01.12.2012 Views

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

in the threat assessment process. The model uses multi- agent system (MAS) technology <strong>and</strong> is implemented in Java<br />

programming language. This research is a portion of Red Intent Project whose goal is to ultimately implement a model to<br />

predict the intent of any given track in the environment. For any air track in the simulation, two sets of agents are created,<br />

one for controlling track actions <strong>and</strong> one for predicting its identity <strong>and</strong> intent based on information received from track, the<br />

geopolitical situation <strong>and</strong> intelligence. The simulation is also capable of identifying coordinated actions between air tracks.<br />

We used three kinds of aircraft behavior in the simulation: civilian, friendly <strong>and</strong> enemy. Predictor agents are constructed in<br />

a layered structure <strong>and</strong> use &quot;conceptual blending&quot; in their decision-making processes using mental spaces <strong>and</strong><br />

integration networks. Mental spaces are connected to each other via connectors <strong>and</strong> connecters trigger tickets. Connectors <strong>and</strong><br />

Tickets were implemented using the Connector-based Multi Agent System (CMAS) library. This simulation is one of the first<br />

applications to use cognitive blending theory for a military application. We demonstrated that agents can create an<br />

&quot;integration network&quot; composed of mental spaces&quot; <strong>and</strong> retrieve any mental space data inside the network<br />

immediately without traversing the entire network by using the CMAS library. The results of the tests of the simulation showed<br />

that the ADL Simulation can be used as assistant to human air-defense personnel to increase accuracy <strong>and</strong> decrease reaction<br />

time in naval air-threat assessment.<br />

DTIC<br />

Air Defense; Autonomy; Computer Programs; Simulation; Threat Evaluation<br />

20040073579 Naval Postgraduate School, Monterey, CA<br />

Integrating XML <strong>and</strong> RDF Concepts to Achieve Automation Within a Tactical Knowledge Management Environment<br />

McCarty, George E., Jr; Mar. 2004; 119 pp.; In English; Original contains color illustrations<br />

Report No.(s): AD-A422416; No Copyright; Avail: CASI; A06, Hardcopy<br />

Since the advent of Naval Warfare, Tactical Knowledge Management (KM) has been critical to the success of the On<br />

Scene Comm<strong>and</strong>er. Today’s Tactical Knowledge Manager typically operates in a high stressed environment with a multitude<br />

of knowledge sources including detailed sensor deployment plans, rules of engagement contingencies, <strong>and</strong> weapon delivery<br />

assignments. However the warfighter has placed a heavy reliance on delivering this data with traditional messaging processes<br />

while focusing on information organization vice knowledge management. This information oriented paradigm results in a<br />

continuation of data overload due to the manual intervention of human resources. Focusing on the data archiving aspect of<br />

information management overlooks the advantages of computational processing while delaying the empowerment of the<br />

processor as an automated decision making tool.<br />

DTIC<br />

Knowledge Based Systems; Programming Languages<br />

20040073601 Naval Ocean Systems Center, San Diego, CA<br />

Security Considerations for Autonomous Robots<br />

Gage, Douglas W.; Jan. 1990; 6 pp.; In English<br />

Report No.(s): AD-A422454; No Copyright; Avail: CASI; A02, Hardcopy<br />

The security aspects of autonomous robots are analyzed by modeling a robot as a set of sensors, effectors, optional<br />

communications resources, <strong>and</strong> processing elements whose behavior is tightly coupled to be sensed characteristics of its<br />

environment. A simple taxonomy of potential generic threat types is presented, comprising both the possible direct external<br />

threat paths <strong>and</strong> the derived consequent internal threat states. Several generic countermeasure strategies are proposed.<br />

DTIC<br />

Autonomous Navigation; Autonomy; Robots; Security<br />

20040073605 Naval Comm<strong>and</strong>, Control <strong>and</strong> Ocean Surveillance Center, San Diego, CA<br />

Underwater Telerobotics <strong>and</strong> Virtual Reality: A New Technology Partnership<br />

Murray, Steve; Murphy, Doug; Jun. 1986; 11 pp.; In English<br />

Report No.(s): AD-A422460; No Copyright; Avail: CASI; A03, Hardcopy<br />

Despite major advances in autonomous vehicle technologies, human-control led ROVs (remotely-operated vehicles)<br />

continue to fill an important role in underwater work. To perform effectively, however, the human operator requires meaningful<br />

cues for spatial orientation, good workspace visibility, <strong>and</strong> tight feedback about manipulator behavior. These needs can be hard<br />

to support in actual undersea operations. Telerobot designers for space missions have addressed these challenges by presenting<br />

a graphic, virtual reality model of the workspace to the operator, who then performs tasks on this representation of the actual<br />

work site. Real-time graphic modeling can (1) maintain a continuous, clear depiction of the workspace that is largely<br />

198

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!