In-Stream Data Processing for Tactical Environments

In-Stream Data Processing for Tactical Environments

Marco Carvalho (Institute for Human and Machine Cognition, USA)
DOI: 10.4018/978-1-60566-130-8.ch017
OnDemand PDF Download:


Data dissemination and information management technologies for tactical environments are quickly becoming major areas of research for both military and civilian applications. Critical to the problem is the need for fully distributed information management technologies that are efficient, adaptive and resilient. In this paper, we introduce and discuss a new strategy for tactical data dissemination and processing based on distributed online learning. Starting from a formal description of the problem we introduce our proposed solution and its theoretical properties. We also present and discuss a number of simulation experiments for different data dissemination scenarios, and conclude the work with a discussion on how such techniques may be applied to critical e-government environments under different assumptions of service availability and information release policies.
Chapter Preview

Background And Previous Work

The resource allocation problem for data processing in mobile ad hoc networks can be generally classified into three main groups: (1) local data processing, (2) remote data processing, and (3) distributed (or in-stream) data processing. In each case, the goal is to allocate resources for data processing and distribution from a source node to multiple sink nodes requiring (possibly) different variations of the data.

In the first type of problems (i.e., local data processing), the source of the data is responsible for providing the necessary transformations required by each client. Similar to conventional client-server models, local data processing essentially allocates all processing to the data source (i.e., the server). The research focus on these types of problems is basically in the allocation of resources for data distribution (i.e., data routing).

Curran (2003) proposed a reinforcement learning-based algorithm for routing in ad hoc networks. The SWARM protocol is data agnostic, focused only on packet routing. When receiving a data packet, each node chooses the appropriate action (next hop) based on current policies. The work was later extended by Dowling, Curran, Cunningham, and Cahill (2004) who proposed the collaborative reinforcement learning-based routing protocol called SAMPLE, for mobile ad hoc networks. Chang, Ho, and Kaelbling (2004) have also proposed the use of reinforcement learning techniques for data routing in mobile ad hoc networks. Although the approach did not address tactical issues such as service decomposition and distribution, it did allow for interaction between data routing and node mobility. Peng and Deyun (2006) also leverage from reinforcement learning algorithms to improve quality of service (QoS) routing strategies. In his work, Peng proposes a heuristic-based algorithm that utilizes reinforcement learning to estimate best QoS routing paths from previous experience, reducing the number of QoS flood and probing packets for path maintenance in mobile networks.

Complete Chapter List

Search this Book:
Associate Editors and Editorial Review Board
Table of Contents
Mehdi Khosrow-Pour
Chapter 1
Marijn Janssen, George Kuk
Stimulated by the need to reduce cost and improve service provisioning and client involvement at the same time, the concept of business models has... Sample PDF
E-Government Business Models: Theory, Challenges and Research Issues
Chapter 2
Roy Ladner
In this chapter we provide an overview of electronic government as it pertains to national security and defense within the Department of Defense... Sample PDF
Electronic Government: Overview and Issues for National Security Interests
Chapter 3
Ranjeev Mittu, Suleyman Guleyupoglu, William Barlow, Michael Dowdy, Sean McCarthy
The emergence of new doctrine is enabling Security, Stabilization, Transition and Reconstruction (SSTR) operations to become a core U.S. military... Sample PDF
Towards Civil-Military Coordination During Security, Stabilization, Transition and Reconstruction Efforts
Chapter 4
Akhilesh Bajaj, Sudha Ram
Recently, there has been increased interest in sharing digitized information between government agencies, with the goals of improving security... Sample PDF
A Comprehensive Framework Towards Information Sharing Between Government Agencies
Chapter 5
Eric T.K. Lim, Chee-Wee Tan, Shan-Ling Pan
As e-government becomes increasingly pervasive in modern public administrative management, its influence on organizations and individuals has become... Sample PDF
E-Government Implementation: Balancing Collaboration and Control in Stakeholder Management
Chapter 6
Yining Chen, H.M. Chen, Russell K.H. Ching, Wayne W. Huang
Over the last decade, the Internet has become one of the most important means of communication in all social areas. The success of Web technology... Sample PDF
Electronic Government Implementation: A Comparison Between Developed and Developing Countries
Chapter 7
Jonna Järveläinen, Eija Koskivaara, Päivi Pihlaja, Hannu Salmela, Jarmo Tähkäpää, Timo Kestilä
This collaborative action research study reports the experiences in developing e-government innovations in early childhood education context in... Sample PDF
Involving Service Professionals in eGovernment Innovation: The Case of Finnish Early Childhood Education
Chapter 8
Jyoti Choudrie, Vishanth Weerakkody
This article examines how horizontal integration between the various departments of a local authority in the United Kingdom (UK) occurs. Following... Sample PDF
Horizontal Process Integration in E-Government: The Perspective of a UK Local Authority
Chapter 9
Lucas Walsh
As developments in communication technologies impact upon many spheres of public and private life, they influence the way in which the public sector... Sample PDF
Online Policy Consultation: A Case Study of Local Government
Chapter 10
Lisa Hill
Due to compulsory voting, Australia’s turnout rate is among the highest and most socially-even in the industrialised world. Nevertheless, some... Sample PDF
Electronic Conduits to Electoral Inclusion in an Atypical Constituency: The Australian Case
Chapter 11
Kevin O’Toole
This chapter analyses local government’s response to the pressure to modernise its structures through its use of Information Communication... Sample PDF
Australia Local Government and E-Governance: From Administration to Citizen Participation?
Chapter 12
Kate Alport
This chapter examines the spread of Information and Communication Technologies (ICTs) in South Australia. It starts by assessing South Australia’s... Sample PDF
Engaging the Community Through E-Democracy in South Australia
Chapter 13
G. P. Sahu
The study seeks to highlight the key variables affecting usage of e-government by internal users of Indian Central Excise. An e-government... Sample PDF
Users' Acceptance of E-Government: A Study of Indian Central Excise
Chapter 14
Tagelsir Mohamed Gasmelseid
The recent economic, organizational and technological transformations are motivating developing countries to adopt electronic government... Sample PDF
A Multi-Agent Service Oriented Modeling of E-Government Initiatives
Chapter 15
Shahram Rahimi
The effectiveness of current search and retrieval systems is restricted as they do not use the semantics of the data but mainly utilize keywords.... Sample PDF
A Methodology for Ontological Mediation in Multi-Agent Systems
Chapter 16
Eugene Santos Jr., Eunice E. Santos, Hien Nguyen, Long Pan, John Korah
With the proliferation of the Internet and rapid development of information and communication infrastructure, E-governance has become a viable... Sample PDF
Analyst-Ready Large Scale Real Time Information Retrieval Tool for E-Governance
Chapter 17
Marco Carvalho
Data dissemination and information management technologies for tactical environments are quickly becoming major areas of research for both military... Sample PDF
In-Stream Data Processing for Tactical Environments
Chapter 18
Dilip Kumar Sharma, Gopalji Varshneya, Ashwani Kumar Upadhyay
This article analyzes the diffusion of a Web technology named AJAX in facilitating e-government architecture and enhancing its potential by... Sample PDF
AJAX in Development of Web-Based Architecture for Implementation of E-Governance
About the Contributors