Machine Learning-Based Data Analysis
Navy SBIR 2020.1 - Topic N201-085 SSP - Mr. Michael Pyryt - [email protected] Opens: January 14, 2020 - Closes: February 26, 2020 (8:00 PM ET)
TECHNOLOGY
AREA(S): Human Systems, Information Systems ACQUISITION
PROGRAM: Strategic Weapons Systems: Trident II D5 and D5 Life Extension (LE)
ACAT IC The technology
within this topic is restricted under the International Traffic in Arms
Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import
of defense-related material and services, including export of sensitive
technical data, or the Export Administration Regulation (EAR), 15 CFR Parts
730-774, which controls dual use items. Offerors must disclose any proposed use
of foreign nationals (FNs), their country(ies) of origin, the type of visa or
work permit possessed, and the statement of work (SOW) tasks intended for
accomplishment by the FN(s) in accordance with section 3.5 of the Announcement.
Offerors are advised foreign nationals proposed to perform on this topic may be
restricted due to the technical data under US Export Control Laws. OBJECTIVE:
Develop, demonstrate and field an algorithm and process for conducting an
automated real-time scan of navigation subsystem data from a database for
disturbances, abnormal trends, and problems that can learn to predict future
disturbances, abnormal trends, and problems, which would be implemented to
provide real-time fault analysis and failure prediction for inertial navigation
systems (INS). DESCRIPTION:
Data analysis of INS performance has historically been human labor intensive
and heavily reliant on the ability of a person or team of people to perform
data analysis in a lab instead of in real- time. Typical real-time monitoring
of INS performance relies upon the system to create discrete error codes based
on physical sensors and conditions. While this approach has been successful in
the past, it has limitations and has an element of human error risk in the
analysis of large data fields. The use of scanning and evaluation tools based
on machine learning (ML) technology would significantly enhance the abilities
of the human analyst to focus on problems identified from synthesized data
rather than sifting thru raw data streams or reacting to one of many hundreds
of discrete alarms that may occur. ML technology has the potential to
dramatically reduce the likelihood of an analyst missing anomalies in the
analysis of data caused by sensors or equipment that have degraded performance,
but not by enough to exceed a human-established threshold or ability for
pattern matching. ML technology should also offer the ability to detect higher
order abnormalities with INS system performance by aggregating a variety of
seemingly unrelated direct sensor error codes. It should offer the ability to
classify errors, and have behavior-based or anomaly-based detection that may
otherwise go undetected. ML should also offer the ability to conduct extensive
data mining to predict a potential system failure and the opportunity to
conduct the analysis in real time on the ship instead of time late. PHASE I:
Conduct a concept development effort of the requirements outlined in the
Description. Identify or develop an analysis methodology or ML technology and
process to conduct an automated scan of various data streams related to INS
that has the ability to learn to predict future disturbances, abnormal trends,
and problems. Conduct feasibility studies of the proposed concept. Develop a
Phase II plan. PHASE II:
Further develop the proposed concept and build a demonstrational prototype
based on the concept. Ensure that the prototype is able to conduct an automated
scan of various data streams of INS-related information using provided data and
has the ability to learn to predict future disturbances, abnormal trends, and
problems. Once the algorithm demonstrates the ability to learn to predict
future problems, ensure that it is able to automate a scan on similar data
streams as was used for the algorithm training. Ensure that the algorithm is
able to report identified anomalies and sufficient background information to
simplify root cause analysis of the subject problem/disturbance by the subject
matter expert (SME). Develop a transition plan that identifies the scope,
effort, and resources required to extend the prototype algorithm and process to
additional analysis tasks, to include training for additional combinations of
data streams to look for different problems or disturbances; and development of
an out-of-band problem detector that could be considered for shipboard
installation for real-time disturbance detection. Provide onsite training of
the algorithm design, operation, maintenance, and interfaces with the host
system. PHASE III
DUAL USE APPLICATIONS: Work with the Navy to implement the analysis toolkit as
described in the Phase III transition plan at a designated Navy lab and as a
SSP alteration (SPALT)� on designated ships. Provide documentation and support
materials to transfer the mature analysis toolkit to Navy SMEs. Ensure
sufficient cyber security and software assurance requirements are met in
accordance with DFARS Clause 252.204-7012, NIST Special Publication 800-171,
NIST Special Publication 800-53, and NIST Special Publication 800-37. In
addition, SPALT requirements to enable the software to be deployed at Navy data
analysis labs and ships must be met. REFERENCES: 1. Witten,
Ian H. and Frank, Eibe. �Data Mining: Practical machine learning tools and
techniques.� Morgan Kaufmann, 2011, p. 664, ISBN 978-0-12-374856-0. ftp://ftp.ingv.it/pub/manuela.sbarra/Data%20Mining%20Practical%20Machine%20Learning%20Tools%20and%20Techniques%20-%20WEKA.pdf 2. MacKay,
David J. C. �Information Theory, Inference, and Learning Algorithms.� Cambridge
University Press: Cambridge, 2003. ISBN 0-521-64298-1. https://www.inference.org.uk/itprnn/book.pdf 3. Duda, Richard
O., Hart, Peter E. and Stork, David G.� �Pattern classification (2nd edition)�
Wiley, New York, ISBN 0-471-05669-3. https://www.researchgate.net/publication/228058014_Pattern_Classification 4. Bishop,
Christopher. �Neural Networks for Pattern Recognition.� Oxford University
Press, 1995. ISBN 0-19-853864-2.� http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.679.1104&rep=rep1&type=pdf 5. Hodge,
V.J. and Austin, J. �A Survey of Outlier Detection Methodologies.� Artificial
Intelligence Review, 22 (2), 2004, pp. 85-126. http://eprints.whiterose.ac.uk/767/1/hodgevj4.pdf KEYWORDS:
Data Analysis; Machine Learning; Pattern Matching; Anomaly Detection;
Classification; Data Mining; Behavior Based Detection
|