ArticlePDF Available

Automated military unit identification in battlefield simulation

Authors:

Abstract and Figures

It is the nature of complex systems, composed of many interacting elements, that unanticipated phenomena develop. Computer simulation, in which the elements of a complex system are implemented as interacting software objects (actors), is an effective tool to study collective and emergent phenomena in complex systems. A new cognitive architecture is described for constructing simulation actors that can, like the intelligent elements they represent, adapt to unanticipated conditions. This cognitive architecture generates trial behaviors, estimates their fitness using an internal representation of the system, and has an internal apparatus for evolving a population of trial behaviors to changing environmental conditions. A specific simulation actor is developed to evaluate surveillance radar images of moving vehicles on battlefields. The vehicle cluster location, characterization and discrimination processes currently performed by intelligent human operators were implemented into a parameterized formation recognition process by using a newly developed family of 2D cluster filters. The mechanics of these cluster filters are described. Preliminary results are presented in which this GSM actor demonstrates the ability not only to recognize military formations under prescribed conditions, but to adapt its behavior to unanticipated conditions that develop in the complex simulated battlefield system.
Content may be subject to copyright.
1
Automated military unit identification in battlefield simulation
Phillip D. Stroud and Ray C. Gordon
LAUR-97-849, SPIE proc. volume 3069, April 1997
Los Alamos National Laboratory, MS-F607, Los Alamos, NM 87545
ABSTRACT
It is the nature of complex systems, composed of many interacting elements, that unanticipated phenomena develop.
Computer simu lation, in which the elements of a complex system are implemented as interacting software ob jects (actors), is
an effective tool to study collective and emergent phenomena in complex systems. A new cognitive architecture is described
for constructing simulation actors that can, like the intelligent elements they represent, adapt to unanticipated conditions. This
cognitive architecture generates trial behaviors, estimates their fitness using an internal representation of the system, and has
an internal apparatus for evolving a population of trial behaviors to changing environmental conditions.
A specific simulation actor is developed to evaluate surveillance radar images of moving vehicles on battlefields. The
vehicle cluster location, characterization and discrimination processes currently performed by intelligent human operators
were implemented into a parameterized formation recognition process by using a newly developed family of 2D cluster
filters. The mechanics of these cluster filters are described. Preliminary results are presented in which this GSM actor
demonstrates the ability not only to recognize military formations under prescribed conditions, but to adapt its behavior to
unanticipated conditions that develop in the complex simulated battlefield system.
1. INTRODUCTION
The modern theater-level battlefield is a complex, dynamic system that defies analytical approaches. It consists of
thousands of interacting elements, including mounted and dismounted infantry troops, vehicles of many types, artillery,
command posts of various levels, local and space-based sensor and communication systems, helicopters, aircraft, etc., as
well as terrain, structures, and weather. Phenomena typically emerge in systems of this nature, which would never have been
predicted, even with very elaborate models.1,2 That complex systems exhibit emergent phenomena has two consequences of
interest here. First, actor-based computer simulation is a natural tool for studying battlefield systems, providing a level of
fidelity that can not be attained with analytic approaches. In actor-based simulation, simulation objects (representing entities
on the real battlefield) are implemented on a distributed computer network, and they interact through asynchronous message
passing. The second consequence is that cognitive abilities make up an essential aspect of many of the battlefield actors.
Their ability to adapt their behavior to their perception of battlefield conditions is fundamental to what they do and how they
interact with other elements. Static rule-based, connectionist, or algorithmic models are insufficient for building the software
actors that represent elements with cognitive ability.
This paper describes the development of simulation actors that emulate a human operator’s ability to recognize troop
formations, including the ability to adapt to complex, dynamic battlefield conditions. The process of formation recognition
has been automated through algorithms that evaluate and manipulate sets of 2D cluster filters. The behaviors invoked by an
actor as it performs this formation recognition process is determined by the values of a set of control parameters. A new
cognitive architecture has been developed by which an actor can adapt these control parameters to meet unanticipated
external conditions. The two main components of the architecture are an evolutionary apparatus, which generates and
maintains a population of trial cognitive behaviors, and a mechanism for evaluating the fitness of a trial cognitive behavior,
based on an internal simulation of the external environment. A demonstration of real-time adaptation to dynamic battlefield
conditions is presented.
2
2. BATTLEFIELD SIMULATION WITH THE JSTARS GSM
The Joint Surveillance Target Attack Radar System (JSTARS)3 is an airborne sensor platform that flies in friendly
airspace and uses Doppler radar to detect moving ground vehicles. Although it has a synthetic aperture radar (SAR) mode for
obtaining higher resolution images of stationary structures, its primary utility is detecting moving tanks and armored
personnel carriers. The system is able to cover large areas of a theater or battlefield, on the order of 100 km square. The radar
return is down-linked to ground station modules (GSM). There is typically a GSM attached to each maneuver brigade. The
brigade command post uses the JSTARS information to maintain situational awareness, and to direct fire support. These
brigade level GSMs typically focus on control areas of 20-40 km in size. In addition, there is usually a GSM attached to
division or corps headquarters. This GSM typically covers a larger area (scale size 40-80 km), and receives queuing messages
from the brigade-level GSM’s. The primary task of the GSM operator is to recognize and identify opposing force units
moving within their assigned control areas. The GSM operator generally has a list of assigned tasks, based on current
intelligence. A typical task might be to watch for a battalion strength unit moving towards a particular region of the
battlefield ( a “named area of interest”) and then report its estimated time of arrival to the division headquarters. The GSM is
one of many elements that comprise the complex battlefield system.
Battlefield simulation is developing into a valuable tool for training, mission planning, and assessing new systems and
tactics.4 The battlefield is an example of a complex system, which consists of many interacting elements. Collective
phenomena emerge from these interactions, which produce an unpredictable, complex and dynamic environment for the
elements within the system. In the simulation approach to studying such systems, the various elements that interact in a
battlefield are simulated as software objects. These objects reside on a computer network, and interact with each other
through asynchronous message passing (hence they are known as ‘actors’). Battlefield simulations are composed of many
types of actors, including tank and motorized rifle units (squads, platoons, companies, etc.), artillery units, command posts,
opposing force units, the JSTARS platform, and JSTARS GSM’s.
Each actor in a simulation has three segments: a physical state, a set of actions, and a cognitive segment. The physical
state of an actor includes such data as its location and speed, its status, and the data it manipulates. For the GSM, the physical
state includes the current moving target indicator (MTI) screen, a list of currently recognized units, and possibly the values
of various parameters it uses to perform its tasks. The set of actions provides the methods by which an actor manipulates its
own physical state and data, and the messages it can send, and handlers for messages it receive from other actors. The
physical state and the collection of possible actions together form an object that is appropriate for object-oriented
programming. The third segment, the cognitive segment, allows the actor to control its own actions, rather than having them
invoked by external calls. The cognitive segment determines which actions are taken for various physical states, and can
respond to changes in the physical state by appropriate actions. For the GSM actor, the cognitive segment must be able to
find clusters on the MTI, recognize various military formations, and select appropriate actions to manipulate the list of
recognized units and the MTI data, and decide on which messages to send.
3. A COGNITIVE ARCHITECTURE FOR ADAPTIVE ACTORS
Research in the fields of artificial intelligence has identified many of the essential cognitive elements, and various
ways of combining them into cognitive architectures that allow machines to exhibit varying degrees of intelligence.5,6 Some
of these essential cognitive elements (memory, sensory components, perceptor, productions which invoke actions when the
memory meets certain conditions, etc.) have been combined with the biological evolutionary view of intelligence7 to dev elop
a cognitive architecture that extends the capability of the cognitive segment of simulation actors. The methodology
originated in an off-line process for automated behavior discovery in flight and fire controllers of an airborne laser simulation
actor.8 That off-line methodology has now been internalized into the actor to give real-time or on-line adaptive capability.
A schematic of this architecture is shown in Fig. 1. The actor’s cognitive segment is divided into two main parts: an
autonomous behavior which performs low-level cognition; and a higher level mechanism that can adapt the low-level
behavior to changing environmental conditions. In non-adaptive actors, the cognitive segment consists only of the
autonomous behavior, which, along with the actor’s physical state and collection of actions, forms the actor . The
autonomous behavior relating actions to physical state can be implemented as a collection of algorithms, a control system, a
simple set of rules, an elaborate set of rules known as an expert system, or a neural network of various configurations.
3
Whatever the implementation of the autonomous behavior, there will be a set of adjustable control parameters that determine
the behavior (e.g. the set of connection weights for a neural network representation). In non-adaptive actors, the adjustable
control parameters that control the actor’s autonomous behavior are pre-programmed (or pre-trained) to build in expertise.
The high-level component of this cognitive architecture provides a mechanism for the actor to adapt its low-level
autonomous behavior by adjusting the control parameters. In the GSM actor, it is useful to be able to extract the current
strategy, so the autonomous behavior set is represented as a parameterized rule set, where the parameters that determine the
behavior have easily extractable meaning.
A
utonomous
C
ogn
i
t
i
ve
Behaviors
C
omp
l
ex,
d
ynam
i
c
Simulated Battlefield
popu
l
at
i
on
o
f
tr
i
a
l
control sets
E
vo
l
ut
i
onary
Apparatus
PHYSICAL
STATE
ACTIONS
i
nterna
l
representat
i
on
of environment
i
nterna
l
self model
b
est
contro
l
set
S
cenar
i
o
Perception
tr
a
e
av
or eva
uator
(via internal simulation)
tr
i
a
l
contro
l
set
Hig
h
-le
ve
l
Co
gn it
ive
El
em
en
t
Fig. 1. The cognitive architecture that extends the pre-programmed autonomous cognitive element to higher-level cognition.
Two primary elements make up the high-level cognitive part: a mechanism that can estimate the effectiveness of trial
behaviors using an internal representation of the external world, and an evolutionary apparatus. The internal representation
adjusts itself to correspond to currently perceived external conditions. For the GSM actor, the internal representation has an
element that generates (and stores in memory) random MTI screens that are consistent with the currently perceived
battlefield conditions (expected number of battalions, current visibility conditions, terrain, weather, expected opposing forces
tactics, etc.), which are stored as part of the actor’s physical state data. The perceived external conditions can be changed by
direct sensors, or by messages passed from the command post to which the GSM is attached. There is also an internal
representation of the actor’s low-level autonomous behavior, and a means of evaluating how well a trial autonomous
behavior (represented by a trial set of control parameters) would perform against the currently perceived external conditions.
Since the fitness of a given behavior set will have a large stochastic component, the internal fitness estimation must evaluate
a trial behavior over many possible cases to obtain a valid fitness estimate. In the case of the GSM, the fitness estimation
requires hundreds of independent random MTI screens.
The evolutionary apparatus generates and maintains a population of alternative behavior sets, in a working memory
dedicated to the higher level cognition. The collection of all possible behaviors (represented by all possible control parameter
settings) evaluated in all possible environments consistent with perceived conditions, provides a well-posed problem for the
genetic algorithm.9 The autonomous behavior produced by the set of control parameters is encoded into a chromosome. A
population of chromosomes is evolved by the evolutionary apparatus, using genetic cross-over, mutation, and fitness based
selection. The evolutionary apparatus uses the internal representation to evaluate various trial behaviors. The evolutionary
process occurs in a thread in the actor. When a new behavior set is found that performs better than the current autonomous
behavior set in internal evaluation against the internal representation, that new, better adapted behavior is then used for the
autonomous behavior.
4
4. THE AUTONOMOUS COGNITIVE ELEMENT OF THE GSM ACTOR
The starting point for developing an actor that can emulate a human operator is the training that the human operators
receive. GSM operators currently undergo a U.S. Army training program, which provides a model for the formation
recognition process.2 This process is seen to consist of three steps. The first step is to locate clusters of blips on the MTI
screen. The 2D moving target indicator screen contains on the order of a million pixels, of which on the order of a hundred
may be lit. While cluster location is easily accomplished by the human eye and brain, the complexity of this process becomes
apparent when automation is attempted. The second step is to select and characterize the cluster of blips. The GSM operator
selects a cluster manually with a mouse selection box. The choice of exactly where to put the selection box is a cognitive
decision-making process. There are then several on-screen buttons which cause the MTI to characterize the selected cluster,
as to the number of vehicles or blips, their speed and heading, whether they are tracked or wheeled vehicles. The actual
characterization of a cluster is a mechanical rather than cognitive process. The third step is to decide whether the cluster is a
military unit of interest. This is accomplished by applying a set of rules to the cluster characteristics. These rules can be cast
into standard productions of the form IF (condition c) THEN (perform action A). The conditions are based on cluster
characteristics such as the number of wheeled blips, the size of the cluster, etc. An example production in a search for
battalions might be: IF (total number of blips in cluster is less than 16) THEN (mark this cluster as “not a battalion”, and look
for another cluster).
The autonomous behavior of the GSM actor takes a list of blip locations and generates a list of formations which it
recognizes. It manipulates data, performs searches, and makes decisions, but it does not learn. Any adaptation it performs
has to be pre-programmed (as in IF condition x is perceived, then use strategy sx, otherwise use strategy s0). It has a set of
behaviors which are invoked according to the current physical state of the GSM. It is constructed on the three steps which the
human operator uses to recognize formations. There is a process for searching for clusters of blips, based on a set of
translatable 2D filter functions. There is a process for characterizing a cluster once it is located, and finally th ere is a process
for deciding whether a cluster is a battalion or other formation. When a battalion is found, it is added to a list of recognized
battalions, and the corresponding blips are removed from the list of blips. The entire process of recognizing battalions is
subject to a set of control parameters, such as the number of steps to take in searching for a cluster before evaluating the
cluster.
Opposing forces units may be deployed in a wide variety of formations. The lowest level formation is the platoon,
which can consist of three or four squads (one vehicle, tank or armored personnel carrier per squad), in line, column, two-up-
one-back, chevron-left or right, echelon-left or right, bounding-over-watch, or other formation. There is a similar variety of
possible formations for platoons within companies, and companies within battalions. While each of these formations has a
doctrinal position for each sub-unit, the actual positions of the vehicles on the battlefield will deviate from the doctrinal
position. These deviations can depend on many factors which change with the dynamic battlefield. In addition, there are
atmospheric phenomena, line-of-sight blockage, etc. that prevent some vehicles from being detected by the JSTARS. There
are thus hundreds of possible doctrinal formations for a battalion, and a possibly wide range of variation within each one. In
addition, a formation can be moving in any direction. The formation recognition process must be able to handle the arbitrary
orientation of formations.
4.1 Complete set of ortho-normal 2D cluster filters.
A family of sets of filter functions has been developed to search for and characterize clusters in 2D data. These filters
are formed by the product of a 2D Gaussian and a set of 2D polynomials. The scale size and location of the Gaussian can
vary, and the polynomials are defined in terms of the scale size and location of the Gaussian. There is a complete set of
orthogonal 2D filters for every triplet of values of three adjustable parameters: x0 and y0 (giving the location of the center of
the Gaussian in the 2D plane), and d (the standard deviation of the Gaussian). The terms in the polynomials contain powers
of the transformed variables =(x-x0)/d and =(y-y0)/d. The shape of a filter function is invariant, but its location and scale
size changes according to the values of x0, y0 and d.
The 2D Gaussian (normalized by a 1/2 factor to simplify the polynomials) is given by g(, )= exp[-(2+ 2)/2]/1/2. If
the jth polynomial is given by Vj(, ), then the jth cluster filter will be Sj(, )=Vj(, )g(, ). If the set of filter functions is
orthogonal, then single filter coefficients and combinations of a few coefficients can have direct physical interpretations as
5
cluster characteristics. The filter functions are normalized to unity. The ortho-normal condition on the set of cluster filters
indicates that the filters can be found by obtaining a set of 2D polynomials that are ortho-normal with respect to a weight
function of exp[-(2+ 2)]/.
d

d

S
k
*
(
,
)S
k'
(
,
)=d

d

V
k
*
(
,
)V
k'
(
,
)e
(
2
+
2
)
/
=
kk '
. (1)
A 1D set of orthogonal functions based on 1D Gaussian weighting has been used extensively in time-domain signal
processing applications.10-15 In the 1D case, the filter functions are composed of a 1D Gaussian multiplied by Hermite
polynomials. Several applications have been published using filters consisting of a 2D Gaussian multiplied by 2D
polynomials formed from the cross product of a Hermite polynomial in and another Hermite polynomial in .16-18 In this
crossed-Hermite approach the are, for example, three second order filters, which have polynomials given by H0()H2(),
H1()H1(), and H2()H0(), where the Hermite polynomials are Hn()={1, 2, 42-2, ...}. This does produce a complete set
of orthogonal filter functions, which has been applied to the physiology of the eye and to machine vision.
An alternative orthogonal set is developed here that has rotational invariance properties not possessed by these
crossed-Hermite filters. There are characteristics of clusters that are independent of the orientation of the cluster, such as
ellipticity of a bounding ellipse, “triangularity”, or central tendency. Rotational symmetries are therefore a useful criteria for
selecting a particular set of orthogonal filter functions out of the infinite number of possible sets. The 2D polynomials are
first separated into radial and angular functions.
V
j
(
,
)=V
j
(
cos
,
sin
)=R
n,m
(
)
m
(
)
(2)
where
=
2
+
2
,
=
cos(
),
=
sin(
)
. A slightly modified version of Born and Wolf’s derivation of the
Zernike polynomials19 will allow the determination of the radial and angular functions. The orthogonal set containing
angular functions with every m-fold rotational symmetry is given by the set for all integer m 0 of
m(
)=
1 for m = 0
2cos(m
)
2 sin(m
)for m>0
(3)
In this formulation of , it has been assumed that only real valued functions are of interest here. To allow for expansion of
complex functions onto these filter functions, angular functions of the form exp(±im) would be used instead. The rest of the
following would be unchanged, except for the normalization and indexing scheme. For a given value of m, Rn,m() is then a
polynomial in of order n, containing only terms with powers m, m+2, ..., n. m and n are either both even or both odd. For a
given n, the allowed values of m are n, n-2, n-4,..., down to 0 or 1. For a given value of n, if m is 0, there is one filter
function, and when m is not 0 there are two filter functions, one using the sine and one using the cosine. There are thus a total
of n+1 filter functions with a given value of n (i.e. of order n). This restriction on powers of terms contained in Rn,m allows
the conversion Rn,m()=tm/2Qk(t), where t=2. Qk(t) is then a 1D polynomial of order k which contains terms of all integer
powers from 0 through k. k is related to n and m by k=(n-m)/2. The orthogonality condition (1), along with the definition of
the angular functions, gives a requirement for Q(t):
dt
0
t
m
e
t
Q
k
(t)Q
k'
(t)=
kk'
(4)
The set of orthogonal polynomials that satisfies (4) is the set of generalized Laguerre polynomials20 , appropriately
normalized to
Q
k
(t)=
((nm) / 2)!
((n+m)/ 2)!
L
k
m
(t)
. The coefficient of the ith power of t in the generalized Laguerre polynomial Lk
m(t)
is given by (-1)i(k+m)!/[(m+i)!(k-i)!i!]. The radial polynomials, in terms of these generalized Laguerre polynomials, are
simply
6
R
n,m
(
)=
((nm) / 2)!
((n+m)/ 2)!
m
L
(nm)/2
m
(
2
)
(5)
The complete set of ortho-normal Gaussian weighted 2D polynomial filters with orientation invariance properties is
S
j
(
cos
,
sin
)=
((nm)/2)!
(( n+m)/2)!
m
L
(nm)/2
m
(
2
)
m
(
) exp(
2
/2)
(6)
A similar result, cast as generalized Laguerre polynomials with argument  instead of 2, was given by Dodonov and
Man’ko.22 Their orthogonal set has symmetries with respect to reflection through the = line, rather than the rotational
symmetries desired here.
The Zernike indexing convention21 relating j, m and n can be adopted. For m=0, the index is j=n(n+1)/2+1. For m0,
there are two functions for each n,m pair, one with index j=n(n+1)/2+m and the other with j=n(n+1)/2+1+m. The one with the
odd j index takes the sin(m) angular function, and the one with the even j takes the cos(m) angular function. The first
eleven polynomials are given in Table 1, in both polynomial form Vj(,), and as separated radial and angular functions,
Rn,m()m(). The set of cluster filters is obtained by multiplying the polynomials by the Gaussian, Sj(,)=Vj(,)g().
jnmV
j(
,
)=Rn,m(
)m(
)
1001 =1
211 2
=2
cos(
)
311 2
=2
sin(
)
4201
2
2=1
2
5212

=
2sin(2
)
621
2
2=
2cos(2
)
7312
2
3=(2
3)sin(
)
8312
2
3=(2
3)cos(
)
933 3

2
3/3 =(
3/3)sin(3
)
10 3 3
3/33

2=(
3/3)cos(3
)
11 4 0 1 2
22
2+
4/2+
4/2+
2
2=12
2+
4/2
Table 1. The first 11 orthogonal cluster polynomials.
This set of cluster functions forms a complete orthogonal set over the 2D plane. There is a one to one correspondence
with the Zernike functions, where the corresponding functions have the same angular dependence. (The 2D Zernike
polynomials form a complete orthogonal set over a unit circle, with a constant weighting function, rather than over the 2D
plane with a Gaussian weighting.) An optical interpretation can accordingly be given to the various filter functions. The S2
and S3 filters can be identified with x and y tilts or offsets, the S4 filter can be iden tified with defocus or spread, the S5 and S6
filters can be identified with astigmatism or ellipticity, and the S7 and S8 filters can be identified with coma.
Any function in the x-y plane can then be expanded onto a complete set of ortho-normal cluster filters:
f(x,y)=1
dcjSj(xix0
d,yiy0
d)
j=1
(7)
where the expansion coefficients are
7
c
j
(x
0
,y
0
,d)=1
ddx dy f (x,y)

S
j
(x
i
x
0
d,y
i
y
0
d)
(8)
If the MTI pixels are either on or off (indicating the detection or non-detection of a vehicle at the corresponding location), the
MTI intensity distribution can be represented as a sum of Dirac functions, one for each of N blips, where the ith blip is at
location (xi, yi) for i=1,...,N:
f(x,y)=
(xxi,yyi)
i=1
N
. In this case, the expansion coefficients are obtained by a sum
over the N blips:
cj(x0,y0,d)=1
dSj(xix0
d,yiy0
d)
i=1
N
(9)
It is much more efficient to sum over actual blips with (9), than to perform the weighted sum over all pixels required by the
formulation of (8). Each triplet {x0, y0, d} has a corresponding complete set of ortho-normal cluster filters.
4.2 Search for clusters of size d.
Suppose the data f(x,y) contains a cluster of some size D (e.g. the rms distance from the cluster centroid to the blips in
the cluster), containing n blips, with centroid located at (xc, yc). The set of cluster filters with x0 and y0 set to the cluster
centroid, and d~D, will then have c2 and c3 nearly equal to 0. The contribution of blips outside the cluster to these
coefficients is very small because of the exponential factor in the filters. For the blips in the cluster, the contribution to c2 of
those blips to right of the centroid (xi>x0) tend to cancel that of the blips to the left (xi<x0). Similar cancellation of
contribution occurs in the y direction for c3. If the cluster filter location is some distance away from the cluster centroid, but
far from other data points not belonging to the cluster, it is easy to see that the cluster centroid can be estimated by
x
c
=x
0
+c
2
(x
0
,y
0
,d)/ 2c
1
(x
0
,y
0
,d)
y
c
=y
0
+c
3
(x
0
,y
0
,d)/ 2c
1
(x
0
,y
0
,d)
(10)
This suggests a simple iterative cluster search algorithm in which 1) a filter set is created with some scale size, d, and random
center location (x0, y0); 2) the coefficients c1, c2, and c3 are evaluated for this filter set with the data; 3) a cluster centroid
location is estimated using (10); 4) the set of filters is moved to x0=xc and y0=yc; and 5) go back to step 2. Several loop exit
criteria can be used: loop until c2 and c3 are sufficiently close to 0, or a preset number of loops have been tried, or a preset
number of floating point operations have been expended. Even one blip prevents c1 from taking a value of 0, although it can
become very small, and must be checked for under-flow before dividing.
This method has been found by computer simulation to be extremely efficient and effective at locating clusters. The
search is tuned to find clusters of any desired size range by selecting the value of d. The method will locate the center of a
cluster of size ~d even it is formed from a group of smaller sub-clusters . On the other hand, the method will zero in on a
cluster of size ~d even if this cluster is one of many clusters in a larger super-cluster. The method fails when clusters of size
~d are separated by distances also on the order of d. In this case, the search can get stuck in between clusters. This situation
can be avoided by searching for and characterizing larger clusters first.
4.3 Characterization of a cluster
Once a centroid has been found, (i.e. the filter location parameter is such that the tilt coefficients c2 and c3 are zero),
the size, shape and number in the cluster can be evaluated through the second order filter coefficients, c4, c5, and c6. These
three coefficients can be used to determine an ellipse that best characterizes the cluster. Suppose a cluster of n blips could be
described by an elliptical bi-Gaussian distribution, with semi-major standard deviation a, semi-minor standard deviation b,
and orientation angle (specifying the angle from the x-axis counter-clockwise to the major axis of the ellipse. This cluster
distribution is given by
8
G(x,y;n,a,b,
)=n
2
ab exp (xx
0
)cos
(yy
0
)sin
[]
2
2a
2
(yy
0
)cos
+(xx
0
)sin
[]
2
2b
2
(11)
The constant-density contours of this distribution are ellipses, with the ratio of major to minor axis given by a/b, and the
orientation of the major axis specified by its angle counter-clockwise from the x axis, . The ellipse centered at x0, y0, with
semi-major axis a, and semi-minor axis b, with orientation angle , contains 1-e-1/2 = 39.35% of the distribution.
The procedure described in Section 4.2 is used to move x0 and y0 to the center of the cluster. Then, the second-order
filters are evaluated. For an ideal elliptical Gaussian cluster, the coefficients of the second-order cluster filters can be found
analytically:
c1=n
1+a2/d2
()
1+b2/d2
()
c4=
c
11a2b2/d4
()
1+a2/d2
()
1+b2/d2
()
c5=
c
1sin(2
)a2/d2b2/d4
()
1+a2/d2
()
1+b2/d2
()
c6=
c
1cos(2
)a2/d2b2/d4
()
1+a2/d2
()
1+b2/d2
()
(12)
The parameters describing the elliptical Gaussian distribution can be obtained from the second-order filter coefficients by
inverting (12), giving
a=d
c1c4+c5
2+c6
2
c1+c4c5
2+c6
2
b=d
c
1c4c5
2+c6
2
c
1+c4+c5
2+c6
2
=arctan2( c5,c6)/2
(13)
Rather than evaluate the arctan for , the values of sin() and cos() (which together characterize the orientation of the
ellipse) can be calculated from the coefficients without any trig evaluations, for a slight gain in computational efficiency. The
coefficients c1 and c4 can be used by themselves to estimate the area of the cluster under the approximation that the
ellipticity was small. This area estimate, ab = d2(c1-c4)/(c1+c4), is independent of the orientation of the cluster.
An actual cluster of blips may not be well described by an elliptical Gaussian distribution, but the cluster length,
width, and orientation can be characterized by the a, b, and theta values derived from the coefficients produced by the cluster.
A crisp ellipse can be assigned to the cluster, by multiplying a and b by a crisping factor. A blip inside this crisp ellipse will
be counted as part of the cluster, while blips outside the cluster will not. This method produces an ellipse for a given cluster
that is independent of the value of the filter scale parameter d over a surprisingly large range of d. An appropriate value for
the crisping factor will depend on the nature of the clusters. If clusters tend to have outliers attached to them, a larger
crisping factor is appropriate. On the other hand, if clusters have sharp boundaries, or occur in close proximity to other
clusters, a smaller crisping factor is appropriate. The crisping factor is a parameter that can be adapted to battlefield
conditions.
Higher order filters can be used to further characterize the clusters. The four third-order filter coefficients (c7 through
c10), for example, can be used to characterize the “triangularity” of a cluster. This would allow the GSM to distinguish
between a battalion with three companies in a two-up-one-back formation, and a battalion with a four companies in a square
formation, based on four filter coefficients. The evaluation of higher-order filters requires relatively few additional
computations. The evaluation of one filter requires one exponentiation and a few multiply and adds for each of the N blips in
the list of blips. Evaluation of an additional filter (different j, same x0, y0, and d) does not require the exponentiation to be
repeated, but only a few additional multiply and adds per blip to compute the additional polynomial value. The 
polynomial form can be used to avoid the relatively expensive trig function evaluations. The computational requirement for
locating and characterizing a cluster is linear in the number of blips.
9
4.4 Evaluation of the cluster
Once a cluster has been located, and had its length, width, orientation, and number of blips characterized, it must be
evaluated to determine whether it was produced by a military formation, and if so, by what military formation. This
recognition process is implemented as a parameterized rule set. The rules contain adjustable parameters. The appropriate
value to take for these parameters depends on many factors, such as visibility, terrain roughness, whether units are at full
strength, or have been attrited or reinforced, and the tactics in current use. A simple rule set that mimics the expertis e
provided by the basic GSM operator training for recognizing battalions is:
IF (width of cluster > 2.5 km) THEN reject cluster as battalion
IF (length of cluster > 4.0 km) THEN reject cluster as battalion
IF (number in cluster > 80) THEN reject cluster as battalion
IF (number in cluster < 25) THEN reject cluster as battalion
IF (more than 10% of blips in cluster differ from cluster speed by more that 10 %) THEN reject cluster as battalion
IF (more than 10% of blips in cluster differ from cluster heading by more that 20°) THEN reject cluster as battalion
IF (cluster is split by a terrain feature) THEN reject cluster as battalion
IF (all other rules fail to reject cluster) THEN accept cluster as a battalion
4.5 The parameterized autonomous formation recognition process
The pieces can now be assembled into an algorithm for locating, characterizing and discriminating all clusters in a 2D
MTI screen. The first step is to get the moving target indicator image. The second step is to convert the 2D pixel array into a
list of blips, each with an x and y location, and put the blip list into working memory. This can include pre-filtering to remove
isolated blips. The third step is to perform a series of cluster evaluations using the cluster filters. The last step is to report any
recognized formations. The third step is accomplished by looping over six sub-processes consisting of 1) initializing the filter
to a random location and scale size within preset limits, 2) finding a cluster centroid by iterative refinement of the filter
location based on c2 and c3, 3) characterizing the cluster length, width, orientation and number using c4, c5, and c6, 4) deciding
whether the cluster is a battalion by evaluating the rule-based production system, and updating the list of recognized
battalions if necessary, 5) removing the cluster from the blip list, if appropriate conditions are met, and 6) determining if the
search is finished.
The autonomous formation recognition algorithm has several adjustable controlling parameters. The number of search
steps allowed to locate the cluster centroid can take values from 1 and up. The initial filter location is taken as a uniformly
distributed random variate within the MTI control area, but alternate distributions of starting locations could be used. The
filter scale parameter is initialized prior to each cluster search from a uniform random variate on the interval dmin to dmax, so
that dmin and dmax are adjustable control parameters. The performance of the formation recognition process depends sensitively
on the crisping factor . Appropriate values range from 1 to 3, depending on the nature of the clustered data. The minimum
and maximum number of blips in a cluster that will be called a battalion can also be considered control parameters, in that
these two numbers have a strong effect on the formation recognition process. There are also some constraint parameters. For
example, the total number of floating point operations which are allocated to the GSM to perform an evaluation of the MTI
might be fixed by external factors such as the required turn-around time.
The behavior of the autonomous cognitive element algorithm, i.e. the process by which it evaluates the MTI, is
determined by the values of these control parameters. For a proof-of-principle, a set of seven parameters were selected: (the
minimum filter scale size, the maximum filter scale size, the maximum battalion area, the ellipse crisping factor, th e
minimum number of blips to qualify as a battalion, the maximum number of blips to qualify as a battalion, the maximum
number of search steps before characterizing the cluster and restarting the filter). There can obviously be many more
parameters.
5. INTERNAL FITNESS EVALUATION
As described in section 3, the GSM actor has a means of generating trial behaviors. Since the behavior is specified by
the seven parameter values, creation of a trial behavior is simply a matter of generating trial values for the seven control
parameters. The GSM actor also has, within its cognitive structure, a mechanism for estimating th e fitness or performance of
a given behavior under the currently perceived external conditions. This mechanism works as follows.
10
First, a random set of military formations consistent with the currently perceived environment is generated and placed
within the actor’s working memory. These units are then “pinged” using an internal JSTARS model, accounting for the
currently perceived weather, terrain, and visibility conditions, to produce an internal blip list, which is also put in the GSM
actor’s internal working memory. With only a slight semantic stretch, it can be said that the GSM actor imagines some
military units on an imagined battlefield, figures out what the resulting MTI could look like, and holds the resulting blip list
in its mind. The other actors in the external simulated battlefield do not know about any of this: it is all internal to the GSM
actor. Also in its mind, it has a model of its own behavior, as specified by the seven trial control parameters. This internal
model of its own formation recognition process is then applied to the imagined blip list, and the result is a list of battalions,
which is also stored as an object in the working memory of the GSM actor. The list of recognized battalions can then be
compared with the list of military formations that were first imagined. This comparison gives a measure of fitness for the trail
set of run-time GSM parameters. To obtain a statistically meaningful estimate of this fitness, this whole process is repeated a
number of times with independent internal (imaginary) sets of military units, and the average performance over this
ensemble is taken as the fitness estimate of the trial set of control parameters.
The performance of a run-time GSM against a particular set of vehicles is found by comparing the list of recognized
battalions against the list of military units used to generate the blip list, as follows. Each battalion in the recognized battalion
list is paired up with each battalion in the actual battalion list, and their separation is calculated. The recognized-actual
battalion pair with the smallest separation is then scored by how large the separation is. For zero separation, this pair
contributes no recognition errors. For very large separation, the pair would contribute two recognition errors (one actual
battalion missed plus one false alarm). A simple scoring formula adds 2/[1+(sw/s)2] recognition errors when the recognized
battalion is a distance s away from the actual battalion. The parameter sw is the error distance at which one recognition error
would be counted, whether or not the battalion were added to the recognized battalion list. A value of 6km was selected for
sw. After the closest pair is scored, the actual and recognized battalions are removed from their respective lists. The process is
then repeated for the remaining battalions, accumulating the recognition errors. When one list is empty, one recognition error
is added for each remaining unit in the other list. The accumulated number of recognition errors is the measure of
performance of a behavior for a particular MTI screen.
6. STRATEGY ADAPTATION BY GENETIC ALGORITHM
A genetic algorithm is used to search for better-adapted autonomous behaviors. Seven genes are used to represent the
seven control parameters. Each gene is represented as a 7 bit binary string, allowing 128 possible values for each. The seven
genes are concatenated into a 49 bit chromosome. The 249 possible chromosomes then represent 5.6(10)14 alternative
formation recognition strategies. A gradient decent search strategy does not work because of the existence of many local
optima, and lack of a derivative of the fitness with respect to the parameter or chromosome values. The genetic algorithm
approach works as follows.
First, the internal representation used to evaluate trial control parameters is tied into the currently perceived external
conditions. An initial population of trial chromosomes is constructed by copying the original (current best) chromosome, and
mutating a few bits at random. A population size of 24 chromosomes is appropriate for a 49 bit chromosome. The next step is
to estimate the fitness of each of these trial chromosomes, by running internal models of their resulting run-time GSM
behaviors against hundreds of internally generated MTI screens. The next step is to evolve the population by stepping
through generations, looping over the four processes of 1) select parents from the population, based on their estimated fitness
2)breed new trial chromosomes, using genetic cross-over and mutation, 3) estimate the fitness of the trial chromosomes, and
4) sort new chromosomes into the population, replacing less fit chromosomes. Whenever a chromosome is found that has
better estimated fitness than the current autonomous behavior, the control parameters are replaced with the better values.
7. DEMONSTRATION
A C++ object-oriented implementation of a JSTARS GSM simulation actor has been developed for use in the Los
Alamos battlefield simulation environments SAMSON, JOINTSIM, and JWARS. The autonomous behavior is initialized to a
baseline behavior that gives a first approximation to the training received by GSM operators. The baseline set of control
parameters is (minimum filter scale size = 0.3 km, maximum filter scale size = 0.5 km, maximum battalion area = 20 square
km, ellipse crisping factor = 2.0, minimum number of blips to qualify as a battalion = 18, maximum number of blips to
11
qualify as a battalion = 38, maximum number of steps per cluster search = 45). In the initial battlefield environment, one
battalion is expected in the MTI coverage area, the formation is exactly given by doctrine, and the visibility is perfect. The
autonomous behavior is limited to a maximum of 20,000 trig function evaluations per MTI screen evaluation. The fitness
estimator is set to use 200 random MTI screens to estimate the fitness of trial behaviors. The baseline behavior is evaluated
on the 200 MTI screens, and the fitness is found to be an average of 0.0299 recognition errors per screen. The evolutionary
apparatus then generates and evolves a population of 24 trial behaviors. In less than two minutes, on an 80Mhz Power
Macintosh, 144 trial behaviors were generated and evaluated, and a new behavior was found which gives a fitness of 0.00527
recognition errors per screen (more than five times better). The new control parameters are (minimum filter scale size = 0.85
km, maximum filter scale size = 2.43 km, maximum battalion area = 15.2 square km, ellipse crisping factor = 1.77, minimum
number of blips to qualify as a battalion = 21, maximum number of blips to qualify as a battalion = 62, maximum number of
steps per cluster search = 99). These parameters give an autonomous GSM behavior that is effective for one expected
battalion in a 40x25 km area, when the formations are not significantly different from doctrinal.
At some later time, however, the battlefield conditions have changed so that there are expected to be four battalions,
two independent companies, and 10 independent squads in the battlefield. In addition, the visibility drops to 70% due to
battlefield haze, and the formations are disrupted to the degree that within a unit, every sub-unit is off of its doctrinal position
by up to 40% of the size of the unit (battalions within brigades or regiments, companies within battalions, platoons within
companies, and squads within platoons). The previous behavior is evaluated on 200 MTI screens consistent with the new
conditions, and the fitness is found to be an average of 0.743 recognition errors per screen. The evolutionary apparatus then
evolves its population of 24 trial behaviors. In 25 minutes, on an 80Mhz Power Macintosh, 100 trial behaviors are evaluated,
and a new behavior found which gives a fitness of 0.188 recognition errors per screen. The new control parameters are
(minimum filter scale size = 0.42 km, maximum filter scale size = 1.11 km, maximum battalion area = 15.0 square km,
ellipse crisping factor = 2.81, minimum number of blips to qualify as a battalion = 18, maximum number of blips to qualify
as a battalion =56, maximum number of steps per cluster search = 107). These parameters give an autonomous GSM
behavior that is better adapted to the new battlefield conditions.
At some later time yet, the battlefield conditions again change so that there are expected to be three battalions moving
as part of a regiment plus another independent battalion. The visibility has dropped to 50% due to battlefield haze, and the
formations are disrupted to the degree that within a unit, every sub-unit is off of its doctrinal position by up to 20% of the size
of the unit. The previous behavior is evaluated on 200 MTI screens consistent with the new conditions, and the fitness is
found to be an average of 2.256 recognition errors per screen. The evolutionary apparatus then evolves its population of 24
trial behaviors. In 34 minutes, on an 80Mhz Power Macintosh, 135 trial behaviors are evaluated, and a new behavior found
which gives a fitness of 0.9825 recognition errors per screen. The new control parameters are (minimum filter scale size =
0.14 km, maximum filter scale size = 0.30 km, maximum battalion area = 10.2 square km, ellipse crisping factor = 1.61,
minimum number of blips to qualify as a battalion = 8, maximum number of blips to qualify as a battalion =46, maximum
number of steps per cluster search = 111). Even though the autonomous GSM behavior has adapted to the new battlefield
conditions, it does not take the obvious strategy of locating regiments before battalions. This points out the necessity to be
able to represent a vast variety of alternative behaviors .
The old and evolved control parameter sets can be tested against other set of internal MTI screens. Independent sets of
200 screens were generated, and used to determine the statistical variance in the estimate of the fitness of behaviors. For 200
screens, the error in the estimate is negligible compared to the differences in fitness of differen t behaviors. The behaviors are
adapting to the new environment, not merely learning a training set of MTI screens. The use of internal test sets to reevaluate
trial chromosomes can provide a mechanism to adjust the number of MTI screens needed to provide a reliable fitness
estimate.
8. CONCLUSION
It is the nature of complex systems, composed of many interacting elements, that unanticipated phenomena develop.
Computer simulation, in which the elements of a complex system ar e implemented as interacting software objects, is an
effective tool to study these complex systems. A new cognitive architecture has been developed for constructing simulation
actors that can adapt to external conditions that were never considered by the actor builders. The cognitive architecture
extends non-adaptive and traditional adaptive architectures (in which a set of external parameters is sensed, and the behavior
12
of the actor is adjusted according to these parameters in a pre-programmed way). The new cognitive architecture generates
trial behaviors in its mind, estimates their fitness using an internal representation of the system, and uses an evolutionary
apparatus to continuously adapt a set of trial behaviors to environmental conditions.
This architecture has two application-specific components: a parameterized set of behaviors which can emulate the
behavior of the system element represented by the actor, and an internal representation of the external system which can be
used to estimate the fitness of trial sets of the autonomous cognitive element’s control parameters. The generation and
adaptation of the trial control parameter sets is accomplished in application-independent elements of the cognitive
architecture.
A specific simulation actor has been developed to represent the ground station module that evaluates JSTARS images
of vehicles on battlefields. The cluster location, characterization and discrimination processes performed by the intelligent
human GSM operator were implemented into a parameterized set of behaviors by using a newly developed family of 2D
cluster filters. This GSM actor has demonstrated the ability not only to recognize military formations under prescribed
conditions, but to adapt its behavior to unanticipated conditions that develop in the complex simulated battlefield system.
9. REFERENCES
1. H. Simon, The Sciences of the Artificial, MIT Press,Cambridge, Mass. (1981)
2. M. M. Waldrop, Complexity, Simon and Schuster, N.Y., (1992).
3. Field Manual No. 34-25-1: Joint Surveillance Target Attack Radar System (Joint STARS), unlimited distribution from Department of the
Army Headquarters, Washington D.C. (1995)
4. for example, C. R. Karr, D. Reece, R. Franceschini, “Synthetic Soldiers,” IEEE Spectrum, vol. 34, no. 3 (1997).
5. A. Newell, Unified Theories of Cognition, Harvard University Press, Cambridge, Mass, (1990).
6. R. P. Minch, “Toward a Parsimonious Architecture for Intelligent Organizational Information Systems,” proc. 25th Hawaiian Int’l Conf.
System Sciences, Vol. IV, pp 454-463, (1992).
7. H. Plotkin, Darwin Machines and the Nature of Knowledge, Harvard University Press, Cambridge, Mass. (1994).
8. P. D. Stroud, “Simulation-based Learning in Knowledge-based Controllers,” Proc. 1996 IEEE Int’l Symposium on Intelligent Control,
pp. 168-174, (Sept 1996).
9. J. H. Holland, Adaptation in Natural and A rtificial Systems, 2nd ed., MIT Press,Cambridge, Mass. (1992).
10. D. Gabor, “Theory of Communication J IEE, Vol. 93, pp. 429-459 (1946).
11. X. T. Oliveira e Silva , H. J. W. Belt, “On the determination of the optimal center and scale factor fo r truncated Hermite series,” Proc.
EUSIPCO-96, eds. G. Ramponi, G.L. Sicuranza, S. Carrato, S. Marsi; Edizioni LINT Trieste srl, Vol. III, pp. 1563-1566. (1996).
12. J. Yang, J. Opt. Soc. Am, Vol. 9, No. 2, pp. 333-336 (1992)
13. U. Pen, “Discretized Hermite polynomial expansion on Modes of elliptical galaxies,” Astrophysical J., Vol. 43, p. 104 (1994).
14. Y-H. Gu, “Adaptive multiresolution Hermite-binomial filters for image edge and texture analysis,” proc. SPIE Vol. 2308, p.748,
(1994).
15. M. Basu, and L. M. Kennedy, “An experiment with Gaussian derivatives for image enhancement,” proc. IEEE Int. conf. on Systems,
Man and Cybernetics, Vol. 4, p.3778-3783 (1995) -models eye with Hermite filters
16. J. Martens, “The Hermite transform - theory,” IEEE trans. on Acoustics, Speech, and Signal Processing, Vol. 38, No. 9, pp. 1595-1606
(1990).
17. I. Gertner and G. A. Geri, “Image representation using Hermite functions,” Biol. Cybern., Vol. 71, pp. 147-151 (1994).
18. Y. V. Venkatesh, K. Ramani, R. Nandini, “Hermite Sieve as a wavelet-like array for 1D and 2D signal decomposition,” IEE proc.
Vision, Image, and Signal Processing, Vol. 141, p. 348 (1994)
19. M. Born and E. Wolf, Principles of Optics, sixth ed., Pergamon Press, Oxford (1980)
20. Handbook of Mathematical Functions, M. Abramowitz and I. A. Stegun, eds., Dover.
21. R. J. Noll, “Zernike polynomials and atmospheric turbulence,” J. Opt. Soc. Am, Vol. 66, No. 3, pp. 207-211 (1976).
22. V. V. Dodonov, and V. I. Man’ko, “New Relations for two-dimensional Hermite polynomials,” J. Math. Phys., Vol. 35, No. 8, pp.
4277-4294 (1994).
... The target recognition is performed by a family of 2D cluster filters. Artificial Intelligence [52] has been used in ATR applications to reduce the search combinatorics. These methods use domain specific information for robust physical description of the images. ...
... Worrell [56] has used the mean-based templates for feature extraction. Jacobs et al. [52] has chosen a deterministic Gaussian model for each Range profile. The likelihood functions under each model for varying orientations and target types are compared. ...
Article
Full-text available
Typescript. Thesis (M.S.E.)--Wright State University, 2003. Includes bibliographical references (leaves 141-151).
... This paint shop simulation is part of an on-going research effort into emulation of human decision-making behavior, with the ultimate motivation of building simulations of complex, humandominated systems. The current project builds on an evolutionary cognitive architecture, which has been successfully used to construct cognitive simulation agents with the ability to adapt their behavior over large domains of unanticipated conditions [1][2][3][4] . Each cognitive actor generates a population of evaluated trial behaviors. ...
Article
Full-text available
A simulated automobile factory paint shop is used as a testbed for exploring the emulation of human decision-making behavior. A discrete-events simulation of the paint shop as a collection of interacting Java actors is described. An evolutionary cognitive architecture is under development for building software actors to emulate humans in simulations of human-dominated complex systems. In this paper, the cognitive architecture is extended by implementing a persistent population of trial behaviors with an incremental fitness valuation update strategy, and by allowing a group of cognitive actors to share information. A proof-of-principle demonstration is presented.
... [8][9][10][11] There is also some research reported as a hybridization of Kalman filtering and GA, in which Kalman filtering and GA are used to optimize two separate parts of a problem. 12,13 In previous work, [14][15][16][17] the author used GA to periodically optimize controllers in the context of a dynamic environment. The heuristic of including the previous best solution in the next initial population was explored, but a theoretical formulation underlying the use of GA in noisy, dynamic environments was lacking. ...
Article
Full-text available
In typical GA application, the fitness assigned to a chromosome-represented individual in the context of a specified environment takes a deterministic calculable value. In many problems of interest, the fitness of an individual is stochastic, and the environment changes in unpredictable ways. These two factors contribute to an uncertainty that can be associated with the estimated fitness of the individual. The Kalman formulation provides a mechanism for a useful treatment of uncertainty within the GA framework. It provides for tracking the best-estimated fitness, and for assessing the uncertainty of the best-estimated fitness. The stochastic uncertainty of an existing individual can be reduced by additional evaluation of the fitness. The process (environmental) noise causes an increase in uncertainty as the age of the last evaluation increases. In a Kalman-extended genetic algorithm, we want to know the value of re-evaluating an existing solution in the population relative to generating and evaluating new individuals. A scheme for efficient allocation of computational resources among existing individuals and new individuals is developed. This Kalman-Darwin formulation is applied to the problem of maintaining an optimal network configuration of links between moving nodes, with time-dependent, stochastic blockages. The nodes, for example, could be environmental sensors with radio transmitter/relays located on vehicles, and the network is configured to provide communication paths from each sensor back to a central node with minimum message loss. As the sensors move, the optimal network changes, but information contained within the GA population of solutions allows new optima to be efficiently obtained. The performance of this approach is explored and results are presented.
... In previous work [22][23][24][25], the author used GAs to re-optimize controllers periodically in the context of a nonstationary environment. The heuristic of including the previous best solution in an otherwise random next initial population was explored, but a theoretical formulation underlying the use of GAs in noisy, nonstationary environments was lacking. ...
Article
Full-text available
In basic genetic algorithm (GA) applications, the fitness of a solution takes a value that is certain and unchanging. This formulation does not work for ongoing searches for better solutions in a nonstationary environment in which expected solution fitness changes with time in unpredictable ways, or for fitness evaluations corrupted by noise. In such cases, the estimated fitness has an associated uncertainty. The uncertainties due to environmental changes (process noise) and to noisy evaluations (observation noise) can be reduced, at least temporarily, by re-evaluating existing solutions. The Kalman formulation provides a formal mechanism for treating uncertainty in GA. It provides the mechanics for determining the estimated fitness and uncertainty when a new solution is generated and evaluated for the first time. It also provides the mechanics for updating the estimated fitness and uncertainty after an existing solution is re-evaluated and for increasing the uncertainty with the passage of time. A Kalman-extended GA (KGA) is developed to determine when to generate a new individual, and when to re-evaluate an existing one and which to re-evaluate. This KGA is applied to the problem of maintaining a network configuration with minimized message loss, with mobile nodes and stochastic transmission. As the nodes move, the optimal network changes, but information contained within the population of solutions allows efficient discovery of better-adapted solutions. The sensitivity of the KGA to several control parameters is explored
Article
Influened by the detection performance and observation noise of a sensor, the position observation set of members within a group of targets is often incomplete and uncertain and usually contains clutter. The conventional group target formation recognition methods based on fixed datum mark are no more applicable on these practical conditions. Aiming at the problem, a general method for group target formation recognition is proposed. The method selects the datum mark dynamically depending on the different formation templates and formation observations, which restrains the effect of missing detection, position noise and clutter on the formation description for group targets effectively. The formation of the observed group target is recognized by matching of its formation description and that of the formation templates. Simulation experiments validate the effectiveness of the proposed method.
Article
A group target is a collection of individual targets that are part of some larger military formation such as a brigade, tank column, aircraft carrier group, etc. Unlike conventional targets, group targets are fuzzy in the sense that it is not possible to precisely define their identities in actual battlefield situations. It is also not necessarily possible to detect (let alone track or identify) each and every platform in a given group. Force aggregation (also known as situation assessment or Level 2 data fusion) is the process of detecting, tracking, and identifying group targets. A suitable generalization of the Bayes recursive filter is the theoretically optimal basis for detection, tracking, and identification of multiple targets using multiple sensors. However, it is not obvious what filtering even means in the context of group targets. In this paper we present a theoretically unified, rigorous, and potentially practical approach to force aggregation. Using finite-set statistics (FISST), I show how to construct a theoretically optimal recursive Bayes filter for the multisensor-multigroup problem. Potential computational tractability is achieved by generalizing the concept of a probability hypothesis density (PHD).
Article
Full-text available
Image exploitation technology approaches have generally focused on the detection and spatial analysis of stationary groups of objects on the ground using various sensors. While spatial arrangement is clearly necessary in analyzing military formations, it is usually not sufficient. Typically the arrangement must be examined within some context in order to interpret a pattern of deployment. For moving objects the spatial arrangement of the group relative to the direction of motion is key to recognizing the formation. By examining ground moving target indicator (MTI) radar data over time, motion can be inferred and used to establish a context for interpreting the spatial arrangement of the data.New techniques that exploit the multitemporal nature of MTI data are described. The first is a space-time clustering technique that locates compact groups of objects that persist in time. The technique isanapplication of Marr and Hildreth’s edge detection methodology to the dual problem of region segmentation, or more accurately, volumetric segmentation of space-time. The second technique is based on the use of the Hough transform for recognizing moving formations such as columns, wedges, and lines abreast by analyzing the shape of clustered MTI detections (specifically the orientation of linear arrangements within the group) with respect to their direction of motion. Preliminary results from simulated MTI data setsare presented.
Article
Full-text available
Path searching is challenging problem in many domains such as simulation war games, robotics, military mission planning, computer generated forces (CGF), etc. Effectiveness problems in military route planning are related both with terrain modelling and path planning algorithms. These problems may be considered from the point of view of many criterions. It seems that two criterions are the most important: quality of terrain reflection in the terrain model and computational complexity of the on(off)-line path planning algorithm. The paper deals with two above indicated problems of route planning effectiveness. Comparison of approaches used in route planning is presented. The hybrid, terrain merging-based and partial path planning, approach for route planning in dynamically changed environment during simulation is described. It significantly increase effectiveness of route planning process. The computational complexity of the method is given and some discussion for using the method in the battlefield simulation is conducted. In order to estimate how many times faster we can compute problem for finding shortest path in network with n n n big squares (b-nodes) with relation to problem for finding shortest path in the network with V V V small squares (s s s-nodes) acceleration function is defined and optimized.
Article
Full-text available
Image exploitation technology approaches have generally focused on the detection and spatial analysis of stationary groups of objects on the ground using various sensors. While spatial arrangement is clearly necessary in analyzing military formations, it is usually not sufficient. Typically the arrangement must be examined within some context in order to interpret a pattern of deployment. For moving objects the spatial arrangement of the group relative to the direction of motion is key to recognizing the formation. By examining ground moving target indicator (MTI) radar data over time, motion can be inferred and used to establish a context for interpreting the spatial arrangement of the data. New techniques that exploit the multitemporal nature of MTI data are described. The first is a space-time clustering technique that locates compact groups of objects that persist in time. The technique Is an application of Marr and Hildreth's edge detection methodology to the dual problem of region segmentation, or more accurately, volumetric segmentation of space-time. The second technique is based on the use of the Hough transform for recognizing moving formations such as columns, wedges, and lines abreast by analyzing the shape of clustered MTI detections (specifically the orientation of linear arrangements within the group) with respect to their direction of motion. Preliminary results from simulated MTI data sets are presented
Article
Full-text available
A new multiresolution image analysis approach using adaptive Hermite-Binomial filters is presented in this paper. According to the local image structural and textural properties, the analysis filter kernels are made adaptive both in their scales and orders. Applications of such an adaptive filtering approach, including image texture resolution analysis, multiscaled image edge curve estimation and adaptive edge-texture-based image compression, are then presented. Simulation results on image texture resolution and edge curve estimation as well as image compression are included.
Article
Full-text available
We present a mathematical technique for analyzing images based on two-dimensional Hermite functions that are translated in both space and spatial frequency. Although the translated functions are not orthogonal, they do constitute a frame and hence can be used for image expansion. The technique has the practical advantage that fast algorithms based on the Zak transform (ZT) can be used to compute expansion coefficients. We describe properties of the ZT that are relevant to image representation and which allow us to use it both to compute expansion coefficients efficiently and to reconstruct images from them. Finally, we use a Hermite function frame to decompose and reconstruct a texture image.
Conference Paper
Full-text available
A methodology is presented to transform knowledge-based controllers into adaptive structure representations. These adaptive controllers are then evolved using automatic directed search methods, where the performance of the trial controllers is evaluated through simulation in a synthetic environment. This automatically acquired knowledge is incorporated back into a revised knowledge-based controller. This process is developed and demonstrated using the flight and fire controllers of a simulated airborne laser system as a testbed
Book
Principles of Optics is one of the classic science books of the twentieth century, and probably the most influential book in optics published in the past forty years. This edition has been thoroughly revised and updated, with new material covering the CAT scan, interference with broad-band light and the so-called Rayleigh-Sommerfeld diffraction theory. This edition also details scattering from inhomogeneous media and presents an account of the principles of diffraction tomography to which Emil Wolf has made a basic contribution. Several new appendices are also included. This new edition will be invaluable to advanced undergraduates, graduate students and researchers working in most areas of optics.
Article
The general properties of Zernicke polynomials are reviewed, including their Fourier transforms, integral representations, and derivatives. A Zernicke representation of the Kolmogoroff spectrum of turbulence is given that provides a complete analytical description of the number of independent corrections required in a wavefront compensation system.
Article
Continuing his exploration of the organization of complexity and the science of design, this new edition of Herbert Simon's classic work on artificial intelligence adds a chapter that sorts out the current themes and tools -- chaos, adaptive systems, genetic algorithms -- for analyzing complexity and complex systems. There are updates throughout the book as well. These take into account important advances in cognitive psychology and the science of design while confirming and extending the book's basic thesis: that a physical symbol system has the necessary and sufficient means for intelligent action. The chapter "Economic Reality" has also been revised to reflect a change in emphasis in Simon's thinking about the respective roles of organizations and markets in economic systems.
Conference Paper
Reports the result of a set of computer experiments carried out to enhance a digital image. The authors use a special line-weight function, which is a combination of zero- and second-order Hermite functions. The authors are motivated by the physiological evidence reported in Young (1987) that visual receptive fields in the primate eye are shaped like the sum of a Gaussian function and its Laplacian. This function can also be derived mathematically when the contrast sensitivity experiments in psychophysics are posed as an eigenvalue problem. The authors show that higher order Hermite terms play a significant role in image enhancement. The experimental results with one- and two-dimensional data show that the proposed function has extremely good localisation capability (i.e., the points marked by the operator is as close as possible to the center of the true edge)