UNCLASSIFIED. Comprehensive Ontology for Military Operations. J. Wesley Regian, Ph.D. CTC Principal Investigator
|
|
- Milo Harrington
- 6 years ago
- Views:
Transcription
1 Comprehensive Ontology for Military Operations J. Wesley Regian, Ph.D. CTC Principal Investigator
2 - Approved for Public Release, Distribution Unlimited Comprehensive Ontology for Military Ops MUSE COMO General Architecture Joint C3 Information Exchange Data Model Army Universal Task List Non Kinetic Ops Entities and Events Human Terrain Entities and Events Asymmetric Ops Entities and Events Counter Insurgency Entities and Events Entity Base Event Base Comprehensive OWL Military Ontology RDF Description RDF Description RDF Description RDF Description RDF Description The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. Black Hawk Down Fallujah Uprising Search for Saddam Financier Meets Bomb Maker London Bombings
3 COMO Scenario/Story (Event Sequence) Modeling for Reasoning about Tasks Past, Progressing, or Planned
4 COMO Modeling of Human Terrain Organizations and Networks Human Network AK Network ID Network Goal AK Goal ID Name Method Network Agenda AK Agenda ID Name Goal Method * Name Type AoO Agenda Goal Method Member Ally Rival Network Member AK Member ID ** Name Role AoO Skill Goal Method Ally Rival Network Task AK Task ID Name Task * Network Type could be political, social, tribal, familial, business, religious, or other (analyst defined) * * Member roles can range from setting the agenda, establishing methods, planning tasks, to performing tasks
5 COMO Abstraction Hierarchy for Network Agenda, Goals, Methods, and Tasks ABSTRACT Network Concept (ex. Islamic Fundamental ist Network) Ideological Agenda overarching objectives driven by ideological stance (Ex. Universal Sharia Law, supplant other religions, etc ) Strategic Goals strategies to achieve ideological agenda (Ex. influence public opinion, no foreign military, etc.) Tactical Methods methods to achieve strategic goals (Ex. terror, propaganda, etc ) CONCRETE Network Instance (ex. Al Qaeda) Strategic Goals strategies to achieve ideological agenda (Ex. influence public opinion, no foreign military, etc ) Tactical Methods methods to achieve strategic goals (Ex. large scale terror attacks, occasional propaganda, etc ) Tactical Tasks plans or parts of plans for tactical event sequences planned (event sequences that are or may be planned in the future) progressing (event sequences that are or may be unfolding in the present) past (Ex. 9/11 Jetliner attacks)
6 Formal Modeling of Agenda, Goals, Methods, and Tasks: Changes of State Water: Liquid Water: Frozen Process Water Water: Liquid Water: Frozen State-of State-Transition
7 Formal Modeling of Agenda, Goals, Methods, and Tasks: Changes of State Govt: Secular Govt: Theocratic Task Govt Govt: Secular Govt: Theocratic State-of State-Transition
8 Formal Modeling of Agenda, Goals, Methods, and Tasks: Changes of State Level of Abstraction Entity State Change Agenda Nation/Region (Foreign Military Present Not Present) (Constitutional Law Sharia Law) Goals Government (Secular Rule Theocratic Rule) (Authoritarian Rule Democratic Rule) Methods Population (Orderly Chaotic) (Complacent Terrorized) Group (Friendly Hostile) (Hostile Friendly) Tasks Individual (Alive Dead) (At Large Captured) (Unknown Location Known Location) (Unknown Allegiance Known Allegiance)
9 Approved for Public Release, Distribution Unlimited Multi-Source (MUSE) Intelligence Integration J. Wesley Regian, Ph.D. CTC Principal Investigator MUSE is a component of the Collaborative Analytic Fusion Environment (CAFÉ) CAFÉ Program & Contractors Managed by USASMDC/ARSTRAT Concurrent Technologies Corporation MUSE Ontology, Reasoning & Decision Support Potomac Fusion Inc. Fusion Exploitation Framework & DCGS A Semandex Inc. Semantic Search & Information Fusion The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.
10 Approved for Public Release, Distribution Unlimited CAFE: Collaborative Analytic Fusion Environment Capitalizes on Multi-Source Intelligence Integration (MUSE) for analogical, hierarchical, and abstract reasoning about nefarious networks Comprehensive Military Ontology (COMO) for machine understanding of entities and activities Artificial Intelligence (AI) machine reasoning to develop machine situation awareness Social Network Analysis (SNA) to model and understand human domain Fusion Exploitation Framework (FEF) for bringing in real-time sensor data Semantic search (Tango) for reducing set of input source material The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.
11 - Approved for Public Release, Distribution Unlimited - The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.
12 - Approved for Public Release, Distribution Unlimited - The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.
13 - Approved for Public Release, Distribution Unlimited - The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.
14 COMO: Prototype Applications COMO has been applied to MUSE (Multi-Source Intelligence Integration) Analysis of nefarious human network activities in counter-terrorist and counter-insurgency operations MARS (Military Analogical Reasoning System) Machine reasoning to automatically derive lessons learned from past military operations and apply those lessons to current operations PLUTO (Planning for Urban Terrain Operations) Route planning for military operations in urban terrain US Army Apache AH64D CBM Condition based maintenance of attack helicopters
The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment
The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment Timothy Darr, Richard Mayer and Perakath Benjamin Knowledge-Based Systems, Inc. 1408 University Drive East College
More informationThe Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment
The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment Timothy Darr, Richard Mayer and Perakath Benjamin Knowledge-Based Systems, Inc. 1408 University Drive East College
More informationOperational Activity Decomposition (OV-5, Node Tree)
Operational Activity Decomposition (OV-5, Node Tree) The Biological Sensor Fusion (BSF) node tree diagram organizes the Operational Activities in a hierarchical structure from highest to lowest in a single
More informationIBM i2 Enterprise Insight Analysis
IBM i2 Enterprise Insight Analysis Accelerate the data-to-decision process by rapidly transforming overwhelming data into actionable insight Highlights Uncover hidden connections and insights across massive
More informationOperational Application of Targeted Data Analysis. Eric Chasin, NTELX Agenda. What we do?
Operational Application of Targeted Analysis Eric Chasin, NTELX echasin@ntelx.com Agenda Who is NTELX? Applying Intelligence Multi Source and Multi Indicator Knowledge Based Decision Making to Medicaid/Medicare
More informationDownloaded From: on 10/26/2016 Terms of Use:
Populations in non-democratic states will increasingly employ social media tools in pursuit of democratic agendas. However, these governments are and will continue to develop more nuanced, insidious and
More informationAgile Services: A Reference Architecture for Creating Dynamic Processes
Agile Services: A Reference Architecture for Creating Dynamic Processes Yiwei Gong Ph.D. student Marijn Janssen Daily supervisor Delft University of Technology, the Netherlands 1 Outline Research background
More informationCrown copyright yyyy. Published with the permission of the Defence Science and Technology Laboratory on behalf of the Controller of HMSO.
Analysis for the Future of Afghanistan: The Human Terrain of Counterinsurgency Operations: Analysis of the Socio-Cultural Environment Amy de Vries Social & Behavioural Science Team, Dstl Afghan Counterinsurgency
More informationAn Empirical Assessment of Domestic Radicalization *
An Empirical Assessment of Domestic Radicalization * Michael Jensen, Ph.D. Health Approaches in Community-Level Strategies to Countering Violent Extremism and Radicalization Workshop, National Academies
More informationLESSON PLAN: THE DARK SIDE OF OPEN SOURCE
LESSON PLAN: THE DARK SIDE OF OPEN SOURCE Slide #1: 1. Public domain & the "So what?" question Slide #2: The question of how much information to release in the public domain comes down to two things: asking
More informationModel Based System Engineering (MBSE) Applied to Program Oversight and Complex System of Systems Analysis
Model Based System Engineering (MBSE) Applied to Program Oversight and Complex System of Systems Analysis 10-30-2014 Agenda Introduction MBSE, UML & SysML mature approach with broad base of practitioners
More informationIQMEN - BUSINESS INTELLIGENCE
IQmen Business Intelligence DATA, SPEED, INTELLIGENCE: TURNING DATA INTO KNOWLEDGE IQMEN - BUSINESS INTELLIGENCE CORPORATE PRESENTATION 2004-2016 IQMen - Business Intelligence, JSC CONTENTS ABOUT COMPANY
More informationIQMEN - BUSINESS INTELLIGENCE
IQmen Business Intelligence DATA, SPEED, INTELLIGENCE: TURNING DATA INTO KNOWLEDGE IQMEN - BUSINESS INTELLIGENCE CORPORATE PRESENTATION 2004-2018 IQMen - Business Intelligence, JSC CONTENTS ABOUT COMPANY
More informationSISA Policy Brief no An Assessment of the US Drone Campaign in Pakistan and its Repercussions
SISA Policy Brief no. 1-2013 An Assessment of the US Drone Campaign in Pakistan and its Repercussions Qandeel Siddique 8 April 2013 An Assessment of the US Drone Campaign in Pakistan and its Repercussions
More informationThe SWRLing Future of OWL. Mark Greaves DARPA / IXO
The SWRLing Future of OWL Mark Greaves DARPA / IXO In the Beginning DARPA Agent Mark Up Language (DAML) PE/Project Number: 62301E/ST-11 PAD ID NUMBER: 010033 PGM NUMBER: XAM8E DIRO APPROVAL: PGM MANAGER:
More informationBusiness Intelligence. Slides by: Shree Jaswal
Business Intelligence Slides by: Shree Jaswal Topics What is BI? Effective and timely decisions; Data, information and knowledge; The role of mathematical models; Business intelligence architectures; Enabling
More informationAn intelligence-engineering framework for Defence Engagement Considerations
An intelligence-engineering framework for Defence Engagement Considerations Adam D.M. Svendsen, PhD Intelligence & Defence Strategist, Researcher, Educator and Consultant adam@asgonline.co.uk / twitter:
More informationRole of Data Mining in E-Governance. Abstract
Role of Data Mining in E-Governance Dr. Rupesh Mittal* Dr. Saurabh Parikh** Pushpendra Chourey*** *Assistant Professor, PMB Gujarati Commerce College, Indore **Acting Principal, SJHS Gujarati Innovative
More informationMESMER Counter Drone Solution
MESMER Counter Drone Solution May 2017 Exclusive Distributor for Latin America Introduction Department 13 is rapidly growing technology company focused on transformative communications and networking technology.
More informationActivity Based Intelligence (ABI) A Perilous Journey to Intelligence Integration. Presented by: Ken Mitchell / Kyle Talbot
Activity Based Intelligence (ABI) A Perilous Journey to Intelligence Integration Presented by: Ken Mitchell / Kyle Talbot Activity Based Intelligence A Perilous Journey to Intelligence Integration Leverage
More informationShort report on standards development and ongoing projects
Short report on standards development and ongoing projects PCA Member Meeting Houston, 20 February 2009 Nils Sandsmark Contents ISO 15926 Scope, Status and Plans Integrated Operations in the High North
More informationWeb Objects Based Energy Efficiency for Smart Home IoT Service Provisioning
Web Objects Based Energy Efficiency for Smart Home IoT Service Provisioning Muhammad Golam Kibria *, Muhammad Aslam Jarwar, Sajjad Ali, Sunil Kumar and Ilyoung Chong Department of CICE, Hankuk University
More informationToward Collaboration: Government Analytic Architecture Survey
Toward Collaboration: Government Analytic Architecture Survey November 2016 Dr. Ransom Winder, MITRE Mr. Joseph Jubinski, MITRE Dr. Angela O Hanlon, MITRE The views, opinions and/or findings contained
More informationUsing Decision Analysis to Select Strategic Partners. Hal Wilson Department of Defense
Using Decision Analysis to Select Strategic Partners Hal Wilson Department of Defense Problem Background An element of the Department Of Defense (DoD) desires to team with other organizations to help fulfill
More informationUNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Human Social Culture Behavior (HSCB) Modeling Applied Research
Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 COST ($ in Millions) FY 2010 FY 2011 Base Behavior (HSCB) OCO Total FY 2013 FY 2014 FY 2015 FY 2016
More informationPL : Securing our Agriculture and Food Act
PL 115-43: Securing our Agriculture and Food Act John P. Sanders, Jr., DVM DACVPM Office of Health Affairs Department of Homeland Security October 15, 2017 Securing our Agriculture and Food Act The law
More informationDecision Support for Robotic and Autonomous Systems
Decision Support for Robotic and Autonomous Systems 1. Introduction The rapid advancement of artificial intelligence, due to great expenditures by commercial firms and military research, brings promise
More informationBAE SYSTEMS North America Innovating for a Safer World 2003 Interoperability & Systems Integration Conference Industry Views
BAE SYSTEMS North America Innovating for a Safer World 2003 Interoperability & Systems Integration Conference Industry Views Bob Stow North America Group VP Engineering, Technology, & Program Management
More informationEmpowering Customer Analytics, Fraud Detection, and Threat Assessment. Whitepaper
Empowering Customer Analytics, Fraud Detection, and Threat Assessment Whitepaper EMPOWERING CUSTOMER ANALYTICS, FRAUD DETECTION, AND THREAT ASSESSMENT October 2015 novetta.com 2015, Novetta Most organizations
More informationTaxonomic and Faceted Classification for Intelligent Tagging and Discovery in Net-Centric Command and Control
Taxonomic and Faceted Classification for Intelligent Tagging and Discovery in Net-Centric Command and Control Dale E. Lichtblau, Andrew W. Trice, Steven P. Wartik Institute for Defense Analyses CCRTS 2006
More informationThe Missions & Means Framework (MMF) Ontology: Matching Military Assets to Mission Objectives
The Missions & Means Framework (MMF) Ontology: Matching Military Assets to Mission Objectives Paul H. Deitz *a, James R. Michaelis %b, Britt E. Bray #c, and Michael A. Kolodny $b, a U.S. Army Materiel
More informationSOLUTION MOTION VIDEO EXPLOITATION
SOLUTION MOTION VIDEO EXPLOITATION SITUATIONAL AWARENESS IN A DYNAMIC ENVIRONMENT Conditions on the ground can change in an instant, and national security depends on up-to-the minute situational awareness.
More informationSubsumption and Cognitive Workflow Copyright 2007 by Gavan Lintern Introduction Subsumption is a hierarchical structure in which activities at a
Subsumption and Cognitive Workflow Copyright 2007 by Gavan Lintern Introduction Subsumption is a hierarchical structure in which activities at a subordinate level are subsumed under a super-ordinate activity.
More informationArchitecture Considerations of Time Sensitive Targeting and NATO TST Tool
Architecture Considerations of Time Sensitive Targeting and NATO TST Tool Orhan Cetinkaya, PhD Yakup Yildirim, PhD NCI Agency, 19-21 June 2013 NATO UNCLASSIFIED 1 Outline Joint Targeting Time Sensitive
More informationTest & Evaluation/Science & Technology Program
Test & Evaluation/Science & Technology Program C4I & Software Intensive Systems Test (C4T) Test Technology Area (TTA) Big Data Analytic Technology Needs for T&E May 11, 2017 Approved for public release:
More informationPOSITION DESCRIPTION
POSITION DESCRIPTION Title: Program Analyst II Rate: GS 13-2 to 13-3 Exempt Equivalency (2018 schedule) Location: SA-4F, Potomac Annex, 2300 E Street, NW, Washington DC 20522 Schedule: Full time, M-F,
More informationMODULE - 9 LECTURE NOTES 4 DECISION SUPPORT SYSTEMS
1 MODULE - 9 LECTURE NOTES 4 DECISION SUPPORT SYSTEMS INTRODUCTION DSS is an interactive computer-based system to help decision makers use communications technologies, data, documents, knowledge and/or
More informationPersistent Surveillance Support to Targeting
Persistent Surveillance Support to Targeting Precision Strike Association Technology Symposium 28-30 Oct Adam Timm JPSIO 28 Oct 08 Adam.M.Timm.ctr@nga.mil Adam.M.Timm@nga.ic.gov JPISO-All@nga.ic.gov Derived
More informationTechnosocial Modeling of IED Threat Scenarios and Attack
Technosocial Modeling of IED Threat Scenarios and Attack Paul Whitney, Alan Brothers, Garill Coles, Jonathan Young, Katherine Wolf, Sandy Thompson, David Niesen, John Madsen, Cindy Henderson Pacific Northwest
More informationArcGIS for the Military Land Operations
2013 Esri International User Conference July 8 12, 2013 San Diego, California Technical Workshop ArcGIS for the Military Land Simon Warwick, Scott Cecilio Esri UC2013. Technical Workshop. GIS Is About
More informationAdvertisement. UN JPO Programme 1 JPO in Counter-Terrorism. United Nations Secretariat, Counter-Terrorism Committee Executive Directorate (CTED)
Advertisement UN JPO Programme 1 JPO in Counter-Terrorism United Nations Secretariat, Counter-Terrorism Committee Executive Directorate (CTED) Vacancy Announcement INT-011-15-P064 I General information
More informationTeaching an intelligence-based framework for risk
Teaching an intelligence-based framework for risk Adam D.M. Svendsen, PhD Intelligence & Defence Strategist, Researcher, Educator and Consultant adam@asgonline.co.uk / twitter: @intstrategist Introduction
More informationIntroduction to the Joint Integrated Analysis Tool 2009 SEER Best Practices Seminar October 8, 2009
Introduction to the Joint Integrated Analysis Tool 2009 SEER Best Practices Seminar October 8, 2009 Approved for Public Release 1 JIAT Overview (Daniel Schwartz, ODASA-CE) JIAT Applications (Darren Elliott,
More information15th ICCRTS The Evolution of C2. Course of Action Ontology for Counterinsurgency Operations. Primary Topic: Topic 8 C2 Assessment Metrics and Tools
1 15th ICCRTS The Evolution of C2 Course of Action Ontology for Counterinsurgency Operations Primary Topic: Topic 8 C2 Assessment Metrics and Tools Secondary Topic: Topic 3 Information Sharing and Collaboration
More informationA Visualization and Decision-Support Tool for Homeland Security Risk Prioritization
Research Synopsis A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Modeling Area: Risk Assessment Case Studies Supported: Risk-Based Resource Allocation Principal Investigator:
More informationArcGIS Workflow Manager: Effectively Managing Workflows within the ArcGIS Enterprise
ArcGIS Workflow Manager: Effectively Managing Workflows within the ArcGIS Enterprise Elizabeth Wilcox and Bryan Piersol Guest Presenter: Ronnie Buzzard, United States Army Geospatial Center Our plan today
More informationAnnual Big Data for Intelligence Symposium
Defense Strategies Institute professional educational forum: 4th Annual Big Data for Intelligence Symposium ~Leveraging the Big Data Opportunity~ November 29-30, 2016: AUSA Conference and Event Center
More informationDstl Wargaming Support to the Army
Dstl Wargaming Support to the Army Tony Hopkin Deputy Account Manager Land Defence Science & Technology Laboratory MOD s science and technology experts 3700 staff (including ~100 military & ~500 analysts)
More informationA Quantitative Model Driven Comparison of Command Approaches in an Adversarial Process Model
A Quantitative Model Driven Comparison of Command Approaches in an Adversarial Process Model 12TH ICCRTS Adapting C2 to the 21st Century Authors: Robert Regal, Rebecca Reed, Matt Largent PhD Organization:
More informationHuman Rights Council (HRC)
Human Rights Council (HRC) Use of Unmanned Air Vehicles Unmanned Aerial Vehicles (UAVs), also known as remotely piloted aircraft or drones are small aircraft that fly by remote control or autonomously.
More informationResearch Centre. Post title. Level on Framework Level 3. Post duration. Research Career Framework. Background & Role
Research Centre Post title ADAPT Centre for Digital Content Technology at DCU (Affiliate Project) Research Fellow in Industrial Applications of Knowledge Engineering Level on Framework Level 3 Post duration
More informationDestabilizing Terrorist Networks Kathleen M. Carley Jeffrey Reminga Natasha Kamneva. Carnegie Mellon University
Contact: Prof. Kathleen M. Carley Institute for Software Research International Carnegie Mellon University Pittsburgh, PA 15213 Tel: 1-412-268-6016 Fax: 1-412-268-1744 Email: kathleen.carley@cmu.edu Area:
More informationIntelligent Systems. For more information on partnering with the Kansas City Plant, contact:
Intelligent Systems For more information on partnering with the Kansas City Plant, contact: Office of Business Development 1.800.225.8829 customer_inquiry@kcp.com Machine Intelligence Machine intelligence
More informationSystems and Technologies for Enhanced Coastal Maritime Security
Systems and Technologies for Enhanced Coastal Maritime Security Edward M. Carapezza a* and Ann Bucklin a a University of Connecticut-Avery Point, Groton, CT, USA ABSTRACT This paper describes a design
More informationGovernment Extra Study Practice
Government Extra Study Practice Name: Period: What is Government? Government 1. I can explain the purpose of government 2. I can identify each of the following for dictatorship, monarchy, constitutional
More informationAN INTRODUCTION TO USING PROSIM FOR BUSINESS PROCESS SIMULATION AND ANALYSIS. Perakath C. Benjamin Dursun Delen Madhav Erraguntla
Proceedings of the 1998 Winter Simulation Conference D.J. Medeiros, E.F. Watson, J.S. Carson and M.S. Manivannan, eds. AN INTRODUCTION TO USING PROSIM FOR BUSINESS PROCESS SIMULATION AND ANALYSIS Perakath
More informationSystems Engineering, Knowledge Management, Artificial Intelligence, the Semantic Web and Operations Research
Systems Engineering, Knowledge Management, Artificial Intelligence, the Semantic Web and Operations Research Rod Staker Systems-of-Systems Group Joint Systems Branch Defence Systems Analysis Division Report
More informationReal Applications of Big Data. Challenges and Opportunities
Real Applications of Big Data. Challenges and Opportunities David Gil University of Alicante Polytechnic School - EPSA Department of Computer Technology Introduction to Big Data Projects Benchmarking (weka,
More informationMan-Machine Teaming in Autonomous Technologies and Systems
AUTOMOTIVE INFOCOM TRANSPORT, ENVIRONMENT & POWER ENGINEERING AERONAUTICS SPACE DEFENCE & SECURITY in Autonomous Technologies and Systems Analysis and predication of impact and challenges Prof. Dr. Harald
More informationPellucid Agent Architecture for Administration Based Processes
Pellucid Agent Architecture for Administration Based Processes M. Laclavik, Z. Balogh, L. Hluchy, G. T. Nguyen, I. Budinska, T. T. Dang Institute of Informatics, SAS, Dubravska cesta 9, Bratislava 84237,
More informationDepartment of Hematology and Blood Transfusion The Blood Supply in Disaster Medicine
Department of Hematology and Blood Transfusion The Blood Supply in Disaster Medicine Col.Milos Bohonek, M.D., Ph.D. Introduction Blood substitution and blood supply is a constant strategic and logistic
More informationNAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DATA INTEGRATION TO EXPLORE THE DYNAMICS OF CONFLICT: A PRELIMINARY STUDY by Eric Hartunian and Wade A. Germann December 2008 Thesis Advisor: Second
More informationUnderstanding and combatting terrorist networks: Coupling social media mining with social network analysis
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2016 Understanding and combatting terrorist networks: Coupling social
More informationInformation Fusion Technology Requirements for the National System for Geospatial Intelligence (NSGI) Enterprise
Information Fusion Technology Requirements for the National System for Geospatial Intelligence (NSGI) Enterprise Phillip Q. Hwang Chief Scientist Pre-Acquisition Directorate National Imagery and Mapping
More informationJune Mark Fiebrandt JTEM Operations Research Analyst
June 2010 Mark Fiebrandt JTEM Operations Research Analyst mark.fiebrandt.ctr@jte.osd.mil 757.638.6055 Abstract This tutorial provides background, overview, and status of efforts to produce an overarching
More informationPSAA - PUBLIC SERVICE & ADMIN
PSAA - Public Service & Admin 1 PSAA - PUBLIC SERVICE & ADMIN PSAA 601 Foundations of Public Service Different perspectives on management and leadership in public service; provides overview of how public
More informationTHE COLD WAR
THE COLD WAR 1945-1990 The Cold War Declared Cold War a state of increased tension and hostility without armed conflict End of WWII saw this sate occurring between the two new superpowers the US and USSR
More informationBRINGING AI TO ALL DEVELOPERS
BRINGING AI TO ALL DEVELOPERS Exploring Deep Learning AI Services in the Cloud Tara E. Walker Principal Software Engineer Microsoft @taraw #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM AGENDA WHAT DOES AI MEAN
More informationKES 2011 Keynote Growing Together Growing Together: Opening the Way for Comprehensive Public-Private Knowledge Management
Growing Together: Opening the Way for Comprehensive Public-Private Knowledge Management KES 2011 15th Annual Conference on Knowledge-Based and Intelligent Information & Engineering Systems Ansgar Bernardi
More informationRESTREINT UE/EU RESTRICTED
Council of the European Union Brussels, 19 September 2017 (OR. en) 12347/17 RESTREINT UE/EU RESTRICTED CT 90 ENFOPOL 416 COTER 91 JAI 803 COSI 204 CIVCOM 173 COPS 287 NOTE From: EU Counter-Terrorism Coordinator
More informationU.S. Army PEO STRI Cost Management Implementation
U.S. Army PEO STRI Cost Management Implementation Anthony A DeMarco PRICE Systems, LLC 2013 PRICE Systems, LLC All Rights Reserved Decades of Cost Management Excellence 1 Outline Who - PEO STRI Overview
More informationEvaluating Enterprise Architectures through Executable Models
www.thalesgroup.com Evaluating Enterprise Architectures through Executable Models 15th ICCRTS Evolution of C2: Where Have We Been? Where Are We Going? June 22-24 Santa Monica, CA N. Farcet & M. Ludwig
More informationUnveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes. José González Cabañas Ángel Cuevas Rubén Cuevas
Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes José González Cabañas Ángel Cuevas Rubén Cuevas Motivation How many people in Europe were assigned with
More informationChapter 12 TECHNICAL EVALUATION REPORT
Chapter 12 Mr. William Fraser Human Factors Engineering Group Human Systems Integration Section Defence Research and Development Canada Toronto P.O. Box 2000, 1133 Sheppard Ave. West Toronto, Ontario M3M
More informationTask Force on the Role of Autonomy in the DoD Systems
Task Force on the Role of Autonomy in the DoD Systems Dr. Robin Murphy, Co-Chair Mr. James Shields, Co-Chair June 2012 Terms of Reference Review relevant technologies to evaluate readiness for introduction
More informationScoping Framework: Scoping Projects for Easier Cost Estimating
Scoping Framework: Scoping Projects for Easier Cost Estimating Darrin DeReus, Ph.D. Air Force Cost Support Project Manager Senior Cost Analyst 25 July 2014 Purpose Show a current project Discuss the current
More informationChina John Lee Florida State University Department of Political Science Spring 2011
China 1905-1930 John Lee Florida State University Department of Political Science Spring 2011 Sun Yat-Sen Revolutionary leader. Received western education in Honolulu and Hong Kong (medical degree). 1895:
More informationForecasting Terrorism: Indicators and Proven Analytic Techniques
Forecasting Terrorism: Indicators and Proven Analytic Techniques Captain Sundri K. Khalsa USAF PO BOX 5124 Alameda, California, 94501, United States SundriKK@hotmail.com Keywords: Terrorism, Predictive
More informationCONCEPT DRIFT IN ONTOLOGY MAPPING AND SEMANTIC ANNOTATION ADAPTATION
CONCEPT DRIFT IN ONTOLOGY MAPPING AND SEMANTIC ANNOTATION ADAPTATION Cédric PRUSKI Dri%- a- LOD@EKAW 2016, November 20 th, Bologna, Italy 1 MOTIVATION K S? K T? Outdated mappings and annotations may trigger
More informationBuilding A Holistic and Risk-Based Insider Threat Program
Building A Holistic and Risk-Based Insider Threat Program An Approach to Preventing, Detecting and Responding to Insider Threats Michael G. Gelles, Psy.D March 2015 Insider Threat Types & Drivers Insider
More informationWhat s new in MATLAB and Simulink
What s new in MATLAB and Simulink Mandar Gujrathi Mandar.Gujrathi@mathworks.com.au 2015 The MathWorks, Inc. 1 Platform Productivity Workflow Depth Application Breadth Getting your work done faster Support
More informationWKU-MIS-B11 Management Decision Support and Intelligent Systems. Management Information Systems
Management Information Systems Management Information Systems B11. Management Decision Support and Intelligent Systems Code: 166137-01+02 Course: Management Information Systems Period: Spring 2013 Professor:
More informationNCES. Net-Centric Enterprise Services. Power to the Edge 1. The Open Group Conference October 20, 2003 NII/CIO. A Net-Centric DoD
The Open Group Conference October 20, 2003 NCES Net-Centric Enterprise Services Mike Krieger Director, Information Management DASD(DCIO), OASD(NII) michael.krieger@osd.mil 1 ELIMINATE BANDWIDTH DEPLOY
More informationDIGITIZATION STRATEGIES
DIGITIZATION STRATEGIES Digitization Strategies for Engineering & Construction in the era of Industry 4.0 Rice Global E&C Forum Roundtable Innovation center, Washington, D.C. JUNE 2017 AGENDA THE FOURTH
More informationOntosCAI Competitive Affairs/Intelligence Analyze, Monitor, Understand your Competitive Environment
NOW YOU KNOW [ SERIES] OntosCAI Competitive Affairs/Intelligence Analyze, Monitor, Understand your Competitive Environment [DANIEL HLADKY, ONTOS INTERNATIONAL AG] Competition has always been central to
More informationOntology and Rule Based Knowledge Representation for Situation Management and Decision Support
Ontology and Rule Based Knowledge Representation for Situation Management and Decision Support Neelakantan Kartha, Aaron Novstrup 1 Stottler-Henke Associates Inc, 1107 NE 45 th Street, Suite 310, Seattle,
More informationModeling Terrorist Beliefs and Motivations
CREATE Research Archive Research Project Summaries 2012 Modeling Terrorist Beliefs and Motivations Heather Rosoff University of Southern California, rosoff@usc.edu Richard John University of Southern California,
More informationScience & Technology Directorate
Science & Technology Directorate Unified Incident Command Decision Support (UICDS) Overview Michael B. Smith Science and Technology Directorate U.S. Department of Homeland Security Sept 12, 2006 1 1 1
More informationINTELLIGENCE & CYBER SECURITY WEBINT MODULAR SOLUTIONS
INTELLIGENCE & CYBER SECURITY WEBINT MODULAR SOLUTIONS COLLECTION AND ANALYSIS OF OSINT SOURCES 3 INTRODUCTION Innovative security and Cyber intelligence solutions to meet a wide range of operational needs
More informationAMASS. Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems
Architecture-driven, Multi-concern and Seamless Assurance and Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems Architecture-Driven Assurance First EAB
More informationDevelopment, Validation and Implementation Considerations of a Decision Support System for Unmanned & Autonomous System of Systems Test & Evaluation
Development, Validation and Implementation Considerations of a Decision Support System for Unmanned & Autonomous System of Systems Test & Evaluation Test Week 2010 Kris Cowart, Maj, USAF Ricardo Valerdi,
More informationDestabilizing Terrorist Networks Kathleen M. Carley Jeffrey Reminga Natasha Kamneva. Carnegie Mellon University
Contact: Prof. Kathleen M. Carley Institute for Software Research International Carnegie Mellon University Pittsburgh, PA 15213 Tel: 1-412-268-6016 Fax: 1-412-268-1744 Email: kathleen.carley@cmu.edu Modeling
More informationCourse of Action Ontology for Counterinsurgency Operations
Course of Action Ontology for Counterinsurgency Operations Timothy Darr, Perakath Benjamin, Richard Mayer Knowledge Based Systems, Inc. 15 th International Command and Control Research and Technology Symposium
More information--- EXPORT CONTROL FOR 128T. Abstract. This document captures export control restrictions for 128T platform
--- EXPORT CONTROL FOR 128T Abstract This document captures export control restrictions for 128T platform 16 May 2018 CONTENTS Revision History... 1 Introduction... 2 embargoed countries... 2 Export classification
More informationWeeks 6 & 7: Cybernetics: the Science of Control & Management
Weeks 6 & 7: Cybernetics: the Science of Control & Management Sufficiently complex, dynamic systems can use information and knowledge to maintain stability in spite of a volatile environment Things can
More informationDepartment of National Defence Research Initiative Competition
Department of National Defence Research Initiative 2018-2019 Competition SEPTEMBER 2018 Presentation Outline Objectives, Value & Duration Insight & Insight Development Grants Adjudication & Relevance Review
More informationConfronting Irregular Challenges in the 21 st Century
Confronting Irregular Challenges in the 21 st Century Irregular Warfare Concept Series: Whole of World (WoW) Collaboration March 10, 2009 www.hyperscholar.com By: Brig. Gen. David L. Grange (USA, ret.),
More information73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation 712CD For office use only 41205 21-23 June 2005, at US Military Academy, West Point, NY Please complete this form 712CD as your cover
More informationKnowledge mechanisms in IEEE 1471 & ISO/IEC Rich Hilliard
Knowledge mechanisms in IEEE 1471 & ISO/IEC 42010 Rich Hilliard r.hilliard@computer.org Two Themes Knowledge mechanisms in IEEE 1471 and ISO/IEC 42010 2000 edition and on-going revision Toward a (bigger)
More informationDynamic Data and Modeling Services Suite
Dynamic Data and Modeling Services Suite Tina H. Chau Alexander P. Moore Richard L. Mullikin Janet E. Wedgwood Lockheed Martin Corporation 720 Vandenberg Drive King of Prussia, PA 19406 571-313-6605, 610-354-7590,
More information