Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654937
J. Fast, C. Bonebrake, K. Dorow, B. D. Glasgow, J. Jensen, S. Morris, J. Orrell, W. Pitts, J. S. Rohrer, L. Todd
The Multi-sensor Airborne Radiation Survey (MARS) project has developed a new single cryostat detector array design for high purity germanium (HPGe) gamma ray spectrometers that achieves the high detection efficiency required for stand-off detection and actionable characterization of radiological threats. This approach is necessary since a high efficiency HPGe detector can only be built as an array due to limitations in growing large germanium crystals. The system is ruggedized and shock mounted for use in a variety of field applications. This paper reports on results from initial field measurements conducted in a truck and on two different boats.
{"title":"Initial field measurements with the Multisensor Airborne Radiation Survey (MARS) high purity germanium (HPGe) detector array","authors":"J. Fast, C. Bonebrake, K. Dorow, B. D. Glasgow, J. Jensen, S. Morris, J. Orrell, W. Pitts, J. S. Rohrer, L. Todd","doi":"10.1109/THS.2010.5654937","DOIUrl":"https://doi.org/10.1109/THS.2010.5654937","url":null,"abstract":"The Multi-sensor Airborne Radiation Survey (MARS) project has developed a new single cryostat detector array design for high purity germanium (HPGe) gamma ray spectrometers that achieves the high detection efficiency required for stand-off detection and actionable characterization of radiological threats. This approach is necessary since a high efficiency HPGe detector can only be built as an array due to limitations in growing large germanium crystals. The system is ruggedized and shock mounted for use in a variety of field applications. This paper reports on results from initial field measurements conducted in a truck and on two different boats.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126101781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655070
Justyna Zander, P. Mosterman, J. Kinnebrew, Gautam Biswas
Computer science and computational engineering have enabled great advances in modeling and simulation to analyze various scenarios. Still, facilitating and enhancing situational awareness for a single human is rarely considered. Poor decisions by an individual encountering everyday challenges or public threat situations can have dramatic effects, both for the individual and others. In the presented research, a Computation of Things (CoTh) framework is proposed to provide individual decision support during crises and prevent long-term deviations from safe and secure conditions. The target of CoTh is to enable a profound understanding of the situation from the viewpoint of individual persons in order to permanently reduce their fear, while simultaneously increasing awareness of appropriate responses. CoTh allows for a quick forecasting of action (or non-action) alternatives based on an individual human context, including geographic position (e.g., pollution level and energy usage), activity patterns (e.g., personal nutrition habits, lifestyle, traveling load, family status, circle of friends, social network, and virtual life), and state patterns (e.g., the DNA, current health conditions, and musculature of a human), depending on the considered situation. Insights into CoTh's motivation, requirements, and challenges are provided and the architecture proposal is depicted.
{"title":"Computation of things for human protection and fulfillment","authors":"Justyna Zander, P. Mosterman, J. Kinnebrew, Gautam Biswas","doi":"10.1109/THS.2010.5655070","DOIUrl":"https://doi.org/10.1109/THS.2010.5655070","url":null,"abstract":"Computer science and computational engineering have enabled great advances in modeling and simulation to analyze various scenarios. Still, facilitating and enhancing situational awareness for a single human is rarely considered. Poor decisions by an individual encountering everyday challenges or public threat situations can have dramatic effects, both for the individual and others. In the presented research, a Computation of Things (CoTh) framework is proposed to provide individual decision support during crises and prevent long-term deviations from safe and secure conditions. The target of CoTh is to enable a profound understanding of the situation from the viewpoint of individual persons in order to permanently reduce their fear, while simultaneously increasing awareness of appropriate responses. CoTh allows for a quick forecasting of action (or non-action) alternatives based on an individual human context, including geographic position (e.g., pollution level and energy usage), activity patterns (e.g., personal nutrition habits, lifestyle, traveling load, family status, circle of friends, social network, and virtual life), and state patterns (e.g., the DNA, current health conditions, and musculature of a human), depending on the considered situation. Insights into CoTh's motivation, requirements, and challenges are provided and the architecture proposal is depicted.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655043
R. Quintal, J. Kiernan, J. Shannon, P. Dysart
Side-scan sonar is a proven tool for detection of underwater objects, particularly those objects that project above the seafloor. Rapid assessment of side-scan imagery for object detection is critical for port security needs. However, current side-scan data processing techniques are largely manual, highly time-consuming, and prone to operator error. Availability of well-trained analysts is also a challenge. This article describes a research and development effort at Science Applications International Corporation to automate side-scan sonar contact detection for safety of navigation surveys. Included in the development effort are innovative image processing and machine learning techniques designed to reduce the number of false alarms. These automated techniques are directly applicable to port security operations.
{"title":"Automatic contact detection in side-scan sonar data","authors":"R. Quintal, J. Kiernan, J. Shannon, P. Dysart","doi":"10.1109/THS.2010.5655043","DOIUrl":"https://doi.org/10.1109/THS.2010.5655043","url":null,"abstract":"Side-scan sonar is a proven tool for detection of underwater objects, particularly those objects that project above the seafloor. Rapid assessment of side-scan imagery for object detection is critical for port security needs. However, current side-scan data processing techniques are largely manual, highly time-consuming, and prone to operator error. Availability of well-trained analysts is also a challenge. This article describes a research and development effort at Science Applications International Corporation to automate side-scan sonar contact detection for safety of navigation surveys. Included in the development effort are innovative image processing and machine learning techniques designed to reduce the number of false alarms. These automated techniques are directly applicable to port security operations.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129175706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654950
B. Archambault, J. Webster, J. Lapinskas, T. Grimes, R. Taleyarkhan, A. Eghlima
Transformational nuclear particle sensor systems have been developed for detecting a variety of radiation types via interactions with ordinary fluids such as water and acetone placed under metastable states of tensioned (yes, sub-zero or below-vacuum) liquid pressures at room temperature. Advancements have resulted in the development of lab-scale prototypes which provide real-time directionality information to within 10 degrees of a neutron emitting weapons of mass destruction (WMD) source, with over 90% intrinsic efficiency, with ability to decipher multiplicity and to detect WMD-shielded neutrons in the 0.01 eV range, to unshielded neutrons in the 1–10 MeV range, and with the ability to detect alpha emitting special nuclear material (SNM) signatures to within 1–5 keV in energy resolution, and detection sensitivities to ultratrace levels (i.e., to femto-grams per cc of SNMs such as Pu, and Am). The tension metastable fluid detector (TMFD) systems are robust, and are built in the laboratory with costs in the ∼$100+ range — with inherent gamma blindness capability. A multi-physics design framework (including nuclear particle transport, acoustics, structural dynamics, fluid-heat transfer, and electro-magnetics), has also been developed, and validated.
{"title":"Transformational nuclear sensors — Real-time monitoring of WMDs, risk assessment & response","authors":"B. Archambault, J. Webster, J. Lapinskas, T. Grimes, R. Taleyarkhan, A. Eghlima","doi":"10.1109/THS.2010.5654950","DOIUrl":"https://doi.org/10.1109/THS.2010.5654950","url":null,"abstract":"Transformational nuclear particle sensor systems have been developed for detecting a variety of radiation types via interactions with ordinary fluids such as water and acetone placed under metastable states of tensioned (yes, sub-zero or below-vacuum) liquid pressures at room temperature. Advancements have resulted in the development of lab-scale prototypes which provide real-time directionality information to within 10 degrees of a neutron emitting weapons of mass destruction (WMD) source, with over 90% intrinsic efficiency, with ability to decipher multiplicity and to detect WMD-shielded neutrons in the 0.01 eV range, to unshielded neutrons in the 1–10 MeV range, and with the ability to detect alpha emitting special nuclear material (SNM) signatures to within 1–5 keV in energy resolution, and detection sensitivities to ultratrace levels (i.e., to femto-grams per cc of SNMs such as Pu, and Am). The tension metastable fluid detector (TMFD) systems are robust, and are built in the laboratory with costs in the ∼$100+ range — with inherent gamma blindness capability. A multi-physics design framework (including nuclear particle transport, acoustics, structural dynamics, fluid-heat transfer, and electro-magnetics), has also been developed, and validated.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"704 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654953
S. Guharay, Wansheng Su
A hybrid sensor system is developed for trace explosives detection. The system incorporates orthogonal operational principles of its subcomponents: Surface Enhanced Raman Spectroscopy (SERS) provides high sensitivity as well as high selectivity, i.e., ultra-low detection limits simultaneously with very low false alarm rates while an ionization-based method, such as Ion Mobility Spectrometry (IMS), is used as a pre-filter to SERS, for this approach. This solution offers a significantly improved detection technology when both modes are evaluated concurrently, especially making a significant enhancement of the capability of SERS for open environment applications. This concept of operation provides a clean and controlled environment, and it enhances the operational reliability of SERS which forms the critical unit for this new detection system. The combined system outperforms the individual IMS or SERS components taken individually. This hybrid, orthogonal sensing method can be applied to other types of threat detection as well, namely, chemical and biological threats.
{"title":"High-performance orthogonal sensing system and data analysis algorithm for trace explosives detection","authors":"S. Guharay, Wansheng Su","doi":"10.1109/THS.2010.5654953","DOIUrl":"https://doi.org/10.1109/THS.2010.5654953","url":null,"abstract":"A hybrid sensor system is developed for trace explosives detection. The system incorporates orthogonal operational principles of its subcomponents: Surface Enhanced Raman Spectroscopy (SERS) provides high sensitivity as well as high selectivity, i.e., ultra-low detection limits simultaneously with very low false alarm rates while an ionization-based method, such as Ion Mobility Spectrometry (IMS), is used as a pre-filter to SERS, for this approach. This solution offers a significantly improved detection technology when both modes are evaluated concurrently, especially making a significant enhancement of the capability of SERS for open environment applications. This concept of operation provides a clean and controlled environment, and it enhances the operational reliability of SERS which forms the critical unit for this new detection system. The combined system outperforms the individual IMS or SERS components taken individually. This hybrid, orthogonal sensing method can be applied to other types of threat detection as well, namely, chemical and biological threats.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122838353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655067
N. Giacobe, Hyun-Woo Kim, Avner Faraz
The DARPA Network Challenge was a nationwide exercise in the use of social media in extreme events. Teams competed to locate ten red weather balloons that DARPA tethered over public locations across the continental United States for seven to ten hours on Saturday, December 5, 2009. The MIT team won the event, finding all ten locations using monetary incentive and a multi-level marketing payout scheme. This paper outlines the methods used by the 10th place iSchools Caucus team, which used a combination approach of recruiting observers and the use of Open Source Intelligence (OSINT) to find six of the ten locations. Twitter feeds and publicly available content on competing team websites were captured. Data from these mechanisms were evaluated for content validity using a combination of secondary observers, evaluation of the reputation of reported observers and confirmation of the true identities and locations of reporting individuals by mining additional data from several social networking sites. These methods may have application in law enforcement, homeland security and extreme events when there is a desire to use humans as soft sensors, but where it is impossible to directly recruit observers or motivate them with financial incentives.
{"title":"Mining social media in extreme events : Lessons learned from the DARPA network challenge","authors":"N. Giacobe, Hyun-Woo Kim, Avner Faraz","doi":"10.1109/THS.2010.5655067","DOIUrl":"https://doi.org/10.1109/THS.2010.5655067","url":null,"abstract":"The DARPA Network Challenge was a nationwide exercise in the use of social media in extreme events. Teams competed to locate ten red weather balloons that DARPA tethered over public locations across the continental United States for seven to ten hours on Saturday, December 5, 2009. The MIT team won the event, finding all ten locations using monetary incentive and a multi-level marketing payout scheme. This paper outlines the methods used by the 10th place iSchools Caucus team, which used a combination approach of recruiting observers and the use of Open Source Intelligence (OSINT) to find six of the ten locations. Twitter feeds and publicly available content on competing team websites were captured. Data from these mechanisms were evaluated for content validity using a combination of secondary observers, evaluation of the reputation of reported observers and confirmation of the true identities and locations of reporting individuals by mining additional data from several social networking sites. These methods may have application in law enforcement, homeland security and extreme events when there is a desire to use humans as soft sensors, but where it is impossible to directly recruit observers or motivate them with financial incentives.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654965
J. Walker, B. J. Williams, G. Skelton
Cyber security continues to be an increasingly important topic when considering Homeland Security issues. This area however is often overlooked during a disaster or emergency situation. Emergency management within the US as it currently stands lacks any real cyber situational awareness with respect to the core activities of emergency management such as mitigation, preparedness, response and recovery. As a result critical cyberinfrastructure resources that emergency management personnel rely on is left on the sideline when planning, handling, and recovering from emergencies or natural disasters. As emergency management evolves within the US to handle dynamic man-made, and natural disasters such as terrorist attacks, hurricanes, and floods, these issues must be addressed to mitigate risks. This paper takes the first step in examining the issue of cyber situational awareness within emergency management and identifies several concerns for the emergency management community.
{"title":"Cyber security for emergency management","authors":"J. Walker, B. J. Williams, G. Skelton","doi":"10.1109/THS.2010.5654965","DOIUrl":"https://doi.org/10.1109/THS.2010.5654965","url":null,"abstract":"Cyber security continues to be an increasingly important topic when considering Homeland Security issues. This area however is often overlooked during a disaster or emergency situation. Emergency management within the US as it currently stands lacks any real cyber situational awareness with respect to the core activities of emergency management such as mitigation, preparedness, response and recovery. As a result critical cyberinfrastructure resources that emergency management personnel rely on is left on the sideline when planning, handling, and recovering from emergencies or natural disasters. As emergency management evolves within the US to handle dynamic man-made, and natural disasters such as terrorist attacks, hurricanes, and floods, these issues must be addressed to mitigate risks. This paper takes the first step in examining the issue of cyber situational awareness within emergency management and identifies several concerns for the emergency management community.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121907404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655082
Gedare Bloom, B. Narahari, R. Simha
Fabrication and design are now performed by different companies as semiconductor fabrication facilities (fabs or foundries) seek to reduce costs by serving multiple clients and consolidating resources. However, lack of immediate control and observation reduces the trust which IC designers have in some fabs. To help fabs increase trust in their processes, we propose an approach for logging forensic information of the fab process and printing the information on chips so that examination of the chip reveals provable deviations from the design. Fab owners can benefit by catching rogue employees and by demonstrating high security standards to their customers. Our proposed solution uses a light runtime system that interacts with a trusted platform module (TPM).
{"title":"Fab forensics: Increasing trust in IC fabrication","authors":"Gedare Bloom, B. Narahari, R. Simha","doi":"10.1109/THS.2010.5655082","DOIUrl":"https://doi.org/10.1109/THS.2010.5655082","url":null,"abstract":"Fabrication and design are now performed by different companies as semiconductor fabrication facilities (fabs or foundries) seek to reduce costs by serving multiple clients and consolidating resources. However, lack of immediate control and observation reduces the trust which IC designers have in some fabs. To help fabs increase trust in their processes, we propose an approach for logging forensic information of the fab process and printing the information on chips so that examination of the chip reveals provable deviations from the design. Fab owners can benefit by catching rogue employees and by demonstrating high security standards to their customers. Our proposed solution uses a light runtime system that interacts with a trusted platform module (TPM).","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654935
T. Doyle, R. Devito
The Wide-Angle Nuclear Detection Array (WANDA) is a data analysis system that uses an array of detectors to act as a coincidence detection system, utilizes a database of possible radioisotopes, and searches this database using a physics-based analysis to identify the source type and location that best accounts for the measured Compton scattering data. This method has the ability to utilize partial-energy events and works with smaller and lower cost detectors that do not require full-energy absorption. WANDA maintains a full 4π field of view, and provides simultaneous recognition of the source location and identification of source material. Test scenarios exploring comparison of WANDA and conventional detection and identification technologies are presented.
{"title":"Wide-Angle Nuclear Detection Array (WANDA)","authors":"T. Doyle, R. Devito","doi":"10.1109/THS.2010.5654935","DOIUrl":"https://doi.org/10.1109/THS.2010.5654935","url":null,"abstract":"The Wide-Angle Nuclear Detection Array (WANDA) is a data analysis system that uses an array of detectors to act as a coincidence detection system, utilizes a database of possible radioisotopes, and searches this database using a physics-based analysis to identify the source type and location that best accounts for the measured Compton scattering data. This method has the ability to utilize partial-energy events and works with smaller and lower cost detectors that do not require full-energy absorption. WANDA maintains a full 4π field of view, and provides simultaneous recognition of the source location and identification of source material. Test scenarios exploring comparison of WANDA and conventional detection and identification technologies are presented.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129078132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655054
Santosh Dawesar, Daniel Jennings, Piali De, Brian C. Urch, Scott Corwin, Peter T Gaynor
Responding to a terrorist attack is extraordinarily complex due to the unpredictability as well as the resulting devastation, confusion, and apprehension. Further complications arise from the enormity of available data as well as the participation of multiple agencies and organizations, which often hinders the discovery and assimilation of pertinent information in a timely fashion. A solution to these problems must be scalable, maintainable, extensible, and adaptable. Increasingly, decision-makers need an integrated, intelligent system that can seamlessly acquire, fuse, reason about, distribute, and protect information to provide enhanced, individualized decision support and situational understanding as well as foster effective collaboration. To meet this need, Raytheon is developing an intelligent system called Confluence™, which consists of an ontological framework, domain independent knowledge generation, integration, and reasoning agents, a massively scalable knowledge store, as well as various visualization components. Confluence™ can be applied to any mission by creating a mission ontology that extends the common framework, and which explicitly defines a semantic model of the physical, information, cognitive, and social domains for the mission. This paper will describe and demonstrate an application of Confluence™ to the mission of recovering from an IED attack in a crowded metropolitan area, such as Providence RI.
{"title":"Providing decision support in complex missions such as responding to a metropolitan IED attack","authors":"Santosh Dawesar, Daniel Jennings, Piali De, Brian C. Urch, Scott Corwin, Peter T Gaynor","doi":"10.1109/THS.2010.5655054","DOIUrl":"https://doi.org/10.1109/THS.2010.5655054","url":null,"abstract":"Responding to a terrorist attack is extraordinarily complex due to the unpredictability as well as the resulting devastation, confusion, and apprehension. Further complications arise from the enormity of available data as well as the participation of multiple agencies and organizations, which often hinders the discovery and assimilation of pertinent information in a timely fashion. A solution to these problems must be scalable, maintainable, extensible, and adaptable. Increasingly, decision-makers need an integrated, intelligent system that can seamlessly acquire, fuse, reason about, distribute, and protect information to provide enhanced, individualized decision support and situational understanding as well as foster effective collaboration. To meet this need, Raytheon is developing an intelligent system called Confluence™, which consists of an ontological framework, domain independent knowledge generation, integration, and reasoning agents, a massively scalable knowledge store, as well as various visualization components. Confluence™ can be applied to any mission by creating a mission ontology that extends the common framework, and which explicitly defines a semantic model of the physical, information, cognitive, and social domains for the mission. This paper will describe and demonstrate an application of Confluence™ to the mission of recovering from an IED attack in a crowded metropolitan area, such as Providence RI.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125514245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}