Leveraging Design Heuristics for Multi-Objective Metamaterial Design Optimization
Design optimization of metamaterials and other complex systems often relies on the use of computationally expensive models. This makes it challenging to use global multi-objective optimization approaches that require many function evaluations. Engineers often have heuristics or rules of thumb with potential to drastically reduce the number of function evaluations needed to achieve good convergence. Recent research has demonstrated that these design heuristics can be used explicitly in design optimization, indeed leading to accelerated convergence. However, these approaches have only been demonstrated on specific problems, the performance of different methods was diverse, and despite all heuristics being correct'', some heuristics were found to perform much better than others for various problems. In this paper, we describe a case study in design heuristics for a simple class of 2D constrained multiobjective optimization problems involving lattice-based metamaterial design. Design heuristics are strategically incorporated into the design search and the heuristics-enabled optimization framework is compared with the standard optimization framework not using the heuristics. Results indicate that leveraging design heuristics for design optimization can help in reaching the optimal designs faster. We also identify some guidelines to help designers choose design heuristics and methods to incorporate them for a given problem at hand.
Authors:
; ; ;
Award ID(s):
Publication Date:
NSF-PAR ID:
10294278
Journal Name:
IDETC/CIE2021
1. Design optimization of metamaterials and other complex systems often relies on the use of computationally expensive models. This makes it challenging to use global multi-objective optimization approaches that require many function evaluations. Engineers often have heuristics or rules of thumb with potential to drastically reduce the number of function evaluations needed to achieve good convergence. Recent research has demonstrated that these design heuristics can be used explicitly in design optimization, indeed leading to accelerated convergence. However, these approaches have only been demonstrated on specific problems, the performance of different methods was diverse, and despite all heuristics being correct'', some heuristics were found to perform much better than others for various problems. In this paper, we describe a case study in design heuristics for a simple class of 2D constrained multiobjective optimization problems involving lattice-based metamaterial design. Design heuristics are strategically incorporated into the design search and the heuristics-enabled optimization framework is compared with the standard optimization framework not using the heuristics. Results indicate that leveraging design heuristics for design optimization can help in reaching the optimal designs faster. We also identify some guidelines to help designers choose design heuristics and methods to incorporate them for a given problem at hand.
4. Black hat hackers use malicious exploits to circumvent security controls and take advantage of system vulnerabilities worldwide, costing the global economy over $450 billion annually. While many organizations are increasingly turning to cyber threat intelligence (CTI) to help prioritize their vulnerabilities, extant CTI processes are often criticized as being reactive to known exploits. One promising data source that can help develop proactive CTI is the vast and ever-evolving Dark Web. In this study, we adopted the computational design science paradigm to design a novel deep learning (DL)-based exploit-vulnerability attention deep structured semantic model (EVA-DSSM) that includes bidirectional processing and attention mechanisms to automatically link exploits from the Dark Web to vulnerabilities. We also devised a novel device vulnerability severity metric (DVSM) that incorporates the exploit post date and vulnerability severity to help cybersecurity professionals with their device prioritization and risk management efforts. We rigorously evaluated the EVA-DSSM against state-of-the-art non-DL and DL-based methods for short text matching on 52,590 exploit-vulnerability linkages across four testbeds: web application, remote, local, and denial of service. Results of these evaluations indicate that the proposed EVA-DSSM achieves precision at 1 scores 20% - 41% higher than non-DL approaches and 4% - 10% higher than DL-basedmore » 5. Black hat hackers use malicious exploits to circumvent security controls and take advantage of system vulnerabilities worldwide, costing the global economy over$450 billion annually. While many organizations are increasingly turning to cyber threat intelligence (CTI) to help prioritize their vulnerabilities, extant CTI processes are often criticized as being reactive to known exploits. One promising data source that can help develop proactive CTI is the vast and ever-evolving Dark Web. In this study, we adopted the computational design science paradigm to design a novel deep learning (DL)-based exploit-vulnerability attention deep structured semantic model (EVA-DSSM) that includes bidirectional processing and attention mechanisms to automatically link exploits from the Dark Web to vulnerabilities. We also devised a novel device vulnerability severity metric (DVSM) that incorporates the exploit post date and vulnerability severity to help cybersecurity professionals with their device prioritization and risk management efforts. We rigorously evaluated the EVA-DSSM against state-of-the-art non-DL and DL-based methods for short text matching on 52,590 exploit-vulnerability linkages across four testbeds: web application, remote, local, and denial of service. Results of these evaluations indicate that the proposed EVA-DSSM achieves precision at 1 scores 20%-41% higher than non-DL approaches and 4%-10% higher than DL-based approaches. We demonstrated themore »