The increasing decentralization of computing resources and the proliferation of personal and small business computers create new problems in computer security. One such problem is the protection of externally supplied software, i.e., software supplied by other than the users/owners of these small computers. In the case of personal and small business computers, proprietary software serves as the primary example. In distributed systems comprised of autonomously managed nodes, members of the user...
Topics: DTIC Archive, Kent,Stephen Thomas, MASSACHUSETTS INST OF TECH CAMBRIDGE LAB FOR COMPUTER SCIENCE,...
Six specific image enhancement algorithms are analyzed, simulated and evaluated for potential real-time application to imagery obtained from target acquisition systems. Three processing methods are recommended as operator controlled options for application to the imagery. They are median filtering, gradient processing and locally adaptive gain control. The objective for this effort was to identify and examine methods for enhanced acquisition and handoff for small targets in a complex and...
Topics: DTIC Archive, Pinson, Lewis J, TENNESSEE UNIV SPACE INST TULLAHOMA, *ALGORITHMS, *IMAGE PROCESSING,...
When most people think of national security and the global war on terrorism, they often focus on the activities taking place in Afghanistan and Iraq. However, the war on terrorism is genuinely global and is being fought in many places beyond U.S. Central Commands area of responsibility in the Middle East and the Horn ofAfrica. From Asia to South America, service members are pursuing multiple strategies to prevent the planning and execution of terrorist attacks. These strategiesinvolve working...
Topics: DTIC Archive, Purdy,Ellen M, Office of the Deputy Under Secretary of Defense for Acquisition and...
Recently there has been increasing interest in the development and distribution of low-cost modular electroencephalography (EEG) systems that can be assembled and used by scientists, physicians, and even novices for widespread application, including real-world neuroimaging, in-home medical monitoring, and gaming/entertainment, across a diverse user community (e.g., OpenBCI). Accordingly, the purpose of this pilot project was to design and test the applicability of such a prototype EEG headset...
Topics: DTIC Archive, Feng, Theodric, ARMY RESEARCH LAB ABERDEEN PROVING GROUND MD ABERDEEN PROVING GROUND...
This project is part of a larger effort that focuses on human-automation coordination in the context of the development, integration, and validation of a computational cognitive model that acts as a full-fledged synthetic teammate on an otherwise all-human team. The team performs a small command-and-control task (i.e., team control of an Unmanned Aerial System; UAS). The research integrated the synthetic teammate model into the CERTT II (Cognitive Engineering Research on Team Tasks II) testbed...
Topics: DTIC Archive, Cooke ,Nancy J, Cognitive Engineering Research Institute Mesa United States, man...
This project conducted basic research aimed at creating software systems that can collaborate naturally with people over extended periods of time. This involved investigating how to make a habitable combination of natural language and sketch understanding that supports interactive learning of complex domains, including giving advice, learning by reading, and learning by demonstration. We developed the notion of type-level qualitative representations that significantly improve expressive power...
Topics: DTIC Archive, NORTHWESTERN UNIV EVANSTON IL, *ARTIFICIAL INTELLIGENCE, *MAN COMPUTER INTERFACE,...
This is the final report for a project that was in a series of projects on the development and validation of the EPICcognitive architecture for modeling human cognition and performance. This project focussed on extending thearchitecture to account for sound and speech phenomena, with emphasis on multichannel speech comprehension ina simple command-and-control task for which considerable empirical data is available. Additional work concerned application of the EPIC architecture to Navy research...
Topics: DTIC Archive, Kieras, David E, University of Michigan Division of Research Development Ann Arbor...
This effort is focused on developing and applying tools for modeling human information processing. Models include transformations of response time data from empirical studies, and complex network models for capturing broader dynamics of complex systems. Progress so far has resulted in some theoretical work in the area of response time modeling of workload capacity and dimer automata complex systems models of information transmission through a network. We have designed a novel approach for...
Topics: DTIC Archive, AIR FORCE RESEARCH LAB WRIGHT-PATTERSON AFB OH HUMAN PERFORMANCE WING (711TH),...
Inevitably, whenever any senior leader embarks on a set of initiatives intended to improve an organizations performance and labels that set of initiatives, he or she can expect one reaction for certain. That reaction is what I would describe as genuflecting in the direction of the title of the initiative by various stakeholders who are trying to show the leader that they are aligned with his or her intent. Sometimesusually, I hopethis is sincere and backed up by real actions that reflect the...
Topics: DTIC Archive, Tyree,Benjamin, Defense Acquisition University Fort Belvoir United States, unmanned...
This case study analyzes the factors that influence trust and acceptance among users (in this case, test pilots) of the Air Force's Automatic Ground Collision Avoidance System. Our analyses revealed that test pilots' trust depended on a number of factors, including the development of a nuisance free algorithm, designing fly-up evasive maneuvers consistent with a pilot's preferred behavior, and using training to assess, demonstrate, and verify the system's reliability. These factors are...
Topics: DTIC Archive, AIR FORCE RESEARCH LAB WRIGHT-PATTERSON AFB OH HUMAN PERFORMANCE WING (711TH),...
The rapid development of autonomous systems (AS), which are technological systems or processes that either support or replace human decision making, will have a significant impact on emergency medical services (EMS). EMS provider organizations must be prepared to not only interact with AS by having response protocols in place that provide responders with guidance in dealing with these systems during an emergency, but they must also be able to leverage this technology to improve the quality of...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *EMERGENCY MEDICINE, *MEDICAL SERVICES,...
Accurate and efficient real-time cognitive workload assessment has many important applications, and physiological monitoring has proven quite helpful with this assessment. One such physiological signal, the electrooculogram (EOG), can provide blink rate and blink duration measures. In a recent study, we developed and validated a robust blink detection algorithm based on the vertical EOG (VEOG). This algorithm does not require baseline data and is adaptive in the sense that it works for a wide...
Topics: DTIC Archive, AIR FORCE RESEARCH LAB WRIGHT-PATTERSON AFB OH HUMAN PERFORMANCE WING (711TH) HUMAN...
In this research effort we used our new usability lab containing a state-of-the art suite of cognitive, physiological, and behavioral measurement devices to isolate and quantify the various low level variables that indicate the level of trust that is present while a person works with his or her computer system. Recent advances in Biomedical Engineering have resulted in the development of extremely non-invasive brain measurement devices. These devices hold great potential for the quantitative,...
Topics: DTIC Archive, HAMILTON COLLEGE CLINTON NY, *ELECTROENCEPHALOGRAPHY, *MAN COMPUTER INTERFACE,...
This proposal sought to better understand the psychological component of human-automation interaction with a focus on understanding what makesautomation seem trustable. Specifically, we will investigate the role of anthropomorphic automation on operators trust, dependence, andperformance with automation. Evidence from the literature and our own recently collected data suggests that the design of automation can affecthow operators perceive the automation and their likelihood of using it. We seek...
Topics: DTIC Archive, Pak,Richard, Clemson University Clemson, Automation, Aging(Physiology), MAN MACHINE...
Augmented reality technologies have reached a stage where commercially viable systems will soon enter the consumer market. These technologies merge virtual content with a user s real-world perceptual experiences. The following paper argues that AR systems will in fact serve as the next revolution in information technologies and as such it should be leveraged by the U.S. military to maintain its relative information superiority advantages. The use of AR systems at the tactical level and...
Topics: DTIC Archive, Kenny,Ryan J, Naval War College Newport United States, VIRTUAL REALITY, information...
Our research had three main thrusts: (i) Optimization-based motion planning: Traditional approaches to motion planning tend to slow down in high-dimensional spaces and for curvature constrained problems. We developed an optimization-based approach that can efficiently solve such problems. (ii) Belief space planning: To account for uncertainty about the environment and robot belief space planning tries to find a plan that optimizes (on expectation) the sequence of probability distributions that...
Topics: DTIC Archive, CALIFORNIA UNIV REGENTS BERKELEY, *ROBOTS, COLLISION AVOIDANCE, CONTROL, EXPERIMENTAL...
Unlike their human counterparts, most autonomous systems to date are not effective at characterizing or bounding mission risk. In this project, we enabled the development of risk-sensitive autonomous systems through three main contributions: first, we introduced cRMPL, an extension of RMPL where one can specify acceptable risk levels for different mission segments through the addition of chance constraints. Second, we extended the continuous planner, used by our executive, to generate and adapt...
Topics: DTIC Archive, MASSACHUSETTS INST OF TECH CAMBRIDGE COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE...
Active and passive user is a way to understand how users can have different perspectives of the use of technologies in complex socio-technical systems. These different perspectives can influence how trust is formed and calibrated for individual users and teams of users. As a result, appropriate use, misuse, disuse, or abuse of technology may occur. This project pioneered the research in active passive user systems through a series of experimental studies. The goals of the project were to...
Topics: DTIC Archive, WISCONSIN UNIV MADISON, *EXPERIMENTAL PSYCHOLOGY, *SOCIAL PSYCHOLOGY, *SYSTEMS...
In 2015, the Battlefield Information Processing Branch investigated using machine learning (ML) to identify military hand gestures. A Naive Bayes model was trained and created as an initial test. Naturally, the capability of the model relies on the quality and quantity of the training data. Therefore, the data collection is an important and necessary step in building a ML classifier. This report describes the procedure used to collect arm gesture movement data using a Myo armband. The source...
Topics: DTIC Archive, ARMY RESEARCH LAB ADELPHI MD COMPUTATIONAL AND INFORMATION SCIENCES DIRECTORATE,...
This report describes an architecture of wearable sensors in the context of an Army tactical environment. The architecture is implemented in functional software that integrates the sensor data, performs predictions to determine contextual gesture information, and disseminates this information to other Soldiers and computing assets where the presentation is properly adapted. This prototype framework demonstrates the feasibility of how a heterogeneous pervasive computing environment can integrate...
Topics: DTIC Archive, ARMY RESEARCH LAB ADELPHI MD COMPUTATIONAL AND INFORMATION SCIENCES DIRECTORATE,...
High - Speed Oblivious RAM (HS - ORAM) started with a simple thesis: hardware roots of trust can be feasibly deployed as root of trust anchors in the design of secure outsourced data access protocols. HS - ORAM deploys a number of server - side software components running inside tamper - proof secure coprocessors (SCPUs). Employing Oblivious RAM techniques prevents the server from gaining knowledge about the transactions that are occurring within the SCPU from the access patterns. However,...
Topics: DTIC Archive, PRIVATE MACHINES INC BROOKLYN NY, *COMPUTER ACCESS CONTROL, *COMPUTER NETWORK...
This final report details the IMMERSE effort under the SSIM program. SSIM is designed to address the challenge of training our warfighters to successfully engage with Others (people who are culturally different from oneself) to accomplish a diverse set of military missions. The SSIM IMMERSE effort involves demonstrating the possibility of conducting that training using an immersive, computer-based training system that embodies a mentored practice environment. As part of this effort, we are...
Topics: DTIC Archive, RAYTHEON CO CAMBRIDGE MA BBN TECHNOLOGIES, *COMMUNITY RELATIONS, *COMPUTER AIDED...
The goal of this project is to investigate whether Electroencephalogy (EEG) can provide useful feedback whentraining rapid decision-making. More specifically, EEG will allow us to provide online feedback about the neuraldecision processes occurring during image-recognition training, and in turn will lead to faster decision responses,more hits, and fewer false alarms. A second subgoal is to investigate whether this can be done under free-viewingconditions in which eye movements must be made...
Topics: DTIC Archive, Peterson,Matthew S, George Mason University Fairfax United States, Biofeedback,...
In this project, we tried to solve the isolation problem from a different perspective. We still set up two OSes for the user. One is the trusted OS for secure transactions; the other is the untrusted OS for normal transactions. To overcome the drawbacks of the VMMs, we provide a firmware-assisted system, referred to as secure switching system, which allows users to switch between a trusted operating system and an untrusted operating system on the same machine with a short switching time. In our...
Topics: DTIC Archive, SECURE COMMAND LLC CENTREVILLE VA, *COMPUTER NETWORK SECURITY, *OPERATING...
Mitigating human errors is a priority in the design of complex systems, especially through the use of body area networks. This paper describes early developments of a dynamic data driven platform to predict operator error and trigger appropriate intervention before the error happens. Using a two-stage process, data was collected using several sensors (e.g. electroencephalography, pupil dilation measures, and skin conductance) during an established protocol - the Stroop test. The experimental...
Topics: DTIC Archive, PURDUE UNIV LAFAYETTE IN, *COGNITION, *DECISION MAKING, *OPERATORS(PERSONNEL),...
This project focuses directly on immersive science. It answers basic questions about interfaces and their characteristics with respect to human responses with these interfaces. In this context, it studies immersion and the measurement of presence as it relates to the virtual world paradigm. Additionally, this proposal answers questions regarding effectiveness of virtual worlds versus traditional training, as posed by an Army laboratory and a Marine Corps program office. As part of this...
Topics: DTIC Archive, TEXAS UNIV-PAN AMERICAN EDINBURG, *MAN COMPUTER INTERFACE, *MILITARY TRAINING,...
Active authentication is the problem of continuously verifying the identity of a person based on behavioral aspects of their interaction with a computing device. In this study, we collect and analyze behavioral biometrics data from 200 subjects, each using their personal Android mobile device for a period of at least 30 days. This dataset is novel in the context of active authentication due to its size, duration, number of modalities, and absence of restrictions on tracked activity. The...
Topics: DTIC Archive, DREXEL UNIV PHILADELPHIA PA, *BIOMETRIC SECURITY, *COMPUTER NETWORK SECURITY,...
In this report we consider the problem of sensor-level packet loss (SLPL) as it applies to network intrusion detection. We explore 2 research questions: 1) Is there sufficient regularity in SLPL to allow an algorithm to be developed to model it? and 2) Is the impact of SLPL on network intrusion detection performance sufficiently regular to allow a formula to be developed that will accurately predict the effect? We developed and validated the Pcapreplay program, which allowed us to characterize...
Topics: DTIC Archive, ARMY RESEARCH LAB ABERDEEN PROVING GROUND MD COMPUTATIONAL AND INFORMATION SCIENCES...
This thesis focuses on dynamic model based state estimation for hydraulic humanoid robots. The goal is to produce state estimates that are robust and achieve good performance when combined with the controller. Three issues are addressed in this thesis. How to use force sensor and IMU information in state estimation? How to use the full-body dynamics to estimate generalized velocity? How to use state estimation to handle modeling error and detect humanoid falling? Hydraulic humanoid robots are...
Topics: DTIC Archive, CARNEGIE-MELLON UNIV PITTSBURGH PA ROBOTICS INST, *ROBOTS, DECOMPOSITION,...
Human judgment of uncertainty suffers from various cognitive biases. In the military context, operators of autonomous vehicles such as unmanned aerial vehicles (UAVs) may assess probabilities at levels that are not objectively justified. Some of the psychological issues that affect probability judgment include inaccuracy in verbally reporting probabilities and a lack of honesty in expressing the true probability assessments. The objectives of this project were to take bold and critical steps...
Topics: DTIC Archive, GEORGIA UNIV ATHENS, *JUDGEMENT(PSYCHOLOGY), *MULTIAGENT SYSTEMS,...
This project consists of the development of a software application for the user-guided design of a robotic system in conjunction with a computer-automated optimization system (Fig. 1). In Year 1 (Feb, 2011 - Feb 2012) we demonstrated an initial system for allowing a human user to configure a robot, its environment and to specify a task. In addition, we also demonstrated a paradigm for allowing a human-user to guide an automated optimization / machine learning system to collaborate in solving a...
Topics: DTIC Archive, CALIFORNIA UNIV SANTA CRUZ, *LEARNING MACHINES, *MAN COMPUTER INTERFACE, *ROBOTICS,...
Prominent business and science leaders believe that technological advances will soon allow humankind to develop artificial intelligence (AI) that meets and even exceeds human cognitive capabilities. This strong AI will potentially revolutionize national security affairs by decreasing the human cost of war while increasing the speed and efficiency of America's tools of national power at the tactical, operational, and strategic levels of conflict. However, with these benefits comes the risk of a...
Topics: DTIC Archive, NAVAL WAR COLLEGE NEWPORT RI JOINT MILITARY OPERATIONS DEPT, *ARTIFICIAL...
This project was part of the DARPA Virtual Robotics Challenge (VRC). The goal was to control a simulated Atlas robot in the Gazebo/ODE virtual environment and make it walk, drive a car, and connect a hose. Our approach was based on model - predictive control (MPC). We created a parallel simulation in our virtual environment (MuJoCo) which was able to simulate the robot dynamics much faster than real - time. This made it possible to optimize the controls online -- by exploring many candidate...
Topics: DTIC Archive, WASHINGTON UNIV SEATTLE, *CONTROL SYSTEMS, *DECISION MAKING,...
We present PPC (Plan Projection and Clustering), an algorithm that creates a plan hierarchy for case-based plan recognition systems. PPC is motivated by a desire to improve the response time of robots working in collaboration with humans. It projects the plans of a case base into a Euclidean space and iteratively clusters plans within that space, producing an abstraction hierarchy. Case retrieval traverses down this hierarchy and requires fewer comparisons than a search of the corresponding...
Topics: DTIC Archive, NAVAL RESEARCH LAB WASHINGTON DC NAVY CENTER FOR APPLIED RESEARCH IN ARTIFICIAL...
Accurately modeling uncontrolled agents (or recognizing their behavior and intentions) is critical to planning and acting in a multi-agent environment. However, behavior recognition systems are only as good as their observations. Here we argue that acting, even acting at random, can be a critical part of gathering those observations. Furthermore, we claim that acting intelligently via automated planning can significantly reduce the time it takes to confidently classify agent behaviors. We...
Topics: DTIC Archive, NAVAL RESEARCH LAB WASHINGTON DC, *COMPUTER VISION, *MULTIAGENT SYSTEMS, *PATTERN...
To perform complex tasks, a team of robots requires both reactive and deliberative planning. For reactive control, a restricted variant of Linear Temporal Logic called General Reactivity(1) can be used to synthesize correct-by-construction controllers in polynomial time, but they often ignore time and resource constraints to maintain tractable synthesis. For deliberation, hierarchical planning can be used to reason about time and resources. However, the coordination of reactive control and...
Topics: DTIC Archive, OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE (RESEARCH AND ENGINEERING) WASHINGTON...
Models of errors during routine sequential action are typically interface-independent. We present here evidence that different task spatial layouts, however, result in different patterns of sequence errors. We explain this data by expanding upon the Memory for Goals framework's activation-based, sequential process to include environmental (such as visual) contextual cues, as well as a richer priming structure. We show a strong qualitative and quantitative fit to experimental data.
Topics: DTIC Archive, NAVAL RESEARCH LAB WASHINGTON DC, *COGNITIVE SCIENCE, *ERROR ANALYSIS, *MAN COMPUTER...
By 2040, advanced brain-computer interfaces (BCIs) will provide the American warfighter with remarkable advantages. As the role of robots and incredibly advanced computer systems permeate throughout the military infrastructure, BCI will provide the means to realize maximum performance from human-computer collaboration enhancing both human and software performance; providing the needed ability to solve and adapt to growing battlespace complexities. Current BCI technology already demonstrates the...
Topics: DTIC Archive, Cutter,Patrick A, Air Command And Staff College Maxwell Air Force Base United States,...
Advanced Driver Assistance Systems (ADAS) have made driving safer over the last decade. They prepare vehicles for unsafe road conditions and alert drivers if they perform a dangerous maneuver. However, many accidents are unavoidable because by the time drivers are alerted, it is already too late. Anticipating maneuvers a few seconds beforehand can alert drivers before they perform the maneuver and also give ADAS more time to avoid or prepare for the danger. Anticipation requires modeling the...
Topics: DTIC Archive, CORNELL UNIV ITHACA NY DEPT OF COMPUTER SCIENCE, *AUTOMOTIVE VEHICLES, *COMPUTER...
Imitation learning is the study of algorithms that attempt to improve performance by mimicking a teacher's decisions and behaviors. Such techniques promise to enable effective programming by demonstration to automate tasks, such as driving, that people can demonstrate but find difficult to hand program. This work represents a summary from a very personal perspective of research on computationally effective methods for learning to imitate behavior. I intend it to serve two audiences: to engage...
Topics: DTIC Archive, CARNEGIE-MELLON UNIV PITTSBURGH PA ROBOTICS INST, *DECISION MAKING, *LEARNING...
In the past, robot operation has been a high-cognitive-workload task requiring human operators to dedicate a large amount of their cognitive resources to maintaining awareness about a robot s state and functioning. This technical report describes research of operator-knowledge-management aids, in the form of visual display-screen overlays, used to help increase performance and reduce perceived workload. The aids were overlays displaying what an autonomous robot perceived in the environment and...
Topics: DTIC Archive, ARMY RESEARCH LAB ABERDEEN PROVING GROUND MD HUMAN RESEARCH AND ENGINEERING...
Joint robot-human operations potentially increase the efficiency, effectiveness and safety of the tasks they perform. The utilization of an autonomous underwater vehicle (AUV) as a robotic diver s assistant demands joint, dynamic operations involving precise physical interactions between an AUV, human divers, and the environment, which, in turn, requires a robust, accurate control system. A robot acting as a dive assistant would perform tasks such as tool carrying, worksite illumination, or...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *ADAPTIVE CONTROL SYSTEMS,...
The aim of this thesis is to develop and test a proof-of-concept augmented reality display that presents critical navigation information to naval conning officers. The objective of this research effort was to study the feasibility and usability of such an approach in operational conditions. The testbed platform consisted of a virtual environment that fully simulated a conning officer's basic tasks in conditions of restricted navigation; this type of setup enabled a cost-effective test solution...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *AUGMENTATION, *NAVAL VESSELS, *SURFACE...
The problem with current international disaster relief is ineffective communication, coordination, cooperation, and collaboration (4C). Ineffective international 4C allows chaos and anarchy to significantly hinder disaster-relief efforts. After action reports (AARs) and disaster relief (DR) materials were examined to identify systemlevel issues during DR missions. These issues were examined to determine if DR exhibits characteristics of a wicked problem. The results of systems-thinking analysis...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *COLLABORATIVE TECHNIQUES, *HUMANITARIAN...
The objective of this research is to create an interface that is tailored to individual Soldiers' cognitive styles, individual differences, and expertise while at the same time reduces the interface complexity perceived by the Soldier. This interface design will improve upon existing adaptive interfaces by going beyond adaptation to the individual's prior actions and tailoring the interface to how each user perceives, processes, and filters information without the added complexity of current...
Topics: DTIC Archive, ARMY RESEARCH LAB ABERDEEN PROVING GROUND MD HUMAN RESEARCH AND ENGINEERING...
The material in this Test Operations Procedure (TOP) is intended to provide guidance for the planning and conduct of a human factors engineering (HFE) analysis of the Soldier-computer interface (SCI), during development testing (DT) by the Army Test and Evaluation Command (ATEC). The procedures and criteria contained herein will analyze the adequacy of those aspects of the software, hardware, and workspace design for the test function of operability that influence operator performance in a...
Topics: DTIC Archive, ARMY ELECTRONIC PROVING GROUND FORT HUACHUCA AZ, *MAN COMPUTER INTERFACE, COMPUTER...
Time management for both individuals and groups is notoriously hard. The planning process is tedious, and the outcome is often inefficient for both the individual and the group. We seek to improve both the process and the outcome by transforming the digital calendar from a passive repository of events to an active scheduling assistant in four key steps. First, building on logical theories of intention, we enrich the expressive power of calendar entries to better capture the way people naturally...
Topics: DTIC Archive, STANFORD UNIV PALO ALTO CA, *BEHAVIORAL SCIENCES, *COMPUTER PROGRAMS, *LEARNING...
With the growth of cloud computing, many businesses, both small and large, are opting to use cloud services compelled by a great cost savings potential. This is especially true of public cloud computing which allows for quick, dynamic scalability without many overhead or long-term commitments. However, one of the largest dissuasions from using cloud services comes from the inherent and unknown danger of a shared platform such as the hypervisor. An attacker can attack a virtual machine (VM) and...
Topics: DTIC Archive, AIR FORCE RESEARCH LAB ROME NY INFORMATION DIRECTORATE, *CLOUD COMPUTING, *COMPUTER...
Results are reported on new methods to capture, model, represent, and ultimately understand human behavior in complex and possibly adversarial scenarios involving autonomous and semi-autonomous machine agents. Principles and models of cognitive and social psychology play a major role in the work. A particular objective is to develop a fundamental understanding of how humans and autonomous machine agents can operate as teams to efficiently accomplish mission objectives. An important focus of the...
Topics: DTIC Archive, BOSTON UNIV MA COLL OF ENGINEERING, *MAN MACHINE SYSTEMS, BEHAVIOR, COGNITION,...
For complex systems that embed automation but also rely on human interaction for guidance and contingency management holistic models are needed that provide for an understanding of the individual human and computer elements and address the critical interactions of such complex systems. Discrete event simulation (DES) models and system dynamics (SD) models are two different approaches that can be used to address these requirements. Both modeling approaches can support the designers of future...
Topics: DTIC Archive, DUKE UNIV DURHAM NC, *INTERACTIONS, *MAN COMPUTER INTERFACE, *MODELS, AUTONOMOUS...