Share Email Print
cover

Proceedings Paper

Building and analyzing timed influence net models with internet-enabled pythia
Author(s): Peter W. Pachowicz; Lee W. Wagenhals; John Pham; Alexander H. Levis
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

The most recent client-server version of Pythia modeling software is presented. Pythia is a software implementation of a Bayesian Net framework and is used for course of action development, evaluation, and selection in the context of effects-based planning. A new version, Pythia 1.5, is a part of a larger suite of tools for behavioral influence analysis, brought into the state-of-the-art client-server computing environment. This server application for multi-user and multiprocess computing relies on the Citrix Presentation Server for integration, security and maintenance. While Pythia's process is run on a server, the input/output services are controlled and displayed through a client PC. Example use of Pythia is illustrated through its application to a suppression of IED activity in an Iraqi province. This case study demonstrates how analysts can create executable (probabilistic) models that link potential actions to effects, based on knowledge about the cultural and social environment. Both the tool and the process for creating and analyzing the model are described as well as the benefits of using the new server based version of the tool.

Paper Details

Date Published: 10 May 2007
PDF: 9 pages
Proc. SPIE 6564, Modeling and Simulation for Military Operations II, 65640C (10 May 2007); doi: 10.1117/12.719022
Show Author Affiliations
Peter W. Pachowicz, George Mason Univ. (United States)
Lee W. Wagenhals, George Mason Univ. (United States)
John Pham, George Mason Univ. (United States)
Alexander H. Levis, George Mason Univ. (United States)


Published in SPIE Proceedings Vol. 6564:
Modeling and Simulation for Military Operations II
Kevin Schum; Dawn A. Trevisani, Editor(s)

© SPIE. Terms of Use
Back to Top