- 1、本文档共26页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Asymmetric Threat Tracker Advanced Convoy Scenario非对称威胁跟踪先进护航的情况.ppt
Asymmetric Threat TrackerAdvanced Convoy Scenario Donald E. Brown, PhD James H. Conklin Department of Systems Information Engineering University of Virginia Charlottesville, VA 22904 October 26, 2006 Purpose The purpose of this scenario is to describe the capabilities of the Asymmetric Threat Tracker in the context of operational scenarios. Military Decision Making Process Intelligence Cycle Intelligence Cycle Tasking Collection Processing Exploitation Dissemination Scenario Background The user in this scenario is a Convoy Planner The location is Baghdad, Iraq Threat: US Convoys have been repeatedly attacked en-route. The convoy planner’s role is to plan the convoy such that risk is minimized and security is commensurate with the cargo and within the resources available Convoy Planner’s Information The Convoy Planner has access to the following information: Database of past attacks on US Forces date location time type narrative Maps of region Previous convoy routes Intelligence databases Convoy Origination and Destination Points Convoy Departure Time Planner Objective With this data, the planner needs to Plan the route for the convoy Plan the departure time for the convoy Provide convoy drivers information about high risk areas Provide convoy drivers any possible alternate routes or backup plans Planner Performs Risk Assessment The planner can use the ATT to perform a risk assessment Open ATT Select Area of Interest Select Spatial Features for Analysis Select Temporal Features for Analysis Query Database for past Incidents Enter planned start and end times for convoy Run ATT algorithm to generate threat surface Run ATT change detection to generate a change surface Assess risk of convoy and plan accordingly Next slide shows example ATT analysis Inform convoy drivers of high risk areas and areas where the threat has changed significantly since their last run Planner Analyzes ATT Output Once the ATT has generated a threat surface, the planner can view the surf
您可能关注的文档
- Acids and Bases - Illinois Central College:酸和碱-伊利诺斯中央大学.ppt
- 内科学-特发性血小板减少性紫癜.ppt
- 湖南省2011届高考数学一轮复习:《函数y_Asin(wx+)的图象》.ppt
- [经营管理] 建立我们的客户关系管理系统【企业经营管理推荐】.ppt
- CORRELATION BETWEEN STRENGTH AND FLEXIBILITY的强度和弹性的关系.ppt
- Data - mny - home许多家庭数据.ppt
- 2012年《随堂优化训练》语文 广东教育版 必修一 第三单元 9 荷塘月色 精品课件.ppt
- 人教版高三高考数学(文)课件-专题2 第2讲 三角变换与解三角形.ppt
- 2011高中语文 2.2《获得教养的途径》同步课件5 苏教版必修1.ppt
- (课件)-Java程序设计.ppt
文档评论(0)