Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Physical Sciences and Mathematics

Adaptable And Trustworthy Machine Learning For Human Activity Recognition From Bioelectric Signals, Morgan S. Stuart Jan 2024

Adaptable And Trustworthy Machine Learning For Human Activity Recognition From Bioelectric Signals, Morgan S. Stuart

Theses and Dissertations

Enabling machines to learn measures of human activity from bioelectric signals has many applications in human-machine interaction and healthcare. However, labeled activity recognition datasets are costly to collect and highly varied, which challenges machine learning techniques that rely on large datasets. Furthermore, activity recognition in practice needs to account for user trust - models are motivated to enable interpretability, usability, and information privacy. The objective of this dissertation is to improve adaptability and trustworthiness of machine learning models for human activity recognition from bioelectric signals. We improve adaptability by developing pretraining techniques that initialize models for later specialization to unseen …


Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad Dec 2023

Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad

Theses and Dissertations

Running computer vision algorithms requires complex devices with lots of computing power, these types of devices are not well suited for space deployment. The harsh radiation environment and limited power budgets have hindered the ability of running advanced computer vision algorithms in space. This problem makes running an on-orbit servicing detection algorithm very difficult. This work proposes using a low powered FPGA to accelerate the computer vision algorithms that enable satellite component feature extraction. This work uses AMD/Xilinx’s Zynq SoC and DPU IP to run model inference. Experiments in this work centered around improving model post processing by creating implementations …


Cnn-Based Dendrite Core Detection From Microscopic Images Of Directionally Solidified Ni-Base Alloys, Xiaoguang Li Oct 2022

Cnn-Based Dendrite Core Detection From Microscopic Images Of Directionally Solidified Ni-Base Alloys, Xiaoguang Li

Theses and Dissertations

Dendrite core is the center point of the dendrite. The information of dendrite core is very helpful for material scientists to analyze the properties of materials. Therefore, detecting the dendrite core is a very important task in the material science field. Meanwhile, because of some special properties of the dendrites, this task is also very challenging. Different from the typical detection problems in the computer vision field, detecting the dendrite core aims to detect a single point location instead of the bounding-box. As a result, the existing regressing bounding-box based detection methods can not work well on this task because …


Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug Sep 2022

Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug

Theses and Dissertations

Modern multi-tasking computer systems run numerous applications simultaneously. These applications must share hardware resources including the Central Processing Unit (CPU) and memory while maximizing each application’s performance. Tasks executing in this shared environment leave residue which should not reveal information. This dissertation applies machine learning and statistical analysis to evaluate task residue as footprints which can be correlated to identify tasks. The concept of privilege strata, drawn from an analogy with physical geology, organizes the investigation into the User, Operating System, and Hardware privilege strata. In the User Stratum, an adversary perspective is taken to build an interrogator program that …


Enabling Rapid Chemical Analysis Of Plutonium Alloys Via Machine Learning-Enhanced Atomic Spectroscopy Techniques, Ashwin P. Rao Sep 2022

Enabling Rapid Chemical Analysis Of Plutonium Alloys Via Machine Learning-Enhanced Atomic Spectroscopy Techniques, Ashwin P. Rao

Theses and Dissertations

Analytical atomic spectroscopy methods have the potential to provide solutions for rapid, high fidelity chemical analysis of plutonium alloys. Implementing these methods with advanced analytical techniques can help reduce the chemical analysis time needed for plutonium pit production, directly enabling the 80 pit-per-year by 2030 manufacturing goal outlined in the 2018 Nuclear Posture Review. Two commercial, handheld elemental analyzers were validated for potential in situ analysis of Pu. A handheld XRF device was able to detect gallium in a Pu surrogate matrix with a detection limit of 0.002 wt% and a mean error of 8%. A handheld LIBS device was …


Application Of Machine Learning Models With Numerical Simulations Of An Experimental Microwave Induced Plasma Gasification Reactor, Owen D. Sedej Mar 2022

Application Of Machine Learning Models With Numerical Simulations Of An Experimental Microwave Induced Plasma Gasification Reactor, Owen D. Sedej

Theses and Dissertations

This thesis aims to contribute to the future development of this technology by providing an in-depth literature review of how this technology physically operates and can be numerically modeled. Additionally, this thesis reviews literature of machine learning models that have been applied to gasification to make accurate predictions regarding the system. Finally, this thesis provides a framework of how to numerically model an experimental plasma gasification reactor in order to inform a variety of machine learning models.


Double Cone Flow Field Reconstruction Between Mach 4 And 12 Using Machine Learning Techniques, Trevor A. Toros Mar 2022

Double Cone Flow Field Reconstruction Between Mach 4 And 12 Using Machine Learning Techniques, Trevor A. Toros

Theses and Dissertations

No abstract provided.


Analysis Of Generalized Artificial Intelligence Potential Through Reinforcement And Deep Reinforcement Learning Approaches, Jonathan Turner Mar 2022

Analysis Of Generalized Artificial Intelligence Potential Through Reinforcement And Deep Reinforcement Learning Approaches, Jonathan Turner

Theses and Dissertations

Artificial Intelligence is the next competitive domain; the first nation to develop human level artificial intelligence will have an impact similar to the development of the atomic bomb. To maintain the security of the United States and her people, the Department of Defense has funded research into the development of artificial intelligence and its applications. This research uses reinforcement learning and deep reinforcement learning methods as proxies for current and future artificial intelligence agents and to assess potential issues in development. Agent performance were compared across two games and one excursion: Cargo Loading, Tower of Hanoi, and Knapsack Problem, respectively. …


Indoor Navigation Using Convolutional Neural Networks And Floor Plans, Ricky D. Anderson Mar 2021

Indoor Navigation Using Convolutional Neural Networks And Floor Plans, Ricky D. Anderson

Theses and Dissertations

The goal of this thesis is to evaluate a new indoor navigation technique by incorporating floor plans along with monocular camera images into a CNN as a potential means for identifying camera position. Building floor plans are widely available and provide potential information for localizing within the building. This work sets out to determine if a CNN can learn the architectural features of a floor plan and use that information to determine a location. In this work, a simulated indoor data set is created and used to train two CNNs. A classification CNN, which breaks up the floor plan into …


Contract Information Extraction Using Machine Learning, Zachary E. Butcher Mar 2021

Contract Information Extraction Using Machine Learning, Zachary E. Butcher

Theses and Dissertations

The Air Force Sustainment Center assisted by the Data Analytics Resource Team and the Defense Logistics Agency collected four million contracts onto one of the Air Force Research Laboratory’s high power computers. This thesis focuses on the effort to determine if parts are available through those contracts. Some information is extracted using machine learning in combination with natural language processing. Where machine learning methods are unsuccessful or inappropriate, text mining techniques, such as pattern recognition and rules, are used. Upon completion, the information is combined into a Gantt chart for quick evaluation. Only 21% of the contracts have their information …


Applied Machine Learning In Extrusion-Based Bioprinting, Shuyu Tian Jan 2021

Applied Machine Learning In Extrusion-Based Bioprinting, Shuyu Tian

Theses and Dissertations

Optimization of extrusion-based bioprinting (EBB) parameters have been systematically conducted through experimentation. However, the process is time and resource-intensive and not easily translatable across different laboratories. A machine learning (ML) approach to EBB parameter optimization can accelerate this process for laboratories across the field through training using data collected from published literature. In this work, regression-based and classification-based ML models were investigated for their abilities to predict printing outcomes of cell viability and filament diameter for cell-containing alginate and gelatin composite hydrogels. Regression-based models were investigated for their ability to predict suitable extrusion pressure given desired cell viability when keeping …


Information Architecture For A Chemical Modeling Knowledge Graph, Adam R. Luxon Jan 2021

Information Architecture For A Chemical Modeling Knowledge Graph, Adam R. Luxon

Theses and Dissertations

Machine learning models for chemical property predictions are high dimension design challenges spanning multiple disciplines. Free and open-source software libraries have streamlined the model implementation process, but the design complexity remains. In order better navigate and understand the machine learning design space, model information needs to be organized and contextualized. In this work, instances of chemical property models and their associated parameters were stored in a Neo4j property graph database. Machine learning model instances were created with permutations of dataset, learning algorithm, molecular featurization, data scaling, data splitting, hyperparameters, and hyperparameter optimization techniques. The resulting graph contains over 83,000 nodes …


Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel Sep 2020

Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel

Theses and Dissertations

The digital communication and radar community has recently manifested more interest in using data-driven approaches for tasks such as modulation recognition, channel estimation and distortion correction. In this research we seek to apply an object detector for parameter estimation to perform waveform separation in the time and frequency domain prior to classification. This enables the full automation of detecting and classifying simultaneously occurring waveforms. We leverage a lD ResNet implemented by O'Shea et al. in [1] and the YOLO v3 object detector designed by Redmon et al. in [2]. We conducted an in depth study of the performance of these …


Detection Of Stealthy False Data Injection Attacks Against State Estimation In Electric Power Grids Using Deep Learning Techniques, Qingyu Ge Aug 2020

Detection Of Stealthy False Data Injection Attacks Against State Estimation In Electric Power Grids Using Deep Learning Techniques, Qingyu Ge

Theses and Dissertations

Since communication technologies are being integrated into smart grid, its vulnerability to false data injection is increasing. State estimation is a critical component which is used for monitoring the operation of power grid. However, a tailored attack could circumvent bad data detection of the state estimation, thus disturb the stability of the grid. Such attacks are called stealthy false data injection attacks (FDIAs). This thesis proposed a prediction-based detector using deep learning techniques to detect injected measurements. The proposed detector adopts both Convolutional Neural Networks and Recurrent Neural Networks, making full use of the spatial-temporal correlations in the measurement data. …


A Machine Learning Approach To Characterizing Particle Morphology In Nuclear Forensics, Daniel A. Gum Mar 2020

A Machine Learning Approach To Characterizing Particle Morphology In Nuclear Forensics, Daniel A. Gum

Theses and Dissertations

A machine learning approach is taken to characterizing a group of synthetic uranium bearing particles. SEM images of these lab-created particles were converted into a binary representation that captured morphological features in accordance with a guide established by Los Alamos National Laboratory. Each particle in the dataset contains an association with chemical creation conditions: processing method, precipitation temperature and pH, calcination temperature are most closely tied to particle morphology. Additionally, trained classifiers are able to relate final products between particles, implying that morphological features are shared between particles with similar composition.


Algorithm Selection Framework: A Holistic Approach To The Algorithm Selection Problem, Marc W. Chalé Mar 2020

Algorithm Selection Framework: A Holistic Approach To The Algorithm Selection Problem, Marc W. Chalé

Theses and Dissertations

A holistic approach to the algorithm selection problem is presented. The “algorithm selection framework" uses a combination of user input and meta-data to streamline the algorithm selection for any data analysis task. The framework removes the conjecture of the common trial and error strategy and generates a preference ranked list of recommended analysis techniques. The framework is performed on nine analysis problems. Each of the recommended analysis techniques are implemented on the corresponding data sets. Algorithm performance is assessed using the primary metric of recall and the secondary metric of run time. In six of the problems, the recall of …


Confidence Inference In Defensive Cyber Operator Decision Making, Graig S. Ganitano Mar 2019

Confidence Inference In Defensive Cyber Operator Decision Making, Graig S. Ganitano

Theses and Dissertations

Cyber defense analysts face the challenge of validating machine generated alerts regarding network-based security threats. Operations tempo and systematic manpower issues have increased the importance of these individual analyst decisions, since they typically are not reviewed or changed. Analysts may not always be confident in their decisions. If confidence can be accurately assessed, then analyst decisions made under low confidence can be independently reviewed and analysts can be offered decision assistance or additional training. This work investigates the utility of using neurophysiological and behavioral correlates of decision confidence to train machine learning models to infer confidence in analyst decisions. Electroencephalography …


A Fortran Based Learning System Using Multilayer Back-Propagation Neural Network Techniques, Gregory L. Reinhart Mar 1994

A Fortran Based Learning System Using Multilayer Back-Propagation Neural Network Techniques, Gregory L. Reinhart

Theses and Dissertations

An interactive computer system which allows the researcher to build an optimal neural network structure quickly, is developed and validated. This system assumes a single hidden layer perceptron structure and uses the back- propagation training technique. The software enables the researcher to quickly define a neural network structure, train the neural network, interrupt training at any point to analyze the status of the current network, re-start training at the interrupted point if desired, and analyze the final network using two- dimensional graphs, three-dimensional graphs, confusion matrices and saliency metrics. A technique for training, testing, and validating various network structures and …


Using Discovery-Based Learning To Prove The Behavior Of An Autonomous Agent, David N. Mezera Dec 1993

Using Discovery-Based Learning To Prove The Behavior Of An Autonomous Agent, David N. Mezera

Theses and Dissertations

Computer-generated autonomous agents in simulation often behave predictably and unrealistically. These characteristics make them easy to spot and exploit by human participants in the simulation, when we would prefer the behavior of the agent to be indistinguishable from human behavior. An improvement in behavior might be possible by enlarging the library of responses, giving the agent a richer assortment of tactics to employ during a combat scenario. Machine learning offers an exciting alternative to constructing additional responses by hand by instead allowing the system to improve its own performance with experience. This thesis presents NOSTRUM, a discovery-based learning DBL system …