Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 39

Full-Text Articles in Physical Sciences and Mathematics

Characterizing Location-Based Electromagnetic Leakage Of Computing Devices Using Convolutional Neural Networks To Increase The Effectiveness Of Side-Channel Analysis Attacks, Ian C. Heffron Mar 2023

Characterizing Location-Based Electromagnetic Leakage Of Computing Devices Using Convolutional Neural Networks To Increase The Effectiveness Of Side-Channel Analysis Attacks, Ian C. Heffron

Theses and Dissertations

SCA attacks aim to recover some sort of secret information, often in the form of a cipher key, from a target device. Some of these attacks focus on either power-based leakage, or EM-based leakage. Neural networks have recently gained in popularity as tools in SCA attacks. Near-field EM probes with high-spatial resolution enable attackers to isolate physical locations above a processor. This enables attackers to exploit the spatial dependencies of algorithms running on said processor. These spatial dependencies result in different physical locations above a chip emanating different signal strengths. The strengths of different locations can be mapped using the …


Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug Sep 2022

Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug

Theses and Dissertations

Modern multi-tasking computer systems run numerous applications simultaneously. These applications must share hardware resources including the Central Processing Unit (CPU) and memory while maximizing each application’s performance. Tasks executing in this shared environment leave residue which should not reveal information. This dissertation applies machine learning and statistical analysis to evaluate task residue as footprints which can be correlated to identify tasks. The concept of privilege strata, drawn from an analogy with physical geology, organizes the investigation into the User, Operating System, and Hardware privilege strata. In the User Stratum, an adversary perspective is taken to build an interrogator program that …


Enabling Rapid Chemical Analysis Of Plutonium Alloys Via Machine Learning-Enhanced Atomic Spectroscopy Techniques, Ashwin P. Rao Sep 2022

Enabling Rapid Chemical Analysis Of Plutonium Alloys Via Machine Learning-Enhanced Atomic Spectroscopy Techniques, Ashwin P. Rao

Theses and Dissertations

Analytical atomic spectroscopy methods have the potential to provide solutions for rapid, high fidelity chemical analysis of plutonium alloys. Implementing these methods with advanced analytical techniques can help reduce the chemical analysis time needed for plutonium pit production, directly enabling the 80 pit-per-year by 2030 manufacturing goal outlined in the 2018 Nuclear Posture Review. Two commercial, handheld elemental analyzers were validated for potential in situ analysis of Pu. A handheld XRF device was able to detect gallium in a Pu surrogate matrix with a detection limit of 0.002 wt% and a mean error of 8%. A handheld LIBS device was …


Leveraging Subject Matter Expertise To Optimize Machine Learning Techniques For Air And Space Applications, Philip Y. Cho Sep 2022

Leveraging Subject Matter Expertise To Optimize Machine Learning Techniques For Air And Space Applications, Philip Y. Cho

Theses and Dissertations

We develop new machine learning and statistical methods that are tailored for Air and Space applications through the incorporation of subject matter expertise. In particular, we focus on three separate research thrusts that each represents a different type of subject matter knowledge, modeling approach, and application. In our first thrust, we incorporate knowledge of natural phenomena to design a neural network algorithm for localizing point defects in transmission electron microscopy (TEM) images of crystalline materials. In our second research thrust, we use Bayesian feature selection and regression to analyze the relationship between fighter pilot attributes and flight mishap rates. We …


Improving Anonymized Search Relevance With Natural Language Processing And Machine Learning, Niko A. Petrocelli Mar 2022

Improving Anonymized Search Relevance With Natural Language Processing And Machine Learning, Niko A. Petrocelli

Theses and Dissertations

Users often sacrifice personal data for more relevant search results, presenting a problem to communities that desire both search anonymity and relevant results. To balance these priorities, this research examines the impact of using Siamese networks to extend word embeddings into document embeddings and detect similarities between documents. The predicted similarity can locally re-rank search results provided from various sources. This technique is leveraged to limit the amount of information collected from a user by a search engine. A prototype is produced by applying the methodology in a real-world search environment. The prototype yielded an additional function of finding new …


Telemetry Data Mining For Unmanned Aircraft Systems, Li Yu Mar 2022

Telemetry Data Mining For Unmanned Aircraft Systems, Li Yu

Theses and Dissertations

With ever more data becoming available to the US Air Force, it is vital to develop effective methods to leverage this strategic asset. Machine learning (ML) techniques present a means of meeting this challenge, as these tools have demonstrated successful use in commercial applications. For this research, three ML methods were applied to a unmanned aircraft system (UAS) telemetry dataset with the aim of extracting useful insight related to phases of flight. It was shown that ML provides an advantage in exploratory data analysis and as well as classification of phases. Neural network models demonstrated the best performance with over …


Smoothing Of Convolutional Neural Network Classifications, Glen R. Drumm Mar 2022

Smoothing Of Convolutional Neural Network Classifications, Glen R. Drumm

Theses and Dissertations

Smoothing convolutional neural networks is investigated. When intermittent and random false predictions happen, a technique of average smoothing is applied to smooth out the incorrect predictions. While a simple problem environment shows proof of concept, obstacles remain for applying such a technique to a more operationally complex problem.


Double Cone Flow Field Reconstruction Between Mach 4 And 12 Using Machine Learning Techniques, Trevor A. Toros Mar 2022

Double Cone Flow Field Reconstruction Between Mach 4 And 12 Using Machine Learning Techniques, Trevor A. Toros

Theses and Dissertations

No abstract provided.


Incorporating Armed Escorts To The Military Medical Evacuation Dispatching Problem Via Stochastic Optimization And Reinforcement Learning, Andrew G. Gelbard Mar 2022

Incorporating Armed Escorts To The Military Medical Evacuation Dispatching Problem Via Stochastic Optimization And Reinforcement Learning, Andrew G. Gelbard

Theses and Dissertations

The military medical evacuation (MEDEVAC) dispatching problem seeks to determine high-quality dispatching policies to maximize the survivability of casualties within contingency operations. This research leverages applied operations research and machine learning techniques to solve the MEDEVAC dispatching problem and evaluate system performance. More specifically, we develop an infinite-horizon, continuous-time Markov decision process (MDP) model and approximate dynamic programming (ADP) solution approach to generate high-quality policies. The ADP solution approach utilizes an approximate value iteration algorithm strategy incorporating gradient descent Q-learning to approximate the value function. A notional, synthetically-generated scenario in Africa based around the capital city of Niger, Niamey is …


Automated Aircraft Visual Inspection With Artificial Data Generation Enabled Deep Learning, Nathan J. Gaul Mar 2022

Automated Aircraft Visual Inspection With Artificial Data Generation Enabled Deep Learning, Nathan J. Gaul

Theses and Dissertations

Aircraft visual inspection, which is essential to daily maintenance of an aircraft, is expensive and time-consuming to perform. Augmenting trained maintenance technicians with automated UAVs to collect and analyze images for aircraft inspection is an active research topic and a potential application of CNNs. Training datasets for niche research topics such as aircraft visual inspection are small and challenging to produce, and the manual process of labeling these datasets often produces subjective annotations. Recently, researchers have produced several successful applications of artificially generated datasets with domain randomization for training CNNs for real-world computer vision problems. The research outlined herein builds …


Application Of Machine Learning Models With Numerical Simulations Of An Experimental Microwave Induced Plasma Gasification Reactor, Owen D. Sedej Mar 2022

Application Of Machine Learning Models With Numerical Simulations Of An Experimental Microwave Induced Plasma Gasification Reactor, Owen D. Sedej

Theses and Dissertations

This thesis aims to contribute to the future development of this technology by providing an in-depth literature review of how this technology physically operates and can be numerically modeled. Additionally, this thesis reviews literature of machine learning models that have been applied to gasification to make accurate predictions regarding the system. Finally, this thesis provides a framework of how to numerically model an experimental plasma gasification reactor in order to inform a variety of machine learning models.


Analysis Of Generalized Artificial Intelligence Potential Through Reinforcement And Deep Reinforcement Learning Approaches, Jonathan Turner Mar 2022

Analysis Of Generalized Artificial Intelligence Potential Through Reinforcement And Deep Reinforcement Learning Approaches, Jonathan Turner

Theses and Dissertations

Artificial Intelligence is the next competitive domain; the first nation to develop human level artificial intelligence will have an impact similar to the development of the atomic bomb. To maintain the security of the United States and her people, the Department of Defense has funded research into the development of artificial intelligence and its applications. This research uses reinforcement learning and deep reinforcement learning methods as proxies for current and future artificial intelligence agents and to assess potential issues in development. Agent performance were compared across two games and one excursion: Cargo Loading, Tower of Hanoi, and Knapsack Problem, respectively. …


Characterizing Convolutional Neural Network Early-Learning And Accelerating Non-Adaptive, First-Order Methods With Localized Lagrangian Restricted Memory Level Bundling, Benjamin O. Morris Sep 2021

Characterizing Convolutional Neural Network Early-Learning And Accelerating Non-Adaptive, First-Order Methods With Localized Lagrangian Restricted Memory Level Bundling, Benjamin O. Morris

Theses and Dissertations

This dissertation studies the underlying optimization problem encountered during the early-learning stages of convolutional neural networks and introduces a training algorithm competitive with existing state-of-the-art methods. First, a Design of Experiments method is introduced to systematically measure empirical second-order Lipschitz upper bound and region size estimates for local regions of convolutional neural network loss surfaces experienced during the early-learning stages. This method demonstrates that architecture choices can significantly impact the local loss surfaces traversed during training. Next, a Design of Experiments method is used to study the effects convolutional neural network architecture hyperparameters have on different optimization routines' abilities to …


Performance Of Various Low-Level Decoder For Surface Codes In The Presence Of Measurement Error, Claire E. Badger Mar 2021

Performance Of Various Low-Level Decoder For Surface Codes In The Presence Of Measurement Error, Claire E. Badger

Theses and Dissertations

Quantum error correction is a research specialty within the area of quantum computing that constructs quantum circuits that correct for errors. Decoding is the process of using measurements from an error correcting code, known as error syndrome, to decide corrective operations to perform on the circuit. High-level decoding is the process of using the error syndrome to perform corrective logical operations, while low-level decoding uses the error syndrome to correct individual data qubits. Research on machine learning-based decoders is increasingly popular, but has not been thoroughly researched for low-level decoders. The type of error correcting code used is called surface …


Comparison Of Machine Learning Techniques On Trust Detection Using Eeg, James R. Elkins Mar 2021

Comparison Of Machine Learning Techniques On Trust Detection Using Eeg, James R. Elkins

Theses and Dissertations

Trust is a pillar of society and is a fundamental aspect in every relationship. With the use of automated agents in todays workforce exponentially growing, being able to actively monitor an individuals trust level that is working with the automation is becoming increasingly more important. Humans often have miscalibrated trust in automation and therefore are prone to making costly mistakes. Since deciding to trust or distrust has been shown to correlate with specific brain activity, it is thought that there are EEG signals which are associated with this decision. Using both a human-human trust and a human-machine trust EEG dataset …


Indoor Navigation Using Convolutional Neural Networks And Floor Plans, Ricky D. Anderson Mar 2021

Indoor Navigation Using Convolutional Neural Networks And Floor Plans, Ricky D. Anderson

Theses and Dissertations

The goal of this thesis is to evaluate a new indoor navigation technique by incorporating floor plans along with monocular camera images into a CNN as a potential means for identifying camera position. Building floor plans are widely available and provide potential information for localizing within the building. This work sets out to determine if a CNN can learn the architectural features of a floor plan and use that information to determine a location. In this work, a simulated indoor data set is created and used to train two CNNs. A classification CNN, which breaks up the floor plan into …


Unsupervised Clustering Of Rf-Fingerprinting Features Derived From Deep Learning Based Recognition Models, Christian T. Potts Mar 2021

Unsupervised Clustering Of Rf-Fingerprinting Features Derived From Deep Learning Based Recognition Models, Christian T. Potts

Theses and Dissertations

RF-Fingerprinting is focus of machine learning research which aims to characterize wireless communication devices based on their physical hardware characteristics. It is a promising avenue for improving wireless communication security in the PHY layer. The bulk of research presented to date in this field is focused on the development of features and classifiers using both traditional supervised machine learning models as well as deep learning. This research aims to expand on existing RF-Fingerprinting work by approaching the problem through the lens of an unsupervised clustering problem. To that end this research proposes a deep learning model and training methodology to …


Contract Information Extraction Using Machine Learning, Zachary E. Butcher Mar 2021

Contract Information Extraction Using Machine Learning, Zachary E. Butcher

Theses and Dissertations

The Air Force Sustainment Center assisted by the Data Analytics Resource Team and the Defense Logistics Agency collected four million contracts onto one of the Air Force Research Laboratory’s high power computers. This thesis focuses on the effort to determine if parts are available through those contracts. Some information is extracted using machine learning in combination with natural language processing. Where machine learning methods are unsuccessful or inappropriate, text mining techniques, such as pattern recognition and rules, are used. Upon completion, the information is combined into a Gantt chart for quick evaluation. Only 21% of the contracts have their information …


Correction Of Back Trajectories Utilizing Machine Learning, Britta F. Gjermo Morrison Mar 2021

Correction Of Back Trajectories Utilizing Machine Learning, Britta F. Gjermo Morrison

Theses and Dissertations

The goal of this work was to analyze 24-hour back trajectory performance from a global, low-resolution weather model compared to a high-resolution limited area weather model in particular meteorological regimes, or flow patterns using K-means clustering, an unsupervised machine learning technique. The duration of this study was from 2015-2019 for the contiguous United States (CONUS). Three different machine learning algorithms were tested to study the utility of these methods improving the performance of the CFS relative to the performance of the RAP. The aforementioned machine learning techniques are linear regression, Bayesian ridge regression, and random forest regression. These results mean …


Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel Sep 2020

Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel

Theses and Dissertations

The digital communication and radar community has recently manifested more interest in using data-driven approaches for tasks such as modulation recognition, channel estimation and distortion correction. In this research we seek to apply an object detector for parameter estimation to perform waveform separation in the time and frequency domain prior to classification. This enables the full automation of detecting and classifying simultaneously occurring waveforms. We leverage a lD ResNet implemented by O'Shea et al. in [1] and the YOLO v3 object detector designed by Redmon et al. in [2]. We conducted an in depth study of the performance of these …


Event-Based Visual-Inertial Odometry Using Smart Features, Zachary P. Friedel Mar 2020

Event-Based Visual-Inertial Odometry Using Smart Features, Zachary P. Friedel

Theses and Dissertations

Event-based cameras are a novel type of visual sensor that operate under a unique paradigm, providing asynchronous data on the log-level changes in light intensity for individual pixels. This hardware-level approach to change detection allows these cameras to achieve ultra-wide dynamic range and high temporal resolution. Furthermore, the advent of convolutional neural networks (CNNs) has led to state-of-the-art navigation solutions that now rival or even surpass human engineered algorithms. The advantages offered by event cameras and CNNs make them excellent tools for visual odometry (VO). This document presents the implementation of a CNN trained to detect and describe features within …


Characterizing Regime-Based Flow Uncertainty, John L. Fioretti Mar 2020

Characterizing Regime-Based Flow Uncertainty, John L. Fioretti

Theses and Dissertations

The goal of this work is to develop a regime-based quantification of horizontal wind field uncertainty utilizing a global ensemble numerical weather prediction model. In this case, the Global Ensemble Forecast System Reforecast (GEFSR) data is utilized. The machine learning algorithm that is employed is the mini-batch K-means clustering algorithm. 850 hPa Horizontal flow fields are clustered and the forecast uncertainty in these flow fields is calculated for different forecast times for regions across the globe. This provides end-users quantified flow-based forecast uncertainty.


Automated Detection And Mitigation Of Inefficient Visual Searching Using Electroencephalography And Machine Learning, Joshua P. Gallaher Mar 2020

Automated Detection And Mitigation Of Inefficient Visual Searching Using Electroencephalography And Machine Learning, Joshua P. Gallaher

Theses and Dissertations

Decisions made during the high-stress and fast-paced operations of the military are extremely prone to cognitive biases. A commonly known cognitive bias is a confirmation bias, or the inappropriate bolstering of an unknown hypothesis. One such critical military operation that can fall prey to a confirmation bias is a visual search. During a visual search, a military operator must perform a visual scan of an environment for a specific target. However, the visual search process can fall prey to the same confirmation bias which can cause inefficient searches. This study elicits inefficient visual search patterns and applies various mitigation techniques …


A Machine Learning Approach To Characterizing Particle Morphology In Nuclear Forensics, Daniel A. Gum Mar 2020

A Machine Learning Approach To Characterizing Particle Morphology In Nuclear Forensics, Daniel A. Gum

Theses and Dissertations

A machine learning approach is taken to characterizing a group of synthetic uranium bearing particles. SEM images of these lab-created particles were converted into a binary representation that captured morphological features in accordance with a guide established by Los Alamos National Laboratory. Each particle in the dataset contains an association with chemical creation conditions: processing method, precipitation temperature and pH, calcination temperature are most closely tied to particle morphology. Additionally, trained classifiers are able to relate final products between particles, implying that morphological features are shared between particles with similar composition.


Algorithm Selection Framework: A Holistic Approach To The Algorithm Selection Problem, Marc W. Chalé Mar 2020

Algorithm Selection Framework: A Holistic Approach To The Algorithm Selection Problem, Marc W. Chalé

Theses and Dissertations

A holistic approach to the algorithm selection problem is presented. The “algorithm selection framework" uses a combination of user input and meta-data to streamline the algorithm selection for any data analysis task. The framework removes the conjecture of the common trial and error strategy and generates a preference ranked list of recommended analysis techniques. The framework is performed on nine analysis problems. Each of the recommended analysis techniques are implemented on the corresponding data sets. Algorithm performance is assessed using the primary metric of recall and the secondary metric of run time. In six of the problems, the recall of …


Quantitative Analysis Of Evaluation Criteria For Generative Models, Marvin W. Newlin Mar 2020

Quantitative Analysis Of Evaluation Criteria For Generative Models, Marvin W. Newlin

Theses and Dissertations

Machine Learning (ML) is rapidly becoming integrated in critical aspects of cybersecurity today, particularly in the area of network intrusion/anomaly detection. However, ML techniques require large volumes of data to be effective. The available data is a critical aspect of the ML process for training, classification, and testing purposes. One solution to the problem is to generate synthetic data that is realistic. With the application of ML to this area, one promising application is the use of ML to perform the data generation. With the ability to generate synthetic data comes the need to evaluate the “realness” of the generated …


Evaluating Machine Learning Techniques For Smart Home Device Classification, Angelito E. Aragon Jr. Mar 2019

Evaluating Machine Learning Techniques For Smart Home Device Classification, Angelito E. Aragon Jr.

Theses and Dissertations

Smart devices in the Internet of Things (IoT) have transformed the management of personal and industrial spaces. Leveraging inexpensive computing, smart devices enable remote sensing and automated control over a diverse range of processes. Even as IoT devices provide numerous benefits, it is vital that their emerging security implications are studied. IoT device design typically focuses on cost efficiency and time to market, leading to limited built-in encryption, questionable supply chains, and poor data security. In a 2017 report, the United States Government Accountability Office recommended that the Department of Defense investigate the risks IoT devices pose to operations security, …


Confidence Inference In Defensive Cyber Operator Decision Making, Graig S. Ganitano Mar 2019

Confidence Inference In Defensive Cyber Operator Decision Making, Graig S. Ganitano

Theses and Dissertations

Cyber defense analysts face the challenge of validating machine generated alerts regarding network-based security threats. Operations tempo and systematic manpower issues have increased the importance of these individual analyst decisions, since they typically are not reviewed or changed. Analysts may not always be confident in their decisions. If confidence can be accurately assessed, then analyst decisions made under low confidence can be independently reviewed and analysts can be offered decision assistance or additional training. This work investigates the utility of using neurophysiological and behavioral correlates of decision confidence to train machine learning models to infer confidence in analyst decisions. Electroencephalography …


Characterization Of Tropical Cyclone Intensity Using Microwave Imagery, Amanda M. Nelson Mar 2019

Characterization Of Tropical Cyclone Intensity Using Microwave Imagery, Amanda M. Nelson

Theses and Dissertations

In the absence of wind speed data from aircraft reconnaissance of tropical cyclones (TCs), analysts rely on remote sensing tools to estimate TC intensity. For over 40 years, the Dvorak technique has been applied to estimate intensity using visible and infrared (IR) satellite imagery, but its accuracy is sometimes limited when the radiative effects of high clouds obscure the TC convective structure below. Microwave imagery highlights areas of precipitation and deep convection revealing different patterns than visible and IR imagery. This study explores application of machine learning algorithms to identify patterns in microwave imagery to infer storm intensity, particularly focusing …


Enabling Auditing And Intrusion Detection Of Proprietary Controller Area Networks, Brent C. Stone Dec 2018

Enabling Auditing And Intrusion Detection Of Proprietary Controller Area Networks, Brent C. Stone

Theses and Dissertations

The goal of this dissertation is to provide automated methods for security researchers to overcome ‘security through obscurity’ used by manufacturers of proprietary Industrial Control Systems (ICS). `White hat' security analysts waste significant time reverse engineering these systems' opaque network configurations instead of performing meaningful security auditing tasks. Automating the process of documenting proprietary protocol configurations is intended to improve independent security auditing of ICS networks. The major contributions of this dissertation are a novel approach for unsupervised lexical analysis of binary network data flows and analysis of the time series data extracted as a result. We demonstrate the utility …