Navigation Links
'Fighting' IED attacks with SCARE technology
Date:2/5/2010

COLLEGE PARK, Md. -- University of Maryland researchers have developed and successfully tested new computer software and computational techniques to analyze patterns of improvised explosive device (IED) attacks in Iraq, Afghanistan or other locations and predict the locations of weapons caches that are used by insurgents to support those attacks.

University of Maryland computer science Ph.D. student Paulo Shakarian and computer science Professor V.S. Subrahmanian, together with University of Torino (Italy) computer science Professor Maria-Luisa Sapino developed a new computational technique called geospatial abduction designed to help analysts locate caches of explosive weapons. Their resulting software, called SCARE (Spatio-Cultural Abductive Reasoning Engine) allows human analysts to combine available intelligence with this analytical computational technique to identify the most probable locations of IED weapons caches. The researchers say tests conducted with the SCARE software have been quite accurate.

"The SCARE software is not a stand-alone tool," said Subrahmanian, who also is director of the University of Maryland's Institute for Advanced Computer Studies "Military commanders and intelligence analysts would use SCARE in conjunction with their own experience and knowledge of a region, and together with available intelligence to pinpoint likely cache locations."

"SCARE is designed to address a very real tactical problem our soldiers encounter on a regular basis," said Shakarian, who is a U.S. Army Captain enrolled in the Army's Advanced Civil Schooling program "By helping concentrate the focus of both observations and searches, we think SCARE would allow field commanders to better deploy resources, and in many cases, catch insurgents in the process of resupplying such locations or actually carrying out IED attacks." Shakarian has spent over two years in Iraq.

To test their technique, Subrahmanian, Shakarian and Sapino ran through the SCARE program publically available data on the locations of IED attacks in Baghdad that occurred over a 21-month period. The locations of IED caches predicted by SCARE were then compared with actual locations of caches found in that region during that time. The predictions usually were within a half mile of actual locations. A paper on these findings was presented during the Third International Conference on Computational Cultural Dynamics, December 7- 8, 2009 (P. Shakarian, V.S. Subrahmanian, M.L. Sapino. SCARE: A Case Study with Baghdad - ICCCD, 2009)

Revealing NUMB3RS

The SCARE software with its logic-based, mathematical algorithms works like something out of the CBS TV show NUMB3RS, a "drama about an FBI agent who recruits his mathematical-genius brother to help the Bureau solve a wide range of challenging crimes in Los Angeles." Like the problems solved through application of logic-based mathematical formulas in the show, SCARE starts from known information to plot out underlying patterns and locations.

And like many of the NUMB3RS episodes, the SCARE mathematical formula is based on abductive logic. Classical deductive reasoning tries to state what follows from a set of facts, while abduction tries to find the best explanation for a set of observations. In this case, the observations are the locations of the IED attacks, together with the ethnic make-up of neighborhoods. The best explanations correspond to the most likely locations for the weapons caches supporting these attacks.

A different type of logic-based computational system and software called SOMA developed by at the University of Maryland actually was cited on a recent NUMB3RS show ("Hydra," Season 6, Episode 5), though the university was not credited. Developed for the Department of Defense, SOMA (Stochastic Opponent Modeling Agents) is a formal, logical-statistical reasoning language. It uses data about past behavior of terror groups to learn rules about the probability of an organization, community, or person taking certain actions in different situations in the future.

Building Real Security through Virtual Worlds:

Subrahmanian and another Maryland colleague, John Dickerson, recently wrote in the journal Science about how computerized modeling and prediction of group behavior, together with improvements in video game graphics, are making possible virtual worlds in which defense analysts can explore and predict results of many different possible military and policy actions.


'/>"/>

Contact: Lee Tune
ltune@umd.edu
301-405-4679
University of Maryland
Source:Eurekalert

Related biology technology :

1. Texas State University Prepares for Phase 2 Research on the Potential New Cancer and HIV Fighting ALKA-V6 Compound
2. Grocery Produce Fighting for a Cause - Wholly Pink Guacamole
3. Cancer Fighting Nutrition Supplement, Caplex, Offers Cancer Patients A New All-Natural Treatment Option
4. Historic Breakthrough in Fighting Childrens Batten Disease as China Stem Cells Give New Lease on Life to 6 Year Old California Boy
5. Multiple Types of Heart Attacks Reduced by Prasugrel in TRITON-TIMI 38 Trial
6. C1-Esterase Inhibitor Concentrate Rapidly Relieves Abdominal and Facial Attacks in Patients with Hereditary Angioedema, According to Pivotal Study
7. Truly sick or simply scared?
8. InfoSpi Shall Benefit From Contract for Future Use of IBS Technology
9. Biofuels Technology Leader Qteros Names Mick Sawka Vice President, Business Development
10. UH Superconductivity Center Receives Texas Emerging Technology Fund Award
11. Japan Science and Technology Agency (JST) Selects Scopus Custom Data for Citation Linkage Analysis Between Scientific Articles and Patents
Post Your Comments:
*Name:
*Comment:
*Email:
(Date:2/11/2016)... --  BioInformant announces the February 2016 release of ... Tools, and Technologies – Market Size, Segments, Trends, and ... The first and only market research ... has more than a decade of historical information on ... cell type. This powerful 175 page global strategic report ...
(Date:2/10/2016)... , Febr. 10, 2016 /PRNewswire/ - BioAmber Inc. (NYSE: ... to announce that Mitsui & Co. Ltd., its partner ... acid plant, is investing an additional CDN$25 million in ... its stake from 30% to 40%.  Mitsui will also ... acid produced in Sarnia , providing ...
(Date:2/10/2016)... , Feb.10, 2016 ASAE is introducing a ... Management Companies (AMC) the option of joining or renewing ... fee determined by staff size, every employee in any ... ASAE and reap all available member benefits.   ... new organizational membership options will allow organizations of any ...
(Date:2/10/2016)... BOSTON , Feb. 10, 2016  Matchbook, ... sourcing for fast growing biotech companies, announced today ... Senior Procurement Strategic Advisor. Jim brings nearly 25 ... sourcing and procurement, having spent nearly two decades ... Supply Chain/Logistics and Procurement at Genzyme and, most ...
Breaking Biology Technology:
(Date:2/2/2016)... RESTON, Va. , Feb. 2, 2016 /PRNewswire/ ... contract award from the U.S. Army Research Office ... extend the range and sensitivity of the company,s ... DoD,s Past Accounting Mission and, more generally, defense-related ... its DNA phenotyping capabilities (predicting appearance and ancestry ...
(Date:1/28/2016)... Jan. 28, 2016 Synaptics (NASDAQ: SYNA ), a ... its second quarter ended December 31, 2015. ... of fiscal 2016 increased 2 percent compared to the comparable quarter ... of fiscal 2016 was $35.0 million, or $0.93 per diluted share. ... income for the first quarter of fiscal 2016 grew 9 percent ...
(Date:1/22/2016)... , Jan. 22, 2016 ... the addition of the "Global Biometrics ... to their offering. --> ... the "Global Biometrics Market in Retail ... --> Research and Markets ...
Breaking Biology News(10 mins):