Next Article in Journal
R & D Intensity and Dividend Policy: Evidence from South Korea’s Biotech Firms
Previous Article in Journal
A Tax Coming from the IPCC Carbon Prices Cannot Change Consumption: Evidence from an Experiment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Hierarchical SVM Based Behavior Inference of Human Operators Using a Hybrid Sequence Kernel

1
Department of Business Administration, Korea Polytechnic University, 237 Sangidaehak-ro, Siheung-si 15073, Korea
2
Department of Industrial Engineering and Institute for Industrial Systems Innovation, Seoul National University, 1 Gwanak-ro, Gwanak-gu, Seoul 08826, Korea
3
Department of Industrial and Management Engineering, Hanyang University, 55 Hanyangdaehak-ro, Sangnok-gu, Ansan-si 15588, Korea
4
Department of Industrial and Management Engineering, Kyonggi University, 154-42 Gwanggyosan-ro, Yeongtong-gu, Suwon-si 16227, Korea
*
Author to whom correspondence should be addressed.
Sustainability 2019, 11(18), 4836; https://doi.org/10.3390/su11184836
Submission received: 8 July 2019 / Revised: 27 August 2019 / Accepted: 28 August 2019 / Published: 4 September 2019
(This article belongs to the Section Sustainable Engineering and Science)

Abstract

:
To train skilled unmanned combat aerial vehicle (UCAV) operators, it is important to establish a real-time training environment where an enemy appropriately responds to the action performed by a trainee. This can be addressed by constructing the inference method for the behavior of a UCAV operator from given simulation log data. Through this method, the virtual enemy is capable of performing actions that are highly likely to be made by an actual operator. To achieve this, we propose a hybrid sequence (HS) kernel-based hierarchical support vector machine (HSVM) for the behavior inference of a UCAV operator. Specifically, the HS kernel is designed to resolve the heterogeneity in simulation log data, and HSVM performs the behavior inference in a sequential manner considering the hierarchical structure of the behaviors of a UCAV operator. The effectiveness of the proposed method is demonstrated with the log data collected from the air-to-air combat simulator.

1. Introduction

An unmanned combat aerial vehicle (UCAV) performs a combat task by being controlled by a human operator who is located in a cockpit separate from the vehicle [1,2]. The probability that UCAVs survive and win a combat task is directly related to the skill of the operator. For this reason, the bulk of research [3,4,5] has been conducted toward improving the quality of the training strategy for operators.
Simulation-based training techniques are widely used to train UCAV operators [5]. Rigby et al. classified the simulation-based studies into four categories including historic simulation, role-play, behavior fidelity, and scenario-based training [6]. They concluded that the last of the approaches mentioned is a well-established practice to improve the skill of UCAV operators. In detail, the scenario-based training is a time-tested methodology to provide a realistic and instructionally-sound scenario that replicates what operators would expect to encounter in a real-world combat situation [7,8].
Although the existing training method was successful at serving as a means of gaining experiences regarding UCAV operational missions [8], it has the limitation that the behaviors of enemies are implemented in a predetermined manner in a given scenario. For this reason, both unexpected behaviors of operators and the differences in behavioral skills among trainees are difficult to consider. However, it is important to construct a real-time training environment where an enemy appropriately responds to the action performed by an operator.
Motivated by the remarks above, to reproduce the enemy’s behavior effectively in the training situation, we propose a novel method for the behavior inference of a UCAV operator using a hybrid sequence (HS) kernel-based hierarchical support vector machine (HSVM). As our problem is to reproduce a human behavior using a dataset, we adopted data-driven machine learning methods rather than optimization or meta-heuristic approaches such as genetic algorithms and particle swarm approaches. Moreover, SVM was selected for the following reasons. First, SVM is known for its high performance and less over-fitting as it minimizes an upper bound of the generalization error [9,10]. Second, it does not require a large amount of training data unlike an artificial neural network (ANN)-based method and neuro-fuzzy inference system, which also suffer from the difficulty in designing the architecture of the networks and selecting fuzzy rules, respectively [11,12].
For the simulation log of a UCAV operator given in the form of a vector, the proposed method uses SVMs in a hierarchical manner: the first SVM determines the behavior group of the corresponding vector and the second SVM provides the actual behavior in each group. Here, the behavior group consists of fire, velocity, and rotate. Then, the behavior of the vector is determined using the corresponding classifier in each behavior group. Specifically, the proposed HS kernel is designed to measure similarities between heterogeneous data, defined as the combination of data collected by different types of sensors or devices. The effectiveness of the proposed method is investigated through numerical experiments on simulation log data collected from a simulator.
The rest of the paper is organized as follows. The next section will review the related work. Section 3 presents the proposed method for inferring the behaviors of a UCAV operator using hierarchical SVMs with an HS kernel. Experiment results are reported in Section 4. Finally, the paper is concluded in Section 5.

2. Related Work

2.1. Inferring the Behavior of an Unmanned Combat Aerial Vehicle

There have been only a few studies conducted for the behavior inference of UCAV operators. For a more extensive literature review, the publications related to unmanned aerial vehicles (UAVs) are additionally summarized. In previous research, the maneuvering of a vehicle was a subject to be formulated by using mathematical models at the beginning of the development of algorithms for UAVs [13]. These studies utilized deterministic models, which led to the fact that they were not able to respond to unpredictable situations.
Later, many research efforts were made to model operator’s decisions and behaviors through rule-based methods [14,15,16]. The main drawbacks of the rule-based methods are that they require predefined rules and that some situations cannot be resolved into rules. Moreover, it is hard to avoid the scalability issue whereby conflicts between rules may occur, and a large amount of computation time is required for the behavior inference when various rules are defined to describe diverse situations fully.
Attempts were also made to predict the behavior of a UCAV operator using statistical learning-based methods [17]. Statistical learning is a machine learning framework for extracting patterns or regularity contained in given data [18]. SVM [19], ANN [20], decision tree (DT) [21], and hidden Markov models (HMM) [22] are representative examples of the statistical learning-based methods. These methods estimate the parameters of a model using a large number of training data. Then, the labels of the new data are predicted by the trained model [19].
As data composed of the behaviors performed by UCAV operators become available, an approach based on statistical learning methods for the behavior inference has gained interest in both academia and industry. Some of the studies investigated HMM to predict the trajectory of UAVs [23,24]. In particular, Lowe et al. proposed a probabilistic trajectory method representing aircraft motion as HMM, where the state space consisted of mode change points [24]. The linear regression model combined with HMM was developed to model UAV operator’s approach control [25]. However, most of them focused on a specific behavior group such as landing approach control and navigation [26].
To the best our knowledge, there has been no paper investigating SVMs to infer the behavior of a UCAV operator. Although SVM is applicable to non-linear data by utilizing the kernel, which is capable of measuring the similarity between two instances by mapping the data into higher dimensions [27], it is known to be vulnerable to handling sequential dependent data [28]. Meanwhile, this paper attempts to resolve the limitation mentioned above by using a novel kernel, which enables SVM to work well with sequential dependent data.

2.2. Statistical Learning from Heterogeneous Data

Attributed to the advance in sensor data and data storage technologies, data related to operators, vehicles, and environments of UCAVs are generated and collected during maneuvering. The inherent properties, high dimensionality, and sequentiality of the generated data make them heterogeneous, meaning that the data are composed of values of diverse types. Das et al. highlighted that the attributes of log data collected from vehicles in military domains are time-series data that are continuously generated over time, which include both discrete and continuous values [29].
The application of statistical learning methods to the heterogeneous data is challenging. This is because most statistical learning methods for classification assume that all attributes of the data can be represented as vectors of real numbers [30]. In other words, using statistical learning methods for heterogeneous data without preprocessing is highly likely to result in the degradation of classification performance due to a decrease in the accuracy of calculating the similarity between vectors [31].
Previous studies are grouped into two types with respect to the method of addressing different value types of attributes. First, most studies utilized the attributes of only one type while ignoring others, resulting in information loss [17,32]. The second line of research examined approaches to discretize continuous attributes [33,34]. However, there exists information loss during the process, and enormous training data for discretization are required in some cases.
Attribute selection methods are widely used for the removal of attributes that are not related to labels [35,36]. A condition feature utilization method was developed by Kim et al. to select the appropriate attributes for each instance [37]. These methods have the limitation of selecting attributes without considering the correlations between them. This disadvantage can be resolved by weighted similarity algorithms, which emphasize the effect of highly-correlated attributes by providing weights for them [38,39]. However, existing weighted similarity algorithms do not present a weight assignment method for sequence dependence attributes.
To address this problem, a multiple kernel learning method was proposed [40]. In this method, different kernels are applied to different attributes, and combinations of the similarity results are utilized as the final similarity. Although the multiple kernel learning method is successful at measuring the similarity between vectors composed of heterogeneous attributes compared to the conventional method, it suffers from high computational complexity as the number of attributes increases.

3. Behavior Inference of UCAVs

3.1. Overview

This work aims to infer the behavior of a UCAV operator by using a simulation log. We are given a simulation log, L = { ( x t , y t ) | t = 1 , , T } , where x t and y t mean the state vector and the behavior of an operator at the t th moment, respectively, and T is the total number of instances in the simulation log. Specifically, x t is defined as an N-dimensional vector, and the value of the n th state attribute for the t th moment is denoted as x n , t . For the inference of y t , the vectors collected in the past than t th moment are also utilized, and the number of preceding vectors from the t th moment is denoted as w. Therefore, the purpose of this study is to infer the behavior, y t , of a UCAV operator for the moment t using x t - w + 1 , , x t .
We present three considerations for the inference of a UCAV operator as follows. First, a set of attributes consisting of a state vector is represented as A, and an attribute in A is denoted by α . A is composed of N state attributes such as the velocity and altitude of a UCAV. Table 1 indicates four categories of attributes according to the value type and sequence dependency. In detail, sequence-independent continuous, sequence-dependent continuous, sequence-independent discrete, and sequence-dependent discrete attributes are represented as I C , D C , I D , and D D , respectively.
Second, as shown in Figure 1, the behavior of a UCAV operator has a hierarchical structure with three behavior groups including fire, velocity, and rotate. Each behavior group is related to whether firing is required or not, the control of velocity, and the control of rotating, respectively. The descriptions of each behavior are as follows. FM (fire more) and FL (fire less) represent the behaviors of raising and reducing the intention of firing weapons, respectively; VM (velocity more) and VL (velocity less) for those of raising the intention of increasing and decreasing velocity, respectively; and RM (rotation more) and RL (rotation less) for those of raising and reducing the intention of rotating the vehicle, respectively. Here, the behavior group of y t at the t th moment is denoted at z t . In this paper, we classify a given state vector ( x t ) into one of the behavior groups ( z t ) and then determine the behavior ( y t ).
Finally, each behavior group has a different set of attributes that are highly correlated with the group. For instance, the target distance of a UCAV, which means the distance between the vehicle and an enemy, is related to the fire group. Furthermore, it is known that the proper attribute subset selection can improve the performance of inference models [41]. Therefore, three attribute sets corresponding to each behavior group are selected, and the details of the attribute selection are described in the following section.

3.2. Inferring Behaviors Using Hierarchical SVMs with a Hybrid Sequence Kernel

3.2.1. Attribute Selection

To improve the inference performance in terms of accuracy and computation time, the attribute selection was performed using the correlation-based feature selection (CFS) method proposed by [42]. This method is based on the hypothesis that good attribute subsets contain attributes highly correlated with the target behavior and uncorrelated with each other. In this study, the CFS method was used as follows.
First, we divided L into three groups, L f , L v , and L r , depending on z t corresponding to each instance. Here, L f , L v , and L r indicate simulation logs where their z t are fire, velocity, and rotate groups, respectively. Then, attribute groups for each simulation log are selected by using the merit of attribute subsets, which measures the usefulness of the individual attributes for predicting the behavior. In detail, the merit of a subset S of A for behavior b { f , v , r } , M S z , is calculated using Equation (1) with L z , where f, v, and r mean fire, velocity, and turn, respectively.
M S z = | S | ρ ¯ α z | S | + | S | ( | S | - 1 ) ρ ¯ α α ,
where | S | is the number of elements in S; ρ ¯ α z indicates the average attribute correlation with the behavior, and ρ ¯ α α indicates the average attribute inter-correlation. According to the value of M S z , A f , A v , and A r are selected from A. To be more specific, A f , A v , and A r represent sets of attributes used to infer specific behavior corresponding to fire, velocity, and rotate, respectively.

3.2.2. Similarity Calculation

Figure 2 shows how the proposed HS kernel measures the similarity between two state vectors by using different kernels depending on the attribute type. In this figure, K I , K C D , and K D D represent kernels for I, D C , and D D , respectively, and K H S is the HS kernel calculated as Equation (2):
K H S ( x i , x j ) = λ I K I ( x i , x j ) + λ D C K D C ( x i , x j ) + λ D D K D D ( x i , x j ) ,
where x i and x j are the state vectors for moments i and j, respectively, λ I , λ D C , and λ D D are the weights or importance of I, D C , and D D . Specifically, each weight is obtained by dividing the number of attributes corresponding to the weight by the total number of attributes, leading to λ I + λ C D + λ D D = 1 .
Equation (3) shows how K I computes the similarity between two state vectors.
K I ( x i , x j ) = k l i n e a r ( x i I , x j I ) ,
where x i I and x j I are defined as sub-vectors of x i and x j , respectively, and they only consist of the attributes corresponding to I. k l i n e a r is a linear kernel that separates data linearly and is defined as the inner product of two given vectors, as shown in Equation (4).
k l i n e a r ( x i , x j ) = x i · x j .
Meanwhile, the Gaussian kernel, which is known to work well for time-series data [43], utilizes the Euclidean distance of two input vectors as its similarity; it is defined in Equation (5).
k G a u s s i a n ( x i , x j ) = e x p ( - γ | | x i - x j | | 2 ) ,
where | | x i - x j | | is the Euclidean distance between x i and x j . A kernel for D C using the Gaussian kernel is given by Equation (6).
K D C ( x i , x j ) = n = 1 N k D C ( x n , i , x n , j ) ,
where k D C ( x n , i , x n , j ) is a kernel that calculates the similarity between values of the n th attribute for moments i and j, defined in Equation (7).
k D C ( x n , i , x n , j ) = k G a u s s i a n ( s n , i , s n , j ) ,
where s n , i and s n , j indicate sequence vectors denoted as s n , i = < x n , i - w + 1 , , x n , i > and s n , j = < x n , j - w + 1 , , x n , j > , respectively.
To develop a kernel for D D , we employed a spectrum kernel [44] introduced for the similarity calculation among genomes in the bioinformatics field. The spectrum kernel calculates the similarity between two vectors based on the product between the number of occurrences of given patterns in the vectors, and it is defined as Equation (8).
k s p e c t r u m ( x i , x j ) = q Q C ( q , x i ) · C ( q , x j ) ,
where Q is a set of predefined meaningful patterns and C ( q , x i ) counts the number of occurrences of pattern q in x i .
The spectrum kernel is required to be modified to fit the D D of the considered dataset. Since the attributes are composed of a small number of unique values and each value lasts for a relatively long duration, meaningful patterns are hard to capture by the spectrum kernel. To resolve the problem, we summarized a sequence before the similarity calculation. The modified spectrum kernel is defined in Equation (9).
k M S P ( s n , i , s n , j ) = p P n C ( p , S ( s n , i ) ) · C ( p , S ( s n , j ) ) ,
where S ( s n , i ) summarizes s n , i by replacing a sequence of repeated values with one value, P n is defined as a set of sequence patterns extracted from the n th attribute, and p represents a sequence pattern that remains distinct after summarization. Thus, a kernel for D D is defined in Equation (10).
K D D ( x i , x j ) = n = 1 N k D D ( x n , i , x n , j ) .
where k D D ( x n , i , x n , j ) is presented in Equation (11).
k D D ( x n , i , x n , j ) = k M S P ( s n , i , s n , j )

3.2.3. Inferring Behavior

HSVM predicts the UCAV operator’s behavior using sets of attributes (A, A f , A v , and A r ), training datasets (L, L f , L v , and L r ), and the HS kernel introduced in Section 3.2.2. The overall framework of the proposed HSVM is presented in Figure 3. We note that SVMs employ the proposed HS kernel to calculate the similarity between state vectors in both the training and inference phases.
In the training phase, L is divided into three groups including L f , L v , and L r with respect to y t for all ts. Then, L is utilized to train g-SVM, and L f , L v , and L r are utilized for training f-SVM, v-SVM, and r-SVM, respectively. All attributes of log data are required to train g-SVM, which is designed to determine the behavior group, while only the sets of selected attributes, A f , A v , and A r , are used to train f-SVM, v-SVM, and r-SVM, respectively. Algorithm 1 presents the training process of the four SVMs constituting HSVM.
In the inference phase, behavior y ^ t of new instance x t is predicted using the trained SVMs. The inference phase is composed of two steps and summarized in Algorithm 2. First, z ^ t of x t is determined by using g-SVM (Line 2). Then, y ^ t is predicted by the corresponding trained SVM of z ^ t (Lines 3–9). In Lines 3–9, a set of selected attributes is utilized for the corresponding SVM.
Algorithm 1 Training process of HSVM.
Input: A, A f , A v , A r , L, L f , L v , L r
Output: g-SVM, f-SVM, v-SVM, r-SVM 1.4
  1: procedure Training
  2:     g-SVM ← behavior group classifier trained from L using A
  3:     f-SVM ← fire behavior classifier trained from L f using A f
  4:     v-SVM ← velocity behavior classifier trained from L v using A v
  5:     r-SVM ← rotate behavior classifier trained from L r using A r
  6: end procedure
Algorithm 2 Inference phase of HSVM.
Input: x t , A, A f , A v , A r , g-SVM, f-SVM, v-SVM, r-SVM
Output: y ^ t
  1:  procedure INFERENCE
  2:     z ^ t ← predicted behavior group of x t classified by g-SVM using A
  3:    switch z ^ t do
  4:        case fire
  5:            y ^ t ← predicted behavior of x t classified by f-SVM using A f
  6:         case velocity
  7:            y ^ t ← predicted behavior of x t classified by v-SVM using A v
  8:        case rotate
  9:            y ^ t ← predicted behavior of x t classified by r-SVM using A r
10: end procedure

4. Experiment

4.1. Data Description

We prepared the datasets generated by the simulator because it is impossible to use actual combat logs for security reasons. However, we believe that the performance of the proposed method on the log collected from a simulator is highly likely to be similar to that tested on an actual log. Figure 4 presents the snapshot of a simulation conducted on the considered simulator, which represents one-on-one combat.
The simulator performs a simulation according to a scenario containing information on the initial conditions of combat. A scenario includes details such as the types of UCAVs involved in combat and the kinds of offensive and defensive weapons that the vehicles carry. Table 2 presents an example of a scenario used for the generation of a simulation log. The combat type and the field of view (FOV) were set to one-on-one and 60 degrees, respectively. When the scenario was simulated, two UCAVs, a KF-16 and a MIG29, with the same weapons performed the battle according to the engagement sequence.
Our goal in the data collection was to build a dataset as large as possible, and the 113 scenarios were generated and simulated, which was the maximum number of scenarios that we were able to utilize within a given time limit. Each scenario was simulated for 100 s and composed of 37 behaviors on average. The simulation log consisted of 54 state attributes, and several examples of the state attributes are presented in Table 3. Attributes in the table are grouped into four categories including I C , D C , I D , and D D . In detail, aim intensity, altitude, mid-range missile measure, and move aim belong to I C , D C , I D , and D D , respectively. Table 4 shows six behaviors, their behavior groups, and the number of occurrences of each behavior in the dataset. We note that the number of occurrences of behaviors belonging to the rotate group is small compared to those of behaviors belonging to the fire and velocity groups.

4.2. Experimental Settings

In order to select three sets of attributes of the corresponding three behavior groups, A f , A v , and A r , the CFS method was performed on A. Table 5 indicates the results of attribute selection. A f and A v consisted of nine and seven attributes, respectively, whereas A r had only three attributes. Most attributes in A f were related to a target UCAV or an engagement situation, except for velocity and altitude. On the other hand, A v had attributes that were mainly related to the maneuvering situation except for short-range missile fire.
As a performance measure for the inference of a behavior, we employed the accuracy defined as the ratio of the number of correctly-classified instances to the total number of instances, which is presented in Equation (12).
A c c u r a c y = 1 T t = 1 T δ ( y ^ t = y t ) ,
where δ ( y ^ t = y t ) returns a value of one if y ^ t is equal to y t and returns a value of zero otherwise. For example, when behaviors inferred at three moments in combat were given as {VM, VL, FM} and the actual behaviors were {VL, VM, FM}, the accuracy was 0.33.
Finally, the performance of the proposed method was evaluated by five-fold cross-validation. Specifically, for all performance comparison experiments, the log data extracted from the randomly-selected 90 scenarios among the total of 113 scenarios were used as the training data, while those extracted form the remaining were used to test the performance of the classifiers.
The over-fitting problem may occur as our problem deals with a relatively small dataset. We tried to avoid the problem by adopting SVM, which is known for its generalization power [9], and by evaluating the performances of the proposed method using the five-fold cross-validation method described above. Moreover, all parameters were carefully controlled, and the fine-tuning of the parameters was not encouraged, as it is known that improper selection of the parameters of the kernels is likely to cause over-fitting problems [45].

4.3. Experimental Results

4.3.1. HS Kernel Evaluation Results

In this section, to evaluate the effectiveness and efficiency of the HS kernel for inferring behaviors, we used only log data where y t was FM or FL. Two experiments were performed as follows. We first measured the accuracies of the HS kernel for different values of w and then selected the w value that yielded the best performance. In subsequent experiment, the performance of the HS kernel was compared to those of the existing kernel functions. The parameters of the sub-kernels (Gaussian, linear, etc.) in the proposed method were determined by performing an exhaustive search according to the test accuracies. The parameters of the sub-kernels were intactly utilized for the kernels in the compared method.
Figure 5 indicates the behavior inference accuracies of the HS kernel according to w. The best performance (of 0.95) was achieved when w was 10. After the maximum value of accuracy was obtained, the accuracy gradually decreased with increasing the value of w. This is because as the value of w increased, values far from the given vector were included in the similarity calculation, which increased the likelihood of concluding that the two vectors representing the different situation were similar.
However, exceptionally high accuracy (of 0.895) was observed when the value of w was 45. As mentioned above, although the sequence-dependent discrete kernel overestimated the similarity when w was large, it was effective for utilizing sufficiently large w values for inference in the case of attributes having small changes. Therefore, it can be assumed that the similarity of an attribute was measured effectively when w was 45. It was expected that the utilization of different w values for different attributes would result in performance improvement.
Figure 6 presents the performance comparison results for the HS, multiple, Gaussian, and linear kernels in terms of the accuracy and training time. In this figure, the left Y-axis corresponds to the bar graphs representing accuracies, and the right Y-axis corresponds to the line graphs displaying the training time. The w value of HS and multiple kernels was set to 10. In the case of the multiple kernels, to consider sequence-dependent attributes, the Gaussian and spectrum kernels were used to address continuous and discrete values, respectively.
The HS and multiple kernels required a longer training time than the Gaussian and linear kernels since w additional preceding vectors were involved in the similarity calculation. In terms of the accuracy, the HS kernel outperformed the existing kernels, and the multiple kernels also showed better performance than the others except the proposed kernel. Based on the above observation, we can conclude that the use of the preceding vectors was effective for the inference.
In terms of both accuracy and training time, the HS kernel outperformed the multiple kernels. Since the HS kernel reduced the number of similarity calculations by using the linear kernel for sequence independent attributes, the training time of the HS kernel was much shorter than that of the multiple kernels. Moreover, the results implied that considering only one state vector at one moment for some attributes yielded higher accuracy than considering the preceding vectors for all attributes.
Figure 7 indicates an example scenario where a UCAV operator conducted the behaviors related to the fire group. Figure 7a represents changes in the values of state attributes including aim intensity, target distance, and target speed difference. While the value of the target distance decreased, that of the aim intensity rose dramatically, meaning that two UCAVs were in the engagement situation. Therefore, it can be observed from Figure 7b that the intention of firing weapons was maintained at a high level.
Figure 7c–f indicate that the results of the HS and multiple kernels yielded stable patterns that were similar to those of the target behavior presented in Figure 7b, whereas those of the Gaussian and linear kernels showed severe fluctuations. This difference can be attributed to the fact that the HS and multiple kernels utilized sequential information, while others did not.
Meanwhile, although the results of the HS and multiple kernels were similar to each other, the pattern generated by the HS kernel was more similar to that of the target behavior. Since the HS kernel utilized only meaningful sequential information while the multiple kernels regarded sequence-independent attributes as sequential information, the HS kernel was capable of inferring behaviors more accurately than multiple kernels.

4.3.2. HSVM Evaluation Results

Table 6 presents the performance comparison results for HSVM and the conventional SVM. Here, the Gaussian kernel, which yielded the best performance among the existing kernels in the previous experiments, was used as the kernel function of the one-level SVM. As shown in Table 6, the HSVM with the HS kernel outperformed the one-level SVM that used the existing kernel. The value of the accuracy of the proposed method was 0.645, which may not be satisfactory for practical use. However, this is a promising result since the accuracy of the classifier that randomly predicts one of six behaviors was 0.17.

5. Conclusions

This paper presented a novel method for inferring the behavior of a UCAV operator from a simulation log that was composed of heterogeneous data of multi-type attributes in terms of the value type and sequence dependency. To resolve the data heterogeneity, we developed the HS kernel, which was designed to measure the similarity of two vectors using the kernel assigned to each attribute type. Furthermore, the hierarchical structure of the behaviors of a UCAV operator was utilized for HSVM, where classification was performed in a sequential manner.
Through the experimental validation on the log data collected from an air-to-air combat simulator, we successfully demonstrated the effectiveness of the proposed method. While the proposed HS kernel required a longer training time than the Gaussian and linear kernels, it showed better performance in terms of accuracy. Especially, the HS kernel outperformed the existing multiple kernels in terms of both accuracy and training time. Finally, HSVM with the HS kernel inferred the behaviors of a UCAV operator more precisely than one-level SVM using the existing kernel.
The proposed method had a limitation that it assumed the six types of behaviors for UCAV operators took place in an exclusive manner, whereas a UCAV operator may perform several behaviors simultaneously in actual combat. For future work, diverse methods allowing multiple behavior inference can be employed to relax the behavior independence assumption of the proposed method. In detail, we plan to investigate the techniques for selecting parameters that are responsible for determining the number of behaviors to be performed. Moreover, future work will focus on developing a method to prevent conflicting behaviors from being selected at the same time.

Author Contributions

All authors contributed equally to the initial design and development of the framework; Y.C. implemented the computer code; J.H. wrote the draft of the paper; D.S. and J.P. reviewed and proof read the paper.

Funding

This research received no external funding.

Acknowledgments

This work was supported by the GRRC program of Gyeonggi province (2018-0260, Research on Industrial Data Analytics for Intelligent Manufacturing).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ernest, N.; Cohen, K.; Kivelevitch, E.; Schumacher, C.; Casbeer, D. Genetic fuzzy trees and their application towards autonomous training and control of a squadron of unmanned combat aerial vehicles. Unmanned Syst. 2015, 3, 185–204. [Google Scholar] [CrossRef]
  2. Sun, X.; Cai, C.; Yang, J.; Shen, X. Route evaluation for unmanned aerial vehicle based on type-2 fuzzy sets. Eng. Appl. Artif. Intell. 2015, 39, 132–145. [Google Scholar] [CrossRef]
  3. Smith, G.R. Virtual reality flight trainer for the UAV remote pilot. In Proceedings of the AeroSense 2000 Helmet-and Head-Mounted Displays V, Orlando, FL, USA, 24–28 April 2000; pp. 224–234. [Google Scholar]
  4. Capello, E.; Guglieri, G.; Quagliotti, F.B. UAVs and simulation: An experience on MAVs. Aircr. Eng. Aerosp. Technol. 2009, 81, 38–50. [Google Scholar] [CrossRef]
  5. Cohen, I.; Brinkman, W.P.; Neerincx, M.A. Modelling environmental and cognitive factors to predict performance in a stressful training scenario on a naval ship simulator. Cogn. Technol. Work 2015, 17, 503–519. [Google Scholar] [CrossRef] [Green Version]
  6. Rigby, K.T.; Macchiarella, N.D.; Mirot, A. Enhanced Scenario-Based Training for Unmanned Aircraft System Operational Missions. In Proceedings of the AIAA Modeling and Simulation Technologies Conference, Grapevine, TX, USA, 9–13 January 2017; p. 1309. [Google Scholar]
  7. Armstrong, J.; Clare, J.; Plecas, D. Monitoring the impact of scenario-based use-of-force simulations on police heart rate: Evaluating the Royal Canadian Mounted Police Skills Refresher Program. Criminol. Crim. Just. L Soc. 2014, 15, 51. [Google Scholar]
  8. Macchiarella, N.D.; Mirot, A.J. Scenario Development for Unmanned Aircraft System Simulation-Based Immersive Experiential Learning. J. Aviat./Aerosp. Educ. Res. 2018, 28, 63–79. [Google Scholar] [CrossRef]
  9. Kim, S.; Choi, Y.; Lee, M. Deep learning with support vector data description. Neurocomputing 2015, 165, 111–117. [Google Scholar] [CrossRef]
  10. Deka, P.C. Support vector machine applications in the field of hydrology: A review. Appl. Soft Comput. 2014, 19, 372–386. [Google Scholar]
  11. Yu, Y.; Li, W.; Li, J.; Nguyen, T.N. A novel optimised self-learning method for compressive strength prediction of high performance concrete. Constr. Build. Mater. 2018, 184, 229–247. [Google Scholar] [CrossRef]
  12. Yu, Y.; Zhang, C.; Gu, X.; Cui, Y. Expansion prediction of alkali aggregate reactivity-affected concrete structures using a hybrid soft computing method. Neural Comput. Appl. 2018, 2018, 1–20. [Google Scholar] [CrossRef]
  13. McRuer, D.T.; Jex, H.R. A review of quasi-linear pilot models. IEEE Trans. Hum. Factors Electron. 1967, HFE-8, 231–249. [Google Scholar] [CrossRef]
  14. Ionita, S.; Sofron, E. The fuzzy model for aircraft landing control. In Advances in Soft Computing—AFSS 2002; Springer: Berlin/Heidelberg, Germany, 2002; pp. 47–54. [Google Scholar]
  15. Jang, D.S.; Cho, S.; Tahk, M.; Koo, H.; Kim, J. Fuzzy logic based collision avoidance for UAVs. J. Korean Soc. Aeronaut. Space Sci. 2006, 34, 55–62. [Google Scholar]
  16. Pouya, S.; Saghafi, F. Autonomous runway alignment of fixed-wing unmanned aerial vehicles in landing phase. In Proceedings of the 2009 Fifth International Conference on Autonomic and Autonomous Systems, Valencia, Spain, 20–25 April 2009; pp. 208–213. [Google Scholar]
  17. Tervo, K. Human Adaptive Mechatronics Methods for Mobile Working Machines; Helsinki University of Technology: Espoo, Finland, 2010. [Google Scholar]
  18. Otsuka, S.; Koch, C.; Saiki, J. Visual statistical learning produces implicit and explicit knowledge about temporal order information and scene chunks: Evidence from direct and indirect measures. Vis. Cogn. 2016, 24, 155–172. [Google Scholar] [CrossRef]
  19. Vapnik, V. The Nature of Statistical Learning Theory; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
  20. Sarle, W.S. Neural networks and statistical models. In Proceedings of the Nineteenth Annual SAS Users Group International Conference, Dallas, TX, USA, 10–13 April 1994. [Google Scholar]
  21. Safavian, S.R.; Landgrebe, D. A survey of decision tree classifier methodology. IEEE Trans. Syst. Man Cybern. 1991, 21, 660–674. [Google Scholar] [CrossRef]
  22. Rabiner, L.R. A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 1989, 77, 257–286. [Google Scholar] [CrossRef]
  23. Andersson, M.; Pettersson, G. Improving situation awareness using aerial-mission recognition and temporal information. In Proceedings of the International Conference on Information Fusion, Stockholm, Sweden, 28 June–1 July 2004. [Google Scholar]
  24. Lowe, C.D. Predicting Pilot Intent and Aircraft Trajectory in Uncontrolled Airspace. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 2014. [Google Scholar]
  25. Mori, R.; Suzuki, S. Modeling of pilot landing approach control using stochastic switched linear regression model. J. Aircr. 2010, 47, 1554–1558. [Google Scholar] [CrossRef]
  26. Ropero, F.; Muñoz, P.; R-Moreno, M.D. TERRA: A path planning algorithm for cooperative UGV–UAV exploration. Eng. Appl. Artif. Intell. 2019, 78, 260–272. [Google Scholar] [CrossRef]
  27. Namdari, M.; Jazayeri-Rad, H. Incipient fault diagnosis using support vector machines based on monitoring continuous decision functions. Eng. Appl. Artif. Intell. 2014, 28, 22–35. [Google Scholar] [CrossRef]
  28. Bishop, C.M. Pattern Recognition and Machine Learning; Springer: Berlin/Heidelberg, Germany, 2006. [Google Scholar]
  29. Das, S.; Matthews, B.L.; Srivastava, A.N.; Oza, N.C. Multiple kernel learning for heterogeneous anomaly detection: Algorithm and aviation safety case study. In Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, 25–28 July 2010; pp. 47–56. [Google Scholar]
  30. Libbrecht, M.W.; Noble, W.S. Machine learning applications in genetics and genomics. Nat. Rev. Genet. 2015, 16, 321. [Google Scholar] [CrossRef]
  31. Baek, J.G.; Kim, C.O.; Kim, S.S. Multi-interval discretization of continuous-valued attributes for constructing incremental decision tree. J. Korean Inst. Ind. Eng. 2001, 27, 394–405. [Google Scholar]
  32. Hayashi, M. Hidden markov models to identify pilot instrument scanning and attention patterns. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Washington, DC, USA, 8 October 2003; pp. 2889–2896. [Google Scholar]
  33. Ouyang, Y.; Ma, J.; Dai, Q. Bayesian Multi-net Classifier for classification of remote sensing data. Int. J. Remote. Sens. 2006, 27, 4943–4961. [Google Scholar] [CrossRef]
  34. Oleynikova, H.; Burri, M.; Taylor, Z.; Nieto, J.; Siegwart, R.; Galceran, E. Continuous-time trajectory optimization for online UAV replanning. In Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Daejeon, Korea, 9–14 October 2016; pp. 5332–5339. [Google Scholar]
  35. Law, M.H.; Figueiredo, M.A.; Jain, A.K. Simultaneous feature selection and clustering using mixture models. IEEE Trans. Pattern Anal. Mach. Intell. 2004, 26, 1154–1166. [Google Scholar] [CrossRef]
  36. Zeng, H.; Cheung, Y.M. A new feature selection method for Gaussian mixture clustering. Pattern Recognit. 2009, 42, 243–250. [Google Scholar] [CrossRef]
  37. Kim, K.; Choi, Y.; Park, J. A Conditional Feature Utilization Approach to Itemset Retrieval in Online Shopping Services. J. Electron. Commer. Res. 2014, 15, 317. [Google Scholar]
  38. Chen, H.; Perich, F.; Finin, T.; Joshi, A. Soupa: Standard ontology for ubiquitous and pervasive applications. In Proceedings of the The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MOBIQUITOUS 2004, Boston, MA, USA, USA, 26 August 2004; pp. 258–267. [Google Scholar]
  39. Paredes, R.; Vidal, E. A class-dependent weighted dissimilarity measure for nearest neighbor classification problems. Pattern Recognit. Lett. 2000, 21, 1027–1036. [Google Scholar] [CrossRef]
  40. Bach, F.R.; Lanckriet, G.R.G.; Jordan, M.I. Multiple kernel learning, conic duality, and the SMO algorithm. In Proceedings of the International Conference on Machine Learning, Banff, AB, Canada, 4–8 July 2004; pp. 6–13. [Google Scholar]
  41. Amin, M.S.; Chiam, Y.K.; Varathan, K.D. Identification of significant features and data mining techniques in predicting heart disease. Telemat. Inform. 2019, 36, 82–93. [Google Scholar] [CrossRef]
  42. Hall, M.A.; Smith, L.A. Practical feature subset selection for machine learning. In Proceedings of the Australasian Computer Science Conference, Perth, Australia, 4–6 February 1998; Springer: Berlin, Germany, 1998. [Google Scholar]
  43. Rüping, S. SVM Kernels for Time Series Analysis; Technical Report; Universität Dortmund: Dortmund, Germany, 2001. [Google Scholar]
  44. Leslie, C.S.; Eskin, E.; Noble, W.S. The spectrum kernel: A string kernel for SVM protein classification. Pac. Symp. Biocomput. 2002, 7, 566–575. [Google Scholar]
  45. Min, J.H.; Lee, Y.C. Bankruptcy prediction using support vector machine with optimal choice of kernel function parameters. Expert Syst. Appl. 2005, 28, 603–614. [Google Scholar] [CrossRef]
Figure 1. Hierarchical structure of the behavior of an unmanned combat aerial vehicle (UCAV) operator.
Figure 1. Hierarchical structure of the behavior of an unmanned combat aerial vehicle (UCAV) operator.
Sustainability 11 04836 g001
Figure 2. Overview of the hybrid sequence (HS) kernel.
Figure 2. Overview of the hybrid sequence (HS) kernel.
Sustainability 11 04836 g002
Figure 3. Overview structure of the proposed hierarchical support vector machine (HSVM).
Figure 3. Overview structure of the proposed hierarchical support vector machine (HSVM).
Sustainability 11 04836 g003
Figure 4. Snapshots of the simulation from the air-to-air combat simulator.
Figure 4. Snapshots of the simulation from the air-to-air combat simulator.
Sustainability 11 04836 g004
Figure 5. Accuracy of the HS kernel according to the number of preceding vectors (w).
Figure 5. Accuracy of the HS kernel according to the number of preceding vectors (w).
Sustainability 11 04836 g005
Figure 6. Performance comparison results of HS, multiple, Gaussian, and linear kernels in terms of accuracy and training time.
Figure 6. Performance comparison results of HS, multiple, Gaussian, and linear kernels in terms of accuracy and training time.
Sustainability 11 04836 g006
Figure 7. An example scenario involving state attributes, target behavior, and the results of the kernels.
Figure 7. An example scenario involving state attributes, target behavior, and the results of the kernels.
Sustainability 11 04836 g007
Table 1. Four categories of attributes according to the sequence dependency and the value type.
Table 1. Four categories of attributes according to the sequence dependency and the value type.
Value TypeContinuous (C)Discrete (D)
Sequence Dependency
Sequence-independent (I) I C I D
Sequence-dependent (D) D C D D
Table 2. Example of a scenario used for the generation of a simulation log.
Table 2. Example of a scenario used for the generation of a simulation log.
Basic settingCombatOne-on-one
FOV60
Radar range8000
Scenario Friendly UCAVEnemy UCAV
TypeKF-16MIG29
Offensive weaponAIM120A, AA11, machine gun
Defensive weaponChaff, flare
Engagement sequence
  • Friendly UCAV identifies an enemy and fires AIM120A
  • The enemy dodges
  • Two UCAVs fire AA11
  • Friendly UCAV dodges, and enemy is shot down
Table 3. Description of the examples of the state attributes.
Table 3. Description of the examples of the state attributes.
AttributeCategoryDescription
Aim intensity I C a Aim intensity against a target
Altitude D C b Altitude of the vehicle
Mid-range missile measure I D c Quantity of mid-range missiles
Move aim D D d Aiming of a target
Target altitude difference D C Altitude difference from a target
Target distance D C Distance from a target
Target speed difference D C Speed difference from a target
Velocity D C Velocity of the vehicle
a Sequence-independent continuous; b sequence-dependent continuous; c sequence-independent discrete; d sequence-dependent discrete.
Table 4. Number of occurrences of behavior groups and behaviors considered in the experiments.
Table 4. Number of occurrences of behavior groups and behaviors considered in the experiments.
Behavior GroupBehaviorNumber of Occurrences
FireFM300
FL1243
VelocityVM2039
VL793
RotateRM124
RL59
Table 5. Results of attribute selection for the three behavior groups.
Table 5. Results of attribute selection for the three behavior groups.
Attribute SetSelected Attributes
A f Target gun distance difference
Target short-range missile distance
Velocity
Short-range missile fire
Target horizontal LOS
Target vertical LOS
Overshoot
Lock on target
Altitude
A v Velocity
Target speed difference
Target altitude difference
Behavior No.
Short-range missile fire
Target horizontal LOS
Gamma
A r Target speed difference
Control velocity
Gamma
Table 6. Performance results of HSVM and conventional SVM.
Table 6. Performance results of HSVM and conventional SVM.
ModelAccuracy
HSVM0.645
SVM0.470

Share and Cite

MDPI and ACS Style

Huh, J.; Park, J.; Shin, D.; Choi, Y. A Hierarchical SVM Based Behavior Inference of Human Operators Using a Hybrid Sequence Kernel. Sustainability 2019, 11, 4836. https://doi.org/10.3390/su11184836

AMA Style

Huh J, Park J, Shin D, Choi Y. A Hierarchical SVM Based Behavior Inference of Human Operators Using a Hybrid Sequence Kernel. Sustainability. 2019; 11(18):4836. https://doi.org/10.3390/su11184836

Chicago/Turabian Style

Huh, Jaeseok, Jonghun Park, Dongmin Shin, and Yerim Choi. 2019. "A Hierarchical SVM Based Behavior Inference of Human Operators Using a Hybrid Sequence Kernel" Sustainability 11, no. 18: 4836. https://doi.org/10.3390/su11184836

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop