We can be inspired by biological systems, but that does not mean we should attempt to directly implement the
components from which those biological systems are built. Particularly with cognitive systems, the properties of the
components are submerged by a higher level organization which is not deducible from the components. It may be easier
to use a process of reverse engineering of the product of a biological system to understand its operation, than theorizing
about its operation or attempting to build up the working system from its perceived components. The reverse engineering
of a cognitive system to handle a high level task is described, including the extensions required to an already undirected
structure. It is shown how construction of operators built on demand at a ground state can be used to make up for the lack
of the massively parallel activity of a biological cognitive system.
Intelligent computing has various methods where a structure is set up and activated from outside. The separation of
structure-building and activity into different modes of operation makes the more complex problems unreachable. This
paper discusses a method of operation for intelligent computing where a structure is internally active, dynamically
extensible by the user, and also modifiable by itself, with new elements of structure immediately participating in activity.
Three themes are explored - directed versus undirected structure, a method of self-extension and the operation of free
structure. Existential control and inheritance are shown to be computable within the structure and the need to model
relations on relations for complex applications is discussed.
KEYWORDS: Logic, Modeling and simulation, Cognitive modeling, Head, Spine, Systems modeling, Analog electronics, Camouflage, Opacity, Decision support systems
The modeling of adversarial intent is compared with another area requiring the modeling of human intent - the
representation of knowledge in a contract. The symmetry of the parties to a contract is used as an analog of the
symmetry required to model hostile parties, where each attempts to monitor and predict the actions of the other. The
dynamic construction of undirected, self-extensible structures using associative patterns is described. New methods of
constraint reasoning are introduced to allow it to direct the construction of new structure and to allow free structures to
crawl over other cognitive structures to modify them or to link structures together. The close integration of existence and
time with logic and the use of relations on relations in a multi-layered active structure allow the system to be very much
closer both to the reality of battle and the human intention about which it must infer.
This paper considers the applicability of algorithms, constraint solving and active structure across the spectrum of
complexity of information fusion applications. Information fusion is recast as a cognitive application using dynamic
structure building and constraint reasoning. The similarity between situation awareness and an undirected structure
responding to change is highlighted. The efficiency and speed of operation of cognitive information fusion are touched
on. A tsunami warning system provides an example which involves multiple threat and demonstrates the difference
between segmented algorithms making decisions without context, and the active use of knowledge.
A method for extracting the complete knowledge structure from technical free text is shown, focusing on particular
aspects of the process. Extensions to a basic knowledge formalism necessary to allow building of the complete
activatable structure from information-rich text are described. The relevance of the extensions to aspects of information
mining is covered, including the resources necessary for mining of knowledge structure in minute detail. The paper gives
some examples of the cognitive activity required to automatically read and understand text.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.