Cognitive Electronic Warfare : : An Artificial Intelligence Approach.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:Norwood : : Artech House,, 2021.
©2021.
Year of Publication:2021
Edition:1st ed.
Language:English
Online Access:
Physical Description:1 online resource (261 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5006683921
ctrlnum (MiAaPQ)5006683921
(Au-PeEL)EBL6683921
(OCoLC)1262373416
collection bib_alma
record_format marc
spelling Haigh, Karen.
Cognitive Electronic Warfare : An Artificial Intelligence Approach.
1st ed.
Norwood : Artech House, 2021.
©2021.
1 online resource (261 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Intro -- Cognitive Electronic Warfare: An Artificial Intelligence Approach -- Contents -- Foreword -- Preface -- 1 Introduction to Cognitive EW -- 1.1 What Makes a Cognitive System? -- 1.2 A Brief Introduction to EW -- 1.3 EW Domain Challenges Viewed from an AI Perspective -- 1.3.1 SA for ES and EW BDA -- 1.3.2 DM for EA, EP, and EBM -- 1.3.3 User Requirements -- 1.3.4 Connection between CR and EW Systems -- 1.3.5 EW System Design Questions -- 1.4 Choices: AI or Traditional? -- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.
References -- 6 EBM -- 6.1 Planning -- 6.1.1 Planning Basics: Problem Definition, and Search -- 6.1.2 Hierarchical Task Networks -- 6.1.3 Action Uncertainty -- 6.1.4 Information Uncertainty -- 6.1.5 Temporal Planning and Resource Management -- 6.1.6 Multiple Timescales -- 6.2 Game Theory -- 6.3 HMI -- 6.4 Conclusion -- References -- 7 Real-Time In-mission Planning and Learning -- 7.1 Execution Monitoring -- 7.1.1 EW BDA -- 7.2 In-Mission Replanning -- 7.3 In-Mission Learning -- 7.3.1 Cognitive Architectures -- 7.3.2 Neural Networks -- 7.3.3 SVMs -- 7.3.4 Multiarmed Bandi -- 7.3.5 MDPs -- 7.3.6 Deep Q-Learning -- 7.4 Conclusion -- References -- 8 Data Management -- 8.1 Data Management Process -- 8.1.1 Metadata -- 8.1.2 Semantics -- 8.1.3 Traceability -- 8.2 Curation and Bias -- 8.3 Data Management -- 8.3.1 Data in an Embedded System -- 8.3.2 Data Diversity -- 8.3.3 Data Augmentation -- 8.3.4 Forgetting -- 8.3.5 Data Security -- 8.4 Conclusion -- References -- 9 Architecture -- 9.1 Software Architecture: Interprocess -- 9.2 Software Architecture: Intraprocess -- 9.3 Hardware Choices -- 9.4 Conclusion -- References -- 10 Test and Evaluation -- 10.1 Scenario Driver -- 10.2 Ablation Testing -- 10.3 Computing Accuracy -- 10.3.1 Regression and Normalized RMSE -- 10.3.2 Classification and Confusion Matrices -- 10.3.3 Evaluating Strategy Performance -- 10.4 Learning Assurance: Evaluating a Cognitive System -- 10.4.1 Learning Assurance Process -- 10.4.2 Formal Verification Methods -- 10.4.3 Empirical and Semiformal Verification Methods -- 10.5 Conclusion -- References -- 11 Getting Started: First Steps -- 11.1 Development Considerations -- 11.2 Tools and Data -- 11.2.1 ML Toolkits -- 11.2.2 ML Datasets -- 11.2.3 RF Data-Generation Tools -- 11.3 Conclusion -- References -- Acronyms -- About the Authors -- Index.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Artificial intelligence--Military applications.
Electronics in military engineering.
Electronic books.
Andrusenko, Julia.
Print version: Haigh, Karen Cognitive Electronic Warfare Norwood : Artech House,c2021 9781630818111
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6683921 Click to View
language English
format eBook
author Haigh, Karen.
spellingShingle Haigh, Karen.
Cognitive Electronic Warfare : An Artificial Intelligence Approach.
Intro -- Cognitive Electronic Warfare: An Artificial Intelligence Approach -- Contents -- Foreword -- Preface -- 1 Introduction to Cognitive EW -- 1.1 What Makes a Cognitive System? -- 1.2 A Brief Introduction to EW -- 1.3 EW Domain Challenges Viewed from an AI Perspective -- 1.3.1 SA for ES and EW BDA -- 1.3.2 DM for EA, EP, and EBM -- 1.3.3 User Requirements -- 1.3.4 Connection between CR and EW Systems -- 1.3.5 EW System Design Questions -- 1.4 Choices: AI or Traditional? -- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.
References -- 6 EBM -- 6.1 Planning -- 6.1.1 Planning Basics: Problem Definition, and Search -- 6.1.2 Hierarchical Task Networks -- 6.1.3 Action Uncertainty -- 6.1.4 Information Uncertainty -- 6.1.5 Temporal Planning and Resource Management -- 6.1.6 Multiple Timescales -- 6.2 Game Theory -- 6.3 HMI -- 6.4 Conclusion -- References -- 7 Real-Time In-mission Planning and Learning -- 7.1 Execution Monitoring -- 7.1.1 EW BDA -- 7.2 In-Mission Replanning -- 7.3 In-Mission Learning -- 7.3.1 Cognitive Architectures -- 7.3.2 Neural Networks -- 7.3.3 SVMs -- 7.3.4 Multiarmed Bandi -- 7.3.5 MDPs -- 7.3.6 Deep Q-Learning -- 7.4 Conclusion -- References -- 8 Data Management -- 8.1 Data Management Process -- 8.1.1 Metadata -- 8.1.2 Semantics -- 8.1.3 Traceability -- 8.2 Curation and Bias -- 8.3 Data Management -- 8.3.1 Data in an Embedded System -- 8.3.2 Data Diversity -- 8.3.3 Data Augmentation -- 8.3.4 Forgetting -- 8.3.5 Data Security -- 8.4 Conclusion -- References -- 9 Architecture -- 9.1 Software Architecture: Interprocess -- 9.2 Software Architecture: Intraprocess -- 9.3 Hardware Choices -- 9.4 Conclusion -- References -- 10 Test and Evaluation -- 10.1 Scenario Driver -- 10.2 Ablation Testing -- 10.3 Computing Accuracy -- 10.3.1 Regression and Normalized RMSE -- 10.3.2 Classification and Confusion Matrices -- 10.3.3 Evaluating Strategy Performance -- 10.4 Learning Assurance: Evaluating a Cognitive System -- 10.4.1 Learning Assurance Process -- 10.4.2 Formal Verification Methods -- 10.4.3 Empirical and Semiformal Verification Methods -- 10.5 Conclusion -- References -- 11 Getting Started: First Steps -- 11.1 Development Considerations -- 11.2 Tools and Data -- 11.2.1 ML Toolkits -- 11.2.2 ML Datasets -- 11.2.3 RF Data-Generation Tools -- 11.3 Conclusion -- References -- Acronyms -- About the Authors -- Index.
author_facet Haigh, Karen.
Andrusenko, Julia.
author_variant k h kh
author2 Andrusenko, Julia.
author2_variant j a ja
author2_role TeilnehmendeR
author_sort Haigh, Karen.
title Cognitive Electronic Warfare : An Artificial Intelligence Approach.
title_sub An Artificial Intelligence Approach.
title_full Cognitive Electronic Warfare : An Artificial Intelligence Approach.
title_fullStr Cognitive Electronic Warfare : An Artificial Intelligence Approach.
title_full_unstemmed Cognitive Electronic Warfare : An Artificial Intelligence Approach.
title_auth Cognitive Electronic Warfare : An Artificial Intelligence Approach.
title_new Cognitive Electronic Warfare :
title_sort cognitive electronic warfare : an artificial intelligence approach.
publisher Artech House,
publishDate 2021
physical 1 online resource (261 pages)
edition 1st ed.
contents Intro -- Cognitive Electronic Warfare: An Artificial Intelligence Approach -- Contents -- Foreword -- Preface -- 1 Introduction to Cognitive EW -- 1.1 What Makes a Cognitive System? -- 1.2 A Brief Introduction to EW -- 1.3 EW Domain Challenges Viewed from an AI Perspective -- 1.3.1 SA for ES and EW BDA -- 1.3.2 DM for EA, EP, and EBM -- 1.3.3 User Requirements -- 1.3.4 Connection between CR and EW Systems -- 1.3.5 EW System Design Questions -- 1.4 Choices: AI or Traditional? -- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.
References -- 6 EBM -- 6.1 Planning -- 6.1.1 Planning Basics: Problem Definition, and Search -- 6.1.2 Hierarchical Task Networks -- 6.1.3 Action Uncertainty -- 6.1.4 Information Uncertainty -- 6.1.5 Temporal Planning and Resource Management -- 6.1.6 Multiple Timescales -- 6.2 Game Theory -- 6.3 HMI -- 6.4 Conclusion -- References -- 7 Real-Time In-mission Planning and Learning -- 7.1 Execution Monitoring -- 7.1.1 EW BDA -- 7.2 In-Mission Replanning -- 7.3 In-Mission Learning -- 7.3.1 Cognitive Architectures -- 7.3.2 Neural Networks -- 7.3.3 SVMs -- 7.3.4 Multiarmed Bandi -- 7.3.5 MDPs -- 7.3.6 Deep Q-Learning -- 7.4 Conclusion -- References -- 8 Data Management -- 8.1 Data Management Process -- 8.1.1 Metadata -- 8.1.2 Semantics -- 8.1.3 Traceability -- 8.2 Curation and Bias -- 8.3 Data Management -- 8.3.1 Data in an Embedded System -- 8.3.2 Data Diversity -- 8.3.3 Data Augmentation -- 8.3.4 Forgetting -- 8.3.5 Data Security -- 8.4 Conclusion -- References -- 9 Architecture -- 9.1 Software Architecture: Interprocess -- 9.2 Software Architecture: Intraprocess -- 9.3 Hardware Choices -- 9.4 Conclusion -- References -- 10 Test and Evaluation -- 10.1 Scenario Driver -- 10.2 Ablation Testing -- 10.3 Computing Accuracy -- 10.3.1 Regression and Normalized RMSE -- 10.3.2 Classification and Confusion Matrices -- 10.3.3 Evaluating Strategy Performance -- 10.4 Learning Assurance: Evaluating a Cognitive System -- 10.4.1 Learning Assurance Process -- 10.4.2 Formal Verification Methods -- 10.4.3 Empirical and Semiformal Verification Methods -- 10.5 Conclusion -- References -- 11 Getting Started: First Steps -- 11.1 Development Considerations -- 11.2 Tools and Data -- 11.2.1 ML Toolkits -- 11.2.2 ML Datasets -- 11.2.3 RF Data-Generation Tools -- 11.3 Conclusion -- References -- Acronyms -- About the Authors -- Index.
isbn 9781630818128
9781630818111
callnumber-first U - Military Science
callnumber-subject UG - Military Engineering and Air Forces
callnumber-label UG485
callnumber-sort UG 3485
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6683921
illustrated Not Illustrated
dewey-hundreds 600 - Technology
dewey-tens 620 - Engineering
dewey-ones 623 - Military & nautical engineering
dewey-full 623.043
dewey-sort 3623.043
dewey-raw 623.043
dewey-search 623.043
oclc_num 1262373416
work_keys_str_mv AT haighkaren cognitiveelectronicwarfareanartificialintelligenceapproach
AT andrusenkojulia cognitiveelectronicwarfareanartificialintelligenceapproach
status_str n
ids_txt_mv (MiAaPQ)5006683921
(Au-PeEL)EBL6683921
(OCoLC)1262373416
carrierType_str_mv cr
is_hierarchy_title Cognitive Electronic Warfare : An Artificial Intelligence Approach.
author2_original_writing_str_mv noLinkedField
marc_error Info : MARC8 translation shorter than ISO-8859-1, choosing MARC8. --- [ 856 : z ]
_version_ 1792331060098367488
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06049nam a22004333i 4500</leader><controlfield tag="001">5006683921</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073842.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2021 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781630818128</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781630818111</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5006683921</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6683921</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1262373416</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">UG485</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">623.043</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Haigh, Karen.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cognitive Electronic Warfare :</subfield><subfield code="b">An Artificial Intelligence Approach.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwood :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (261 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Cognitive Electronic Warfare: An Artificial Intelligence Approach -- Contents -- Foreword -- Preface -- 1 Introduction to Cognitive EW -- 1.1 What Makes a Cognitive System? -- 1.2 A Brief Introduction to EW -- 1.3 EW Domain Challenges Viewed from an AI Perspective -- 1.3.1 SA for ES and EW BDA -- 1.3.2 DM for EA, EP, and EBM -- 1.3.3 User Requirements -- 1.3.4 Connection between CR and EW Systems -- 1.3.5 EW System Design Questions -- 1.4 Choices: AI or Traditional? -- 1.5 Reader's Guide -- 1.6 Conclusion -- References -- 2 Objective Function -- 2.1 Observables That Describe the Environment -- 2.1.1 Clustering Environments -- 2.2 Control Parameters to Change Behavior -- 2.3 Metrics to Evaluate Performance -- 2.4 Creating a Utility Function -- 2.5 Utility Function Design Considerations -- 2.6 Conclusion -- References -- 3 ML Primer -- 3.1 Common ML Algorithms -- 3.1.1 SVMs -- 3.1.2 ANNs -- 3.2 Ensemble Methods -- 3.3 Hybrid ML -- 3.4 Open-Set Classification -- 3.5 Generalization and Meta-learning -- 3.6 Algorithmic Trade-Offs -- 3.7 Conclusion -- References -- 4 Electronic Support -- 4.1 Emitter Classification and Characterization -- 4.1.1 Feature Engineering and Behavior Characterization -- 4.1.2 Waveform Classification -- 4.1.3 SEI -- 4.2 Performance Estimation -- 4.3 Multi-Intelligence Data Fusion -- 4.3.1 Data Fusion Approaches -- 4.3.2 Example: 5G Multi-INT Data Fusion for Localization -- 4.3.3 Distributed-Data Fusion -- 4.4 Anomaly Detection -- 4.5 Causal Relationships -- 4.6 Intent Recognition -- 4.6.1 Automatic Target Recognition and Tracking -- 4.7 Conclusion -- References -- 5 EP and EA -- 5.1 Optimization -- 5.1.1 Multi-Objective Optimization -- 5.1.2 Searching Through the Performance Landscape -- 5.1.3 Optimization Metalearning -- 5.2 Scheduling -- 5.3 Anytime Algorithms -- 5.4 Distributed Optimization -- 5.5 Conclusion.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">References -- 6 EBM -- 6.1 Planning -- 6.1.1 Planning Basics: Problem Definition, and Search -- 6.1.2 Hierarchical Task Networks -- 6.1.3 Action Uncertainty -- 6.1.4 Information Uncertainty -- 6.1.5 Temporal Planning and Resource Management -- 6.1.6 Multiple Timescales -- 6.2 Game Theory -- 6.3 HMI -- 6.4 Conclusion -- References -- 7 Real-Time In-mission Planning and Learning -- 7.1 Execution Monitoring -- 7.1.1 EW BDA -- 7.2 In-Mission Replanning -- 7.3 In-Mission Learning -- 7.3.1 Cognitive Architectures -- 7.3.2 Neural Networks -- 7.3.3 SVMs -- 7.3.4 Multiarmed Bandi -- 7.3.5 MDPs -- 7.3.6 Deep Q-Learning -- 7.4 Conclusion -- References -- 8 Data Management -- 8.1 Data Management Process -- 8.1.1 Metadata -- 8.1.2 Semantics -- 8.1.3 Traceability -- 8.2 Curation and Bias -- 8.3 Data Management -- 8.3.1 Data in an Embedded System -- 8.3.2 Data Diversity -- 8.3.3 Data Augmentation -- 8.3.4 Forgetting -- 8.3.5 Data Security -- 8.4 Conclusion -- References -- 9 Architecture -- 9.1 Software Architecture: Interprocess -- 9.2 Software Architecture: Intraprocess -- 9.3 Hardware Choices -- 9.4 Conclusion -- References -- 10 Test and Evaluation -- 10.1 Scenario Driver -- 10.2 Ablation Testing -- 10.3 Computing Accuracy -- 10.3.1 Regression and Normalized RMSE -- 10.3.2 Classification and Confusion Matrices -- 10.3.3 Evaluating Strategy Performance -- 10.4 Learning Assurance: Evaluating a Cognitive System -- 10.4.1 Learning Assurance Process -- 10.4.2 Formal Verification Methods -- 10.4.3 Empirical and Semiformal Verification Methods -- 10.5 Conclusion -- References -- 11 Getting Started: First Steps -- 11.1 Development Considerations -- 11.2 Tools and Data -- 11.2.1 ML Toolkits -- 11.2.2 ML Datasets -- 11.2.3 RF Data-Generation Tools -- 11.3 Conclusion -- References -- Acronyms -- About the Authors -- Index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence--Military applications.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronics in military engineering.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Andrusenko, Julia.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Haigh, Karen</subfield><subfield code="t">Cognitive Electronic Warfare</subfield><subfield code="d">Norwood : Artech House,c2021</subfield><subfield code="z">9781630818111</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6683921</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>