Gilbert L. Peterson’s research while affiliated with U.S. Air Force Institute of Technology and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (143)


a) The AE system pipeline. The system is initialized with an auxiliary material dataset by fitting multitask Gaussian process models for both print quality and completion time. The models are then used by a multiobjective decision policy to generate experiment settings for the target material. A calibration coupon is printed using the target material and is scored using computer vision. The models are refined using the coupon's computer vision score and completion time, and the process is repeated until a user‐specified budget is expended. b) The physical setup consisting of an Ender‐3 FDM printer, Raspberry Pi and HQ camera module, lighting array, and collection bin.
The novel calibration coupon designed to facilitate a computer vision‐based assessment of the current process parameter configuration and drive the optimization process. The calibration coupon's camera image is divided into 6 ROIs that facilitate the application of a variety of computer vision techniques to assess its print quality.
Example of a) an ROI‐1 Image containing stringing and b) the corresponding edge map computed using the Canny algorithm. The overall score is the sum of the pixels contained in the edge map.
Illustration of adapting FR‐IQA metrics to the problem of overhang characterization. The surface image is divided into 4 nonoverlapping regions, and the overall metric is taken as the average of the FR‐IQA metrics computed for all possible pairs of images.
Extracting the shape context feature: a) the log‐polar bins for an arbitrary contour point and b) the corresponding histogram. The feature vector is the set of histograms corresponding to the set of extracted contour points.

+7

Accelerated Multiobjective Calibration of Fused Deposition Modeling 3D Printers Using Multitask Bayesian Optimization and Computer Vision
  • Article
  • Full-text available

February 2025

·

7 Reads

Graig S. Ganitano

·

·

Gilbert L. Peterson

Proper process parameter calibration is critical to the success of fused deposition modeling (FDM) three‐dimensional (3D) printing, but is time‐consuming and requires expertise. While existing systems for autonomous calibration have demonstrated success in calibrating for a single objective, users may need to balance multiple conflicting objectives. Herein, an easily deployable, camera‐based system for autonomous calibration of FDM printers that optimizes for both part quality and completion time is presented. Autonomous calibration is achieved through a novel, multifaceted computer vision characterization and a multitask learning extension to Bayesian optimization. The system is demonstrated on four popular filament types using two distinct 3D printers. The results show that the system significantly outperforms manufacturer calibration across the machine and material configurations, achieving an average improvement of 32.2% in quality and a 31.2% decrease in completion time with respect to a popular benchmark.

Download

Fig. 1: A multi-dimensional knowledge graph, adapted from [17]. This PLP design includes the KG, the LMs, and the function f that describes which LMs cover which KNs. In contrast to Nabizadeh's multi-dimensional knowledge graphs, here some of the connections between nodes may be bi-directional. In this figure LMs have a manyto-one relationship with the KNs.
Fig. 2: This figure shows the relationship of two of the PLP characteristics discussed within this section. These relationships are the same in the cases of the knowledge path and knowledge graph configurations. All instances of many-to-one are also instances of many-to-many, many-to-one multi-objective, and many-to-many multi-objective. Once a many-to-one best choice problem instance removes all but the top scoring LMs for each KN, it reduces to the one-to-one PLP problem.
Fig. 3: Algorithm Q maps a general instance of the 0/1 Knapsack Problem to the Knowledge Path Many-to-One Single Objective PLP problem in polynomial time. Each item in the Knapsack Problem is mapped to an LM that covers a separate KN in the PLP problem and a "zero-value" LM is created for each KN. The χ decision variables are used to choose between these LMs. This mapping defines 1 Knowledge Path, n KNs, and 2n LMs, where n is the number of Knapsack items.
Fig. 4: This figure shows the algorithm Z that maps a general instance of the 0/1 Knapsack Problem with n items to the knowledge graph one-to-one single-objective PLP problem in polynomial time. Each item in the KP is mapped into a LM in the PLP problem. A corresponding "zero-value" LM is created for every LM converted from knapsack items. An origin and target node are created with zero-value to indicate the beginning and ending of the graph. The χ variable is used to indicate which LMs are included in the solution. This mapping defines 1 Knowledge Graph, 2n + 2 LMs, and 4n edges, where n is the number of Knapsack items.
Personalized Learning Path Problem Variations: Computational Complexity and AI Approaches

January 2024

·

28 Reads

·

1 Citation

IEEE Transactions on Artificial Intelligence

Sean A. Mochocki

·

Mark G. Reith

·

Brett J. Borghetti

·

[...]

·

E-learning courses often suffer from high dropout rates and low student satisfaction. One way to address this issue is to use Personalized Learning Paths (PLPs), which are sequences of learning materials that meet the individual needs of students. However, creating PLPs is difficult and often involves combining knowledge graphs, student profiles, and learning materials. Researchers typically assume that the problem of creating PLPs belong to the NP-Hard class of computational problems. However, previous research in this field has neither defined the different variations of the PLP problem nor formally established their computational complexity. Without clear definitions of the PLP variations, researchers risk making invalid comparisons and conclusions when they use different metaheuristics for different PLP problems. In order to unify this conversation, this paper formally proves the NP-completeness of two common PLP variations and their generalizations and uses them to categorize recent research in the PLP field. It then presents an instance of the PLP problem using real-world data and shows how this instance can be cast into two different NP-complete variations. This paper then presents three AI strategies, solving one of the PLP variations with back-tracking and branch and bound heuristics and also converting the PLP variation instance to XCSP 3 , an intermediate constraint satisfaction language to be resolved with a general Constraint Optimization solver. This paper solves the other PLP variation instance using a greedy search heuristic. The paper finishes by comparing the results of the two different PLP variations.


Kingmaking in Press Diplomacy

December 2023

·

20 Reads

Humans play games like Diplomacy for more reasons than just trying to win. For example, when they know they are losing, they may choose to aid an opponent rather than concede. This paper presents Lyre, an agent skilled at playing/communicating in Diplomacy and adept at working towards the benefit or harm of a given opponent - kingmaking. We parallel Lyre’s kingmaking with real human Diplomacy games and analyze how Lyre can best play kingmaker. Results show statistically significant benefit in Lyre’s boardplay, negotiation, and kingmaking.


A hybrid metaheuristic and computer vision approach to closed-loop calibration of fused deposition modeling 3D printers

July 2023

·

294 Reads

·

9 Citations

Progress in Additive Manufacturing

Fused deposition modeling (FDM) is one of the most popular additive manufacturing (AM) technologies for reasons including its low cost and versatility. However, like many AM technologies, the FDM process is sensitive to changes in the feedstock material. Utilizing a new feedstock requires a time-consuming trial-and-error process to identify optimal settings for a large number of process parameters. The experience required to efficiently calibrate a printer to a new feedstock acts as a barrier to entry. To enable greater accessibility to non-expert users, this paper presents the first system for autonomous calibration of low-cost FDM 3D printers that demonstrates optimizing process parameters for printing complex 3D models with submillimeter dimensional accuracy. Autonomous calibration is achieved by combining a computer vision-based quality analysis with a single-solution metaheuristic to efficiently search the parameter space. The system requires only a consumer-grade camera and computer capable of running modern 3D printing software and uses a calibration budget of just 30 g of filament (~ $1 USD). The results show that for several popular thermoplastic filaments, the system can autonomously calibrate a 3D printer to print complex 3D models with an average deviation in dimensional accuracy of 0.047 mm, which is more accurate than the 3D printer’s published tolerance of 0.1–0.4 mm.


Incentivizing Information Gain in Hidden Information Multi-Action Games

May 2023

·

16 Reads

Lecture Notes in Computer Science

Wargames often include fog of war, i.e. hidden information, and multi-action turns, where each turn requires making multiple, sequential action choices. These properties provide unique challenges for Artificial Intelligence agents. Extensions to Monte-Carlo Tree Search (MCTS) allow it to perform well in games with hidden information as well as multi-action games. However, these extensions do not specifically consider both properties simultaneously nor how information-gaining actions could improve agent performance. Information-gaining actions are important in multi-action turns where initial actions can reveal state information, thus improving later action decisions. This paper presents enhancements to MCTS that add an information gain incentive and a risk determinization to balance locating opponent pieces while minimizing exposure to enemy fire. The information gain incentive and risk functions are implemented in Perfect Information-MCTS (PIMCTS) and Information Set-MCTS (ISMCTS) and evaluated on the multi-action hidden information game TUBSTAP. Results show that these additions improve performance over the baseline algorithms and against a Cheating MCTS implementation. KeywordsMulti-action turn-based gamesHidden InformationMonte-Carlo Tree Search




Estimating operationalized intent using random forests

June 2022

·

66 Reads

·

1 Citation

Human-Intelligent Systems Integration

Teams of human operators and artificial intelligent agents (AIAs) in multi-agent systems present a unique set of challenges to team coordination. This research endeavors to employ a machine learning framework to estimate a set of ranks among quality goals, where the quality goals are designed to help communicate important elements of operator intent to aid the development of a Shared Mental Model among members in a multi-agent team. Using a representation referred to as the Operationalized Intent model to capture quality goals relevant to “how” the operator would like to execute the team’s mission, this paper details the development and evaluation of a random forest algorithm to estimate operator priorities. Estimation is structured as a label ranking problem in which quality goals, which constrain “how” work is to be conducted, are ranked according to their priority. Modifying an existing label ranking algorithm, we demonstrate that the Operationalized Intent Estimator-Random Forest (OIE-RF) can estimate quality goal rankings more accurately than a situation baseline which is derived by observing the variability among operators. OIE-RF demonstrates stability in dynamic testing and the ability to use explicit communication and operator identity to increase accuracy. This exploratory research opens a new avenue for improving coordination and performance of human-agent teams.


Factored Beliefs for Machine Agents in Decentralized Partially Observable Markov Decision Processes

May 2022

·

15 Reads

·

2 Citations

The International FLAIRS Conference Proceedings

A shared mental model (SMM) is a foundational structure in high performing, task-oriented teams and aid humans in determining their teammate's goals and intentions. Higher levels of mental alignment between teammates can reduce the direct dialogue required for team success. For decision-making teams, a transactive memory system (TMS) offers team members a map of specialized knowledge, indicating source of knowledge and the source's credibility. SMM and TMS formulations aid human-agent team performance in their intended team types. However, neither improve team performance with a project team--one that requires both behavioral and knowledge integration. We present a hybrid cognitive model (HCM) for machine agents that subsumes the integrated portions of a team's transactive memory in an SMM. The unified structure of the HCM enables contextual switches during execution for machine agents, over the two cognitive formulations with comparable computational complexity of a single cognitive model. Results in a multi-agent project environment demonstrates how the HCM provides machine agents with a generalizable cognitive structure that is able to maintain fully factored belief states with minimal inter-agent communication.


Automated Computer Network Exploitation with Bayesian Decision Networks

May 2022

·

85 Reads

·

2 Citations

The International FLAIRS Conference Proceedings

Penetration Testing (pentesting) is the process of using tactics and techniques to penetrate computer systems and networks to expose any issues in their cybersecurity \cite{rsa}. It is currently a manual process requiring significant experience and time that are in limited supply. One way to supplement the shortage is through automation. This paper presents the Automated Network Discovery and Exploitation System (ANDES) which demonstrates that it is feasible to automate the pentesting process. The uniqueness of ANDES is the use of Bayesian decision networks to represent the pentesting domain and subject matter expert knowledge. ANDES conducts multiple execution cycles, which build upon previous action results. This process simulates the iterative thinking process of human attackers. Cycles begin by modeling the current belief state using Bayesian decision networks. ANDES uses these networks to select and execute an expected best action. Observed results are used to update the systems current belief state before the next cycle begins. ANDES was tested in a live-execution event, taking place within a virtual network environment designed to mimic a small business’s internal network. ANDES successfully performed a series of information gathering and remote exploit actions, across multiple network hosts, to gain access to the objective target.


Citations (70)


... Test specimens made from PA12 and PA12-GB materials are produced using a Stratasys J750 printer with Multi Jet Fusion (MJF) technology. These specimens are prepared to evaluate the mechanical properties and performance characteristics of both materials under standardized testing conditions [32]. The printed components are positioned 12-16 mm apart, as depicted in Fig. 3, and left to cool whole night before unpacking. ...

Reference:

Advancing composite 3D printing: deep learning-optimized rheology-modified polymers with continuous carbon fiber reinforcement
A hybrid metaheuristic and computer vision approach to closed-loop calibration of fused deposition modeling 3D printers

Progress in Additive Manufacturing

... Heterogeneous MAS is very common in real-world scenarios [15][16][17][18][19], such as wireless network accessibility problems [20], heterogeneous LLM agents for financial sentiment analysis [21] and multi-agent robotic systems [22,23]. Traditionally, the heterogeneity of MAS can be categorized into two classes: physical (or morphological) and behavioral [24][25][26]. Physical heterogeneity denotes the difference of MAS components in hardware, physical constraints, or characteristics, indicating their different capabilities and goals. On the other hand, behavioral heterogeneity denotes the difference of MAS components in software, behavioral models, or dynamics. ...

Evolution of Combined Arms Tactics in Heterogeneous Multi-Agent Teams

The International FLAIRS Conference Proceedings

... In multi-agent systems, each agent may have its own perspective and beliefs about the world, leading to different ways of expressing the same semantics. A key challenge in AI is representing knowledge and beliefs in such a decentralized context [3]. ...

Factored Beliefs for Machine Agents in Decentralized Partially Observable Markov Decision Processes

The International FLAIRS Conference Proceedings

... Whereas Schneider et al. [9] have further differentiated intents into "what" "why," and "how" categories based on the information estimated by agents, individuals, or systems, only a limited body of literature has focused on the "why" based intent. The "what" based intents deal with temporal patterns or goals to be achieved. ...

Intent integration for human‐agent teaming
  • Citing Article
  • April 2022

Systems Engineering

... Therefore, scholars argue that in an AI augmenting relationship, humans and AI systems complement each other's as team members since they differ in characteristics and strengths (Fuegener et al., 2022;Huang & Rust, 2022a). While teamwork is commonly surrounded by multiple subgoals that contribute to the primary goal of a team (Zercher et al., 2023), scholars find that AI in a team primarily assists humans in addressing the subgoals rather than autonomously handling entire tasks, due to the limited AI capabilities (Schneider et al., 2021). ...

Exploring the Impact of Coordination in Human–Agent Teams
  • Citing Article
  • May 2021

Journal of Cognitive Engineering and Decision Making

... Sound decision-making to support command and control functions at tactical, operational and strategic level is key to the success of emergency and crisis management. In the military domain there is a strong emphasis on this topic and several SGs for training and analysis have been developed, for example, to explore new decision-making paradigms for multi-domain operations [37]. On the contrary, SGs for public health and other fields with a strong emergency management component have devoted little attention to this aspect, with little exceptions such as training SGs on hospital emergency management (e.g., [38]) or firefighting (e.g., [26]). ...

Battlespace Next(TM): Developing a Serious Game to Explore Multi-Domain Operations

International Journal of Serious Games

... With an emphasis on the system's structural design, the assessment of OntoRESec was scoped toward the reversed UML class diagrams, which are the main structural design output from SRE. In the assessment of reversed class diagrams, OntoRESec focuses on security, since it is a major quality concern and should be incorporated into the automated SRE context and the rapid development environment where design and documentation are less considered (Henry and Peterson 2020;Mohammed et al. 2017). This is especially true in terms of poor class design, such as UML class diagram, which has been identified as a major cause of attacks on software systems (Georg et al. 2010;Sommestad et al. 2010;Basin et al. 2009Basin et al. , 2006. ...

SensorRE: Provenance Support for Software Reverse Engineers

Computers & Security

... Completely automated trajectory planning has previously been proposed [3], such as in the agricultural sector [4]. However, the programmed trajectories are dependent on the shape and size of the intended site, and need to be reprogrammed each time a new site is visited. ...

A development platform for behavioral flexibility in autonomous unmanned aerial systems

International Journal of Intelligent Robotics and Applications

... Hence, this strategy typically has a lower computational burden and higher flexibility. Many studies have validated the effectiveness of the decentralized strategy [20][21][22][23]. In this work, a decentralized strategy is introduced in the proposed FINNCH method, in which each pursuer moves independently while cooperating with the other pursuers. ...

Decentralized Control Strategies for Unmanned Aircraft System Pursuit and Evasion
  • Citing Conference Paper
  • September 2019