Intelligent Agent Technology in Command and Control Environment

Similar documents
CyberCIEGE: An Extensible Tool for Information Assurance Education

AD (Leave blank) PREPARED FOR: U.S. Army Medical Research and Materiel Command Fort Detrick, Maryland

SEDETEP Transformation of the Spanish Operation Research Simulation Working Environment

Introduction to Modeling and Simulation. Conceptual Modeling. OSMAN BALCI Professor

SYSTEM ENTITY STRUCTUURE ONTOLOGICAL DATA FUSION PROCESS INTEGRAGTED WITH C2 SYSTEMS

PUBLIC CASE REPORT Use of the GeoGebra software at upper secondary school

On the Combined Behavior of Autonomous Resource Management Agents

A Case-Based Approach To Imitation Learning in Robotic Agents

Data Fusion Models in WSNs: Comparison and Analysis

Commanding Officer Decision Superiority: The Role of Technology and the Decision Maker

AQUA: An Ontology-Driven Question Answering System

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Knowledge based expert systems D H A N A N J A Y K A L B A N D E

Keeping our Academics on the Cutting Edge: The Academic Outreach Program at the University of Wollongong Library

David Erwin Ritter Associate Professor of Accounting MBA Coordinator Texas A&M University Central Texas

Application of Cognitive Load Theory to Developing a Measure of. Team Decision Efficiency. Joan H. Johnston

Size Matters: How Big Should a Military Design Team Be?

A Reinforcement Learning Variant for Control Scheduling

Specification of the Verity Learning Companion and Self-Assessment Tool

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

BUS Computer Concepts and Applications for Business Fall 2012

Chamilo 2.0: A Second Generation Open Source E-learning and Collaboration Platform

Investigation on Mandarin Broadcast News Speech Recognition

Emergency Management Games and Test Case Utility:

COURSE LISTING. Courses Listed. Training for Cloud with SAP SuccessFactors in Integration. 23 November 2017 (08:13 GMT) Beginner.

Historical maintenance relevant information roadmap for a self-learning maintenance prediction procedural approach

A student diagnosing and evaluation system for laboratory-based academic exercises

Document number: 2013/ Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering

MYCIN. The MYCIN Task

Degree Regulations and Programmes of Study Undergraduate Degree Programme Regulations 2017/18

UCEAS: User-centred Evaluations of Adaptive Systems

IMPACT INSTITUTE BEHAVIOR MANAGEMENT. Krissy Matthaei Gina Schutt

Evaluation of Systems Engineering Methods, Processes and Tools on Department of Defense and Intelligence Community Programs - Phase II

Modified Systematic Approach to Answering Questions J A M I L A H A L S A I D A N, M S C.

TOKEN-BASED APPROACH FOR SCALABLE TEAM COORDINATION. by Yang Xu PhD of Information Sciences

FRESNO COUNTY INTELLIGENT TRANSPORTATION SYSTEMS (ITS) PLAN UPDATE

Computer-Based Aids for Learning, Job Performance, and Decision Making in Military Applications: Emergent Technology and Challenges

Explanation-Aware Army Builder for Warhammer 40k

A Conceptual Model of Metacognitive Skills

PROGRAM HANDBOOK. for the ACCREDITATION OF INSTRUMENT CALIBRATION LABORATORIES. by the HEALTH PHYSICS SOCIETY

Self-Assessment Based Mini-After Action Review (SAMAAR) Methodology: Developmental Application to Division Artillery Staff Training

Bluetooth mlearning Applications for the Classroom of the Future

THE DEPARTMENT OF DEFENSE HIGH LEVEL ARCHITECTURE. Richard M. Fujimoto

A MULTI-AGENT SYSTEM FOR A DISTANCE SUPPORT IN EDUCATIONAL ROBOTICS

10.2. Behavior models

Using GIFT to Support an Empirical Study on the Impact of the Self-Reference Effect on Learning

Maximizing Learning Through Course Alignment and Experience with Different Types of Knowledge

SHEEO State Authorization Inventory. Kentucky Last Updated: May 2013

A Process-Model Account of Task Interruption and Resumption: When Does Encoding of the Problem State Occur?

Tools to SUPPORT IMPLEMENTATION OF a monitoring system for regularly scheduled series

School Year Enrollment Policies

Running Head: STUDENT CENTRIC INTEGRATED TECHNOLOGY

Efficient Use of Space Over Time Deployment of the MoreSpace Tool

Firms and Markets Saturdays Summer I 2014

A Case Study: News Classification Based on Term Frequency

Smiley Face Feedback Form

Improving the impact of development projects in Sub-Saharan Africa through increased UK/Brazil cooperation and partnerships Held in Brasilia

Clouds = Heavy Sidewalk = Wet. davinci V2.1 alpha3

Lecture 10: Reinforcement Learning

White Paper. The Art of Learning

EVALUATION OF GEOSPATIAL DIGITAL SUPPORT PRODUCTS

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS

15 th ICCRTS THE EVOLUTION OF C2. Suggested Topics: Experimentation and Analysis; Modeling and Simulation; C2 Architectures and Technologies

PRINCE2 Foundation (2009 Edition)

Delaware Performance Appraisal System Building greater skills and knowledge for educators

Director, Intelligent Mobility Design Centre

McGraw-Hill Connect and Create Built by Blackboard. Release Notes. Version 2.3 for Blackboard Learn 9.1

Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant Sudheer Takekar 1 Dr. D.N. Raut 2

Knowledge-Based - Systems

Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses

MMOG Subscription Business Models: Table of Contents

SAM - Sensors, Actuators and Microcontrollers in Mobile Robots

Math 96: Intermediate Algebra in Context

CWIS 23,3. Nikolaos Avouris Human Computer Interaction Group, University of Patras, Patras, Greece

On-Line Data Analytics

Development of an IT Curriculum. Dr. Jochen Koubek Humboldt-Universität zu Berlin Technische Universität Berlin 2008

November 17, 2017 ARIZONA STATE UNIVERSITY. ADDENDUM 3 RFP Digital Integrated Enrollment Support for Students

Frequently Asked Questions and Answers

Meeting Agenda for 9/6

CONSULTATION ON THE ENGLISH LANGUAGE COMPETENCY STANDARD FOR LICENSED IMMIGRATION ADVISERS

Nearing Completion of Prototype 1: Discovery

Co-op Placement Packet

A Dialog-Based Intelligent Tutoring System For Practicing Battle Command Reasoning. Joan M. Ryder CHI Systems, Inc.

AUTOMATED TROUBLESHOOTING OF MOBILE NETWORKS USING BAYESIAN NETWORKS

RESIDENCY POLICY. Council on Postsecondary Education State of Rhode Island and Providence Plantations

Objectives. Chapter 2: The Representation of Knowledge. Expert Systems: Principles and Programming, Fourth Edition

Quantitative Evaluation of an Intuitive Teaching Method for Industrial Robot Using a Force / Moment Direction Sensor

Evolutive Neural Net Fuzzy Filtering: Basic Description

VI-1.12 Librarian Policy on Promotion and Permanent Status

Creating Meaningful Assessments for Professional Development Education in Software Architecture

Growth of empowerment in career science teachers: Implications for professional development

CUSTOMER EXPERIENCE ASSESSMENT SALES (CEA-S) TEST GUIDE

Community-oriented Course Authoring to Support Topic-based Student Modeling

COMPUTER-AIDED DESIGN TOOLS THAT ADAPT

The ADDIE Model. Michael Molenda Indiana University DRAFT

DEVELOPMENT OF AN INTELLIGENT MAINTENANCE SYSTEM FOR ELECTRONIC VALVES

Your School and You. Guide for Administrators

Ph.D. in Behavior Analysis Ph.d. i atferdsanalyse

Conference Paper excerpt From the

Litterature review of Soft Systems Methodology

Transcription:

Intelligent Agent Technology in Command and Control Environment Edward Dawidowicz 1 U.S. Army Communications-Electronics Command (CECOM) CECOM, RDEC, Myer Center Command and Control Directorate Fort Monmouth, NJ. 07703 732.427.4122 Abstract The Intelligent Agent (IA) technology has applications in the following areas of military Command and Control (C2): logistics, combat planning and battle plan execution monitoring. C2 information extraction should not rely on using simple database queries, since the amount of data available to the commander on the modern battlefield can be overwhelming. In order to make informed decisions; the commander must have immediate access to specific information in real time. The available data therefore, must be parsed in such a way as to extract only the specific information required by the commander. The ever-increasing volume of data in the C2 environment thus requires the use of IAs to extract relevant information for the commander in real time. The paper describes an application of IA in assisting a decision-maker, i.e. the military commander, by extracting needed information from a large amount of data and triggering an alarm when certain critical conditions are reached. The open architecture proposed here not only allows effective IA implementation but also expansion of future IA applications, as needs demand. This paper is a continuation of earlier work [Ref. 1,2,3]. 1.0 Introduction The increase in dynamics associated with the modern battlefield adds additional levels of complexity to the perception of what constitutes a battlespace. As a rule, even the best battle plans are subject to change. In this rapidly changing environment, the commander must be notified in real time when critical situation changes occur. For this problem, the IA proves to be extremely useful. In addition to alerting the commander about a sudden encountered problem, the IA also provides the necessary information allowing the commander to resolve the problem in near-real time. In general, IAs should exhibit the following behavior: 1. Intelligent ability to infer, learn 2. Proactive - goal-directed 3. Reactive - respond to domain changes 4. Autonomous - operate without human involvement. 1 This work was supported by the BV STO, CPXXI ATD(US Army CECOM) and CPoF (DARPA) programs

Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 1999 2. REPORT TYPE 3. DATES COVERED 00-00-1999 to 00-00-1999 4. TITLE AND SUBTITLE Intelligent Agent Technology in Command and Control Environment 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Army Communications-Electronic Command (CECOM),Research Development and Engineering Center (RDEC),Myer Center,Fort Monmouth,NJ,07703 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 1999 Command and Control Research and Technology Symposium 14. ABSTRACT 15. SUBJECT TERMS 11. SPONSOR/MONITOR S REPORT NUMBER(S) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified 18. NUMBER OF PAGES 6 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18

An IA will exhibit some if not all of the above properties. However, strong proactive and reactive behavior may also bring about a manifestation of an undesirable anarchical personality exhibited by the IAs within a particular system application. To prevent this occurrence, a Governing agent is implemented to maintain order within the system. Task Attributes Data (Initial or Just Obtained) Outside World And Other Agents Communications Output Rule Base Rule Selection And Configuration Inference Engine Knowledge Base User Interface Method Library Figure 1 Intelligent Agent Architecture 1.1 Application The described IA application was limited to the areas of logistics, execution monitoring, and commander's assistant. Due to time and resource limitations, but the practicality of IA technology is shown. 2.0 Architecture The IA architecture developed was designed to incorporate all four behavioral elements described earlier and is illustrated in Figure 1. The architecture allows behavioral modification and is common to agents designed to interact with the user. This model, however, does not address the architecture of a Governing Agent or Controller.

The task attributes are pre-configured to meet the anticipated user needs. The user has an option to customize the attribute settings based on requirements. The attributes determine the tasks assigned and the behavioral tendency of the agent. The rules are selected from the Rule Base (RB) by Rule Selection and Configuration (RSC) using selected attributes, and loaded into the Inference Engine (IE). The output generated by the Inference Engine will supply information to the client/user 2. The IE executes selected rules and informs the user if the information supplied was conclusive. If not, the IE brokers another service, agent or human for additional information. Irrespective of available information, the IE will generate an output. However, it will reflect the completeness of information by computing a confidence level of the inference made. 2.1 Open Architecture The open architecture design increases the product s life cycle while reducing software maintenance costs. This is accomplished by replacing outdated methods with new methods, and expanding the RB with new rules defined by the user. The software maintenance is accomplished with the aid of RSC. The following example illustrates the open architecture concept, and the role RSC plays in facilitating software maintenance. In general, a rule can be formulated as: If Sensor (argument list) Then Effector (argument list) End if Where Sensors and Effectors are the test and inference functions, respectively. The RSC allows the user to modify the RB and Knowledge Base (KB) with a user-friendly interface. The user is presented with task pertinent lists of sensor 3 and effector methods. The lists of Sensors and Effectors are generated based on the content of the Method Library repository. These lists can consist of old or new methods. Presented with the available methods, the user can formulate the rule. If no duplicate or similar rule exists in the RB the newly configured rule is then stored in the Rule Base. 3.0 Method and Experiment The IA application was built using the following tactical scenario to demonstrate collaboration between Commanders Aid (CA), Execution Monitoring (EM), and Situation Awareness (SA) agents. The scenario is as follows: A battalion size team is to secure Objective Area (OA) Alpha at 04:00 hours. At 03:35 scouts report enemy activity in the vicinity of the OA. The enemy force is reported to be at least two companies of mechanized infantry and a small number of tanks. The lead elements of the force are four kilometers away from the OA. 2 The term client implies software, and the term user implies a human. 3 The sensors occasionally are more complex than, for instance, a>b. The sensor may need to compute or obtain the values of a and/or b before making the required evaluation.

The information supplied by the scout triggers the EM agent. The EM agent in turn triggers the CA friendly artillery or/and airborne platforms. Within minutes, the CA presents the commander with the information needed to devise a plan of action based on the computed weapon effectiveness (WE) shown Target Asset Inf. CO-1,2 MLRS M270.85 Inf. CO-1,2 Howitzer 155-mm.73 Armor CO-1 Longbow.87 Armor CO-1 MLRS M270.59 Table 1 The equation used in computing weapon effectiveness can be defined considering the events to be dependent or independent. WE=P(A) Where: WE = Weapon Effectiveness and P is the probability of occurrence of event E, 0 P(A) 1. Since A is a union of events we can express [5] P(A)=P(a 1 + a 2 + a 3+ a n ) If a 1 + a 2 + a 3+ a n are all elements in A. The probability of union of events A and B can be extended as: P(A B)=P(A+B)=P(A)+P(B)- P(A B) 03:40 03:50 04:00 04:10 MLRS M270 Inf. Co 2 Howitzer 155-mm Inf. Co 1 Longbow AH-67 Armor Figure 2 Task Execution Matrix This relationship is shown in Figure 3.

ν B A Figure 3 Venn diagram of union of events A and B If events A and B are mutually exclusive, i.e. P(A B)=0 then: where WE= P(A B)= P(A)+P(B) When the combined effectiveness for several weapons firing at the same target area sequentially and in a short time interval, the WE is computed as: where: N =1 - Π(1 d ) i=1 d i - probabilistic contributing elements such as probability of a hit under ideal conditions, weapon effectiveness under ideal conditions. N is the number of probabilistic contributing elements. For example, if we use both options in Table 1, the MLRS M270 WE=.85 and the 155mm Howitzer WE=.73, then the combined WE=.96 The CA suggests a possible course of action (COA) using situation relevant rules, and computed values of WE. The results produced by the CA are displayed as a task execution matrix shown in Figure 2.

4.0 Conclusion IA technology can add a new level of sophistication to the battlefield. The IAs can serve as the commander s intelligent assistants for instance, capable of analyzing a given situation, and suggesting elements of a possible COA. The ultimate goal of the IA is to become an intelligent help capable of anticipating user needs based on the current situation. IAs can dramatically increase their combined capability in an environment of collaborative problem solving, regardless of their individual limitations. To optimize that potential, a good stasis between the system and the individual agents must be achieved. A well-designed architecture is of great importance in achieving this goal. Acknowledgments The author would like to thank the following individuals for their valuable comments and input that helped to improve and shape the final design. Thomas Newsome, CPXXI-ATD program manager. John Soos, BP-STO program manager Ward Page, CPoF program manager. Members of Battle Command Battle Labs at Fort Leavenworth; Colonel M. Heredia, Lt. Colonel J. Duquette, and Major E.F. Stockel. My colleagues Eugene Bajew and Gunther Kainz. William Kaplan, whose editorial comments made this paper much more palatable to the reader. And last but certainly not least, my dear wife Milena, whose patience, love and support were instrumental in the writing of this paper. References 1. [Dawidowicz et al, 97] Edward Dawidowicz, Lisa Tran, Richard Wong, Israel Mayk, Dirk Klose (1998), Scenario Animator and Generator as a Command and Control Decision Making Tool for Humanitarian Assistance, Proceedings of the Forth International Command and Control Research and Technology Symposium, Washington, DC, June 17-20, 1997. 2. [Dawidowicz et al, 96 Edward Dawidowicz, Lisa Tran, Richard Wong, Israel Mayk, Dirk Klose (1998), Command and Control Tool: Scenario Animator and Generator, Proceedings of the 1998 Research and Technology Symposium, pp. 504-516, NPGS, Monterey, CA, June 1996. 3. [Mayk et al, 97] Mayk I., Salton J., Dawidowicz E., Wong R., Tran L. Chamberlain S., and Brundick F., Distributed Situation Awareness for C2 Platforms, Proceedings of the 1997 International Conference on SMC, Orlando, FL, October 1997. 4. [Michel et al 81] Anthony N. Michel, Charles J. Herget, Mathematical Foundations in Engineering and Science Algebra and Analysis, Prentice-Hall, Inc, 1981. 5. [D. E. Grawoing] Dennis E. Grawoing, Decision Mathematics, McGraw-Hill Book Company, 1967, p 240.