Jonathan Whetzel
YOU?
Author Swipe
View article: Machine learning for reactor power monitoring with limited labeled data
Machine learning for reactor power monitoring with limited labeled data Open
Real-time reactor power monitoring is critical for a variety of nuclear applications, spanning safety, security, operations, and maintenance. While machine learning methods have shown promise in monitoring reactor power levels, there is li…
View article: Behavioral Segmentation and Clustering of Geospatial Trajectories
Behavioral Segmentation and Clustering of Geospatial Trajectories Open
The rapid growth of global positioning system (GPS) devices has led to a corresponding increase in the size of GPS datasets. While these large GPS datasets contain a wealth of information about the behaviors of the moving objects in them, …
View article: TICC Clustering Library v.1.0
TICC Clustering Library v.1.0 Open
SAND2024-01234O TICC is a clustering algorithm that labels a sequence of data points according to numerical properties. This library is a Python implementation of the algorithm described in "Toeplitz Inverse Covariance-Based Clustering of …
View article: Experiences with SIGNAL: Opportunities and challenges with distributed wargaming
Experiences with SIGNAL: Opportunities and challenges with distributed wargaming Open
We describe the opportunities and challenges we faced when developing SIGNAL, an experimental wargame that was deployed as a distributed wargame.
View article: Multi-Class Clustering of Nuclear Reactor Power Levels for Transferable Classification.
Multi-Class Clustering of Nuclear Reactor Power Levels for Transferable Classification. Open
concentration of a difficult-to-measure radionuclide to another that is easily measured. The total disposal site inventory of certain difficult-to-measure radionuclides (e.g., [sup 14]C, [sup 129]I, and [sup 99]Tc) often control the total …
View article: SIGNAL Game Manual
SIGNAL Game Manual Open
SIGNAL is a first of its kind experimental wargame developed as part of the Project on Nuclear Gaming (PoNG). In this document we describe the rules and game mechanics associated with the online version of SIGNAL created by team members fr…
View article: Experimental Wargames to Address the Complexity–Scarcity Gap
Experimental Wargames to Address the Complexity–Scarcity Gap Open
National security decisions are driven by complex, interconnected contextual, individual, and strategic variables. Modeling and simulation tools are often used to identify relevant patterns, which can then be shaped through policy remedies…
View article: Experimental Wargames to Address the Complexity--Scarcity Gap
Experimental Wargames to Address the Complexity--Scarcity Gap Open
National security decisions are driven by complex, interconnected contextual, individual, and strategic variables. Modeling and simulation tools are often used to identify relevant patterns, which can then be shaped through policy remedies…
View article: Final Documentation: Incident Management And Probabilities Courses of action Tool (IMPACT).
Final Documentation: Incident Management And Probabilities Courses of action Tool (IMPACT). Open
This report pulls together the documentation produced for the IMPACT tool, a software-based decision support tool that provides situational awareness, incident characterization, and guidance on public health and environmental response stra…
View article: Modeling Economic Interdependence in Deterrence Using a Serious Game
Modeling Economic Interdependence in Deterrence Using a Serious Game Open
In order to understand the effect of economic interdependence on conflict and on deterrents to conflict, and to assess the viability of online games as experiments to perform research, an online serious game was used to gather data on econ…
View article: Dante Agent Architecture for Force-On-Force Wargame Simulation and Training
Dante Agent Architecture for Force-On-Force Wargame Simulation and Training Open
Physical site security heavily relies on expert teams continually examining and testing security profiles for discovering potential vulnerabilities. These experts hypothesize scenario(s) of interest and conduct “red versus blue” simulated …
View article: A Complex Systems Approach to More Resilient Multi-Layered Security Systems
A Complex Systems Approach to More Resilient Multi-Layered Security Systems Open
In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Direc…