Skip to main content
Log in

Theory and techniques of data mining in CGF behavior modeling

  • Review
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

For the large quantity of data, rules and models generated in the course of computer generated forces (CGFs) behavior modeling, the common analytical methods are statistical methods based on the tactical rules, tactical doctrine and empirical knowledge. However, from the viewpoint of data mining, we can find many of these analytical methods are also each-and-every different data mining methods. In this paper, we survey the data mining theory and techniques that have appeared in the course of CGF behavior modeling from the viewpoint of data mining. Further, we redefine and reclassify these theories and techniques according to the research requirements of data mining (the knowledge structure of data mining). We aim to help the CGF investigators to learn the key points and the research methods of the data intelligent processing in the CGF behavior modeling, and thus we can provide the references for the colleagues who are engaged in the research and practice of the CGF behavior modeling by this article. We also introduce our ongoing work on the CGF behavior modeling based on data mining.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Guo Q, Yang L, Yang R, et al. An Introduction to Computer Generated Forces (in Chinese). Beijing: National Defence Industry Press, 2006

    Google Scholar 

  2. Yin Y. An approach to mining bundled commodities. Knowl Based Syst, 2008, 21: 321–331

    Article  Google Scholar 

  3. Yin Y, Gong G, Han L. Control approach to rough set reduction. Comput Math Appl, 2009, 57: 117–126

    MATH  Google Scholar 

  4. Yin Y. A proximate dynamics model for data mining. Expert Syst Appl, 2009, 36: 9819–9833

    Article  Google Scholar 

  5. Fernandes M, Franceschini D. Architecture and integration version 2.0 changes. In: One Semi-Automated Force (One-SAF) 2007 User’s Conference, 2007-08-21. available at http://www.onesaf.net/community/systemdocuments/UsersConference/2.2%20Version_2_AI_Updates.ppt

  6. Franceschini D. OneSAF architecture and integration update. In: One Semi-Automated Force (OneSAF) 2008 User’s Conference, 2008-04-07. available at http://www.onesaf.net/community/systemdocuments/UserConference2008/Presentations/Grand%20Ballroom/7Apr08%20Monday/1310%20Architecture_and_Integration_Update.ppt

  7. Miller C, Wu P, Funk H, et al. A computational approach to etiquette and politeness: an “etiquette engine™” for cultural interaction training. In: 2007 Conference on Behavior Representation in Modeling and Simulation, 2007-07-29. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=07-BRIMS-045.pdf

  8. Wang W, Fowles-Winkler A M, Lorenzen C, et al. Integration of military occupational characteristics into human performance models. In: 2008 Conference on Behavior Representation in Modeling and Simulation, 2008-04-17. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=08-BRIMS-016.pdf

  9. Rasch L T C R.Welcome and opening remarks. In: One Semi-Automated Force (OneSAF) 2008 User’s Conference, 2008-04-07. available at http://www.onesaf.net/community /systemdocuments/UserConference2008/Presentations/Grand%20Ballroom/7Apr08%20Monday/1300%20Kickoff.ppt

  10. Franceschini D, Fernandes M. One semi-automated force (OneSAF) version 3.0 requirements. In: One Semi-Automated Force (OneSAF) 2007 User’s Conference, 2007-08-22. available at http://www.onesaf.net/community /systemdocuments/UserConference2008/Presentations/Grand%20Ballroom/7Apr08%20Monday/1300%20Kickoff.ppt

  11. Smith M, Saavedra M. Data collection. In: One Semi-Automated Force (OneSAF) 2007 User’s Conference, 2007-08-23. available at http://www.onesaf.net/community/systemdocuments/UsersConference/7.2%20DataCollection_Loading_v1.ppt

  12. Rieger L, Monday P, Altan E Z. Use of OneSAF in complex web defense: progress report. In: One Semi-Automated Force (OneSAF) 2008 User’s Conference, 2008-04-09. available at http://www.onesaf.net/community/systemdocuments/User-Conference2008/Presentations/ Grand%20Ballroom/9Apr08%20Wednesday/0900%20Use%20of%20OneSAF%20in% 20 CWD.ppt

  13. Comptdaer J, Chiva E, Delorme S, et al. Multi-scale behavioral models for urban crisis training simulation. In: 2007 Conference on Behavior Representation in Modeling and Simulation, 2007-07-29. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=07-BRIMS-025.pdf

  14. Fan X, Sun S, McNeese M, et al. Extending the recognition-primed decision model to support human-agent collaboration. In: Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems. Utrecht, the Netherlands, 2005. 945-952

  15. Wasfy A, Wasfy T, Noor A. Intelligent virtual environment for process training. Adv Eng Softw, 2004, 35: 337–355

    Article  Google Scholar 

  16. Ly H. OneSAF Validation & Verification. In: One Semi-Automated Force (OneSAF) 2007 User’s Conference, 2008-08-23. available at http://www.onesaf.net/community/ systemdocuments/UsersConference/6.3%20User%20Conf%20OneSAF%20V&V%20Process%20HL.ppt(

  17. Sui Q, Yeo Y, How K. An advanced rule engine for computer generated forces. In: 2008 Conference on Behavior Representation inModeling and Simulation, 2008-04-17. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=08-BRIMS-005.pdf

  18. Zhang H, Li S. The description logic of tasks: from theory to practice (in Chinese). Chinese J Comput, 2006, 29: 488–494

    MathSciNet  Google Scholar 

  19. Phillips G. A view from below the waterline. In: One Semi-Automated Force (OneSAF) 2008 User’s Conference, 2008-04-10. available at http://www.onesaf.net/community/ systemdocuments/UserConference2008/Presentations/Grand%20Ballroom/10Apr08%20Thursday/0930%20Panel-Phillips.ppt

  20. Saavedra M. Models and tools OneSAF V2.0 capabilities. In: One Semi-Automated Force (OneSAF) 2007 User’s Conference, 2007-08-21. available at http://www.onesaf.net/community/systemdocuments/UsersConference/2.1Models&Tools%20Current%20.ppt

  21. Randall T E. Modelling decision-making for entities in a simulated maritime environment. In: 2008 Conference on Behavior Representation in Modeling and Simulation, 2008-04-17. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName= 08-BRIMS-014.pdf

  22. Silvernail L T C T. ACR updates. In: One Semi-Automated Force (OneSAF) 2008 User’s Conference, 2008-04-10. available at http://www.onesaf.net/community/systemdocuments/ UserConference2008/Presentations/Grand%20Ballroom/10Apr08%20Thursday/1100%20ACR.pdf

  23. Wang C, Li Y, Zou B. Introduction to the laboratory of battlefield awareness and ergonomics. available at http://www.chinamil.com.cn/site1/xwpdxw/2007-09/06/content_941751.htm, 2007-09-06

  24. Middleton V E, Mastroianni G R. Implications of human centric modeling for operational analysis. In: 2008 Conference on Behavior Representation in Modeling and Simulation, 2008-04-17. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=08-BRIMS-036.pdf

  25. Barrios-Aranibar D, Alsina P J. Recognizing behaviors patterns in a micro robot soccer game. In: Proceedings of the 5th International Conference on Hybrid Intelligent Systems, San Sebastian, Spain, 2005. 463–468

  26. Ritter F E, Kase S E, Bhandarkar D, et al. dTank updated: exploring moderated behavior in a light-weight synthetic environment. In: 2007 Conference on Behavior Representation in Modeling and Simulation, 2007-03-29. available at http://www.sisostds.org/ conference/download.cfm?Phase_ID=1&FileName=07-BRIMS-014.doc

  27. Zhang H, Li S. Interaction-oriented ability specification and reasoning (in Chinese). J Comput Res Devel, 2006, 48: 1439–1444

    Article  Google Scholar 

  28. Zhang Y, Min F. Application of reinforcement learning based on artificial neural network to robot soccer (in Chinese). J Harbin Inst Tech, 2004, 36: 859–861

    Google Scholar 

  29. Inamura T, Inaba M, Inoue H. PEXIS: Probabilistic experience representation based adaptive interaction system for personal robots. Syst Comput Japan, 2004, 35: 98–109

    Article  Google Scholar 

  30. Evertsz R, Ritter F E, Russell S. Modeling rules of engagement in computer generated forces. In: 2007 Conference on Behavior Representation in Modeling and Simulation, 2007-07-29. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=07-BRIMS-021.pdf

  31. Warwick W, Archer R, Hamilton A, et al. Integrating architectures: dovetailing task network and cognitive models. In: 2008 Conference on Behavior Representation in Modeling and Simulation, 2008-04-17. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=08-BRIMS-030.pdf

  32. Tan K T, Hiles J E. Modeling the human decision making process in maritime interdiction using conceptual blending theory. In: 2008 Conference on Behavior Representation in Modeling and Simulation, 2008-04-17. availble at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=08-BRIMS-008.pdf

  33. Hung V C, Gonzalez A J. Towards a human behavior model based on instincts. In: 2007 Conference on Behavior Representation inModeling and Simulation, 2007-03-29. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=7-BRIMS-012.pdf

  34. Bo T, Yin J, Wang Z, et al. The study of human behavior modeling for air combat of two fighters (in Chinese). J Nat Univ Defense Tech, 2001, 23: 22–26

    Google Scholar 

  35. Ji Y, Massanari R M, Ager J, et al. A fuzzy logic-based computational recognition-primed decision model. Inf Sci, 2007, 177: 4338–4353

    Article  MATH  Google Scholar 

  36. Song Y. Research on agent technology and application in computer generated force. Dissertation for the Doctoral Degree. Harbin: Harbin Engineering University, 2006

    Google Scholar 

  37. Wen Y, Wu T, Zhou C, et al. Describing driving behaviors based on decision optimization model (in Chinese). J Zhejiang Univ (Eng Sci), 2005, 40: 704–728

    Google Scholar 

  38. McNally B H. An approach to human behavior modeling in an air force simulation. In: Proceedings of the 2005 Winter Simulation Conference. Orlando, FL, USA, 2005. 1118–1122

  39. Silverman B G, Johns M, Cornwell J, et al. Human behavior models for agents in simulators and games: part I: enabling science with PMFserv. Pres Teleoperat Virt Envir, 2006, 15: 139–162

    Google Scholar 

  40. Agrawal R, Imielinski T, Swami A. mining association rules between sets of items in large database. In: Proceedings of the ACM SIGMOD Conference on Management of Data. Washington, DC, USA, 1993. 207–216

  41. Han J, Pei J, Yin Y. Mining frequent patterns without candidate generation. In: Proceedings of the ACM SIGMOD Conference on Management of Data. Dallas, Texas, USA, 2000. 1–12

  42. Tung A K H, Lu H, Han J, et al. Efficient mining of intertransaction association rules. IEEE Trans Knowl Data Eng, 2003, 15: 43–56

    Article  Google Scholar 

  43. Alt M J K, Darken C. A reference model of soldier attention and behavior. In: 2008 Conference on Behavior Representation in Modeling and Simulation, 2008-04-17. available at http://www.sisostds.org/ conference/download.cfm?Phase_ID=1&FileName=08-BRIMS-012.pdf

  44. Gombos R. OneSAF assessment for space analysis. In: One Semi-Automated Force (OneSAF) 2008 User’s Conference, 2008-04-08. available at http://www.onesaf.net/community/systemdocuments/UserConference2008/Presentations/Grand%20Ballroom/8Apr08%20Tuesday/1530%20Space%20Analysis.ppt

  45. Stensrud B S, Reece D, Piegdon N. Asymmetric adversary tactics for synthetic training environments. In: 2008 Conference on Behavior Representation in Modeling and Simulation, 2008-04-17. available at http://www.sisostds.org/conference/ download.cfm?Phase_ID=1&FileName=08-BRIMS-042.pdf

  46. Darken C J, Jones B E. Computer graphics-based target detection for synthetic soldiers. In: 2007 Conference on Behavior Representation inModeling and Simulation, 2007-07-29. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName= 07-BRIMS-017.pdf

  47. Wasfy A, Gill W. Critical facilities virtual environment for emergency responders. In: 2007 Conference on Behavior Representation in Modeling and Simulation, 2007-07-29. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName= 07-BRIMS-016.pdf

  48. Jordan B. Representing the contemporary operational environment. In: One Semi-Automated Force (OneSAF) 2008 User’s Conference, 2008-04-08. available at http://www.onesaf.net/community/systemdocuments/UserConference2008/Presentations/Grand%20Ballroom/8Apr08%20Tuesday/0900%20Virtual%20Deployable%20Trainer.ppt

  49. Gluck K, Gunzelmann G, Harris J, et al. Combinatorics meets processing power: large-scale computational resources for BRIMS. In: 2007 Conference on Behavior Representation in Modeling and Simulation, 2007-07-29. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=07-BRIMS-037.pdf

  50. Beltz B C, Keeney M J, Feeney J J. A general framework for cross-cultural interactions in virtual environments. In: 2008 Conference on Behavior Representation inModeling and Simulation, 2008-08-23. available at http://www.sisostds.org/conference/ download.cfm?Phase_ID=1&FileName=08-BRIMS-033.pdf

  51. Ludwig J, Farley A. Using hierarchical dynamic scripting to create adaptive adversaries. In: 2008 Conference on Behavior Representation inModeling and Simulation, 2008-04-17. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=08-BRIMS-004.pdf

  52. Evertsz R, Ritter F E, Busetta P, et al. CoJACK — achieving principled behaviour variation in a moderated cognitive architecture. In: 2008 Conference on Behavior Representation in Modeling and Simulation, 2008-04-17. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=08-BRIMS-025.pdf

  53. Best B J, Dixon K R, Fleetwood D. Modeling an unstructured driving domain: a comparison of two cognitive frameworks. In: 2008 Conference on Behavior Representation in Modeling and Simulation. 2008-04-17. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=08-BRIMS-027.pdf

  54. Gluck K, Gunzelmann G. Approaches to modeling the effects of fatigue on cognitive performance. In: 2008 Conference on Behavior Representation inModeling and Simulation, 2008-04-17. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=08-BRIMS-038.pdf

  55. Solomon S, van Lent M, Core M, et al. A language for modeling cultural norms, biases and stereotypes for human behavior models. In: 2008 Conference on Behavior Representation in Modeling and Simulation, 2008-04-17. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=08-BRIMS-039.pdf

  56. Dimperio E, Gunzelmann G, Harris J. An initial evaluation of a cognitive model of UAV reconnaissance. In: 2008 Conference on Behavior Representation in Modeling and Simulation, 2008-04-17. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1& FileName=08-BRIMS-043.pdf

  57. Mueller S T, Jones M, Minnery B S, et al. The BICA cognitive decathlon: a test suite for biologically-Inspired cognitive agents. In: 2007 Conference on Behavior Representation in Modeling and Simulation, 2007-07-29. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=07-BRIMS-015.doc

  58. Kaup D J, Clarke T L, Oleson R, et al. Crowd dynamics simulation research. In: 2007 Conference on Behavior Representation in Modeling and Simulation, 2007-07-29. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName= 07-BRIMS-018.doc

  59. Martin M. Automation tools for OneSAF behavior verification. In: One Semi-Automated Force (OneSAF) 2008 User’s Conference, 2008-04-09. available at http://www.onesaf.net/community/systemdocuments/UserConference2008/Presentations/Grand%20Ballroom/9Apr08%20Wednesday/1330%20Testing%20Automation%20Tools.pdf

  60. Sukthankar G, Mandel M, Sycara K. Creating physically embodied agents using realistic human motion models. Simul Gam, 2008, 39: 64–82

    Article  Google Scholar 

  61. Fry K, Martin L. Embedded training SWfor a CTA radar. In: One Semi-Automated Force (OneSAF) 2008 User’s Conference, 2008-04-09. available at http://www.onesaf.net/community/systemdocuments/UserConference2008/Presentations/Grand%20Ballroom/9Apr08%20Wednesday/1100%20Embedded%20TRNG%20solution%20on%20CTA%20radar.ppt

  62. Ji Y, Massanari R M, Ager J, et al. A fuzzy logic-based computational recognition-primed decision model. Inf Sci, 2007, 177: 4338–4353

    Article  Google Scholar 

  63. Song Y, Yang Y. Decision-making behavior model of agent-based CGF (in Chinese). J Syst Simul, 2006, 18: 1319–1326

    Google Scholar 

  64. Belyavin A, Ryder C. Modeling and measuring the interaction between experience and the quality of information. In: 2007 Conference on Behavior Representation in Modeling and Simulation, 2007-07-29. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1&FileName=07-BRIMS-029.pdf

  65. Warwick W, Santamaria A. A naturalistic approach to adversarial behavior: modeling the prisoner’s dilemma. In: 2007 Conference on Behavior Representation in Modeling and Simulation, 2007-07-29. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1& FileName=07-BRIMS-036.doc

  66. Becker B C, Gonzalez A J, Garfield K. A mission plan representation for autonomous reasoning of consequences. In: 2007 Conference on Behavior Representation in Modeling and Simulation, 2007-07-29. available at http://www.sisostds.org/conference/download.cfm?Phase_ID=1& FileName=07-BRIMS-024.pdf

  67. Yen S, Lee Y. An efficient data mining approach for discovering interesting knowledge from customer transactions. Exp Syst Appl, 2006, 30: 650–657

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to YunFei Yin.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yin, Y., Gong, G. & Han, L. Theory and techniques of data mining in CGF behavior modeling. Sci. China Inf. Sci. 54, 717–731 (2011). https://doi.org/10.1007/s11432-010-4158-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-010-4158-7

Keywords

Navigation