1 / 18

Allocation of Data Mining Resources: A system Partitioning and Hybrid Control Architecture

Allocation of Data Mining Resources: A system Partitioning and Hybrid Control Architecture. “Know the enemy, know yourself; your victory will never be endangered. Know the ground, know the weather; your victory will then be total”*. John James John-James@usma.edu.

mura
Download Presentation

Allocation of Data Mining Resources: A system Partitioning and Hybrid Control Architecture

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Allocation of Data Mining Resources:A system Partitioning and Hybrid Control Architecture “Know the enemy, know yourself; your victory will never be endangered. Know the ground, know the weather; your victory will then be total”* John James John-James@usma.edu * The Art of War by Sun Tzu , Translated by Samuel B. Griffith, Page 129

  2. Joint Forces Information Architecture

  3. TASKS ORGANIZATION Entities Entities Actions Interactions Interactions The Information to be shared: A view of the operational architecture

  4. The Technical Architecture

  5. The higher levels of the joint force system architecture

  6. The tactical level of the system architecture

  7. State estimation and reactive control

  8. Information Assurance Processes

  9. Information Dominance Processes

  10. Conjecture for resource allocation Conjecture: Intrusion Detection will be more effective if explicit efforts are made to allocate Intrusion Detection Resources to support efforts to maintain acceptable levels of risk that enterprise knowledge has been compromised Problem: how do we identify acceptable levels of risk? Approach: Understand commander’s intent andallocate resources to identify threats to synchronization of execution of functions by units over time that achieve the intent

  11. A joint force operation

  12. Phase Unit Phase I Phase II … Phase N Unit 1 Activity of Unit 1 during Phase I … … Activity of Unit 1 during Phase N Unit 2 … … … … … … … … … Unit M Activity of Unit M during Phase I … … Activity of Unit M during Phase N Synchronizing unit operations

  13. Phase Unit Phase I (move to LOD) PhaseII (SBF4D) Phase III (Breech) Phase IV (Seize obj) D/3/67 Armor Occupy positions along LOD Move to SBF4D Suppressive fire on objective Pass through minefield to seize obj A/3/67 Armor Occupy positions to feint attack on right flank Execute feint attack on right flank Execute feint attack on right flank Execute feint attack on right flank B/3/67 Armor Occupy positions as battalion reserve Be prepared to assume main attack Be prepared to assume main attack Be prepared to assume main attack A(-)/588th Engineers Occupy positions behind D/3/67 Move forward behind D/3/67 Execute single-lane minefield breech Suppressive fire on objective from SBF4D Artillery Execute Fire Plan Suppressive fire on objective Suppressive fire on objective On order shift fires behind objective Synchronizing unit functions supporting seizing objective Falkirk

  14. WARNING ORDER • COURSE OF ACTION DEVELOPMENT • COURSE OF ACTION ANALYSIS • COLLABORATIVE PLANNING • ORDER PREPARATION • ORDER DISSEMINATION 30 - 60 min 1 - 4 hrs 1 - 5 hrs 1.5 - 2 hrs 1 -2 hrs 1.5 - 4 hrs OVERALL ESTIMATE RANGE: 8 - 10 Hours AVERAGE TIME TAKEN: 9.5 Hours BATTALION-LEVEL DELIBERATE PLANNING TIMES* (MANUAL BASELINE) (ONLY BATTALION--ADDITIONAL TIME REQUIRED FOR COMPANY, PLATOON, & SQUAD LEVEL PLANNING) * Estimates from battalions of 4th Infantry Division and 1st Cavalry Division, October 1999

  15. MODIFIED COMBINED OBSTACLE OVERLAY • WEATHER PRODUCTS • ENEMY COURSE OF ACTION ANALYSIS • EVENT TEMPLATE • EVENT MATRIX • DECISION SUPPORT TEMPLATE • BOS SYNCHRONIZATION MATRIX • INTELLIGENCE SYNCHRONIZATION MATRIX 2 - 6 hrs 20 min - 1 hr 1.5 - 12 hrs 1 -4 hrs 1 -2 hrs 1.5 - 4 hrs 2 - 6 hrs 30 mins - 5 hrs OVERALL ESTIMATE RANGE: 12 - 19 Hours AVERAGE TIME TAKEN: 15.5 Hours BATTALION-LEVEL AVERAGE IPB PREPARATION TIMES* (MANUAL BASELINE) * Estimates from battalions of 4th Infantry Division and 1st Cavalry Division, October 1999

  16. Digitizing the Battlefield Digitizing the Installations First Digitized DISN Corps 2004 STEP BSA Ft. Bragg Tactical Internet JTRS WIN - T Network G1 GARRISON SUPPORT Secure Networks DDN 95 Installations VTC SCIF by 2005 GATEWAY G3 G4 SBIS RCAS DMS JCDB E - MAIL Installation Information Infrastructure Modernization Program I3MP Warfighter Information Network Discrete and continuous components

  17. A modeling framework

  18. Summary • Critical infrastructure processes (such as military operations) have discrete and continuous components • Understanding complex dynamical processes requires modeling both discrete and continuous components • Allocation of data mining resources should be done to support meeting enterprise process goals (such as commander’s intent)

More Related