Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 108

Full-Text Articles in Engineering

Relative Vectoring Using Dual Object Detection For Autonomous Aerial Refueling, Derek B. Worth, Jeffrey L. Choate, James Lynch, Scott L. Nykl, Clark N. Taylor Mar 2024

Relative Vectoring Using Dual Object Detection For Autonomous Aerial Refueling, Derek B. Worth, Jeffrey L. Choate, James Lynch, Scott L. Nykl, Clark N. Taylor

Faculty Publications

Once realized, autonomous aerial refueling will revolutionize unmanned aviation by removing current range and endurance limitations. Previous attempts at establishing vision-based solutions have come close but rely heavily on near perfect extrinsic camera calibrations that often change midflight. In this paper, we propose dual object detection, a technique that overcomes such requirement by transforming aerial refueling imagery directly into receiver aircraft reference frame probe-to-drogue vectors regardless of camera position and orientation. These vectors are precisely what autonomous agents need to successfully maneuver the tanker and receiver aircraft in synchronous flight during refueling operations. Our method follows a common 4-stage process …


Gnss Software Defined Radio: History, Current Developments, And Standardization Efforts, Thomas Pany, Dennis Akos, Javier Arribas, M. Zahidul H. Bhuiyan, Pau Closas, Fabio Dovis, Ignacio Fernandez-Hernandez, Carles Fernandez-Prades, Sanjeev Gunawardena, Todd Humphreys, Zaher M. Kassas, Jose A. Lopez Salcedo, Mario Nicola, Mario L. Psiaki, Alexander Rugamer, Yong-Jin Song, Jong-Hoon Won Jan 2024

Gnss Software Defined Radio: History, Current Developments, And Standardization Efforts, Thomas Pany, Dennis Akos, Javier Arribas, M. Zahidul H. Bhuiyan, Pau Closas, Fabio Dovis, Ignacio Fernandez-Hernandez, Carles Fernandez-Prades, Sanjeev Gunawardena, Todd Humphreys, Zaher M. Kassas, Jose A. Lopez Salcedo, Mario Nicola, Mario L. Psiaki, Alexander Rugamer, Yong-Jin Song, Jong-Hoon Won

Faculty Publications

Taking the work conducted by the global navigation satellite system (GNSS) software-defined radio (SDR) working group during the last decade as a seed, this contribution summarizes, for the first time, the history of GNSS SDR development. This report highlights selected SDR implementations and achievements that are available to the public or that influenced the general development of SDR. Aspects related to the standardization process of intermediate-frequency sample data and metadata are discussed, and an update of the Institute of Navigation SDR Standard is proposed. This work focuses on GNSS SDR implementations in general-purpose processors and leaves aside developments conducted on …


An Analysis Of Precision: Occlusion And Perspective Geometry’S Role In 6d Pose Estimation, Jeffrey Choate, Derek Worth, Scott Nykl, Clark N. Taylor, Brett J. Borghetti, Christine M. Schubert Kabban Jan 2024

An Analysis Of Precision: Occlusion And Perspective Geometry’S Role In 6d Pose Estimation, Jeffrey Choate, Derek Worth, Scott Nykl, Clark N. Taylor, Brett J. Borghetti, Christine M. Schubert Kabban

Faculty Publications

Achieving precise 6 degrees of freedom (6D) pose estimation of rigid objects from color images is a critical challenge with wide-ranging applications in robotics and close-contact aircraft operations. This study investigates key techniques in the application of YOLOv5 object detection convolutional neural network (CNN) for 6D pose localization of aircraft using only color imagery. Traditional object detection labeling methods suffer from inaccuracies due to perspective geometry and being limited to visible key points. This research demonstrates that with precise labeling, a CNN can predict object features with near-pixel accuracy, effectively learning the distinct appearance of the object due to perspective …


Analysis And Requirement Generation For Defense Intelligence Search: Addressing Data Overload Through Human–Ai Agent System Design For Ambient Awareness, Mark C. Duncan, Michael E. Miller, Brett J. Borghetti Nov 2023

Analysis And Requirement Generation For Defense Intelligence Search: Addressing Data Overload Through Human–Ai Agent System Design For Ambient Awareness, Mark C. Duncan, Michael E. Miller, Brett J. Borghetti

Faculty Publications

This research addresses the data overload faced by intelligence searchers in government and defense agencies. The study leverages methods from the Cognitive Systems Engineering (CSE) literature to generate insights into the intelligence search work domain. These insights are applied to a supporting concept and requirements for designing and evaluating a human-AI agent team specifically for intelligence search tasks. Domain analysis reveals the dynamic nature of the ‘value structure’, a term that describes the evolving set of criteria governing the intelligence search process. Additionally, domain insight provides details for search aggregation and conceptual spaces from which the value structure could be …


The Characteristics Of Successful Military It Projects: A Cross-Country Empirical Study, Helene Berg, Jonathan D. Ritschel Jul 2023

The Characteristics Of Successful Military It Projects: A Cross-Country Empirical Study, Helene Berg, Jonathan D. Ritschel

Faculty Publications

No abstract provided.


Drone Detection Using Yolov5, Burchan Aydin, Subroto Singha Feb 2023

Drone Detection Using Yolov5, Burchan Aydin, Subroto Singha

Faculty Publications

The rapidly increasing number of drones in the national airspace, including those for recreational and commercial applications, has raised concerns regarding misuse. Autonomous drone detection systems offer a probable solution to overcoming the issue of potential drone misuse, such as drug smuggling, violating people’s privacy, etc. Detecting drones can be difficult, due to similar objects in the sky, such as airplanes and birds. In addition, automated drone detection systems need to be trained with ample amounts of data to provide high accuracy. Real-time detection is also necessary, but this requires highly configured devices such as a graphical processing unit (GPU). …


Data Augmentation For Neutron Spectrum Unfolding With Neural Networks, James Mcgreivy, Juan J. Manfredi, Daniel Siefman Jan 2023

Data Augmentation For Neutron Spectrum Unfolding With Neural Networks, James Mcgreivy, Juan J. Manfredi, Daniel Siefman

Faculty Publications

Neural networks require a large quantity of training spectra and detector responses in order to learn to solve the inverse problem of neutron spectrum unfolding. In addition, due to the under-determined nature of unfolding, non-physical spectra which would not be encountered in usage should not be included in the training set. While physically realistic training spectra are commonly determined experimentally or generated through Monte Carlo simulation, this can become prohibitively expensive when considering the quantity of spectra needed to effectively train an unfolding network. In this paper, we present three algorithms for the generation of large quantities of realistic and …


Accelerating A Software Defined Satnav Receiver Using Multiple Parallel Processing Schemes, Logan Reich, Sanjeev Gunawardena, Michael Braasch Jan 2023

Accelerating A Software Defined Satnav Receiver Using Multiple Parallel Processing Schemes, Logan Reich, Sanjeev Gunawardena, Michael Braasch

Faculty Publications

Excerpt: Satnav SDRs present many benefits in terms of flexibility and configurability. However, due to the high bandwidth signals involved in satnav SDR processing, the software must be highly optimized for the host platform in order to achieve acceptable runtimes. Modules such as sample decoding, carrier replica generation, carrier wipeoff, and correlation are computationally intensive components that benefit from accelerations.


Quantifying Dds-Cerberus Network Control Overhead, Andrew T. Park, Nathaniel R. Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry Sep 2022

Quantifying Dds-Cerberus Network Control Overhead, Andrew T. Park, Nathaniel R. Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry

Faculty Publications

Securing distributed device communication is critical because the private industry and the military depend on these resources. One area that adversaries target is the middleware, which is the medium that connects different systems. This paper evaluates a novel security layer, DDS-Cerberus (DDS-C), that protects in-transit data and improves communication efficiency on data-first distribution systems. This research contributes a distributed robotics operating system testbed and designs a multifactorial performance-based experiment to evaluate DDS-C efficiency and security by assessing total packet traffic generated in a robotics network. The performance experiment follows a 2:1 publisher to subscriber node ratio, varying the number of …


Distribution Of Dds-Cerberus Authenticated Facial Recognition Streams, Andrew T. Park, Nathaniel Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry Sep 2022

Distribution Of Dds-Cerberus Authenticated Facial Recognition Streams, Andrew T. Park, Nathaniel Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry

Faculty Publications

Successful missions in the field often rely upon communication technologies for tactics and coordination. One middleware used in securing these communication channels is Data Distribution Service (DDS) which employs a publish-subscribe model. However, researchers have found several security vulnerabilities in DDS implementations. DDS-Cerberus (DDS-C) is a security layer implemented into DDS to mitigate impersonation attacks using Kerberos authentication and ticketing. Even with the addition of DDS-C, the real-time message sending of DDS also needs to be upheld. This paper extends our previous work to analyze DDS-C’s impact on performance in a use case implementation. The use case covers an artificial …


Artificial Neural Networks And Gradient Boosted Machines Used For Regression To Evaluate Gasification Processes: A Review, Owen Sedej, Eric Mbonimpa, Trevor Sleight, Jeremy M. Slagley Aug 2022

Artificial Neural Networks And Gradient Boosted Machines Used For Regression To Evaluate Gasification Processes: A Review, Owen Sedej, Eric Mbonimpa, Trevor Sleight, Jeremy M. Slagley

Faculty Publications

Waste-to-Energy technologies have the potential to dramatically improve both the natural and human environment. One type of waste-to-energy technology that has been successful is gasification. There are numerous types of gasification processes and in order to drive understanding and the optimization of these systems, traditional approaches like computational fluid dynamics software have been utilized to model these systems. The modern advent of machine learning models has allowed for accurate and computationally efficient predictions for gasification systems that are informed by numerous experimental and numerical solutions. Two types of machine learning models that have been widely used to solve for quantitative …


A Monte Carlo Framework For Incremental Improvement Of Simulation Fidelity, Damian Lyons, James Finocchiaro, Misha Novitsky, Chris Korpela Jul 2022

A Monte Carlo Framework For Incremental Improvement Of Simulation Fidelity, Damian Lyons, James Finocchiaro, Misha Novitsky, Chris Korpela

Faculty Publications

Robot software developed in simulation often does not be- have as expected when deployed because the simulation does not sufficiently represent reality - this is sometimes called the `reality gap' problem. We propose a novel algorithm to address the reality gap by injecting real-world experience into the simulation. It is assumed that the robot program (control policy) is developed using simulation, but subsequently deployed on a real system, and that the program includes a performance objective monitor procedure with scalar output. The proposed approach collects simulation and real world observations and builds conditional probability functions. These are used to generate …


A Unified View Of A Human Digital Twin, Michael Miller, Emily Spatz Jun 2022

A Unified View Of A Human Digital Twin, Michael Miller, Emily Spatz

Faculty Publications

The term human digital twin has recently been applied in many domains, including medical and manufacturing. This term extends the digital twin concept, which has been illustrated to provide enhanced system performance as it combines system models and analyses with real-time measurements for an individual system to improve system maintenance. Human digital twins have the potential to change the practice of human system integration as these systems employ real-time sensing and feedback to tightly couple measurements of human performance, behavior, and environmental influences throughout a product’s life cycle to human models to improve system design and performance. However, as this …


Visual Homing For Robot Teams: Do You See What I See?, Damian Lyons, Noah Petzinger Apr 2022

Visual Homing For Robot Teams: Do You See What I See?, Damian Lyons, Noah Petzinger

Faculty Publications

Visual homing is a lightweight approach to visual navigation which does not require GPS. It is very attractive for robot platforms with a low computational capacity. However, a limitation is that the stored home location must be initially within the field of view of the robot. Motivated by the increasing ubiquity of camera information we propose to address this line-of-sight limitation by leveraging camera information from other robots and fixed cameras. To home to a location that is not initially within view, a robot must be able to identify a common visual landmark with another robot that can be used …


Considerations For Radio Frequency Fingerprinting Across Multiple Frequency Channels, Jose A. Gutierrez Del Arroyo, Brett J. Borghetti, Michael A. Temple Mar 2022

Considerations For Radio Frequency Fingerprinting Across Multiple Frequency Channels, Jose A. Gutierrez Del Arroyo, Brett J. Borghetti, Michael A. Temple

Faculty Publications

Radio Frequency Fingerprinting (RFF) is often proposed as an authentication mechanism for wireless device security, but application of existing techniques in multi-channel scenarios is limited because prior models were created and evaluated using bursts from a single frequency channel without considering the effects of multi-channel operation. Our research evaluated the multi-channel performance of four single-channel models with increasing complexity, to include a simple discriminant analysis model and three neural networks. Performance characterization using the multi-class Matthews Correlation Coefficient (MCC) revealed that using frequency channels other than those used to train the models can lead to a deterioration in performance from …


Robust Error Estimation Based On Factor-Graph Models For Non-Line-Of-Sight Localization, O. Arda Vanli, Clark N. Taylor Jan 2022

Robust Error Estimation Based On Factor-Graph Models For Non-Line-Of-Sight Localization, O. Arda Vanli, Clark N. Taylor

Faculty Publications

This paper presents a method to estimate the covariances of the inputs in a factor-graph formulation for localization under non-line-of-sight conditions. A general solution based on covariance estimation and M-estimators in linear regression problems, is presented that is shown to give unbiased estimators of multiple variances and are robust against outliers. An iteratively re-weighted least squares algorithm is proposed to jointly compute the proposed variance estimators and the state estimates for the nonlinear factor graph optimization. The efficacy of the method is illustrated in a simulation study using a robot localization problem under various process and measurement models and measurement …


Effect Of Connection State & Transport/Application Protocol On The Machine Learning Outlier Detection Of Network Intrusions, George Yuchi [*], Torrey J. Wagner, Paul Auclair, Brent T. Langhals Jan 2022

Effect Of Connection State & Transport/Application Protocol On The Machine Learning Outlier Detection Of Network Intrusions, George Yuchi [*], Torrey J. Wagner, Paul Auclair, Brent T. Langhals

Faculty Publications

The majority of cyber infiltration & exfiltration intrusions leave a network footprint, and due to the multi-faceted nature of detecting network intrusions, it is often difficult to detect. In this work a Zeek-processed PCAP dataset containing the metadata of 36,667 network packets was modeled with several machine learning algorithms to classify normal vs. anomalous network activity. Principal component analysis with a 10% contamination factor was used to identify anomalous behavior. Models were created using recursive feature elimination on logistic regression and XGBClassifier algorithms, and also using Bayesian and bandit optimization of neural network hyperparameters. These models were trained on a …


Machine Learning Land Cover And Land Use Classification Of 4-Band Satellite Imagery, Lorelei Turner [*], Torrey J. Wagner, Paul Auclair, Brent T. Langhals Jan 2022

Machine Learning Land Cover And Land Use Classification Of 4-Band Satellite Imagery, Lorelei Turner [*], Torrey J. Wagner, Paul Auclair, Brent T. Langhals

Faculty Publications

Land-cover and land-use classification generates categories of terrestrial features, such as water or trees, which can be used to track how land is used. This work applies classical, ensemble and neural network machine learning algorithms to a multispectral remote sensing dataset containing 405,000 28x28 pixel image patches in 4 electromagnetic frequency bands. For each algorithm, model metrics and prediction execution time were evaluated, resulting in two families of models; fast and precise. The prediction time for an 81,000-patch group of predictions wasmodels, and >5s for the precise models, and there was not a significant change in prediction time when a …


Traffic Collision Avoidance System: False Injection Viability, John Hannah, Robert F. Mills, Richard A. Dill, Douglas D. Hodson Nov 2021

Traffic Collision Avoidance System: False Injection Viability, John Hannah, Robert F. Mills, Richard A. Dill, Douglas D. Hodson

Faculty Publications

Safety is a simple concept but an abstract task, specifically with aircraft. One critical safety system, the Traffic Collision Avoidance System II (TCAS), protects against mid-air collisions by predicting the course of other aircraft, determining the possibility of collision, and issuing a resolution advisory for avoidance. Previous research to identify vulnerabilities associated with TCAS’s communication processes discovered that a false injection attack presents the most comprehensive risk to veritable trust in TCAS, allowing for a mid-air collision. This research explores the viability of successfully executing a false injection attack against a target aircraft, triggering a resolution advisory. Monetary constraints precluded …


High-Throughput Discovery Of Novel Cubic Crystal Materials Using Deep Generative Neural Networks, Yong Zhao, Mohammed Al-Fahdi, Ming Hu, Edirisuriya M.D. Siriwardane, Yuqi Song, Alireza Nasiri, Jianjun Hu Aug 2021

High-Throughput Discovery Of Novel Cubic Crystal Materials Using Deep Generative Neural Networks, Yong Zhao, Mohammed Al-Fahdi, Ming Hu, Edirisuriya M.D. Siriwardane, Yuqi Song, Alireza Nasiri, Jianjun Hu

Faculty Publications

High-throughput screening has become one of the major strategies for the discovery of novel functional materials. However, its effectiveness is severely limited by the lack of sufficient and diverse materials in current materials repositories such as the open quantum materials database (OQMD). Recent progress in deep learning have enabled generative strategies that learn implicit chemical rules for creating hypothetical materials with new compositions and structures. However, current materials generative models have difficulty in generating structurally diverse, chemically valid, and stable materials. Here we propose CubicGAN, a generative adversarial network (GAN) based deep neural network model for large scale generative design …


Synthetic Aperture Radar Image Recognition Of Armored Vehicles, Christopher Szul [*], Torrey J. Wagner, Brent T. Langhals Jun 2021

Synthetic Aperture Radar Image Recognition Of Armored Vehicles, Christopher Szul [*], Torrey J. Wagner, Brent T. Langhals

Faculty Publications

Synthetic Aperture Radar (SAR) imagery is not affected by weather and allows for day-and-night observations, however it can be difficult to interpret. This work applies classical and neural network machine learning techniques to perform image classification of SAR imagery. The Moving and Stationary Target Acquisition and Recognition dataset from the Air Force Research Laboratory was used, which contained 2,987 total observations of the BMP-2, BTR-70, and T-72 vehicles. Using a 75%/25% train/test split, the classical model achieved an average multi-class image recognition accuracy of 70%, while a convolutional neural network was able to achieve a 97% accuracy with lower model …


Mlatticeabc: Generic Lattice Constant Prediction Of Crystal Materials Using Machine Learning, Yuxin Li, Wenhui Yang, Rongzhi Dong, Jianjun Hu Apr 2021

Mlatticeabc: Generic Lattice Constant Prediction Of Crystal Materials Using Machine Learning, Yuxin Li, Wenhui Yang, Rongzhi Dong, Jianjun Hu

Faculty Publications

Lattice constants such as unit cell edge lengths and plane angles are important parameters of the periodic structures of crystal materials. Predicting crystal lattice constants has wide applications in crystal structure prediction and materials property prediction. Previous work has used machine learning models such as neural networks and support vector machines combined with composition features for lattice constant prediction and has achieved a maximum performance for cubic structures with an average coefficient of determination (R2) of 0.82. Other models tailored for special materials family of a fixed form such as ABX3 perovskites can achieve much higher performance due …


Unified Multi-Objective Genetic Algorithm For Energy Efficient Job Shop Scheduling, Hongjong Wei, Shaobo Li, Huageng Quan, Dacheng Liu, Shu Rao, Chuanjiang Li, Jianjun Hu Apr 2021

Unified Multi-Objective Genetic Algorithm For Energy Efficient Job Shop Scheduling, Hongjong Wei, Shaobo Li, Huageng Quan, Dacheng Liu, Shu Rao, Chuanjiang Li, Jianjun Hu

Faculty Publications

In recent years, people have paid more and more attention to traditional manufacturing’s environmental impact, especially in terms of energy consumption and related emissions of carbon dioxide. Except for adopting new equipment, production scheduling could play an important role in reducing the total energy consumption of a manufacturing plant. Machine tools waste a considerable amount of energy because of their underutilization. Consequently, energy saving can be achieved by switching machines to standby or off when they lay idle for a comparatively long period. Herein, we first introduce the objectives of minimizing non-processing energy consumption, total weighted tardiness and earliness, and …


Identify Rna-Associated Subcellular Localizations Based On Multi-Label Learning Using Chou’S 5-Steps Rule, Hao Wang, Yijie Ding, Jijun Tang Ph.D., Quan Zou, Fei Guo Jan 2021

Identify Rna-Associated Subcellular Localizations Based On Multi-Label Learning Using Chou’S 5-Steps Rule, Hao Wang, Yijie Ding, Jijun Tang Ph.D., Quan Zou, Fei Guo

Faculty Publications

Background: Biological functions of biomolecules rely on the cellular compartments where they are located in cells. Importantly, RNAs are assigned in specific locations of a cell, enabling the cell to implement diverse biochemical processes in the way of concurrency. However, lots of existing RNA subcellular localization classifiers only solve the problem of single-label classification. It is of great practical significance to expand RNA subcellular localization into multi-label classification problem.

Results: In this study, we extract multi-label classification datasets about RNA-associated subcellular localizations on various types of RNAs, and then construct subcellular localization datasets on four RNA categories. In order to …


Agile Software Development: Creating A Cost Of Delay Framework For Air Force Software Factories, J. Goljan, Jonathan D. Ritschel, Scott Drylie, Edward D. White Jan 2021

Agile Software Development: Creating A Cost Of Delay Framework For Air Force Software Factories, J. Goljan, Jonathan D. Ritschel, Scott Drylie, Edward D. White

Faculty Publications

The Air Force software development environment is experiencing a paradigm shift. The 2019 Defense Innovation Board concluded that speed and cycle time must become the most important software metrics if the US military is to maintain its advantage over adversaries.1 This article proposes utilizing a cost-o­f-d­elay (CoD) framework to prioritize projects toward optimizing readiness. Cost-­of-d­elay is defined as the economic impact resulting from a delaying product delivery or, said another way, opportunity cost. In principle, CoD assesses the negative impacts resulting from changes to the priority of a project.


A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak Sep 2020

A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak

Faculty Publications

Wireless underground sensor networks (WUSNs) are becoming ubiquitous in many areas. The design of robust systems requires extensive understanding of the underground (UG) channel characteristics. In this paper, an UG channel impulse response is modeled and validated via extensive experiments in indoor and field testbed settings. The three distinct types of soils are selected with sand and clay contents ranging from $13\%$ to $86\%$ and $3\%$ to $32\%$, respectively. The impacts of changes in soil texture and soil moisture are investigated with more than $1,200$ measurements in a novel UG testbed that allows flexibility in soil moisture control. Moreover, the …


Cyberspace Odyssey: A Competitive Team-Oriented Serious Game In Computer Networking, Kendra Graham [I], James Anderson [I], Conrad Rife [I], Bryce Heitmeyer [I], Pranav R. Patel [*], Scott L. Nykl, Alan C. Lin, Laurence D. Merkle Jul 2020

Cyberspace Odyssey: A Competitive Team-Oriented Serious Game In Computer Networking, Kendra Graham [I], James Anderson [I], Conrad Rife [I], Bryce Heitmeyer [I], Pranav R. Patel [*], Scott L. Nykl, Alan C. Lin, Laurence D. Merkle

Faculty Publications

Cyber Space Odyssey (CSO) is a novel serious game supporting computer networking education by engaging students in a race to successfully perform various cybersecurity tasks in order to collect clues and solve a puzzle in virtual near-Earth 3D space. Each team interacts with the game server through a dedicated client presenting a multimodal interface, using a game controller for navigation and various desktop computer networking tools of the trade for cybersecurity tasks on the game's physical network. Specifically, teams connect to wireless access points, use packet monitors to intercept network traffic, decrypt and reverse engineer that traffic, craft well-formed and …


A Physics-Based Machine Learning Study Of The Behavior Of Interstitial Helium In Single Crystal W–Mo Binary Alloys, Adib J. Samin May 2020

A Physics-Based Machine Learning Study Of The Behavior Of Interstitial Helium In Single Crystal W–Mo Binary Alloys, Adib J. Samin

Faculty Publications

In this work, the behavior of dilute interstitial helium in W–Mo binary alloys was explored through the application of a first principles-informed neural network (NN) in order to study the early stages of helium-induced damage and inform the design of next generation materials for fusion reactors. The neural network (NN) was trained using a database of 120 density functional theory (DFT) calculations on the alloy. The DFT database of computed solution energies showed a linear dependence on the composition of the first nearest neighbor metallic shell. This NN was then employed in a kinetic Monte Carlo simulation, which took into …


Using Taint Analysis And Reinforcement Learning (Tarl) To Repair Autonomous Robot Software, Damian Lyons, Saba Zahra May 2020

Using Taint Analysis And Reinforcement Learning (Tarl) To Repair Autonomous Robot Software, Damian Lyons, Saba Zahra

Faculty Publications

It is important to be able to establish formal performance bounds for autonomous systems. However, formal verification techniques require a model of the environment in which the system operates; a challenge for autonomous systems, especially those expected to operate over longer timescales. This paper describes work in progress to automate the monitor and repair of ROS-based autonomous robot software written for an a-priori partially known and possibly incorrect environment model. A taint analysis method is used to automatically extract the data-flow sequence from input topic to publish topic, and instrument that code. A unique reinforcement learning approximation of MDP utility …


A New Ectotherm 3d Tracking And Behavior Analytics System Using A Depth-Based Approach With Color Validation, With Preliminary Data On Kihansi Spray Toad (Nectophrynoides Asperginis) Activity, Philip Bal, Damian Lyons, Avishai Shuter Mar 2020

A New Ectotherm 3d Tracking And Behavior Analytics System Using A Depth-Based Approach With Color Validation, With Preliminary Data On Kihansi Spray Toad (Nectophrynoides Asperginis) Activity, Philip Bal, Damian Lyons, Avishai Shuter

Faculty Publications

The Kihansi spray toad (Nectophrynoides asperginis), classified as Extinct in the Wild by the IUCN, is being bred at the Wildlife Conservation Society’s (WCS) Bronx Zoo as part of an effort to successfully reintroduce the species into the wild. Thousands of toads live at the Bronx Zoo presenting an opportunity to learn more about their behaviors for the first time, at scale. It is impractical to perform manual observations for long periods of time. This paper reports on the development of a RGB-D tracking and analytics approach that allows researchers to accurately and efficiently gather information about the toads’ behavior. …