Pedigree information for enhanced situation and threat assessment

被引:0
|
作者
Ceruti, Marion G.
Das, Subrata
Ashenfelter, Adam
Raven, Gary
Brooks, Richard
Sudit, Moises
Chen, Genshe
Wright, Edward
机构
[1] Space & Naval Warfare Syst Ctr, San Diego, CA 92152 USA
[2] Clever Set Inc, Corvallis, OR 97330 USA
[3] Clemson Univ, Clemson, SC 29634 USA
[4] Intelligent Automat Inc, Rockville, MD 20855 USA
[5] Charles River Analyt Inc, Cambridge, MA 02138 USA
[6] Overwatch Syst, Austin, TX 78746 USA
[7] SUNY Buffalo, Ctr Multisource Informat Fus, Buffalo, NY 14260 USA
[8] Informat Extract & Transport, Arlington, VA 22209 USA
来源
2006 9TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4 | 2006年
关键词
automation; interoperability; pedigree metadata; sensor data fusion; situation and threat assessment; threat assessment; uncertainty;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes how pedigree is used to support and enhance situation and threat assessment. It is based on the findings of the technology group of the Data Fusion Levels Two and Three Workshop sponsored by the Office of Naval Research held in Arlington, VA from 15-18 Nov. 2005. It identifies areas that need improvement in situation assessment and threat assessment, such as interoperability, automation, pedigree management, system usability, reliability, and uncertainty. The concept of pedigree must include "standard" metadata, lineage, plus a computational model of the quality of the information. The system must automatically propagate changes and update to derived products when source information or source-pedigree information changes. Several other processes must be automated: generate pedigree, identify and auto fill gaps, fuse pedigree, update pedigree, display of information quality and confidence. The paper concludes with suggestions for future research and development.
引用
收藏
页码:1661 / 1668
页数:8
相关论文
共 50 条
  • [31] Influences on threat assessment in a military context
    Bang, Martin
    Liwang, Hans
    DEFENCE AND SECURITY ANALYSIS, 2016, 32 (03): : 264 - 277
  • [32] Threat assessment using Bayesian networks
    Okello, N
    Thoms, G
    FUSION 2003: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE OF INFORMATION FUSION, VOLS 1 AND 2, 2003, : 1102 - 1109
  • [34] A New Multi-Target Three-Way Threat Assessment Method with Heterogeneous Information and Attribute Relevance
    Gao, Yang
    Lyu, Na
    MATHEMATICS, 2024, 12 (05)
  • [35] School Behavioral Threat Assessment and Management
    Melissa A. Louvar Reeves
    Stephen E. Brock
    Contemporary School Psychology, 2018, 22 (2) : 148 - 162
  • [36] Approximate Reasoning Based on IFRS and DS Theory With its Application in Threat Assessment
    Lu, Yanli
    Lei, Xiaoli
    Zhou, Zhiping
    Song, Yafei
    IEEE ACCESS, 2020, 8 (08): : 160558 - 160568
  • [37] If it walks like a duck: Nanosensor threat assessment
    Chachis, GC
    UNATTENDED GROUND SENSOR TECHNOLOGIES AND APPLICATIONS V, 2003, 5090 : 341 - 347
  • [38] A Framework for Threat Assessment in Access Control Systems
    Khambhammettu, Hemanth
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 187 - 198
  • [39] Student Threat Assessment as an Alternative to Exclusionary Discipline
    Maeng, Jennifer L.
    Cornell, Dewey
    Huang, Francis
    JOURNAL OF SCHOOL VIOLENCE, 2020, 19 (03) : 377 - 388
  • [40] Target Threat Assessment Based on Influence Nets
    Chen, Hui
    Huai, Fuli
    Hou, Yunxiang
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 458 - 462