Intelligent Systems Software for Autonomous Vehicles 自动驾驶汽车智能系统软件研究综述
L. Long, S. Hanford, O. Janrathitikarn, Gregory L. Sinsley, Jodi A. Miller
{"title":"A Review of Intelligent Systems Software for Autonomous Vehicles","authors":"L. Long, S. Hanford, O. Janrathitikarn, Gregory L. Sinsley, Jodi A. Miller","doi":"10.1109/CISDA.2007.368137","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368137","url":null,"abstract":"The need for intelligent unmanned vehicles has been steadily increasing. These vehicles could be air-, ground-, space-, or sea-based. This paper will review some of the most common software systems and methods that could be used for controlling such vehicles. Early attempts at mobile robots were confined to simple laboratory environments. For vehicles to operate in real-world noisy and uncertain environments, they need to include numerous sensors and they need to include both reactive and deliberative features. The most effective software systems have been hierarchical or multi-layered. Many of these systems mimic biological systems. This paper reviews several software approaches for autonomous vehicles. While there are similarities, there are differences as well. Most of these software systems are very difficult to use, and few of them have the ability to learn. Autonomous vehicles promise remarkable capabilities for both civilian and military applications, but much work remains to develop intelligent systems software which can be used for a wide range of applications. In particular there is a need for reliable open-source software that can be used on inexpensive autonomous vehicles","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125353231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
The Automation of Combat Decision Processes in the Simulation Based Operational Training Support System 基于仿真的作战训练保障系统中作战决策过程的自动化
A. Najgebauer, R. Antkiewicz, Z. Tarapata, Jaroslaw Rulka, Wojciech Kulas, Dariusz Pierzchala, R. Wantoch-Rekowski
{"title":"The Automation of Combat Decision Processes in the Simulation Based Operational Training Support System","authors":"A. Najgebauer, R. Antkiewicz, Z. Tarapata, Jaroslaw Rulka, Wojciech Kulas, Dariusz Pierzchala, R. Wantoch-Rekowski","doi":"10.1109/CISDA.2007.368147","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368147","url":null,"abstract":"The interactive simulation environment for training (and/or analysis) of military operations is presented as the Simulation Based Operational Training Support System (SBOTSS). The system was constructed in order to provide cost-effective approach of computer assisted exercises and it is an integrated, interactive, many-sided land, analysis and training support model based on particular components equipped with combat, logistics, engineering, electronic warfare and intelligence functions. The idea and model of command and control process applied for the decision automata at the tactical level are presented. The automata executes the two main processes: decision planning process and direct combat control. The decision planning process relating to the automata contains three stages: the identification of a decision situation, the generation of decision variants (course of actions) the variants evaluation and nomination the best variant of these, which satisfy the proposed criteria. The particular approach to identification of decision situation and variants of action are presented. The procedure of variants generation based on some kind of pre-simulation process contains the evaluation module, which allows us the best choice of action plan according to specified criteria. The direct combat control process contains such phases, like command, reporting and reaction to fault situations. Some results of the simulation process including the decisions made by automata is considered. The calibration process on the basis of battle scenarios is described and presented","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127475286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Face Recognition using Gaborface-based 2DPCA and (2D)2PCA Classification with Ensemble and Multichannel Model 基于gaborface的2DPCA和集成多通道模型(2D)2PCA分类的人脸识别
Lin Wang, Yongping Li, Chengbo Wang, Hongzhou Zhang
{"title":"Face Recognition using Gaborface-based 2DPCA and (2D)2PCA Classification with Ensemble and Multichannel Model","authors":"Lin Wang, Yongping Li, Chengbo Wang, Hongzhou Zhang","doi":"10.1109/CISDA.2007.368128","DOIUrl":"https://doi.org/10.1109/CISDA.2007.368128","url":null,"abstract":"This paper introduces Gaborface-based 2DPCA and (2D)2PCA classification method based on 2D Gaborface matrices rather than transformed ID feature vectors. Two kinds of strategies to use the bank of Gaborfaces are proposed: ensemble Gaborface representation (EGFR) and multichannel Gaborface representation (MGFR). The feasibility of our method is proved with the experimental results on the ORL and Yale databases. In particular, the MGFR-based (2D)2 PCA method achieves 100% recognition accuracy for ORL database, and 98.89% accuracy for Yale database with five training samples per class","PeriodicalId":403553,"journal":{"name":"2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130944901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信