skip to main content
10.1145/1599272.1599285acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Design of a temporal geosocial semantic web for military stabilization and reconstruction operations

Published: 28 June 2009 Publication History

Abstract

The United States and its Allied Forces have had tremendous success in combat operations. This includes combat in Germany, Japan and more recently in Iraq and Afghanistan. However not all of our stabilization and reconstruction operations (SARO) have been as successful. Recently several studies have been carried out on SARO by National Defense University as well as for the Army Science and Technology. One of the major conclusions is that we need to plan for SARO while we are planning for combat. That is, we cannot start planning for SARO after the enemy regime has fallen. In addition, the studies have shown that security, power and jobs are key ingredients for success during SARO. It is important to give positions to some of the power players from the fallen regime provided they are trustworthy. It is critical that investments are made to stimulate the local economies. The studies have also analyzed the various technologies that are needed for successfully carrying out SARO which includes sensors, robotics and information management. In this project we will focus on the information management component for SARO. As stated in the work by the Naval Postgraduate School, we need to determine the social, political and economic relationships between the local communities as well as determine who the important people are. This work has also identified the 5Ws (Who, When, What, Where and Why) and the (H).
To address the key technical challenges for SARO, we are defining a Life cycle for SARO and subsequently developing a Temporal Geosocial Service Oriented Architecture System (TGSSOA) that utilizes Temporal Geosocial Semantic Web (TGS-SW) technologies for managing this lifecycle. We are developing techniques for representing temporal geosocial information and relationships, integrating such information and relationships, querying such information and relationships and finally reasoning about such information and relationships so that the commander can answer questions related to the 5Ws and H. To our knowledge we believe that this is the first attempt to develop TGS-SW technologies as well as lifecycle management for SARO.

References

[1]
Alam Ashraful et al, 2008. GRDF and Secure GRDF. IEEE ICDE Workshop on Secure Semantic Web, Cancun Mexico, April 2008. (version also to appear in Computer Standards and Interfaces Journal)
[2]
N. Berg, 2006. "A Simple Bayesian Procedure for Sample Size Determination in an Audit of Property Value Appraisals", Real Estate Economics 34(1), 133--155, 2006
[3]
N. Berg, "Normative Behavioral Economics", Journal of Socio-Economics 32, 411--423, 2003
[4]
H. Binnendjik and S. Johnson, 2004. Transformation for Stabilization and Reconstruction Operations, Center for Technology and National Security Policy, National Defense University Press.
[5]
R. Chait, A. Sciarretta, and D. Shorts, October 2006. Army Science and Technology Analysis for Stabilization and Reconstruction Operations, Center for Technology and National Security Policy, NDU Press.
[6]
R. Chait, A. Sciarretta, J. Lyons, C. Barry, D. Shorts, and D. Long, September 2007. A Further Look at Technologies and Capabilities for Stabilization and Reconstruction Operations, Center for Technology and National Security Policy, NDU Press.
[7]
Pavan Chittumala et al, November 2007. Emergency Resposne System to handle Chemical Spills, IEEE Internet Computing.
[8]
Bing Tian Dai, Nick Koudas, Divesh Srivastava, Anthony K. H. Tung, and Suresh Venkatasubramanian, "Validating Multi-column Schema Matchings by Type," 24th International Conference on Data Engineering (ICDE), pp. 120--129, 2008.
[9]
A. Doan and A. Halevy, Spring 2005. Semantic Integration Research in the Database Community: A Brief Survey, AI Magazine, Special Issue on Semantic Integration.
[10]
AnHai Doan, Jayant Madhavan, Pedro Domingos, Alon Y. Halevy: Ontology Matching: A Machine Learning Approach. Handbook on Ontologies 2004: 385--404.
[11]
Erhard Rahm and Philip A. Bernstein. A survey of approaches to automatic schema matching. The VLDB Journal, 10(4):334--350, 2001.
[12]
Marc Ehrig, Steffen Staab, York Sure, Bootstrapping Ontology Alignment Methods with APFEL, In Y. Gil, E. Motta, V. R. Benjamins, M. A. Musen, Proceedings of the 4th International Semantic Web Conference, ISWC 2005, Galway, Ireland, November 6--10, 2005., volume 3729 of LNCS, pp. 186--200. Springer, Nov. 2005
[13]
GAO Report, STABILIZATION AND RECONSTRUCTION Actions Needed to Improve Governmentwide Planning and Capabilities for Future Operations Statement of Joseph A. Christoff, Director International Affairs and Trade, and Janet A. St. Laurent, Director Defense Capabilities and Management, Oct. 2007
[14]
G. Gigerenzer and P. M. Todd, "Simple Heuristics That Make Us Smart", Oxford University Press, 1999
[15]
John Grimes, DoD Information Sharing Strategy, 2007.
[16]
Karen Guttieri, Integrated Education and Training Workshop, Peacekeeping and Stability Operations Institute, Naval Postgraduate School, September 2007.
[17]
Karen Guttieri, Stability, Security, Transition Reconstruction: Transformation for peace, Quarterly Meeting of Transformation Chairs, Naval Postgraduate School, February 2007.
[18]
W. Jiang, C. Clifton and M. Kantarcioglu, "Transforming Semi-Honest Protocols to Ensure Accountability", Data and Knowledge Engineering (DKE), an Elsevier journal, 2007.
[19]
Y. Kalfoglou and M. Schorlemmer. IF-Map: an ontology mapping method based on information flow theory. Journal on Data Semantics, 1(1):98--127, Oct. 2003.
[20]
Latifur Khan, Dennis McLeod, and Eduard H. Hovy: Retrieval effectiveness of an ontology-based model for information selection. VLDB J. 13(1): 71--85 (2004).
[21]
Latifur Khan, et al Geospatial Data Mining for National Security, Proceedings Intelligence and Security Conference, New Brunswick, NJ, May 2007.
[22]
J. Laffont and D. Martimort, "The Theory of Incentives: The Principal-Agent Model", Princeton University Press, 2001.
[23]
Madhavan, 2005. Corpus-based Schema Matching, ICDE-05.
[24]
Newman E. J., The structure and function of complex networks, arXiv, 2003
[25]
N. F. Noy and M. A. Musen. The PROMPT suite: Interactive tools for ontology merging and mapping. International Journal of Human-Computer Studies, 59(6):983--1024, 2003.
[26]
M. Osborne and A. Rubinstein, "A Course in Game Theory", MIT Press, 1999.
[27]
A survey of approaches to automatic schema matching. The VLDB Journal, 10(4):334--350, 2001.
[28]
Santos, 2007. "Computational Modeling: Culturally-Infused Social Networks", Office of Naval Research (ONR) Workshop on Social, Cultural, and Computational Science, and the DoD Workshop on New Mission Areas: Peace Operations, Security, Stabilization, and Reconstruction, Arlington, VA, 2007.
[29]
G. Stumme and A. Mädche. FCA-Merge: Bottom-up merging of ontologies. In 7th Intl. Conf. on Artificial Intelligence (IJCAI '01), pages 225--230, Seattle, WA, 2001.
[30]
Ganesh Subbiah, DAGIS System, MS Thesis, The University of Texas at Dallas.
[31]
Bhavani Thuraisingham, Geospatial data management research at the University of Texas at Dallas, presented at OGC meeting for University members and OGC Interoperability day, Tysons Corner, VA, October 2006.
[32]
B. Thuraisingham, Assured Information Sharing, Book Chapter: Intelligence and Security Informatics, Springer 2008 (Editor: Chris Yang).

Index Terms

  1. Design of a temporal geosocial semantic web for military stabilization and reconstruction operations

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
    June 2009
    94 pages
    ISBN:9781605586694
    DOI:10.1145/1599272
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 June 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. SARO
    2. SAROL

    Qualifiers

    • Research-article

    Conference

    KDD09
    Sponsor:

    Upcoming Conference

    KDD '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 264
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media