Learning New Air Combat Tactics With Cascade

Similar documents
Soar Agents in Government Applications

Multiplayer Computer Games: A Team Performance Assessment Research and Development Tool

Lockheed Martin. An Overview of Partnering with Small Businesses

Current Applied Soar Agent Development

Strategic and Tactical Reasoning with Waypoints Lars Lidén Valve Software

MILITARY RADAR TRENDS AND ANALYSIS REPORT

ACHIEVING SEMI-AUTONOMOUS ROBOTIC BEHAVIORS USING THE SOAR COGNITIVE ARCHITECTURE

Practice Session 2. HW 1 Review

Gameplay as On-Line Mediation Search

The EDA SUM Project. Surveillance in an Urban environment using Mobile sensors. 2012, September 13 th - FMV SENSORS SYMPOSIUM 2012

Executive Summary. Chapter 1. Overview of Control

MANPADS VIRTUAL REALITY SIMULATOR

Naval Combat Systems Engineering Course

Pilot Training with the Full Capability of an Integrated LVC Training System

Chapter 2 Threat FM 20-3

The Army s Future Tactical UAS Technology Demonstrator Program

Introduction to NVE GMR Sensors

Leveraging Digital RF Memory Electronic Jammers for Modern Deceptive Electronic Attack Systems

Expanded Use of the Probability of Raid Annihilation (P RA ) Testbed

Tactical and Strategic Missile Guidance

HELISIM SIMULATION CREATE. SET. HOVER

Test & Evaluation (T&E)/Science & Technology (S&T) Program

New Generation Naval Fuze FREMEN Efficiency against New Threats

Discussion of Emergent Strategy

Targeting a Safer World

Data-Starved Artificial Intelligence

Asymmetric Adversary Tactics for Synthetic Training Environments

TReX Questions (dlvc) 1. Will the dlvc Prototype have to broadcast on all 64 specified channels simultaneously or is the intent to provide a

RAND S HIGH-RESOLUTION FORCE-ON-FORCE MODELING CAPABILITY 1

Decision making in complex systems Workshop Facilitators: Dr Mal Tutty, Dr Keith Joiner, Luke Brown

Mediating the Tension between Plot and Interaction

Homemade Explosives (HME) Program Overview. Doug Bauer, PhD Explosives Division Science and Technology Directorate

F-104 Electronic Systems

Expectation-based Learning in Design

CS 387/680: GAME AI AI FOR FIRST-PERSON SHOOTERS

Virtual Sensors in a Constructive and Live World

LMG500 Getting started. Get in touch

Beyond Prolog: Constraint Logic Programming

Think About Control Fundamentals Training. Terminology Control. Eko Harsono Control Fundamental - Con't

Jager UAVs to Locate GPS Interference

Documentation and Discussion

5.1 State-Space Search Problems

Making Simple Decisions CS3523 AI for Computer Games The University of Aberdeen

FULL MISSION REHEARSAL & SIMULATION SOLUTIONS

Leveraging Simulation to Create Better Software Systems in an Agile World. Jason Ard Kristine Davidsen 4/8/2013

An Empirical Evaluation of Policy Rollout for Clue

ACAS Xu UAS Detect and Avoid Solution

Application Information Analysis of a Hall-Effect System With Two Linear Sensor ICs for 30 mm Displacement

Lecture 13: Requirements Analysis

Prolonging Sensor Network Lifetime with Energy Provisioning and Relay Node Placement by Y. Thomas Hou*, Yi Shi* Hanif D. Sherali^ Scott F.

Chapter 1: Introduction to Control Systems Objectives

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

Stealth technology can be describe as a technology that be used to make a thing being less visible to radar, infrared and other detection method.

NSMRL Report JULY 2001

CS 730/830: Intro AI. Prof. Wheeler Ruml. TA Bence Cserna. Thinking inside the box. 5 handouts: course info, project info, schedule, slides, asst 1

Virtual Reality RPG Spoken Dialog System

DYNAMICS and CONTROL

Advanced Techniques for Mobile Robotics Location-Based Activity Recognition

Knowledge Management for Command and Control

SPECTRUM SHARING: OVERVIEW AND CHALLENGES OF SMALL CELLS INNOVATION IN THE PROPOSED 3.5 GHZ BAND

Fuzzy-Heuristic Robot Navigation in a Simulated Environment

Introduction to Humans in HCI

RIGEL RESM AND RECM SYSTEMS

2003 HSC Engineering Studies Marking Guidelines

Accurate Automation Corporation. developing emerging technologies

Development of a Sense and Avoid System

Foresight for aviation industry in Russia

Binary Addition. Boolean Algebra & Logic Gates. Recap from Monday. CSC 103 September 12, Binary numbers ( 1.1.1) How Computers Work

Chapter # 1: Introduction

SENSORS SESSION. Operational GNSS Integrity. By Arne Rinnan, Nina Gundersen, Marit E. Sigmond, Jan K. Nilsen

Stanford Center for AI Safety

Case-Based Goal Formulation

CHAPTER 59 OPERATIONS SPECIALIST (OS) NAVPERS H CH-76

Virtual Grasping Using a Data Glove

Keywords. DECCA, OMEGA, VOR, INS, Integrated systems

Rethinking CAD. Brent Stucker, Univ. of Louisville Pat Lincoln, SRI

Game Theory for Safety and Security. Arunesh Sinha

Face Detection DVR includes one or more channel with face detection algorithm. It

DEFENSE and SECURITY RIGEL ES AND. Defense and security in five continents. indracompany.com

Future UAS Software Procurement

Thunderbolt+Apache Leader Designer's Notes

Area Traffic Control System (ATCS)

Application Areas of AI Artificial intelligence is divided into different branches which are mentioned below:

NASA TA-12 Roadmap Review: Manufacturing and Cross Cutting

Anti-aircraft gunner s training simulator of a portable air defense system Igla ( Igla-1 )

Intelligent Agents. Introduction to Planning. Ute Schmid. Cognitive Systems, Applied Computer Science, Bamberg University. last change: 23.

1. The decimal number 62 is represented in hexadecimal (base 16) and binary (base 2) respectively as

A New Simulation Technology Research for Missile Control System based on DSP. Bin Tian*, Jianqiao Yu, Yuesong Mei

Glossary of terms. Short explanation

AC : A STUDENT-ORIENTED CONTROL LABORATORY US- ING PROGRAM CC

Targeting a Safer World. Public Safety & Security

Perception platform and fusion modules results. Angelos Amditis - ICCS and Lali Ghosh - DEL interactive final event

Harpoon 4.2 Evolution and Improvements

NAVIGATION INSTRUMENTS - BASICS

Artificial Intelligence

Direct Manipulation. and Instrumental Interaction. CS Direct Manipulation

Fire Fighter Location Tracking & Status Monitoring Performance Requirements

SIU-CAVE. Cave Automatic Virtual Environment. Project Design. Version 1.0 (DRAFT) Prepared for. Dr. Christos Mousas JBU.

Flight Data Monitoring for General Aviation

KMD 550/850. Traffic Avoidance Function (TCAS/TAS/TIS) Pilot s Guide Addendum. Multi-Function Display. For Software Version 01/13 or later

Transcription:

Learning New Air Combat Tactics With Cascade Randolph M. Jones Keith Knudsen Laura Hamel SOAR TECHNOLOGY PROPRIETARY

Project Overview Goal Rapid Tactics Development Using Existing, Low-Cost Virtual Environments Objective System HBM DEPOT Captures demonstrations of Navy Aviation tactics using a low-cost Delta 3D Navy flight simulator Supplements them with an easy to use diagrammatic representation (pre-loaded with Navy Aviation general domain knowledge) and learning algorithm To generate high-quality human behavior models Suitable for use in any virtual environment where intelligent computer generated forces (CGFs) or non-player characters (NPCs) such as a wingman or sophisticated OPFOR are required July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 2

Crank Illustration July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 3

Crank Illustration July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 4

Crank Illustration July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 5

Crank Illustration Why did the aircraft turn right? July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 6

Learning by explanation If this is a behavior the system would already produce in this situation, there is nothing to learn If this is a behavior the system would produce in a similar situation, the conditions of the behavior can be generalized If this is a behavior the system cannot easily explain, it falls back on general knowledge to produce candidate explanations You must point at something you want to approach You must point away from something you want to avoid A sensor must be pointed at something to sense it Etc. Explanation-based learning of correctness developed by VanLehn, Jones, & Chi, 1991. July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 7

Overview of Explanation Approach Instructional problems and Examples Reasoning Engine Domain Knowledge Systematic Search Analogical Transformation Explanation-based learning of correctness Analogical search control Instructions and lessons Common sense knowledge Rules of thumb Generalized patterns Past solved problem derivations Background Knowledge July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 8

Finding Knowledge Patches Potential patches are found by using background knowledge and rules of thumb to complete plausible explanations Multiple candidates can be filtered by a variety of methods, or by asking the user Conditions on new knowledge are determined by heuristics to the best level of generality, by analogy, or by asking the user July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 9

Example Rules of Thumb A turn may indicate an approach to a route point A turn may indicate avoidance of an active threat A turn may indicate a preemptive avoidance of a potential threat A turn may indicate an approach to a target A turn may indicate an attempt to maintain sensor contact A turn may be triggered by the existence/detection of an object A turn may be triggered by a range to an object A turn may be triggered by the time since some event July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 10

Knowledge Patching Initial state False paths Dead ends Knowledge gap Solution July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 11

Cascade: Doman Knowledge Representation If an aircraft is supporting a radar-guided missile against a target, then the desired heading of the aircraft should combine the constraints of maintaining radar contact and approaching the target. constraint(v(f(desiredheading,a))=v(f(computeheading,v( f(maintainradarheading, A, T)),v(f(approachHeading, A, T)))), dh=radar_approach) :- inst(a,aircraft), inst(t,target), goal(supportmissile). The combined constraints of maintaining radar contact with a target and approaching a target imply coming to a heading equal to the bearing of the target. constraint(v(f(computeheading,v(f(maintainradarheading, A, T)),v(f(approachHeading, A, T))))=v(f(bearing,A,T)), radar_approach=bearing) :- inst(a,aircraft), inst(t,target). July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 12

Cascade: Rule of Thumb If the aircraft is attempting to achieve some (unspecified) goal and to execute some (unspecified) tactic, and there is a threat, then one possible action is to avoid the threat while maintaining radar contact with it. og_constraint(v(f(desiredheading,a))=v(f(computeheading,v(f(maintainradarheading, A, T)),v(f(avoidHeading, A, T)))), dh=radar_avoid) :- inst(a,aircraft), inst(t,threat), goal(g), tactic(x). July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 13

Cascade: Explanation Generation desired heading is 45 Try rule Heading constraints are to approach target and maintain radar contact radar and approach constraints produce a heading of 45 Try rule Use magnetic bearing when trying to approach and maintain radar contact magnetic bearing is 45 Achieved because Scene bearing Is observed to be 45 July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 14

Cascade: Explanation Generation with Learning desired heading is 5 Try rule Heading constraints are to approach target and maintain radar contact Try rule of thumb Heading constraints Might be to avoid threat and maintain radar contact radar and approach constraints produce a heading of 5 radar and avoid constraints produce a heading of 5 Try rule Use magnetic bearing when trying to approach and maintain radar contact Try rule Use magnetic bearing minus radar limits when trying to avoid and maintain radar contact magnetic bearing is 5 radar gimbal limit is 40 magnetic bearing is 45 Try rule Use magnetic bearing minus radar limits when trying to avoid and maintain radar contact Try rule Use magnetic bearing plus radar limits when trying to avoid and maintain radar contact Achieved by Scene Observati ons Failure: Rule structure does not match sought value radar and avoid constraints produce a heading of 45 July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 15 Failure: No candidate rules

Results Gold Able to apply Cascade to a tactical combat example without changing the Cascade code Cascade-style search for explanations is feasible because there is a relatively small number of sensible rules of thumb Coal Had to hand-craft tactical knowledge into Cascade s equation-based representation Some refactoring and generalization of TacAir-Soar code will be necessary to make this work In the long run, we will want more sophisticated explanation searches than currently supported by Cascade July 30, 2008 SOAR TECHNOLOGY PROPRIETARY Slide 16