Operational Capability: An underlying simplification of a data encoding standard has been developing over the past decade and is being demonstrated in.

Slides:



Advertisements
Similar presentations
Rue du Rhône 114- CH-1204 Geneva - T: F: Ecma TC43: Universal 3D.
Advertisements

Design, prototyping and construction
1 Skilling Up for Patient-Centered E-Health E. Vance Wilson University of Wisconsin-Milwaukee.
XProtect ® Professional Efficient solutions for mid-sized installations.
Knowledge Pathways in IT
UNIVERSITY OF TWENTE - FACULTY OF GEO-INFORMATION SCIENCE AND EARTH OBSERVATION (ITC) Human Sensor Web project h2.0 Inform and Empower Initiative Human.
Common Core State Standards OVERVIEW CESA #9 - September 2010 Presented by: CESA #9 School Improvement Services Jayne Werner and Yvonne Vandenberg.
Collaboration Proposal Proposed Interaction between CSDL and AAI With Narration by Nicholas J. Parks.
Libraries in FE Colleges Capita Library Management System Demonstration May 2013.
Identifying trends in Accessible Content Processing Neil McKenzie, FNB (Dutch Library for the Blind), Amsterdam.
2003 Indigo Technology, Inc. All Rights Reserved Alliance Portfolio Computing Infrastructure Services Customer Relationship Management Engineering Services.
A Bridge to the Future Using a Public (non-ownable) Demand Side Communication Infrastructure.
Provisional draft ICT for Independent Living and Inclusion European Commission, DG Information Society and Media E-Inclusion Unit (H3) Challenge 7.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
© 2005 Prentice Hall2-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
Systems Development (SD) Presentation Michael Webb IT Director for Medicaid Utah Department of Health UDOH Informatics Brownbag August.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Annual SERC Research Review - Student Presentation, October 5-6, Extending Model Based System Engineering to Utilize 3D Virtual Environments Peter.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
{ GOAL: Prepare ISET Sidi Bouzid graduates to meet the economic demands of the local community Objective 1: To enhance the capacity of ISET Sidi Bouzid.
.. Skytap Better Software Faster Visual Studio Industry Partner Skytap NEXT STEPS Contact us at: Insert your company description here.
Chapter 2: Approaches to System Development
Alexandra Savelieva, Sergey Avdoshin, PhD National Research University “Higher School of Economics” Alexandra Savelieva, Sergey Avdoshin, PhD National.
Software Development *Life-Cycle Phases* Compiled by: Dharya Dharya Daisy Daisy
Page 1 MODEL TEST in the small GENERALIZE PROGRAM PROCESS allocated maintenance changes management documents initial requirement project infrastructure.
Copyright 2013, Net.Orange, Inc. All rights reserved.Confidential and proprietary. Do not distribute without permission. Net.Orange App Development Net.Orange.
-Nikhil Bhatia 28 th October What is RUP? Central Elements of RUP Project Lifecycle Phases Six Engineering Disciplines Three Supporting Disciplines.
1 ISA&D7‏/8‏/ ISA&D7‏/8‏/2013 Systems Development Life Cycle Phases and Activities in the SDLC Variations of the SDLC models.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
SCSC 311 Information Systems: hardware and software.
International Center for Agricultural Research in the Dry Areas Web strategy ICARDA2.0 :: re-design project 1.
1 Chapter 5 Software Engineering Practice. 2 What is “Practice”? Practice is a broad array of concepts, principles, methods, and tools that you must consider.
© 2008 IBM Corporation ® IBM Cognos Business Viewpoint Miguel Garcia - Solutions Architect.
Delivering business value through Context Driven Content Management Karsten Fogh Ho-Lanng, CTO.
What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008.
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
{ GOAL: Prepare ISETs Medenine/Tataouine graduates to meet the economic demands of the local community Objective 3: ISETs Medenine/Tataouine becomes recognized.
L6-S1 UML Overview 2003 SJSU -- CmpE Advanced Object-Oriented Analysis & Design Dr. M.E. Fayad, Professor Computer Engineering Department, Room #283I College.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Computing Ontology Part II. So far, We have seen the history of the ACM computing classification system – What have you observed? – What topics from CS2013.
1 Course of Action For Strengthening Transportation Communications and Coordination In the National Capital Region Presented by John M. Contestabile Maryland.
+ SUH Incorporated Executive Briefing. + SUH Business Opportunity I.T. solutions are needed to improve SUH’s ability to operate Sales Support team would.
Software Life Cycle The software life cycle is the sequence of activities that occur during software development and maintenance.
Sensor Standards Harmonization Working Group Report Summary of Sensor Standards Harmonization Working Group (SSHWG) Meeting held on Sensor Standards Harmonization.
2 nd G2G Technical Seminar – May 2013 FORECASTS ON RESEARCH IN ENGINEERING DESIGN THEORY, TOOLS AND METHODOLOGY AND ITS IMPACT ON PRODUCT DESIGN AND ENGINEERING.
SEAMLESS: Demo Version 1.4 “Presenting current developments and welcoming your feedback” For contact:
Independent Insight for Service Oriented Practice Summary: Service Reference Architecture and Planning David Sprott.
Cyberinfrastructure Overview Russ Hobby, Internet2 ECSU CI Days 4 January 2008.
Paul Alexander 2 nd SKADS Workshop October 2007 SKA and SKADS Costing The Future Paul Alexander Andrew Faulkner, Rosie Bolton.
DICOMA DIsaster COntrol MAnagement Co-summit & 31 October, Paris - France Eloy González Ortega Indra Software Labs.
ANALYSIS PHASE OF BUSINESS SYSTEM DEVELOPMENT METHODOLOGY.
High Risk 1. Ensure productive use of GRID computing through participation of biologists to shape the development of the GRID. 2. Develop user-friendly.
0 What Does SIP Bring to Your Customer Experience ? Extend VoIP and IP Contact Center values through support of SIP o Media and location independent support.
Application of the ISO for BIM Xenia Fiorentini, Engisis.
V7 Foundation Series Vignette Education Services.
Accreditation of study programs at the Faculty of information technologies Tempus SMGR BE ESABIH EU standards for accreditation of study.
Configuration Control (Aliases: change control, change management )
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
WS ►I Promoting Web services interoperability across platforms, applications and programming languages October, 2002.
Open GIS Consortium Charles Heazel March 19, 2003.
11/03/2016.
Chapter 1 Computer Technology: Your Need to Know
System Wide Information Management (SWIM)
OBJECT-ORIENTED APPROACH TO OFFICIAL STATISTICS
OU BATTLECARD: Oracle WebCenter Training
Presentation transcript:

Operational Capability: An underlying simplification of a data encoding standard has been developing over the past decade and is being demonstrated in our prototype, and in systems that we have knowledge of. This simplification is provably optimal in terms of encoding and data mining over relational data. A seamless integration occurs when everyone uses this optimal solution. Information assurance (IA) follows when secure channels are designed for the flow of information having this form, and the management of information becomes unencumbered by technical problems related to software incompatibilities. Legacy data can be easily harvested. Human language can be associated with structured ontologies and the means to develop these resources provided to the user. Representation of the global and specific conversation are encoded into a visual form using graph theory. Geographic and equipment data can be encoded in the same form. Information sharing develops out of need and in context, and is not inhibited by information technology infrastructure limitations. The capability is in the advanced prototype stage. Deployment and transition requires the development of a curriculum and training experience in the incident management arena. BAA Number: BAA White Paper Control Number: SGIB Title: Architecture for Managing Incident Information (AMII) Proposed Technical Approach: The problem is informational transparency within a secure environment. This problem is approached using a optimal data encoding format which has no proprietary limitations. Several existing knowledge management or information creation software products will be modified to interact with a core environment operating system based on a minimal Linux kernel and the a Ontology referential base (Orb). Telecommunications device interfaces to PocketPC and phones will be developed. Visualization software is to be integrated and user training materials developed. The approach also has a non technical human-factors aspect. Deep and broad curriculum will be developed over the concepts of knowledge creation and sharing within communities of practice. This will not be a marketing tool, but will be university curriculum participated in by faculty from several universities and form several disciplines. Cost and Schedule: § Quarter 1: A series of workshops will be held and advanced benchmarking and feasibility tests made. Collaboration with State of Michigan departments responsible for the human factors interface to first responders. Quarter 2: Technologies will be tailored to incident command communities and first responder communities. Quarter 3: A series of workshops will be held and prototype implementations of the proposed technologies will be demonstrated and critiqued. Real world simulations will be offered and training requirements studied. Quarter 4: The prototype implementations will be updated and simulated scenario deployments demonstrated to HSARPA. A work plan for implementation and deployment of a production version of the system will be prepared and submitted for approval. First year cost: $946,000 Deliverables: Several knowledge management or data mining software systems will be integrated based on the common data encoding, called Orbs. The Prototype will develop a small distributed operating environment consisting of computers, phones and PocketPC. Training materials and educational curriculum will be developed. Specific scenario based situational ontology will be developed for re-use. Reports will be generated. Field training, test deployments and transition programs will be delivered. Contact Information: Principle Investigator: Peter R. Stephenson The Center for Regional and National Security, Eastern Michigan University Principle Investigator: Peter R. Stephenson 25 October 2004 Nine Step Process Model: Creates structural ontology through a real time measurement of information flow and uses this to faceplate the communication of all essential information Data mining of unstructured text: One of our preliminary deployments as a taxonomy generation tool for the FCC