Download eBook for Free

Full Document

The Full Document PDF contains embedded video that was created using Adobe Acrobat 8. To properly view these animated demonstrations, you may need Acrobat Reader version 6 or higher installed on your computer.

FormatFile SizeNotes
PDF file 3.8 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Summary Only

FormatFile SizeNotes
PDF file 0.1 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

As the U.S. military transforms to an information-based force, it will need processes and methods to collect, combine, and utilize the intelligence that is generated by its assets. The process known as fusion will play an important role in determining whether this intelligence is used in the most beneficial manner. The process of fusion, combining pieces of information to produce higher-quality information, knowledge, and understanding, is often poorly represented in constructive models and simulations that are used to analyze intelligence issues. This report describes one approach to capturing the fusion process in a constructive simulation, providing detailed examples to aid in further development and instantiation. The sequential fusion method in intended to determine whether separate intelligence observations are close enough geographically, have consistently identified the same battlefield entity, and contain high-quality information, all of which must be considered before fusion of intelligence can occur. The fusion process described in this report is, for the most part, an implicit representation of the generation of battlefield intelligence and can be used in a constructive simulation or fusion model to better understand the dynamics of intelligence-gathering systems and their effect on intelligence metrics.

Table of Contents

  • Chapter One

    Introduction

  • Chapter Two

    The “Knowledge Matrix”

  • Chapter Three

    Convoy Example

  • Chapter Four

    Higher-Level Fusion

  • Chapter Five

    Conclusions

Research conducted by

The research described in this report was sponsored by the United States Army and conducted by the RAND Arroyo Center.

This report is part of the RAND Corporation Technical report series. RAND technical reports may include research findings on a specific topic that is limited in scope or intended for a narrow audience; present discussions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.