A Probabilistic computational model for identifying organizational structures from uncertain message data

The knowledge of the principles and goals under which an adversary organization operates is required to predict its future activities. To implement successful counter-actions, additional knowledge of the specifics of the organizational structures, such as command, communication, control, and information access networks, as well as responsibility distribution among members of the organization, is required. In this paper, we employ a hidden Markov random field (HMRF) model and a graph matching algorithm to discover the attributes of and relationships among organizational members, assets, environment areas, and mission tasks. We focus on identifying the mapping between hypothesized nodes of enemy command organization and tracked individuals and resources. This also allows us to compute the posterior energy function quantifying the belief that the observed data has been generated by a particular organization. The experiment results show that our probabilistic model and the simulated annealing search algorithm can accurately identify the different organizational structures and achieve correct node mappings among organizational members.

[1]  Fan Chung,et al.  Spectral Graph Theory , 1996 .

[2]  Krishna R. Pattipati,et al.  Dynamically adaptable m-best 2-D assignment algorithm and multilevel parallelization , 1999 .

[3]  Krishna R. Pattipati,et al.  Information integration via hierarchical and hybrid bayesian networks , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[4]  Y. Bar-Shalom,et al.  A generalized S-D assignment algorithm for multisensor-multitarget state estimation , 1997, IEEE Transactions on Aerospace and Electronic Systems.

[5]  Jeffrey K. Uhlmann,et al.  New extension of the Kalman filter to nonlinear systems , 1997, Defense, Security, and Sensing.

[6]  Thia Kirubarajan,et al.  Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software , 2001 .

[7]  X. R. Li,et al.  Survey of maneuvering target tracking: II. Ballistic target models , 2001 .

[8]  D. D. Mueller,et al.  Fundamentals of Astrodynamics , 1971 .

[9]  H. C. Longuet-Higgins,et al.  An algorithm for associating the features of two images , 1991, Proceedings of the Royal Society of London. Series B: Biological Sciences.

[10]  Krishna R. Pattipati,et al.  NetSTAR: Methodology to Identify Enemy Network Structure, Tasks, Activities, and Roles , 2005 .

[11]  Yaakov Bar-Shalom,et al.  Dimensionless score function for multiple hypothesis tracking , 2007 .

[12]  Huimin Chen,et al.  Multisensor track-to-track association for tracks with dependent errors , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[13]  J. Bather,et al.  Tracking and data fusion , 2001 .

[14]  Ted E. Senator,et al.  Countering terrorism through information technology , 2004, CACM.

[15]  Y. Bar-Shalom,et al.  Unbiased converted measurements for tracking , 1998 .

[16]  Yaakov Bar-Shalom,et al.  A multisensor-multitarget data association algorithm for heterogeneous sensors , 1993 .

[17]  James P. Ferry XMAP: Track-to-Track Association with Metric, Feature, and Target-type Data , 2006, 2006 9th International Conference on Information Fusion.

[18]  Stephen M. Smith,et al.  Segmentation of brain MR images through a hidden Markov random field model and the expectation-maximization algorithm , 2001, IEEE Transactions on Medical Imaging.

[19]  Michael Brady,et al.  Feature-based correspondence: an eigenvector approach , 1992, Image Vis. Comput..

[20]  Krishna R. Pattipati,et al.  Hidden Markov Models and Bayesian Networks for Counter-Terrorism , 2006, Emergent Information Technologies and Enabling Policies for Counter-Terrorism.