A Pragmatic Foundation for Defining a Rich Semantic Model of Track Rick Hayes-Roth Professor, Information Sciences Dept., & Curt Blais.

Slides:



Advertisements
Similar presentations
Rulebase Expert System and Uncertainty. Rule-based ES Rules as a knowledge representation technique Type of rules :- relation, recommendation, directive,
Advertisements

Threat Modeling and Sharing. Summary Proposal to kick off Threat Modeling project – Multi-phase approach – Initially: create Cyber Domain PIM and STIX.
Modeling Human Reasoning About Meta-Information Presented By: Scott Langevin Jingsong Wang.
Slides to accompany Weathington, Cunningham & Pittenger (2010), Chapter 4: An Overview of Empirical Methods 1.
Overview of OASIS SOA Reference Architecture Foundation (SOA-RAF)
Object-Oriented Analysis and Design
QinetiQ in confidence © Copyright QinetiQ CCRP: Help in understanding IOCS: 22/23 October 2007.
1 Maritime Information Exchange Model (MIEM) September 29, 2008 Rick Hayes-Roth David Reading
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 8 Slide 1 System models.
Chapter 6 Methodology Conceptual Databases Design Transparencies © Pearson Education Limited 1995, 2005.
Freight Security and the World Economic Forum December 5, 2002.
Lecture Fourteen Methodology - Conceptual Database Design
Modified from Sommerville’s originalsSoftware Engineering, 7th edition. Chapter 8 Slide 1 System models.
Developing Ideas for Research and Evaluating Theories of Behavior
Slide 5.1 Saunders, Lewis and Thornhill, Research Methods for Business Students, 5 th Edition, © Mark Saunders, Philip Lewis and Adrian Thornhill 2009.
IIBA Denver | may 20, 2015 | Kym Byron , MBA, CBAP, PMP, CSM, CSPO
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
Course Instructor: Aisha Azeem
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
Technology Applicability for Prediction & Recognition of Piracy Efforts NATO ASI September 2011 Salamanca, Spain.
Semantic Web and Valued Information at the Right Time (VIRT) Curtis Blais Research Associate MOVES Institute Naval Postgraduate School
Understanding Data Analytics and Data Mining Introduction.
# 1 # 1 Model-based Communication Networks, Valued Information at the Right Time (VIRT) & Rich Semantic Track (RST): Filtering Information by Value to.
Overview of the Database Development Process
PROJECT NAME: DHS Watch List Integration (WLI) Information Sharing Environment (ISE) MANAGER: Michael Borden PHONE: (703) extension 105.
The National and International "Information Sharing Problem": Using XML to Enable Conceptual Modeling, Sharing and Collaboration of "Business Documents"
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 7 Slide 1 System models l Abstract descriptions of systems whose requirements are being.
Effective User Services for High Performance Computing A White Paper by the TeraGrid Science Advisory Board May 2009.
Business Analysis and Essential Competencies
Knowledge representation
Methodology - Conceptual Database Design Transparencies
Methodology Conceptual Databases Design
1 Chapter 15 Methodology Conceptual Databases Design Transparencies Last Updated: April 2011 By M. Arief
material assembled from the web pages at
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
EuroRoadS for JRC Workshop Lars Wikström, Triona Editor of EuroRoadS deliverables D6.3, D6.6, D6.7.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Methodology - Conceptual Database Design. 2 Design Methodology u Structured approach that uses procedures, techniques, tools, and documentation aids to.
Methodology: Conceptual Databases Design
Event Processing A Perspective From Oracle Dieter Gawlick, Shailendra Mishra Oracle Corporation March,
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
Advanced Decision Architectures Collaborative Technology Alliance Regulating the Exchange of Tactical Information Using the KAoS Policy Services Framework.
Sommerville 2004,Mejia-Alvarez 2009Software Engineering, 7th edition. Chapter 8 Slide 1 System models.
Methodology - Conceptual Database Design
Sharing Design Knowledge through the IMS Learning Design Specification Dawn Howard-Rose Kevin Harrigan David Bean University of Waterloo McGraw-Hill Ryerson.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 7 Slide 1 Chapter 7 System Models.
Understanding the Human Network Martin Kruger LCDR Jodie Gooby November 2008.
Maritime Information Sharing Standards and Architecture
Use Cases Use Cases are employed to describe the functionality or behavior of a system. Each use case describes a different capability that the system.
1 Executive Information System Chapter 12 Soft Information.
Modelling Class T07 Conceptual Modelling – Behaviour References: –Conceptual Modeling of Information Systems (Chapters 11, 12, 13 and 14)
Generic Tasks by Ihab M. Amer Graduate Student Computer Science Dept. AUC, Cairo, Egypt.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 8 Slide 1 System models.
Record Authenticity as a Measure of Trust: A View Across Records Professions, Sectors, and Legal Systems Corinne Rogers University of British Columbia.
Dr. Rebhi S. Baraka Advanced Topics in Information Technology (SICT 4310) Department of Computer Science Faculty of Information Technology.
Behavioral Framework Background & Terminology. Behavioral Framework: Introduction  Background..  What was the goal..
# 1 # 1 Model-based Communication Networks, Valued Information at the Right Time (VIRT) & Rich Semantic Track (RST): Filtering Information by Value to.
1 Efficient- Flexible- Cost Effective. 2 The key is to ensure that your clients have a positive experience remotely irrespective of the process you wish.
 To explain why the context of a system should be modelled as part of the RE process  To describe behavioural modelling, data modelling and object modelling.
# 1 # 1 Model-based Communication Networks and VIRT: Filtering Information by Value to Improve Collaborative Decision-Making 10th International Command.
Lecture On Introduction (DBMS) By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
ERP and Related Technologies
1 APPROVED FOR PUBLIC RELEASE U.S. Army Research, Development and Engineering Command ARL-CISD Social Network Analysis Team Leader Visual Analytics Consortium,
Course Outcomes of Object Oriented Modeling Design (17630,C604)
Contextual Intelligence as a Driver of Services Innovation
Enterprise Data Model Enterprise Architecture approach Insights on application for through-life collaboration 2018 – E. Jesson.
Chapter 20 Object-Oriented Analysis and Design
CISE STAKEHOLDER SURVEY
Presentation transcript:

A Pragmatic Foundation for Defining a Rich Semantic Model of Track Rick Hayes-Roth Professor, Information Sciences Dept., & Curt Blais Research Associate, MOVES Institute, Naval Postgraduate School Presentation to OIC-2007 November 29, 2007

2 How do we… …share actionable intelligence in the maritime domain (or air, or ground, …)  across agencies, services and nations  so we can  Quickly exchange and update intelligence products  Detect threats and take quick appropriate actions  Detect anomalies and investigate them  Support and improve collaboration  Document and justify inferences and actions ?

3 Effective Sharing Requirements  Humans and machines will read, edit & write data  Over the next decade, data volumes will soar, so machines will play increasingly important roles  Threats will come from people, vessels, cargo, organizations & facilities that can act over long times with complex histories and interactions  Actors, events & linkages among them accumulate, as inferences, hypotheses & evidence support them  Partners exchange much of this information  Recipients understand this information  How it’s represented & what it means

4 Best Practices in Industry  Several industry consortia have established effective sharing efforts  E.g, electronics (RosettaNet) & mortgage banking (MISMO)  They focus on value delivery chains  End-to-end transactions that deliver significant value to customers  They require information sharing models that enable “straight-through processing”  A series of “services” or “process steps” mediated by “documents” that convey the information required  Information modeling focuses on the right meaning (semantics) to accomplish the intended purpose (pragmatics)  XML schemas define semantic grammars (conceptual frames) that describe important states  Partners validate the schemas by implementing transactions

5 What Kinds of Transactions? Describing dynamic situations so collaborators can intervene or interdict in a timely way Hence, we need a “language” of situations that warrant intervention

6 The Pragmatics of Track : Mobile Entity M 1. Observe, detect, identify, classify and monitor M VIRT (Valued Information at the Right Time) : Push filtered events that convey important news 2. Locate M 3. Infer M’s intent 4. Determine M’s threats T M,D against domain D 5. Predict M’s future location and behavior 6. Alert agent A about M and threats T M,D 7. Determine countermeasures CM(T M,D ) to threats T M,D 8. Inform agent A about countermeasures CM(T M,D )

7 Intelligence = Beliefs of 10 Types (1)A fact (2)An assumption, less certain than a fact (3)A credible eye witness report, viz., ground truth (4)Summary or aggregation of other beliefs, viz., implication (5)Association and fusion of observations that support a simplifying inductive inference, interpretation or abduction (6)A composition (AND) of other beliefs (7)A probable inference or confirming prediction from another belief (8)An improbable inference from another belief, viz., a disconfirming expectation (9)An analyst judgment, intuition, opinion, or concern, based on some other beliefs as well as some inference (10) A pattern-based or rule-based assessment, where a set of beliefs about an entity instantiates a pattern template above some threshold level indicating that the pattern’s interpretation applies

8 Top-Level Track Conceptual Hierarchy Track Identity Characteristics Dynamic State at Time T History of States (past “track”) Predicted States (future “track”) Beliefs Meta-Information Evidence Inferences Error and uncertainty estimates Temporal qualifications Spatial qualifications

9 CMA JCTD identified MDA High-Value Transactions  MDA partners assembled from USCG, NMIC, NORTHCOM, PACOM, EUCOM, NRL, SPAWAR, NPS  High-value “scenarios” identified for CMA users  Detailed vignettes collected for information sharing  Available information sources and models surveyed  Industry and government best practices reviewed  Multiple levels of valued information sharing identified  MIEM addresses, ultimately, all of these levels __________________ CMA = Comprehensive Maritime Awareness JCTD = Joint Capability Technology Demonstration MDA = Maritime Domain Awareness MIEM = Maritime Information Exchange Model

10 Levels of Value Added Information LevelTypeExampleValue added 9 (highest) Case files for key entities Histories, highlights, comprehensive details Enables in-depth predictive analysis 8Threats & anomaliesDangerous undeclared cargo Increased pre-emptive threat reduction 7“Of interest” conditions & watch lists Suspicious cargo on board Increased analytical efficiency 6History, behavior & future projections Voyages & predicted courses Enables basic predictive analysis 5Multiple alternatives & analysis Ambiguity, uncertaintyExplicit assertions of certainty 4Degree of belief & pedigree Evidence, qualityExplicit information about quality 3Fused data & inferred beliefs Position, crewSynergistic improvement in SA 2Caveats & simple meta- data Sensor type, classification Implicit quality assessment 1 (lowest) Sensor system reportsAIS (Automatic Information System) Reduced development costs for consumers

11 MIEM Purpose & Approach Accelerate the creation (among collaborating enterprises) of actionable intelligence about maritime threats and straight-through processing of that intelligence into appropriate interdictions and other related interventions –An XML-based data sharing language standard-in-progress –Applicable across the maritime domain both civil and military –Modular, reusable, and extensible –Non-proprietary

12 Principal Features of MIEM Key Domain Entities – Conveyance/Vessel – Person/Crew/Passenger – Cargo & Facilities – Measurements: Time, Position, Length, Weight, … Key Secondary Concepts – Life-cycle: States, Transitions, Voyages, Epochs – Event – Anomalies & Threats Extensive & Universally Applicable Meta-data – Source, Confidence, Alternatives, Pedigree, Caveats, … – Past, Present & Future Universal Extensibility & Restriction – All classes can be augmented or simplified Conceptual model in modular XML schemas

13 MIEM Primary Objects

14 Conclusions  To make intelligence actionable, we should employ best industry practices for sharing information to accomplish high-value work quickly & effectively  This will require the definition of “documents” that carry information among partners & processes  The rich semantic Track is an obvious first focus  The MIEM aims to define these Track semantics for shared MDA intelligence documents  Track semantics enable VIRT pragmatics, & VIRT requires Track semantics