REFERENCES: 1. "Modeling for Campaign Analysis: Lessons for the Next Generation of Models", Richard
Hillestad, Louis Moore, and Bart Bennett, MR-710-AF, 1996, ISBN 0-8330-2438-8.
2. "Commander Behavior and Course of Action in JWARS", Vakas, Price, Blacksten, and Burdick, Proceedings of the Tenth Conference on Computer Generated Forces, 2001
KEYWORDS: predictive Course-of-Action, adversary modeling, model prediction, predictive simulation, adversary behavior, decision theory
AF04-111 TITLE: An Integrated COA versus eCOA Tool
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Develop tools and techniques for assessing friendly Courses of Action (COA) versus enemy Courses of Action (eCOA), as an integrated process.
DESCRIPTION: Predictive Battlespace Awareness (PBA) is predicated on the ability to generate accurate and timely Courses of Action for both the friendly and enemy combatants. COA development today is predominantly an ad hoc manual process with one side trying to counter his opponent's (anticipated) overall course of action. As such, it fails to address the fact that each side's COA is inexorably linked to what the other is doing, one move at a time. What is needed is a way to assess multiple friendly COAs against multiple enemy COAs, and more to the point, to "dovetail" each individual COA vs eCOA assessment into one chain of events that constitutes the interplay between the two combatants. Ideally, one would like to optimize his/her status at multiple steps (if not at each step) along the way; and of course, an optimization function here would be a duple whereby we aspire to maximize our progress towards achieving our overall offensive goal, while minimizing the enemy's progress in achieving his.
PHASE I: Define the/a process for Friendly and Enemy COA interaction, and the algorithms for an integrated COA versus eCOA assessment tool.
PHASE II: Prototype the integrated COA versus eCOA assessment tool and demonstrate it within an Effects Based Operations context.
DUAL USE COMMERCIALIZATION: The burgeoning concept of Predictive Battlespace Awareness and its dual, Intelligence Preparation of the Battlespace, make this a fertile area in all of the military services for many years to come. At the same time, applications of this approach and envisioned system are rife. Potential commercial applications are Economic Forecasting, Actuarial Computation/Prediction, Gaming/Entertainment.
REFERENCES: 1. "Predictive Battlespace Awareness to Improve Military Effectiveness," Vol. 1, United States Air Force Scientific Advisory Board; SAB-TR-02-02, July 2002.
2. A. Sisti, "Dynamic Situation Assessment and Prediction," Fall 2002Simulation Interoperability Workshop (SIW) Predictive Battlespace Awareness Forum; Sep 02.
KEYWORDS: Course of Action, Predictive Battlespace Awareness, Intelligence Preparation of the Battlespace, Game Theory, Optimization
AF04-112 TITLE: New Information Technologies for Crisis Operations
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Develop information technologies to improve distributed operations and planning for crisis actions.
DESCRIPTION: The 21st century has brought an age of widespread uncertainty and anxiety with frequent crises and emergencies in the commercial and government sectors. There is increased need for crisis management, emergency planning, distributed crisis operations for both industry and government. For the Year 2000 (Y2K) problem, 85% of the America's biggest firms built Year 2000 crisis management and command centers in anticipation of Y2K snafus. Within the commercial and government sectors, multiple organizations or divisions of global companies must jointly collaborate, assess dynamic situations, execute complex plans, and interpret terabytes of information that often is incomplete or conflicting. The national defense leadership and military commanders must handle similar crises and emergencies. As part of this research and development effort, the researcher shall develop and demonstrate innovative information and simulation technologies to improve the assessment, integration, and presentation of decision quality information for improved decision support for crisis operations, crisis planning, and contingency and emergency management. Special emphasis is placed on innovative utilization of intelligent agents, data mining, simulation for predictive analysis, and collaborative technologies. Human-computer interface and advance information infrastructure technologies could include innovative approaches such as multi-user information/knowledge walls, wireless handheld or tablet input devices, and virtual local area networks. Since key stakeholders may be geographically dispersed, a distributed collaborative environment may be necessary to integrate and disseminate the relevant information to the right people in a timely manner. Typical crisis action functions could include: incident management; field command post organization and management; emergency operations center operations; development of response strategy, tactics, and plans; emergency communications; information display; and incident documentation. Proposed methodologies must be capable of executing on commercial-off-the-shelf desktops or workstations and be platform independent. Any graphical depiction and output should comply with industry or international standards, such as HTML, VRML, and graphics metafile images. Methodologies implementing a distributed collaborative environment should be open and standards based to support interfaces to various domain analysis, and simulation and modeling tools.
PHASE I: Specification of information technologies, methodologies, or environment for crisis operations; development of a design concept to assess, integrate and present decision support information for crisis operations, and a proof-of-feasibility demonstration of key enabling concepts.
PHASE II: Design, develop, and demonstrate the information technologies, methodologies, or environment for distributed crisis operations, and detail the plan for Phase III effort.
DUAL USE COMMERCIALIZATION: A robust, off-the-shelf distributed crisis action planning/crisis operation environment for use in defense and emergency preparedness.
REFERENCES: 1. Joint Chiefs of Staff, J-7, "Planning For Joint Operations" http://www.dtic.mil/doctrine/jrm/plans.pdf
2. McQuay, William, "Distributed Collaborative Environments for the 21st Century Laboratory", 2001 Aerospace Conference, March 2001. http://www.collaborationforum.org/collaboration/publications/F45_1.pdf
KEYWORDS: collaborative environment, decision support, crisis action planning
AF04-113 TITLE: Information Management Staff Toolkit
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Investigate and develop a suite of tools for a staff to administer a Net Centric Infosphere.
DESCRIPTION: In an attempt to integrate the capabilities of multiple weapon and information systems, Network Centric Warfare has become a predominant theme in DoD. Part of the network centric warfare approach is the management of the information required by different systems. Information Management is defined as adding structure to semi-structured and unstructured information within an information space as well as the ability to filter, aggregate and disseminate upon this information to allowed and interested parties.
While an information management infrastructure is necessary for Network Centric Warfare, what is lacking are the tools for the administration and operation of the overall information space. It is envisioned that an information/data management staff will be required to rapidly apply and execute policy in the information space. This policy would set the priority of information flow throughout the space and set access to pieces of information within the space. With potentially such a large number of information objects available in the space, and more objects appearing constantly, some innovative means of assessing the state of the information space is critical. This assessment would be influenced by the number of users within the space as well as physical network infrastructure, number of different info object types and available bandwidth.
Innovative and practical approaches would be needed for, but not limited to:
- Dynamic object access policy representation
- Visualization of the information space exclusive of the communication infrastructure for determining quality of service
- Simulation of the introduction of new object types and object traffic to predict the impact of introducing new client applications into the space.
The tools making up the toolkit should access the infosphere and its internals via an Information Management Staff Application Programmer Interface (API).
Throughout this topic it must be clear that the topic is addressing the assessment, administration, and operations of the information space and not the network or bandwidth management. Though each of these have direct influence upon, and are effected by, proper administration of the infosphere.
PHASE I: Define and design a small integrated set of tools and utilities for administering a Network Centric Infosphere. Minimum required capabilities include simulation of the information objects and object flows in the infosphere and its interaction with dynamic policy management.
PHASE II: Develop and demonstrate a prototype set of tools for overall management of an information space.
DUAL USE COMMERCIALIZATION: Military applications include incorporation into the Joint Battlespace Infosphere (JBI) to permit rapid assimilation of military units and systems into a deployed JBI [1]. Commercial application of force templates includes management of trading partner agreements (TPAs) in business-to-business (B2B) commerce [2].
REFERENCES: 1. Building the Joint Battlespace Infosphere, Air Force Scientific Advisory Board Technical Report SAB-TR-99-02, http://www.sab.hq.af.mil/Archives/index.htm
2. The Business Integrator Journal, Summer 2001
3. A Jini-Based Publish and Subscribe Capability http://www.rl.af.mil/programs/jbi/docs.cfm
4. Mercury Class JBI capability Guidelines http://www.rl.af.mil/programs/jbi/mercury.cfm
KEYWORDS: Information Management, Information Management Staff, Joint Battlespace Infosphere (JBI), B2B, Information objects, Infosphere, Application Programmer Interface (API)
AF04-114 TITLE: Physical Layer Information Assurance for Wireless Networks
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Develop innovative physical layer technologies to provide increased information assurance for commercial wireless local area networks.
DESCRIPTION: Wireless networks are becoming an important, and permanent, part of the Global Information Grid. In many cases, free space networking is replacing traditional wired networks because of lower costs, increased flexibility, smaller logistics tail and the advantages of mobility. However, unlike wired networks, limiting the physical access to a wireless network is an extremely challenging problem.
The objective of this effort is to improve overall information assurance by conceiving, developing and demonstrating innovative physical layer enhancements to current and near-term planned commercial wireless networking technologies, topologies, devices, and systems. Current commercial networking technologies within the scope of this effort include those described by the family of IEEE 802.11 standards and Bluetooth. Near-term planned technologies within the scope of this effort include the anticipated follow-ons to the current technologies above. Areas that may be addressed include but are not limited to antennas, modulation, coding, RF watermarking, frequency control, and adaptive techniques. Simple "add-ons" to commercial devices are not as desirable as modifications that are highly integrated or can be done largely through additional/modified software/firmware. Benefits to be derived include increased data and network security, jam resistance, higher availability, increased integrity, stronger authentication, and non-repudiation while keeping cost low due to an efficient leverage of commercial technology.
PHASE I: Feasibility study. Define physical layer techniques to be developed and demonstrated in Phase II.
PHASE II: Prototype demonstration. Develop and demonstrate a prototype network that incorporates the techniques and enhancements defined in Phase I.
DUAL USE COMMERCIALIZATION: Military use of commercial wireless local area network devices will become more feasible with the success of this topic. Examples include critical tactical applications. Future commercial standards and implementations of the same will benefit from having this technology defined and available as an option for high assurance applications.
REFERENCES: 1. Arbaugh, W. A., N. Shankar, Y.C. J. Wan, "Your 802.11 Wireless Network Has No Clothes," http://www.cs.umd.edu/~waa/wireless.pdf, March 30, 2001.
2. Walker, Richard W., "Air Force Lab Struggles to Get a Handle on Wireless Security," Government Computer News, Vol. 20 No. 27, September 10, 2001 (http://www.gcn.com/20_27/news/17036-1.html).
3. Ståhlberg, Mika, "Radio Jamming Attacks Against Two Popular Mobile Networks," Seminar on Network Security, Helsinki University of Technology Telecommunications Software and Multimedia Laboratory, Fall 2000 (http://www.tcm.hut.fi/Opinnot/Tik-110.501/2000/papers/stahlberg.pdf).
KEYWORDS: Network, security, wireless, physical layer, radio frequency, antennas, modulation.
AF04-115 TITLE: Innovative Approaches to Fusion 2+
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Development of innovative approaches to support Information Fusion for improved Situational Awareness
DESCRIPTION: The Joint Directors of Laboratories (JDL) Subpanel on Data Fusion has defined Data Fusion as "a process dealing with the association, correlation, and combination of data and information from single and multiple sources to achieve refined position and identity estimates, and complete and timely assessments of situations and threats, and their significance. The process is characterized by continuous refinements of its estimates and assessments, and the evaluation of the need for additional sources, or modification of the process itself, to achieve improved results".
To date the majority of data fusion research, development, and applications focus primarily on the lowest levels of data fusion (e.g., Level 1 - Object Refinement). The higher levels of information fusion, referred here as Fusion 2+, are inadequately being addressed. This SBIR effort will therefore address the Fusion 2+ domain.
Specific areas of research within Information Fusion for improved Situational Awareness are:
1. Research, development and application of novel methods in knowledge representation and information fusion is desired;
2. Techniques that are able to combine data-driven inputs with learned knowledge structures, to establish multiple hypotheses of interpretation are strongly desired;
3. Inputs are to be obtained from multiple modalities of sensing (e.g., imagery, signals, MTI) as well as text-based data;
4. The derived knowledge structure must be able to support learning of new relationships and higher-level concepts, and support human-guided learning.
PHASE I: Develop an innovative approach to a subset of the Fusion 2+ area that directly supports for improved Situational Awareness.
PHASE II: Develop a prototype Fusion 2+ system based on the Phase I design. Demonstrate the developed Fusion 2+ prototype to prove feasibility for a Situational Awareness capability.
DUAL USE COMMERCIALIZATION: There are many dual use applications of Fusion 2+ techniques. For example in the law enforcement community, this research could be applied to counter narcotics arena. On the commercial side, this research is applicable to business intelligence, where companies attempt to determine what their competitors are doing by collecting and analyzing data available over the web.
REFERENCES: 1. A. Steinberg, C. Bowman, F. White, "Revisions to the JDL Data Fusion Model", Proc. Of the SPIE Sensor Fusion: Architectures, Algorithms, and Applications III, pp 430-441, 1999.
2. E. Waltz and J. Llinas, "Multisensor Data Fusion", Artech House, 1990.
3. R. Antony, "Principles of Data Fusion Automation", Artech House, 1995.
4. M. R. Endsley, "Toward a Theory of Situation Awareness in Dynamic Systems", Human Factors Journal, 37(1), pages 32-64, March 1995.
KEYWORDS: Information Fusion, Fusion 2+, Data Fusion, Knowledge Discovery, Situation Assessment, Threat Assessment, Impact Assessment
AF04-117 TITLE: Coalition Shared Database Implementation
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Investigate methods of storage, dissemination, and
retrieval of Ground Moving Target Indicator (GMTI), Synthetic Aperture Radar (SAR) and other various types of data, in an synchronized and registered manner, that will support a commander's battlefield awareness.
DESCRIPTION: This is to stimulate the effort of enabling the exchange
of Ground Moving Target Indicator (GMTI), Synthetic Aperture Radar
(SAR) imagery, and associated products in a multi-system environment by developing capabilities that exploit evolving joint and coalition interface standards from the Coalition Aerial Surveillance Reconnaissance (CAEASR) ACTD or the Shared Tactical Ground Picture (STGP) initiative. This will allow any workstation that implements Application Program Interfaces (APIs) that adheres to specified standards, or implements a web-based XML interface, to access stored GMTI, SAR data types from various US and coalition sensors. Additionally, the capability to store exploited GMTI and SAR products, or derived products such as nominated tracks and collection plans.
PHASE I: Conduct research on GMTI and SAR storage, dissemination, and retrieval methodologies. This is to include optimization techniques in maximizing data transmission across a wide area network with limited bandwidth. PHASE II: Construct a prototype system based on the design plans from Phase I and demonstrate the capabilities of the system.
DUAL USE COMMERCIALIZATION: Commercial applications include traffic flow analysis based on GMTI history and synchronized SAR imagery. Database could also store track information for athletes on sports teams for analysis on player movement and location tendencies.
REFERENCES:
Overview on GMTI (or MTI) and SAR: See web-page on E8-C Joint STARS - http://www.fas.org/irp/program/collect/jstars.htm
Web-page/paper on Global Hawk radar:
http://www.raytheon.com/products/globalhawk_iss/ref_docs/globalhawk.pdf
For overview on web-based XML data dissemination:
http://www.mitre.org/news/events/tech02/briefings/info_management/kane_presentation/kane.pdf
Overview on CAESAR ACTD: http://disam.osd.mil/pubs/INDEXES/journals/Journal_Index/v.23_4/long.pdf
Overview on STGP Initiative:
http://www.ndia.org/committees/slaad/pdf/SIPFinalReport/APPENDIX%2028%20NATO%20Ground%20Picture%20Paper%205-Power%20Strawman.pdf
KEYWORDS: Ground Moving Target Indicator, GMTI, Synthetic Aperture Radar, SAR, coalition interoperability, coalition GMTI data storage and dissemination, coalition SAR imagery storage and dissemination
AF04-119 TITLE: Mentoring Software for the Warfighter
TECHNOLOGY AREAS: Sensors, Electronics, Battlespace, Human Systems
OBJECTIVE: Examine the technologies required to create a mentoring system to support the JFACC in understanding the actions required to direct air operations in support of Joint operations, including needed information, decisions, and timelines, and create an interactive system that advises the JFACC on those elements of the C2 process.
WARFIGHTER IMPACT: Provide the warfighter with an intelligent software advisor to insure that an inexperienced JFACC can clearly articulate the directions of air operations and an experienced JFACC can enhance his C2 situation awareness.
DESCRIPTION: Although the Joint Senior Staff Course provides an overview of the JFACC structure and responsibilities, it does not provide the hands-on experience that enables a flag offier assigned those duties to efficiently and effectively carry out his or her responsibilities. At present, a JFACC must rely on his or her exposure to the short familiarization course and on personal understanding of the job, leading to wide variations in command environments and less than efficient peformance by the JFACC and his or her staff. An intelligent software advisor can provide the JFACC with the knowledge and methods he or she requires to manage air operations, including workflow, staff requirements and responses expected, information sources and access methods. The advisor is not a planner, scheduler, or battlespace information source itself, but rather a place where the JFACC can ask about them in the context of tasks that must be accomplished, and which can be tailored to match the JFACC's own style of command, much in the way that computer "desktops" become a reflection of the user. It will capture the essentials of the JFACC's command process and provide the tools needed to reflect individual preferences.
PHASE I: Develop the conceptual basis for an intelligent advisor, to include specifics of a knowledge base and business rules, and develop a corresponding architecture specifications that could be used to build a prototype.
PHASE II: Using the results of Phase I, build the prototpye advisor, populate the knowledge and rule base, and demonstrate a tailorable user interface in a realistic environment.
PHASE III: Develop an accreditable operational core and application environment for installation, demonstration and test in the Air Force Transformation Center and eventually for fielding throughout AF DCGS (Block 20).
DUAL USE COMMERCIALIZATION: The primary functions will be to provide on-line advice to high-level, e.g. JFACC, commanders who may have only limited experience in the command position. It will incorporate experience from multiple experts and work in an interactive manner. This type of on-line training can be used in the commercial sector for the training and operation of systems in the field (whether they are operational systems or service oriented tasks) so that the user is provided pertinent guidance based on their specific performance. This type of software could provide industry with the ability conduct highly effective on-the-job training by tailoring the advisor as the operator learns the functions required.
REFERENCES: There were no current activities in military on-line advisory capabilities.
KEYWORDS: Command and Control, JFACC, advisor, planning.
AF04-120 TITLE: Technologies for Injecting Targeting and Re-targeting Data in Precision-Guided Weapons in Flight
TECHNOLOGY AREAS: Sensors, Electronics, Battlespace
OBJECTIVE: Develop automated means of delivering results of precision mensuration derived from the intelligence analyst’s workstation as a string of targeting data directly to a precision guided weapon on a platform or in flight, with or without a decision maker “in the loop.”
WARFIGHTER IMPACT: Provides the warfighter with an automated sensor-to-shooter capability.
DESCRIPTION: Automated Weaponeering is the major focus of this topic. Open unclassified information on the success of recent US Navy experiments with EPPIC-derived precision mensuration data indicates the viability of passing the refined targeting data, reformatted as necessary, directly to selected precision guided weapons (PGWs) while in flight. Initiatives have included the discovery of solutions for a wide variety of PGWs, and Joint planning envisions standards and protocols for a range of battle space activities, including targeting and retargeting, for virtually all PGWs in the nation’s arsenal. For now the decision maker is clearly still “in the loop,” serving as the human interface between ISR and operations. Envisioned is a capability whereby targeting data is associated with a wide range of icons in a battlespace, and decision makers can interact with those icons and other icons representing weapons available for solution to effect automated engagement of user-matched weapons and targets. Required is an automated end-to-end environment within which default and user-specified gaming as well as operational ROE can be followed while utilizing this evolving, powerful capability. Lessons learned in US Navy experiments and JEFXs will be germane.
Share with your friends: |