UNCLASSIFIED. Comprehensive Ontology for Military Operations. J. Wesley Regian, Ph.D. CTC Principal Investigator

Size: px
Start display at page:

Download "UNCLASSIFIED. Comprehensive Ontology for Military Operations. J. Wesley Regian, Ph.D. CTC Principal Investigator"

Transcription

1 Comprehensive Ontology for Military Operations J. Wesley Regian, Ph.D. CTC Principal Investigator

2 - Approved for Public Release, Distribution Unlimited Comprehensive Ontology for Military Ops MUSE COMO General Architecture Joint C3 Information Exchange Data Model Army Universal Task List Non Kinetic Ops Entities and Events Human Terrain Entities and Events Asymmetric Ops Entities and Events Counter Insurgency Entities and Events Entity Base Event Base Comprehensive OWL Military Ontology RDF Description RDF Description RDF Description RDF Description RDF Description The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. Black Hawk Down Fallujah Uprising Search for Saddam Financier Meets Bomb Maker London Bombings

3 COMO Scenario/Story (Event Sequence) Modeling for Reasoning about Tasks Past, Progressing, or Planned

4 COMO Modeling of Human Terrain Organizations and Networks Human Network AK Network ID Network Goal AK Goal ID Name Method Network Agenda AK Agenda ID Name Goal Method * Name Type AoO Agenda Goal Method Member Ally Rival Network Member AK Member ID ** Name Role AoO Skill Goal Method Ally Rival Network Task AK Task ID Name Task * Network Type could be political, social, tribal, familial, business, religious, or other (analyst defined) * * Member roles can range from setting the agenda, establishing methods, planning tasks, to performing tasks

5 COMO Abstraction Hierarchy for Network Agenda, Goals, Methods, and Tasks ABSTRACT Network Concept (ex. Islamic Fundamental ist Network) Ideological Agenda overarching objectives driven by ideological stance (Ex. Universal Sharia Law, supplant other religions, etc ) Strategic Goals strategies to achieve ideological agenda (Ex. influence public opinion, no foreign military, etc.) Tactical Methods methods to achieve strategic goals (Ex. terror, propaganda, etc ) CONCRETE Network Instance (ex. Al Qaeda) Strategic Goals strategies to achieve ideological agenda (Ex. influence public opinion, no foreign military, etc ) Tactical Methods methods to achieve strategic goals (Ex. large scale terror attacks, occasional propaganda, etc ) Tactical Tasks plans or parts of plans for tactical event sequences planned (event sequences that are or may be planned in the future) progressing (event sequences that are or may be unfolding in the present) past (Ex. 9/11 Jetliner attacks)

6 Formal Modeling of Agenda, Goals, Methods, and Tasks: Changes of State Water: Liquid Water: Frozen Process Water Water: Liquid Water: Frozen State-of State-Transition

7 Formal Modeling of Agenda, Goals, Methods, and Tasks: Changes of State Govt: Secular Govt: Theocratic Task Govt Govt: Secular Govt: Theocratic State-of State-Transition

8 Formal Modeling of Agenda, Goals, Methods, and Tasks: Changes of State Level of Abstraction Entity State Change Agenda Nation/Region (Foreign Military Present Not Present) (Constitutional Law Sharia Law) Goals Government (Secular Rule Theocratic Rule) (Authoritarian Rule Democratic Rule) Methods Population (Orderly Chaotic) (Complacent Terrorized) Group (Friendly Hostile) (Hostile Friendly) Tasks Individual (Alive Dead) (At Large Captured) (Unknown Location Known Location) (Unknown Allegiance Known Allegiance)

9 Approved for Public Release, Distribution Unlimited Multi-Source (MUSE) Intelligence Integration J. Wesley Regian, Ph.D. CTC Principal Investigator MUSE is a component of the Collaborative Analytic Fusion Environment (CAFÉ) CAFÉ Program & Contractors Managed by USASMDC/ARSTRAT Concurrent Technologies Corporation MUSE Ontology, Reasoning & Decision Support Potomac Fusion Inc. Fusion Exploitation Framework & DCGS A Semandex Inc. Semantic Search & Information Fusion The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.

10 Approved for Public Release, Distribution Unlimited CAFE: Collaborative Analytic Fusion Environment Capitalizes on Multi-Source Intelligence Integration (MUSE) for analogical, hierarchical, and abstract reasoning about nefarious networks Comprehensive Military Ontology (COMO) for machine understanding of entities and activities Artificial Intelligence (AI) machine reasoning to develop machine situation awareness Social Network Analysis (SNA) to model and understand human domain Fusion Exploitation Framework (FEF) for bringing in real-time sensor data Semantic search (Tango) for reducing set of input source material The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.

11 - Approved for Public Release, Distribution Unlimited - The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.

12 - Approved for Public Release, Distribution Unlimited - The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.

13 - Approved for Public Release, Distribution Unlimited - The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.

14 COMO: Prototype Applications COMO has been applied to MUSE (Multi-Source Intelligence Integration) Analysis of nefarious human network activities in counter-terrorist and counter-insurgency operations MARS (Military Analogical Reasoning System) Machine reasoning to automatically derive lessons learned from past military operations and apply those lessons to current operations PLUTO (Planning for Urban Terrain Operations) Route planning for military operations in urban terrain US Army Apache AH64D CBM Condition based maintenance of attack helicopters

The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment

The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment Timothy Darr, Richard Mayer and Perakath Benjamin Knowledge-Based Systems, Inc. 1408 University Drive East College

More information

The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment

The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment The Application of a Course-of-Action Ontology to Support OPFOR COA Selection and Assessment Timothy Darr, Richard Mayer and Perakath Benjamin Knowledge-Based Systems, Inc. 1408 University Drive East College

More information

Operational Activity Decomposition (OV-5, Node Tree)

Operational Activity Decomposition (OV-5, Node Tree) Operational Activity Decomposition (OV-5, Node Tree) The Biological Sensor Fusion (BSF) node tree diagram organizes the Operational Activities in a hierarchical structure from highest to lowest in a single

More information

IBM i2 Enterprise Insight Analysis

IBM i2 Enterprise Insight Analysis IBM i2 Enterprise Insight Analysis Accelerate the data-to-decision process by rapidly transforming overwhelming data into actionable insight Highlights Uncover hidden connections and insights across massive

More information

Operational Application of Targeted Data Analysis. Eric Chasin, NTELX Agenda. What we do?

Operational Application of Targeted Data Analysis. Eric Chasin, NTELX Agenda. What we do? Operational Application of Targeted Analysis Eric Chasin, NTELX echasin@ntelx.com Agenda Who is NTELX? Applying Intelligence Multi Source and Multi Indicator Knowledge Based Decision Making to Medicaid/Medicare

More information

Downloaded From: on 10/26/2016 Terms of Use:

Downloaded From:  on 10/26/2016 Terms of Use: Populations in non-democratic states will increasingly employ social media tools in pursuit of democratic agendas. However, these governments are and will continue to develop more nuanced, insidious and

More information

Agile Services: A Reference Architecture for Creating Dynamic Processes

Agile Services: A Reference Architecture for Creating Dynamic Processes Agile Services: A Reference Architecture for Creating Dynamic Processes Yiwei Gong Ph.D. student Marijn Janssen Daily supervisor Delft University of Technology, the Netherlands 1 Outline Research background

More information

Crown copyright yyyy. Published with the permission of the Defence Science and Technology Laboratory on behalf of the Controller of HMSO.

Crown copyright yyyy. Published with the permission of the Defence Science and Technology Laboratory on behalf of the Controller of HMSO. Analysis for the Future of Afghanistan: The Human Terrain of Counterinsurgency Operations: Analysis of the Socio-Cultural Environment Amy de Vries Social & Behavioural Science Team, Dstl Afghan Counterinsurgency

More information

An Empirical Assessment of Domestic Radicalization *

An Empirical Assessment of Domestic Radicalization * An Empirical Assessment of Domestic Radicalization * Michael Jensen, Ph.D. Health Approaches in Community-Level Strategies to Countering Violent Extremism and Radicalization Workshop, National Academies

More information

LESSON PLAN: THE DARK SIDE OF OPEN SOURCE

LESSON PLAN: THE DARK SIDE OF OPEN SOURCE LESSON PLAN: THE DARK SIDE OF OPEN SOURCE Slide #1: 1. Public domain & the "So what?" question Slide #2: The question of how much information to release in the public domain comes down to two things: asking

More information

Model Based System Engineering (MBSE) Applied to Program Oversight and Complex System of Systems Analysis

Model Based System Engineering (MBSE) Applied to Program Oversight and Complex System of Systems Analysis Model Based System Engineering (MBSE) Applied to Program Oversight and Complex System of Systems Analysis 10-30-2014 Agenda Introduction MBSE, UML & SysML mature approach with broad base of practitioners

More information

IQMEN - BUSINESS INTELLIGENCE

IQMEN - BUSINESS INTELLIGENCE IQmen Business Intelligence DATA, SPEED, INTELLIGENCE: TURNING DATA INTO KNOWLEDGE IQMEN - BUSINESS INTELLIGENCE CORPORATE PRESENTATION 2004-2016 IQMen - Business Intelligence, JSC CONTENTS ABOUT COMPANY

More information

IQMEN - BUSINESS INTELLIGENCE

IQMEN - BUSINESS INTELLIGENCE IQmen Business Intelligence DATA, SPEED, INTELLIGENCE: TURNING DATA INTO KNOWLEDGE IQMEN - BUSINESS INTELLIGENCE CORPORATE PRESENTATION 2004-2018 IQMen - Business Intelligence, JSC CONTENTS ABOUT COMPANY

More information

SISA Policy Brief no An Assessment of the US Drone Campaign in Pakistan and its Repercussions

SISA Policy Brief no An Assessment of the US Drone Campaign in Pakistan and its Repercussions SISA Policy Brief no. 1-2013 An Assessment of the US Drone Campaign in Pakistan and its Repercussions Qandeel Siddique 8 April 2013 An Assessment of the US Drone Campaign in Pakistan and its Repercussions

More information

The SWRLing Future of OWL. Mark Greaves DARPA / IXO

The SWRLing Future of OWL. Mark Greaves DARPA / IXO The SWRLing Future of OWL Mark Greaves DARPA / IXO In the Beginning DARPA Agent Mark Up Language (DAML) PE/Project Number: 62301E/ST-11 PAD ID NUMBER: 010033 PGM NUMBER: XAM8E DIRO APPROVAL: PGM MANAGER:

More information

Business Intelligence. Slides by: Shree Jaswal

Business Intelligence. Slides by: Shree Jaswal Business Intelligence Slides by: Shree Jaswal Topics What is BI? Effective and timely decisions; Data, information and knowledge; The role of mathematical models; Business intelligence architectures; Enabling

More information

An intelligence-engineering framework for Defence Engagement Considerations

An intelligence-engineering framework for Defence Engagement Considerations An intelligence-engineering framework for Defence Engagement Considerations Adam D.M. Svendsen, PhD Intelligence & Defence Strategist, Researcher, Educator and Consultant adam@asgonline.co.uk / twitter:

More information

Role of Data Mining in E-Governance. Abstract

Role of Data Mining in E-Governance. Abstract Role of Data Mining in E-Governance Dr. Rupesh Mittal* Dr. Saurabh Parikh** Pushpendra Chourey*** *Assistant Professor, PMB Gujarati Commerce College, Indore **Acting Principal, SJHS Gujarati Innovative

More information

MESMER Counter Drone Solution

MESMER Counter Drone Solution MESMER Counter Drone Solution May 2017 Exclusive Distributor for Latin America Introduction Department 13 is rapidly growing technology company focused on transformative communications and networking technology.

More information

Activity Based Intelligence (ABI) A Perilous Journey to Intelligence Integration. Presented by: Ken Mitchell / Kyle Talbot

Activity Based Intelligence (ABI) A Perilous Journey to Intelligence Integration. Presented by: Ken Mitchell / Kyle Talbot Activity Based Intelligence (ABI) A Perilous Journey to Intelligence Integration Presented by: Ken Mitchell / Kyle Talbot Activity Based Intelligence A Perilous Journey to Intelligence Integration Leverage

More information

Short report on standards development and ongoing projects

Short report on standards development and ongoing projects Short report on standards development and ongoing projects PCA Member Meeting Houston, 20 February 2009 Nils Sandsmark Contents ISO 15926 Scope, Status and Plans Integrated Operations in the High North

More information

Web Objects Based Energy Efficiency for Smart Home IoT Service Provisioning

Web Objects Based Energy Efficiency for Smart Home IoT Service Provisioning Web Objects Based Energy Efficiency for Smart Home IoT Service Provisioning Muhammad Golam Kibria *, Muhammad Aslam Jarwar, Sajjad Ali, Sunil Kumar and Ilyoung Chong Department of CICE, Hankuk University

More information

Toward Collaboration: Government Analytic Architecture Survey

Toward Collaboration: Government Analytic Architecture Survey Toward Collaboration: Government Analytic Architecture Survey November 2016 Dr. Ransom Winder, MITRE Mr. Joseph Jubinski, MITRE Dr. Angela O Hanlon, MITRE The views, opinions and/or findings contained

More information

Using Decision Analysis to Select Strategic Partners. Hal Wilson Department of Defense

Using Decision Analysis to Select Strategic Partners. Hal Wilson Department of Defense Using Decision Analysis to Select Strategic Partners Hal Wilson Department of Defense Problem Background An element of the Department Of Defense (DoD) desires to team with other organizations to help fulfill

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Human Social Culture Behavior (HSCB) Modeling Applied Research

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Human Social Culture Behavior (HSCB) Modeling Applied Research Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 COST ($ in Millions) FY 2010 FY 2011 Base Behavior (HSCB) OCO Total FY 2013 FY 2014 FY 2015 FY 2016

More information

PL : Securing our Agriculture and Food Act

PL : Securing our Agriculture and Food Act PL 115-43: Securing our Agriculture and Food Act John P. Sanders, Jr., DVM DACVPM Office of Health Affairs Department of Homeland Security October 15, 2017 Securing our Agriculture and Food Act The law

More information

Decision Support for Robotic and Autonomous Systems

Decision Support for Robotic and Autonomous Systems Decision Support for Robotic and Autonomous Systems 1. Introduction The rapid advancement of artificial intelligence, due to great expenditures by commercial firms and military research, brings promise

More information

BAE SYSTEMS North America Innovating for a Safer World 2003 Interoperability & Systems Integration Conference Industry Views

BAE SYSTEMS North America Innovating for a Safer World 2003 Interoperability & Systems Integration Conference Industry Views BAE SYSTEMS North America Innovating for a Safer World 2003 Interoperability & Systems Integration Conference Industry Views Bob Stow North America Group VP Engineering, Technology, & Program Management

More information

Empowering Customer Analytics, Fraud Detection, and Threat Assessment. Whitepaper

Empowering Customer Analytics, Fraud Detection, and Threat Assessment. Whitepaper Empowering Customer Analytics, Fraud Detection, and Threat Assessment Whitepaper EMPOWERING CUSTOMER ANALYTICS, FRAUD DETECTION, AND THREAT ASSESSMENT October 2015 novetta.com 2015, Novetta Most organizations

More information

Taxonomic and Faceted Classification for Intelligent Tagging and Discovery in Net-Centric Command and Control

Taxonomic and Faceted Classification for Intelligent Tagging and Discovery in Net-Centric Command and Control Taxonomic and Faceted Classification for Intelligent Tagging and Discovery in Net-Centric Command and Control Dale E. Lichtblau, Andrew W. Trice, Steven P. Wartik Institute for Defense Analyses CCRTS 2006

More information

The Missions & Means Framework (MMF) Ontology: Matching Military Assets to Mission Objectives

The Missions & Means Framework (MMF) Ontology: Matching Military Assets to Mission Objectives The Missions & Means Framework (MMF) Ontology: Matching Military Assets to Mission Objectives Paul H. Deitz *a, James R. Michaelis %b, Britt E. Bray #c, and Michael A. Kolodny $b, a U.S. Army Materiel

More information

SOLUTION MOTION VIDEO EXPLOITATION

SOLUTION MOTION VIDEO EXPLOITATION SOLUTION MOTION VIDEO EXPLOITATION SITUATIONAL AWARENESS IN A DYNAMIC ENVIRONMENT Conditions on the ground can change in an instant, and national security depends on up-to-the minute situational awareness.

More information

Subsumption and Cognitive Workflow Copyright 2007 by Gavan Lintern Introduction Subsumption is a hierarchical structure in which activities at a

Subsumption and Cognitive Workflow Copyright 2007 by Gavan Lintern Introduction Subsumption is a hierarchical structure in which activities at a Subsumption and Cognitive Workflow Copyright 2007 by Gavan Lintern Introduction Subsumption is a hierarchical structure in which activities at a subordinate level are subsumed under a super-ordinate activity.

More information

Architecture Considerations of Time Sensitive Targeting and NATO TST Tool

Architecture Considerations of Time Sensitive Targeting and NATO TST Tool Architecture Considerations of Time Sensitive Targeting and NATO TST Tool Orhan Cetinkaya, PhD Yakup Yildirim, PhD NCI Agency, 19-21 June 2013 NATO UNCLASSIFIED 1 Outline Joint Targeting Time Sensitive

More information

Test & Evaluation/Science & Technology Program

Test & Evaluation/Science & Technology Program Test & Evaluation/Science & Technology Program C4I & Software Intensive Systems Test (C4T) Test Technology Area (TTA) Big Data Analytic Technology Needs for T&E May 11, 2017 Approved for public release:

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Title: Program Analyst II Rate: GS 13-2 to 13-3 Exempt Equivalency (2018 schedule) Location: SA-4F, Potomac Annex, 2300 E Street, NW, Washington DC 20522 Schedule: Full time, M-F,

More information

MODULE - 9 LECTURE NOTES 4 DECISION SUPPORT SYSTEMS

MODULE - 9 LECTURE NOTES 4 DECISION SUPPORT SYSTEMS 1 MODULE - 9 LECTURE NOTES 4 DECISION SUPPORT SYSTEMS INTRODUCTION DSS is an interactive computer-based system to help decision makers use communications technologies, data, documents, knowledge and/or

More information

Persistent Surveillance Support to Targeting

Persistent Surveillance Support to Targeting Persistent Surveillance Support to Targeting Precision Strike Association Technology Symposium 28-30 Oct Adam Timm JPSIO 28 Oct 08 Adam.M.Timm.ctr@nga.mil Adam.M.Timm@nga.ic.gov JPISO-All@nga.ic.gov Derived

More information

Technosocial Modeling of IED Threat Scenarios and Attack

Technosocial Modeling of IED Threat Scenarios and Attack Technosocial Modeling of IED Threat Scenarios and Attack Paul Whitney, Alan Brothers, Garill Coles, Jonathan Young, Katherine Wolf, Sandy Thompson, David Niesen, John Madsen, Cindy Henderson Pacific Northwest

More information

ArcGIS for the Military Land Operations

ArcGIS for the Military Land Operations 2013 Esri International User Conference July 8 12, 2013 San Diego, California Technical Workshop ArcGIS for the Military Land Simon Warwick, Scott Cecilio Esri UC2013. Technical Workshop. GIS Is About

More information

Advertisement. UN JPO Programme 1 JPO in Counter-Terrorism. United Nations Secretariat, Counter-Terrorism Committee Executive Directorate (CTED)

Advertisement. UN JPO Programme 1 JPO in Counter-Terrorism. United Nations Secretariat, Counter-Terrorism Committee Executive Directorate (CTED) Advertisement UN JPO Programme 1 JPO in Counter-Terrorism United Nations Secretariat, Counter-Terrorism Committee Executive Directorate (CTED) Vacancy Announcement INT-011-15-P064 I General information

More information

Teaching an intelligence-based framework for risk

Teaching an intelligence-based framework for risk Teaching an intelligence-based framework for risk Adam D.M. Svendsen, PhD Intelligence & Defence Strategist, Researcher, Educator and Consultant adam@asgonline.co.uk / twitter: @intstrategist Introduction

More information

Introduction to the Joint Integrated Analysis Tool 2009 SEER Best Practices Seminar October 8, 2009

Introduction to the Joint Integrated Analysis Tool 2009 SEER Best Practices Seminar October 8, 2009 Introduction to the Joint Integrated Analysis Tool 2009 SEER Best Practices Seminar October 8, 2009 Approved for Public Release 1 JIAT Overview (Daniel Schwartz, ODASA-CE) JIAT Applications (Darren Elliott,

More information

15th ICCRTS The Evolution of C2. Course of Action Ontology for Counterinsurgency Operations. Primary Topic: Topic 8 C2 Assessment Metrics and Tools

15th ICCRTS The Evolution of C2. Course of Action Ontology for Counterinsurgency Operations. Primary Topic: Topic 8 C2 Assessment Metrics and Tools 1 15th ICCRTS The Evolution of C2 Course of Action Ontology for Counterinsurgency Operations Primary Topic: Topic 8 C2 Assessment Metrics and Tools Secondary Topic: Topic 3 Information Sharing and Collaboration

More information

A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization

A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Research Synopsis A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Modeling Area: Risk Assessment Case Studies Supported: Risk-Based Resource Allocation Principal Investigator:

More information

ArcGIS Workflow Manager: Effectively Managing Workflows within the ArcGIS Enterprise

ArcGIS Workflow Manager: Effectively Managing Workflows within the ArcGIS Enterprise ArcGIS Workflow Manager: Effectively Managing Workflows within the ArcGIS Enterprise Elizabeth Wilcox and Bryan Piersol Guest Presenter: Ronnie Buzzard, United States Army Geospatial Center Our plan today

More information

Annual Big Data for Intelligence Symposium

Annual Big Data for Intelligence Symposium Defense Strategies Institute professional educational forum: 4th Annual Big Data for Intelligence Symposium ~Leveraging the Big Data Opportunity~ November 29-30, 2016: AUSA Conference and Event Center

More information

Dstl Wargaming Support to the Army

Dstl Wargaming Support to the Army Dstl Wargaming Support to the Army Tony Hopkin Deputy Account Manager Land Defence Science & Technology Laboratory MOD s science and technology experts 3700 staff (including ~100 military & ~500 analysts)

More information

A Quantitative Model Driven Comparison of Command Approaches in an Adversarial Process Model

A Quantitative Model Driven Comparison of Command Approaches in an Adversarial Process Model A Quantitative Model Driven Comparison of Command Approaches in an Adversarial Process Model 12TH ICCRTS Adapting C2 to the 21st Century Authors: Robert Regal, Rebecca Reed, Matt Largent PhD Organization:

More information

Human Rights Council (HRC)

Human Rights Council (HRC) Human Rights Council (HRC) Use of Unmanned Air Vehicles Unmanned Aerial Vehicles (UAVs), also known as remotely piloted aircraft or drones are small aircraft that fly by remote control or autonomously.

More information

Research Centre. Post title. Level on Framework Level 3. Post duration. Research Career Framework. Background & Role

Research Centre. Post title. Level on Framework Level 3. Post duration. Research Career Framework. Background & Role Research Centre Post title ADAPT Centre for Digital Content Technology at DCU (Affiliate Project) Research Fellow in Industrial Applications of Knowledge Engineering Level on Framework Level 3 Post duration

More information

Destabilizing Terrorist Networks Kathleen M. Carley Jeffrey Reminga Natasha Kamneva. Carnegie Mellon University

Destabilizing Terrorist Networks Kathleen M. Carley Jeffrey Reminga Natasha Kamneva. Carnegie Mellon University Contact: Prof. Kathleen M. Carley Institute for Software Research International Carnegie Mellon University Pittsburgh, PA 15213 Tel: 1-412-268-6016 Fax: 1-412-268-1744 Email: kathleen.carley@cmu.edu Area:

More information

Intelligent Systems. For more information on partnering with the Kansas City Plant, contact:

Intelligent Systems. For more information on partnering with the Kansas City Plant, contact: Intelligent Systems For more information on partnering with the Kansas City Plant, contact: Office of Business Development 1.800.225.8829 customer_inquiry@kcp.com Machine Intelligence Machine intelligence

More information

Systems and Technologies for Enhanced Coastal Maritime Security

Systems and Technologies for Enhanced Coastal Maritime Security Systems and Technologies for Enhanced Coastal Maritime Security Edward M. Carapezza a* and Ann Bucklin a a University of Connecticut-Avery Point, Groton, CT, USA ABSTRACT This paper describes a design

More information

Government Extra Study Practice

Government Extra Study Practice Government Extra Study Practice Name: Period: What is Government? Government 1. I can explain the purpose of government 2. I can identify each of the following for dictatorship, monarchy, constitutional

More information

AN INTRODUCTION TO USING PROSIM FOR BUSINESS PROCESS SIMULATION AND ANALYSIS. Perakath C. Benjamin Dursun Delen Madhav Erraguntla

AN INTRODUCTION TO USING PROSIM FOR BUSINESS PROCESS SIMULATION AND ANALYSIS. Perakath C. Benjamin Dursun Delen Madhav Erraguntla Proceedings of the 1998 Winter Simulation Conference D.J. Medeiros, E.F. Watson, J.S. Carson and M.S. Manivannan, eds. AN INTRODUCTION TO USING PROSIM FOR BUSINESS PROCESS SIMULATION AND ANALYSIS Perakath

More information

Systems Engineering, Knowledge Management, Artificial Intelligence, the Semantic Web and Operations Research

Systems Engineering, Knowledge Management, Artificial Intelligence, the Semantic Web and Operations Research Systems Engineering, Knowledge Management, Artificial Intelligence, the Semantic Web and Operations Research Rod Staker Systems-of-Systems Group Joint Systems Branch Defence Systems Analysis Division Report

More information

Real Applications of Big Data. Challenges and Opportunities

Real Applications of Big Data. Challenges and Opportunities Real Applications of Big Data. Challenges and Opportunities David Gil University of Alicante Polytechnic School - EPSA Department of Computer Technology Introduction to Big Data Projects Benchmarking (weka,

More information

Man-Machine Teaming in Autonomous Technologies and Systems

Man-Machine Teaming in Autonomous Technologies and Systems AUTOMOTIVE INFOCOM TRANSPORT, ENVIRONMENT & POWER ENGINEERING AERONAUTICS SPACE DEFENCE & SECURITY in Autonomous Technologies and Systems Analysis and predication of impact and challenges Prof. Dr. Harald

More information

Pellucid Agent Architecture for Administration Based Processes

Pellucid Agent Architecture for Administration Based Processes Pellucid Agent Architecture for Administration Based Processes M. Laclavik, Z. Balogh, L. Hluchy, G. T. Nguyen, I. Budinska, T. T. Dang Institute of Informatics, SAS, Dubravska cesta 9, Bratislava 84237,

More information

Department of Hematology and Blood Transfusion The Blood Supply in Disaster Medicine

Department of Hematology and Blood Transfusion The Blood Supply in Disaster Medicine Department of Hematology and Blood Transfusion The Blood Supply in Disaster Medicine Col.Milos Bohonek, M.D., Ph.D. Introduction Blood substitution and blood supply is a constant strategic and logistic

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DATA INTEGRATION TO EXPLORE THE DYNAMICS OF CONFLICT: A PRELIMINARY STUDY by Eric Hartunian and Wade A. Germann December 2008 Thesis Advisor: Second

More information

Understanding and combatting terrorist networks: Coupling social media mining with social network analysis

Understanding and combatting terrorist networks: Coupling social media mining with social network analysis Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2016 Understanding and combatting terrorist networks: Coupling social

More information

Information Fusion Technology Requirements for the National System for Geospatial Intelligence (NSGI) Enterprise

Information Fusion Technology Requirements for the National System for Geospatial Intelligence (NSGI) Enterprise Information Fusion Technology Requirements for the National System for Geospatial Intelligence (NSGI) Enterprise Phillip Q. Hwang Chief Scientist Pre-Acquisition Directorate National Imagery and Mapping

More information

June Mark Fiebrandt JTEM Operations Research Analyst

June Mark Fiebrandt JTEM Operations Research Analyst June 2010 Mark Fiebrandt JTEM Operations Research Analyst mark.fiebrandt.ctr@jte.osd.mil 757.638.6055 Abstract This tutorial provides background, overview, and status of efforts to produce an overarching

More information

PSAA - PUBLIC SERVICE & ADMIN

PSAA - PUBLIC SERVICE & ADMIN PSAA - Public Service & Admin 1 PSAA - PUBLIC SERVICE & ADMIN PSAA 601 Foundations of Public Service Different perspectives on management and leadership in public service; provides overview of how public

More information

THE COLD WAR

THE COLD WAR THE COLD WAR 1945-1990 The Cold War Declared Cold War a state of increased tension and hostility without armed conflict End of WWII saw this sate occurring between the two new superpowers the US and USSR

More information

BRINGING AI TO ALL DEVELOPERS

BRINGING AI TO ALL DEVELOPERS BRINGING AI TO ALL DEVELOPERS Exploring Deep Learning AI Services in the Cloud Tara E. Walker Principal Software Engineer Microsoft @taraw #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM AGENDA WHAT DOES AI MEAN

More information

KES 2011 Keynote Growing Together Growing Together: Opening the Way for Comprehensive Public-Private Knowledge Management

KES 2011 Keynote Growing Together Growing Together: Opening the Way for Comprehensive Public-Private Knowledge Management Growing Together: Opening the Way for Comprehensive Public-Private Knowledge Management KES 2011 15th Annual Conference on Knowledge-Based and Intelligent Information & Engineering Systems Ansgar Bernardi

More information

RESTREINT UE/EU RESTRICTED

RESTREINT UE/EU RESTRICTED Council of the European Union Brussels, 19 September 2017 (OR. en) 12347/17 RESTREINT UE/EU RESTRICTED CT 90 ENFOPOL 416 COTER 91 JAI 803 COSI 204 CIVCOM 173 COPS 287 NOTE From: EU Counter-Terrorism Coordinator

More information

U.S. Army PEO STRI Cost Management Implementation

U.S. Army PEO STRI Cost Management Implementation U.S. Army PEO STRI Cost Management Implementation Anthony A DeMarco PRICE Systems, LLC 2013 PRICE Systems, LLC All Rights Reserved Decades of Cost Management Excellence 1 Outline Who - PEO STRI Overview

More information

Evaluating Enterprise Architectures through Executable Models

Evaluating Enterprise Architectures through Executable Models www.thalesgroup.com Evaluating Enterprise Architectures through Executable Models 15th ICCRTS Evolution of C2: Where Have We Been? Where Are We Going? June 22-24 Santa Monica, CA N. Farcet & M. Ludwig

More information

Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes. José González Cabañas Ángel Cuevas Rubén Cuevas

Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes. José González Cabañas Ángel Cuevas Rubén Cuevas Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes José González Cabañas Ángel Cuevas Rubén Cuevas Motivation How many people in Europe were assigned with

More information

Chapter 12 TECHNICAL EVALUATION REPORT

Chapter 12 TECHNICAL EVALUATION REPORT Chapter 12 Mr. William Fraser Human Factors Engineering Group Human Systems Integration Section Defence Research and Development Canada Toronto P.O. Box 2000, 1133 Sheppard Ave. West Toronto, Ontario M3M

More information

Task Force on the Role of Autonomy in the DoD Systems

Task Force on the Role of Autonomy in the DoD Systems Task Force on the Role of Autonomy in the DoD Systems Dr. Robin Murphy, Co-Chair Mr. James Shields, Co-Chair June 2012 Terms of Reference Review relevant technologies to evaluate readiness for introduction

More information

Scoping Framework: Scoping Projects for Easier Cost Estimating

Scoping Framework: Scoping Projects for Easier Cost Estimating Scoping Framework: Scoping Projects for Easier Cost Estimating Darrin DeReus, Ph.D. Air Force Cost Support Project Manager Senior Cost Analyst 25 July 2014 Purpose Show a current project Discuss the current

More information

China John Lee Florida State University Department of Political Science Spring 2011

China John Lee Florida State University Department of Political Science Spring 2011 China 1905-1930 John Lee Florida State University Department of Political Science Spring 2011 Sun Yat-Sen Revolutionary leader. Received western education in Honolulu and Hong Kong (medical degree). 1895:

More information

Forecasting Terrorism: Indicators and Proven Analytic Techniques

Forecasting Terrorism: Indicators and Proven Analytic Techniques Forecasting Terrorism: Indicators and Proven Analytic Techniques Captain Sundri K. Khalsa USAF PO BOX 5124 Alameda, California, 94501, United States SundriKK@hotmail.com Keywords: Terrorism, Predictive

More information

CONCEPT DRIFT IN ONTOLOGY MAPPING AND SEMANTIC ANNOTATION ADAPTATION

CONCEPT DRIFT IN ONTOLOGY MAPPING AND SEMANTIC ANNOTATION ADAPTATION CONCEPT DRIFT IN ONTOLOGY MAPPING AND SEMANTIC ANNOTATION ADAPTATION Cédric PRUSKI Dri%- a- LOD@EKAW 2016, November 20 th, Bologna, Italy 1 MOTIVATION K S? K T? Outdated mappings and annotations may trigger

More information

Building A Holistic and Risk-Based Insider Threat Program

Building A Holistic and Risk-Based Insider Threat Program Building A Holistic and Risk-Based Insider Threat Program An Approach to Preventing, Detecting and Responding to Insider Threats Michael G. Gelles, Psy.D March 2015 Insider Threat Types & Drivers Insider

More information

What s new in MATLAB and Simulink

What s new in MATLAB and Simulink What s new in MATLAB and Simulink Mandar Gujrathi Mandar.Gujrathi@mathworks.com.au 2015 The MathWorks, Inc. 1 Platform Productivity Workflow Depth Application Breadth Getting your work done faster Support

More information

WKU-MIS-B11 Management Decision Support and Intelligent Systems. Management Information Systems

WKU-MIS-B11 Management Decision Support and Intelligent Systems. Management Information Systems Management Information Systems Management Information Systems B11. Management Decision Support and Intelligent Systems Code: 166137-01+02 Course: Management Information Systems Period: Spring 2013 Professor:

More information

NCES. Net-Centric Enterprise Services. Power to the Edge 1. The Open Group Conference October 20, 2003 NII/CIO. A Net-Centric DoD

NCES. Net-Centric Enterprise Services. Power to the Edge 1. The Open Group Conference October 20, 2003 NII/CIO. A Net-Centric DoD The Open Group Conference October 20, 2003 NCES Net-Centric Enterprise Services Mike Krieger Director, Information Management DASD(DCIO), OASD(NII) michael.krieger@osd.mil 1 ELIMINATE BANDWIDTH DEPLOY

More information

DIGITIZATION STRATEGIES

DIGITIZATION STRATEGIES DIGITIZATION STRATEGIES Digitization Strategies for Engineering & Construction in the era of Industry 4.0 Rice Global E&C Forum Roundtable Innovation center, Washington, D.C. JUNE 2017 AGENDA THE FOURTH

More information

OntosCAI Competitive Affairs/Intelligence Analyze, Monitor, Understand your Competitive Environment

OntosCAI Competitive Affairs/Intelligence Analyze, Monitor, Understand your Competitive Environment NOW YOU KNOW [ SERIES] OntosCAI Competitive Affairs/Intelligence Analyze, Monitor, Understand your Competitive Environment [DANIEL HLADKY, ONTOS INTERNATIONAL AG] Competition has always been central to

More information

Ontology and Rule Based Knowledge Representation for Situation Management and Decision Support

Ontology and Rule Based Knowledge Representation for Situation Management and Decision Support Ontology and Rule Based Knowledge Representation for Situation Management and Decision Support Neelakantan Kartha, Aaron Novstrup 1 Stottler-Henke Associates Inc, 1107 NE 45 th Street, Suite 310, Seattle,

More information

Modeling Terrorist Beliefs and Motivations

Modeling Terrorist Beliefs and Motivations CREATE Research Archive Research Project Summaries 2012 Modeling Terrorist Beliefs and Motivations Heather Rosoff University of Southern California, rosoff@usc.edu Richard John University of Southern California,

More information

Science & Technology Directorate

Science & Technology Directorate Science & Technology Directorate Unified Incident Command Decision Support (UICDS) Overview Michael B. Smith Science and Technology Directorate U.S. Department of Homeland Security Sept 12, 2006 1 1 1

More information

INTELLIGENCE & CYBER SECURITY WEBINT MODULAR SOLUTIONS

INTELLIGENCE & CYBER SECURITY WEBINT MODULAR SOLUTIONS INTELLIGENCE & CYBER SECURITY WEBINT MODULAR SOLUTIONS COLLECTION AND ANALYSIS OF OSINT SOURCES 3 INTRODUCTION Innovative security and Cyber intelligence solutions to meet a wide range of operational needs

More information

AMASS. Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems

AMASS. Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems Architecture-driven, Multi-concern and Seamless Assurance and Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems Architecture-Driven Assurance First EAB

More information

Development, Validation and Implementation Considerations of a Decision Support System for Unmanned & Autonomous System of Systems Test & Evaluation

Development, Validation and Implementation Considerations of a Decision Support System for Unmanned & Autonomous System of Systems Test & Evaluation Development, Validation and Implementation Considerations of a Decision Support System for Unmanned & Autonomous System of Systems Test & Evaluation Test Week 2010 Kris Cowart, Maj, USAF Ricardo Valerdi,

More information

Destabilizing Terrorist Networks Kathleen M. Carley Jeffrey Reminga Natasha Kamneva. Carnegie Mellon University

Destabilizing Terrorist Networks Kathleen M. Carley Jeffrey Reminga Natasha Kamneva. Carnegie Mellon University Contact: Prof. Kathleen M. Carley Institute for Software Research International Carnegie Mellon University Pittsburgh, PA 15213 Tel: 1-412-268-6016 Fax: 1-412-268-1744 Email: kathleen.carley@cmu.edu Modeling

More information

Course of Action Ontology for Counterinsurgency Operations

Course of Action Ontology for Counterinsurgency Operations Course of Action Ontology for Counterinsurgency Operations Timothy Darr, Perakath Benjamin, Richard Mayer Knowledge Based Systems, Inc. 15 th International Command and Control Research and Technology Symposium

More information

--- EXPORT CONTROL FOR 128T. Abstract. This document captures export control restrictions for 128T platform

--- EXPORT CONTROL FOR 128T. Abstract. This document captures export control restrictions for 128T platform --- EXPORT CONTROL FOR 128T Abstract This document captures export control restrictions for 128T platform 16 May 2018 CONTENTS Revision History... 1 Introduction... 2 embargoed countries... 2 Export classification

More information

Weeks 6 & 7: Cybernetics: the Science of Control & Management

Weeks 6 & 7: Cybernetics: the Science of Control & Management Weeks 6 & 7: Cybernetics: the Science of Control & Management Sufficiently complex, dynamic systems can use information and knowledge to maintain stability in spite of a volatile environment Things can

More information

Department of National Defence Research Initiative Competition

Department of National Defence Research Initiative Competition Department of National Defence Research Initiative 2018-2019 Competition SEPTEMBER 2018 Presentation Outline Objectives, Value & Duration Insight & Insight Development Grants Adjudication & Relevance Review

More information

Confronting Irregular Challenges in the 21 st Century

Confronting Irregular Challenges in the 21 st Century Confronting Irregular Challenges in the 21 st Century Irregular Warfare Concept Series: Whole of World (WoW) Collaboration March 10, 2009 www.hyperscholar.com By: Brig. Gen. David L. Grange (USA, ret.),

More information

73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation

73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation 73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation 712CD For office use only 41205 21-23 June 2005, at US Military Academy, West Point, NY Please complete this form 712CD as your cover

More information

Knowledge mechanisms in IEEE 1471 & ISO/IEC Rich Hilliard

Knowledge mechanisms in IEEE 1471 & ISO/IEC Rich Hilliard Knowledge mechanisms in IEEE 1471 & ISO/IEC 42010 Rich Hilliard r.hilliard@computer.org Two Themes Knowledge mechanisms in IEEE 1471 and ISO/IEC 42010 2000 edition and on-going revision Toward a (bigger)

More information

Dynamic Data and Modeling Services Suite

Dynamic Data and Modeling Services Suite Dynamic Data and Modeling Services Suite Tina H. Chau Alexander P. Moore Richard L. Mullikin Janet E. Wedgwood Lockheed Martin Corporation 720 Vandenberg Drive King of Prussia, PA 19406 571-313-6605, 610-354-7590,

More information