4,626 research outputs found

    Survey of Bayesian Networks Applications to Intelligent Autonomous Vehicles

    Full text link
    This article reviews the applications of Bayesian Networks to Intelligent Autonomous Vehicles (IAV) from the decision making point of view, which represents the final step for fully Autonomous Vehicles (currently under discussion). Until now, when it comes making high level decisions for Autonomous Vehicles (AVs), humans have the last word. Based on the works cited in this article and analysis done here, the modules of a general decision making framework and its variables are inferred. Many efforts have been made in the labs showing Bayesian Networks as a promising computer model for decision making. Further research should go into the direction of testing Bayesian Network models in real situations. In addition to the applications, Bayesian Network fundamentals are introduced as elements to consider when developing IAVs with the potential of making high level judgement calls.Comment: 34 pages, 2 figures, 3 table

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    Scientific progress despite irreproducibility: A seeming paradox

    Full text link
    It appears paradoxical that science is producing outstanding new results and theories at a rapid rate at the same time that researchers are identifying serious problems in the practice of science that cause many reports to be irreproducible and invalid. Certainly the practice of science needs to be improved and scientists are now pursuing this goal. However, in this perspective we argue that this seeming paradox is not new, has always been part of the way science works, and likely will remain so. We first introduce the paradox. We then review a wide range of challenges that appear to make scientific success difficult. Next, we describe the factors that make science work-in the past, present, and presumably also in the future. We then suggest that remedies for the present practice of science need to be applied selectively so as not to slow progress, and illustrate with a few examples. We conclude with arguments that communication of science needs to emphasize not just problems but the enormous successes and benefits that science has brought and is now bringing to all elements of modern society.Comment: 3 figure

    BDA Enhancement Methodology using Situational Parameter Adjustments

    Get PDF
    In the context of close ground combat, the perception of Battle Damage Assessment (BDA) is closely linked with a soldier’s engagement decisions and has significant effects on the battlefield. Perceived BDA is also one of the most complex and uncertain processes facing the soldier in live combat. As a result, the modeling and simulation community has yet to adequately model the perceived BDA process in combat models. This research effort examines the BDA process from a perception standpoint and proposes a methodology to collect the pertinent data and model this perception in the Army’s current force-on-force model, CASTFOREM. A subject matter expert survey design and a method to model the BDA process as a Discrete Time Markov Chain are proposed. Bayesian inference is used to update probability distributions at each time step considering the Situational Parameters available to the soldier at the time of an assessment. Comparisons between known simulation distributions and those developed from simulated survey responses suggest an adequate number of subject matter experts to be polled

    Target threat assessment using fuzzy sets theory

    Get PDF
    The threat evaluation is significant component in target classification process and is significant in military and non military applications. Small errors or mistakes in threat evaluation and target classification especial in military applications can result in huge damage of life and property. Threat evaluation helps in case of weapon assignment, and intelligence sensor support system. It is very important factor to analyze the behavior of enemy tactics as well as our surveillance. This paper represented a precise description of the threat evaluation process using fuzzy sets theory. A review has been carried out regarding which parameters that have been suggested for threat value calculation. For the first time in this paper, eleven parameters are introduced for threat evaluation so that this parameters increase the accuracy in designed system. The implemented threat evaluation system has been applied to a synthetic air defense scenario and four real time dynamic air defense scenarios. The simulation results show the correctness, accuracy, reliability and minimum errors in designing of threat evaluation syste

    Trust, opportunism and governance

    Get PDF
    The paper considers a (static) portfolio system that satisfies adding-up contraints and the gross substitution theorem. The paper shows the relationship of the two conditions to the weak dominant diagonal property of the matrix of interest rate elasticities. This enables to investigate the impact of simultaneous changes in interest rates on the asset demands.

    Cyber-Enabled Product Lifecycle Management: A Multi-Agent Framework

    Get PDF
    Trouble free use of a product and its associated services for a specified minimum period of time is a major factor to win the customer\u27s trust in the product. Rapid and easy serviceability to maintain its functionalities plays a key role in achieving this goal. However, the sustainability of such a model cannot be promised unless the current health status of the product is monitored and condition-based maintenance is exercised. Internet of Things (IoT), an important connectivity paradigm of recent times, which connects physical objects to the internet for real-time information exchange and execution of physical actions via wired/wireless protocols. While the literature is full of various feasibility and viability studies focusing on architecture, design, and model development aspects, there is limited work addressing an IoT-based health monitoring of systems having high collateral damage. This motivated the research to develop a multi-agent framework for monitoring the performance and predicting impending failure to prevent unscheduled maintenance and downtime over internet, referred to as for cyber-enabled product lifecycle management (C-PLM). The framework incorporates a number of autonomous agents, such as hard agent, soft agent, and wave agent, to establish network connectivity to collect and exchange real-time health information for prognostics and health management (PHM). The proposed framework will help manufacturers not only to resolve the warranty failure issues more efficiently and economically but also improve their corporate image. The framework further leads to efficient handling of warranty failure issues and reduces the chances of future failure, i.e., offering durable products. From the sustainability point of view, this framework also addresses the reusability of the parts that still have a significant value using the prognostics and health data. Finally, multi-agent implementation of the proposed approach using a power substations for IoT-based C-PLM is included to show is efficacy
    • …
    corecore