Академический Документы
Профессиональный Документы
Культура Документы
Aberrant behavior in unmanned weapon systems can be caused by design flaws, system
malfunction, malevolent control penetration, and human error. As systems manifest more
autonomous operation, unpredictable emergent behaviors add to this list. The near-term
expected future calls for swarms of heterogeneous unmanned autonomous systems (UAS) to be
employed on a mission. The emergent group behaviors will add new dimensions to testing,
posing potentially explosive centralized monitoring and evaluation tasks with large groups. The
impossibility of specifying and testing all potential situational conditions is recognized, and the
safety of the testing environment itself is of concern. Lessons from social animal life show that
peer behavior monitoring has evolved to detect and mitigate aberrant behavior among
members, and mitigating that behavior if it is evaluated as intolerable. This article explores a
foundation for peer behavior monitoring among UAS under both test and mission conditions.
Key words: Aberrant behavior; emergent social behavior; ethics; parallel pattern
recognition; peer monitoring; robots; self-organizing systems-of-systems; soldiers.
berrant behavior in mobile unmanned (Dove 2007) and deemed possible by capabilities of a
a statement made credible by the fact that drones, ‘‘UAS formation control, swarming, and aggre-
when no longer needed, are killed by worker- gate intelligent agent behavior are an emergent
bees. The testimonies of observers in different characteristic of this technology arena. … System
countries show that a flock of crows, after behavior, in a multi-agent system, can be
prolonged noise of consultation, will summarily difficult to predict and often unexpected system
execute an offending member. And an eye- behaviors occur which lead to poor system
witness affirms that among rooks, a pair which performance. These unexpected system behaviors
steals the sticks from neighbouring nests has its result from unforeseen group actions of agent
own nest pulled to pieces by the rest.’’ (Spencer groups and agent-group behavior that is not
1893, 12–13) directly coded by the agent designers.’’ (Office of
the Secretary of Defense 2008, 54–55)
Though stories of beaver and rook justice, and
anecdotal witness to crow judgment and execution Such unexpected system behaviors can be good as
exist, scientific evidence is illusive; nevertheless, the well as bad. In fact, the goal of fully autonomous
values and varieties of peer judgment constraining and intelligent behavior is creative problem-solving in
enforcing societal behavior are well known among situations without precedence. It is unlikely that
humans and are studied and observed in animal (Flack unleashing a swarm of UASs that are only capable of
et al. 2006) and insect societies (Heinze 2003, dealing with well-defined cataloged situations will be
Monnin et al. 2002, Ratnieks, Foster, and Wenseleers effective.
2006). We cannot know the situations that will arise, nor
This article suggests that peer evaluation of can we directly control how things should play out.
behavior is necessary and valuable in the domain of Instead, we must recognize and embrace uncertainty
autonomous unmanned systems when they are within a framework of governance principles that will
bound the outcomes within an acceptable space. The
working together as a team on a warfighting mission,
principle described in this article classifies behavior as
and perhaps even more so when these systems are
unacceptable based on absolute boundary-infraction
being tested, as they are less likely to be well behaved.
recognition, rather than attempts at imperfect reason-
The suggestion is prompted by the positioning and
ing or restrictions to specifically approved behaviors.
planning for an Unmanned Autonomous System Test
UAS will necessarily be tested and fielded in
(UAST) focus area described in a 2008 Broad Area
situations that have no precedence in cataloged
Announcement:
responses. How will we constrain the outcomes to
those we can live with? More to the point, how will we
‘‘Due to the mobility inherent in all UAS, their
detect unacceptable behavior in time to intervene if
close proximity to humans (e.g., soldiers, testers,
unacceptable consequences are the likely outcome?
population centers, etc.) and their capability for
Dove and Turkington (2009) characterize agile
unpredictable behavior; a reliable fail-safe system systems as class 1 if they are (operator) reconfigurable
is needed. This effort seeks technologies for all and class 2 if they are (systemically) reconfiguring. It
aspects of system safeties as they pertain to UAS, can be useful to think of a class-1 UAST system testing
Systems of Systems, and Complex Systems. This class-2 UAS systems. This agile-system class distinc-
includes safe test conduct, testing for top level tion arose from a graduate course in the School of
mishaps, safety fail-safes, truth data assessment Systems and Enterprises at Stevens Institute of
for safety, and safeties associated with large Technology (Dove 2007). The course reviews the
numbers of collaborating UAS.’’ (Office of the literature in various bodies of knowledge relevant to
Secretary of Defense 2008, 21) self-organizing systems, and challenges collaborative
student analysis to identify recurring and necessary
It is also recognized that testing outcomes can have patterns across bodies of knowledge. Five cycles
‘‘an almost infinite number of possibilities, depending through to date, this investigation is beginning to
on UAS cognitive information processing, external yield some promising fundamental patterns. One in
stimuli, operational environment, and even possible particular is the genesis of this article’s focus: successful
random events (hardware/software failures, false social systems often exhibit a pattern of peer behavior-
stimuli, emergent behavior, etc.).’’ (Office of the enforcement arising when the stability of the social
Secretary of Defense 2008, 23) system is put at risk.
Emergent behavior is later recognized as something A related body of work led by Ronald Arkin (2007)
less than random: at Georgia Institute of Technology is concerned with
Figure 1. Responsibility for lethal errors by responsible party behavior monitoring compares the temporal event
based on a survey of 430 respondents from demographic sequence of the intended tactical plan against the
groups. The soldier was found to be the most responsible
actual sequence of events, on an agent-by-agent basis.
party, and robots the least. (Reproduced with permission from
the survey reported in Moshkina and Arkin 2007.) Spatial behavior monitoring compares the spatial
aspects of the intended plan against actual trajectories
ethical behavior of UAS used in military operations on an agent-by-agent basis.
and recognizes the potential for peer monitoring:
‘‘When working in a team of combined human soldiers Temporal behavior leverage
and autonomous systems, they have the potential Our fundamental interest is in the ability to detect
capability of independently and objectively monitoring and evaluate certain aspects of the behavior of team
ethical behavior in the battlefield by all parties and members as they work toward a common goal. This
common goal may encompass a set of tasks that are not
reporting infractions that might be observed.’’
necessarily shared by all team members but are
A recent survey investigated opinions about the use
nevertheless a part of the activities pursuing common
of, and responsibilities for, lethal autonomous systems
goal achievement. Task plans for achieving this
among four demographic groups (Moshkina and Arkin
common goal will have constraints. For instance, the
2007). A total of 430 respondents were distributed
end may not justify any possible means. Achievement
demographically as 54% robotics researchers, 30%
may also have constraints on team member behavior
military, 16% policymakers, and 27% general public.
(e.g., team members are expected to work toward team
Figure 1 depicts who the respondents felt was respon-
goals according to an established coordination plan).
sible when behavior was unacceptable. Our interest
A team is defined as a collection of members (agents)
here is in the autonomous devices, not the ‘‘robot as working toward a common goal. Working together
extension’’ case, in which a human directs the implies some form of activity coordination. Coordina-
unmanned system. Interesting to note: lethal mistakes tion comes in a range of forms from centralized planning
made by a UAS are blamed on higher-level military, and micro-direction of the agents at the one extreme, to
UAS designers, and politicians, in that order. mindless local-reaction agent-behaviors resulting in
The survey showed that all four demographic groups emergent swarm effects at the other extreme. Our
want ethical standards for UAS to be considerably interest is in neither extreme, but rather with autono-
higher than those for soldiers. Figure 2 shows how the mous agents that possess and employ both self-
groups felt about specific constraints that should be awareness and social awareness of other team members
enforced. Monitoring for ethical behavior infractions is and their behaviors as they jointly pursue a mission.
a subset of what must be monitoring for safe and secure Agents will have a sense of team and a sense of mission,
behavior overall. and use this information to detect when another agent is
Two sections follow that discuss social peer-behavior clearly not behaving in the team’s interest.
monitoring; first in terms of temporal relationships and In a broader socially aware sense, the team’s interest
then in terms of spatial relationships. Temporal includes the team’s image among outsiders—a weap-
ons-toting team member gone rogue can impair the Jennings raised issues that are addressed in Gal
team’s long-term existence likelihood. This is a new Kaminka’s Ph.D. thesis (2000) and related publications
behavior focus not seen in prior research of Multi- (Kaminka and Tambe 1997, 1998, 2000). Kaminka
Agent Systems (MAS). pursued what Jennings dubbed the social conventions
Malone and Crowston (1994) in a broad interdis- aspect and developed a ‘‘mental state’’ representation
ciplinary survey of the ‘‘emerging research area, sometimes based on goal hierarchies presumably shared by a team
called coordination theory,’’ define coordination as of agents—recognizing that some agents may have
‘‘managing dependencies between activities.’’ Noting the tasks different than others and some may choose to
onslaught of the electronically connected world, they achieve a common task differently than others. Notably
proposed that new forms of organizing and new forms his work features primary examples of unmanned
of coordination structures would emerge. They also autonomous (aerial) systems, where individual UAS
observed that different disciplines were already explor- (agents) monitor and recognize when a member of the
ing domain-specific coordination concepts, and that team doesn’t behave as mutually agreed to in the plan.
there was now value to be gained in finding domain- Kaminka’s approach also enables an agent to detect
independent underlying principles of coordination. self-failure often but not always.
Their stated intent was to help kick-start the Kaminka credits inspiration to Leon Festinger’s
development of a theory of coordination by illuminating seminal work on social comparison theory (Festinger
these cross-discipline similarities, noting that ‘‘It is not 1954), which is founded on the hypothesis that
enough just to believe that different systems are similar, we humans have a drive to evaluate their own opinions
also need an intellectual framework for ‘transporting’ and abilities and will employ a social comparison
concepts and results back and forth between the different process if this evaluation cannot be tested directly.
kinds of systems.’’ This idea is germane to the present Kaminka (1997) kicks off this path of work by
discussion as this article suggests that coordination proposing an approach to failure detection which he
called unique to a multi-agent setting: the key idea
concepts of social systems inform how we deal with
being that agents observe each other and use that
aberrant behavior in UAS.
information to inform themselves about the situation
About the same time as Malone and Crowston
and about the appropriateness of the behaviors of self
pulled together their survey, Jennings (1993) modeled
and others. Basically each agent evaluates its own
coordinated agent communities on a foundation of
behavior by observing that of others, and comparing
commitments and conventions. Jennings defines com-
those observations with its own behavior, beliefs, goals,
mitments as mutually agreed upon plans of action, and
and plans.
conventions as the means for monitoring commitments
Kaminka’s early tack had Festinger’s self-centered
under changing circumstances. He goes on to suggest
focus: agents used cues from others to evaluate their
that all coordination mechanisms can be seen as joint
own fitness. Subsequently, his investigations broad-
commitments and their related social monitoring ened to both a centralized agent that could monitor
conventions. Jennings acknowledges that it is infeasible team and other-agent behavior, and multiple agents
in any community of reasonable complexity for total monitoring team and other-agent behaviors.
monitoring to occur, due to communication bandwidth Kaminka makes the case in his thesis for distrib-
and processing time. In our own human experience we uted monitoring and detection, showing that a
see this to be true in teamwork, where some awareness centralized monitor using his algorithms does as well
of other team-member activity is naturally maintained, as can be done, whereas multiple monitor/detectors
but any attempt at totally detailed and continuous among socially aware agents do best, as they can
monitoring knowledge is impossibly overloading and exploit their own local state as part of the informa-
counterproductive. tion. He shows that the centralized approach can
Important to our monitoring interests, Jennings provide either sound (no false positives) or complete
shows why the behavior (alone) of a collection of (no false negatives) results, whereas the decentralized
agents as seen by an outside observer is insufficient to approach provides both sound and complete results—
determine if coordination is present, and concludes meaning no incorrect detections and no missed
that ‘‘coordination is best studied by examining the mental detections. He also shows that this can be accom-
state of the individual agents.’’ He then goes on to say: plished without any one agent monitoring all the
‘‘The exact make up of this mental state is still the subject of agents, and without all the agents having this
much debate, however there is an emerging consensus on monitoring capability.
the fact that it contains beliefs, desires, goals and Recent work is getting even closer to the detection
commitments (intentions).’’ of threatening aberrant behavior. Avrahami-Zilber-
N Structured but uncertain—each offensive play Suitable sensors located in these facilities, and
begins as a highly structured coordination plan. perhaps sent from transmitters on board UAS, can
The defensive agents rarely cooperate, so a great provide the raw data feeds. As was shown by
deal of variation exists in individual agent Kaminka (2000), it is not necessary to have a one-
movements, individual agent goal achievement, to-one ratio of monitors to agents in order to ensure
and overall trajectory maps. high detection accuracy. Thus, multiple such mech-
anisms might be located in testing and observation
This model has potential for describing joint UAS
facilities in suitable proximity to the testing arena.
maneuver patterns and detecting when an agent is not
Alternatively, special units could be deployed among
contributing as planned. Though a great deal of
the UAS under test much as many field sports
latitude is expected in the execution of a maneuver
employ referees on the field.
pattern, general characteristics should prevail and
In the end, such mechanisms also belong on board as
indicate an individual UAS not working on team
behalf. Judgment of cause and severity for out-of-scope an integral part of every UAS, as UAS will operate
behavior is a separate issue not dealt with here. outside of ready observation and are subject to attrition
by enemy destruction. In such live cases, aberrant
Concluding remarks behavior must be detected and evaluated to sense
control penetration by the enemy as well as malfunc-
This article reported on the first part of a two-part
study, instigated by a technology for massively parallel tion that threatens the mission or might provide a
pattern recognition and studies in self-organizing disabled UAS to the enemy for later recovery.
systems-of-systems. This first part identified a research This concept of a socially aware team of autonomous
base for aberrant behavior detection in multi-agent agents has application well outside the UAS and
systems that might benefit from a massively parallel UAST focus of this discussion. For instance, socially
pattern recognition capability. The second part of the aware security agents can be employed as a community
study, to be published shortly, will indicate how the watch among networked groups of computers or
detection approaches outlined in this article might be sensors, keeping watch on each other. For another
implemented advantageously in a massively parallel instance, Braynov (2004) is investigating ways in which
classification technology. coordination graphs can be employed in the recogni-
The temporal and spatial discussions in prior tion of coordinated attacks by groups of autonomous
sections are complementary, each having a potential agents working toward a common goal. The platform
role in a socially attentive solution platform. It is not suggested here for UAST can merge with Braynov’s
suggested that the research referenced here is the only work to pursue application in intrusion detection
way to approach the problem effectively, or that what areas. %
was presented is completely sufficient, but rather that
this basis appears promising as a foundation for a
solution path worth exploring. RICK DOVE is a founding partner of Kennen Technol-
It is likely that the future of UAS is pervasive ogies, an adjunct professor in the School of Systems and
employment in human society, regardless of purpose, Enterprises at Stevens Institute of Technology, and
warfighting or otherwise. Such ‘‘things’’ will need to be Chairman of Paradigm Shift International. He is author
socialized, as do the children of all species. Simple of Response Ability—The Language, Structure, and
behavior safeguards will not be sufficient. Right or Culture of the Agile Enterprise; and Value Proposi-
wrong, ready or not, we will expect these things to tioning—Perception and Misperception in Decision
exhibit respect for life and property, ethics, self- Making. He is an active researcher and consultant in agile
control, and peer-policing capabilities approaching and self-organizing systems. He has 40 years experience at
our own. To the extent that they don’t, we will object start-up, turn-around, and interim executive manage-
to their presence. ment. He holds a bachelor’s degree in electrical engineering
In a test environment, especially in early years, as from Carnegie Mellon University and has done graduate
well as later with the presence of legacy units, such work in Computer Science at the University of California,
detection mechanisms are not likely to be present on Berkeley. E-mail: rick.dove@kennentech.com
board. The physical location of these mechanisms is
not necessarily important, provided suitable sensor References
data are available. Under testing conditions, the Arkin, Ronald C. 2007. Governing lethal behavior:
testing arena is likely bounded and populated with Embedding ethics in a hybrid deliberative/reactive
various observer installations and mobile facilities. robot architecture. Technical Report GIT-GVU-07-
Office of the Secretary of Defense. 2008. Unmanned Spencer, Herbert. 1893. Sub-human justice. In The
and Autonomous System Testing (UAST) Broad Agency Principles of Ethics, Volume 2, 8–16. New York: D.
Announcement ,BAAUAST0002.. U.S. Department Appleton and Company.
of Defense, Issue Date April 4, 2008.
Ratnieks, F. L., K. R. Foster, and T. Wenseleers. Acknowledgments
2006. Conflict resolution in insect societies. Annual This work was supported in part by the U.S. Department
Review of Entomology 51: 581–608. www.people. of Homeland Security award NBCHC070016. Figures 1
fas.harvard.edu/,kfoster/RatnieksetalAnnreventomol2006. and 2 are included with permission from Ronald Arkin.
pdf (accessed May 15, 2009). Figure 3 is included with permission from Stephen Intille.
As multi-agent weapon systems manifest more autonomous operation and work in teams,
unpredictable emergent behaviors will occur in both individual agents and in teams. These
group behaviors will add new dimensions to testing, posing potentially explosive centralized
monitoring and evaluation tasks with large groups. The impossibility of specifying and testing
all potential situational conditions is recognized, and the safety of the testing environment itself
is of concern. A prior companion article explored a socially attentive foundation for peer
behavior monitoring among Unmanned Autonomous Systems (UAS) under both test and
mission conditions. This article explores certain complexity issues of aberrant behavior detection
in UAS, draws parallels with human cognition capabilities, and provides a technology
foundation for massively parallel behavior-pattern detection.
he trend toward increased autonomy in rules of ethics, rules of war, and related high-level
in Myers (2008). Professor Myers studied social meaningful pattern quantity. According to an interview
reactions in on line game play. He played by the rules with Nobel Prize winner Herb Simon (Ross 1998: 98–
of the game but not by the cultural rules of the 104), people considered truly expert in a domain (e.g.,
dominant player group. The degree of escalating chess masters, medical diagnosticians) are thought unable
retaliation as the group turned against him is an to achieve that level until they’ve accumulated some
interesting study in human peer-behavior policing. 200,000 to a million meaningful patterns, requiring some
Unlike traditional approaches at sophisticated behavior 20,000 hours of purposeful focused pattern development.
detection and classification through reasoning, this article The accuracy of their sense-making is a function of the
suggests an approach inspired by human expertise studies, breadth and depth of their pattern catalog. Of interest, in
where it appears that a conclusion is driven by a vast biological entities, the accumulation of large expert-level
quantity of simultaneously accessible ‘‘experience’’ pat- pattern quantities does not manifest as slower recognition
terns rather than a compromising sequential search or time. All patterns seem to be considered simultaneously
reasoning process. This approach is both suggested and for decisive action. There is no search and evaluation
conceptually possible with new processor architectures activity evident.
offering massively parallel pattern-recognition capabili- On the contrary, automated systems, regardless of
ties. Many of these architectures are inspired by human how they obtain and represent learned reference
cortical learning and classification models but may not patterns, execute time-consuming sequential steps to
offer ready post-learning algorithm cloning nor behavior- sort through pattern libraries and perform statistical
capability transparency. A single-processor architecture feature mathematics. This is the nature of the
without integrated learning that features massive parallel computing mechanisms and recognition algorithms
classification capability for explicit patterns avoids these generally employed in this service.
potential limitations, and will be used to establish a Ross (2006) talks about the expert mind, and Herb
conceptual foundation for peer-peer socially attentive Simon presents a ‘‘chunking’’ explanation for how chess
monitoring. masters can manage and manipulate a vast storehouse of
patterns. Ross ties this chunking discussion into the
Detection-complexity leverage common understanding that the human mind seems
Progress in pattern recognition has come in the form of limited by seven plus-or-minus two elements in working
trying harder with more elaborate recognition algo- memory: ‘‘By packing hierarchies of information into
rithms, pattern-tuned special-purpose processors, multi- chunks,’’ Simon argued, ‘‘chess masters could get around
core processors and clustered servers, multiple graphic this limitation, because by using this method, they could
processors, and massively parallel supercomputers. All of access five to nine chunks rather than the same number
these approaches continue to make tradeoffs among the of smaller details.’’
same forces in tension: accuracy, time, and cost. Psychologist George Miller (1956) wrote ‘‘The
Biological capability is the benchmark for pattern magical number seven plus or minus two’’ that
recognition. Machines, like people, cannot recognize provided the underpinning for Simon’s suggestion.
situations of which they have no prior knowledge. A Miller’s article is a great and rare reading pleasure as
healthy person over a lifetime builds up a wealth of well as a rich storehouse of information, far beyond the
experience patterns, stored in memory, adding details simple seven-digit limitation to which common
and variations as repeated exposure reveals new levels reference has reduced it. Of importance, Miller’s
of nuance. How biological entities achieve this remains concept of chunking into hierarchical levels of
as conjecture, but it is clear that patterns are developed, patterns-of-patterns appears highly relevant in at-
retained, and applied in the necessary and constant tempting to build pattern-recognition algorithms that
sense-making of everyday life. exhibit capabilities seen in humans. Subsequent
Klein (1998) suggests his Recognition Primed research (Cowan 2001) carries this study of chunks
Decision model to explain how humans make decisions and limits further and makes a case for the number four
without apparent deliberation or reasoning. Well plus-or-minus one as a more likely limit.
known for his studies of professional firefighters Similar chunked-hierarchy architecture is reported
making appropriate choices for situation response by researchers at MIT (Serre, Oliva, and Poggio 2007).
almost immediately, he describes the Recognition Serre’s doctoral dissertation (Serre 2006) describes
Primed Decision model as one that uses intuition
(pattern recognition) to qualify the first viable action, ‘‘a quantitative model that accounts for the
without conscious weighing and decision making. circuits and computations of the feedforward
Research indicates that human expertise (extreme path of the ventral stream of visual cortex,’’ and
domain-specific sense-making) is strongly related to claims ‘‘that this may be the first time that a
neurobiological model faithful to the physiology These chips promise remarkable capabilities, but
and the anatomy of visual cortex . . . achieves they may also raise some problems for weapons toting
performance close to that of humans in a UAS test and verification.
categorization task involving complex natural On the other hand, conventional stored-program
images.’’ (Serre 2006) sequential-instruction processors pressed into massive
pattern recognition service are severely constrained by
Though Serre’s work is focused on image recogni- trade-offs among speed, cost, and accuracy.
tion, it is inspirational in its fit with the platform A new VLSI pattern-detection processor architec-
developed in this article and will surely guide ture, shown partially in Figure 1, does not contain
subsequent steps in this investigation. integrated learning, can be unambiguously loaded with
This section will close by noting a tie to the detection patterns, decouples the speed/accuracy trade-
discussion in Dove (2009b) of multi-agent trajectory off, and renders the cost/accuracy trade-off negligible
behavior recognition. Hockey legend Wayne Gretsky is (Dove 2009a). The architecture features massively
renowned for his field sense (Kahn 2007)—knowing parallel, dynamically configurable Feature Cell Ma-
where his teammates are without looking and knowing chines (FCMs), which simultaneously process the same
where the puck will be next. Though what sensory data stream. Low-cost VLSI fabrication, unbounded
mechanisms are involved may be illusive for now, this is scalability, and high-speed constant-rate throughput
expert pattern recognition involving the trajectories of independent of pattern number and complexity break
bodies and objects in motion, rather than static current trade space constraints.
chessboard configurations or medical diagnostic symp- This decoupling of the speed/accuracy trade-off
toms. Intille’s American football-play identification from constraints enables new possibilities for employing
visual image pattern recognition did not have the vast pattern recognition. In particular, the massive quantity
quantity of patterns associated with expertise (Intille of simple patterns associated with expert performance
1999, 2001), nor did it have to respond in real time; but can be investigated as an alternative to time-consuming
Intille’s work can offer initial guidance on how an accuracy-compromising computational heuristics. In
artificial mechanism might represent tactical choreogra- one sense it sounds like a brute force approach:
phy patterns far in excess of a football playbook. enumerating all possible patterns of interest, rather
than developing an elegant heuristic. On the other
Technology leverage hand, the biological benchmark appears to use this
Brain circuitry understanding and models of parallel massive-pattern-quantity approach; while ‘‘elegant’’
pattern-recognition algorithms with brain-like results approaches are made necessary by the nature of the
at MIT (Riesenhuber and Poggio 1999), at the San computational mechanisms employed—not the prob-
Diego Neuroscience Institute (McKinstry, Edelman, lem in need of a solution—and they extract a cost in
and Krichmar 2006), and at Numenta (George 2008) both accuracy and time that can be avoided.
are already being fabricated as experimental Very- The processor architecture and how it eliminates
Large-Scale Integrated (VLSI) circuits at Stanford these trade-offs is explained in Dove 2009a. Currently
(Merolla and Boahen 2006) and at the Ecole Poly- an emulator is used for investigating parallel algorithm
technique in Lausanne (Schemmel et al. 2006). These development, with field programmable gate array
VLSI chips combine analog and digital circuitry to (FPGA) processor prototypes employed for large data
emulate simple models of neuron/synapse circuitry, streams while VLSI design is in process.
and integrate pattern learning with pattern detection. Some understanding of the processor architecture is
The integrated nature of learning before recognition necessary. Referring to Figure 1, a partial view of the
may make rapid cloning of the information in these processor’s architectural concept shows massively
replicated detection cells. A quarter to half million
chips difficult, and the nature of the learned patterns
such cells on a single VLSI chip appears possible for
may be difficult to verify for behavior boundaries. For
early generation silicon. These cells are independent
example, Jeff Krichmar, a senior fellow of the San
units, with four dynamically configurable elements to
Diego Neuroscience Institute, said in a recent
consider:
interview:
1. an activation status,
‘‘Put a couple of my robots inside a maze, let them run 2. a 256-element feature-vector designating all byte
it a few times, and what each of those robots learns values of interest,
will be different. Those differences are magnified 3. a set of pointers to other cells that will be
into behavior pretty quickly.’’ (Kotler 2009) activated if this cell is ‘‘satisfied,’’ and
4. a set of pointers to output transforms that can processors can be used to increase throughput speed.
logically combine designated cell-satisfactions Presenting the data stream ‘‘current’’ character to
into buffered output and reset designated pro- multiple processors simultaneously can be used for
cessor status. unbounded reference-pattern scalability.
With this architecture, groups of detection cells can be
In operation, an external controller feeds data stream
configured into FCMs, similar to finite state machines,
bytes in sequence to a current-byte register in the
by setting activation pointers to pass activation succes-
processor. The presentation of each new byte triggers
sively through a group of successively ‘‘satisfied’’ cells.
the beginning of a detection cycle. The current byte
One cell may activate many other cells, so that multiple
acts as an index into the feature vector for all active
pattern branches may become simultaneously active. Any
cells simultaneously. If a cell is active and the current
number of such FCMs may be configured within the
byte value is one of interest, as designated in the
total cells available within a processor. Typically such
feature vector, it is said to be ‘‘satisfied.’’ That
FCMs are created to detect (classify) specific patterns or
satisfaction will activate (for the next cycle) all other
subpatterns of interest.
cells according to the satisfied cell’s activation pointers
The next section will provide some simple examples
and will cause designated output transformations to
that could be useful in aberrant behavior detection
occur according to this cell’s output pointers. A cell’s
methods for the concepts presented earlier.
activation pointers may include one that reactivates
itself, as cell activation is effective for a single cycle
Classification techniques
only. Note that a cell can respond to any number of
Pattern recognition has two distinct approaches, and
data-stream byte values, which enables value-based as
a third that blends the two. For a full treatment see
well as syntactic feature-based classification.
Jain, Duin, and Mao (2000).
Multiple processors can be employed in parallel and
serial arrangements to increase throughput speed and/ N Statistical Approach—In this approach an un-
or reference-pattern capacity. Interleaving packet- known entity or situation is characterized by a set
based data streams, for instance, across multiple number of features and measured values for each
Figure 2. Some possible ways of encoding an envelope of acceptable values for latitude, longitude, and altitude. Multiple detection
cells and data-stream bytes could be used for each. Minimum separation ensures two Unmanned Autonomous Systems (UAS) do not
get dangerously close. A detection cell only has one satisfaction line, so the Feature Cell Machine (FCM) on the right must satisfy on
failure with the complement of the permissible range. The final cell matches on anything and signals success.
feature (a person characterized by height and Using the common linguistic metaphor, these rules
weight; a danger characterized by velocity, form a grammar of allowable pattern structures.
distance, and heading). Mathematically the N Augmented Grammars—This approach com-
features become dimensions in a multidimen- bines the two above, which may be done in a
sional space, and the values for each of those variety of ways to suit the raw sensor data, the
features then place an unknown entity or computational resources being employed, the
situation at a point in that multidimensional difficulty of feature extraction, and the speed vs.
space. Regions of the space are associated accuracy trade-offs dictated by the application. In
probabilistically with pattern classification (man a general sense, augmented grammars have
or woman; dangerous or suspicious or benign). syntactic elements and semantic elements, mixing
N Syntactic Approach—This approach is structural structural relationships and feature values.
in nature and generally hierarchical, where patterns
The processor described here is well suited to the
are composed of subpatterns, which are in turn
syntactic approach, appears highly promising for
composed of subpatterns, with the lowest level
augmented grammar approaches, and has utility for
subpatterns being simple recognizable primitives.
some statistical approaches.
In syntactic pattern recognition, a formal analogy
can be drawn between the structure of patterns and A few general basic techniques will be shown to give
the syntax of a language. Language parsing is some idea of how detection cells can be organized as
common usage for this approach, but other FCMs, and how such FCMs can be organized to
patterns such as waveforms and multi-agent discriminate syntactic structure, feature values, and
trajectory paths, which can be constructed from pattern groupings.
primitive structural components, lend themselves
to syntactic recognition. Syntactic patterns are Feature value discrimination
composed of primitives that follow rules about how One likely classification of undesirable behavior might
they may be combined in relation to each other. be a UAS that is not where it is expected to be. Perhaps it
Figure 3. This example employs a packet approach to data-stream packaging. Packets here have a two-part header: the first two
cells/bytes signify the Unmanned Autonomous Systems (UAS) associated with the data, and the second two signify the task that this
UAS is currently supposed to be executing. Detection of the header activates the correct positioning envelop for that UAS on that
task. Two Feature Cell Machines (FCMs) are shown for the same UAS on two different tasks 49 and 50.
has developed a mobility malfunction, missed a cue different features or subpatterns within a total pattern.
signaling a new task, been incapacitated by the enemy, or Figure 4 indicates some of the higher level aggregation
redirected by an unauthorized command. If a team of and output capabilities of the processor conceptually
UAS is coordinated in accordance with a specific plan, (Dove 2009a). In this example, the down counters are
each agent is expected to maneuver within some absolute employed to give different weights to different features
or relative location envelope. This envelope may be of a pattern. A down counter can be initialized to some
narrow during travel to a target area, larger during value when a configuration load is sent to the
engagement, and different among some members of the processor. Output pointers associate specific down
team when sub-groups are deployed on separate tasks. counters with specific FCM satisfaction lines. Figure 4
The example in Figure 2 shows two ways to encode the depicts four possible classifications for a large number
location of a UAS by three global positioning system of features, where one of those features carries a weight
coordinates: latitude, longitude, and altitude. The of 2, another carries a weight of 3, and the rest each
absolute case can detect a UAS that wanders outside of carry a weight of 1.
its expected travel envelope for a given leg of a journey. The examples shown are all simplistic and not
The relative scale might be in relationship to a indicative of the range of possibilities. They were chosen
monitoring team-member during some phase or task to show some specific techniques that broaden the purely
of planned teamwork. syntactic applications readily associated with this re-
Figure 3 shows how the location envelope for two configurable replicated detection cell architecture.
different tasks assigned to the same UAS at different
times during a mission might be configured. Imagine Concluding remarks
thousands or tens of thousands of such reference patterns The leverage discussions in this and the prior article
all prepared to classify incoming data as acceptable or (Dove 2009b) are complementary, each having a
not, all localized to multiple specific UAS. The example potential role in a total solution platform. The starting
FCM could be expanded to include additional behavior point in the prior article was social attentiveness in
data for a specific UAS in a specific task, or separate certain biological systems that monitor and enforce
FCMs could handle separate behaviors and be associated peer behavior. The end point was a conceptual example
appropriately with data-stream packet headers. of technology that can approach the pattern capacities
A final technique example is offered to indicate one and speeds of biological systems in bounded sub-
of the ways this processor could be used to weight domains of behavior interest.
Figure 4. This conceptual depiction of additional features of the processor’s architecture, at the top, places the Feature Cell
Machines (FCMs) and their association with down counters in context. The bottom depiction shows a large number of multi-element
FCMs, which are used to determine a classification. Classification-1, for instance, may have its down counter initialized to 3, while
Classification-4 may have its down counter initialized to 4. Thus, Classification 4 can occur in multiple ways, whereas Classification-1
must have one each of the three specifically designated features.
The work reported here attempted to find sufficient of normal behavior, and against defined patterns of
connective concepts between the two end points that aberrant behavior. Trajectory behavior classification
would warrant a next stage investigation. It is not could be considered a special subset of social behavior
suggested that the connecting leverage points discussed detection for loosely choreographed teamwork.
here and in the prior article are the only way to approach Expertise theory, if it can be called that, guides us to
the problem effectively, nor that they are completely a need for an extremely large number of reference
sufficient, but rather that they appear promising as a patterns that can be simultaneously compared relative
foundation for a solution path worth exploring. to a dynamic situation, eliminating time for sequential
This is preliminary work that sought and construct- evaluation and reasoning steps, and eliminating much
ed a basis from which to investigate algorithms that of the otherwise selective monitoring and pattern
can detect safety- and security-threatening behavior simplification that increases uncertainty.
among UAS working in teams; where speed, accuracy, This work was prompted by the growing concern for
and breadth of comprehension are key performance testing methods that can keep pace with the growing
factors. The work suggests that a promising basis exists intelligence of UAS. It is suggested that a very different
in combining recognition of social behavior and approach is required, one that never stops, one that
trajectory behavior with a technology that can manage carries the test environment into the operational
a vast quantity of stored reference patterns structured environment, on board every UAS eventually.
and accessed in a feedforward chunked hierarchy. Of There is precedence for and experience with this
importance, that technology must employ parallel approach: the training and vetting of Special Forces
recognition capabilities that eliminate any need for operatives. One point to note is that we appear
time-consuming search or sequential algorithms. comfortable moving operatives into field status after
Social comparison theory guides us to a comparison of some ‘‘testing’’ period, even though we know they will
an agent’s behavior pattern against behaviors of others on face situations that have not been tested. Another point
the team, against mission plans, against defined patterns to note is that these operatives on mission are always
Monnin, T., F. L. W. Ratnieks, G. R. Jones, and R. Ross, P. 2006. The expert mind. Scientific American
Beard. 2002. Pretender punishment induced by chemical 295 (2): 64–71.
signaling in a queenless ant. Nature 419 (6902): 61–65. Schemmel, J., A. Grubl, K. Meier, and E. Mueller.
Moshkina, L., and R. C. Arkin. 2007. Lethality and 2006. Implementing synaptic plasticity in a VLSI spik-
autonomous systems: Survey design and results. Technical ing neural network model. In Proceedings International
Report GIT-GVU-07-16. Atlanta, Georgia: Mobile Joint Conference on Neural Networks, July 16–21, Vancou-
Robot Laboratory, College of Computing, Georgia ver, BC, Canada, 1–6. http://www.kip.uni-heidelberg.de/
Institute of Technology. http://www.cc.gatech.edu/ai/ Veroeffentlichungen/download.cgi/4620/ps/1774.pdf
robot-lab/online-publications/MoshkinaArkinTech (accessed May 15, 2009).
Report2008.pdf (accessed May 15, 2009). Serre, T. June 2006. Learning a dictionary of shape-
Myers, D. 2008. Play and punishment: The sad and components in visual cortex: Comparison with neu-
curious case of Twixt. In Proceedings of The [Player] rons, humans and machines. Ph.D. dissertation,
Conference, August 26–29, Copenhagen, Denmark. Massachusetts Institute of Technology. http://cbcl.
Ratnieks, F. L., K. R. Foster, and T. Wenseleers. 2006. mit.edu/publications/ps/MIT-CSAIL-TR-2006-028.
Conflict resolution in insect societies. Annual Review of pdf (accessed May 15, 2009).
Entomology 51: 581–608. http://www.people.fas.harvard. Serre, T., A. Oliva, and T. Poggio. 2007. A
edu/,kfoster/RatnieksetalAnnreventomol2006.pdf (ac- feedforward architecture accounts for rapid categoriza-
cessed May 15, 2009). tion. Proceedings National Academy of Sciences 104 (15):
Riesenhuber, M., and T. Poggio. 1999. Hierarchical 6424–6429. http://cvcl.mit.edu/Papers/SerreOliva
models of object recognition in cortex. Nature Neurosci- PoggioPNAS07.pdf (accessed May 15, 2009).
ence 2 (11): 1019–1025. http://cbcl.mit.edu/projects/
cbcl/publications/ps/nn99.pdf (accessed May 15, 2009). Acknowledgments
Ross, P. 1998. As I see it: Flash of genius. Forbes. This work was supported in part by the U.S. Depart-
November 16. http://www.forbes.com//forbes/1998/ ment of Homeland Security award NBCHC070016.
1116/6211098a.html (accessed May 15, 2009). Curt Harris invented the processor architecture.