An Agent-Based Approach for Data Fusion in Homeland Security
DOI:
https://doi.org/10.9781/ijimai.2013.236Keywords:
Security, Multi-Agent Systems, Inference, Merge, FusionAbstract
This article presents an agent-based solution for data fusion in Homeland Security. Communication technology has been developed very fast in the last decades. We can get lots of data in milliseconds. Our current problem is to process such amounts of data in order to provide useful information. We have to focus our effort on developing intelligent information systems able to handle big amounts of data extracting or revealing relations among data and able to produce information easily understandable for the human user. That is the case of data fusion in tactical operations, especially in the field of defense and Homeland security. Our research is focused on obtaining a Multi-agent system able to inference future enemy’s actions or behaviors from data received from heterogeneous sensors.Downloads
References
[1] A modern approach to Distributed Artificial Intelligence. Gerhard Weiss. The MIT Press. Cambridge, Massachusetts. 1999.
[2] Aarsten, A., Brugali, D. y Vlad, C. (1996). Cooperating Among Autonomous Agents, Proceedings of the 4th International Conference on Control, Automation, Robotics, and Vision. Singapore
[3] ACL Message Representation in Bit-Efficient Encoding Specification XC00069C 29 august 2000. Approved for Experimental
[4] Agre y Rosenschein (1996). Computational Theories of Interaction and Agency, MIT Press,
[5] Benech, D.; (1999). Interaction Frameworks for Distributed and Cooperative Paradigm of Intelligent Systems and Network Management.. University Paul Sabatier, Toulouse
[6] Castillo, J.M. (2009); Una solución a la planificación de operaciones para la defensa basada en agentes inteligentes. Book. ISBN 978-84- 9781-473-7
[7] Castillo, J.M., et al., (2006); Strategic Planning: A new approach through MECIMPLAN. Proc. of the IAT Int. Conf. Honk-Kong (China).
[8] David S. Alberts et al, Understanding the Information Age Warfare.
[9] DRAFT Specification del KQML Agent-Communication Language.Tim Finin y otros. 1993
[10] Durfee, E. ; Cox, J. et ali. (2001). Integrating Multiagent Coordination with Reactive Plan Execution. Proceedings of the ACM Conference on Autonomous Agents (Agents-01), pages 149-150, June.
[11] FIPA Abstract Architecture Specification. Code XC00001I. 29 january 2001. Approved for Experimental
[12] Gad, A., & Farooq, M. (2002). Data Fusion Architecture for Maritime Surveillance. ISIF
[13] Hall, D. L., Llinnas, J. (1997). An introduction to multisensory data fusion. Proceedings of IEEE 85 (1), 6-23.
[14] Haykin, Simon, (1999). Neural networks. A comprehensive foundation. Prentice Hall.
[15] Keller, J. (2008, November 1). Military & Aerospace Electronics. Retrieved January 23, 2012, from Joining sensors through data fusion
[16] Much, Richard et ali (1999). Intelligent Software Agents. Prentice Hall
[17] Nilsson, Nils J., (1998). Artificial Intelligence: A new synthesis. McGraw Hill.
[18] Riecken, D., (1994). An architecture of integrated agents. Communications of the ACM, 37(7):107-116
[19] Russell N., (2003). Artificial Intelligence: A modern approach. Prentice- Hall.
[20] So Young Sohn, S. H. (2003). Data fusion, ensemble and clustering to improve the classification accuracy for the severity of road traffic accidents in Korea. Safety Science (41), pp. 1-14.
[21] Steinberg, A. N., Bowman, C. L., White, F. E. (1999). Revisions to the JDL Data Fusion Model. Arlington, VA, USA: ERIM International, Inc.
[22] The CORBA Reference Guide. Alan Pope. Addison Wesley. 1998.
[23] TR CS-97-03 A proposal for a new KQML Specification de Yannis Labrou and Tim Finin. Maryland, Baltimore. 1997.
[24] Castillo JM. A crystal ball made of agents. International Journal of Artificial Intelligence and Interactive Multimedia. 2010; Vol. 1, Num. 3, pp:13-17; http://dx.doi.org/10.9781/ijimai.2010.132
[25] Medina-García, V.H.,Bolaños-Castro, S., González-Crespo, R., (2012) Process Management Software as a Script, and the Script as a Pattern, International Journal of Computer and Communication Engineering, Vol. 1, Num. 2, pp. 147-150
Downloads
Published
-
Abstract39
-
PDF20






