skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Cognitive Computing for Security.

Abstract

Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

Authors:
 [1];  [1];  [1];  [1];  [1];  [1];  [1]
  1. Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Publication Date:
Research Org.:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Sponsoring Org.:
USDOE National Nuclear Security Administration (NNSA)
OSTI Identifier:
1234812
Report Number(s):
SAND-2015-10868
617626
DOE Contract Number:
AC04-94AL85000
Resource Type:
Technical Report
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING

Citation Formats

Debenedictis, Erik, Rothganger, Fredrick, Aimone, James Bradley, Marinella, Matthew, Evans, Brian Robert, Warrender, Christina E., and Mickel, Patrick. Cognitive Computing for Security.. United States: N. p., 2015. Web. doi:10.2172/1234812.
Debenedictis, Erik, Rothganger, Fredrick, Aimone, James Bradley, Marinella, Matthew, Evans, Brian Robert, Warrender, Christina E., & Mickel, Patrick. Cognitive Computing for Security.. United States. doi:10.2172/1234812.
Debenedictis, Erik, Rothganger, Fredrick, Aimone, James Bradley, Marinella, Matthew, Evans, Brian Robert, Warrender, Christina E., and Mickel, Patrick. 2015. "Cognitive Computing for Security.". United States. doi:10.2172/1234812. https://www.osti.gov/servlets/purl/1234812.
@article{osti_1234812,
title = {Cognitive Computing for Security.},
author = {Debenedictis, Erik and Rothganger, Fredrick and Aimone, James Bradley and Marinella, Matthew and Evans, Brian Robert and Warrender, Christina E. and Mickel, Patrick},
abstractNote = {Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.},
doi = {10.2172/1234812},
journal = {},
number = ,
volume = ,
place = {United States},
year = 2015,
month =
}

Technical Report:

Save / Share:
  • In complex simulation systems where humans interact with computer-generated agents, information display and the interplay of virtual agents have become dominant media and modalities of interface design. This design strategy is reflected in augmented reality (AR), an environment where humans interact with computer-generated agents in real-time. AR systems can generate large amount of information, multiple solutions in less time, and perform far better in time-constrained problem solving. The capabilities of AR have been leveraged to augment cognition in human information processing. In this sort of augmented cognition (AC) work system, while technology has become the main source for information acquisitionmore » from the environment, the human sensory and memory capacities have failed to cope with the magnitude and scale of information they encounter. This situation generates opportunity for excessive cognitive workloads, a major factor in degraded human performance. From the human effectiveness point of view, research is needed to develop, model, and validate simulation tools that can measure the effectiveness of an AR technology used to support the amplification of human cognition. These tools will allow us to predict human performance for tasks executed under an AC tool construct. This paper presents an exploration of ergonomics issues relevant to AR and AC systems design. Additionally, proposed research to investigate those ergonomic issues is discussed.« less
  • The purpose of this audit was to evaluate the effectiveness of the unclassified computer security program at the Germantown Headquarters Administrative Computer Center (Center). The Department of Energy (DOE) relies on the application systems at the Germantown Headquarters Administrative Computer Center to support its financial, payroll and personnel, security, and procurement functions. The review was limited to an evaluation of the administrative, technical, and physical safeguards governing utilization of the unclassified computer system which hosts many of the Department`s major application systems. The audit identified weaknesses in the Center`s computer security program that increased the risk of unauthorized disclosure ormore » loss of sensitive data. Specifically, the authors found that (1) access to sensitive data was not limited to individuals who had a need for the information, and (2) accurate and complete information was not maintained on the inventory of tapes at the Center. Furthermore, the risk of unauthorized disclosure and loss of sensitive data was increased because other controls, such as physical security, had not been adequately implemented at the Center. Management generally agreed with the audit conclusions and recommendations, and initiated a number of actions to improve computer security at the Center.« less
  • How will the United States satisfy energy demand in a tightening global energy marketplace while, at the same time, reducing greenhouse gas emissions? Exascale computing -- expected to be available within the next eight to ten years ? may play a crucial role in answering that question by enabling a paradigm shift from test-based to science-based design and engineering. Computational modeling of complete power generation systems and engines, based on scientific first principles, will accelerate the improvement of existing energy technologies and the development of new transformational technologies by pre-selecting the designs most likely to be successful for experimental validation,more » rather than relying on trial and error. The predictive understanding of complex engineered systems made possible by computational modeling will also reduce the construction and operations costs, optimize performance, and improve safety. Exascale computing will make possible fundamentally new approaches to quantifying the uncertainty of safety and performance engineering. This report discusses potential contributions of exa-scale modeling in four areas of energy production and distribution: nuclear power, combustion, the electrical grid, and renewable sources of energy, which include hydrogen fuel, bioenergy conversion, photovoltaic solar energy, and wind turbines. Examples of current research are taken from projects funded by the U.S. Department of Energy (DOE) Office of Science at universities and national laboratories, with a special focus on research conducted at Lawrence Berkeley National Laboratory.« less
  • This document contains introductory material that discusses cyber security challenges in using cloud computing in the electric utility industry.