Framework for Situation Assessment and Threat Evaluation with Application to an Air Defense Scenario

Similar documents
An Automated Data Fusion Process for an Air Defense Scenario

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Introduction to Modeling and Simulation. Conceptual Modeling. OSMAN BALCI Professor

Data Fusion Models in WSNs: Comparison and Analysis

Commanding Officer Decision Superiority: The Role of Technology and the Decision Maker

The Enterprise Knowledge Portal: The Concept

Intelligent Agent Technology in Command and Control Environment

Seminar - Organic Computing

SYSTEM ENTITY STRUCTUURE ONTOLOGICAL DATA FUSION PROCESS INTEGRAGTED WITH C2 SYSTEMS

CWIS 23,3. Nikolaos Avouris Human Computer Interaction Group, University of Patras, Patras, Greece

MYCIN. The MYCIN Task

COMPUTER-ASSISTED INDEPENDENT STUDY IN MULTIVARIATE CALCULUS

Interaction Design Considerations for an Aircraft Carrier Deck Agent-based Simulation

What s in a Step? Toward General, Abstract Representations of Tutoring System Log Data

Modeling user preferences and norms in context-aware systems

An OO Framework for building Intelligence and Learning properties in Software Agents

Multisensor Data Fusion: From Algorithms And Architectural Design To Applications (Devices, Circuits, And Systems)

Axiom 2013 Team Description Paper

AQUA: An Ontology-Driven Question Answering System

TOKEN-BASED APPROACH FOR SCALABLE TEAM COORDINATION. by Yang Xu PhD of Information Sciences

Visual CP Representation of Knowledge

Specification of the Verity Learning Companion and Self-Assessment Tool

A Model to Detect Problems on Scrum-based Software Development Projects

Radius STEM Readiness TM

An Introduction to Simio for Beginners

A Context-Driven Use Case Creation Process for Specifying Automotive Driver Assistance Systems

Knowledge-Based - Systems

Computers Change the World

Introduction to Simulation

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X

A Case-Based Approach To Imitation Learning in Robotic Agents

Knowledge Elicitation Tool Classification. Janet E. Burge. Artificial Intelligence Research Group. Worcester Polytechnic Institute

Ontologies vs. classification systems

DEVELOPMENT AND EVALUATION OF AN AUTOMATED PATH PLANNING AID

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ;

Robot manipulations and development of spatial imagery

MAE Flight Simulation for Aircraft Safety

Maximizing Learning Through Course Alignment and Experience with Different Types of Knowledge

On-Line Data Analytics

Laboratorio di Intelligenza Artificiale e Robotica

Towards a Collaboration Framework for Selection of ICT Tools

AUTOMATED TROUBLESHOOTING OF MOBILE NETWORKS USING BAYESIAN NETWORKS

Requirements-Gathering Collaborative Networks in Distributed Software Projects

Making welding simulators effective

Learning and Transferring Relational Instance-Based Policies

A MULTI-AGENT SYSTEM FOR A DISTANCE SUPPORT IN EDUCATIONAL ROBOTICS

M55205-Mastering Microsoft Project 2016

Laboratorio di Intelligenza Artificiale e Robotica

LEGO MINDSTORMS Education EV3 Coding Activities

Different Requirements Gathering Techniques and Issues. Javaria Mushtaq

INPE São José dos Campos

Graphical Data Displays and Database Queries: Helping Users Select the Right Display for the Task

Probabilistic Mission Defense and Assurance

ECE-492 SENIOR ADVANCED DESIGN PROJECT

Longest Common Subsequence: A Method for Automatic Evaluation of Handwritten Essays

Circuit Simulators: A Revolutionary E-Learning Platform

Ericsson Wallet Platform (EWP) 3.0 Training Programs. Catalog of Course Descriptions

Emergency Management Games and Test Case Utility:

understand a concept, master it through many problem-solving tasks, and apply it in different situations. One may have sufficient knowledge about a do

Multimedia Courseware of Road Safety Education for Secondary School Students

Scenario Design for Training Systems in Crisis Management: Training Resilience Capabilities

University of Groningen. Systemen, planning, netwerken Bosman, Aart

Clouds = Heavy Sidewalk = Wet. davinci V2.1 alpha3

ProFusion2 Sensor Data Fusion for Multiple Active Safety Applications

EVALUATION OF GEOSPATIAL DIGITAL SUPPORT PRODUCTS

Probability estimates in a scenario tree

On the Combined Behavior of Autonomous Resource Management Agents

Cal s Dinner Card Deals

PATROL OFFICER CQB. A u n i q u e C Q B c o u r s e f o r P o l i c e p e r s o n a l o n l y.

David Erwin Ritter Associate Professor of Accounting MBA Coordinator Texas A&M University Central Texas

Evolutive Neural Net Fuzzy Filtering: Basic Description

Objectives. Chapter 2: The Representation of Knowledge. Expert Systems: Principles and Programming, Fourth Edition

Lecture 1: Basic Concepts of Machine Learning

Probability and Statistics Curriculum Pacing Guide

Software Maintenance

Moderator: Gary Weckman Ohio University USA

Automating the E-learning Personalization

Agent-Based Software Engineering

Success Factors for Creativity Workshops in RE

PROCESS USE CASES: USE CASES IDENTIFICATION

A student diagnosing and evaluation system for laboratory-based academic exercises

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC

What is PDE? Research Report. Paul Nichols

Developing True/False Test Sheet Generating System with Diagnosing Basic Cognitive Ability

Operational Knowledge Management: a way to manage competence

INNOWIZ: A GUIDING FRAMEWORK FOR PROJECTS IN INDUSTRIAL DESIGN EDUCATION

Distributed Weather Net: Wireless Sensor Network Supported Inquiry-Based Learning

QUALIFICATION INSTITUTION DATE

Experience and Innovation Factory: Adaptation of an Experience Factory Model for a Research and Development Laboratory

AC : DESIGNING AN UNDERGRADUATE ROBOTICS ENGINEERING CURRICULUM: UNIFIED ROBOTICS I AND II

Higher education is becoming a major driver of economic competitiveness

INSTRUCTIONAL FOCUS DOCUMENT Grade 5/Science

Beyond the Blend: Optimizing the Use of your Learning Technologies. Bryan Chapman, Chapman Alliance

General principles & specific types of

CREATING SHARABLE LEARNING OBJECTS FROM EXISTING DIGITAL COURSE CONTENT

1.1 Background. 1 Introduction

THE DEPARTMENT OF DEFENSE HIGH LEVEL ARCHITECTURE. Richard M. Fujimoto

A Data Fusion Model for Location Estimation in Construction

Reducing Features to Improve Bug Prediction

Transcription:

18th International Conference on Information Fusion Washington, DC - July 6-9, 215 Framework for Situation Assessment and Threat Evaluation with Application to an Air Defense Scenario Jose F. B. Brancalion 1 Douglas de Oliveira Marques 2 Embraer S.A. São José dos Campos, Brazil 1 jose.brancalion@embraer.com.br 2 douglas.oliveira@embraer.com.br Karl H. Kienitz Instituto Tecnológico de Aeronáutica Divisão de Engenharia Eletrônica São José dos Campos, Brazil kienitz@ita.br Abstract In military environment an operator needs to evaluate the tactical environments in real-time and make decisions to protect the assets against the enemy threats by selecting the appropriate means to engage the enemy target. This work is related to the reconnaissance (including the automatic identification and classification) of targets with hostile behaviors in relation to one point of interest located on the ground. We propose an integrated framework based on Bayesian networks and automated planning tools, to generate the situation awareness to the decision maker being a decision making supporting tool with great potential to be applied in the surveillance of large areas. Keywords: Threat assessment, Bayesian networks, automatic planning, decision support. 1 Introduction The surveillance of large areas is a challenge for the Armed Forces because it is necessary to employ a significant number of mobile equipment (such as helicopters, aircraft, boats) and fixed equipment (such as radars, cameras) to cover huge geographical areas in order to identify, evaluate and track the agents that are present in the scenario. However, there is a limitation in the available resources that can be used in the surveillance and protection of large areas, so it is mandatory to apply techniques to evaluate, identify and prioritize the most threatening agents that represent the higher danger to the resources and assets present in the scenario. It is needed to protect the most important entities based on their importance. In the military scenario the information are referred to the military agents such as aircraft, helicopters, missiles, boats, cars, balloons, etc. The amount of data used in the data fusion system is generated by different types of sensors. The existent tactical systems are generally lacking in high level information fusion where the information provided by the sensors can be fused with environmental, political, operational and doctrine data, optimizing the decision process in short time. An automated tool that presents to the decision maker the most threatening agents in the scenario and provides an automated plan to combat this threat can assist the decision maker in achieving situation awareness. The situation and impact assessment are dynamic processes, reflecting the changes in the scenario during the time, providing to the decision makers the possible states of the environment associated to the probability of occurrence. The threat assessment shall consider the following factors: capacity, opportunity and intention. Some of these elements are presented below: Capacity: training, skills, knowledge, resources, weapons, organization, operation, Opportunity: access to the targets, operation, vulnerabilities, location, Intention: motivation, behaviors, activities related to the event chain. 1.1 Problem The problem addressed in this paper is that of threat assessment, automatic target classification and intent inference based on recognition of aircraft behavior that plays out over time. We propose an integrated framework tool that can provide warnings of imminent threats, by evaluating the behavior of the aircraft, identifying and classifying the most threatening targets. The automated planning tool integrated in the framework provides automatic plans to intercept the threat, by engaging the appropriated assets, helping the decision maker in the decision process. This paper is organized as follows. The next section presents the techniques that have been used in threat evaluation and the techniques that were chosen and integrated in the proposed tool. Section 3 presents the integrated framework for threat evaluation and automated planning developed in this work. Section 4 presents and discusses the results obtained in this work, and the Section 5 concludes this work. 2 Techniques There are several works related to the threat and situation assessment that can be used in Air Defense Systems, using 978--9964527-1-7 215 ISIF 1246

different techniques like rule base systems [1] or fuzzy logic [2]. This work proposes an automatic system for identification and classification of the targets with hostile behaviors in relation to one point of interest, based on Dynamic Bayesian Networks. Other similar works can be found in [3] and [4]. The behavior of the targets is monitored during its trajectories and the automatically identify and classifies the targets that represent a threat to one point of interest on the ground. The techniques proposed for the evaluation of most threatening agents and for the construction of automated planning are presented in the next Sections. 2.1 Bayesian networks A Bayesian Network (BN) enables for a compact representation of a full joint probability distribution. A BN consists of a directed acyclic graph (DAG) and a set of conditional probability distributions for each node in the network [5]. The graph comprises a set of nodes, with each node representing a proposition or variable within the domain of interest, and a set of directed arcs representing direct probabilistic dependencies between the variables. The only constraint on the arcs allowed in a BN is that there must not be any directed cycles: it not possible to return to a node simply by following directed arcs. The absence of an arc between two variables is interpreted as a statement of conditional independence, i.e. the two variables are independent given some subset of the other variables in the network. For each variable without parents, we need to provide a prior probability distribution. For each variable with parents, we need to specify a conditional probability distribution given each possible combination of parent states. There are many potential orderings of variables in a network, and the ordering chosen for a BN should represent the assumed dependencies and nondependencies as efficiently as possible. This usually means that the direction of an arc should follow the direction of causality when the relationship between two variables is causal. The Bayesian Network describes a problem domain which consists in a set of random variables U = {X1... Xn}. These variables are in BN represented by a set of nodes named V, in a directed acyclic graph (DAG) G = (V, E), where the set of nodes E V x V specifies the conditional dependence and independence relations among the variables in the domain. Figure 1 illustrates an example of a simple BN. Figure 1. Illustration of a simple BN that can be used for modeling the direction of a car. 2.2 Automated planning Automated Planning is the area of Artificial Intelligence that studies what concerns the realization of strategies or action sequences, typically for execution by intelligent agents, autonomous robots and unmanned vehicles. Its aim is to support the planning activity by reasoning on conceptual models, i.e. abstract and formal representations of the domain, of the effects and the combinations of actions, and of the requirements to be satisfied and the objectives to be achieved. The conceptual model of the domain in which actions are executed is called the planning domain, combinations of actions are called plans, and the requirements to be satisfied are called goals [6]. One motivation for automated-planning research is theoretical: planning is an important component of rational behavior so if one objective of artificial intelligence is to grasp the computational aspects of intelligence, then certainly planning plays a critical role. Another motivation is very practical: plans are needed in many different fields of human endeavor, and in some cases it is desirable to create these plans automatically [7]. The planner s input is a planning problem, which includes a description of the system, an initial situation and some objective. For example, a planning problem P might consist of a description of, the initial state s, and a single goal state s1. The planner s output is a plan or policy that solves the planning problem. A plan is a sequence of actions such as <take, move1, load, move2>. 3 Integrated tools for threat evaluation and automated planning generation 3.1 Scenario generator module In order to generate the trajectories of the entities for the evaluation of the proposed techniques in this paper, it was developed a scenario generator module, using Matlab environment. The graphical interface of this module is presented in the Figure 2. 1247

Figure 2. Trajectory generator module. The module allows the creation of complex trajectories combining different trajectory segments, where is possible to associate a dynamic model to each segment. The available dynamic models are Constant Speed (CS), 2-D Constant Turn (2CT) and Planar Variable Turn (PVT) [8]. For each segment it is necessary to define the initial latitude, longitude and altitude of the target, the initial speeds and accelerations of the target in the X, Y and Z axis and the duration of the segment. 3.2 Bayesian Network tool The DBN was defined using GeNIie [9]. GeNIe is a development environment for graphical decision-theoretic models developed at the Decision Systems Laboratory, University of Pittsburgh. Figure 3 presents the graphical interface for the itsimple tool. 3.3 Automated planning tool The automated planning tool integrated in the developed framework was itsimple [1]. The itsimple tool was designed to give support to users during the construction of a planning domain application mainly in the initial stages of the design life cycle [11]. These initial stages encompass processes such as domain specification, modeling, analysis, model testing and maintenance, all of them crucial for the success of the application. Starting with requirements elicitation, specification and modeling, itsimple proposes a special use of UML Unified Modeling Language - in a planning approach (named UML.P) which we believe can contribute to the knowledge acquisition process (from different viewpoints) as well as to the domain model visualization and verification. 3.4 Integrated framework The integrated framework was developed in Matlab environment. It integrates the trajectory generator module, the Bayesian Network tool and the automated planning tool. Figure 4 presents an illustration of this framework. Figure 3. Geenie interface for modeling with Bayesian networks. Figure 4. Integrated framework developed in Matlab environment. 4 Results In this analysis we generated two trajectories of aircraft, there is one point of interest located on the ground. The trajectory generator produces periodically the state vector of the the targets which contains the position, speed and acceleration of the targets. These information are the input for the Bayesian network. There is a classifier that identify and classify automatically the aircraft based on their dynamic behaviors. The possible classes for the aircraft are: Small, Commercial, Fighter and Other. The inference tool identifies dynamically the risks associated to each aircraft, where Risk 1 represents the lowest risk and Risk 5 1248

represents the higher risk. The risk is associated to the probability to cause damages to the point of interest. Figure 5 and Figure 6 present the simulated trajectories and the positions in relation to the point of interest. From the point of interest are defined concentric regions, each one represents the threat level for the aircraft in relation to the point. The more distant regions represent less danger to the point of interest; the regions closer to the point represent more danger. Altitude (m) 1 23-5 -4 Far Medium Close Point of Interest x 1 5-3 -2-1 1 Aircraft 1 1 Aircraft 2 2 3 4 5 Figure 7. Bayesian network describing the scenario. 2 3-2 -1 Distance (Km) 4 5-5 -4-3 Distance (Km) Figure 5. Trajectories of the aircraft related to the point of interest. x 1 5 4 2 Far Medium Close Distance Y Point of Interest aircraft 1 aircraft 2-2 -4-4 -3-2 -1 1 2 3 4 Distance X x 1 5 14 Figure 8. Structure of the Bayesian Network. 12 Altitude (m ) 1 8 6 4 2 5 1 15 2 25 3 Time (s) Figure 6. Location and altitude of the aircraft. Figure 7 and Figure 8 present the Bayesian network and its structure, used in the threat assessment system, where the Risk is dynamically inferred from the information about the distance of the aircraft in relation to the point of interest, speed, altitude and type of aircraft (based on the estimation of dynamic behavior of the aircraft from the state vector of the aircraft). Figure 9 presents the speed, altitude and the risks associated to the aircraft 1. Figure 1 presents the classification and the risks associated to the aircraft 1. The probabilities associated to the classification of the aircraft change in the time; initially the higher probability was associated to Commercial aircraft. When the speed of the aircraft increased the probability associated to the Commercial type decreased and the probability associated to Fighter type increased. The risk associated to the aircraft is also calculated during the trajectory of the aircraft. The aircraft is approaching the point of interest and its type changed from Commercial to Fighter, so its associated risk changed from Risk 2 to higher risks degrees, Risk 4 and Risk 5. The higher the risk associated to the aircraft the higher the threat represented by the aircraft to the point of interest. 1249

5 1 15 2 25 3 1 5 Speed (m/s) Figure 12 presents the graphical interface for itsimple tool used to generate the plans. 15 Altitude (m) 1 5 5 1 15 2 25 3.8.6.4.2 Risk Risk 1 Risk 2 Risk 3 Risk 4 Risk 5 5 1 15 2 25 3 Figure 9. Speed, altitude and risk associated to Aircraft 1..8.6 Small Comercial Figther Other.4.2 5 1 15 2 25 3.8.6.4.2 5 1 15 2 25 3 Figure 1. Classification and risk associated to Aircraft 1. Risk 1 Risk 2 Risk 3 Risk 4 Risk 5 Figure 12. itsimple4. interface for modeling with UML.P The class diagram is the commonly used in object oriented modeling process. Classes capable of performing actions are what we call classes of agents, while others are considered only resources in the model. Figure 13 illustrates the class diagram for the Interception domain. Figure 11 presents the speed, altitude and the risks associated to the aircraft two. The risk associated to the aircraft 2 is also calculated during the trajectory of the aircraft. The risk initially associated to it was Risk 2, kept constant during the entire trajectory. As the aircraft is located far to the point of interest during the entire trajectory, the risk did not change. 3 Speed (m/s) 2 1 5 1 15 2 25 3 1.3 x 14 Altitude (m) 1.2 1.1.8.6.4.2 1 5 1 15 2 25 3 Risk 5 1 15 2 25 3 Figure 11. Speed, altitude and risk associated to Aircraft 2. Based on the evaluated risks the system automatically identify that there is a high potential threat to the point of interest represented by aircraft 1 and automatically trigger the automatic planning tool to generate a plan to intercept the aircraft 1. Risk 1 Risk 2 Risk 3 Risk 4 Risk 5 Figure 13. Modeling static features with class diagram. Another diagram used for modeling the domain features is the state chart diagram. In UML.P the state chart diagram is responsible for representing dynamic features of the domain model. Such dynamic representation is actually the bottleneck in the planning domain modeling process. Figure 14 presents the state chart diagram for the Weapons class. 125

Figure 14. State chart diagram for the Weapons class. Figure 15 presents the state chart diagram for the Fighter class. Figure 16. The initial state of an Interception problem. Figure 15. State chart diagram for the Fighter class. A problem statement in a planning domain is usually characterized by a situation where only two states are known: the initial and goal states. The diagram used to describe these states is the object diagram or Snapshot. Figure 16 presents the initial state for the Interception problem and Figure 17 presents the final state for the Interception problem. Figure 17. The final state of an Interception problem. The itsimple offers several planners to create the plans. In this work it was as used the Metric-FF planner [12] to generate the following automatic plan: :(LOADFIGHTER F5 BOMB1 AIRBASE1) [1] 1:(FLY F5 AIRBASE1 INTERCEPTIONPOINT) [1] 2:(UNLOADFIGHTER F5 BOMB1 INTERCEPTIONPOINT) [1] 3:(FLY F5 INTERCEPTIONPOINT AIRBASE1) [1] 5 Conclusion This paper focuses on the problem of evaluating aerial aircraft that can represent potential threats to a point of 1251

interest located on the ground, and proposes an integrated framework for automatic identification, evaluation, classification of the threats present in one area of interest. The developed tool also provides an automated planning tool that creates plans to aid the decision maker in the process to engage the most appropriate asset to combat the threat. As future work we propose the integration of others types of information in the Bayesian network, like geographical and political for instance. In the planning tool we propose to incorporate other information in the plan, like the best weapon to be used to engage the threat based on its classification. References [1] M. J. Liebhaber, B. Feher, Air Threat Assessment Research, Model and Display Guidelines, Proceedings of the 22 Command and Control Research and Technology Symposium, Monterey, CA, USA 22. [1] Available in: https://code.google.com/p/itsimple/ [11] T. S. Vaquero, V. Romero, F. Tonidandel, J. R. Silva, itsimple2.: An Integrated Tool for Designing Planning Domains, ICAPS 27, Providence, Rhode Island, USA, pp. 336-343. [12] Available in http://fai.cs.uni-saarland.de/hoffmann/ [2] F. Johansson, G. A. Falkman, Comparison Between Two Approaches to Threat Evaluation in an Air Defense Scenario, Proceedings of the 5 th International Conference on Modeling Decisions for Artificial Intelligence. Sadabell, Espanha 26. [3] A. Dahlbom, P. Nordlund, Detection of Hostile Aircraft Behaviors Using Dynamic Bayesian Networks, 16 th International Conference on Information Fusion. Istambul, Turkey 213. [4] P. Louvieris, A. Gregoriades, W. Garn, Assessing critical success factors for military decision support, Expert Systems with Applications. no. 37, pp. 8229 8241, 21. [5] K. R. McNaught, V.V.S.S. Sastry, B. Ng, Investigating the Use of Bayesian Networks to Provide Decision Support to Military Intelligence Analysts, Proceedings 19 th European Conference on Modeling and Simulation, Riga Latvia, 25. [6] A. Cimatti, M. Pistore, P. Traverso, Handbook of Knowledge Representation, chapter 28, Automated Planning, Elsevier, 28. [7] D. S. Nau, Current Trends in Automated Planning, AI Magazine, vol. 28, no. 4, pp. 43-58, 27. [8] X. R. Li; V. P. Jilkov. Survey of Maneuvering Target Tracking Part I: Dynamic Models, IEEE Transactions on Aerospace and Electronic Systems. vol. 39, no. 4, pp. 1333-1364, October 23. [9] DSL, "GeNIe and SMILE," Decision Systems Laboratory, University of Pittsburgh, Pittsburgh, PA, USA, 213. 1252