Create and release your Profile on Zintellect – Postdoctoral applicants must create an account and complete a profile in the on-line application system. Please note: your resume/CV may not exceed 2 pages.
Complete your application – Enter the rest of the information required for the IC Postdoc Program Research Opportunity. The application itself contains detailed instructions for each one of these components: availability, citizenship, transcripts, dissertation abstract, publication and presentation plan, and information about your Research Advisor co-applicant.
Additional information about the IC Postdoctoral Research Fellowship Program is available on the program website located at: https://orise.orau.gov/icpostdoc/index.html.
If you have questions, send an email to ICPostdoc@orau.org. Please include the reference code for this opportunity in your email.
Research Topic Description, including Problem Statement:
The Internet of Things, software vulnerability assessments, ontologies, and social networks, among other areas, can be modelled as graph-structured data and analyzed using complex graph theory and network analysis. Graph theory analysis can identify reoccurring events and community structures. The structure of a network is key to its function, and of particular interest is the discovery of repeating patterns across a single large complex network without prior information. A pattern in a network may represent a reoccurring event or a key functional block. The expectation is that the presence of patterns will not be limited to communities or functional blocks and could form in any part of the graph structure. Methods exist to detect the occurrences of a pattern within a network, such as subgraph isomorphism matching, however these require prior information of the pattern structure. The key to this problem statement is the unsupervised discovery of the patterns, using either machine learning (ML) or non-ML methods.
As the scale and complexity of these networks are increasing rapidly, there is a computational challenge to pattern discovery. Pattern discovery in small and static networks may be done manually, but it is becoming progressively less feasible and quality of analysis will be low. There are limited algorithms available to discover small patterns within moderate-sized heterogeneous networks, such as motif-detection and the graph-based data-mining system Subdue.[1] However, these do not scale to larger or more complex scenarios. Steps in the direction of unsupervised pattern discovery are apparent through research into Graph Neural Networks among other methods.
Complex network datasets are available; however, none have been identified to have existing labelled repeating patterns. These include but are not limited to:
Reference:
[1] Ketkar, N, Holder, L and Cook, D., "Subdue: compression-based frequent pattern discovery in graph data". 2005, ACM.
Example Approaches:
A scalable method for the discovery of large repeating patterns within a single complex network graph is required. Innovative solutions, using either ML or non-ML methods, are sought to develop the ability to identify repeating patterns across a single large and complex network. Our current focus is the discovery of large patterns (50-100 nodes) in complex (>100,000 nodes) static networks (i.e. not changing over time) with no prior knowledge of their structure, and their exact matches across the network. The key constraint is that there will be no prior knowledge of the patterns. Rather than searching for instances of a known pattern, the requirement is to discover the patterns that exist within the network data. Proposals may wish to consider how the method may apply or extend to:
Proposals should include:
The potential to adapt the method for non-exact pattern matching and pattern discovery within a temporal dataset may also be included with the consideration for future work. However, the key focus should be on static networks.
Technical collaboration will be provided during the research process. Classified data will be used to test and assess methods, and feedback will be provided for further development.
Relevance to the Intelligence Community:
Pattern discovery using graph theory has several identified use cases across the Intelligence Community (IC) including:
Successful pattern detection will provide insight into areas of understanding where human capability is a limitation. Further advancement of this work will enable improved analysis of temporal data. This may lead to identification of repeating or interconnected events across a network which cannot be identified by human analysis.
This work will contribute to a large number of capabilities across the IC.
Key Words: Large Complex Networks, Network Analysis, Scalable, Pattern Discovery, Graph Theory
You gave a rating of 0 star(s)
SECURITY/PRIVACY NOTICE
By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOGOUT IMMEDIATELY if you do not agree to the conditions stated in this warning.
SECURITY NOTICE
This system is part of a Federal information system. This system is monitored for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this system, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; to upload or change information; to otherwise cause system or information damage; or otherwise to interfere with the system or its operation, is prohibited. Evidence of such acts may be dis-closed to law enforcement authorities and result in prosecution under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act of 1996, or other applicable laws.
PRIVACY NOTICE
This system is for authorized use only. Use of this system constitutes consent to security monitoring and testing. All activity is logged with your host name and IP address. Users (authorized or unauthorized) have no explicit or implicit expectation of privacy. Any or all uses of this system and all files on this system may be intercepted, monitored, recorded, copied, audited, inspected, and dis-closed to authorized site and law enforcement personnel, as well as authorized officials of other agencies, both domestic and foreign. By using this system, the user consents to such interception, monitoring, recording, copying, auditing, inspection, and disclosure at the discretion of authorized site or law enforcement personnel. Unauthorized or improper use of this system may result in administrative disciplinary action and civil and criminal penalties.
You have been inactive on this page for . You will be logged out after 03:00:00.
Select an icon below to visit the website and download an appropriate browser.
For help, please email Zintellect@orau.org.
Question: What is the deadline for submitting an application?
Answer: Not all opportunities have application deadlines. Some opportunities remain open until they are filled. If an opportunity has an application deadline, then it will be listed in the opportunity details or in the opportunity catalog.
Question: How do I reset my password?
Answer: If you have forgotten your password or wish to reset your password, use the "Forgot password or username?" tab on the login to reset it.
Question: I forgot my username. How do I retrieve it?
Answer: Use the "Forgot password or username?" tab on the login. You will receive an email containing your username.
Question: What do I need to submit an application?
Answer: Typically, applicants are required to submit a resume or CV, an official copy of their transcripts or academic record, and a minimum of two references at the time they apply. Additional requirements such as a writing sample, thesis or dissertation, etc. may be required. Review the opportunity details for additional information about the requirements for applying for an opportunity.
Question: Where do I upload my transcripts?
Answer: If required, you will be asked to upload your transcript as a part of the application process.
Question: Where do I submit a writing sample?
Answer: If required, you will be asked to upload a writing sample as part of the application process.
Question: Can a family member serve as a reference?
Answer: No; family members may not serve as references. References must be able to speak to your educational and/or professional experience. At least one academic reference is preferred.
Our Zintellect A.I. is constantly learning how to Match you to our opportunities! So, we want to know when we get it right or when we get it wrong. This will help us make our better! Plus, as a potential applicant to one of our many opportunities across the country, we value you and want to help you on your career path!