COMMITMENT. &SOLUTIONS Act like someone s life depends on what we do. UNPARALLELED

Similar documents
EECS 433 Statistical Pattern Recognition

! Towards a Human Factors Ontology for Cyber Security!

Supplementary notes for lecture 8: Computational modeling of cognitive development

Predicting Breast Cancer Survivability Rates

A Sleeping Monitor for Snoring Detection

Embracing Complexity in System of Systems Analysis and Architecting

COMMITMENT. &SOLUTIONS Act like someone s life depends on what we do. TAKE THE FUZE SAFETY DESIGN QUIZ, PART I UNPARALLELED

Leveraging Expert Knowledge to Improve Machine-Learned Decision Support Systems

Quantitative Evaluation of Edge Detectors Using the Minimum Kernel Variance Criterion

Bayesian Perception & Decision for Intelligent Mobility

A Scoring Policy for Simulated Soccer Agents Using Reinforcement Learning

VIDEO SURVEILLANCE AND BIOMEDICAL IMAGING Research Activities and Technology Transfer at PAVIS

Improved Intelligent Classification Technique Based On Support Vector Machines

A Brief Introduction to Bayesian Statistics

Introduction to Machine Learning. Katherine Heller Deep Learning Summer School 2018

Working in post conflict zone is as stressful as working home

A Bayesian Network Model of Knowledge-Based Authentication

Sparse Coding in Sparse Winner Networks

Semiotics and Intelligent Control

A Process Tracing Approach to the Investigation of Situated Cognition

Automatic Detection of Anomalies in Blood Glucose Using a Machine Learning Approach

Applying STPA to the Artificial Pancreas for People with Type 1 Diabetes

Behavioral Data Mining. Lecture 4 Measurement

CS343: Artificial Intelligence

Chapter 11: Advanced Remedial Measures. Weighted Least Squares (WLS)

Cogs 202 (SP12): Cognitive Science Foundations. Computational Modeling of Cognition. Prof. Angela Yu. Department of Cognitive Science, UCSD

UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2014

Thought Technology Ltd.

KNOWLEDGE VALORIZATION

Using Probabilistic Reasoning to Develop Automatically Adapting Assistive

Evaluation of CBT for increasing threat detection performance in X-ray screening

CHAPTER 6 HUMAN BEHAVIOR UNDERSTANDING MODEL

ERA: Architectures for Inference

Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence

Evaluation of CBT for increasing threat detection performance in X-ray screening

Intelligent Edge Detector Based on Multiple Edge Maps. M. Qasim, W.L. Woon, Z. Aung. Technical Report DNA # May 2012

Reasoning about Partial Goal Satisfaction for Requirements and Design Engineering

Type and quantity of data needed for an early estimate of transmissibility when an infectious disease emerges

Programming with Goals (3)

Artificial Intelligence Programming Probability

TESTING at any level (e.g., production, field, or on-board)

COMMITMENT &SOLUTIONS UNPARALLELED. Assessing Human Visual Inspection for Acceptance Testing: An Attribute Agreement Analysis Case Study

Systems Engineering Guide for Systems of Systems. Summary. December 2010

JDiBrief Security Visual Inspection with X-rays: SUMMARY (1 of 5)

Remarks on Bayesian Control Charts

Augmented Cognition to enhance human sensory awareness, cognitive functioning and psychic functioning: a research proposal in two phases

The Open Access Institutional Repository at Robert Gordon University

Copenhagen, Denmark, September August Malaria

Application of distributed lighting control architecture in dementia-friendly smart homes

Discussion Meeting for MCP-Mod Qualification Opinion Request. Novartis 10 July 2013 EMA, London, UK

COMP90049 Knowledge Technologies

Belief Revision Controlled by Meta-abduction

Structural assessment of heritage buildings

M.Sc. in Cognitive Systems. Model Curriculum

Certification in Structural Health Monitoring Systems

Stochastic Elements in Models to Support Disease Control Policy How Much Detail is Enough?

Predictive Mutation Testing

A Naïve Bayesian Classifier for Educational Qualification

A STATISTICAL PATTERN RECOGNITION PARADIGM FOR VIBRATION-BASED STRUCTURAL HEALTH MONITORING

Bayesian models of inductive generalization

Intelligent Autonomous Agents. Ralf Möller, Rainer Marrone Hamburg University of Technology

CS148 - Building Intelligent Robots Lecture 5: Autonomus Control Architectures. Instructor: Chad Jenkins (cjenkins)

Adjusting for mode of administration effect in surveys using mailed questionnaire and telephone interview data

Image processing for cardiac and vascular applications

Introduction and Historical Background. August 22, 2007

Emotion Recognition using a Cauchy Naive Bayes Classifier

Accuracy Requirements for a Hypoglycemia Detector: An Analytical Model to Evaluate the Effects of Bias, Precision, and Rate of Glucose Change

Automatic Detection of Anomalies in Blood Glucose Using a Machine Learning Approach

A NEW DIAGNOSIS SYSTEM BASED ON FUZZY REASONING TO DETECT MEAN AND/OR VARIANCE SHIFTS IN A PROCESS. Received August 2010; revised February 2011

ABSTRACT I. INTRODUCTION. Mohd Thousif Ahemad TSKC Faculty Nagarjuna Govt. College(A) Nalgonda, Telangana, India

Anomaly Assessment and Repair Panel

Project: Feedback Systems for Alternative Treatment of Obstructive Sleep Apnea

Federal Initiatives in Smart Communities and the Internet of Things

arxiv: v1 [cs.ai] 28 Nov 2017

Finding Information Sources by Model Sharing in Open Multi-Agent Systems 1

Rational Agents (Chapter 2)

Fuzzy Expert System Design for Medical Diagnosis

Selecting a research method

International Journal of Engineering Trends and Applications (IJETA) Volume 4 Issue 2, Mar-Apr 2017

Christina Martin Kazi Russell MED INF 406 INFERENCING Session 8 Group Project November 15, 2014

Week 2 Video 3. Diagnostic Metrics

Brief Summary of Liminal thinking Create the change you want by changing the way you think Dave Gray

Research Design. Beyond Randomized Control Trials. Jody Worley, Ph.D. College of Arts & Sciences Human Relations

CONFOCAL MICROWAVE IMAGING FOR BREAST TUMOR DETECTION: A STUDY OF RESOLUTION AND DETECTION ABILITY

ITIL v3 Service Management as a Practice

Architecture of an Artificial Immune System

Lecture 3: Bayesian Networks 1

Behavioural Economics University of Oxford Vincent P. Crawford Michaelmas Term 2012

Intent Inference and Action Prediction using a Computational Cognitive Model

Frailty Ascertainment: Beginning of the pathway to treatment

The Epidemic Model 1. Problem 1a: The Basic Model

Artificial Intelligence Lecture 7

2012 Course : The Statistician Brain: the Bayesian Revolution in Cognitive Science

TEMPERATURE and HUMIDITY TRANSDUCER SUPPLIED P18L TYPE USER S MANUAL. from a CURRENT LOOP

Plan Recognition through Goal Graph Analysis

Low-Cost, High Fidelity Ground Vehicle Targets for Test & Evaluation

Formulation of Research Design

Development of a Model and a Mobile Computing Framework for Effective Self-

Classification of Smoking Status: The Case of Turkey

Transcription:

Presented to: 4th Annual SERC Doctoral Students Forum 16 December 2016 UNPARALLELED COMMITMENT &SOLUTIONS Act like someone s life depends on what we do. U.S. ARMY ARMAMENT RESEARCH, DEVELOPMENT & ENGINEERING CENTER

C-IED SYSTEM Methods of pattern recognition, their strengths, weaknesses, and constraints with respect to anomaly detection. 2

Anomaly Detection: ANOMALY VS. PATTERN RECOGNITION Statistical deviation from a norm Looks for evidence of interruptions in energy flows Computationally simple [2] Usually direct observation Pattern Recognition: Hypothesizes the class of objects perceived by the sensors by matching to learned models [3] Feature vectors Good for indirect observation 2. Yinon, J., Counterterrorist detection techniques of explosives. 2007, Oxford: Elsevier. 3. Duda, R.O., P.E. Hart, and D.G. Stork, Pattern Classification. 2, revised ed. 2004: Wiley. 3 3

What exactly is the detection system measuring? 4

WHAT THE SYSTEM MEASURES The system measures abnormal conditions with regards to normal scans of the human body under magnetic, infrared, microwave sensors, as well as behavioral deviations from the normal gait and biometric information. The detection system attempts to indirectly detect improvised explosive devices by applying pattern matching methods on the potential carriers of the IEDs. 5 5

SYSTEM ATTRIBUTES 1.Adaptability 2.Manpower Reduction 3.Cost Reduction 4.Design for Robustness 5.Open architecture 6

ARCHITECTURAL PILLARS 1.Modularity 2.Scalability 3.Simplicity 4.Openness 5.Common Standards 7

Mobility Patterns Mobility/movement patterns and their implication in the CIED problem. 8

MOBILITY Let an AUS be a particular area under surveillance that contains no Improvised Explosive Devices (IEDs) at time zero (t 0 ) and which might be penetrated by an agent carrying an IED at time k (t k ). Then is an event of the form which results in either no IED introduced in the AUS or an IED introduced in the AUS. The event consists of a potential carrier (human, animal or machine) crossing the threshold of the AUS with or without an IED. Therefore, mobility patterns are of great importance for detection of IEDs. Regarding the aspect of mobility randomness, in the CIED domain mobility randomness is not desirable. Mechanisms and policies are usually set in place to prevent random mobility by groups or individuals to control their flow. 9

Beyond Quality and False Negatives 10

QUALITY Quality and low rate of false negatives are variables of the system in operation, as opposed to the parameters of the system at architecture and design time. High reliability measured in terms of mean time between failures (MBTF) and mean time to repair (MTTR). Plays well with others: lack of interference with normal operations of this includes physical obstruction of normal operations of other systems (physical and electronic.) 11

LAYERING OF TECHNIQUES Layering the techniques to address the utility function 12

LAYERING OF TECHNIQUES The system architecture combines all those techniques into a coherent framework that meets the conditions necessary to support the utility function. Using an open architecture, based on widely accepted standards, the C-IED system is built with a 3-layer approach. 1. Framework: The first layer is the basic framework architecture where elements that compute the results (threat assessment values for individuals, groups and the whole AoI) are identified and encapsulated; I call this part the Inference Engine (IE). 2. Logical Architecture: The second layer of the architecture is the logical model of the system. Logical because it exists in the realm of ideas and math, not in the physical sense of an actual system. 3. Physical Architecture: The third layer of the architecture is a physical instantiation of the second layer. At this level system functionality is allocated to software, hardware or a mix of them. 13

SYSTEM METRICS Let A x be a discrete assessment of threat made by an individual sensor x in the range [0.0, 1.0]. Let W x be a weight assigned to sensor x in the range [0.0, 1.0]. Each individual sensor reading is weighted by a factor that represents the relative confidence assigned to that individual sensor regarding its potential determination that an IED is present in the AoI. Let TA x denote the weighted Threat Assessment of sensor x on a person p Then for each person in the AoI their Threat Assessment Level TAL p which includes adjustment factors given by pattern analysis if applicable is given by:,, The DFV, Data Fusion Value, at time k is the highest Threat Assessment Level (TAL) of the AoI.,, The DFV must satisfy the following two conditions: 0 and 1 The area-wide detection is quantified by a value, called Threat Assessment Value (TAV) which represents the probability of the presence of an IED in the Area of Interest (AoI). A value of 0.0 would represent absolute confidence that there is no IED in the AoI at the moment of the estimation. A value of 1.0 would represent absolute certainty that there is at least an IED in the AoI. The values in between correspond to different estimated probabilities that an IED is present given the detection of indicators of threat without being able to ascertain absolute certainty one way or another. 14

SYSTEM METRICS 2 The DFV is modified by a feedback loop from a system dynamics engine that provides temporary effects on the current estimation based on prior estimations according to Bayes Rule. For example, If DFV at time k-1 was elevated beyond a set threshold that indicates what is the statistical DFV given current conditions of number of people in the AoI, time of day, weather conditions, Day of the week, etc. A positive factor is applied to the DFV at time k to elevate the threat level accordingly. This is done because of the assumption that higher than usual DFVs, but still below the alert-level, could mean that multiple individuals with moderately elevated threat levels may collaborate and assemble an IED from parts each one carried into the AoI. The system dynamics model applies a decay rate to this factor of accumulated threat indication, in order to dissipate the extra indication of risk of threat and avoid a self-reinforcing loop that would produces a false alarm otherwise. Finally, the TAV is the result of multiplying the DFV for the AoI by the systems dynamics model weight factor at time t k. Precision Relevant IED Detection (tp/(tp + fp)) Recall Fraction of IEDs found (tp/(tp + fn)) Naïve Bayes Classifier 15

SYSTEMIGRAM OF METRICS contribute to 16

DATA FUSION Naïve Bayesian Classifier in conjunction with a dynamic system with reinforcing feedback loops. 17

GAMING THE SYSTEM 18

ANTI-SPOOFING Attackers would not be able to use the adaptability of the system to their advantage is because the system is not fully automatic. the human-in-the-loop as a sensor is responsible for inspecting the AoI. The human operator in conjunction with security personnel on the ground coordinate random checks and questioning people and pat downs. the system dynamics portion of the Threat Assessment function would gradually elevate the sensitivity of the whole system by noticing via feedback loops an increase in suspicious readings, even when those readings do not cross the threshold of a system alert 19

MULTI-ENTRY 20

VALIDATION To show superiority of the multi-tiered/multi-entry approach the proposed system needs to demonstrate improvements over an existing non-tiered solution Not only in terms of quality of predictions of IED presence and low false negatives, but also in terms of Adaptability, Manpower reduction, Cost reduction, Design for Robustness, and Openness of the architecture The best approach is to use past data of another similar system in operation in order to contrast and compare results. Initial conversations have started to explore the feasibility of such approach with the US Army. 21