Browse > Article

Inductive Classification of Multi-Spectral Threat Data for Autonomous Situation Awareness  

Jeong, Yong-Woong (가톨릭대학교 컴퓨터정보공학부)
Noh, Sang-Uk (가톨릭대학교 컴퓨터정보공학부)
Go, Eun-Kyoung (국방과학연구소 2 기술본부 통신/전자전 개발시험장)
Jeong, Un-Seob (국방과학연구소 2 기술본부 통신/전자전 개발시험장)
Abstract
To build autonomous agents who can make a decision on behalf of humans in time-critical complex environments, the formulation of operational knowledge base could be essential. This paper proposes the methodology of how to formulate the knowledge base and evaluates it in a practical application domain. We analyze threat data received from the multiple sensors of Aircraft Survivability Equipment(ASE) for Korean helicopters, and integrate the threat data into the inductive model through compilation technique which extracts features of the threat data and relations among them. The compiled protocols of state-action rules can be implemented as the brain of the ASE. They can reduce the amounts of reasoning, and endow the autonomous agents with reactivity and flexibility. We report experimental results that demonstrate the distinctive and predictive patterns of threats in simulated battlefield settings, and show the potential of compilation methods for the successful detection of threat systems.
Keywords
autonomous agents; situational awareness; compilation; threat classification;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Use of helicopters in land operations, STANAG 2999 HIS (NATO ATP-49(A)), 1992
2 P. Clark and T. Niblett, "The CN2 Induction Algorithm," Machine Learning Journal, Vol.3, No.4, pp. 261-283, 1989
3 L. A. Zadeh, "Fuzzy Logic, Neural Networks and Soft Computing," Comm- unications of the ACM, Vol.37, No.3, pp. 77-84, 1994   DOI   ScienceOn
4 I. H. Witten and E. Frank, Data Mining: Practical machine learning tools and techniques. 2nd Edition, San Francisco: Morgan Kaufmann Publishers, 2005
5 Aircraft survivability equipment (ASE): Ensuring lethality and dominance of Army aviation over tomorrow's battlefield, Association of the United States Army, July 2002
6 A. S. Rao and M. P. Georgeff, "BDI agents: from theory to practice," in Proceedings of 1st International Conference of Multi-agent Systems, pp.312- 319, July 1995
7 L. B. Thompson, "Army force protection : Helicopters can't wait," news article, April 21, 2006. Available: http://lexingtoninstitute.org/782.shtml
8 S. Noh, C. Lee, K. Choi, and G. Jung, "Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning," Lecture Notes in Computer Science 2690, New York: Springer-Verlag, pp. 286-295, 2003
9 J. R. Quinlan, C4.5: Programs for Machine Learning. San Francisco: Morgan Kaufmann Publishers, 1993
10 Electronic systems - Defensive systems division, Northrop Grumman. Available: http://www.dsd.es. northropgrumman.com
11 D. J. Bryant, F. M. J. Lichacz, J. G. Hollands, and J. V. Baranski, "Modeling situation awareness in an organizational context Military command and control," In S. Banbury and S. Tremblay (Eds), A cognitive approach to situation awareness: theory and application. Chapter 6, Burlington, VT: Ashgate Publishing Company, 2004
12 J. Heikell, Electronic warfare self-protection of battlefield helicopters: A holistic view, Helsinki University of Technology, doctoral dissertation, 2005
13 J. Patrick and N. James, "A Task-Oriented Perspective of Situation Awareness," In S. Banbury and S. Tremblay (Eds), A cognitive approach to situation awareness: theory and application. Chapter 4, Burlington, VT: Ashgate Publishing Company, 2004
14 Advanced EW protection for maximum survivability, Northrop Grumman, AN/APR-39B(V)2 Suite of integrated sensors and countermeasures (SISCM)
15 R. Hanson, J. Stutz, and P. Cheeseman, "Bayesian Classification Theory," Technical Report FIA-90- 12-7-01, NASA Ames Research Center, AI Branch, 1991
16 D. Moshou, I. Hostens, G. Papaioannou, and H. Ramon, "Dynamic muscle fatigue detection using self-organizing maps," Applied Soft Computing, Vol.5, pp. 391-398, 2005   DOI   ScienceOn
17 N. Kasabov, "Adaptation and interaction in dynamical systems: Modelling and rule discovery through evolving connectionist systems," Applied Soft Computing, Vol.6, pp. 307-322, 2006   DOI   ScienceOn
18 H. Zhongwen and W. Zongxiao, Sources and Techniques of Obtaining National Defense Science and Technology Intelligence, Kexue Jishu Wenxuan Publishing Co., Beijing, 1991. Available: http://www. fas.org/irp/world/china/docs/
19 L. D. Kennedy, C. R. Patterson, and D. C. Munshower, "F/A-18 electronic warfare suite cost and operational effectiveness analysis methodology : Phase rad- io-frequency countermeasures," John Hopkins APL Technical Digest, Vol.18, No.1, pp59-68, 1997. Available: http://techdigest.jhuapl.edu/ td1801/kennedy.pdf