Vai al contenuto principale della pagina
| Autore: |
Haigh Karen Zita
|
| Titolo: |
Cognitive Electronic Warfare
|
| Pubblicazione: | Norwood : , : Artech House, , 2025 |
| ©2025 | |
| Edizione: | 2nd ed. |
| Descrizione fisica: | 1 online resource (432 pages) |
| Nota di contenuto: | Cognitive Electronic Warfare: An Artifical Intelligence Approach, Second Edition -- Foreword -- Preface -- Foreword to the 1st Edition -- Preface to the 1st Edition -- Introduction to Cognitive EW -- The Vision of Cognitive EW -- What Is a Cognitive System? -- A Brief Introduction to AI -- A Brief Introduction to EW -- Cognition in EW -- Civilian EW -- Cognitive Radio, Cognitive Radar, and Cognitive EW -- EW System Design Questions -- EW Domain Challenges Viewed from an AI perspective -- Situation Assessment for Electronic Support and EWBattle Damage Assessment -- Decision Making for Electronic Attack, ElectronicProtect, and Electronic Battle Management -- User Requirements -- Reader's Guide -- Conclusion -- References -- Objective Function -- Observables that Describe the Environment -- Clustering Environments -- Control Parameters to Change Behavior -- Metrics to Evaluate Performance -- Creating a Utility Function -- Utility Function Design Considerations -- Example Observables, Controllables, and Metrics -- Conclusion -- References -- Machine Learning Primer -- Common ML Algorithms -- Support Vector Machines (SVMs) -- Artificial Neural Networks -- Ensemble Methods -- Other ML Algorithms -- Generalization to Surprise -- Hybrid ML -- Open-Set Classification -- Metalearning -- Generative AI -- Embedded ML -- Training an ML Model -- Algorithmic Trade-Offs -- The Speed of AI -- Conclusion -- References -- Electronic Support -- Detection, Localization, and Signal Separation -- Emitter Classification and Characterization -- Feature Engineering and Behavior Characterization -- Waveform Classification -- Specific Emitter Identification -- Performance Estimation -- Multisensor Data Fusion -- Data Fusion Approaches -- Example: 5G Data Fusion for Localization -- Distributed Data Fusion -- Anomaly Detection -- Causal Relationships -- Intent Recognition. |
| Conclusion -- References -- Electronic Protect and Electronic Attack -- Optimization -- Multiobjective Optimization -- Searching through the Performance Landscape -- Scheduling -- Reward Hacking -- Anytime Algorithms -- Centralized, Distributed, and Decentralized Optimization -- Centralized Optimization -- Distributed Optimization -- Decentralized Optimization -- Summary -- Conclusion -- References -- Electronic Battle Management -- Planning -- Planning Basics: Problem Definition, and Search -- Hierarchical Task Networks -- Action Uncertainty -- Information Uncertainty -- Temporal Planning and Resource Management -- Multiple Timescales -- Game Theory -- Human-Machine Interface -- System Designers -- Commanders, Mission Planners, and EWOs -- Understanding the Human Users -- Conclusion -- References -- Real-Time In-Mission Planning and Learning -- Execution Monitoring -- EW Battle Damage Assessment -- In-Mission Replanning -- In-Mission Learning -- Updating Models -- Exploitation, Exploration, and Active Learning -- Reinforcement Learning Approaches -- Conclusion -- References -- Data Management -- Data Quality Control -- Data Curation -- Bias and Noise -- Traceability -- Data Modeling: Ontologies, Metadata, and Schemas -- Ontologies -- Metadata -- Schemas -- Data Management Practice -- Data in an Embedded System -- Data Diversity -- Data Augmentation -- Forgetting Data -- Data Privacy and Security -- Conclusion -- References -- Architecture -- Software Architecture: Interprocess -- Software Architecture: Intraprocess -- Language Choices -- Hardware Choices -- Conclusion -- References -- Test & -- Evaluation -- Paradigm Shifts -- Validating the Learning Process -- Iterative Design and Test -- Learning Assurance Process -- Evaluate Learning Goals -- Determine Range of Operational Effectiveness -- Mixed-Fidelity Closed-Loop Testing. | |
| Closed-Loop Test Framework -- Multifidelity Vertically Integrated Test Framework -- Mixed-Fidelity Test Framework -- Integrating Third-Party Tools for System Analysis -- Behavior-Based Models with Closed-Loop Effects -- Stimulus-Response Effects -- High-Level Behaviors -- Detailed Transceiver Characteristics -- Possible Future Capabilities -- Smart Experimental Design -- Computing Accuracy and Adequacy -- Regression and Normalized RMSE -- Classification and Confusion Matrices -- Evaluating Strategy Performance -- Adequacy: Strategy Performance over a Scenario -- Ablation Testing -- Verification Approaches -- Formal Verification Methods -- Empirical and Semiformal Verification Methods -- Example Implementation: Scenario Driver -- Conclusion -- References -- Getting Started: First Steps -- Engineering Resilient Systems -- Development Considerations -- Choices: AI or Traditional? -- ML Toolkits -- RF Datasets and RF Data-Generation Tools -- RF Datasets for ML -- RF Data-Generation Tools -- Projects -- Project Idea: RF Fingerprinting -- Project Idea: Open-Set Recognition -- Project Idea: Detect Causal Connections -- Project Idea: Describe Emitters -- Project Idea: Classify WiFi and Bluetooth Interference -- Project Idea: GNSS Signal Integrity and Spoofing Detection -- Project Idea: Multisensor Fusion for Localization -- Project Idea: Multiplatform Route Planning -- Project Idea: Decision Loop and Online Learning -- Project Idea: EW Decision Making with 5G Technologies -- Project Idea: Augment Existing Data -- Project Idea: Evaluate ML Models -- Project Idea: Implement a DeepNet on an FPGA -- Project Idea: Data Compression -- Conclusion -- References -- Acronyms -- About the Authors -- Index. | |
| Titolo autorizzato: | Cognitive Electronic Warfare ![]() |
| ISBN: | 1-68569-104-8 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9911042409403321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |