Escolar Documentos
Profissional Documentos
Cultura Documentos
WAVEFORMS
L. R. Falk
Swedish Defence Research Agency, 16490 Stockholm, lars.falk@foi.se
Abstract
3 Analysis of information
The fundamental question is how one can use data in a sensor
network to create situation awareness. This question will be
analysed by considering the optimum process for evaluating
available information.
Shannon's theory of information shows that the optimum
method of processing information under stationary conditions
is to apply Bayesian probability theory [6]. The process is
complicated but in principle one can include various forms of
human knowledge into the analysis.
This theoretical conclusion will be used below, though in
practice one would only use Bayesian processing at certain
stages. The optimal process is very slow and should be
replaced by other methods whenever possible.
From our point of view a sensor network is a system
collecting and processing large amounts of data. Human
information is important but the amount is small and this
makes a description in terms of information useful.
Bayesian analysis prescribes a process which agrees with
common sense [3,6] and is guaranteed to be optimal if the
following steps are used. All information is described in terms
of probability.
1.
2.
3.
4.
5.
6.
5 Conclusions
Some simple conclusions follow from the analysis.
Acknowledgements
The author is deeply indebted to his colleague Per Hyberg for
numerous discussions during this work. Weare both indebted
to Olle MaIm and Michal Herre at the Swedish air
surveillance system for cooperation and support during
simulator trials in the course of staff training.
References
[1] L. Falk: "The Benefits of Deception", MilTech 2
Conference, Stockholm, pp. 101-108 (2005).
[2] L. Falk: "Jamming the network: The Benefits of
Deception", AOC Conference, London (2006).
[3] L. Falk: "Situational awareness and electronic deception
with historic examples", Stockholm Contributions in Military
Technology 2007, ed. Martin Norsell, pp. 83-98 (2008).
[4] M. Howard: Strategic Deception in the Second World
War (Norton 1990).
[5] P. Hyberg: "Network Centric Warfare and Information
Theory", Journal of Electronic Defense, Vol 28, (Dec 2005).