Steinberg, 2015 - Google Patents
A model for threat assessmentSteinberg, 2015
- Document ID
- 3435962174315110085
- Author
- Steinberg A
- Publication year
- Publication venue
- Fusion Methodologies in Crisis Management: Higher Level Fusion and Decision Making
External Links
Snippet
A concept for characterizing, predicting and recognizing threat situations is developed. The goal is to establish a systematic approach to automation of some of these functions. Approaches are discussed to address the fundamental problems of (a) sparse and …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
- G06N5/046—Forward inferencing, production systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/66—Radar-tracking systems; Analogous systems where the wavelength or the kind of wave is irrelevant
- G01S13/72—Radar-tracking systems; Analogous systems where the wavelength or the kind of wave is irrelevant for two-dimensional tracking, e.g. combination of angle and range tracking, track-while-scan radar
- G01S13/723—Radar-tracking systems; Analogous systems where the wavelength or the kind of wave is irrelevant for two-dimensional tracking, e.g. combination of angle and range tracking, track-while-scan radar by using numerical data
- G01S13/726—Multiple target tracking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shevlane et al. | Model evaluation for extreme risks | |
Stanton et al. | How a submarine returns to periscope depth: Analysing complex socio-technical systems using Cognitive Work Analysis | |
Steinberg et al. | Adaptive context assessment and context management | |
Johansson | Evaluating the performance of TEWA systems | |
Harris et al. | Advances in command, control & communication systems | |
Golovianko et al. | Towards digital cognitive clones for the decision-makers: adversarial training experiments | |
Kwik et al. | Algorithmic fog of war: When lack of transparency violates the law of armed conflict | |
Steinberg | A model for threat assessment | |
Rein et al. | Your high-level information is my low-level data-A new look at terminology for multi-level fusion | |
Chander et al. | Toward trustworthy artificial intelligence (TAI) in the context of explainability and robustness | |
McAnally et al. | Inference in the wild: A framework for human situation assessment and a case study of air combat | |
Barnett et al. | Using causal models to manage the cyber threat to C2 agility: Working with the benefit of hindsight | |
Al-Khudhairy et al. | Towards integrative risk management and more resilient societies | |
Steinberg | Threat assessment technology development | |
Steinberg et al. | Adaptive context exploitation | |
Lewis et al. | Leveraging AI to mitigate civilian harm | |
Johnson et al. | Mapping artificial intelligence to the naval tactical kill chain | |
Cook et al. | Artificial intelligence in strategic planning and military operations | |
Blum et al. | Probabilistic warnings in national security crises: Pearl Harbor revisited | |
Falcone | Machine learning systems in nuclear command, control, and communications architecture: Opportunities, limitations, and recommendations for strategic commanders | |
Caelli et al. | Analytics for awareness in maritime surveillance: from data to tactical insight | |
Piunti et al. | Multimodal trust formation with uninformed cognitive maps (UnCM) | |
Kroll et al. | Understanding, Assessing, and Mitigating Safety Risks in Artificial Intelligence Systems | |
Blasch et al. | URREF Risk analysis towards Data Fusion Certification | |
Truter et al. | Prerequisites for the design of a threat evaluation and weapon assignment system evaluator |