Pub Date : 2011-10-26DOI: 10.1504/IJIDSS.2011.043359
Kevin Gupton, C. Blais, K. Heffner
Standard information exchange data models (IEDMs) – such as JC3IEDM, MSDL, NIEM, and C2Core – often are expressed as XML schema. This choice of model representation comes with the benefits of a widely adopted format and a well-supported XML toolset. Although XML, as a technology, has been an enabler in achieving interoperability among C4I and M&S systems, several key issues persist. Lacking formalised semantic specifications, systems utilising multiple IEDMs face difficult model mapping and translation tasks. As IEDM user-bases grow, so do maintainability and scalability challenges. Despite numerous IEDM alignment efforts, no maintainable process has emerged. This paper describes a model management methodology that endorses the use of the Web Ontology Language (OWL) for model representation and embraces Semantic Web best practices. Not only can the ‘mappability’ between various models be expressed using OWL, but also multiple standards can be aligned to build upon each other, providing the basis for model execution.
{"title":"Management of C2 data standards with modular OWL ontologies","authors":"Kevin Gupton, C. Blais, K. Heffner","doi":"10.1504/IJIDSS.2011.043359","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.043359","url":null,"abstract":"Standard information exchange data models (IEDMs) – such as JC3IEDM, MSDL, NIEM, and C2Core – often are expressed as XML schema. This choice of model representation comes with the benefits of a widely adopted format and a well-supported XML toolset. Although XML, as a technology, has been an enabler in achieving interoperability among C4I and M&S systems, several key issues persist. Lacking formalised semantic specifications, systems utilising multiple IEDMs face difficult model mapping and translation tasks. As IEDM user-bases grow, so do maintainability and scalability challenges. Despite numerous IEDM alignment efforts, no maintainable process has emerged. \u0000 \u0000This paper describes a model management methodology that endorses the use of the Web Ontology Language (OWL) for model representation and embraces Semantic Web best practices. Not only can the ‘mappability’ between various models be expressed using OWL, but also multiple standards can be aligned to build upon each other, providing the basis for model execution.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117322158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-26DOI: 10.1504/IJIDSS.2011.043358
M. Gerz, O. Meyer
The Joint Consultation, Command, and Control Information Exchange Data Model (JC3IEDM) is the most acknowledged data model in military command and control (C2). So far, the model has been designed to support database replication. In 2007, the Multilateral Interoperability Programme (MIP) has started to transform the JC3IEDM into a platform independent UML model that is also suitable for other purposes. The structure of the JC3IEDM is being revised to solve known weaknesses, to better support modularity, to improve its comprehension, to provide a stricter and unambiguous semantics, and to support the generation of efficient exchange formats. In parallel, MIP started revising its approach of interoperability by better documenting the context of the information exchanges. In this paper, we present the principles of a capability-based approach and the key characteristics of the revised UML model. Moreover, we discuss in which way the JC3IEDM is qualified as a C2 ontology.
{"title":"Defining C2 semantics by a platform-independent JC3IEDM","authors":"M. Gerz, O. Meyer","doi":"10.1504/IJIDSS.2011.043358","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.043358","url":null,"abstract":"The Joint Consultation, Command, and Control Information Exchange Data Model (JC3IEDM) is the most acknowledged data model in military command and control (C2). So far, the model has been designed to support database replication. In 2007, the Multilateral Interoperability Programme (MIP) has started to transform the JC3IEDM into a platform independent UML model that is also suitable for other purposes. The structure of the JC3IEDM is being revised to solve known weaknesses, to better support modularity, to improve its comprehension, to provide a stricter and unambiguous semantics, and to support the generation of efficient exchange formats. In parallel, MIP started revising its approach of interoperability by better documenting the context of the information exchanges. In this paper, we present the principles of a capability-based approach and the key characteristics of the revised UML model. Moreover, we discuss in which way the JC3IEDM is qualified as a C2 ontology.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130414214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-26DOI: 10.1504/IJIDSS.2011.043357
Chris Partridge, Mike Lambert, Michael Loneragan, Andrew Mitchell, P. Garbacz
In common with many other government defence departments, the UK Ministry of Defence (MoD) has realised that it has a plethora of legacy systems that were procured as domain specific with little emphasis given to integration requirements. In particular, it realised that the lack of integration between a significant number of the legacy air defence command and control (AD-C2) systems meant it could not deliver the increased agility needed for joint force AD and that current approaches to integration were unlikely to resolve the problem. They realised that they needed a new approach that demonstrably worked. This paper describes a programme initiated by the MoD to address this problem through the formulation of a novel solution and its demonstration in the tactical AD-C2 environment using a sample of these existing legacy systems. It describes the ontological solution deployed to resolve the ‘hard’ semantic interoperability challenge. It outlines the physical and semantic architecture that was developed to support this approach and describes the implemented planning and collaborative execution (PACE-based) and semantic interoperability engine (SIE) solution.
{"title":"A novel ontological approach to semantic interoperability between legacy air defence command and control systems","authors":"Chris Partridge, Mike Lambert, Michael Loneragan, Andrew Mitchell, P. Garbacz","doi":"10.1504/IJIDSS.2011.043357","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.043357","url":null,"abstract":"In common with many other government defence departments, the UK Ministry of Defence (MoD) has realised that it has a plethora of legacy systems that were procured as domain specific with little emphasis given to integration requirements. In particular, it realised that the lack of integration between a significant number of the legacy air defence command and control (AD-C2) systems meant it could not deliver the increased agility needed for joint force AD and that current approaches to integration were unlikely to resolve the problem. They realised that they needed a new approach that demonstrably worked. \u0000 \u0000This paper describes a programme initiated by the MoD to address this problem through the formulation of a novel solution and its demonstration in the tactical AD-C2 environment using a sample of these existing legacy systems. It describes the ontological solution deployed to resolve the ‘hard’ semantic interoperability challenge. It outlines the physical and semantic architecture that was developed to support this approach and describes the implemented planning and collaborative execution (PACE-based) and semantic interoperability engine (SIE) solution.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130666826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-26DOI: 10.1504/IJIDSS.2011.043356
Bill Mandrick
This essay describes the process of creating a military ontology from the war-fighter's perspective. The war-fighter's perspective is expressed in joint military doctrine, which presents fundamental principles that guide the employment of USA military forces in coordinated and integrated action toward a common objective (http://www.dtic.mil/doctrine/new_pubs/jointpub.htm). An ontology based upon military doctrine is intended to represent the war-fighter's direct view of the domain, and would be used to enhance: 1) situational understanding about some domain; 2) the military decision making and planning process; 3) the design of information systems in an evolving situation; 4) understanding about the relation of data elements to the domain. This essay uses the joint intelligence preparation of the operational environment (JIPOE) process as an example of how the war-fighter would create such an ontology. The JIPOE ontology described here is derived directly from JIPOE doctrine, and extends from a command and control (C2) ontology.
{"title":"Creating an extensible command and control ontology","authors":"Bill Mandrick","doi":"10.1504/IJIDSS.2011.043356","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.043356","url":null,"abstract":"This essay describes the process of creating a military ontology from the war-fighter's perspective. The war-fighter's perspective is expressed in joint military doctrine, which presents fundamental principles that guide the employment of USA military forces in coordinated and integrated action toward a common objective (http://www.dtic.mil/doctrine/new_pubs/jointpub.htm). An ontology based upon military doctrine is intended to represent the war-fighter's direct view of the domain, and would be used to enhance: 1) situational understanding about some domain; 2) the military decision making and planning process; 3) the design of information systems in an evolving situation; 4) understanding about the relation of data elements to the domain. This essay uses the joint intelligence preparation of the operational environment (JIPOE) process as an example of how the war-fighter would create such an ontology. The JIPOE ontology described here is derived directly from JIPOE doctrine, and extends from a command and control (C2) ontology.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130461753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-10DOI: 10.1504/IJIDSS.2011.039548
B. Koene, A. Papy
A review of relevant existing experimental methods to evaluate so-called kinetic non-lethal weapons is presented. Next performance tests of two existing non-lethal weapon systems are shown and compared with other projectiles. Tissue simulants and an accurate determination of their physical properties are important to improve evaluation methods of non-lethal projectiles. Knowledge of physical properties is necessary to allow the physical modelling of the human body and interaction with projectiles. Presumably, for this purpose plasticine (clay), soap and gelatine are relevant tissue simulants. The present status of knowledge in this field is discussed. In addition, expectations and possibilities for the future are discussed.
{"title":"Towards a better, science-based, evaluation of kinetic non-lethal weapons","authors":"B. Koene, A. Papy","doi":"10.1504/IJIDSS.2011.039548","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.039548","url":null,"abstract":"A review of relevant existing experimental methods to evaluate so-called kinetic non-lethal weapons is presented. Next performance tests of two existing non-lethal weapon systems are shown and compared with other projectiles. Tissue simulants and an accurate determination of their physical properties are important to improve evaluation methods of non-lethal projectiles. Knowledge of physical properties is necessary to allow the physical modelling of the human body and interaction with projectiles. Presumably, for this purpose plasticine (clay), soap and gelatine are relevant tissue simulants. The present status of knowledge in this field is discussed. In addition, expectations and possibilities for the future are discussed.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115449224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-10DOI: 10.1504/IJIDSS.2011.039549
U. Ramdaras, F. Absil, P. Genderen
To realise the capability of the network centric warfare (NCW) systems concept, the coordination between various sensor platforms (e.g., naval units, combat aircrafts, helicopters or unmanned aerial systems) will have to be increased and cross-platform sensor management (SM) will be applied. The sensor selection process, as part of SM, serves to find the appropriate sensor for doing an observation. With a properly working selection process, sensor deployment can be optimised for the entire sensor network. This paper presents a sensor selection algorithm (SSA) for a radar target tracking scenario. It is based on the expected performance, computed with the modified Riccati equation. The particle filtering technique is used for target tracking. The SSA takes limited detection probability into account and various expected performance criteria. Scenarios for two non-moving co-located radar systems and three simple target trajectories are simulated to validate the sensor selection strategy and demonstrate the tracking algorithm performance.
{"title":"Sensor selection for optimal target tracking in sensor networks","authors":"U. Ramdaras, F. Absil, P. Genderen","doi":"10.1504/IJIDSS.2011.039549","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.039549","url":null,"abstract":"To realise the capability of the network centric warfare (NCW) systems concept, the coordination between various sensor platforms (e.g., naval units, combat aircrafts, helicopters or unmanned aerial systems) will have to be increased and cross-platform sensor management (SM) will be applied. \u0000 \u0000The sensor selection process, as part of SM, serves to find the appropriate sensor for doing an observation. With a properly working selection process, sensor deployment can be optimised for the entire sensor network. \u0000 \u0000This paper presents a sensor selection algorithm (SSA) for a radar target tracking scenario. It is based on the expected performance, computed with the modified Riccati equation. The particle filtering technique is used for target tracking. The SSA takes limited detection probability into account and various expected performance criteria. \u0000 \u0000Scenarios for two non-moving co-located radar systems and three simple target trajectories are simulated to validate the sensor selection strategy and demonstrate the tracking algorithm performance.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131330292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-10DOI: 10.1504/IJIDSS.2011.039547
I. Lefter, L. Rothkrantz, D. V. Leeuwen, P. Wiggers
The abundance of calls to emergency lines during crises is difficult to handle by the limited number of operators. Detecting if the caller is experiencing some extreme emotions can be a solution for distinguishing the more urgent calls. Apart from these, there are several other applications that can benefit from awareness of the emotional state of the speaker. This paper describes the design of a system for selecting the calls that appear to be urgent, based on emotion detection. The system is trained using a database of spontaneous emotional speech from a call-centre. Four machine learning techniques are applied, based on either prosodic or spectral features, resulting in individual detectors. As a last stage, we investigate the effect of fusing these detectors into a single detection system. We observe an improvement in the equal error rate (EER) from 19.0% on average for four individual detectors to 4.2% when fused using linear logistic regression. All experiments are performed in a speaker independent cross-validation framework.
{"title":"Automatic stress detection in emergency (telephone) calls","authors":"I. Lefter, L. Rothkrantz, D. V. Leeuwen, P. Wiggers","doi":"10.1504/IJIDSS.2011.039547","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.039547","url":null,"abstract":"The abundance of calls to emergency lines during crises is difficult to handle by the limited number of operators. Detecting if the caller is experiencing some extreme emotions can be a solution for distinguishing the more urgent calls. Apart from these, there are several other applications that can benefit from awareness of the emotional state of the speaker. This paper describes the design of a system for selecting the calls that appear to be urgent, based on emotion detection. The system is trained using a database of spontaneous emotional speech from a call-centre. Four machine learning techniques are applied, based on either prosodic or spectral features, resulting in individual detectors. As a last stage, we investigate the effect of fusing these detectors into a single detection system. We observe an improvement in the equal error rate (EER) from 19.0% on average for four individual detectors to 4.2% when fused using linear logistic regression. All experiments are performed in a speaker independent cross-validation framework.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-10DOI: 10.1504/IJIDSS.2011.039546
Axel A. F. Bloemen, L. Evers, A. I. Barros, H. Monsuur, A. Wagelmans
This paper proposes a model for determining a robust defence strategy against ballistic missile threat. Our approach takes into account a variety of possible future scenarios and different forms of robustness criteria, including the well-known absolute robustness criterion. We consider two problem variants. In the first, the number of ballistic missile interceptor systems is minimised, such that a predetermined defence level is achieved. In the second variant, the defence level is maximised for a given number of available interceptor systems. The solutions of both variants consist of a subset of all possible locations of the interceptor systems. We applied two solution approaches to this problem: a heuristic and an exact solution method. The heuristic method is based on simulated annealing and produces good results within a short amount of computation time. We also developed an integer programming formulation which can be solved to optimality using a standard solver. The computation time is higher, but because of the nice properties of the proposed IP-formulation, it can still be solved within reasonable amount of computation time. These two solution approaches were tested using a fictive, but realistic dataset. The results illustrate the effects of the predetermined defence levels and the availability of interceptor systems, as well as the robustness of the solutions produced. Finally, we used our dataset to illustrate the differences between both variants and their use in practice.
{"title":"A robust approach to the missile defence location problem","authors":"Axel A. F. Bloemen, L. Evers, A. I. Barros, H. Monsuur, A. Wagelmans","doi":"10.1504/IJIDSS.2011.039546","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.039546","url":null,"abstract":"This paper proposes a model for determining a robust defence strategy against ballistic missile threat. Our approach takes into account a variety of possible future scenarios and different forms of robustness criteria, including the well-known absolute robustness criterion. We consider two problem variants. In the first, the number of ballistic missile interceptor systems is minimised, such that a predetermined defence level is achieved. In the second variant, the defence level is maximised for a given number of available interceptor systems. The solutions of both variants consist of a subset of all possible locations of the interceptor systems. We applied two solution approaches to this problem: a heuristic and an exact solution method. The heuristic method is based on simulated annealing and produces good results within a short amount of computation time. We also developed an integer programming formulation which can be solved to optimality using a standard solver. The computation time is higher, but because of the nice properties of the proposed IP-formulation, it can still be solved within reasonable amount of computation time. These two solution approaches were tested using a fictive, but realistic dataset. The results illustrate the effects of the predetermined defence levels and the availability of interceptor systems, as well as the robustness of the solutions produced. Finally, we used our dataset to illustrate the differences between both variants and their use in practice.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132344743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-10DOI: 10.1504/IJIDSS.2011.039545
C. Davids, R. Beeres, T. Grant
Managers gather information about the organisation and its environment to ensure that an organisation remains viable. The management of military units during deployment is known as command and control (C2). The C2 literature has focussed on applying technology to gain advantage over potential opponents. However, in today’s military mission landscape other information is also needed. This article combines a technical and managerial perspective to analyse the operational management of a NATO headquarters in Afghanistan. Our research indicates that current C2 systems are not yet suited for delivering the required new intelligence because they emphasise the measurement of daily operations. C2 should bridge the gap between strategy and daily operations. Management tools drawn from the private sector, such as strategy maps and balanced scorecards, may be applied to enhance C2 systems to bridge operations and strategy. Furthermore, we argue that these management tools can adopt the operational measurement possibilities of C2 technologies to enhance their practical relevance.
{"title":"Command and control in the Afghan desert: a field study at a NATO headquarters","authors":"C. Davids, R. Beeres, T. Grant","doi":"10.1504/IJIDSS.2011.039545","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.039545","url":null,"abstract":"Managers gather information about the organisation and its environment to ensure that an organisation remains viable. The management of military units during deployment is known as command and control (C2). The C2 literature has focussed on applying technology to gain advantage over potential opponents. However, in today’s military mission landscape other information is also needed. This article combines a technical and managerial perspective to analyse the operational management of a NATO headquarters in Afghanistan. \u0000 \u0000Our research indicates that current C2 systems are not yet suited for delivering the required new intelligence because they emphasise the measurement of daily operations. C2 should bridge the gap between strategy and daily operations. Management tools drawn from the private sector, such as strategy maps and balanced scorecards, may be applied to enhance C2 systems to bridge operations and strategy. Furthermore, we argue that these management tools can adopt the operational measurement possibilities of C2 technologies to enhance their practical relevance.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132575698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-01-03DOI: 10.1504/IJIDSS.2011.037806
A. Benaskeur, A. Khamis, H. Irandoust
In this paper, we envision a distributed surveillance system where spatially distributed sensors of different modalities can sense collaboratively and continuously large-scale, dynamic, dense and semi-structured environments. The paper discusses surveillance operations in complex and dense environments, such as littoral regions, and describes the key features of distributed surveillance systems. Effective and robust cooperation among the artificial and/or the human agents can synergistically improve the performance of these systems and can endow them with higher-level faculties, such as cooperative target detection and tracking. Different forms of cooperative activities in distributed surveillance systems are mentioned. The paper focuses on intra and inter-platform target cueing and handoff as augmentative forms of cooperation in distributed surveillance.
{"title":"Cooperation in distributed surveillance systems for dense regions","authors":"A. Benaskeur, A. Khamis, H. Irandoust","doi":"10.1504/IJIDSS.2011.037806","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.037806","url":null,"abstract":"In this paper, we envision a distributed surveillance system where spatially distributed sensors of different modalities can sense collaboratively and continuously large-scale, dynamic, dense and semi-structured environments. The paper discusses surveillance operations in complex and dense environments, such as littoral regions, and describes the key features of distributed surveillance systems. Effective and robust cooperation among the artificial and/or the human agents can synergistically improve the performance of these systems and can endow them with higher-level faculties, such as cooperative target detection and tracking. Different forms of cooperative activities in distributed surveillance systems are mentioned. The paper focuses on intra and inter-platform target cueing and handoff as augmentative forms of cooperation in distributed surveillance.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122132103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}