Multisource Fusion for Opportunistic Detection and Probabilistic Assessment of Homeland Terrorist Threats Kathryn Blackmond Laskey & Tod S. Levitt presented.

Slides:



Advertisements
Similar presentations
1 Probability and the Web Ken Baclawski Northeastern University VIStology, Inc.
Advertisements

Slide 1 of 18 Uncertainty Representation and Reasoning with MEBN/PR-OWL Kathryn Blackmond Laskey Paulo C. G. da Costa The Volgenau School of Information.
Modelling with expert systems. Expert systems Modelling with expert systems Coaching modelling with expert systems Advantages and limitations of modelling.
BAYESIAN NETWORKS Ivan Bratko Faculty of Computer and Information Sc. University of Ljubljana.
Naïve Bayes. Bayesian Reasoning Bayesian reasoning provides a probabilistic approach to inference. It is based on the assumption that the quantities of.
Bayesian Network and Influence Diagram A Guide to Construction And Analysis.
Rulebase Expert System and Uncertainty. Rule-based ES Rules as a knowledge representation technique Type of rules :- relation, recommendation, directive,
Bucket Elimination: A unifying framework for Probabilistic inference Rina Dechter presented by Anton Bezuglov, Hrishikesh Goradia CSCE 582 Fall02 Instructor:
Hypothesis Testing making decisions using sample data.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
Introduction of Probabilistic Reasoning and Bayesian Networks
The Art and Science of Teaching (2007)
Terrorism Risk Management Authors of the Paper: David C. Daniels Linwood D.Hudson Kathryn B. Laskey Suzanne M. Mahoney Bryan S. Ware Edward J. Wright Book:
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Causal and Bayesian Network (Chapter 2) Book: Bayesian Networks and Decision Graphs Author: Finn V. Jensen, Thomas D. Nielsen CSE 655 Probabilistic Reasoning.
From: Probabilistic Methods for Bioinformatics - With an Introduction to Bayesian Networks By: Rich Neapolitan.
Plan Recognition with Multi- Entity Bayesian Networks Kathryn Blackmond Laskey Department of Systems Engineering and Operations Research George Mason University.
PR-OWL: A Framework for Probabilistic Ontologies by Paulo C. G. COSTA, Kathryn B. LASKEY George Mason University presented by Thomas Packer 1PR-OWL.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
1 Department of Computer Science and Engineering, University of South Carolina Bayesian Network Development  Kevin B. Korb and Ann E. Nicholson.
Learning with Bayesian Networks David Heckerman Presented by Colin Rickert.
Software Quality Control Methods. Introduction Quality control methods have received a world wide surge of interest within the past couple of decades.
December Marginal and Joint Beliefs in BN1 A Hybrid Algorithm to Compute Marginal and Joint Beliefs in Bayesian Networks and its complexity Mark.
1 Department of Computer Science and Engineering, University of South Carolina Issues for Discussion and Work Jan 2007  Choose meeting time.
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Descriptive and Inferential Statistics.  You’re already familiar with statistics through radio, television, newspapers, and magazines:  Eating 10 g.
Non-invasive Techniques for Human Fatigue Monitoring Qiang Ji Dept. of Electrical, Computer, and Systems Engineering Rensselaer Polytechnic Institute
Non-invasive Techniques for Human Fatigue Monitoring Qiang Ji Dept. of Electrical, Computer, and Systems Engineering Rensselaer Polytechnic Institute
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Conflicts in Bayesian Networks January 23, 2007 Marco Valtorta
1 Multi-Entity Bayesian Networks Without Multi-Tears Bayesian Networks Seminar Jan 3-4, 2007.
Science and Engineering Practices
Self-Learning Ontologies Presented to the 25 th Soar Workshop Ann Arbor, MI June 15-17, 2005 Tim Darr, Ph. D. University of Michigan AI Lab ‘96.
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence From Data Mining To Knowledge.
LOT QUALITY ASSURANCE SAMPLING (LQAS). What is LQAS A sampling method that:  Is simple, in-expensive, and probabilistic.  Combines two standard statistical.
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
Midterm Review Rao Vemuri 16 Oct Posing a Machine Learning Problem Experience Table – Each row is an instance – Each column is an attribute/feature.
Chapter 8 Introduction to Hypothesis Testing
Bayesian Learning By Porchelvi Vijayakumar. Cognitive Science Current Problem: How do children learn and how do they get it right?
Quantitative Research Design and Statistical Analysis.
1 PRINCIPLES OF HYPOTHESIS TESTING. 2 A Quick Review of Important Issues About Sampling: To examine the sample’s attributes (sample statistics) as ESTIMATES.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Bayesian Networks for Data Mining David Heckerman Microsoft Research (Data Mining and Knowledge Discovery 1, (1997))
Book: Bayesian Networks : A practical guide to applications Paper-authors: Luis M. de Campos, Juan M. Fernandez-Luna, Juan F. Huete, Carlos Martine, Alfonso.
Inference and Inferential Statistics Methods of Educational Research EDU 660.
1 Copyright © 2011 by Saunders, an imprint of Elsevier Inc. Chapter 8 Clarifying Quantitative Research Designs.
Machine Learning Chapter 5. Artificial IntelligenceChapter 52 Learning 1. Rote learning rote( โรท ) n. วิถีทาง, ทางเดิน, วิธีการตามปกติ, (by rote จากความทรงจำ.
Chapter Seventeen Policymaking. Copyright © Houghton Mifflin Company. All rights reserved Public Policies and Purposes A public policy is a general.
METU Informatics Institute Min720 Pattern Classification with Bio-Medical Applications Lecture notes 9 Bayesian Belief Networks.
© Copyright McGraw-Hill 2004
DeepDive Model Dongfang Xu Ph.D student, School of Information, University of Arizona Dec 13, 2015.
Multi-target Detection in Sensor Networks Xiaoling Wang ECE691, Fall 2003.
Data I.
Chapter 8 Spreadsheets. Examining Spreadsheets  Basic Functions Performing Calculations Sorting Data Selecting Data Creating Graphs and Charts.
How to structure good history writing Always put an introduction which explains what you are going to talk about. Always put a conclusion which summarises.
Dependency Networks for Inference, Collaborative filtering, and Data Visualization Heckerman et al. Microsoft Research J. of Machine Learning Research.
ACCOUNTING THEORY AND STANDARDS
Bayesian Biosurveillance of Disease Outbreaks RODS Laboratory Center for Biomedical Informatics University of Pittsburgh Gregory F. Cooper, Denver H.
Ontology Engineering and Feature Construction for Predicting Friendship Links in the Live Journal Social Network Author:Vikas Bahirwani 、 Doina Caragea.
PCB 3043L - General Ecology Data Analysis Organizing an ecological study What is the aim of the study? What is the main question being asked? What are.
Lecture 4: Approaches to Data Collection
Understanding Results
The Sensor Fusion Lab & Center of Excellence in C4I
9. Introduction to signal detection
Inferences and Conclusions from Data
Causal Models Lecture 12.
Authors: Wai Lam and Kon Fan Low Announcer: Kyu-Baek Hwang
Machine Learning: Lecture 6
AP STATISTICS LESSON 10 – 4 (DAY 2)
presented by Anton Bezuglov, Hrishikesh Goradia CSCE 582 Fall02
Presentation transcript:

Multisource Fusion for Opportunistic Detection and Probabilistic Assessment of Homeland Terrorist Threats Kathryn Blackmond Laskey & Tod S. Levitt presented by Viji Avali & Richard McCraw CSCE 582 Fall02 Instructor: Dr. Marco Valtorta

Introduction Terrorist attacks on 9/11 caused growing array of information about –possible sources –and alerts To use these effectively fusion of these sources is essential Ex: Biological Warfare attacks

Definitions Bayesian Network Fragments Basic unit. The network fragment consists of a set of related variables together with knowledge about the probabilistic relationships among the variables. Multi Entity Bayesian Network (MEBN) Collection of BNFrags specifying probability distribution over attributes of and relationships among a collection of interrelated entities.

Definitions Situation-Specific Network(SSN) Ordinary finite Bayesian Network constructed from an MEBN knowledge base, to reason about specific target hypothesis, with a particular evidence.

SSN construction process Clusters of reports trigger firing of a suggestor. Suggestors are rules that use the given situation to decide which hypotheses need to be represented. Suggestors trigger retrieval of relevant BNFrags. Variables in the BNFrag are replaced by actual entities in the situations.

SSN Construction Process- Contd.. Current SSN is created combining these BNFrags and already existing SSN (if any). Evidence is applied and inferences are drawn about the hypotheses. Desired actions are decided by evaluating the decision nodes.

Comments There are couple of things to note about the technique in this paper. When the SSN is constructed,the parts of the model not needed to reason from the evidence to the target variables are removed. This may be done by using techniques like relevance reasoning, nuisance node removal. When two SSN’s are combined, if the resultant network has new parent nodes introduced, the combined probability of the already existing node(s) and the new node(s) should be already available to evaluate the combined results.

Conclusion A MEBN allows for the linking of standardized information sources. The MEBN will now pull from the entire knowledge base on a certain target hypothesis. This allows for a faster response to widely dispersed, but related events.