Cognitive Electronic Warfare : : An Artificial Intelligence Approach.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Norwood : : Artech House,, 2021. ©2021. |
Year of Publication: | 2021 |
Edition: | 1st ed. |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (261 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 06049nam a22004333i 4500 | ||
---|---|---|---|
001 | 5006683921 | ||
003 | MiAaPQ | ||
005 | 20240229073842.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 240229s2021 xx o ||||0 eng d | ||
020 | |a 9781630818128 |q (electronic bk.) | ||
020 | |z 9781630818111 | ||
035 | |a (MiAaPQ)5006683921 | ||
035 | |a (Au-PeEL)EBL6683921 | ||
035 | |a (OCoLC)1262373416 | ||
040 | |a MiAaPQ |b eng |e rda |e pn |c MiAaPQ |d MiAaPQ | ||
050 | 4 | |a UG485 | |
082 | 0 | |a 623.043 | |
100 | 1 | |a Haigh, Karen. | |
245 | 1 | 0 | |a Cognitive Electronic Warfare : |b An Artificial Intelligence Approach. |
250 | |a 1st ed. | ||
264 | 1 | |a Norwood : |b Artech House, |c 2021. | |
264 | 4 | |c ©2021. | |
300 | |a 1 online resource (261 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Intro -- Cognitive Electronic Warfare: An Artificial Intelligence Approach -- Contents -- Foreword -- Preface -- 1 Introduction to Cognitive EW -- 1.1 What Makes a Cognitive System? -- 1.2 A Brief Introduction to EW -- 1.3 EW Domain Challenges Viewed from an AI Perspective -- 1.3.1 SA for ES and EW BDA -- 1.3.2 DM for EA, EP, and EBM -- 1.3.3 User Requirements -- 1.3.4 Connection between CR and EW Systems -- 1.3.5 EW System Design Questions -- 1.4 Choices: AI or Traditional? -- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion. | |
505 | 8 | |a References -- 6 EBM -- 6.1 Planning -- 6.1.1 Planning Basics: Problem Definition, and Search -- 6.1.2 Hierarchical Task Networks -- 6.1.3 Action Uncertainty -- 6.1.4 Information Uncertainty -- 6.1.5 Temporal Planning and Resource Management -- 6.1.6 Multiple Timescales -- 6.2 Game Theory -- 6.3 HMI -- 6.4 Conclusion -- References -- 7 Real-Time In-mission Planning and Learning -- 7.1 Execution Monitoring -- 7.1.1 EW BDA -- 7.2 In-Mission Replanning -- 7.3 In-Mission Learning -- 7.3.1 Cognitive Architectures -- 7.3.2 Neural Networks -- 7.3.3 SVMs -- 7.3.4 Multiarmed Bandi -- 7.3.5 MDPs -- 7.3.6 Deep Q-Learning -- 7.4 Conclusion -- References -- 8 Data Management -- 8.1 Data Management Process -- 8.1.1 Metadata -- 8.1.2 Semantics -- 8.1.3 Traceability -- 8.2 Curation and Bias -- 8.3 Data Management -- 8.3.1 Data in an Embedded System -- 8.3.2 Data Diversity -- 8.3.3 Data Augmentation -- 8.3.4 Forgetting -- 8.3.5 Data Security -- 8.4 Conclusion -- References -- 9 Architecture -- 9.1 Software Architecture: Interprocess -- 9.2 Software Architecture: Intraprocess -- 9.3 Hardware Choices -- 9.4 Conclusion -- References -- 10 Test and Evaluation -- 10.1 Scenario Driver -- 10.2 Ablation Testing -- 10.3 Computing Accuracy -- 10.3.1 Regression and Normalized RMSE -- 10.3.2 Classification and Confusion Matrices -- 10.3.3 Evaluating Strategy Performance -- 10.4 Learning Assurance: Evaluating a Cognitive System -- 10.4.1 Learning Assurance Process -- 10.4.2 Formal Verification Methods -- 10.4.3 Empirical and Semiformal Verification Methods -- 10.5 Conclusion -- References -- 11 Getting Started: First Steps -- 11.1 Development Considerations -- 11.2 Tools and Data -- 11.2.1 ML Toolkits -- 11.2.2 ML Datasets -- 11.2.3 RF Data-Generation Tools -- 11.3 Conclusion -- References -- Acronyms -- About the Authors -- Index. | |
588 | |a Description based on publisher supplied metadata and other sources. | ||
590 | |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
650 | 0 | |a Artificial intelligence--Military applications. | |
650 | 0 | |a Electronics in military engineering. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Andrusenko, Julia. | |
776 | 0 | 8 | |i Print version: |a Haigh, Karen |t Cognitive Electronic Warfare |d Norwood : Artech House,c2021 |z 9781630818111 |
797 | 2 | |a ProQuest (Firm) | |
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6683921 |z Click to View |