Accelerated Real-Time Information Extraction System (ARIES)
Find Similar History 40 Claim Ownership Request Data Change Add FavouriteTitle
CoPED ID
Status
Value
Start Date
End Date
Description
Technological advances in CMOS semiconductor technology paved the way for the digital revolution. As predicted by Moore, silicon integration capability has been doubling every 18 months over the past four decades, providing the foundation for low-cost computing and memory technology.
The digitisation of information and communication technologies sparked a number of innovations revolutionising the way we compute and communicate. Ubiquitous high-bandwidth communication, enabled by WiFi and 3G/4G technologies, facilitates on-demand access to a vast amount of application and location specific information including multimedia and broadcast content, video and voice communications, email and SMS/MMS. Furthermore, it has enabled on-demand access to personalised storage and computing resources, providing the foundation for the development of cloud computing infrastructures and a wide range of online web-based services and applications. With the decreasing cost of communication and storage the Internet has also become the global communication infrastructure for a wide range of autonomous sensor technologies, referred to as the "Internet of things". Key application areas include monitoring/surveillance, smart grid, smart homes and smart cities.
Monitoring internet traffic and mining meaningful information from both the online traffic and the stored information has emerged as essential for many critical applications and services. For example resource management, market intelligence, physical and cybercrime investigations and forensics, cyber space policing, situation awareness and the monitoring of malicious behaviour for criminal and terrorist intent. As the scale, diversity and distributed nature of current and emerging data assets increases and as data becomes ever more ubiquitous and critical to decision making, effective real-time mining of useful information becomes essential.
Considering the exponential increase of internet traffic and stored data, traditional software based approaches have become inadequate and unsustainable. Performance gain achieved due to Moore's law does not keep up with the required computing bandwidth of current and near future generated data assets. Internet traffic bandwidth is doubling every 12 months while the emerging content diversity is significantly increasing mining complexity. As the enterprise becomes more data centric, with a significant increase in data assets within the public and private cloud, traditional scaling by increasing the number of computing resources can no longer be sustained due to cost and power dissipation.
Most data mining algorithms are derived by the software community and are optimised for data structures for platforms based upon the Von-Neumann architecture. An effective solution now requires a paradigm shift in the way we process data and also how we extract meaningful information from a large amount of distributed, constantly changing data that is partially stored or in-transit.
More Information
Potential Impact:
Beyond the immediate academic beneficiaries it is anticipated that the following groups will also benefit from the research undertaken:
[1] Impact in the Defence and Security Sector
It is well recognised that potentially rich and valuable knowledge is often inaccessible within large and unstructured datasets. This can often come to light after a significant event has occurred and a subsequent forensic trawl of data reveals the hidden knowledge. For defence and security applications, where early visibility of emerging threat is paramount, the existing methods cannot deliver information extraction within an adequate timeframe. Situational awareness must be delivered in real-time or near real-time to inform critical decision making.
Physical Surveillance Scenario
Advancing surveillance and monitoring methods deployed by the military (radar, optical, infrared, audio, satellite, electronic signals) are generating vast datasets in real-time. Moreover the treatment of the inherent noise and uncertainty associated with such data, owing to operational limits of the sensing technologies, means traditional knowledge discovery methods are failing. The successful application of custom-purpose hardware offers the opportunity to exploit existing knowledge discovery models with potentially minimal modification and yet accelerate the end-to-end process bringing new capability to the situational awareness problem in live military operations.
Cyber Surveillance Scenario
A worldwide consensus has emerged identifying cyberspace as a new territory warranting military protection. In 2009 the US DoD declared a new military command dedicated to cyber-security. The UK Strategic and Security Review 2011 has identified "cyber attack, including by other states, and by organised crime and terrorists" as a top priority risk. As the scope and nature of this new territory becomes better understood in the military context a natural requirement emerges to equip the UK defence and security services with new tools to detect, identify and respond to threats against UK interests in cyberspace.
These tools must perform a robust surveillance function in a similar manner to their physical counterparts. As such they must contend with daunting datasets deployed across a vast distributed infrastructure and with data that is frequently transient in nature. This research proposal asserts that this specialised function requires specialised hardware to deliver cyber-surveillance capabilities that are sufficiently quick, flexible and robust to address this emerging need.
[2] Longer-term beneficiaries
Data mining of extremely large data sets is a pressing need expressed in multiple business sectors including medicine, security surveillance and network monitoring. This growing demand for new capabilities will drive the creation of a new and competitive commercial space to service this demand. UK based research has an opportunity to place itself at the centre of this movement and exploit future hardware advances.
[3] Future Impact
The work programme proposed aims to look at early opportunities to exploit custom purpose hardware in data intensive systems. However it will also seek to bring clarity to future trends and new capabilities that will inevitably emerge over the coming decade to 2020. This information will be of great value to those UK bodies tasked with strategy planning both in the defence sector and in commercial sectors. A clear view of how custom purpose hardware impacts upon knowledge discovery in vast datasets can inform the extrapolation of these capabilities to longer timeframes.
Queen's University of Belfast | LEAD_ORG |
Titan IC Systems | COLLAB_ORG |
Sakir Sezer | PI_PER |
Kieran McLaughlin | COI_PER |
Dwayne Burns | COI_PER |
Michael Loughlin | COI_PER |
Weiru Liu | COI_PER |
Shane O'Neill | COI_PER |
Fatih Kurugollu | COI_PER |
Paul Miller | COI_PER |
Subjects by relevance
- Data mining
- Data security
- Data systems
- Information technology
- Information networks
- Internet
- Safety and security
- Information management
- Digital technology
- Privacy
Extracted key phrases
- Time Information Extraction System
- CMOS semiconductor technology
- Technological advance
- Datum asset increase
- Future hardware advance
- Communication technology
- Datum mining algorithm
- Real
- Traditional knowledge discovery method
- 3G/4 G technology
- New capability
- Autonomous sensor technology
- New military command
- Datum intensive system
- Memory technology