Foreword |
|
xi | |
Preface |
|
xiii | |
|
1 Introduction to Cognitive Electronic Warfare |
|
|
1 | (20) |
|
1.1 What Makes a Cognitive System? |
|
|
2 | (2) |
|
1.2 A Brief Introduction to EW |
|
|
4 | (2) |
|
1.3 EW Domain Challenges Viewed from an AI Perspective |
|
|
6 | (7) |
|
1.3.1 Situation-Assessment for Electronic Support and Electronic Warfare Battle Damage Assessment |
|
|
7 | (1) |
|
1.3.2 Decision-Making for Electronic Attack, Electronic Protect, and Electronic Battle Management |
|
|
8 | (2) |
|
|
10 | (1) |
|
1.3.4 Connection between Cognitive Radio and EW Systems |
|
|
11 | (1) |
|
1.3.5 EW System Design Questions |
|
|
12 | (1) |
|
1.4 Choices: AI or Traditional? |
|
|
13 | (3) |
|
|
16 | (1) |
|
|
17 | (4) |
|
|
17 | (4) |
|
|
21 | (20) |
|
2.1 Observables That Describe the Environment |
|
|
23 | (5) |
|
2.1.1 Clustering Environments |
|
|
24 | (4) |
|
2.2 Control Parameters to Change Behavior |
|
|
28 | (2) |
|
2.3 Metrics to Evaluate Performance |
|
|
30 | (2) |
|
2.4 Creating a Utility Function |
|
|
32 | (4) |
|
2.5 Utility Function Design Considerations |
|
|
36 | (2) |
|
|
38 | (3) |
|
|
38 | (3) |
|
3 Machine Learning Primer |
|
|
41 | (16) |
|
|
43 | (3) |
|
3.1.1 Support Vector Machines |
|
|
43 | (1) |
|
3.1.2 Artificial Neutral Networks |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (1) |
|
3.4 Open-Set Classification |
|
|
48 | (1) |
|
3.5 Generalization and Meta-learning |
|
|
48 | (1) |
|
3.6 Algorithmic Trade-Offs |
|
|
49 | (3) |
|
|
52 | (5) |
|
|
52 | (5) |
|
|
57 | (28) |
|
4.1 Emitter Classification and Characterization |
|
|
58 | (5) |
|
4.1.1 Feature Engineering and Behavior Characterization |
|
|
59 | (1) |
|
4.1.2 Waveform Classification |
|
|
60 | (1) |
|
4.1.3 Specific Emitter Identification |
|
|
61 | (2) |
|
4.2 Performance Estimation |
|
|
63 | (2) |
|
4.3 Multi-Intelligence Data Fusion |
|
|
65 | (4) |
|
4.3.1 Data Fusion Approaches |
|
|
66 | (1) |
|
4.3.2 Example: 5G Multi-INT Data Fusion for Localization |
|
|
67 | (1) |
|
4.3.3 Distributed-Data Fusion |
|
|
68 | (1) |
|
|
69 | (2) |
|
|
71 | (1) |
|
|
72 | (3) |
|
4.6.1 Automatic Target Recognition and Tracking |
|
|
74 | (1) |
|
|
75 | (10) |
|
|
75 | (10) |
|
5 Electronic Protect and Electronic Attack |
|
|
85 | (26) |
|
|
87 | (9) |
|
5.1.1 Multi-Objective Optimization |
|
|
88 | (2) |
|
5.1.2 Searching Through the Performance Landscape |
|
|
90 | (4) |
|
5.1.3 Optimization Metalearning |
|
|
94 | (2) |
|
|
96 | (3) |
|
|
99 | (1) |
|
5.4 Distributed Optimization |
|
|
100 | (2) |
|
|
102 | (9) |
|
|
103 | (8) |
|
6 Electronic Battle Management |
|
|
111 | (28) |
|
|
113 | (13) |
|
6.1.1 Planning Basics: Problem Definition, and Search |
|
|
115 | (1) |
|
6.1.2 Hierarchical Task Networks |
|
|
116 | (1) |
|
|
117 | (3) |
|
6.1.4 Information Uncertainty |
|
|
120 | (2) |
|
6.1.5 Temporal Planning and Resource Management |
|
|
122 | (3) |
|
6.1.6 Multiple Timescales |
|
|
125 | (1) |
|
|
126 | (1) |
|
6.3 Human-Machine Interface |
|
|
127 | (5) |
|
|
132 | (7) |
|
|
132 | (7) |
|
7 Real-Time In-Mission Planning and Learning |
|
|
139 | (20) |
|
|
139 | (5) |
|
7.1.1 Electronic Warfare Battle Damage Assessment |
|
|
141 | (3) |
|
7.2 In-Mission Replanning |
|
|
144 | (4) |
|
|
148 | (5) |
|
7.3.1 Cognitive Architectures |
|
|
150 | (1) |
|
|
150 | (1) |
|
7.3.3 Support Vector Machines |
|
|
151 | (1) |
|
|
151 | (1) |
|
7.3.5 Markov Decision Processes |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (6) |
|
|
153 | (6) |
|
|
159 | (24) |
|
8.1 Data Management Process |
|
|
160 | (9) |
|
|
162 | (5) |
|
|
167 | (2) |
|
|
169 | (1) |
|
|
169 | (2) |
|
8.3 Data Management Practice |
|
|
171 | (7) |
|
8.3.1 Data in an Embedded System |
|
|
172 | (1) |
|
|
172 | (2) |
|
|
174 | (2) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
178 | (5) |
|
|
179 | (4) |
|
|
183 | (10) |
|
9.1 Software Architecture: Interprocess |
|
|
183 | (4) |
|
9.2 Software Architecture: Intraprocess |
|
|
187 | (2) |
|
|
189 | (2) |
|
|
191 | (2) |
|
|
191 | (2) |
|
|
193 | (28) |
|
|
194 | (4) |
|
|
198 | (2) |
|
|
200 | (9) |
|
10.3.1 Regression and Normalized Root-Mean-Square Error |
|
|
201 | (1) |
|
10.3.2 Classification and Confusion Matrices |
|
|
201 | (5) |
|
10.3.3 Evaluating Strategy Performance |
|
|
206 | (3) |
|
10.4 Learning Assurance: Evaluating a Cognitive System |
|
|
209 | (8) |
|
10.4.1 Learning Assurance Process |
|
|
209 | (5) |
|
10.4.2 Formal Verification Methods |
|
|
214 | (1) |
|
10.4.3 Empirical and Semiformal Verification Methods |
|
|
215 | (2) |
|
|
217 | (4) |
|
|
217 | (4) |
|
11 Getting Started: First Steps |
|
|
221 | (12) |
|
11.1 Development Considerations |
|
|
222 | (2) |
|
|
224 | (4) |
|
|
224 | (3) |
|
|
227 | (1) |
|
11.2.3 Radio Frequency Data-Generation Tools |
|
|
227 | (1) |
|
|
228 | (5) |
|
|
228 | (5) |
Acronyms |
|
233 | (4) |
About the Authors |
|
237 | (2) |
Index |
|
239 | |