指挥控制本体国外英文教学课件PPT.ppt_第1页
指挥控制本体国外英文教学课件PPT.ppt_第2页
指挥控制本体国外英文教学课件PPT.ppt_第3页
指挥控制本体国外英文教学课件PPT.ppt_第4页
指挥控制本体国外英文教学课件PPT.ppt_第5页
已阅读5页,还剩32页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1,proposed application of ontology within the u.s. c2 core effort,ms. leslie winters, usjfcom j87 dr. bill mandrick, university of buffalo*,* supporting u.s. army center for software excellence and c2 core operational content working group,2,purpose,describe u.s. efforts to apply ontology to the development of the c2 core*,* for xml-based data exchange internal to u.s.,3,outline,c2 core overview c2 core semantics 9 step ontology process c2 domain analysis c2 core ontology conclusions discussion,4,u.s. c2 core data exchange standard,5,c2 core concept,c2 core standardizes the meaning and format of the most commonly exchanged c2 data: understandable, interoperable,the c2 core will standardize a subset of the c2 data vocabulary and provide a uniform methodology for building understandable and interoperable xml-based messages.,6,c2 core components,ies = information exchange specification; the prescribed xml format for a c2 core compliant message,iep = information exchange package; actual xml message constructed according to ies,c2 cm and vocabulary describe common c2 terms and their relationships.,c2 specific extensions to ucore are the reusable xml-based components of the c2 core: the building blocks for constructing c2 messages.,c2 core messages are constructed from “reuseable components” using a common format and agreed upon meaning,7,c2 core development approach,c2 core developed collaboratively based on existing standards and iers,8,c2 core architectural framework,ucore-enabled systems can understand all ucore message content except the structured payloads c2 core-enabled systems can also understand c2 core based structured payload additional structured payloads from c2 cois and/or pors can fill in remaining concepts,9,c2 core,building c2 core (ontology perspective),9,message,guides,details,bottom-up,data exchange requirements messaging requirements,use cases, msgs, artifacts from the field,doctrinal publications,top-down,represent consensus: names structure semantics relationships,ucore taxonomy / ucore-sl),c2 core ontology,produces,10,10,c2 core,using c2 core (ontology perspective),11,c2 core status,independent assessment team report, dec 2008 dod cio interim guidance memo signed mar 09 cross-c/s/a c2 core working groups underway tools and technical framework operational content (to include c2 domain ontology) verification, validation, and implementation “testable baseline” out 30 jun 09; approved by c2 portfolio data and services steering committee 30 jul 09 initial reusable components, processes, conformance rules, documentation c2 core v0.5 mar 10; continual maturation via iterative approach version 1.0 4q fy10 (suitable for early adopters and piloting/test events) version 2.0 4q fy11 (suitable for implementation assuming successful testing),12,c2 core semantics,13,9 step ontology process,initial domain analysis a) identify domain boundaries b) identify categories and sub-categories c) eye towards instance (tactical) level d) sme input 2) identify doctrinal sources 3) extract high-frequency terminology and definitions 4) develop taxonomy and relations 5) map to ucore 2.0 taxonomy 6) extend to instance level terminology (vocabularies) 7) acquire sme feedback 8) revise 9) field ontology,brief to here,14,c2 domain analysis,so, what is the c2 domain? the c2 domain consists of 6 components: force structure, integration, organization situational awareness planning and analysis decision making and direction operational functions and tasks monitoring progress (assessing) c2 core ontology is based upon these elements vocabulary derived from joint doctrine,15,command,control,commander,subordinate commander,subordinate commander,subordinate commander,source: usmc doctrinal publication 6,force structure and integration,operational functions and tasks,situational awareness,planning and analysis,command decision making and direction,c2 domain analysis,monitoring and assessing,16,c2 domain analysis,extend ucore one level down into c2 core c2 entities c2 events mid-level (utility) ontology no specialized terms organizes appropriate doctrinal terminology and semantics incorporates actual data requirements identifies requirements through/for scenarios, messages, data exchanges, models, . requires sme participation and consensus,bottom up,top down,17,top-down and bottom-up define one synchronous model,ontology defines objects, events and relations as they are in the world rather than as they are described in the context of a particular messaging framework provides a common source of semantics that enables consolidation of data from different domains/sources optimized to enable aggregation of and inferencing on xml instances data exchange components (reusable) capture real data exchange requirements consensus-based representations optimized for composition of xml components into iess,17,18,jp 5-0 joint operation planning jp 1-02 dod dictionary of military and related terms jp 3-13.1 joint doctrine for command and control jp 3-0 joint operations fm 3-0 operations mcdp command and control,c2 core ontology doctrinal sources,19,high-frequency terminology,getting to the low-hanging fruit reliable data sources good c2 models c2 experience apply 10/90 rule use “best practices” sme input,20,taxonomy,entity,event,role,information content entity,organization,geographic feature,document,planned event,humanitarian assistance event,terrorist event,military event,ucore thing,c2 core,grid location,target,joint operation,joint operation plan,military unit,campaign plan document,engagement,humanitarian aid operation,battle,campaign,instance level, tactical messages, iess, ieps,coi vocabularies,21,the c2 core ontology,a few examples (screenshots) from protg,22,c2 information content entities,doctrinal definition: a clear, concise statement of what the force must do and the conditions the force must meet to succeed with respect to the enemy, terrain, and the desired end state (fm 3-0).,23,c2 core ontology events,doctrinal definition: a c2 process whereby combatant commanders and subordinate joint force commanders translate national or theater strategy into operational concepts through the development of an operation plan for a campaign. (jp 1-02),definitions based upon joint doctrine,24,example,c2 core ontology describes the c2 domain accurately with categories that extend from ucore 2.0 and acts as a middle (semantic) layer establishes a systematic way of organizing the terms, entities, and events using doctrinally sound terminology some examples from jc3iedm,25,military organizations,jc3iedm terms,ucore 2.0 “entities”,bold terms = c2 core,26,geographic features,area of influence area of interest area of operations area of responsibility phase line,ucore definition: physical or cultural areas, regions or divisions that can be defined in terms of geographic coordinates. derived from geographic names information service. usgs. accessed 10 march 2009. jc3iedm terms,high-level jc3iedm terms are included in c2 core ontology,27,information entities,jc3iedm terms,c2 core definition: an entity which consists of information and which inheres in some information bearing entity.,28,plans,mip configuration management plan mip development plan mip programme management plan operations plan operations order,c2 core definition: an information content entity that is a specification of events that are to occur in order to obtain some objective.,jc3iedm terms,c2 core ontology,29,vehicles,jc3iedm terms,some jc3iedm terms map directly to ucore terms,30,operations,military operations other than war civil/military operations peace support operations reconnaissance non-combatant evacuation operations,jc3iedm terms,c2 core taxonomy “events”,c2 core definition: the process of carrying on combat, including movement, supply, attack, defense, and maneuvers needed to gain the objectives of any battle or campaign. (jp 1-02),31,the ontology,features: limited to 200+/- terms commonly understood relations is a part of temporal part of participates in etc results in triples allows for unique identifiers to be assigned to each instance research in referent tracking systems (warehousing and inferencing),32,conclusions,the c2 core ontology: describes the c2 domain accurately provides a systematic process for organizing the terms, entities, and events for command and control uses categories that extend from ucore 2.0 acts as a middle (semantic) layer connecting ucore 2.0 with c2 core vocabularies,33,discussion,34,backups,35,dod net-centric data strategy (2003) ensure data are visible, accessible and usable dodd 8320.02 (dec 2004) dod policy that data is an essential enabler of network-centric warfare (ncw) and shall be made visible, accessible, and understandable dod 8320.02-g(apr 2006) identify data assets to share; making data accessible by commonly supported access methods, understandablereaching agreement on the meanings cjcsi 8410.01 (mar 2007) services shall implement net-centric data sharing, by establishing appropriate plans, programs, policies, processes, & procedures according to dodd 8320.02. dod c2 strategic plan (dec 2008) successful implementation of data & services strategies for c2 capabilities requires identification of authoritative c2 data sources cjcsi 6212.01e (dec 2008) to gain interoperability & supportability certification, program data & services, must be “exposed” by making data elements & provided services visible, accessible, and understandable asd(nii)/dod cio memorandum (mar 2009) establishes an objective for the c2 cpm and dod components to identify

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论