180 likes | 262 Views
Allocation of Data Mining Resources: A system Partitioning and Hybrid Control Architecture. “Know the enemy, know yourself; your victory will never be endangered. Know the ground, know the weather; your victory will then be total”*. John James John-James@usma.edu.
E N D
Allocation of Data Mining Resources:A system Partitioning and Hybrid Control Architecture “Know the enemy, know yourself; your victory will never be endangered. Know the ground, know the weather; your victory will then be total”* John James John-James@usma.edu * The Art of War by Sun Tzu , Translated by Samuel B. Griffith, Page 129
TASKS ORGANIZATION Entities Entities Actions Interactions Interactions The Information to be shared: A view of the operational architecture
Conjecture for resource allocation Conjecture: Intrusion Detection will be more effective if explicit efforts are made to allocate Intrusion Detection Resources to support efforts to maintain acceptable levels of risk that enterprise knowledge has been compromised Problem: how do we identify acceptable levels of risk? Approach: Understand commander’s intent andallocate resources to identify threats to synchronization of execution of functions by units over time that achieve the intent
Phase Unit Phase I Phase II … Phase N Unit 1 Activity of Unit 1 during Phase I … … Activity of Unit 1 during Phase N Unit 2 … … … … … … … … … Unit M Activity of Unit M during Phase I … … Activity of Unit M during Phase N Synchronizing unit operations
Phase Unit Phase I (move to LOD) PhaseII (SBF4D) Phase III (Breech) Phase IV (Seize obj) D/3/67 Armor Occupy positions along LOD Move to SBF4D Suppressive fire on objective Pass through minefield to seize obj A/3/67 Armor Occupy positions to feint attack on right flank Execute feint attack on right flank Execute feint attack on right flank Execute feint attack on right flank B/3/67 Armor Occupy positions as battalion reserve Be prepared to assume main attack Be prepared to assume main attack Be prepared to assume main attack A(-)/588th Engineers Occupy positions behind D/3/67 Move forward behind D/3/67 Execute single-lane minefield breech Suppressive fire on objective from SBF4D Artillery Execute Fire Plan Suppressive fire on objective Suppressive fire on objective On order shift fires behind objective Synchronizing unit functions supporting seizing objective Falkirk
WARNING ORDER • COURSE OF ACTION DEVELOPMENT • COURSE OF ACTION ANALYSIS • COLLABORATIVE PLANNING • ORDER PREPARATION • ORDER DISSEMINATION 30 - 60 min 1 - 4 hrs 1 - 5 hrs 1.5 - 2 hrs 1 -2 hrs 1.5 - 4 hrs OVERALL ESTIMATE RANGE: 8 - 10 Hours AVERAGE TIME TAKEN: 9.5 Hours BATTALION-LEVEL DELIBERATE PLANNING TIMES* (MANUAL BASELINE) (ONLY BATTALION--ADDITIONAL TIME REQUIRED FOR COMPANY, PLATOON, & SQUAD LEVEL PLANNING) * Estimates from battalions of 4th Infantry Division and 1st Cavalry Division, October 1999
MODIFIED COMBINED OBSTACLE OVERLAY • WEATHER PRODUCTS • ENEMY COURSE OF ACTION ANALYSIS • EVENT TEMPLATE • EVENT MATRIX • DECISION SUPPORT TEMPLATE • BOS SYNCHRONIZATION MATRIX • INTELLIGENCE SYNCHRONIZATION MATRIX 2 - 6 hrs 20 min - 1 hr 1.5 - 12 hrs 1 -4 hrs 1 -2 hrs 1.5 - 4 hrs 2 - 6 hrs 30 mins - 5 hrs OVERALL ESTIMATE RANGE: 12 - 19 Hours AVERAGE TIME TAKEN: 15.5 Hours BATTALION-LEVEL AVERAGE IPB PREPARATION TIMES* (MANUAL BASELINE) * Estimates from battalions of 4th Infantry Division and 1st Cavalry Division, October 1999
Digitizing the Battlefield Digitizing the Installations First Digitized DISN Corps 2004 STEP BSA Ft. Bragg Tactical Internet JTRS WIN - T Network G1 GARRISON SUPPORT Secure Networks DDN 95 Installations VTC SCIF by 2005 GATEWAY G3 G4 SBIS RCAS DMS JCDB E - MAIL Installation Information Infrastructure Modernization Program I3MP Warfighter Information Network Discrete and continuous components
Summary • Critical infrastructure processes (such as military operations) have discrete and continuous components • Understanding complex dynamical processes requires modeling both discrete and continuous components • Allocation of data mining resources should be done to support meeting enterprise process goals (such as commander’s intent)