SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Svenson Pontus) "

Sökning: WFRF:(Svenson Pontus)

  • Resultat 1-10 av 27
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Ahlberg, Simon, et al. (författare)
  • An information fusion demonstrator for tactical intelligence processing in network-based defense
  • 2007
  • Ingår i: Information Fusion. - : Elsevier BV. - 1566-2535 .- 1872-6305. ; 8:1, s. 84-107
  • Tidskriftsartikel (refereegranskat)abstract
    • The Swedish Defence Research Agency (FOI) has developed a concept demonstrator called the Information Fusion Demonstrator 2003 (IFD03) for demonstrating information fusion methodology suitable for a future Network Based Defense (NBD) C4ISR system. The focus of the demonstrator is on real-time tactical intelligence processing at the division level in a ground warfare scenario. The demonstrator integrates novel force aggregation, particle filtering, and sensor allocation methods to create, dynamically update, and maintain components of a tactical situation picture. This is achieved by fusing physically modelled and numerically simulated sensor reports from several different sensor types with realistic a priori information sampled from both a high-resolution terrain model and an enemy organizational and behavioral model. This represents a key step toward the goal of creating in real time a dynamic, high fidelity representation of a moving battalion-sized organization, based on sensor data as well as a priori intelligence and terrain information, employing fusion, tracking, aggregation, and resource allocation methods all built on well-founded theories of uncertainty. The motives behind this project, the fusion methods developed for the system, as well as its scenario model and simulator architecture are described. The main services of the demonstrator are discussed and early experience from using the system is shared.
  •  
2.
  • Ahlberg, Simon, et al. (författare)
  • The IFD03 information fusion demonstrator
  • 2004
  • Ingår i: Proceedings of the Seventh International Conference on Information Fusion, FUSION 2004. - 917056115X ; , s. 936-943
  • Konferensbidrag (refereegranskat)abstract
    • The paper discusses a recently developed demonstrator system where new ideas in tactical information fusion may be tested and demonstrated. The main services of the demonstrator are discussed, and essential experience from the use and development of the system is shared.
  •  
3.
  • Andler, Sten F., et al. (författare)
  • SMARTracIn : a concept for spoof resistant tracking of vessels and detection of adverse intentions
  • 2009
  • Ingår i: Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VIII. - : SPIE - International Society for Optical Engineering. - 9780819475718 ; , s. 73050G-1-73050G-9
  • Konferensbidrag (refereegranskat)abstract
    • The aim of maritime surveillance systems is to detect threats earlyenough to take appropriate actions. We present the results ofa study on maritime domain awareness performed during the fallof 2008. We analyze an identified capability gap of worldwidesurveillance in the maritime domain, and report from a userworkshop addressing the identified gap. We describe a SMARTracIn conceptsystem that integrates information from surveillance systems with background knowledgeon normal conditions to help users detect and visualize anomaliesin vessel traffic. Land-based systems that cover the coastal watersas well as airborne, space-borne and ships covering open seaare considered. Sensor data are combined with intelligence information fromship reporting systems and databases. We describe how information fusion,anomaly detection and semantic technology can be used to helpusers achieve more detailed maritime domain awareness. Human operators area vital part of this system and should be activecomponents in the fusion process. We focus on the problemof detecting anomalous behavior in ocean-going traffic, and a roomand door segmentation concept to achieve this. This requires theability to identify vessels that enter into areas covered bysensors as well as the use of information management systemsthat allow us to quickly find all relevant information.
  •  
4.
  • Axelsson, Jakob, et al. (författare)
  • On the Concepts of Capability and Constituent System Independence in Systems-of-Systems
  • 2022
  • Ingår i: 2022 17th Annual System of Systems Engineering Conference, SOSE 2022. - : Institute of Electrical and Electronics Engineers Inc.. - 9781665496230 ; , s. 247-252
  • Konferensbidrag (refereegranskat)abstract
    • Systems-of-systems are designed to provide a capability that their constituent systems cannot achieve individually. A key property is that the constituent systems have some degree of operational and managerial independence. The concepts of capability and independence are thus central to the field of systems-of-systems. Yet the contemporary literature and standards only give vague definitions of these terms. This vagueness is a barrier to progress in the field, and this paper aims at contributing with a more detailed conceptualization. It describes a system capability as a state-transforming process that uses certain resources. Independence means that the system has a choice about when and how its capabilities should be activated. This requires that the system is an intelligent agent with a notion of utility, a perception of the world around it, and a decision-making capability. When given a mission, the system can complete that mission by activating appropriate combinations of capabilities. A system-of-systems can decompose its mission into parts that correspond to the capabilities of various constituent systems.
  •  
5.
  • Axelsson, Jakob, et al. (författare)
  • Truck Platooning Business Case Analysis
  • 2020
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • In this report we describe results from the work on business case analysis of the Sweden for Platooning (S4P) project. Platooning has the potential to contribute to the on-going transformation of the transport sector by reducing environmental impact, saving fuel, as well as (to a lesser extent) by improving traffic flow and safety and in the long run reducing driver hours. In order to fulfil these promises, it must be shown that there are viable business cases for all involved actors. This report describes the analysis of truck platooning business cases performed in the S4P project.Some of the main findings are that there is a significant potential for reducing fuel consumption and hence CO2 exhaust through platooning; that waiting on the order of minutes for a platooning opportunity is reasonable but that taking another route is probably not; that it is necessary to have mediating services that help platoons to form and share the costs and benefits associated with platooning; and that there are different possible ways of implementing a system for sharing the benefits.
  •  
6.
  • Brynielsson, Joel, et al. (författare)
  • A Vision of a Toolbox for Intelligence Production
  • 2008
  • Ingår i: Skövde Workshop on Information Fusion Topics (SWIFT 2008). ; , s. 77-80
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we describe preliminary work on a toolbox aiming to help analysts involved in the intelligence production process. Intelligence analysts are overwhelmed by information, both in the form of sensory data, text stemming from human observations and other sources. In order to make sense of this information and to produce the intelligence reports needed by decision-makers, assisting computer tools are needed. We briefly describe parts of the intelligence process and touch upon the subject of what parts can and cannot be automated. A tool for tagging information semantically that we are currently working on is described, and ideas for two other tools are briefly outlined.
  •  
7.
  • Brynielsson, Joel, 1974-, et al. (författare)
  • Analysis of Weak Signals for Detecting Lone Wolf Terrorists
  • 2012
  • Ingår i: Proceedings of the IEEE European Intelligence and Security Informatics Conference 2012 (EISIC 2012). ; , s. 197-204
  • Konferensbidrag (refereegranskat)abstract
    • Lone wolf terrorists pose a large threat to modern society. The current ability to identify and stop these kind of terrorists before they commit a terror act is limited since they are very hard to detect using traditional methods. However, these individuals often make use of Internet to spread their beliefs and opinions, and to obtain information and knowledge to plan an attack. Therefore, there is a good possibility that they leave digital traces in the form of weak signals that can be gathered, fused, and analyzed.In this work we present an analysis method that can be used to analyze extremist forums to profile possible lone wolf terrorists. This method is conceptually demonstrated using the FOI Impactorium fusion platform. We also present a number of different technologies that can be used to harvest and analyze information from Internet, serving as weak digital traces that can be fused using the suggested analysis method, in order to discover possible lone wolf terrorists.
  •  
8.
  • Brynielsson, Joel, et al. (författare)
  • Detecting Social Positions Using Simulation
  • 2010
  • Ingår i: Proceedings of the 2010 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2010). - : IEEE. - 9780769541389 ; , s. 48-55
  • Konferensbidrag (refereegranskat)abstract
    • Describing social positions and roles is an important topic within social network analysis. One approach is to compute a suitable equivalence relation on the nodes of the target network. One relation that is often used for this purpose is regular equivalence, or bisimulation, as it is known within the field of computer science. In this paper we consider a relation from computer science called simulation relation. Simulation creates a partial order on the set of actors in a network and we can use this order to identify actors that have characteristic properties. The simulation relation can also be used to compute simulation equivalence which is a less restrictive equivalence relation than regular equivalence but is still computable in polynomial time. This paper primarily considers weighted directed networks and we present definitions of both weighted simulation equivalence and weighted regular equivalence. Weighted networks can be used to model a number of network domains, including information flow, trust propagation, and communication channels. Many of these domains have applications within homeland security and in the military, where one wants to survey and elicit key roles within an organization. Identifying social positions can be difficult when the target organization lacks a formal structure or is partially hidden.
  •  
9.
  • Brynielsson, Joel, 1974-, et al. (författare)
  • Development of Computerized Support Tools for Intelligence Work
  • 2009
  • Ingår i: Proceedings of the 14th International Command and Control Research and Technology Symposium (14th ICCRTS). - Washington, DC.
  • Konferensbidrag (refereegranskat)abstract
    • In the tasks facing the armed forces today there is a need for new and improved intelligence analysis tools. The opponents no longer follow strict doctrines that determine their behavior and force-composition. Several different opposing groups must be taken into account, some of which will appear to act friendly towards us. In this paper, we describe a vision for how various information fusion tools can be used to help intelligence analysts and decision-makers achieve situation awareness. We consider intelligence work and propose an analyst-centric toolbox aiming to help analysts involved in the intelligence production process to prepare suitable reports. Intelligence analysts are overwhelmed by information, both in the form of sensory data, text stemming from human observations and other sources. We describe parts of the intelligence process and touch upon the subject of what parts can and cannot be automated. The toolbox is outlined by describing a number of possible tools, e.g., semantic information tagging, a threat model construction assistant, a situation picture construction assistant, social network visualization, a game-theoretic reasoning engine, etc. Some of the tools described have been implemented as concept prototypes whereas others are the subject of ongoing research.
  •  
10.
  • Brynielsson, Joel, et al. (författare)
  • Social Positions and Simulation Relations
  • 2012
  • Ingår i: Social Network Analysis and Mining. - Wien : Springer. - 1869-5450 .- 1869-5469. ; 2:1, s. 39-52
  • Tidskriftsartikel (refereegranskat)abstract
    • Describing social positions and roles is an important topic within the social network analysis. Identifying social positions can be difficult when the target organization lacks a formal structure or is partially hidden. One approach is to compute a suitable equivalence relation on the nodes of the target network. Several different equivalence relations can be used, all depending on what kind of social positions that are of interest. One relation that is often used for this purpose is regular equivalence, or bisimulation, as it is known within the field of computer science. In this paper we consider a relation from computer science called simulation relation. The simulation relation creates a partial order on the set of actors in a network and we can use this order to identify actors that have characteristic properties. The simulation relation can also be used to compute simulation equivalence which is a related but less restrictive equivalence relation than regular equivalence that is still computable in polynomial time. We tentatively term the equivalence classes determined by simulation equivalence social positions. Which equivalence relation that is interesting to consider depends on the problem at hand. We argue that it is necessary to consider several different equivalence relations for a given network, in order to understand it completely. This paper primarily considers weighted directed networks and we present definitions of both weighted simulation equivalence and weighted regular equivalence. Weighted networks can be used to model a number of network domains, including information flow, trust propagation, and communication channels. Many of these domains have applications within homeland security and in the military, where one wants to survey and elicit key roles within an organization. After social positions have been calculated, they can be used to produce abstractions of the network—smaller versions that retain some of the most important characteristics.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 27
Typ av publikation
konferensbidrag (22)
tidskriftsartikel (2)
rapport (1)
doktorsavhandling (1)
licentiatavhandling (1)
Typ av innehåll
refereegranskat (24)
övrigt vetenskapligt/konstnärligt (3)
Författare/redaktör
Svenson, Pontus (25)
Axelsson, Jakob (8)
Kaati, Lisa (6)
Schubert, Johan (5)
Mårtenson, Christian (5)
Sidenbladh, Hedvig (5)
visa fler...
Walter, Johan (3)
Brynielsson, Joel (3)
Ahlberg, Simon (2)
Martenson, Christian (2)
Svensson, Per (2)
Brynielsson, Joel, 1 ... (2)
Horndahl, Andreas (2)
Olsson, Thomas (1)
Johansson, Fredrik (1)
Högberg, Johanna (1)
Eriksson, Kerstin (1)
Nilsson, Maria (1)
van Laere, Joeri (1)
Horling, Pontus (1)
Johansson, Katarina (1)
Jored, Karsten (1)
Kjellström, Hedvig (1)
Neider, Gbran (1)
Hörling, Pontus (1)
Jöred, Karsten (1)
Lindström, Björn (1)
Neider, Göran (1)
Unden, Katarina (1)
Holmberg, Martin (1)
Gustavsson, Per M. (1)
Andler, Sten F. (1)
Dahlin, Johan (1)
Fredin, Mikael (1)
Reichenberg, Frida (1)
Janhäll, Sara, 1965- (1)
Bergh, Torsten (1)
Johansson, Alexander (1)
Mårdberg, Björn (1)
Åkesson, Viktor (1)
Kaati, Lisa, 1975- (1)
Högberg, Johanna, 19 ... (1)
Laxhammar, Rikard (1)
Horndahl, Andreas, 1 ... (1)
Johansson, Fredrik, ... (1)
Mårtenson, Christian ... (1)
Svenson, Pontus, 197 ... (1)
Brynolfsson, Joel (1)
Mårtensson, Christia ... (1)
Falkman, Göran, Dr. (1)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (11)
RISE (9)
Mälardalens universitet (7)
Umeå universitet (2)
Högskolan i Skövde (2)
Försvarshögskolan (2)
visa fler...
Linköpings universitet (1)
Chalmers tekniska högskola (1)
visa färre...
Språk
Engelska (27)
Forskningsämne (UKÄ/SCB)
Teknik (10)
Naturvetenskap (9)
Samhällsvetenskap (5)
Medicin och hälsovetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy