Jeremy Straub Department of Computer Science University of North Dakota.

Slides:



Advertisements
Similar presentations
Risk Management Introduction Risk Management Fundamentals
Advertisements

Considering Assistive Technology and the AT Plan Sara Menzel, ATP UCP Michigan Assistive Technology Center
Prof. Dr. T.D. Gill University of Amsterdam & Netherlands Defence Academy.
Computer Applications in Testing and Assessment James P. Sampson, Jr. Florida State University Copyright 2002 by James P. Sampson, Jr., All Rights Reserved.
1 Challenge the future The change on Moral Perception in relation to increased autonomous systems Experimental Proposals by Tjerk de Greef & Alex Leveringhaus.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
International negotiation
Bastien DURAND Karen GODARY-DEJEAN – Lionel LAPIERRE Robin PASSAMA – Didier CRESTANI 27 Janvier 2011 ConecsSdf Architecture de contrôle adaptative : une.
HRM-755 PERFORMANCE MANAGEMENT
Software Quality Matters Ronan Fitzpatrick School of Computing Dublin Institute of Technology.
The Software Product Life Cycle. Views of the Software Product Life Cycle  Management  Software engineering  Engineering design  Architectural design.
The Need of Unmanned Systems
1 CMPT 275 Software Engineering Requirements Analysis Process Janice Regan,
Introduction to Computer Technology
Purpose Program The purpose of this presentation is to clarify the process for conducting Student Learning Outcomes Assessment at the Program Level. At.
Preliminary Assessment Tribal Emergency Response Preparedness Dean S. Seneca, MPH, MCURP Agency for Toxic Substances and Disease Registry Centers for Disease.
Knowledge to Shape Your Future Electric / Gas / Water Information collection, analysis and application EE Potential Summary Study Overview CALMAC Meeting.
The Software Development Cycle Defining and understanding the problem.
CHAPTER 5 Infrastructure Components PART I. 2 ESGD5125 SEM II 2009/2010 Dr. Samy Abu Naser 2 Learning Objectives: To discuss: The need for SQA procedures.
Multidisplinary Approach.. What are your expectations Write on board.
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
1 October, 2005 Activities and Activity Director Guidance Training (F248) §483.15(f)(l), and (F249) §483.15(f)(2)
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Providing Orientation and Training Training is important to.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Problem Identification
Chapter 13: Developing and Implementing Effective Accounting Information Systems
11 C H A P T E R Artificial Intelligence and Expert Systems.
Using Business Scenarios for Active Loss Prevention Terry Blevins t
Service Transition & Planning Service Validation & Testing
1 TenStep Project Management Process ™ PM00.7 PM00.7 Project Management Preparation for Success * Manage Risk *
Chapter 8 International Strategic Alliances
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Artificial intelligence systems form a broad and diverse set of.
1 Kingsley Karunaratne, Department of Accounting, University of Sri Jayewardenepura, Colombo - Sri Lanka Practice Management.
Chapter 16 – Controlling the Organization
Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution Structured programming Product SW.
 Management ◦ The activities and tasks undertaken by one or more persons for the purpose of planning and controlling the activities of other in order.
Advantage of File-oriented system: it provides useful historical information about how data are managed earlier. File-oriented systems create many problems.
Applications in Acquisition Decision-Making Process.
Systems Analysis and Design in a Changing World, Fourth Edition
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
University of Windsor School of Computer Science Topics in Artificial Intelligence Fall 2008 Sept 11, 2008.
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
SOFTWARE PROJECT MANAGEMENT
Agents that Reduce Work and Information Overload and Beyond Intelligent Interfaces Presented by Maulik Oza Department of Information and Computer Science.
 The Multi-Tier Mission Architecture and a Different Approach to Entry, Descent and Landing Jeremy Straub Department of Computer Science University of.
Introduction of Intelligent Agents
Nursing Informatics NI.
Working in Partnership
Outsourcing of Census Operations United Nations Statistics Division UNSD-ESCWA Regional Workshop on Census Data Processing in the ESCWA region: Contemporary.
Boeing-MIT Collaborative Time- Sensitive Targeting Project July 28, 2006 Stacey Scott, M. L. Cummings (PI) Humans and Automation Laboratory
Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution Structured programming Product SW.
GC e-Orientation Program for New Hire Module 4 – Knowing your Career in Oracle Updated by HR in July 03.
Outsourcing of Census Operations United Nations Statistics Division Regional Workshop on the 2010 World Programme on Population and Housing Censuses: International.
Modern Systems Analysis and Design Third Edition Chapter 2 Succeeding as a Systems Analyst 2.1.
ITEC 1010 Information and Organizations Chapter V Expert Systems.
Systems Analyst (Module V) Ashima Wadhwa. The Systems Analyst - A Key Resource Many organizations consider information systems and computer applications.
Continual Service Improvement Methods & Techniques.
Clinical Utility of EQA Dr. Angela Amayo UON27/11/2008.
Talent Acquisition, Staffing, Recruitment, Executive Search.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
MANAGEMENT INFORMATION SYSTEM
Introduction to Machine Learning, its potential usage in network area,
Stages of Research and Development
Introduction Characteristics Advantages Limitations
Air Carrier Continuing Analysis and Surveillance System (CASS)
Employer and HR Perspective
Monitoring and Evaluation using the
Presentation transcript:

Jeremy Straub Department of Computer Science University of North Dakota

 Introduction  Background  Applications Requiring Humans ◦ Prospective Applications ◦ Requirement Source  Autonomous Control  Goal-Based Autonomy  Human Collaboration  Integrated System  Pathway to Implementation ◦ Technical ◦ Social, Legal & Ethical Considerations  Conclusions & Future Works

 Partial autonomous control approaches are poised to provide benefit to the warfighter  The approach combines: ◦ Scalability of autonomous control ◦ Specialized skills and abilities that humans are either particularly well suited to or which control software hasn’t been created for.  A collaborative control approach is discussed, it combines: ◦ goal-based autonomy ◦ human assistance ◦ teleoperation capabilities  Goals ◦ to maximize system efficiency through the use of autonomous control wherever possible ◦ maximize task completion and accuracy through human support or control, as required

 Robotic sensing and weapons platform control technologies fall into two categories; however, the boundaries of these are blurring ◦ The First presumes complete robot system autonomy in achieving goals and completing tasks assigned by controllers. ◦ The second presumes that human control (or at least supervision) is required  The control of multiple robots by humans, however, presents a particular challenge due to the necessity to concurrently assess and command these robots.

 The prospective applications for unmanned craft (teleoperated or autonomous) are numerous.  Applications include: ◦ intelligence ◦ surveillance and reconnaissance missions ◦ munition location and disablement missions ◦ military attack/defense operations ◦ rescue missions ◦ search and rescue operations  Robots are able to facilitate activities in remote areas, harsh environments and constrained spaces  Teleoperation facilitates attaining these benefits while still allowing the missions to benefit from human knowledge and judgment.

 From a moral perspective, Sauer and Schornig site Kahn in arguing that “a soldier’s right to kill his or her opponents depends on the condition of mutual risk”.  Human judgment is also required for ethical decision making (though Sauer and Schornig suggest that in the longer-term, artificial intelligence systems may be act in a “more ‘humane’ fashion” than humans.  Technically-dictated need: ◦ identification of targets in non-warfare applications ◦ system goal setting and/or tasking ◦ valuable intuition-based guidance

 Autonomous control, when a suitable solution, is highly desirable.  Completely autonomous systems do not require human operators (and the associated expense).  They can be controlled by local software (either onboard or in-region) preventing the need maintain expensive long-distance communications channels and reducing the potential for the system to fail or be compromised due to communications channel failure or compromise.  Autonomous control can take several forms: ◦ Script ◦ Script with error handling capabilities ◦ Adaptive planning ◦ goal-based autonomy  With goal-based autonomy, the AI is given the programmatic tools needed to determine what actions are required to complete a set of goals. Controllers supply initial goals and refine them as necessary. The system creates and refines an operations plan, based upon the supplied (and updated, if applicable) goals.

 With goal-based autonomy the controller sends a high level goal in a goal definition language that is analyzed and decomposed by the AI.  The AI, considering current operating conditions, situational knowledge and other factors develops an optimized plan for the performance of tasks required to meet these decomposed goals.  Dependencies for these tasks are identified and an optimized schedule for their performance is created.  Management by exception can be used to validate whether each prospective task has been suitably successful.  If an exception is found to exist, the system attempts to determine if it can be fixed by the system (without requiring human intervention).

 Many tasks can be performed successfully by an AI without human intervention.  Some (e.g., object recognition in a chaotic environment)are beyond the current capabilities of software systems.  Others or may be possible, but infeasible with the hardware capabilities available onboard the craft or in the operating region.  In these cases, human involvement can expedite task completion and increase accuracy and system performance.  The previous system is now presented augmented with human involvement  Enhancements: ◦ validation process that occurs after scheduling; clarification from controllers is sought to resolve validation failure, if applicable ◦ addition of task types that require human intervention  Each task is evaluated to determine whether human input is required. If input is required, it is sought from human controllers  the system attempts to resolve the exception autonomously  if this fails, human input is sought; this allows more complex task exceptions to be effectively resolved

 it is necessary to consider how multiple instances of the collaborative control process work in conjunction with each other.  Several approaches have been utilized in other work: ◦ security-monitoring-style approach where the controller has multiple screens (or multiple windows) and attempts to watch all of the craft concurrently, scanning for irregularities ◦ approaches where the controller switches between the craft regularly, checking for issues resolving them with commands and moving to the next screen. ◦ autonomously identify and prioritize situations which require the controller’s input and present these to him or her

 Work is required on a variety of fronts to facilitate the use of teleoperated and autonomous craft in more battle scenarios  Technical challenges range from specific focus areas ◦ such as the development of technology that rivals human performance in target identification  to more general concerns ◦ such as ensuring that human values are properly implemented in robotic decision making systems.  Keeping humans in-the-loop: ◦ emotional effects of remote warfighting on human participants ◦ enhancing training (or providing autonomous decision making support, etc.) to facilitate better decision making about craft and human operator capabilities ◦ understanding human perception and how to improve human situational awareness when commanding a remotely controlled craft

 Sauer and Schomig suggest that a plethora of social, ethical and legal considerations must be evaluated when contemplating remotely controlled vehicles and their further advancement. ◦ The effect on the conduct of war must be considered:  reduced the threshold to engage in combat ◦ The impact of teleoperation on the rules of war and what is considered acceptable must be considered:  attacks upon civilian areas may be provoked in response to unmanned craft conflict. ◦ Lack of risk to the operators of unmanned vehicles (who are far removed from the war) removes the right, born from “mutual risk” to harm or kill enemy combatants  the impact that these actions (if perceived as unfair by craft operators) will have on operators’ mental state. ◦ Utilization of autonomous control technology may create a spiral driving further autonomy.  each side would realize the comparative competitive advantage and that each upgrade would trigger a virtual need by the other side to match  the prospective conclusion to this cycle may be wars initiated and fought before humans are even fully aware of them.

 This paper has provided an overview of ongoing work related to the initial design of an integrated system for controlling  Future work will involve the completion of the implementation of this system and testing to quantify the qualitative benefits from controller involvement discussed herein.  Work will also be undertaken to quantify the relative performance of the AI-driven controller software, as compared to the alternate approaches traditionally used.