Probability of Attack of Fixed Wing Aircraft in a Ground Based Air Defence Environment Presentation by Jacques du Toit and Willa Lotz Division of Applied.

Slides:



Advertisements
Similar presentations
Image Modeling & Segmentation
Advertisements

Pattern Recognition and Machine Learning: Kernel Methods.
Your Name Your Title Your Organization (Line #1) Your Organization (Line #2) Semester 2 Update Joe Hoatam Josh Merritt Aaron Nielsen.
2 Project Management  Management of work to develop and implement an innovation or change in an existing organization Examples: –New buildings –Weapon.
The adjustment of the observations
Chapter 4: Linear Models for Classification
Multivariate linear models for regression and classification Outline: 1) multivariate linear regression 2) linear classification (perceptron) 3) logistic.
Statistical NLP: Lecture 11
Visual Recognition Tutorial
P REDICTING ZERO - DAY SOFTWARE VULNERABILITIES THROUGH DATA MINING Su Zhang Department of Computing and Information Science Kansas State University 1.
Pattern Recognition and Machine Learning
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks Lei Fang (Syracuse) Wenliang (Kevin) Du (Syracuse) Peng Ning (North Carolina State)
Ambiguity in Radar and Sonar Paper by M. Joao D. Rendas and Jose M. F. Moura Information theory project presented by VLAD MIHAI CHIRIAC.
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
CSE 221: Probabilistic Analysis of Computer Systems Topics covered: Exponential distribution Reliability and failure rate (Sec )
Effective Gaussian mixture learning for video background subtraction Dar-Shyang Lee, Member, IEEE.
Tutorial on Local Polynomial Regression (LPR): An Alternative to Ordinary Lease Squares by John M. Clapp March 10, 2000 I. Motivation: What LPR does. II.
Arizona State University DMML Kernel Methods – Gaussian Processes Presented by Shankar Bhargav.
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
Introduction to Data Mining Data mining is a rapidly growing field of business analytics focused on better understanding of characteristics and.
1 Multivariate Normal Distribution Shyh-Kang Jeng Department of Electrical Engineering/ Graduate Institute of Communication/ Graduate Institute of Networking.
Simple set-membership methods and control algorithms applied to robots for exploration Fabrice LE BARS.
Principles of the Global Positioning System Lecture 11 Prof. Thomas Herring Room A;
Muhammad Moeen YaqoobPage 1 Moment-Matching Trackers for Difficult Targets Muhammad Moeen Yaqoob Supervisor: Professor Richard Vinter.
Forest Fire Detection in the Wildland-Urban Interface James Barnier Wisconsin Department of Natural Resources Division of Forestry FERIC Wildfire Detection.
Overview G. Jogesh Babu. Probability theory Probability is all about flip of a coin Conditional probability & Bayes theorem (Bayesian analysis) Expectation,
Introduction to variable selection I Qi Yu. 2 Problems due to poor variable selection: Input dimension is too large; the curse of dimensionality problem.
Least-Mean-Square Training of Cluster-Weighted-Modeling National Taiwan University Department of Computer Science and Information Engineering.
Statistical NLP: Lecture 8 Statistical Inference: n-gram Models over Sparse Data (Ch 6)
Learning Theory Reza Shadmehr logistic regression, iterative re-weighted least squares.
Combined Central and Subspace Clustering for Computer Vision Applications Le Lu 1 René Vidal 2 1 Computer Science Department, Johns Hopkins University,
STELLENBOSCH UNIVERSITY
Threat Evaluation & Weapon Assignment Centre of Excellence Jaco Roux* & JH van Vuuren* 27 November 2008 STELLENBOSCH UNIVERSITY LEDGER Conference ‘08.
Various topics Petter Mostad Overview Epidemiology Study types / data types Econometrics Time series data More about sampling –Estimation.
Data Mining Practical Machine Learning Tools and Techniques Chapter 4: Algorithms: The Basic Methods Section 4.6: Linear Models Rodney Nielsen Many of.
Towards Coastal Threat Evaluation Decision Support Presentation by Jacques du Toit Operational Research University of Stellenbosch 3 December 2010.
CS 782 – Machine Learning Lecture 4 Linear Models for Classification  Probabilistic generative models  Probabilistic discriminative models.
1 S ystems Analysis Laboratory Helsinki University of Technology Kai Virtanen, Tuomas Raivio and Raimo P. Hämäläinen Systems Analysis Laboratory Helsinki.
Chin-Yu Huang Department of Computer Science National Tsing Hua University Hsinchu, Taiwan Optimal Allocation of Testing-Resource Considering Cost, Reliability,
Machine Learning CUNY Graduate Center Lecture 4: Logistic Regression.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: ML and Simple Regression Bias of the ML Estimate Variance of the ML Estimate.
Detecting Group Differences: Mining Contrast Sets Author: Stephen D. Bay Advisor: Dr. Hsu Graduate: Yan-Cheng Lin.
A Model for Learning the Semantics of Pictures V. Lavrenko, R. Manmatha, J. Jeon Center for Intelligent Information Retrieval Computer Science Department,
Solution methodologies for the classical Grant van Dieman Friday 30 th November 2007 Supervisor: Prof. JH van Vuuren Co-supervisor: Mr JN Roux assignment.
April 28, 2003 Early Fault Detection and Failure Prediction in Large Software Systems Felix Salfner and Miroslaw Malek Department of Computer Science Humboldt.
Multivariate Data Analysis Chapter 1 - Introduction.
1 Evaluation of TEWA in a Ground Based Air Defense Environment Presenters: Basie Kok, Andries Heyns Supervisor: Prof. Jan van Vuuren.
Applications of Supervised Learning in Bioinformatics Yen-Jen Oyang Dept. of Computer Science and Information Engineering.
Fitting Mathematical Models to Data Adapting Likelihood Based Inference Meaningful Modeling of Epidemiologic Data, 2010 AIMS, Muizenberg, South Africa.
Model Fusion and its Use in Earth Sciences R. Romero, O. Ochoa, A. A. Velasco, and V. Kreinovich Joint Annual Meeting NSF Division of Human Resource Development.
S ystems Analysis Laboratory Helsinki University of Technology Game Theoretic Validation of Air Combat Simulation Models Jirka Poropudas and Kai Virtanen.
Gaussian Process and Prediction. (C) 2001 SNU CSE Artificial Intelligence Lab (SCAI)2 Outline Gaussian Process and Bayesian Regression  Bayesian regression.
Chapter Seventeen Copyright © 2004 John Wiley & Sons, Inc. Multivariate Data Analysis.
Computacion Inteligente Least-Square Methods for System Identification.
Flexible Speaker Adaptation using Maximum Likelihood Linear Regression Authors: C. J. Leggetter P. C. Woodland Presenter: 陳亮宇 Proc. ARPA Spoken Language.
Linear Models Tony Dodd. 21 January 2008Mathematics for Data Modelling: Linear Models Overview Linear models. Parameter estimation. Linear in the parameters.
Ch 1. Introduction Pattern Recognition and Machine Learning, C. M. Bishop, Updated by J.-H. Eom (2 nd round revision) Summarized by K.-I.
Colorado Center for Astrodynamics Research The University of Colorado 1 STATISTICAL ORBIT DETERMINATION Statistical Interpretation of Least Squares ASEN.
Overview G. Jogesh Babu. R Programming environment Introduction to R programming language R is an integrated suite of software facilities for data manipulation,
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 1: INTRODUCTION.
HST 583 fMRI DATA ANALYSIS AND ACQUISITION
Dept. Computer Science & Engineering, Shanghai Jiao Tong University
Ch3: Model Building through Regression
Data Presentation Carey Williamson Department of Computer Science
POINT ESTIMATOR OF PARAMETERS
Mathematical Foundations of BME Reza Shadmehr
Principles of the Global Positioning System Lecture 11
Carey Williamson Department of Computer Science University of Calgary
Factor Analysis.
A Gentle Tutorial of the EM Algorithm and its Application to Parameter Estimation for Gaussian Mixture and Hidden Markov Models Jeff A. Bilmes International.
Presentation transcript:

Probability of Attack of Fixed Wing Aircraft in a Ground Based Air Defence Environment Presentation by Jacques du Toit and Willa Lotz Division of Applied Mathematics Department of Mathematical Sciences University of Stellenbosch November 2007 Supervisors: J.H. van Vuuren (Department of Logistics) J.N. Roux (Reutech Radar Systems)

© Jacques du Toit 2007 Outline Jacques du Toit

3 of 44  Part A  Probabilistic threat evaluation model overview  Flight path generation  Time to target probability  Part B (Willa Lotz)  Probabilistic threat evaluation model overview  Aircraft attack technique analysis  Aircraft attribute analysis  Aircraft membership estimations Outline Jacques du Toit

© Jacques du Toit 2007 Probabilistic Threat Evaluation Model Overview

5 of 44 Aircraft attack techniques (flight profiles) Probabilistic Threat Evaluation Model Overview Combat Hump Dive Combat Turn Dive Toss-Bombing High Level Dive Low Level Attack I Low Level Attack II Low Level Attack III Low Level Attack IV

6 of 44 Model components Component I (probability of attack) Probabilistic Threat Evaluation Model Overview

7 of 44 Probabilistic Threat Evaluation Model Overview

© Jacques du Toit 2007 Flight path generation

9 of 44 Data considerations Waypoint Flight path generation

10 of 44 Flight path generation Dynamics Approach

11 of 44 Flight path generation Path Planner

12 of 44 Curve scheme (B-splines) Flight path generation

13 of 44 Weighted and constrained least squares Interpolated Approximated Flight path generation

14 of 44 Weighted and constrained least squares Flight path generation

15 of 44 Flight path generation Weighted and constrained least squares

16 of 44 Weighted and constrained least squares Flight path generation

17 of 44 Incorporating time Flight path generation

18 of 44 Multiple profiles Flight path generation

© Jacques du Toit 2007 Time to target probability

20 of 44 Time to target probability

© Willa Lotz 2007 Outline Willa Lotz

22 of 44 Outline Willa Lotz  Part A (Jacques du Toit)  Probabilistic threat evaluation model overview  Flight path generation  Time to target probability  Part B  Probabilistic threat evaluation model overview  Aircraft attack technique analysis  Aircraft attribute analysis  Aircraft membership estimations

© Willa Lotz 2007 Probabilistic Threat Evaluation Model Overview

24 of 44 Aircraft attack techniques (flight profiles) Probabilistic Threat Evaluation Model Overview Combat Hump Dive Combat Turn Dive Toss-Bombing High Level Dive Low Level Attack I Low Level Attack II Low Level Attack III Low Level Attack IV

25 of 44 Aircraft type Formative Element Combinations Aircraft attack technique Weapon type } C2=C2= {,, }, C1=C1= {, Cn=Cn= { },, Probabilistic Threat Evaluation Model Overview

26 of 44 Model components: Component I (Probability of attack): Probabilistic Threat Evaluation Model Overview

27 of 44 Low Level Attack I Low Level Attack II Combat Turn Dive High Level Dive Low Level Attack III Low Level Attack IV Probabilistic Threat Evaluation Model Overview Aircraft attack techniques (flight profiles) Combat Hump Dive Toss-Bombing Combat Hump Dive Toss-Bombing Toss-Bombing (2D) Combat Hump Dive (2D) Aircraft attack technique stages Combat Hump Dive (3D) Toss-Bombing (3D)

28 of 44 Model components: Component I (Probability of attack): Probabilistic Threat Evaluation Model Overview

29 of 44 Model components: Component I (Probability of attack): Probabilistic Threat Evaluation Model Overview

© Willa Lotz 2007 Aircraft Attack Technique Analysis

31 of 44 Aircraft Attack Technique Analysis  Each aircraft attack technique associated with a formative element combination is subdivided into a number of smaller segments known as stages. Combat Hump Dive (2D) Combat Hump Dive (3D)

32 of 44  Technique applied  Data mining (Cluster analysis) Aircraft Attack Technique Analysis  Each aircraft attack technique associated with a formative element combination is subdivided into a number of smaller segments known as stages.  Reduce data requirements  Reduce real-time computations  The total number of formative elements combinations considered are reduced.

33 of 44 Aircraft Attack Technique Analysis

© Willa Lotz 2007 Aircraft Attribute Analysis

35 of 44 Aircraft Attribute Analysis  The minimum number of aircraft attributes, necessary to describe each stage of an aircraft attack technique associated with a given formative element combination, are identified. Combat Hump Dive (2D) Combat Hump Dive (3D)

36 of 44 Aircraft Attribute Analysis  The minimum number of aircraft attributes, necessary to describe each stage of an aircraft attack technique associated with a given formative element combination, are identified.  Reduce data requirements  Reduce real-time computations  Technique applied  Data mining (Regression analysis)

37 of 44 Aircraft Attribute Analysis

© Willa Lotz 2007 Aircraft Membership Estimations

39 of 44  Techniques applied  Density estimation 1.Kernel estimation 2.Maximum Likelihood Estimation (MLE) Model components: Component I (Probability of attack): Aircraft membership Estimations

40 of 44 Estimating the probability that an observed aircraft are embodied in a specific formative element combination Aircraft Membership Estimations

41 of 44 Estimating the probability that an observed aircraft finds itself in any one of the stages of an aircraft attack technique associated with a specific formative element combination Aircraft Membership Estimations

42 of 44 Questions Jacques du Toit Division of Applied Mathematics Department of Mathematical Sciences University of Stellenbosch Willa Lotz Division of Applied Mathematics Department of Mathematical Sciences University of Stellenbosch

43 of 44 Example

44 of 44 Example Example: X 6 X 2

45 of 44 Example System time Product S388%0% S293%19%18% S117%88%15% S012%100%12% = 45% System time Product S489%0% S341%0% S220%4%1% S119%47%9% S03%100%3% = 13% = (0.13 X 0.75) + (0.45 X 0.25) = 21%

46 of 44 Questions Jacques du Toit Division of Applied Mathematics Department of Mathematical Sciences University of Stellenbosch Willa Lotz Division of Applied Mathematics Department of Mathematical Sciences University of Stellenbosch