Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Using NMF for Analyzing War Logs

  • Conference paper
Future Security (Future Security 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 318))

Included in the following conference series:

Abstract

We investigate a semi-automated identification of technical problems occurred by armed forces weapon systems during mission of war. The proposed methodology is based on a semantic analysis of textual information in reports from soldiers (war logs). Latent semantic indexing (LSI) with non-negative matrix factorization (NMF) as technique from multivariate analysis and linear algebra is used to extract hidden semantic textual patterns from the reports. NMF factorizes the term-by-war log matrix - that consists of weighted term frequencies – into two non-negative matrices. This enables natural parts-based representation of the report information and it leads to an easy evaluation by human experts because human brain also uses parts-based representation. For an improved research and technology planning, the identified technical problems are a valuable source of information. A case study extracts technical problems from military logs of the Afghanistan war. Results are compared to a manual analysis written by journalists of ‘Der Spiegel’.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cai, D., He, X., Wu, X., Han, J.: Non-negative Matrix Factorization on Mani-fold. In: 8th IEEE International Conference on Data Mining, pp. 63–72. IEEE Press, New York (2008)

    Chapter  Google Scholar 

  2. Paatero, P., Tapper, U.: Positive matrix factorization: A non-negative factor model with optimal utilization of error estimates of data values. Environmetrics 5(2), 111–126 (1994)

    Article  Google Scholar 

  3. Lee, D.D., Seung, H.S.: Learning the parts of objects by non-negative matrix factorization. Nature 401, 788–791 (1999)

    Article  Google Scholar 

  4. Logothetis, N.K., Sheinberg, D.L.: Visual object recognition. Annual Review of Neuroscience 19, 577–621 (1996)

    Article  Google Scholar 

  5. Palmer, S.E.: Hierarchical structure in perceptual representation. Cognitive Psychology 9, 441–474 (1977)

    Article  MathSciNet  Google Scholar 

  6. Wachsmuth, E., Oram, M.W., Perrett, D.I.: Recognition of objects and their component parts: Responses of single units in the temporal cortex of the macaque. Cerebral Cortex 4, 509–522 (1994)

    Article  Google Scholar 

  7. Thorleuchter, D., Van den Poel, D., Prinzie, A.: Analyzing existing customers’ websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing. Expert Syst. Appl. 39(3), 2597–2605 (2012)

    Article  Google Scholar 

  8. Lee, D.D., Seung, H.S.: Algorithms for nonnegative matrix factorization. In: Advances in Neural Information Processing Systems, pp. 556–562. MIT Press, Cambridge (2001)

    Google Scholar 

  9. Thorleuchter, D., Van den Poel, D.: Companies Website Optimising concerning Con-sumer’s searching for new Products. In: International Conference on Uncertainty Reasoning and Knowledge Engineering, pp. 40–43. IEEE Press, New York (2011)

    Chapter  Google Scholar 

  10. Thorleuchter, D., Schulze, J., Van den Poel, D.: Improved Emergency Management by a Loosely Coupled Logistic System. In: Aschenbruck, N., et al. (eds.) Future Security 2012. CCIS, vol. 318, pp. 5–8. Springer, Heidelberg (2012)

    Google Scholar 

  11. Thorleuchter, D., Van den Poel, D.: Predicting E-Commerce Company Success by Mining the Text of Its Publicly-Accessible Website. Expert Syst. Appl. (in press, 2012)

    Google Scholar 

  12. Thorleuchter, D., Herberz, S., Van den Poel, D.: Mining Social Behavior Ideas of Przewalski Horses. In: Wu, Y. (ed.) Advances in Computer, Communication, Control and Automation. LNEE, vol. 121, pp. 649–656. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  13. Thorleuchter, D., Van den Poel, D.: Extraction of Ideas from Microsystems Technology. In: Jin, D., Lin, S. (eds.) Advances in CSIE, Vol. 1. AISC, vol. 168, pp. 563–568. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  14. Thorleuchter, D., Van den Poel, D.: High Granular Multi-Level-Security Model for Im-proved Usability. In: 2nd International Conference on System science, Engineering design and Manufacturing informatization, pp. 191–194. IEEE Press, New York (2011)

    Chapter  Google Scholar 

  15. Thorleuchter, D., Weck, G., Van den Poel, D.: Usability Based Modeling for Advanced IT-Security – An Electronic Engineering Approach. In: Jin, D., Lin, S. (eds.) Advances in Mechanical and Electronic Engineering. LNEE, vol. 177, pp. 615–619. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  16. Thorleuchter, D., Weck, G., Van den Poel, D.: Granular Deleting in Multi Level Security Models – An Electronic Engineering Approach. In: Jin, D., Lin, S. (eds.) Advances in Mechanical and Electronic Engineering. LNEE, vol. 177, pp. 609–614. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  17. Thorleuchter, D., Van den Poel, D.: Using Webcrawling of Publicly-Available Websites to Assess E-Commerce Relationships. In: Annual SRII Global Conference 2012. IEEE Press, New York (in press, 2012)

    Google Scholar 

  18. Thorleuchter, D., Van den Poel, D.: Rapid Scenario Generation with Generic Systems. In: International Conference on Management Sciences and Information Technology 2012. Lecture Notes in Information Technology. IERI, Delaware (in press, 2012)

    Google Scholar 

  19. Gebauer, M., Goetz, J., Hoyng, H., Koelbl, S., Rosenbach, M., Schmitz, G.P.: Die Afghanistan-Protokolle. Der Spiegel 30, 70–86 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Thorleuchter, D., Van den Poel, D. (2012). Using NMF for Analyzing War Logs. In: Aschenbruck, N., Martini, P., Meier, M., Tölle, J. (eds) Future Security. Future Security 2012. Communications in Computer and Information Science, vol 318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33161-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33161-9_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33160-2

  • Online ISBN: 978-3-642-33161-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics