<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>GiCoMAF: An Artificial Intelligence Algorithm to Utilize Maps for Operators of Unmanned Aerial Vehicles</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yuval Zak</string-name>
          <email>fzaky@post.bgu.ac.il</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yisrael Parmet</string-name>
          <email>iparmet@bgu.ac.il</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tal Oron-Gilad</string-name>
          <email>orontal@bgu.ac.ilg</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ben-Gurion University of the Negev Beersheva</institution>
          ,
          <country country="IL">Israel</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <fpage>23</fpage>
      <lpage>25</lpage>
      <abstract>
        <p>Unmanned Aerial Vehicles (UAV) operators must maintain high levels of situation awareness on their area of operation. To achieve this, they use the Command and control (C2) map, which are shared among forces, and is regularly overloaded with data that is irrelevant to their mission. UAV operators' missions require distilled information at the right timing. Yet, the existing filtering mechanisms of C2 maps are layer-based and insufficient. We propose a new approach to automatically and dynamically filter information items on the map based on environmental and mission context. To achieve this, we introduce a three-tier artificial intelligence (AI)-based algorithm (GiCoMAF), where we delineate the use of machine learning (ML) models to support UAV missions. For the GiCoMAF development, tagged data was collected in simulated experimental runs with professional UAS operators. Different types of ML models were evaluated and fitted into the algorithm. The models achieved a relatively high accuracy at modeling human preference and area of interest. The approach presented in this study can be further implemented to support other operators in time-critical spatial-temporal problems.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        February 2010, Afghanistan, an American helicopter fired
on three suspected trucks, killing 23 innocent civilians, and
wounding 12. The attack was approved based on
information provided by operators of an unmanned aerial vehicle
(UAV) who did not report the presence of civilians in the
trucks
        <xref ref-type="bibr" rid="ref19">(Filkins 2010)</xref>
        . In a later news report,
        <xref ref-type="bibr" rid="ref35">Shanker and
Richtel (2011)</xref>
        cite Army officials claiming that the leading
cause for the tragic incident was information overload that
lead to poor Situation Awareness (SA). SA can be defined
as one’s perception of the environment around him or her at
any given point in time
        <xref ref-type="bibr" rid="ref16">(Endsley 1988)</xref>
        . Thus, although there
were evidences for children in the trucks, the UAV operators
“did not adequately focus on them amid the swirl of data”.
      </p>
      <p>
        The use of UAVs in the military domain is increasing, due
to their ability to perform missions without risking human
operators
        <xref ref-type="bibr" rid="ref25">(Izzetoglu et al. 2015)</xref>
        . UAV operators monitor the
payload, often a camera sending video feed, in various
missions
        <xref ref-type="bibr" rid="ref29">(e.g., reconnaissance, guidance of forces; Marusich et
al. 2016)</xref>
        , in addition to multiple tasks
        <xref ref-type="bibr" rid="ref18">(e.g., navigation and
orientation, flying the vehicle, radio communication;
Everaerts 2008)</xref>
        . A command and control (C2) map, often in a
different display, is used for orienting and making sense of
the payload’s outputs. The C2 map shows mission critical
information and intelligence-related information items such
as markings of potential targets, location of allied forces and
so forth. A cognitive work analysis of UAV operators
workflows, emphasizes frequent and continuous use of the C2
map during missions
        <xref ref-type="bibr" rid="ref5">(Back et al. 2019)</xref>
        . The C2 map,
however, being shared among military elements, is showcasing
information that is irrelevant to the UAV operators. It has
been indicated
        <xref ref-type="bibr" rid="ref17 ref34">(Endsley 2000; Sandom 2000)</xref>
        that
information overload is a contributor to poor Situation Awareness
high workload and low overall performance. According to
        <xref ref-type="bibr" rid="ref5">Back et al. (2019)</xref>
        , the information clutter in C2 maps may
often lead operators to neglect the map, and rely solely on
the payload’s feed, and may also lead to fatal results as the
tragic incident of February 2010. Answering
        <xref ref-type="bibr" rid="ref1">Adams’ (2015</xref>
        )
call for incorporating human factors limitations in the design
of UAVs, it serves as an incentive to address the information
overload problem. Some advanced solutions for improving
UAV operators’ SA had been suggested, e.g. using synthetic
vision
        <xref ref-type="bibr" rid="ref10">(Calhoun et al. 2005)</xref>
        . Such solutions, however, may
require costly adjustments of the vehicle’s payload.
      </p>
      <p>
        For decluttering, most C2 maps are based on information
layers. Layers can manually or automatically (via a set of
rules) be hidden, shown or dimmed. The layer mechanism
reduces the information overload problem by hiding or
dimming layers, yet, at the same time, it may cause information
deprivation due to an inherent tradeoff; any action performed
on a layer affects it entirely. Thus, it is impossible to hide
irrelevant information items in a layer, while showing
relevant ones of the same layer. Therefore, aspiring to solve the
C2 map information overload tradeoff,
        <xref ref-type="bibr" rid="ref39">Zak, Oron-Gilad, and
Parmet (2018</xref>
        ) called for ’breaking’ the layer mechanism
and addressing the information at the information items’
level. Thus, instead of filtering layers of information items,
the filter will handle each information item individually (as
illustrated in Figure 1). This can be achieved by an algorithm
that dynamically and automatically filters information items
on the C2 map by their importance and relevance to UAV
operator’s current mission. Automating this process,
however, is challenging as it can inadvertently reduce operators’
SA and performance, especially regarding items chosen not
to be shown
        <xref ref-type="bibr" rid="ref14">(Endsley and Kiris 1995)</xref>
        .
      </p>
      <p>
        Two guidelines led the development of the automatic and
dynamic algorithm. First, working at an information item
level requires advanced techniques. Those techniques rise
from the artificial intelligence (AI) domain. Second, as the
problem is both spatial and temporal, the solution should
adopt perceptual concepts inspired by
        <xref ref-type="bibr" rid="ref21">Gibson and Crooks’
(1938)</xref>
        field of safe travel. The field of safe travel, was
defined as the spatial field where it was safe to steer a car. It
was dependent on driver state, vehicle and environment, and
it was constantly changing as the vehicle moved and the
context of driving changed. Gibson and Crooks referred to the
field’s intuitiveness as affordance. In Section 2 we use these
guidelines for the development of the GiCoMAF (Gibsonian
Command and Control Map AI Filter algorithm) but first,
in Sections 1.1 and 1.2, we review Machine Learning (ML)
models that were considered for the AI implementation and
delineate the research goals.
1.1
      </p>
    </sec>
    <sec id="sec-2">
      <title>Machine-Learning (ML) Models for C2</title>
    </sec>
    <sec id="sec-3">
      <title>Systems</title>
      <p>
        The military domain is seeking for techniques to
incorporate AI into C2 systems and Machine Learning (ML)
models have been used in UAV, GIS and C2 domains
        <xref ref-type="bibr" rid="ref12 ref31 ref33 ref4 ref6">(e.g. Azak
and Bayrak 2008; Bao 2016; Choi and Cha 2019;
Dzieciuch et al. 2017; Noh and Jeong 2010; Rapaport 2015)</xref>
        , but
to our knowledge, not as the interface between the C2 map
and the operators. For our research, we looked for models
that can be used for classification (to classify information
item’s importance) or logistic regression (for defining the
field of relevance, as detailed later). Table 1 describes four
ML techniques, suitable for classification and regression and
therefore applicable towards GiCoMAF development.
      </p>
      <p>
        There are other ML models that can be used for the
purpose of this study. For example, Long Short-Term
Memory (LSTM), is a common deep learning technique for time
series data, that can be used for multi-stream data as well
        <xref ref-type="bibr" rid="ref12 ref7 ref8">(Behera, Keidel, and Debnath 2019; Bouaziz et al. 2017)</xref>
        .
Given that each information item in the C2 map can be
perceived as a standalone time series, this model was
considered for this study too. However, the exact number of
parallel streams (i.e. the number of the information items) is
constantly changing as more information items are added to
the map. Therefore, the LSTM model was neglected.
1.2
      </p>
    </sec>
    <sec id="sec-4">
      <title>Research Goals</title>
      <p>Acknowledging UAV operators’ C2 map needs, this study
aims to introduce the GiCoMAF solution for distilling the
information presented on the map to show mission relevant
important information items, while minimizing or hiding
less important or distracting items. The first goal is to
develop an algorithm that automatically and dynamically
fil</p>
    </sec>
    <sec id="sec-5">
      <title>Model</title>
      <sec id="sec-5-1">
        <title>Lasso Regression (LR)</title>
      </sec>
      <sec id="sec-5-2">
        <title>Neural</title>
      </sec>
      <sec id="sec-5-3">
        <title>Networks (NN)</title>
      </sec>
      <sec id="sec-5-4">
        <title>Random</title>
      </sec>
      <sec id="sec-5-5">
        <title>Forest (RF)</title>
      </sec>
      <sec id="sec-5-6">
        <title>XGBoost</title>
        <p>ters the information items on the C2 map. The automatic part
of the algorithm, addresses the filtering at the information
items’ level. The dynamic part of the algorithm addresses
the evolving environmental context of the area of operation.
The second goal is to delineate the use of ML models in
the construction of the algorithm by demonstrating how its
construction can be achieved using ML models. This goal is
attained using importance and relevance labelled data
collected empirically from UAV operators. Their inputs enable
the ML models to learn the operators’ contextual
information needs, and to showcase the algorithm’s feasibility. This
paper describes the process of developing the GiCoMAF
algorithm using ML models. A third goal, not described in this
paper, is to evaluate the update rate of the GiCoMAF
empirically, exploring its effect on operators’ mental workload,
situation awareness and perception of the experience.</p>
        <p>In the following Sections the definition of the GiCoMAF
algorithm is first outlined. Then, the process of acquiring the
ML models constructing the algorithm’s tiers is detailed,
including the data collection, manipulation, and models
evaluation. Lastly, the discussion Section discusses how to
combine all tiers into an operating filter algorithm.</p>
        <p>2</p>
        <sec id="sec-5-6-1">
          <title>Developing GiCoMAF</title>
          <p>The GiCoMAF – Gibsonian Command and Control Map AI
Filter algorithm, consists of two tiers, each answers a
different research question. The integration of the tiers creates
the filter rule, and incorporates the outcomes of these
questions into the workflow of the operators. Tier I aims at the
information item level, and answers the question what is the
perceived importance of each information item? Tier II aims
at the map as a whole, and answers the question how can the
operator’s area of interest be modeled on the map? Tier III
aims at the dynamicity property of the algorithm, and
answers the question how often should the automatic filter be
updated?</p>
          <p>
            The construction of the GiCoMAF is illustrated in
Figure 2. The distinction between Tiers I and II is
important. Tier I predicts each information item’s importance. The
scale is inclusive, i.e., it provides an indication of how
important it is to show the information item on the map, and an
indication of how important it is not to show the item. The
incentive behind this logic is that some non-important
information items may be harmless and operators will be
oblivious to their presence, while others may be disturbing.
Moreover, predicted information item’s importance should not be
handled in the same way throughout the map space, and this
is where Tier II comes into play. Consider an information
item with a neutral predicted importance, i.e., not important
but not disturbing. While the item per se is not considered
disturbing, possibly, if it is within the operators’ area of
interest, they may be more sensitive to disruptions, and the
item can inadvertently cause clutter or quickly become
disturbing. To avoid such cases, it may be better to filter out the
item. Outside the area of interest, however, leaving a neutral
item may be a good strategy, as its importance may rise as
the mission evolves. Hence non-important items for the
immediate context, may be valuable to foresee future
evolvement of the situation and prepare for it. Therefore, Tier I of
predicting the information items’ importance is not enough,
and the algorithm should model the operators’ area of
interest as derived in Tier II. The final decision rule, hence, is
a combination of these two tiers. Tier I and II of the
algorithm are based on ML models, thus, by learning examples
from UAV operators, the algorithm predicts and executes an
automatic filter for new operators and in new unknown
scenarios. ML models require tagged examples to be learned
from. Therefore, an experiment which emulated the work
of UAV operator in operational scenarios was designed and
conducted to collect tagged data from UAV operators
            <xref ref-type="bibr" rid="ref12 ref40 ref41 ref5 ref7">(Zak,
Parmet, and Oron-Gilad 2019a, 2019b)</xref>
            . Tier III defines the
rate at which the filter rule of Tiers I and II should be
applied. At this stage of development Tier III cannot be based
on ML models, and represent a pure cognitive issue. Since
the scope of this study was to delineate the construction of
the GiCoMAF algorithm using ML models, the process of
studying the cognitive effect of various filter update rates
and setting the optimal rate is due to future research.
2.1
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Tier I – Information Item Importance</title>
      <p>Tier I aims to model information items’ importance as
perceived by the operators. An information item’s importance
may vary based on environmental context, mission, and
characteristics. Generally, operators want important
information items to be shown on the map. If an information
item is not perceived as important, its presence can be
disturbing and then operators would prefer that it will not to be
shown, or not disturbing and operators may be impartial to
its presence on the map. Therefore, Tier I attempts to
predict and classify information items’ importance level, into
a four tics scale, based on the context: Positive importance
represents important (1) and very important (2)
information items. Zero importance represent non-important
information items, that operators have no preference to whether
they should be shown or not. Negative importance represents
information items that disturb and distract operators from
their mission context.</p>
      <p>The prediction is done using a ML model. The model,
once trained, has the ability to deduce item importance from
insightful environmental and mission related measures that
describe the context. For example, the average distance of
an information item from the UAV payload may describe
its mission related context. The density of information items
around an information item, for example, may reflect the
environmental context. Higher density raises the probability of
some operational event happening at that location. A ML
model can find the relationship between an information item
and the route, and then predict the importance of the
information item; and it can determine that as the environment is
denser, the probability of showing non-important items
increases. These examples of relations between derived
measures like distance and density and the predicted value are
given for simplifying purposes, and the real relationship that
emerge from the ML model may be more complicated.
Furthermore, selecting the most suitable ML model (Table 1)
was determined empirically as detailed in Section 3.
2.2</p>
    </sec>
    <sec id="sec-7">
      <title>Tier II – Operator’s Field of Relevance</title>
      <p>
        Tier II of the algorithm addresses the areas of interest for the
operators in the environment. It is essentially a spatial
problem that can be represented using geospatial measures on the
map (e.g. polygons, heatmaps, etc.). The ’area of interest’ is
not necessarily a singular area, and can be phrased as ’areas
of interest’, where each area has a different level of interest.
For example, Figure 3 illustrates multilevel areas of interest,
where in the center of the polygons occurs the mission, and
therefore the smallest area around this focus has the highest
interest. The surroundings do withhold interest to the
operator since they may affect the mission’s center. Their
relevance decreases as they get farther than the mission’s center.
The ’area of interest’ is modeled using the concept of field
of relevance, an adaptation of
        <xref ref-type="bibr" rid="ref21">Gibson and Crooks (1938)</xref>
        .
The field of relevance depicts operators’ areas of interest
based on the environment, mission, operators’ behavior, etc.
Moreover, it corresponds with the affordance property as the
field of relevance highlights areas that are intuitively more
focused upon by the operators. Due to the probabilistic
characteristic of ML models, it was decided to adopt the quality
map approach of
        <xref ref-type="bibr" rid="ref30">Morse, Engh, and Goodrich 2010</xref>
        , and to
model the field of relevance as a pseudo-Gaussian heatmap,
where each spatial element on the map gets a value between
0 (no relevance) and 1 (high relevance) corresponding to the
probability of that spatial point to be in the operator’s area
of interest.
      </p>
      <p>Similar to Tier I, prediction in this tier is done using a ML
model, deducing from insightful environmental and mission
related measures that describe the context. In this tier those
measures are in respect to a spatial element (e.g., a square
of 10 meters2), without relating to any particular
information item within the area of interest. For example, a mission
related measure can be the average time a spatial element
is in the UAV payload’s field of view, assuming higher
average time may indicate higher relevance of that element.
An environmental measure can be the density of
information items around a certain element. Assuming higher
density around a spatial element indicates upon the probability
of some operational event happening at that location, and in
turn higher relevance. Similar to Tier I, the examples of
relations are for simplifying purposes, and the exact ML model
(Table 1) was determined through an empirical process
detailed in Section 3.</p>
      <sec id="sec-7-1">
        <title>3 Constructing the GiCoMAF</title>
        <p>In the construction of the filter, an experiment emulating
the work of UAV operators in the military domain was
executed. Participants, professional military UAV operators,
were asked to perform a mission of supporting a ground
battalion in urban battlefield scenarios. The data collected using
the feedbacks they provided during and after the experiment
was used to construct the ML models of Tiers I and II. The
process is illustrated in Figure 2. The research was approved
by the Institutional Review Board at Ben Gurion University.
Informed consent was obtained from each participant.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>3.1 Data Tagging Experiment</title>
      <p>Data for Tiers I and II were collected in a set of
experimental runs, detailed in Zak, Parmet, and Oron-Gilad 2019a and
2019b. The experiment aimed to emulate the work of UAV
operator in the military domain. Using a designated
system developed for this task (UCES – UAV Command and
Control Experiment System), a battlefield scenario was
developed by subject matter experts with a UAV mission to
assist a ground battalion in conquering an urban
neighborhood. The ‘five paragraph order’, a common military
standard of writing a fight plan of the mission, was outlined on
the C2 map (Figure 4) and programmed in the VR-Forces
simulation engine. The mission was 12 minutes long,
representing a sequence of events that in real life settings may
take several hours. Thirteen professional military UAV
operators performed a reconnaissance mission as if they were
acting in a real-world battlefield. The UCES allowed them
to control the vehicle’s payload, observe the battlefield from
an aerial point of view, and get real-time information from a
C2 map. Occasionally at specific points, the scenario paused,
and a scoring session had started. They were asked to label
two types of information using the UCES map: tagging
individual information items’ importance; and drawing their
current contextual area of interest as polygons on the map.
There were 88 scoring sessions in total, an average of 6.5
sessions for each experimental run. The data collected from
the runs was put together into two datasets. The dataset
containing the information item’s importance tags was the
input for Tier I, and the dataset containing the area of interest
polygons was the input for Tier II. Then, ML models for the
two tiers were developed. The processes and outcomes are
detailed in Sections 3.2 and 3.3.
3.2</p>
    </sec>
    <sec id="sec-9">
      <title>Tier I ML Model – Information Items’</title>
    </sec>
    <sec id="sec-10">
      <title>Importance</title>
      <p>The data collected in the experiment was divided into two
tables. The first table was an event diary, where each row
represents one event in one experimental run (e.g., UAV
movement, forces movement, cross-fire event, etc.). This
table contained approximately 90,000 rows. The second table
is a tagging table, where each row represents an information
item in a scoring session in an experimental run and its
perceived importance as was reported by the participant. This
table contained 1,203 rows, where each information item has
inherent attributes like its location, type, the time it was last
modified, etc. However, item attributes are insufficient for
introducing mission context to the ML models. Therefore,
the two tables had to be joined into one training dataset. For
that, the event diary had to be manipulated into insightful
variables. Thirty-five derived measures were calculated from
the event diary to describe the environment and the mission.
The objective of the ML model was to classify information
items’ importance. Misclassifying a non-important
information item as important does not have the same implication as
misclassifying an important information item as disturbing.
Therefore, the error function could not be merely
classification accuracy, and weights were given as penalty for
misclassifications based on the sensitivity and specificity of the
misclassification.</p>
      <p>
        All four techniques described in Table 1 were tested in
a classification configuration. Model technique parameters
were optimized using the k-fold cross validation technique,
where k = 10. During this process, 22,945 models were
built in total for all four techniques. Then, data were divided
by participant; 10 randomly chosen participants as the
trainLR
NN
RF
XGBoost
ing set and the 3 remaining as the validation set. The final
model for each technique was built using the derived
optimal parameters set. Figure 5 illustrates the results for two
types of errors: (a) weighted error, the average k-fold result
for the optimal parameters set, the training set, and the
validation set; and (b) sign error (percent of misclassifications
of important/very important as disturbing, and vice versa),
for all three sets. From Figure 5 it is evident that RF shows
patterns of overfitting, and multinomial LR and NN perform
better than XGBoost in terms of weighted error. However,
in terms of sign error XGBoost outperforms the others.
Figure 6 delves into the differences among the models by
illustrating a multiclass receiver operating characteristic (ROC)
graphs
        <xref ref-type="bibr" rid="ref24">(Hand and Till 2001)</xref>
        on the validation set. In this
figure, each line represents the ROC of the comparison of
two possible values, and the area under the curve (AUC) is
the average of all AUCs. It can explain the differences
between weighted error and sign error patterns of the NN and
LR. As seen in the plot, NN and LR have almost no
separation between the predicted values, probably because
misclassifying very important information items as disturbing
had the highest penalty. Thus, both models tend to classify
all information items as ‘very important’. Moreover,
according to Figure 6, RF had slightly better AUC, although
Figure 5 suggests it was overfitting. A third analysis to evaluate
the models’ performance was to look at how each model
was certain in the prediction of the validation set. In the
prediction process, each model provides a probability for each
level, where the predicted value is set by choosing the level
with the highest probability. It is expected that a more
‘decisive’ model would provide relatively high probability for the
predicted value and relatively low probabilities for the other
values. The entropy for that prediction, defined by the
formula Pi pilogapi (where pi is the probability of
predicting a given value i, and a is the number of possible values),
would then be close to zero. The result of the entropy
analysis as given in Table 2, show the average entropy for each
model and predicted value. It is evident from Table 2 that
LR assigns only the value ‘2’, and NN only the values ‘1’
and ‘2’. All four models have relatively high entropy scores,
sometimes close to one, indicating that the models’
classification decisions, based on the levels’ probabilities, are hung
on the fluctuation of an . I.e., and all four models are not
very decisive. The only exception is the RF model, which
had a relatively lower entropy, although still closer to one
than zero.
The objective of the model was to define the field of
relevance by predicting the probability of each point on the map
to be in the area of interest. To facilitate the model
construction, the C2 map was divided into a grid of cells, where each
cell represents an area of 25x25 meters on the ground, 9,016
cells in total. Each row in the dataset represents one cell in
a scoring session of an experimental run, with the predicted
label of (1) if the cell was in the drawn area of interest in
that scoring session, and (0) otherwise. The derived
measures were calculated with respect to each cell (e.g. the
average distance of a cell from the UAV route, etc.).
      </p>
      <p>Similar to Tier I, the data was divided into two tables; an
event diary and a table with the reported feedback from the
participants. In this tier, each row in the reported feedback
table represents coordinates of the area of interest’s
polygon of a scoring session in an experimental run. Each
scoring session consisted of one polygon. Subtracting two cases
where the participant forgot to draw an area of interest, this
table had 86 rows. Also, the events diary was manipulated
into 20 derived measures.</p>
      <p>The objective of the model was to define the field of
relevance by predicting the probability of each point on the map
to be in the area of interest. To facilitate the model
construction, the map was divided into a grid of cells, where each
cell represents an area of 25x25 meters on the ground, 9,016
cells in total. Thus, each row in the dataset represents a cell
in a scoring session of an experimental run, with the
predicted label of (1) if the cell was in the drawn area of
interest in that scoring session, and (0) otherwise. The derived
measures were calculated with respect to each cell (e.g. the
average distance of a cell from the UAV route, etc.).</p>
      <p>The same four ML techniques that were used in Tier I
were used in the regression configuration, but the predicted
value was logistic (a number in [0,1]). Model performance
was measured using root mean square error (RMSE). Due to
the large scale of data and computing resource limitations,
408 models were built in total in four k-fold cross
validation processes, where k = 3. Figure 7 illustrates the
average k-fold RMSE results for the optimal parameters set, and
the RMSE of the training and validation sets. While
logistic LR and NN have better results on the validation set in
terms of RMSE, both XGBoost and RF perform better on
both the training set and k-fold results. Figure 8 delves into
the results and illustrates a ’rotated confusion matrix’. The
x-axis represents the predicted value, binned in intervals of
0.01. The y-axis represents the average original value of the
rows corresponding to the bins of the x-axis. The size of the
points represents the relative number of records in each bin.
A perfect model would provide points aligning with the
diagonal of the plot. According to Figure 8, both LR and NN
collapse and do not provide good differentiation. RF
provides something close to binary results, which may conflict
with the field of relevance concept. Therefore, although not
perfectly aligning with the diagonal, XGBoost performs
better than the other three models. An illustration of XGBoost’s
performance relative to the runner-up RF model, in two
scoring session of two different participants is given in Figure 9.
Figure 9 demonstrates how each operator marked the field
of relevance, at the same stage showing that the structure
of the field of relevance depends on the environment, the
mission, and operators’ individual characteristics and
preferences. The XGBoost model seems to handle these
characteristics well.</p>
      <p>4</p>
      <sec id="sec-10-1">
        <title>Discussion</title>
        <p>
          Operators of UAVs work in uncertain and dynamic
environments. Their main focus is on managing their vehicle’s
payload (e.g., camera video-feed) while they are required to
maintain orientation and awareness to their current location
and its surroundings, and plan ahead. In order to develop
the essential SA, they continuously and constantly interact
with a C2 map (see
          <xref ref-type="bibr" rid="ref5">Back et al. (2019)</xref>
          for a Cognitive Work
Analysis). The map, is often overloaded with data that is
irrelevant to their mission, and like the operational
environment things change rapidly. The existing layer-based map
filter mechanism causes a tradeoff dilemma for the
operator –showing an entire layer with its relevant and irrelevant
information, or hiding an entire layer and losing important
information. Furthermore, as noted in Back et al. the existing
filtering mechanisms require operators to manually interact
with the interface, highlight or hide layers of information at
the busiest times of their mission. Thus, currently, obtaining
information from C2 maps pose high demands on operators,
and therefore, they often cope with impaired SA. This study
proposes a solution to dynamically and automatically adjust
the C2 map display to operators’ needs by introducing an
AI-based dynamic and automatic algorithm that filters the
information on the C2 map at the individual items level (as
opposed to layers), as described in section 2, and laying the
foundation for the algorithm by delineating the use of ML
models in its construction as detailed in Figure 2.
        </p>
        <p>The data tagging experiment was designed to collect
labelled data towards the construction of the ML models of
Tiers I and II; predicting information items’ importance and
predicting the field of relevance, respectively. Using the
collected data, four different models were optimized and
developed for each tier. In Tier I both XGBoost and RF had good
results on the validation set, with RF on the upper hand.</p>
        <p>
          However, since the RF had extremely low training error, for
both error types, it may be overfitted. Further study on the
effects of each model on UAV operators’ mission performance
is needed to examine if the effect of overfitting is
negligible. Therefore, to be cautious, the XGBoost model was
chosen for further development. The XGBoost model, however,
had an accuracy sign error of 25.9%, and its decisions were
hanging on the thread of an (Table 2). This magnitude of
the error is reasonable when modeling human preferences
and performance
          <xref ref-type="bibr" rid="ref2 ref28 ref4 ref6">(as seen in previous studies, e.g. Agichtein
et al. 2016; Guimera` et al. 2012; Liu, Bian, and Agichtein
2008)</xref>
          , especially when having a limited number of
observations. The XGBoost results of Tier II were visually evaluated
and provided the best and most accurate pseudo-Gaussian
heatmap for the field of relevance. as illustrated in Figures 8
and 9. It should be noted that accuracy can be further
improved by testing other ML models and parameters. Indeed,
due to resource limitations, not all suitable models could be
tested. Future study can attempt to improve the results of this
study by applying additional ML models and techniques.
        </p>
        <p>The two tiers delineate the use of ML models in the
GiCoMAF algorithm . Yet, is not clear cut how to combine Tiers
I and II into the GiCoMAF algorithm. Several options for
how the tier combination protocols are being discussed in
the following section.
4.1</p>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>Putting It All Together – Combining Tiers I and II</title>
      <p>The exact combination of Tiers I and II into the GiCoMAF
algorithm may depend on the mission, the environment, and
even the organization that the operators are part of. This
section suggests three possible combination approaches;
however, the final setup is not limited to these approaches and
each organization/user/system case may dictate the
development of a tailored solution. These approaches provide a
show/no-show decision rule based on relevance and
importance thresholds. The optimal approach used in the
algorithm, as well as its thresholds, should be continuously
evaluated through a process of experiments.</p>
      <p>Positive Correlation – This approach assumes that there
should be a positive correlation between the field of
relevance and the information density. Thus, the more relevant
a spatial element is, the more information should be
presented around it. To avoid distraction, the farther away from
the spatial element, the less information should be shown.
Figure 10a illustrates this approach where there is a negative
relation between the field of relevance and the information
items’ importance. In order to use this approach, an
adaptive show/no-show threshold should be set based on
information items’ importance, where the threshold is rather low
at points with high relevance (implying more information
items would be shown), and rather high at points with low
relevance (only very important information items would be
shown).</p>
      <p>Negative Correlation – In contrast to the positive
correlation approach, this approach assumes that there should be
a negative correlation between the field of relevance and
information density. I.e., the more relevant a spatial element
is, the more attention operators direct to it, and therefore
fewer information items should be shown to avoid
disruption. Thus, as illustrated in Figure 10b, there should be a
negative relation between the field of relevance and
information items’ importance, in similar but opposite approach
to the relation described in the positive correlation.</p>
      <p>Binary Relevance Decision – This approach assumes that
only important information items should be shown on the
map, and only in areas which are currently most relevant to
the operators. Therefore, there are only two constant
thresholds in the algorithm – one to decide the minimum
importance an information item should have in order to be shown,
and one to decide the minimum relative relevance a spatial
point should have in order to set the importance threshold
into motion. Figure 10c illustrates the approach.</p>
      <p>For a further study, we propose to examine these three
approaches and choose the fittest approach for the context
that was addressed in this paper (i.e., the same mission type
and profile of participants). For that a new multistage
scenario similar in nature to the experimental scenarios detailed
in this paper is required. Using the ML models developed
in Tiers I and II, each scenario can be run in one of the
three combination approaches, as well as running with no
filter at all. In the first experiment, participants will be
introduced to all of the approaches and different thresholds setups
would be tested. Then, using the optimal threshold for each
approach, new operators would participate in a two-stages
crossover experiment with eight possible treatments – the
three combination approaches and no filter at all.</p>
      <sec id="sec-11-1">
        <title>5 Conclusions</title>
        <p>This study aimed to introduce a solution to the information
overload of C2 maps used by UAV operators. By solving
operators’ need for distilled information at the right time and in
the right place, it is expected that operators will benefit more
from the C2 map at lower efforts, and overall mission
performance will improve. The study had met its goals. First,
a solution was achieved by introducing the three-tier
Gibsonian Command and Control Map AI Filter algorithm
(GiCoMAF). Then, ML models were developed and evaluated
using tagged data collected in an experiment. The results of the
experiment are encouraging. The ML models that emerged
from the first experiment were satisfying, and indicated high
accuracy and usability of the algorithm, a step towards a
solution to the information overload problem, and high
workload of UAV operators. The combination of the tiers into a
single algorithm is yet to be fully defined, and should be
determined by an additional set of experiments we recommend
performing in future studies.</p>
        <p>The contribution of this study lays in various aspects.
First, this study targets a long-neglected field of improving
the use of C2 maps by operators. Second, by using ML
models in the construction of the GiCoMAF algorithm, this study
utilizes AI concepts and techniques to lay the foundation of
an algorithm that is targeted for improving human
performance and human cognitive aspects of workload and SA.
And third, successful construction of the algorithm can
improve mission performance and enhance the cognitive
abilities of operators to perform spatial-temporal tasks beyond
the UAV domain. Algorithms of this form can be further
implemented in any domains where an overloaded spatial and
temporal information has to be filtered, e.g., emergency
dispatching systems, information guided surgeries, search and
rescue missions, air traffic control, etc.</p>
        <p>6</p>
      </sec>
      <sec id="sec-11-2">
        <title>Acknowledgments</title>
        <p>This research is partially funded by the ”Negev”
scholarship, and by the George Shrut Chair in Human Performance
Management at Ben-Gurion University of the Negev.
Corresponding author – Yuval Zak</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Adams</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          <year>2015</year>
          .
          <article-title>Cognitive Task Analysis for Unmanned Aerial System Design</article-title>
          .
          <source>In Handbook of Unmanned Aerial Vehicles</source>
          . Dordrecht: Springer Netherlands.
          <volume>2425</volume>
          -
          <fpage>2441</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Agichtein</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Brill</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Dumais</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ; and Ragno,
          <string-name>
            <surname>R.</surname>
          </string-name>
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>Learning User Interaction Models for Predicting Web Search Result Preferences</article-title>
          .
          <source>In Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '06</source>
          . Seattle, Washington, USA: ACM.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Azak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Bayrak</surname>
            ,
            <given-names>A. E.</given-names>
          </string-name>
          <year>2008</year>
          .
          <article-title>A new approach for Threat Evaluation and Weapon Assignment problem, hybrid learning with multi-agent coordination</article-title>
          .
          <source>In 2008 23rd International Symposium on Computer and Information Sciences</source>
          ,
          <string-name>
            <surname>ISCIS</surname>
          </string-name>
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Back</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Zak</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Parmet</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Oron-Gilad</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <year>2019</year>
          .
          <article-title>Using Cognitive Work Analysis to Understand UAS Operators' Map Display Needs</article-title>
          . Submitted to Requirements Engineering,
          <year>April 2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Bao</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <year>2016</year>
          .
          <article-title>Swimming In Sensors , Drowning In Data - Big Data Analytics For Military Intelligence</article-title>
          . Pointer,
          <source>Journal of the Singapore Armed Forces</source>
          <volume>42</volume>
          (
          <issue>1</issue>
          ):
          <fpage>51</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Behera</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Keidel</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Debnath</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <year>2019</year>
          .
          <article-title>Contextdriven Multi-stream LSTM (M-LSTM) for Recognizing FineGrained Activity of Drivers</article-title>
          , volume
          <volume>11269</volume>
          LNCS. Springer International Publishing.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Bouaziz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Morchid</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Dufour</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ; Linare`s, G.; and
          <string-name>
            <surname>De Mori</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <year>2017</year>
          .
          <article-title>Parallel Long Short-Term Memory for multi-stream classification</article-title>
          .
          <source>2016 IEEE Workshop on Spoken Language Technology, SLT 2016 - Proceedings 218-223.</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Breiman</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <year>2001</year>
          .
          <string-name>
            <given-names>Random</given-names>
            <surname>Forests</surname>
          </string-name>
          .
          <source>Machine Learning</source>
          <volume>45</volume>
          (
          <issue>1</issue>
          ):
          <fpage>5</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Calhoun</surname>
            ,
            <given-names>G. L.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Draper</surname>
            ,
            <given-names>M. H.</given-names>
          </string-name>
          ; Abernathy,
          <string-name>
            <given-names>M. F.</given-names>
            ;
            <surname>Patzek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ; and
            <surname>Delgado</surname>
          </string-name>
          ,
          <string-name>
            <surname>F.</surname>
          </string-name>
          <year>2005</year>
          .
          <article-title>Synthetic vision system for improving unmanned aerial vehicle operator</article-title>
          .
          <source>In Proc. SPIE 5802, Enhanced and Synthetic Vision</source>
          <year>2005</year>
          , volume
          <volume>5802</volume>
          ,
          <fpage>219</fpage>
          -
          <lpage>230</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Guestrin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <year>2016</year>
          .
          <article-title>XGBoost: A Scalable Tree Boosting System</article-title>
          .
          <source>In KDD '16 Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</source>
          ,
          <fpage>785</fpage>
          -
          <lpage>794</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Choi</surname>
            ,
            <given-names>S. Y.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Cha</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <year>2019</year>
          .
          <article-title>Unmanned aerial vehicles using machine learning for autonomous flight; state-of-theart</article-title>
          .
          <source>Advanced Robotics</source>
          <volume>33</volume>
          (
          <issue>6</issue>
          ):
          <fpage>265</fpage>
          -
          <lpage>277</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          2017.
          <article-title>Amplifying Human Ability through Autonomics and Machine Learning in IMPACT</article-title>
          .
          <source>In Proc. SPIE 10194</source>
          ,
          <string-name>
            <surname>Microand</surname>
            <given-names>Nanotechnology Sensors</given-names>
          </string-name>
          , Systems, and Applications IX.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Endsley</surname>
            ,
            <given-names>M. R.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Kiris</surname>
            ,
            <given-names>E. O.</given-names>
          </string-name>
          <year>1995</year>
          .
          <article-title>The Out-of-the-Loop Performance Problem and Level of Control in Automation.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <source>Human Factors</source>
          <volume>37</volume>
          (
          <issue>2</issue>
          ):
          <fpage>381</fpage>
          -
          <lpage>394</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Endsley</surname>
            ,
            <given-names>M. R.</given-names>
          </string-name>
          <year>1988</year>
          .
          <article-title>Situation awareness global assessment technique (SAGAT)</article-title>
          .
          <source>Aerospace and Electronics Conference</source>
          ,
          <year>1988</year>
          .
          <source>NAECON</source>
          <year>1988</year>
          .,
          <source>Proceedings of the IEEE 1988 National 789-795.</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Endsley</surname>
            ,
            <given-names>M. R.</given-names>
          </string-name>
          <year>2000</year>
          .
          <article-title>Theoretical Underpinnings of Situation Awareness: A Critical Review</article-title>
          .
          <source>In Situation Awareness Analysis and Measurement</source>
          . Lawrence Erlbaum Associates.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Everaerts</surname>
            ,
            <given-names>J. .</given-names>
          </string-name>
          <year>2008</year>
          .
          <article-title>The Use of Unmanned Aerial Vehicles (UAVs) for Remote Sensing and Mapping</article-title>
          .
          <source>The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XXXVII(Part B1)</source>
          :
          <fpage>1187</fpage>
          -
          <lpage>1192</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Filkins</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <year>2010</year>
          .
          <article-title>Operators of Drones Are Faulted in Afghan Deaths</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Friedman</surname>
            ,
            <given-names>J. H.</given-names>
          </string-name>
          <year>2002</year>
          .
          <article-title>Stochastic gradient boosting</article-title>
          .
          <source>Computational Statistics and Data Analysis</source>
          <volume>38</volume>
          (
          <issue>4</issue>
          ):
          <fpage>367</fpage>
          -
          <lpage>378</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>Gibson</surname>
            ,
            <given-names>J. J.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Crooks</surname>
            ,
            <given-names>L. E.</given-names>
          </string-name>
          <year>1938</year>
          .
          <article-title>A Theoretical FieldAnalysis of Automobile-Driving</article-title>
          .
          <article-title>The American journal of psychology 51(3</article-title>
          ):
          <fpage>453</fpage>
          -
          <lpage>471</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <surname>Greene</surname>
            ,
            <given-names>W. H.</given-names>
          </string-name>
          <year>2012</year>
          .
          <article-title>Econometric Analysis (Seventh ed</article-title>
          .).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          2012.
          <article-title>Predicting Human Preferences Using the Block Structure of Complex Social Networks</article-title>
          .
          <source>PLoS ONE</source>
          <volume>7</volume>
          (
          <issue>9</issue>
          ):
          <fpage>3</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <surname>Hand</surname>
            ,
            <given-names>D. J.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Till</surname>
            ,
            <given-names>R. J.</given-names>
          </string-name>
          <year>2001</year>
          .
          <article-title>A Simple Generalisation of the Area Under the ROC Curve for Multiple Class Classification Problems</article-title>
          .
          <source>Machine Learning</source>
          <volume>45</volume>
          (
          <issue>2</issue>
          ):
          <fpage>171</fpage>
          -
          <lpage>186</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <surname>Izzetoglu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Ayaz</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Hing</surname>
            ,
            <given-names>J. T.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Shewokis</surname>
            ,
            <given-names>P. A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Bunce</surname>
            ,
            <given-names>S. C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Oh</surname>
            ,
            <given-names>P. Y.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Onaral</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <year>2015</year>
          .
          <article-title>Uav Operators Workload Assessment by Optical Brain Imaging Technology (fNIR)</article-title>
          .
          <source>In Handbook of Unmanned Aerial Vehicles.</source>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          Dordrecht: Springer Netherlands.
          <volume>2475</volume>
          -
          <fpage>2500</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <surname>Kanevski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Parkin</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Pozdnukhov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Timonin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Maignan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Demyanov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Canu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <year>2004</year>
          .
          <article-title>Environmental data mining and modeling based on machine learning algorithms and geostatistics</article-title>
          .
          <source>Environmental Modelling and Software</source>
          <volume>19</volume>
          (
          <issue>9</issue>
          ):
          <fpage>845</fpage>
          -
          <lpage>855</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Bian</surname>
          </string-name>
          , J.; and
          <string-name>
            <surname>Agichtein</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <year>2008</year>
          .
          <article-title>Predicting Information Seeker Satisfaction in Community Question Answering</article-title>
          .
          <source>Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '08 483.</source>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <surname>Marusich</surname>
            ,
            <given-names>L. R.</given-names>
          </string-name>
          ; Bakdash,
          <string-name>
            <given-names>J. Z.</given-names>
            ;
            <surname>Onal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ;
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            ;
            <surname>Schaffer</surname>
          </string-name>
          , J.; ODonovan, J.; Ho llerer, T.;
          <string-name>
            <surname>Buchler</surname>
          </string-name>
          , N.; and
          <string-name>
            <surname>Gonzalez</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <year>2016</year>
          .
          <article-title>Effects of Information Availability on Command-and-Control Decision Making: Performance, Trust, and Situation Awareness</article-title>
          .
          <source>Human Factors: The Journal of the Human Factors and Ergonomics Society</source>
          <volume>58</volume>
          (
          <issue>2</issue>
          ):
          <fpage>301</fpage>
          -
          <lpage>321</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <surname>Morse</surname>
            ,
            <given-names>B. S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Engh</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ; and Goodrich,
          <string-name>
            <surname>M. A.</surname>
          </string-name>
          <year>2010</year>
          .
          <article-title>UAV video coverage quality maps and prioritized indexing for wilderness search and rescue</article-title>
          .
          <source>In 2010 5th ACM/IEEE International Conference on Human-Robot Interaction (HRI)</source>
          ,
          <fpage>227</fpage>
          -
          <lpage>234</lpage>
          . Osaka: IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <string-name>
            <surname>Noh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Jeong</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          <year>2010</year>
          .
          <article-title>Intelligent Command and Control Agent in Electronic Warfare Settings</article-title>
          .
          <source>International Journal of intelligent Systems</source>
          <volume>25</volume>
          :
          <fpage>514</fpage>
          -
          <lpage>528</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <string-name>
            <surname>Quinlan</surname>
            ,
            <given-names>J. R.</given-names>
          </string-name>
          <year>1986</year>
          .
          <article-title>Induction of Decision Trees</article-title>
          .
          <source>Machine Learning</source>
          <volume>1</volume>
          (
          <issue>1</issue>
          ):
          <fpage>81</fpage>
          -
          <lpage>106</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <string-name>
            <surname>Rapaport</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <year>2015</year>
          . ”
          <article-title>Quite a few Terrorists lost their lives owing to Big Data”</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <string-name>
            <surname>Sandom</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <year>2000</year>
          .
          <article-title>Operator Situational Awareness and System Safety</article-title>
          .
          <source>In IEE One Day Seminar on Systems Dependency on Humans</source>
          , volume
          <year>2000</year>
          ,
          <fpage>5</fpage>
          -
          <lpage>5</lpage>
          . IEE.
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          <string-name>
            <surname>Shanker</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Richtel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <year>2011</year>
          . In New Military, Data Overload Can Be Deadly.
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <string-name>
            <surname>Tibshirani</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ; Bien,
          <string-name>
            <given-names>J.</given-names>
            ;
            <surname>Friedman</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          ; Hastie,
          <string-name>
            <given-names>T.</given-names>
            ;
            <surname>Simon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ;
            <surname>Taylor</surname>
          </string-name>
          , J.; and Tibshirani,
          <string-name>
            <surname>R. J.</surname>
          </string-name>
          <year>2012</year>
          .
          <article-title>Strong Rules for Discarding Predictors in Lasso-type Problems</article-title>
          .
          <source>Journal of the Royal Statistical Society. Series B (Methodological)</source>
          <volume>74</volume>
          (
          <issue>2</issue>
          ):
          <fpage>245</fpage>
          -
          <lpage>266</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <string-name>
            <surname>Tibshirani</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <year>1996</year>
          .
          <article-title>Regression Shrinkage and Selection via the Lasso</article-title>
          .
          <source>Journal of the Royal Statistical Society. Series B (Methodological)</source>
          <volume>58</volume>
          (
          <issue>1</issue>
          ):
          <fpage>267</fpage>
          -
          <lpage>288</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          <string-name>
            <surname>Walker</surname>
            ,
            <given-names>S. H.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Duncan</surname>
            ,
            <given-names>D. B.</given-names>
          </string-name>
          <year>1967</year>
          .
          <article-title>Estimation of the probability of an event as a function of several variables independent</article-title>
          .
          <source>Biometrika</source>
          <volume>54</volume>
          (
          <issue>1 and 2</issue>
          ):
          <fpage>167</fpage>
          -
          <lpage>179</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          <string-name>
            <surname>Zak</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Oron-Gilad</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ; and Parmet,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          <year>2018</year>
          .
          <article-title>Operator Workload Reduced in Unmanned Aerial Vehicles : Making Command and Control ( C2 ) Maps More Useful</article-title>
          .
          <source>In Proceedings of the Human Factors and Ergonomics Society Annual Meeting.</source>
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          <string-name>
            <surname>Zak</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Parmet</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Oron-Gilad</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <year>2019a</year>
          .
          <article-title>Making Command and Control Maps More Useful for Operators of Unmanned Aerial Systems : A Preliminary Model and Empirical Approach</article-title>
          . In HSI2019.
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <string-name>
            <surname>Zak</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Parmet</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Oron-Gilad</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <year>2019b</year>
          .
          <article-title>Towards the Development of a Display Filter Algorithm for Command and Control (C2) Maps for Operators of Unmanned Aerial Systems</article-title>
          .
          <source>In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, CHI EA '19.</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>