
Marion G Ceruti- Ph.D., Physical Chemistry
- Researcher at Navy's Space and Naval Warfare Systems Center Pacific
Marion G Ceruti
- Ph.D., Physical Chemistry
- Researcher at Navy's Space and Naval Warfare Systems Center Pacific
About
139
Publications
68,641
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
886
Citations
Introduction
Current institution
Navy's Space and Naval Warfare Systems Center Pacific
Current position
- Researcher
Additional affiliations
June 1979 - May 2011
September 1973 - June 1979
Publications
Publications (139)
A system includes a controller, a Hall-effect sensor and transceiver connected to the controller, and a flux-producint element having a plurality of magnetic flux lines emanating therefrom. The system may be secured to or contained within a wearable glove. The flux-producing element may be coupled to an object separate from the wearable glove. The...
The lifecycle management of Command and Control and Command, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) technologies depends on test data for research, development, testing, evaluation, maintenance, and sustainment. Creating the infrastructure necessary to support these activities is difficult and expensive. P...
Decision makers in command centers need better methods to deal with deceptive information before it influences and degrades the outcome of command decisions. Deception poses unique threats to coalitions that are less likely to occur with individual forces. Coalitions also offer diverse viewpoints and approaches to dealing with deception. Cognitive...
Civil authorities and emergency managers need to collect, manage, analyze and display network and geographic information to understand better the connectivity of critical sectors of the community and their spatial relationships to physical attributes of geography and terrain, the built environment, critical infrastructures and key resources, and th...
This paper describes the architecture and requirements of an integrated system that is needed to support command and control for the interoperability-capability focus area. The architecture is designed to enhance situational awareness during emergencies such as earthquakes, volcanic eruptions, wild fires, floods, tsunamis, mud slides, storms, torna...
This paper describes the work of the W3C Decisions and Decision-making Incubator 1 , with the goal to identify requirements for a standard decision format, through a set of use cases, and to develop a first version of a potential standard format for representing decisions, fulfilling the requirements of the use cases and exploiting semantic web sta...
This paper describes the work of the W3C Decisions and Decision-making Incubator1, with the goal to identify requirements for a standard decision format, through a set of use cases, and to develop a first version of a potential standard format for representing decisions, fulfilling the requirements of the use cases and exploiting semantic web stand...
This paper describes the architecture and requirements of an integrated system that is needed to support the command-and-control requirements of the Department of Homeland Security during crisis prevention, disaster relief, and other critical operations. The architecture is based on emerging science and technology that has been under development in...
This paper describes an analytical study of language, culture, cognition, and their contribution to concepts in an upper ontology to support asymmetric and irregular warfare for the U.S. Marine Corps. This ontology is designed to interact with decision-support applications for fighting the global war on terror. The long-term goal of this effort is...
This position paper describes a vision of how Chemical Biological Radiological and Nuclear (CBRN) situation awareness and threat assessment can benefit from the use of Gesture-Directed Sensor-Information Fusion (GDSIF). It describes a concept of operations for the war fighter " s use of electronic wireless-communication gloves (eGloves) to communic...
This paper describes design considerations for the implementation of a decision-support system based on a Common Decision Exchange Protocol (CDEP), which is an XML-, REST-based protocol for representing generic human decisions in a simple, interoperable format. The paper also describes characteristics of decisions that should be expressed using CDE...
Research shows that an analytical solution of information velocity is intractable but metrics that support understanding the factors that affect information flow can be useful. This paper describes an agent-based model for information flow that explores physical analogs to the metric's causal measures. Interactions and exchanges are modeled as phys...
This paper explains how to participate in Information- Technology (IT) standards organizations for employees of the Departments of Defense (DoD) and Homeland Security (DHS). When these commercial tools are acquired or developed for first responders or war fighter, these tools will
interoperate with other tools and will meet the requirements if the...
“Global Interoperability Using Semantics, Standards, Science and Technology” is a concept that is predicated on the assumption that the semantic integration, frameworks and standards that support information exchange, and advances in science and technology can enable information-systems interoperability for many diverse users. This paper recommends...
This paper describes human-system software techniques to improve communications while wearing Mission-Oriented Protective Posture (MOPP) gear. Chemical Biological Defense (CBD) situation awareness and threat assessment can be enhanced using visual and multi-modal information representations and mission-context-appropriate user interfaces to manage...
A wireless data glove was developed to control a Talon robot. Sensors mounted on the glove send signals to a processing unit,
worn on the user???s forearm that translates hand postures into data. An RF transceiver, also mounted on the user, transmits
the encoded signals representing the hand postures and dynamic gestures to the robot via RF link. C...
Motivation – Share information; make better decisions. Research approach – Explore the use of XML code to document and transmit characteristics of decisions. Findings/Design – The paper recommends a CDEP. Research limitations/Implications – This work implies that we need an open-standard body similar to OMG in the object-oriented world. This would...
The rapid flow of information through a command-and-control organization strengthens the agility of the command and increases the efficiency of the organization. Therefore, a metric is proposed for the speed of useful information as it flows in an organization, enterprise or command structure. Information is assumed to be useful if a member of the...
This paper describes an agent-based model for exploring the effects of traditional supervisory merit-based promotions and hierarchical organizational structure on the flow of information. Each agent simulating a worker follows the same rules for handling information and promotion: Agents differ only in the breadth of information they consider impor...
Military personnel need better ways to communicate in hostile, noisy, silence-mandated, and/or extreme environments. Typing on a keyboard is difficult and impractical while wearing comprehensive protective clothing. Wireless data gloves were researched and developed to transmit and receive ASCII code and other signals as hand gestures. Two categori...
This position paper describes a vision of how Chemical Biological Radiological and Nuclear (CBRN) situation and threat assessment [1] can benefit from assimilating and fusing all-source data. Leveraging net-centric enterprise services can enable a distributed CBRN Common-Operating Picture (COP). Distributed processing using a Service-Orientated Arc...
Modeling and simulation, intelligent software agents, and other technologies can support network centric distributed tracking. These technologies came together in the Knowledge Management for Distributed Tracking (KMDT) research and development program to improve naval command, control, and decision support. The program’s approach is based on the u...
Service-oriented architecture (SOA) ideally provides reliable access to a scalable, agile, and affordable computing environment. In the tactical military context its ultimate goals are greater situational awareness and enhanced operational capability through the efficient sharing of information. Component systems, such as networks and data sources,...
The Mayan languages have been spoken for over 5,000 years. The language structure, syntax, and semantics of Mayan languages are rich and varied. This paper describes how to apply some principles of the Maya Hieroglyphic language to interactive command-and-control displays in decision-support system. It also suggests some preliminary elements of a t...
New technology is needed to counter the growing threat of chemical, biological, radiological, nuclear, and explosive (CBRNE) terrorist attacks. Joint Department of Defense (DoD) CBRNE programs can support homeland-defense efforts in this area. This paper explains some DoD- developed technology involved in advancing and integrating hardware and soft...
This paper presents concepts, features, and important considerations in the development of an iconic language for military command-and-control com- munications. It describes communities of interest in the Department of Defense and how iconic language as used in the various communities can differ. Various sections are focused on the components of th...
The purpose of this investigative study is to develop a model for a system of systems to improve situation awareness and targeting through a real-time aerially deployed wireless sensor network. The main hypothesis of this work is that scalable, affordable, real-time wireless network can contribute to the common operating picture. This network can b...
This paper presents concepts, content, status, applications and challenges of chat as used in the military context of secure
net-centric command and control. It describes the importance of chat as it contributes to situation assessment and the common
operating picture, which presents current collective knowledge of the battle space. The paper discu...
Knowledge Management for Distributed Tracking is an ongoing research and development program to improve naval command, control, and decision support. The program's approach includes modeling and simulation, intelligent software agents, integrated-sensor ontology, and reusing methods from past projects. The software simulates a hypothetical scenario...
The focus of this poster is on an analysis of the relationships between U.S. Department of Defense
(DoD) networks and policy, including policy about technology acquisition and usage. Policy affects technology
research, development, test, evaluation, transition and refresh. Specific network-related technology
areas support military command, control,...
This article explains some of the technology involved in advancing and integrating development of the ultra-sensitive Surface-Enhanced Raman Spectroscopy (SERS)-based hardware, the Knowledge Amplification by Structured Expert Randomization (KASER) anthrax detector, the Joint Warning and Reporting Network (JWARN) Component Interface Device (JCID)-on...
This paper expands and consolidates the use of analogies in thermodynamics to explore concepts in the characterization of information systems. The analogy spans the range of information systems to include databases, knowledge bases and model bases. It includes but is not limited to pressure, expressiveness, temperature, tractability, degrees of ord...
Knowledge Management for Distributed-Tracking (KMDT) is an ongoing research and development project to explore methods to improve military-information functions in the battle space, such as command, control, and decision sup-port. It features a scenario that shows how knowledge-management technologies, such as ontologies and intelligent agents can...
A major problem in military command centers is the delivery of correct and complete information about events in the battle space to the commanders in a timely manner. Another problem is how to integrate heterogeneous sensor data to capture the concepts, assumptions, and intent of the data sources. The U.S. Navy is addressing this problem through FO...
This paper describes how pedigree is used to support and enhance situation and threat assessment. It is based on the findings of the technology group of the Data Fusion Levels Two and Three Workshop sponsored by the Office of Naval Research held in Arlington, VA from 15-18 Nov. 2005. It identifies areas that need improvement in situation assessment...
Knowledge management for distributed-tracking (KMDT) is a U.S. Naval research and development project to improve military-communications and information functions in the battle space. These functions include command, control, data fusion, and decision support. It features a scenario for modeling and simulation that shows how knowledge-management te...
This paper describes Knowledge Management for Distributed-Tracking (KMDT), which is an ongoing research and development project to explore methods to improve military functions in the battle space, such as command, control, and decision support. It features a hypothetical use-case scenario that shows how knowledge-management technologies, such as o...
This paper describes key concepts and applications of composable FORCEnet, which is the US Navy’s operational construct architectural framework for naval warfare in the information age. It describes the concepts and architecture, in several categories: 1) systems and general software engineering; 2) networks; 3) intelligent software; and 4) network...
This paper describes key concepts and applications of composable FORCEnet, which is the US Navy’s operational construct architectural framework for naval warfare in the information age. It describes the concepts and architecture, in several categories: 1) systems and general software engineering; 2) networks; 3) intelligent software; and 4) network...
This paper reports progress and practical experience in security-requirements engineering using the security center Knowledge Web (KWeb) as a case study. It describes the project, architecture, and the approach of the Spiral System Implementation Methodology (SSIM) in all three phases of development. The network-centric best practices, which are so...
This paper describes the application and the approach to modeling and simulation for Knowledge Management for Distributed Tracking (KMDT). This is an ongoing research and development program to explore methods to improve command, control, and decision support functions in the battle space. The focus of the simulation effort is on a hypothetical sce...
Knowledge Management for Distributed-Tracking (KMDT) is an ongoing research and development project to explore methods to improve military-information functions in the battle space, such as command, control, and decision support. It features a scenario that shows how knowledge-management technologies, such as ontologies and intelligent agents can b...
Knowledge Management for Distributed-Tracking (KMDT) is an ongoing research and development project to explore methods to improve military-information functions in the battle space, such as command, control, and decision support. It features a scenario that shows how knowledge-management technologies, such as ontologies and intelligent agents can b...
Knowledge Management for Distributed-Tracking (KMDT) is an ongoing research and development project to explore methods to improve military-information functions in the battle space, such as command, control, and decision support. It features a scenario that shows how knowledge-management technologies, such as ontologies and intelligent agents can b...
This paper describes key concepts and applications of composable FORCEnet, which is the US Navy's operational construct architectural framework for naval warfare in the information age. It describes the concepts and architecture, in several categories: 1) systems and general'software engineering; 2) networks; 3) intelligent software; and 4) network...
This paper reports progress and practical experience in security-requirements engineering using the security center Knowledge Web (KWeb) as a case study. It describes the project, architecture , and the approach of the Spiral System Implementation Methodology (SSIM). This engineering approach is an example of rapid prototyping in which the requirem...
This paper reports progress and practical experience in security-requirements engineering using the security center Knowledge Web (KWeb) as a case study. It describes the project, architecture , and the approach of the Spiral System Implementation Methodology (SSIM). This engineering approach is an example of rapid prototyping in which the requirem...
This paper describes key concepts of composable FORCEnet, which is the US Navy's operational construct architectural framework for naval warfare in the information age. It describes the concepts and architecture, in several categories: 1) systems and general software engineering; 2) networks ; 3) intelligent software; and 4) network security. The e...
For Pt. 2 see ibid., (2004). For Pt.1 see ibid., p.170-175 (2002). This paper expands the use of analogies in thermodynamics to explore concepts in the characterization of information systems. The focus is on systems of liquid-liquid equilibrium and how they are similar to information-systems integration. New ideas, such as metrics, are introduced...
In this paper, we explore the interdependent roles of computational intelligence, data mining, and machine learning. We explain how these three seemingly independent AI specialties are inextricably linked through the science of randomization and reuse. Computational intelligence is shown to imply soft computing, whose bounds are soft or fuzzy only...
This paper describes the authors’ efforts to develop a pedigree ontology for level- one sensor fusion. This work was performed in the context of naval operations but the concepts employed are applicable to any domain involving sensor fusion. The ontology that has been developed is formally represented using OWL, the Web Ontology Language used in de...
In this paper we discuss the need for real-time data mining for many applications in government and industry and describe resulting research issues. We also discuss dependability issues including incorporating security, integrity, timeliness and fault tolerance into data mining. Several different data mining outcomes are described with regard to th...
This paper presents an approach to object-oriented programming (OOP) through software intelligent retrieval and reuse. OO development never has met the objectives for software reuse. Thus, a Uniform Modeling Language (UML) has arisen as a standard top-down way for describing component functions and properties. Components may be defined in any langu...
This paper reports progress and practical experience in security-requirements engineering using the security center Knowledge Web (KWeb) as a case study. It describes the project, architec-ture, and the approach of the Spiral System Implementation Methodology (SSIM). This engineering approach is an example of rapid prototyping in which the requirem...
This position paper presents concepts and applications of an ontology for level-one sensor fusion. It covers platforms, sensors, tangible entities as well as intangible entities, such as concepts. Relationships between entities are part of the ontology. Verbs as well as nouns are included. Concepts such as reasoning under uncertainty also are part...
This position paper presents concepts and applications of an ontology for level-one sensor fusion. It covers platforms, sensors, tangible entities as well as intangible entities, such as concepts. Relationships between entities are part of the ontology. Verbs as well as nouns are included. Concepts such as reasoning under uncertainty also are part...
This paper highlights some major trends and developments in knowledge management with particular emphasis on knowledge capturing and authoring, and how this technology can be combined with intelligent agents to produce advanced capabilities for command and control systems. Past trends, present accomplishments and future work in knowledge management...
This paper presents current and future uses of adaptive and mobile intelligent agents to increase the dependability of FORCEnet by improving network-centric warfare in general, and the battlefield single integrated picture (SIP) in particular. In a dynamically changing environment, agents that monitor the battle space and facilitate knowledge manag...
The use of Extensible Markup Language (XML) Schemas to structure data is examined for its potential to promote effective, self-organizing, application-independent and platform-independent information exchange systems. As data resources become increasingly numerous and voluminous, consistent information access and exchange will be achieved by applyi...
This paper highlights some major trends and developments in knowledge management with particular emphasis on knowledge capturing and authoring, and how this technology can be combined with intelligent agents to produce advanced capabilities for command and control systems. Past trends, present accomplishments and future work in knowledge management...
The use of Extensible Markup Language (XML) Schemas to structure data is examined for its potential to promote effective, self-organizing, application-independent and platform-independent information exchange systems. As data resources become increasingly numerous and voluminous, consistent information access and exchange will be achieved by applyi...
This paper highlights some major challenges in information management, and how to overcome some of these problems. The paper explains the importance of effective information management. Other related topics covered here include standards and their commonality; legacy systems, data access and aggregation including data-access policy, system integrat...
This paper expands the concept of "states of information" as analogous to states of matter. It introduces new ideas on the expressiveness of information systems and how information is organized in these systems. By taking advantage of the isomorphism that exists between states of matter and states of information, we can begin to understand new ways...
Collaborative systems research, development, test and evaluation activities have grown steadily throughout the Space and Naval Warfare Systems Center-San Diego (SSC-SD) during the past decade , ranging from simple chat to virtual workspac-es. Concurrently, the evolving " mission focus " of the U.S. military, from full scale war (early 1980's) to co...
This paper explores challenges facing information system professionals in the management of data and knowledge in the Department of Defense (DOD), particularly in the information systems utilized to support command, control, communications, computers, and intelligence (C<sup>4</sup> I). These information systems include operational tactical systems...
The sensor web consists of millions of sensors con-nected together in an ad-hoc manner, collaborating with each other for sensor data acquisition, data fusion, data correlation, and taking action based on the find-ings. The military services deploy these systems of hete-rogeneous sensors to detect and classify platforms, in-cluding targets. The pap...
This paper describes conceptual work in dynamic three-value logic (3VL) with a view toward applications in decentralized time-critical domains, such as a sensor field. The completeness and computability of 3VLs also are discussed, including an algorithm to illustrate the use of heuristics. The military services deploy systems of heterogeneous senso...
This paper presents a report of an ongoing research project to test and evaluate temporal and other dependability properties of the battlefield single integrated picture (SIP). It explores modeling and simulations of information flows in the battlespace with a view toward enhancing the SIP. The main emphasis will be on level-one data fusion, i.e. d...
This paper describes Disciple, a decision aid based on artificial intelligence techniques, that subject-matter experts can train and use when making decisions under stressful, complex, and constrained conditions. The tool was developed and used under the Defense Advanced Research Projects Agency’s High Performance Knowledge Base and Rapid Knowledge...
A new type of qualitatively fuzzy expert system shell (i.e.,
KASER) is applied to a tutoring problem. The shell facilitates
reasoning using domain-specific expert knowledge as well as
commonsense qualitative knowledge. The shell accomplishes this
through object-classed predicates and an associated novel
inference engine. The KASER addresses the hig...
This paper briefly captures the origins of automated data management from its inception to the present. It describes the significant advances that occurred in each decade since the 1930s through the 1990s. It also extends an eye toward the horizon in predictions of the future of this key technological area throughout the coming century. Finally, it...
This paper presents research results of a project that produced a progressively dependable knowledge amplifier. A knowledge amplifier can acquire a virtual-rule space automatically that is exponentially larger than the actual, declared-rule space and with a decreasing non-zero likelihood of error. A Knowledge Amplifier by Systematic Expert Randomiz...
This book chapter addresses the topic of knowledge discovery in heterogeneous environments. It begins with an overview of the knowledge-discovery process. Because of the importance of using clean, consistent data in the knowledge discovery process, the chapter focuses on the problems of data integration and cleansing by presenting a framework of se...
This paper is an exercise in analogical reasoning. It introduces the concept of “states of information” as analogous to states of matter. It explores the differences in states of matter and the difficulties in their definitions with a view toward explaining the difficulty in defining the various states of information. By taking advantage of the iso...
This paper describes Disciple, an Artificial Intelligence based
decision aid which subject-matter experts can train and use when making
decisions under stressful, complex, and constrained conditions. The tool
was developed and used under the Defense Advanced Research Projects
Agency's High Performance Knowledge Base and Rapid Knowledge Formation
pr...
This paper describes agent technology and the various ways in which it can be applied to command, control, communications and intelligence in general, and to net-work-centric warfare in particular. The paper provides a brief overview of agents, their properties, and their ad-vantages. It covers the concept of the current military trend, network-cen...
This paper describes agent technology and the various ways in which it can be applied to command, control, communications and intelligence in general, and to net-work-centric warfare in particular. The paper provides a brief overview of agents, their properties, and their ad-vantages. It covers the concept of the current military trend, network-cen...
This paper discusses issues facing information technology (IT) sys- tem developers for Navy ships. Its overall emphasis is on the man- agement of large volumes of tacti- cal information that a ship must collect and process during its mis- sions. Specifically, it describes a very ambitious notion of a future Navy Comprehensive Informa-
This paper documents progress to date on a research project, the goal of which is wartime event prediction. The paper describes the operational concept, the data-mining environment, and the data-mining techniques that use Bayesian networks for classification. Key steps in the research plan are (1) implement machine learning, (2) test the trained ne...
This position paper explores the challenging area of cognition among experts and suggests possible reasons why experts have difficulty explaining how they make decisions in complex and constrained environments. We propose a theory of expertise and decision making that we call the Pattern Management/Mental Reference Frame (PM/MRF) model. The main pr...
This paper describes agent technology and the various ways in
which it can be applied to command, control, communications and
intelligence in general, and to network-centric warfare in particular.
The paper provides a brief overview of agents, their properties, and
their advantages. It covers the concept of the current military trend,
network-centr...
Whereas much of the previous work on data mining has focused on
mining data in relational databases, we discuss mining objects. Object
models are very popular for representing multimedia data, and therefore
we need to mine object databases to extract useful information from the
large quantities of multimedia data. We first describe the motivation
f...
This paper describes Proton-Exchange Membrane (PEM) fuel cells,
their importance to military applications, and how their design can be
enhanced using computational techniques. We extend the logic of
plausible reasoning given by Collins and Michalski in two directions.
First, it uses a context-free grammar for the operations of
generalization and sp...
This paper describes agent technology and the various ways in which it can be applied to command, control, communications and intelligence in general, and to network-centric warfare in particular. The paper provides a brief overview of agents, their properties, and their advantages. It covers the concept of the current military trend, network-centr...
This paper addresses the knowledge-acquisition bottleneck. Most importantly, it suggests the design of a learning expert system, for which the probability of error in the induced rules decreases with scale. Third-generation expert systems derive from Rubin's work on randomness and symmetry. More precisely, the knowledge engineer provides novel know...
This paper describes heuristics for identifying semantic conflicts in large, heterogeneous, distributed, and federated databases in which the combinatorics of comparisons become an issue. Data can be divided along several dimensions and the search space for conflicts can be narrowed considerably. The paper considers various search criteria, such as...
This paper describes a research project, the goal of which is to provide complete, consistent, and extensible decision support to military commanders for command, control, communications, computers and intelligence (C4I) systems. In this project, we attempted to overcome the knowledge-acquisition bottleneck, which has been a major impediment to the...
Enterprise-wide information sharing to timely and accurate data is the main requirement across a federation of multiple functional domains, that includes massive amounts of legacy data and modernized system data. Our interaction infrastructure supports WWW-based queries to information across the federation of domains. Traditional information manage...
Many professional societies have featured poster sessions successfully in meetings and conferences for many years. Frequently, student presentations, when featured at professional technical meetings, are in the form of posters. Some authors are reluctant to select poster sessions as their first choice of presentation method. They are unfamiliar wit...
This paper documents progress to date on a research project, the goal of which is wartime-event prediction. It describes the operational concept, the data-mining environment , and data-mining techniques that use Bayesian networks for classification. Key steps in the research plan are as follows: 1) implement machine learning; 2) test the trained ne...
The paper documents progress to date on a research project, the goal of which is wartime event prediction. It describes the operational concept, the data mining environment, and data mining techniques that use Bayesian networks for classification. Key steps in the research plan are as follows: (1) implement machine learning; (2) test the trained ne...
A method to mine relational databases for knowledge and
generalizations is presented. The concept of a network of expert systems
with a user in the loop to provide domain knowledge of features is
discussed. The network of expert systems is important to solve the
problems of a knowledge acquisition bottleneck. The example of battery
design is descri...
Artificial intelligence, including fuzzy logic, is applied to the diagnosis of glaucoma. Current methods and difficulties are reviewed and a diagnostic and prediction system is proposed. Validation of the developed software will involve data collected from the clinical evaluation of glaucoma patients, glaucoma-suspect patients and normal subjects....
Questions
Questions (5)