KEYWORDS: Intelligence systems, Data processing, Data modeling, Knowledge management, Analytical research, Taxonomy, Systems modeling, Visualization, Reconnaissance, Control systems
The US Army has existing challenges associated with command and control and the execution of the operations processes, data processing, information management, and knowledge management. Continued limitations in the capability to combine and reason across explicit and tacit knowledge, due to the increased flow of data from multiple domains, is one shortfall associated with these challenges. We have created a framework to ingest various modalities of data enabling reasoning particularly for decision making tasks. The Enhanced Tactical Inferencing (ETI) framework is designed to have components that send and receive data from different information systems and sources to a reasoning module. The reasoning module is composed of sub-modules with different reasoning model profiles and functions. These sub-modules can work independently or interdependently. The output is a series of recommendations for decision making. One key model is for Uncertainty of Information (UoI). This model incorporates a series of rules and algorithms to associate uncertainty across the multiple data sources. The intent of the ETI framework is to provide recommendations to humans, intelligent systems, and combinations of both. This paper will present the details of the ETI framework, focusing on the UoI model, as well as potential refinements and applications.
We develop a network synthesis scenario, which is built around a concrete perimeter surveillance application, yet we believe captures a number of the challenges and requirements that are common to other tactical communication and computational network applications. The proposed scenario addresses the problem of binary population identification within a perimeter: our goal is to synthesize a sensing and computing network that classifies people moving within a given perimeter into one of two categories (e.g., friend or foe). We discuss several open challenges that we organize across the following clusters: sensor placement, communication network provisioning and optimization, computational task placement, dynamic re-synthesis and resilience under adversarial settings. We also briefly discuss approaches that attempt to address such challenges.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.