Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 47

Full-Text Articles in Entire DC Network

Characterizing Location-Based Electromagnetic Leakage Of Computing Devices Using Convolutional Neural Networks To Increase The Effectiveness Of Side-Channel Analysis Attacks, Ian C. Heffron Mar 2023

Characterizing Location-Based Electromagnetic Leakage Of Computing Devices Using Convolutional Neural Networks To Increase The Effectiveness Of Side-Channel Analysis Attacks, Ian C. Heffron

Theses and Dissertations

SCA attacks aim to recover some sort of secret information, often in the form of a cipher key, from a target device. Some of these attacks focus on either power-based leakage, or EM-based leakage. Neural networks have recently gained in popularity as tools in SCA attacks. Near-field EM probes with high-spatial resolution enable attackers to isolate physical locations above a processor. This enables attackers to exploit the spatial dependencies of algorithms running on said processor. These spatial dependencies result in different physical locations above a chip emanating different signal strengths. The strengths of different locations can be mapped using the …


Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug Sep 2022

Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug

Theses and Dissertations

Modern multi-tasking computer systems run numerous applications simultaneously. These applications must share hardware resources including the Central Processing Unit (CPU) and memory while maximizing each application’s performance. Tasks executing in this shared environment leave residue which should not reveal information. This dissertation applies machine learning and statistical analysis to evaluate task residue as footprints which can be correlated to identify tasks. The concept of privilege strata, drawn from an analogy with physical geology, organizes the investigation into the User, Operating System, and Hardware privilege strata. In the User Stratum, an adversary perspective is taken to build an interrogator program that …


Enabling Rapid Chemical Analysis Of Plutonium Alloys Via Machine Learning-Enhanced Atomic Spectroscopy Techniques, Ashwin P. Rao Sep 2022

Enabling Rapid Chemical Analysis Of Plutonium Alloys Via Machine Learning-Enhanced Atomic Spectroscopy Techniques, Ashwin P. Rao

Theses and Dissertations

Analytical atomic spectroscopy methods have the potential to provide solutions for rapid, high fidelity chemical analysis of plutonium alloys. Implementing these methods with advanced analytical techniques can help reduce the chemical analysis time needed for plutonium pit production, directly enabling the 80 pit-per-year by 2030 manufacturing goal outlined in the 2018 Nuclear Posture Review. Two commercial, handheld elemental analyzers were validated for potential in situ analysis of Pu. A handheld XRF device was able to detect gallium in a Pu surrogate matrix with a detection limit of 0.002 wt% and a mean error of 8%. A handheld LIBS device was …


Leveraging Subject Matter Expertise To Optimize Machine Learning Techniques For Air And Space Applications, Philip Y. Cho Sep 2022

Leveraging Subject Matter Expertise To Optimize Machine Learning Techniques For Air And Space Applications, Philip Y. Cho

Theses and Dissertations

We develop new machine learning and statistical methods that are tailored for Air and Space applications through the incorporation of subject matter expertise. In particular, we focus on three separate research thrusts that each represents a different type of subject matter knowledge, modeling approach, and application. In our first thrust, we incorporate knowledge of natural phenomena to design a neural network algorithm for localizing point defects in transmission electron microscopy (TEM) images of crystalline materials. In our second research thrust, we use Bayesian feature selection and regression to analyze the relationship between fighter pilot attributes and flight mishap rates. We …


Smoothing Of Convolutional Neural Network Classifications, Glen R. Drumm Mar 2022

Smoothing Of Convolutional Neural Network Classifications, Glen R. Drumm

Theses and Dissertations

Smoothing convolutional neural networks is investigated. When intermittent and random false predictions happen, a technique of average smoothing is applied to smooth out the incorrect predictions. While a simple problem environment shows proof of concept, obstacles remain for applying such a technique to a more operationally complex problem.


Deep Learning Approach To Multi-Phenomenological Nuclear Fuel Cycle Signals For Nonproliferation Applications, Preston J. Dicks Mar 2022

Deep Learning Approach To Multi-Phenomenological Nuclear Fuel Cycle Signals For Nonproliferation Applications, Preston J. Dicks

Theses and Dissertations

In order to reduce the time required for data analysis and decision-making relevant to nuclear proliferation detection, Artificial Intelligence (AI) techniques are applied to multi-phenomenological signals emitted from nuclear fuel cycle facilities to identify non-human readable characteristic signatures of operations for use in detecting proliferation activities. Seismic and magnetic emanations were collected in the vicinity of the High Flux Isotope Reactor (HFIR) and the McClellan Nuclear Research Center (MNRC). A novel bi-phenomenology DL network is designed to test the viability of transfer learning between nuclear reactor facilities. It is found that the network produces an 84.1% accuracy (99.4% without transient …


Incorporating Armed Escorts To The Military Medical Evacuation Dispatching Problem Via Stochastic Optimization And Reinforcement Learning, Andrew G. Gelbard Mar 2022

Incorporating Armed Escorts To The Military Medical Evacuation Dispatching Problem Via Stochastic Optimization And Reinforcement Learning, Andrew G. Gelbard

Theses and Dissertations

The military medical evacuation (MEDEVAC) dispatching problem seeks to determine high-quality dispatching policies to maximize the survivability of casualties within contingency operations. This research leverages applied operations research and machine learning techniques to solve the MEDEVAC dispatching problem and evaluate system performance. More specifically, we develop an infinite-horizon, continuous-time Markov decision process (MDP) model and approximate dynamic programming (ADP) solution approach to generate high-quality policies. The ADP solution approach utilizes an approximate value iteration algorithm strategy incorporating gradient descent Q-learning to approximate the value function. A notional, synthetically-generated scenario in Africa based around the capital city of Niger, Niamey is …


Application Of Machine Learning Models With Numerical Simulations Of An Experimental Microwave Induced Plasma Gasification Reactor, Owen D. Sedej Mar 2022

Application Of Machine Learning Models With Numerical Simulations Of An Experimental Microwave Induced Plasma Gasification Reactor, Owen D. Sedej

Theses and Dissertations

This thesis aims to contribute to the future development of this technology by providing an in-depth literature review of how this technology physically operates and can be numerically modeled. Additionally, this thesis reviews literature of machine learning models that have been applied to gasification to make accurate predictions regarding the system. Finally, this thesis provides a framework of how to numerically model an experimental plasma gasification reactor in order to inform a variety of machine learning models.


Improving Anonymized Search Relevance With Natural Language Processing And Machine Learning, Niko A. Petrocelli Mar 2022

Improving Anonymized Search Relevance With Natural Language Processing And Machine Learning, Niko A. Petrocelli

Theses and Dissertations

Users often sacrifice personal data for more relevant search results, presenting a problem to communities that desire both search anonymity and relevant results. To balance these priorities, this research examines the impact of using Siamese networks to extend word embeddings into document embeddings and detect similarities between documents. The predicted similarity can locally re-rank search results provided from various sources. This technique is leveraged to limit the amount of information collected from a user by a search engine. A prototype is produced by applying the methodology in a real-world search environment. The prototype yielded an additional function of finding new …


Training Logic And Random Forest Models To Predict It Spending, Jacob P. Batt Mar 2022

Training Logic And Random Forest Models To Predict It Spending, Jacob P. Batt

Theses and Dissertations

The Air Force must modernize, but the distribution of funds for technology remains as tight as ever. To this end, the Air Force Audit Agency is looking to utilize machine learning techniques to enhance their capabilities. This research explores Logistic Regression and Random Forest modeling to streamline data collection and cost classification. The final Logistic Regression model identified 4 significant attributes out of the 36 given and was 85 accurate in predicting whether a purchase amount was over or under $10,000. To expand beyond binary classification, a six-category classification Random Forest model was developed. It identified 6 significant attributes and …


An Exploratory Analysis Of Time Series Econometric Data For Retention Forecasting Using Deep Learning, John C. O'Donnell Mar 2022

An Exploratory Analysis Of Time Series Econometric Data For Retention Forecasting Using Deep Learning, John C. O'Donnell

Theses and Dissertations

Officer retention in the Air Force has been researched many times in an attempt to better predict the personnel needs of the Air Force for the future. There has been previous work done in regards to specific AFSCs and how their retention compares to specific yet similar private sector jobs. This study considers different econometric time series statistics as a feature space and an average Air Force officer separation rate as the response variable for the multivariate time series analysis deep learning techniques. The econometric indicators used in this study are New Business Formations, New Durable Good Orders, and the …


Automated Aircraft Visual Inspection With Artificial Data Generation Enabled Deep Learning, Nathan J. Gaul Mar 2022

Automated Aircraft Visual Inspection With Artificial Data Generation Enabled Deep Learning, Nathan J. Gaul

Theses and Dissertations

Aircraft visual inspection, which is essential to daily maintenance of an aircraft, is expensive and time-consuming to perform. Augmenting trained maintenance technicians with automated UAVs to collect and analyze images for aircraft inspection is an active research topic and a potential application of CNNs. Training datasets for niche research topics such as aircraft visual inspection are small and challenging to produce, and the manual process of labeling these datasets often produces subjective annotations. Recently, researchers have produced several successful applications of artificially generated datasets with domain randomization for training CNNs for real-world computer vision problems. The research outlined herein builds …


Telemetry Data Mining For Unmanned Aircraft Systems, Li Yu Mar 2022

Telemetry Data Mining For Unmanned Aircraft Systems, Li Yu

Theses and Dissertations

With ever more data becoming available to the US Air Force, it is vital to develop effective methods to leverage this strategic asset. Machine learning (ML) techniques present a means of meeting this challenge, as these tools have demonstrated successful use in commercial applications. For this research, three ML methods were applied to a unmanned aircraft system (UAS) telemetry dataset with the aim of extracting useful insight related to phases of flight. It was shown that ML provides an advantage in exploratory data analysis and as well as classification of phases. Neural network models demonstrated the best performance with over …


Analysis Of Generalized Artificial Intelligence Potential Through Reinforcement And Deep Reinforcement Learning Approaches, Jonathan Turner Mar 2022

Analysis Of Generalized Artificial Intelligence Potential Through Reinforcement And Deep Reinforcement Learning Approaches, Jonathan Turner

Theses and Dissertations

Artificial Intelligence is the next competitive domain; the first nation to develop human level artificial intelligence will have an impact similar to the development of the atomic bomb. To maintain the security of the United States and her people, the Department of Defense has funded research into the development of artificial intelligence and its applications. This research uses reinforcement learning and deep reinforcement learning methods as proxies for current and future artificial intelligence agents and to assess potential issues in development. Agent performance were compared across two games and one excursion: Cargo Loading, Tower of Hanoi, and Knapsack Problem, respectively. …


Double Cone Flow Field Reconstruction Between Mach 4 And 12 Using Machine Learning Techniques, Trevor A. Toros Mar 2022

Double Cone Flow Field Reconstruction Between Mach 4 And 12 Using Machine Learning Techniques, Trevor A. Toros

Theses and Dissertations

No abstract provided.


Using Custom Ner Models To Extract Dod Specific Entities From Contracts, Kayla P. Haberstich Dec 2021

Using Custom Ner Models To Extract Dod Specific Entities From Contracts, Kayla P. Haberstich

Theses and Dissertations

The Air Force Sustainment Center collected 3.7 million contracts onto the Air Force Research Laboratory’s high power computers. They are in the format of a .pdf or scanned document, making them unstructured data. The Data Analytics Resource Team extracted the documents into a textual format for use in further analysis. This thesis looks to extract four DOD specific entities (NSN, Part Number, CAGE Code, and Supplier Name) from the contracts using custom NER models. This newly extracted information will allow the Air Force to identify what parts are supplied by which vendors. This information along with historical CLIN pricing for …


Characterizing Convolutional Neural Network Early-Learning And Accelerating Non-Adaptive, First-Order Methods With Localized Lagrangian Restricted Memory Level Bundling, Benjamin O. Morris Sep 2021

Characterizing Convolutional Neural Network Early-Learning And Accelerating Non-Adaptive, First-Order Methods With Localized Lagrangian Restricted Memory Level Bundling, Benjamin O. Morris

Theses and Dissertations

This dissertation studies the underlying optimization problem encountered during the early-learning stages of convolutional neural networks and introduces a training algorithm competitive with existing state-of-the-art methods. First, a Design of Experiments method is introduced to systematically measure empirical second-order Lipschitz upper bound and region size estimates for local regions of convolutional neural network loss surfaces experienced during the early-learning stages. This method demonstrates that architecture choices can significantly impact the local loss surfaces traversed during training. Next, a Design of Experiments method is used to study the effects convolutional neural network architecture hyperparameters have on different optimization routines' abilities to …


Contract Information Extraction Using Machine Learning, Zachary E. Butcher Mar 2021

Contract Information Extraction Using Machine Learning, Zachary E. Butcher

Theses and Dissertations

The Air Force Sustainment Center assisted by the Data Analytics Resource Team and the Defense Logistics Agency collected four million contracts onto one of the Air Force Research Laboratory’s high power computers. This thesis focuses on the effort to determine if parts are available through those contracts. Some information is extracted using machine learning in combination with natural language processing. Where machine learning methods are unsuccessful or inappropriate, text mining techniques, such as pattern recognition and rules, are used. Upon completion, the information is combined into a Gantt chart for quick evaluation. Only 21% of the contracts have their information …


Correction Of Back Trajectories Utilizing Machine Learning, Britta F. Gjermo Morrison Mar 2021

Correction Of Back Trajectories Utilizing Machine Learning, Britta F. Gjermo Morrison

Theses and Dissertations

The goal of this work was to analyze 24-hour back trajectory performance from a global, low-resolution weather model compared to a high-resolution limited area weather model in particular meteorological regimes, or flow patterns using K-means clustering, an unsupervised machine learning technique. The duration of this study was from 2015-2019 for the contiguous United States (CONUS). Three different machine learning algorithms were tested to study the utility of these methods improving the performance of the CFS relative to the performance of the RAP. The aforementioned machine learning techniques are linear regression, Bayesian ridge regression, and random forest regression. These results mean …


Indoor Navigation Using Convolutional Neural Networks And Floor Plans, Ricky D. Anderson Mar 2021

Indoor Navigation Using Convolutional Neural Networks And Floor Plans, Ricky D. Anderson

Theses and Dissertations

The goal of this thesis is to evaluate a new indoor navigation technique by incorporating floor plans along with monocular camera images into a CNN as a potential means for identifying camera position. Building floor plans are widely available and provide potential information for localizing within the building. This work sets out to determine if a CNN can learn the architectural features of a floor plan and use that information to determine a location. In this work, a simulated indoor data set is created and used to train two CNNs. A classification CNN, which breaks up the floor plan into …


Performance Of Various Low-Level Decoder For Surface Codes In The Presence Of Measurement Error, Claire E. Badger Mar 2021

Performance Of Various Low-Level Decoder For Surface Codes In The Presence Of Measurement Error, Claire E. Badger

Theses and Dissertations

Quantum error correction is a research specialty within the area of quantum computing that constructs quantum circuits that correct for errors. Decoding is the process of using measurements from an error correcting code, known as error syndrome, to decide corrective operations to perform on the circuit. High-level decoding is the process of using the error syndrome to perform corrective logical operations, while low-level decoding uses the error syndrome to correct individual data qubits. Research on machine learning-based decoders is increasingly popular, but has not been thoroughly researched for low-level decoders. The type of error correcting code used is called surface …


Comparison Of Machine Learning Techniques On Trust Detection Using Eeg, James R. Elkins Mar 2021

Comparison Of Machine Learning Techniques On Trust Detection Using Eeg, James R. Elkins

Theses and Dissertations

Trust is a pillar of society and is a fundamental aspect in every relationship. With the use of automated agents in todays workforce exponentially growing, being able to actively monitor an individuals trust level that is working with the automation is becoming increasingly more important. Humans often have miscalibrated trust in automation and therefore are prone to making costly mistakes. Since deciding to trust or distrust has been shown to correlate with specific brain activity, it is thought that there are EEG signals which are associated with this decision. Using both a human-human trust and a human-machine trust EEG dataset …


Unsupervised Clustering Of Rf-Fingerprinting Features Derived From Deep Learning Based Recognition Models, Christian T. Potts Mar 2021

Unsupervised Clustering Of Rf-Fingerprinting Features Derived From Deep Learning Based Recognition Models, Christian T. Potts

Theses and Dissertations

RF-Fingerprinting is focus of machine learning research which aims to characterize wireless communication devices based on their physical hardware characteristics. It is a promising avenue for improving wireless communication security in the PHY layer. The bulk of research presented to date in this field is focused on the development of features and classifiers using both traditional supervised machine learning models as well as deep learning. This research aims to expand on existing RF-Fingerprinting work by approaching the problem through the lens of an unsupervised clustering problem. To that end this research proposes a deep learning model and training methodology to …


Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel Sep 2020

Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel

Theses and Dissertations

The digital communication and radar community has recently manifested more interest in using data-driven approaches for tasks such as modulation recognition, channel estimation and distortion correction. In this research we seek to apply an object detector for parameter estimation to perform waveform separation in the time and frequency domain prior to classification. This enables the full automation of detecting and classifying simultaneously occurring waveforms. We leverage a lD ResNet implemented by O'Shea et al. in [1] and the YOLO v3 object detector designed by Redmon et al. in [2]. We conducted an in depth study of the performance of these …


Event-Based Visual-Inertial Odometry Using Smart Features, Zachary P. Friedel Mar 2020

Event-Based Visual-Inertial Odometry Using Smart Features, Zachary P. Friedel

Theses and Dissertations

Event-based cameras are a novel type of visual sensor that operate under a unique paradigm, providing asynchronous data on the log-level changes in light intensity for individual pixels. This hardware-level approach to change detection allows these cameras to achieve ultra-wide dynamic range and high temporal resolution. Furthermore, the advent of convolutional neural networks (CNNs) has led to state-of-the-art navigation solutions that now rival or even surpass human engineered algorithms. The advantages offered by event cameras and CNNs make them excellent tools for visual odometry (VO). This document presents the implementation of a CNN trained to detect and describe features within …


Lightning Prediction For Space Launch Using Machine Learning Based Off Of Electric Field Mills And Lightning Detection And Ranging Data, Anson Cheng Mar 2020

Lightning Prediction For Space Launch Using Machine Learning Based Off Of Electric Field Mills And Lightning Detection And Ranging Data, Anson Cheng

Theses and Dissertations

Kennedy Space Center and Cape Canaveral Air Station, FL, where the Air Force conducts space launches, are in an area of frequent lightning strikes, which is main obstacle in meeting launch goals. The 45th Weather Squadron (45th WS) ensures that any weather safety requirements are met during pre-launch and actual space launch. Using only summer months from three years’ worth of lightning detection and ranging (LDAR) and electric field mill (EFM) data from KSC, several feedforward neural networks are constructed. Separate models are built for each EFM and trained by adjusting parameters to forecast lightning 30 minutes out in the …


Quantitative Analysis Of Evaluation Criteria For Generative Models, Marvin W. Newlin Mar 2020

Quantitative Analysis Of Evaluation Criteria For Generative Models, Marvin W. Newlin

Theses and Dissertations

Machine Learning (ML) is rapidly becoming integrated in critical aspects of cybersecurity today, particularly in the area of network intrusion/anomaly detection. However, ML techniques require large volumes of data to be effective. The available data is a critical aspect of the ML process for training, classification, and testing purposes. One solution to the problem is to generate synthetic data that is realistic. With the application of ML to this area, one promising application is the use of ML to perform the data generation. With the ability to generate synthetic data comes the need to evaluate the “realness” of the generated …


A Machine Learning Approach To Characterizing Particle Morphology In Nuclear Forensics, Daniel A. Gum Mar 2020

A Machine Learning Approach To Characterizing Particle Morphology In Nuclear Forensics, Daniel A. Gum

Theses and Dissertations

A machine learning approach is taken to characterizing a group of synthetic uranium bearing particles. SEM images of these lab-created particles were converted into a binary representation that captured morphological features in accordance with a guide established by Los Alamos National Laboratory. Each particle in the dataset contains an association with chemical creation conditions: processing method, precipitation temperature and pH, calcination temperature are most closely tied to particle morphology. Additionally, trained classifiers are able to relate final products between particles, implying that morphological features are shared between particles with similar composition.


Algorithm Selection Framework: A Holistic Approach To The Algorithm Selection Problem, Marc W. Chalé Mar 2020

Algorithm Selection Framework: A Holistic Approach To The Algorithm Selection Problem, Marc W. Chalé

Theses and Dissertations

A holistic approach to the algorithm selection problem is presented. The “algorithm selection framework" uses a combination of user input and meta-data to streamline the algorithm selection for any data analysis task. The framework removes the conjecture of the common trial and error strategy and generates a preference ranked list of recommended analysis techniques. The framework is performed on nine analysis problems. Each of the recommended analysis techniques are implemented on the corresponding data sets. Algorithm performance is assessed using the primary metric of recall and the secondary metric of run time. In six of the problems, the recall of …


Automated Detection And Mitigation Of Inefficient Visual Searching Using Electroencephalography And Machine Learning, Joshua P. Gallaher Mar 2020

Automated Detection And Mitigation Of Inefficient Visual Searching Using Electroencephalography And Machine Learning, Joshua P. Gallaher

Theses and Dissertations

Decisions made during the high-stress and fast-paced operations of the military are extremely prone to cognitive biases. A commonly known cognitive bias is a confirmation bias, or the inappropriate bolstering of an unknown hypothesis. One such critical military operation that can fall prey to a confirmation bias is a visual search. During a visual search, a military operator must perform a visual scan of an environment for a specific target. However, the visual search process can fall prey to the same confirmation bias which can cause inefficient searches. This study elicits inefficient visual search patterns and applies various mitigation techniques …