Abstract
We investigate a semi-automated identification of technical problems occurred by armed forces weapon systems during mission of war. The proposed methodology is based on a semantic analysis of textual information in reports from soldiers (war logs). Latent semantic indexing (LSI) with non-negative matrix factorization (NMF) as technique from multivariate analysis and linear algebra is used to extract hidden semantic textual patterns from the reports. NMF factorizes the term-by-war log matrix - that consists of weighted term frequencies – into two non-negative matrices. This enables natural parts-based representation of the report information and it leads to an easy evaluation by human experts because human brain also uses parts-based representation. For an improved research and technology planning, the identified technical problems are a valuable source of information. A case study extracts technical problems from military logs of the Afghanistan war. Results are compared to a manual analysis written by journalists of ‘Der Spiegel’.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cai, D., He, X., Wu, X., Han, J.: Non-negative Matrix Factorization on Mani-fold. In: 8th IEEE International Conference on Data Mining, pp. 63–72. IEEE Press, New York (2008)
Paatero, P., Tapper, U.: Positive matrix factorization: A non-negative factor model with optimal utilization of error estimates of data values. Environmetrics 5(2), 111–126 (1994)
Lee, D.D., Seung, H.S.: Learning the parts of objects by non-negative matrix factorization. Nature 401, 788–791 (1999)
Logothetis, N.K., Sheinberg, D.L.: Visual object recognition. Annual Review of Neuroscience 19, 577–621 (1996)
Palmer, S.E.: Hierarchical structure in perceptual representation. Cognitive Psychology 9, 441–474 (1977)
Wachsmuth, E., Oram, M.W., Perrett, D.I.: Recognition of objects and their component parts: Responses of single units in the temporal cortex of the macaque. Cerebral Cortex 4, 509–522 (1994)
Thorleuchter, D., Van den Poel, D., Prinzie, A.: Analyzing existing customers’ websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing. Expert Syst. Appl. 39(3), 2597–2605 (2012)
Lee, D.D., Seung, H.S.: Algorithms for nonnegative matrix factorization. In: Advances in Neural Information Processing Systems, pp. 556–562. MIT Press, Cambridge (2001)
Thorleuchter, D., Van den Poel, D.: Companies Website Optimising concerning Con-sumer’s searching for new Products. In: International Conference on Uncertainty Reasoning and Knowledge Engineering, pp. 40–43. IEEE Press, New York (2011)
Thorleuchter, D., Schulze, J., Van den Poel, D.: Improved Emergency Management by a Loosely Coupled Logistic System. In: Aschenbruck, N., et al. (eds.) Future Security 2012. CCIS, vol. 318, pp. 5–8. Springer, Heidelberg (2012)
Thorleuchter, D., Van den Poel, D.: Predicting E-Commerce Company Success by Mining the Text of Its Publicly-Accessible Website. Expert Syst. Appl. (in press, 2012)
Thorleuchter, D., Herberz, S., Van den Poel, D.: Mining Social Behavior Ideas of Przewalski Horses. In: Wu, Y. (ed.) Advances in Computer, Communication, Control and Automation. LNEE, vol. 121, pp. 649–656. Springer, Heidelberg (2011)
Thorleuchter, D., Van den Poel, D.: Extraction of Ideas from Microsystems Technology. In: Jin, D., Lin, S. (eds.) Advances in CSIE, Vol. 1. AISC, vol. 168, pp. 563–568. Springer, Heidelberg (2012)
Thorleuchter, D., Van den Poel, D.: High Granular Multi-Level-Security Model for Im-proved Usability. In: 2nd International Conference on System science, Engineering design and Manufacturing informatization, pp. 191–194. IEEE Press, New York (2011)
Thorleuchter, D., Weck, G., Van den Poel, D.: Usability Based Modeling for Advanced IT-Security – An Electronic Engineering Approach. In: Jin, D., Lin, S. (eds.) Advances in Mechanical and Electronic Engineering. LNEE, vol. 177, pp. 615–619. Springer, Heidelberg (2012)
Thorleuchter, D., Weck, G., Van den Poel, D.: Granular Deleting in Multi Level Security Models – An Electronic Engineering Approach. In: Jin, D., Lin, S. (eds.) Advances in Mechanical and Electronic Engineering. LNEE, vol. 177, pp. 609–614. Springer, Heidelberg (2012)
Thorleuchter, D., Van den Poel, D.: Using Webcrawling of Publicly-Available Websites to Assess E-Commerce Relationships. In: Annual SRII Global Conference 2012. IEEE Press, New York (in press, 2012)
Thorleuchter, D., Van den Poel, D.: Rapid Scenario Generation with Generic Systems. In: International Conference on Management Sciences and Information Technology 2012. Lecture Notes in Information Technology. IERI, Delaware (in press, 2012)
Gebauer, M., Goetz, J., Hoyng, H., Koelbl, S., Rosenbach, M., Schmitz, G.P.: Die Afghanistan-Protokolle. Der Spiegel 30, 70–86 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Thorleuchter, D., Van den Poel, D. (2012). Using NMF for Analyzing War Logs. In: Aschenbruck, N., Martini, P., Meier, M., Tölle, J. (eds) Future Security. Future Security 2012. Communications in Computer and Information Science, vol 318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33161-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-33161-9_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33160-2
Online ISBN: 978-3-642-33161-9
eBook Packages: Computer ScienceComputer Science (R0)