Publications

Results 1–25 of 29

Search results

Jump to search filters

What can simulation test beds teach us about social science? Results of the ground truth program

Computational and Mathematical Organization Theory

Naugle, Asmeret B.; Krofcheck, Daniel J.; Warrender, Christina E.; Lakkaraju, Kiran L.; Swiler, Laura P.; Verzi, Stephen J.; Emery, Benjamin F.; Murdock, Jaimie; Bernard, Michael L.; Romero, Vicente J.

The ground truth program used simulations as test beds for social science research methods. The simulations had known ground truth and were capable of producing large amounts of data. This allowed research teams to run experiments and ask questions of these simulations similar to social scientists studying real-world systems, and enabled robust evaluation of their causal inference, prediction, and prescription capabilities. We tested three hypotheses about research effectiveness using data from the ground truth program, specifically looking at the influence of complexity, causal understanding, and data collection on performance. We found some evidence that system complexity and causal understanding influenced research performance, but no evidence that data availability contributed. The ground truth program may be the first robust coupling of simulation test beds with an experimental framework capable of teasing out factors that determine the success of social science research.

More Details

Data Science and Machine Learning for Genome Security

Verzi, Stephen J.; Krishnakumar, Raga K.; Levin, Drew L.; Krofcheck, Daniel J.; Williams, Kelly P.

This report describes research conducted to use data science and machine learning methods to distinguish targeted genome editing versus natural mutation and sequencer machine noise. Genome editing capabilities have been around for more than 20 years, and the efficiencies of these techniques has improved dramatically in the last 5+ years, notably with the rise of CRISPR-Cas technology. Whether or not a specific genome has been the target of an edit is concern for U.S. national security. The research detailed in this report provides first steps to address this concern. A large amount of data is necessary in our research, thus we invested considerable time collecting and processing it. We use an ensemble of decision tree and deep neural network machine learning methods as well as anomaly detection to detect genome edits given either whole exome or genome DNA reads. The edit detection results we obtained with our algorithms tested against samples held out during training of our methods are significantly better than random guessing, achieving high F1 and recall scores as well as with precision overall.

More Details

Resilient adjudication in non-intrusive inspection with hierarchical object and anomaly detection

Proceedings of SPIE - The International Society for Optical Engineering

Krofcheck, Daniel J.; John, Esther W.; Galloway, Hugh M.; Sorensen, Asael H.; Jameson, Carter D.; Aubry, Connor; Prasadan, Arvind P.; Galasso, Jennifer G.; Goodman, Eric G.; Forrest, Robert F.

Large scale non-intrusive inspection (NII) of commercial vehicles is being adopted in the U.S. at a pace and scale that will result in a commensurate growth in adjudication burdens at land ports of entry. The use of computer vision and machine learning models to augment human operator capabilities is critical in this sector to ensure the flow of commerce and to maintain efficient and reliable security operations. The development of models for this scale and speed requires novel approaches to object detection and novel adjudication pipelines. Here we propose a notional combination of existing object detection tools using a novel ensembling framework to demonstrate the potential for hierarchical and recursive operations. Further, we explore the combination of object detection with image similarity as an adjacent capability to provide post-hoc oversight to the detection framework. The experiments described herein, while notional and intended for illustrative purposes, demonstrate that the judicious combination of diverse algorithms can result in a resilient workflow for the NII environment.

More Details

Synthetic threat injection using digital twin informed augmentation

Proceedings of SPIE - The International Society for Optical Engineering

Krofcheck, Daniel J.; John, Esther W.; Galloway, Hugh M.; Sorensen, Asael H.; Jameson, Carter D.; Aubry, Connor; Prasadan, Arvind P.; Forrest, Robert F.

The growing x-ray detection burden for vehicles at Ports of Entry in the US requires the development of efficient and reliable algorithms to assist human operator in detecting contraband. Developing algorithms for large-scale non-intrusive inspection (NII) that both meet operational performance requirements and are extensible for use in an evolving environment requires large volumes and varieties of training data, yet collecting and labeling data for these enivornments is prohibitively costly and time consuming. Given these, generating synthetic data to augment algorithm training has been a focus of recent research. Here we discuss the use of synthetic imagery in an object detection framework, and describe a simulation based approach to determining domain-informed threat image projection (TIP) augmentation.

More Details

A Framework to Model and Analyze Electric Grid Cascading Failures to Identify Critical Nodes

2022 17th International Conference on Probabilistic Methods Applied to Power Systems, PMAPS 2022

Pierre, Brian J.; Krofcheck, Daniel J.; Munoz-Ramos, Karina M.; Arguello, Bryan A.

The goal of this work is to identify critical nodes in a bulk electric system for grid resilience to a specified threat. We present a cascading outage framework and an analytical framework for identifying electric grid failure trends and critical components. We create thousands of threat scenarios to be modeled in a dynamic electric grid cascading outage model. Each threat scenario determines which major grid components are removed from service due to the threat. The cascading outage model runs transient dynamic simulations which allow for secondary transients to affect the relays/protection leading to cascading outages. The results of the cascading model feed an analytics model to identify trends and critical components whose failure is more likely to cause serious systemic effects. Information on which system components are most critical to electric grid resilience can significantly assist grid planning and reduce grid consequences of large-scale disasters.

More Details

Modeling Framework for Bulk Electric Grid Impacts from HEMP E1 and E3 Effects (Tasks 3.1 Final Report)

Pierre, Brian J.; Krofcheck, Daniel J.; Hoffman, Matthew J.; Guttromson, Ross G.; Schiek, Richard S.; Quiroz, Jimmy E.

This report presents a framework to evaluate the impact of a high-altitude electromagnetic pulse (HEMP) event on a bulk electric power grid. This report limits itself to modeling the impact of EMP E1 and E3 components. The co-simulation of E1 and E3 is presented in detail, and the focus of the paper is on the framework rather than actual results. This approach is highly conservative as E1 and E3 are not maximized with the same event characteristics and may only slightly overlap. The actual results shown in this report are based on a synthetic grid with synthetic data and a limited exemplary EMP model. The framework presented can be leveraged and used to analyze the impact of other threat scenarios, both manmade and natural disasters. This report d escribes a Monte-Carlo based methodology to probabilistically quantify the transient response of the power grid to a HEMP event. The approach uses multiple fundamental steps to characterize the system response to HEMP events, focused on the E1 and E3 components of the event. 1) Obtain component failure data related to HEMP events testing of components and creating component failure models. Use the component failure model to create component failure conditional probability density function (PDF) that is a function of the HEMP induced terminal voltage. 2) Model HEMP scenarios and calculate the E1 coupled voltage profiles seen by all system components. Model the same HEMP scenarios and calculate the transformer reactive power consumption profiles due to E3. 3) Sample each component failure PDF to determine which grid components will fail, due to the E1 voltage spike, for each scenario. 4) Perform dynamic simulations that incorporate the predicted component failures from E1 and reactive power consumption at each transformer affected by E3. These simulations allow for secondary transients to affect the relays/protection remaining in service which can lead to cascading outages. 5) Identify the locations and amount of load lost for each scenario through grid dynamic simulation. This can be an indication of the immediate grid impacts from a HEMP event. In addition, perform more detailed analysis to determine critical nodes and system trends. 6) To help realize the longer-term impacts, a security constrained alternating current optimal power flow (ACOPF) is run to maximize critical load served. This report describes a modeling framework to assess the systemic grid impacts due to a HEMP event. This stochastic simulation framework generates a large amount of data for each Monte Carlo replication, including HEMP location and characteristics, relay and component failures, E3 GIC profiles, cascading dynamics including voltage and frequency over time, and final system state. This data can then be analyzed to identify trends, e.g., unique system behavior modes or critical components whose failure is more likely to cause serious systemic effects. The proposed analysis process is demonstrated on a representative system. In order to draw realistic conclusions of the impact of a HEMP event on the grid, a significant amount of work remains with respect to modeling the impact on various grid components.

More Details
Results 1–25 of 29
Results 1–25 of 29