=Paper=
{{Paper
|id=Vol-2819/invited4
|storemode=property
|title=The Holistic Battlespace: Why the Key to Resilience for AI/ML Algorithms is to Leverage Complexity Science (Presentation slides)
|pdfUrl=https://ceur-ws.org/Vol-2819/invited4.pdf
|volume=Vol-2819
|authors=Joe Schaff
}}
==The Holistic Battlespace: Why the Key to Resilience for AI/ML Algorithms is to Leverage Complexity Science (Presentation slides)==
“The Holistic Battlespace: Why the
Key to Resilience for AI/ML
Algorithms is to Leverage
Complexity Science”.
By Dr. Joe Schaff
Autonomy & Avionics, NAVAIR / NAWCAD Mission Systems
This will certify that all author(s) of the above article/paper are employees of the U.S. Government and performed this work as part of their employment,
and that the article/paper is therefore not subject to U.S. copyright protection. No copyright. Use permitted under Creative Commons License Attribution
4.0 International (CC BY 4.0). In: Proceedings of AAAI Symposium on the 2nd Workshop on Deep Models and Artificial Intelligence for Defense Applications:
Potentials, Theories, Practices, Tools, and Risks, November 11-12, 2020, Virtual, published at http://ceur-ws.org
Disclaimer: The work and related approaches in these slides are the Joe Schaff, NAVAIR / NAWCAD Mission Systems
opinions of the author, and do not reflect any policy, methods or
approaches used by the US government. DISTRIBUTION STATEMENT A
What is the Battlespace?
• A multidomain operating environment, much like a natural ecosystem.
• To be effective, the dominant force must leverage the environment to:
1. Exploit the weaknesses of an adversary’s environmental dependencies.
2. Strengthen the dominant position by protecting key environmental factors.
• Currently, a battlespace consists of a heterogeneous mix of humans and
machines, some with intelligent autonomous systems.
• Looking forward, the majority will be intelligent autonomy.
• Either of these will have a dependency on the judicious use of information –
there will not be complete, but only limited data.
• To win, a dominant force needs to have awareness of its general objectives,
the force laydown of both sides and any significant changes that may occur.
• Information can and should be communicated in a narrow channel as nature
does – i.e. stigmergy.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Complexity Science – Roles of Scale &
Emergence
• Ecosystem- or Battlespace-sized interactions will by default have unexpected
(emergent) behaviors.
• Intelligent autonomous systems (or Complex Adaptive Systems = CAS) will
need to rapidly learn and adapt to their dynamically changing environment.
Effective learning must occur with limited experiences.
• Below is a list of some key issues with ML in general:
1. The need for adequate (i.e. massive) number of samples for comprehensive
training.
2. Long time scales for adaptive learning, partially due to massive sample size.
3. Large computational resources needed for training.
4. Brittleness due to lack of resilience, emergent misclassifications, and overfitting.
• Most of these are significantly different from human limitations. Let’s look
at the holistic picture to see how we can address some of these:
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Adressing the Autonomous Battlespace
Problem from Both Ends
A “Smart” Battlespace consists of many thousands of elements, each comprised of
smart components:
1. Massive embedded mobile ad-hoc (MANET) radios create the “smart swarm”.
• Both humans and machines, referred to as “entities” communicate = interactions.
• Entities are heterogeneous and need to self-organize and be cognizant of order.
• Mathematically equivalent problem whether you assume either radios or UAVs.
2. Entities each can consist of one or more components.
• Components need to be resilient to attacks – i.e. self-healing and resistant.
• Components are “smart components” that embed AI / ML to augment sensor and route
planning capabilities. World model is the abstract “awareness”.
• What does ETE look like at different scales (1 & 2 above)?
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Complexity is Integral to Battlespace
• Battlespace by necessity must be complex.
• Attempts to over-simplify result in easily targetable entities.
• Emergent behaviors will occur whether you want them
or not.
• Best choice: “when you can’t beat ‘em, join ‘em”:
• leverage these behaviors to produce tactical advantages.
• Use these to create self-healing resilient networks.
• Use the “creativity” that can emerge from nonlinear
classifiers in AI.
• Choose wisely where you use emergent aspects of
complexity, how you apply AI.
• Constrain other systems / components as needed to
make best use – e.g. formal methods.
• Be the “lion tamer” of complexity to gain winning
tactical advantages.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Complexity of Scale: From Swarms to
Components
(Red = degree of complexity being used)
Massive Platform
Platforms Components
Swarms (use of AI/ML)
Swarm Cloud (10,000’s objects) Platform Component Architecture
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Technologies of Scale Must Overlap
Swarm
Components
Platforms
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Technology Overlap: #1 – Massive Smart Swarm:
Self-organizing mathematics = uses ”deterministic chaos”
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
From Random to Order
Video: https://youtu.be/iggsygNPEnU Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
How Can This Possibly Work?
• Randomly generated, but constrained topology.
• Does translation / rotation (mathematically = affine transformation).
• Implicitly self-similar.
• Computationally simple math
• iterations (Iterated Function System = IFS).
• In this particular function only one float multiplication per iteration: e.g. for
determining the topological layout of 10,000 entities, would be 10KFLOPs.
• Any IoT / edge device would have computational power to get topological
picture of battlespace / other in milliseconds or faster (e.g. ESP32 = 400µsec).
• So, what do we do with this? Distributed C2 / Resilient comms in
denied environments? Control massive swarms?
How Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Human Immersion
into Battlespace:
1) Put on Oculus / other
headset
2) Link controls (BCI /
other) to one of the UxVs
in proximity circle.
3) Pass token to first one to
respond / arbitrary
choice.
4) View what it “sees”, and
fly in its “world”.
5) Handoff token when
done / other location
needed.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
OK, but what is it??? DISTRIBUTION STATEMENT A
It’s a Fractal!
Joe Schaff, NAVAIR /
NAWCAD Mission
Further details can be found in the chapter I wrote (Leveraging Deterministic Chaos to Systems
Mitigate Combinatorial Explosions) for the book “Engineering Emergence: A Modeling DISTRIBUTION
and Simulation Approach”, CRC Press ⓒ2019. STATEMENT A
Technology Overlap #2 Components - Resolving
Trust:
Architecture for cyber-hardened smart components to learn &
adapt while creating a greater trust in their autonomous
decisions
• Trust and resilience go
hand-in-hand.
• Must merge Cyber and Cyber Resilience &
A.I. holistically. the desired
• Must allow free-reign of attributes of
A.I. (i.e. creativity) but behaviors
use effective resiliency A.I. creates trust.
constraints.
• Meta-reasoning to Patent disclosure was
prevent A.I. algorithms submitted and
from being deceived. Autonomy
presented to Invention
Evaluation Board
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Adversarial AI: Natural Adversarial
Examples*
• Natural adversarial examples from IMAGENET-A. The red text is a ResNet-50
prediction with its confidence, and the black text is the actual class.
* from: arXiv:1907.07174v2 [cs.LG] 18 Jul 2019
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
How do we avoid some of these issues?
• We may never be able to design “foolproof” resilience into a system.
• There are good strategies to limit some of the weaknesses in AI/ML.
• Some aspects of transfer learning – IF the data is “clean” to begin
with: “An Empirical Evaluation of Adversarial Robustness under
Transfer Learning”
• Others may not be avoidable if data is “poisoned”. See: Poison frogs.
• First steps: Architecting trustworthy resilience and validating these
architectures
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Architecting Resilience – some “Puzzle Pieces”
DARPA started the Assured Autonomy program.
• This program looks at the methods for some AI / ML validation, but does not
look at the battlespace “Big Picture”.
• Early stage - Focused on AI/ML specifically.
• Funding academic research for verifying /validating performance aspects of
primarily NNs
• Example:
• VerifAI/SCENIC = toolkit for design/analysis of AI systems (SCENIC=probabilistic
programming language). D. Fremont, et.al, UCal Berkeley.
• Study uses Grand Theft Auto 5 (GTA5).
• Download software here: https://github.com/BerkeleyLearnVerify/VerifAI
• Many more examples available from other schools.
• Formal Methods Approaches are frequently used.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Formal Methods for Trust(?)…but it doesn’t Scale
well…
Can it work with “smart components”?
• Sometimes- complexity may rule it out
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Component Architecture Background
*Architectures have been designed in the past that address some
but not all of these. Below are some of the attributes of the
proposed architectural approach:
• 1. Is able to use heterogeneous AI/ML technologies.
• 2. Mitigates shortfalls in specific vision/other algorithms.
• 3. Does meta-reasoning (cognitive architecture).
• 4. Is Cyber-resilient.
• 5. Is fully scalable from low-cost expendable to high value platform.
• 6. Has a fully open architecture in hardware and software.
• 7. Allows exploration of algorithm internals for AI/ML and cyber analysis.
• * Note: “architecture” is clearly an overloaded word - if you don’t like the
word “architecture”, replace it with “framework”.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Quick Fix for Minimal Data and “basic” Rapid
Learning
• What about DLNN issues:
1. adequate (i.e. massive) number of samples for comprehensive training?
2. Short time scale for adaptive learning?
• Transfer learning: take the trained weights / other parameters for similar
NN trained on similar problem, load into new NN.
• Issues include: is the problem domain sufficiently similar? Does this limit the item
classified to only those close / exact enough to original training data (i.e.
overfitting)?
• Better way: Use “helper” algorithms and mathematical functions as coarse
classifiers to “pre-train” the DLNN.
• Helper algorithms can work in a complementary manner with algorithms that are
more accurate but challenging to train / adapt.
• More than just ensemble classifiers = these are matched complementary sets. The
sets can also be combined with other classifiers for an ensemble.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Example Helper Algorithm
• Can be solved by
incorporating earlier
AI/ML paradigms
into architecture.
• One simple example
is semantic net:
members of a class
and attributes are
shown by connected
graph.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
But What if We Don’t Know the Categories?
A) what if we don’t know categories or relationships? B) what if the problem space is
nonlinear?
• Example #2: Radial Basis Function (RBF) NN is
an “analogizer” = it can estimate approximately
which class something fits into, even if classes
are not yet defined (unsupervised learning = 1st
stage), then follows with a few good examples
(2nd stage).
• RBFs and some SVMs (Support Vector Machines)
can create categories. RBF also can address
many nonlinear problems, e.g. chaotic time
series. Convergence to control dynamics or
create classes to recognize can be done with < Thing 1, Thing 2, and Swamp Thing
100 examples.
A classic complexity / chaos example is given = logistics equation.
J. Moody and C. J. Darken, "Fast learning in networks of locally tuned processing units," Neural Computation,1, 281-294 (1989).
Joe Schaff, NAVAIR / NAWCAD Mission Systems DISTRIBUTION STATEMENT A
Radial basis function network: Control of
the logistic map.
The system is allowed to evolve
naturally for 49 time steps. At time
50 control is turned on. The desired
trajectory for the time series is red.
The system under control learns
the underlying dynamics and
drives the time series to the
desired output.
Computationally simpler & faster
than DLNN – just not as exact.
Permission details
This work has been released into the public domain by its
author, CommodiCast at English Wikipedia. This applies
worldwide. In some countries this may not be legally
possible; if so: CommodiCast grants anyone the right to use
this work for any purpose, without any conditions, unless
such conditions are required by law.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Helper Function (mathematical type)
• Around mid-1990s I noticed that complex, almost random behaviors of NNs
had some implicit pattern but could not figure it out.
• Looked at weights before, during, after training. Noticed self-similar pattern
(fractal) for adjacent weights and respective inputs.
• Hypothesis: if the fractal pattern of trained weights is saved, then
transformed & applied to similar NN topologies, this will shorten the
training time & data needed.
• What about overfitting to exact fractal parameters? Solution is to use multifractal
= superimpose another similar or possibly different fractal onto original (similar
techniques are used for wave functions in quantum mechanics).
• What if I can determine the inverse of the fractal functions? Superimpose that to
“undo” any learning. (multifractal link:
https://imagej.nih.gov/ij/plugins/fraclac/FLHelp/Multifractals.htm )
Now…put it all together to build a cyber-resilient architecture. Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Running Algorithms in a Meta-reasoning
Component Architecture (an example)
*
Comparison
/ selection Yolo : MXNET: CMU-develo A) Separately
(1-shot net with ped
of multiple convolutional
Containerized
Cloud stochastic
vision NN) sharing hue-based algorithms.
B) Runs on
classifiers
Microkernel.
Classifier selection:
1) Manually selected The Meta-Reasoner:
2) Use Options include: (1) Use OpenCBR case-based reasoner, or (2) Cognitive
Meta-reasoner on architecture. This overlays the Machine Learning algorithms, and each
embedded algo. Is treated as an agent:
processor (Pi) E.g. SOAR (Java version = JSOAR) architecture selected for initial
approach. JSOAR / SOAR is open-source.
Finally, Use a Generative Adversarial Network (GAN) for periodic
learning updates. DISTRIBUTION A
UNCLASSIFIED
*Embedded Helper Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
The Reason for Meta-Reasoning (“adult supervision”):
Detecting Deep Fakes and Adversarial Perturbations1
Misclassifications (noise pattern is already embedded):
African grey Macaw Indian elephant Three-toed sloth
Some embedded noise patterns for different classifiers:
1. Extracted from: “Universal adversarial perturbations”, S. Moosavi-Dezfooli, A. Fawzi, O. Fawzi, P. Frossard;
arXiv:1610.08401v1 [cs.CV] 26 Oct 2016.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Build a Scalable Prototype for ML & Cyber, and
Future Advanced Threats.
Prototype for
Real-time Convolutional Neural Networks for expendable
Emotion and Gender Classification (academic pub.) robot with
deep-learning
vision / object
recognition.
Every row starting from the top corresponds respectively to
the emotions {e.g. “angry”, “happy”, “sad”, “surprise”, …}
Both left & right blocks represent same pictures. Cost:
Right=convolved using backpropagation variant algorithm. <$300.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
From Prototype to Production: Overlaying a
Technology Transition Architecture
Even if the ETE architecture is incomplete, now is the time to design a
“universal” production system designed for adaptation and validation.
Questions to be asked:
1. Is the research current state of the art?
2. Who is doing various parts of this research?
3. How do we avoid the “valley of death” common to research transition?
4. Can information flow effectively to / from researchers and customers?
5. What conduits exist for resilient & consistent software to transition to
customer use cases?
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Pipeline Architecture & Taxonomy Connections:
Enhanced DevSecOps = researchers, tools, taxonomy conduits, secure
containers.
Prototype ready
for customer
Customer Use
Taxonomy Cases:
conduits Connected via
automated UML
generated from
selected software
containers
Researchers Secure Joe Schaff, NAVAIR / NAWCAD Mission Systems
containers DISTRIBUTION STATEMENT A
Issues and What’s Next?
The “big picture” is currently incomplete:
• Segments of the ETE architecture exist, satisfy some gaps.
• Other gaps exist: both known and unknown.
• Where does complexity provide advantages? Where are deterministic
solutions better?
• Must work in a multi-domain battlespace – the two ends (swarm,
components) are designed specifically for that.
• What organizations can address the “big picture”?
• Now at critical junction for MUmT and autonomy – incomplete/delayed
response could put us too far behind adversaries to catch up.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Final Assessment
On-going work – things I am doing so far:
• Developed a class of algorithms that manage massive “smart” swarms:
• Similar approach to ecosystems in nature, “stigmergic” communication.
• Leverages “swarm intelligence” = AI, so that any entity “knows” where the others are positioned, as
well as changes when broadcasted.
• Needs only a few bytes of data to reorganize / know relative positioning of all battlespace entities.
• Trivial math – e.g. raspberry Pi can calculate 10,000+ entities positions & dynamics in less than
100µsec.
• Developed the resilient meta-reasoning architecture for components:
• Uses heterogeneous AI / ML algorithms in a complementary manner = weakness of one type of
algorithm is covered by another, + helper functions for learning as needed. Scales from raspberry Pi to
largest available.
• AI algorithms are given free reign in a ”sandboxed” environment to allow the full creativity or
innovative results for most effective tactical decisions.
• Meta-reasoner is the “rationalizer” or “adult supervision” that decides whether an algorithm has been
deceived, choosing another algorithm’s results if needed. Periodically, meta-reasoner learns and
adapts.
• Ongoing collaboration with NASA LaRC Formal Methods laboratory.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
• Ongoing collaboration with academia, DARPA Assured Autonomy, OFFSET programs.
DISTRIBUTION STATEMENT A
• Tech & taxonomy architecture for transition.
BACKUP SLIDES
The Details…
Adversarial AI
Adversarial AI Malware
1. Extracted from Hu and Tan: “Generating Adversarial Malware Examples for
Black-Box Attacks Based on GAN”
• Works even when attackers have no access to the architecture and weights of the
neural network to be attacked.
2. Extracted from paper by UMD researchers: “Poison Frogs! Targeted
Clean-Label Poisoning Attacks on Neural Networks ”
• Data poisoning = attack on machine learning (ML).
• Attacker adds examples to training set to manipulate the behavior of the model.
• Targeted to control the behavior of the classifier on a specific test instance without
degrading overall classifier performance.
• Attacker adds a seemingly innocuous image (that is properly labeled) to a training set
for face recognition, and control the identity of a chosen person.
• Poisons could be entered into the training set simply by leaving them on the web and
waiting for them to be scraped by a data collection bot.
3. Images in nature can confound machines.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Machine Deconstruction:
Deconvolutional Network for Face
Decomposition
• Top-down parts-based image
decomposition with an
adaptive deconvolutional
network. Each column
corresponds to a different
input image under the same
model.
• low-level edges, mid-level
edge junctions, high-level
object parts and complete
objects
{extracted from: Zeiler, Taylor,
Fergus; “Adaptive
Deconvolutional Networks for
Mid and High Level Feature
Learning”}
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Constructing a Deep Fake
Several methods to construct deep fakes – some use Generative Adversarial
Networks (GANs), other methods for deconstruct / reconstruct facial features.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Cyber Resilience
Understanding Differences Between
Cyber - {Security} and {Resilience}
Security:
1) Preserving data ”at rest” and in-transit.
2) Privacy = encryption, least-privilege access.
3) Securing system against external attack – hostile takeover,
network-based attacks, etc.
Resilience:
1) More AI / ML based problems.
2) Resilient to deception / misclassification.
3) Resilient to noise added to data.
4) Recovery from exploitation of known weaknesses in classifiers.
5) Recovery from unanticipated attacks.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Steps 1 and 2: Cyber-secure Kernel, Linux Containers
1) Use a microkernel OS = Example: Fuchsia (by Google – in
development).
a) Based on a new microkernel called "Zircon” secure computing environment.
b) Similar approach used by DARPA High Assurance Cyber Military Systems
(HACMS) program.
2) Use Linux Containers (e.g. “Docker”)
a) Why?
1. It “sandboxes” unstable or vulnerable, yet useful ML algorithms.
2. Sandbox can re-instantiate the algorithm if it “crashes” due to malicious attack or instability.
3. Allows full creativity or “emergent behaviors” of algorithms.
b) Overhead and stability costs?
a) Almost identical to bare metal or native ML application without sandboxing.
b) If container crashes, then microkernel restarts container app with “sandboxed” algorithm.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Pipeline Architecture: R&D to customer
Conduits
Pipeline Architecture:
A Multi-pronged Approach
1. Foundation: create developer pipelines, i.e. - remove any burden
of operations so that researchers concentrate on research.
2. Latest technology advances from all available sources = follow
the taxonomy tree.
3. Identify gaps and unfulfilled needs = where to invest in the
research effort.
4. Map use cases to UML / MBSE language abstraction of software,
for transition pipeline.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
OSD DevSecOps & more?
Containers help
visibility and
● Pipelines to / from developers. sharability of
products.
● Hardened containers for algorithms or other software components.
● MilCloud based = latest research in AI/ML may be shared with other researchers.
● BUT...this pipeline is not enough. Need to insert taxonomy... Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Taxonomy (with technology conduits to domain
experts) Additional labs
(e.g. NAWCAD,
NIWC, DHS)
Additional algorithms (i.e. ant
colony optimization or nature
inspired algorithms with the
swarms, LDA, PCA)
Joe Schaff, NAVAIR /
NAWCAD Mission
add other Systems
architectures
(CNNs)
DISTRIBUTION
STATEMENT A
Pipeline Architecture & Taxonomy Connections:
Enhanced DevSecOps = researchers, tools, taxonomy conduits, secure
containers.
Prototype ready
for customer
Customer Use
Taxonomy Cases:
conduits Connected via
automated UML
generated from
selected software
containers
Researchers Secure Joe Schaff, NAVAIR / NAWCAD Mission Systems
containers DISTRIBUTION STATEMENT A
Human-Robot Interaction Course
(I designed & teach this @ U. of Maryland)
Course Outline1
• Course will cover topics as diverse as the technology for biologically
inspired robots, cognitive robotics, cultural, social and legal aspects of
robotics, data mining, examples of human systems interfacing, machine
learning principles and their limitations with respect to AI.
• Your objective as a student will be to integrate this interdisciplinary
knowledge and perform out of the box thinking, demonstrating this in a
term project.
• We're going to look at the ideas like robot emotion, and collaborative
robots that can form limited social interactions.
• You will design a robot that can implicitly determine the action it needs to
take without explicit commands given to it, by observing its interaction with
people.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A
Course Outline 2
• The term project: Think of creating a Kickstarter where you will be building
the next generation of cognitive human-behaving robots.
• You need to show your product as something investors would buy into.
• I will provide course material and extensive reference sources for both
hardware and software to design these robots.
• These robots could realistically be built with hardware and software for as
little as $2000.
• The Kickstarter is only a goal to shoot for, and if you indeed want to create
an actual one after the course is over, you are encouraged to do so either
alone or in collaboration with others in your class.
• Unlike an actual Kickstarter, there's no penalty for not being sponsored - if
you try and think out of the box, and apply whatever knowledge you're
capable of finding as well as what I will provide, you will succeed.
Joe Schaff, NAVAIR / NAWCAD Mission Systems
DISTRIBUTION STATEMENT A