Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1081 - 1110 of 2678

Full-Text Articles in Physical Sciences and Mathematics

3-D Scene Reconstruction From Aerial Imagery, Jared M. Ekholm Mar 2012

3-D Scene Reconstruction From Aerial Imagery, Jared M. Ekholm

Theses and Dissertations

3-D scene reconstructions derived from Structure from Motion (SfM) and Multi-View Stereo (MVS) techniques were analyzed to determine the optimal reconnaissance flight characteristics suitable for target reconstruction. In support of this goal, a preliminary study of a simple 3-D geometric object facilitated the analysis of convergence angles and number of camera frames within a controlled environment. Reconstruction accuracy measurements revealed at least 3 camera frames and a 6 convergence angle were required to achieve results reminiscent of the original structure. The central investigative effort sought the applicability of certain airborne reconnaissance flight profiles to reconstructing ground targets. The data sets …


Matrix Determination Of Reflectivity Of Hidden Object Via Indirect Photography, Simon S. Ferrel Mar 2012

Matrix Determination Of Reflectivity Of Hidden Object Via Indirect Photography, Simon S. Ferrel

Theses and Dissertations

Indirect photography is a recently demonstrated technique which expands on the principles of dual photography and allows for the imaging of hidden objects. A camera and light source are collocated with neither having line-of-sight access to the hidden object. Light from the source, a laser, is reflected off a visible non-specular surface onto the hidden object, where it is reflected back to the initial non-specular surface and collected by the camera. This process may be repeated numerous times for various laser spot positions to yield slightly different camera images due to a variation in the illumination of the object. These …


Positron Lifetime Modulation By Electric Field Induced Positronium Formation On A Gold Surface, Daniel J. Higgins Mar 2012

Positron Lifetime Modulation By Electric Field Induced Positronium Formation On A Gold Surface, Daniel J. Higgins

Theses and Dissertations

The purpose of this project is to study the lifetime and annihilation mode of positrons, the antimatter counterpart to electrons, and the formation rate of positronium on a gold surface modified by gold nanoparticles under the influence of radial electric fields measured using two independent systems. The positron annihilation photon pair/triplet spectroscopy system uses a sodium iodide ring detector segmented into six detection regions providing rough position sensitivity to measure the ratio of two to three photon positron annihilation events. An increased rate of three photon annihilation events and a decreased rate of two photon annihilation events are observed when …


Comparative Statistical Analysis Of Auroral Models, Cory T. Lane Mar 2012

Comparative Statistical Analysis Of Auroral Models, Cory T. Lane

Theses and Dissertations

The location of the equatorward boundary of the auroral oval provides an appropriate means to measure the accuracy of auroral models. In this study, the equatorward boundary is represented by the location at which the energy flux data measured by DMSP satellites exceeds 0.4 erg/cm2/s. The MLAT coordinates obtained from more than 4,000 orbits through the polar region of the Northern Hemisphere comprise the data set used to compare to the outputs of five auroral models. These models are: the original Hardy auroral model of 1985 (OH), the OVATION Prime model (OP), the 2008 adaptation to the Hardy …


Durability Of Mwcnt Composites Under Electron And Neutron Irradiation, Quan-Hai T. Lu Mar 2012

Durability Of Mwcnt Composites Under Electron And Neutron Irradiation, Quan-Hai T. Lu

Theses and Dissertations

Electromagnetic interference shielding effectiveness and conductive properties of carbon nanotube containing composites intended for use as satellite surface materials have been investigated following electron and neutron irradiation. The MWCNT composites were irradiated to fluence levels of 1016 electrons/cm2 with 500 keV electrons. Increase in EMI-SE and conductivity was observed following electron irradiation in two of the samples. The sample with alternating layers of MWCNT and glass had a decrease in conductivity and an increase in EMI-SE post irradiation. This would suggest that the different layered configuration does play a role in the durability of the composite. Having multiple …


Neutron Detection Using Amorphous Boron-Carbide Hetero-Junction Diodes, Thomas P. Mcquary Mar 2012

Neutron Detection Using Amorphous Boron-Carbide Hetero-Junction Diodes, Thomas P. Mcquary

Theses and Dissertations

The high energy products of the 10B(n,α)7Li neutron capture reaction were explored as a means of thermal neutron detection in thin film amorphous boron carbide (a--B5C:Hx) on n-type silicon hetero-junction diodes. Pulse height spectroscopy was conducted on the diodes while they were subjected to a moderated plutonium-beryllium (PuBe) source. Neutron capture could not be confirmed experimentally in any of the devices tested. Device modeling was performed to investigate the cause for the diode detector's negative response. A 1.47 MeV α particle produced transient current of 10-7 A and the induced was 4.7 …


The Focusing Of Light Scattered From Diffuse Reflectors Using Phase Modulation, Jessica M. Schafer Mar 2012

The Focusing Of Light Scattered From Diffuse Reflectors Using Phase Modulation, Jessica M. Schafer

Theses and Dissertations

“Indirect photography" was recently demonstrated for imaging hidden scene information through the collection and radiometric modeling of light reflecting off of visible reflecting surfaces. The ability to focus the beam that reflects off the visible surface to a tight spot on the hidden object is theorized to simulate a direct line of sight from the light source to the object, reducing the radiometric model to that of the previously demonstrated dual photography. Experiments involving the focusing of light transmitted through highly scattering media have been adapted to the case of reflection. The focusing of a HeNe laser reflected off diffusely …


A Quantitative Analysis Of Solar Flare Characteristics As Observed In The Solar Observing Optical Network And The Global Oscillation Network Group, Thomas M. Wittman Mar 2012

A Quantitative Analysis Of Solar Flare Characteristics As Observed In The Solar Observing Optical Network And The Global Oscillation Network Group, Thomas M. Wittman

Theses and Dissertations

This study consists of a quantitative comparison of H-alpha solar flare area and brightness as recorded by the Solar Observing Optical Network (SOON) and the Global Oscillation Network Group (GONG) from March 11 through November 30, 2011. The Air Force utilizes the three-site SOON network for H-alpha flare monitoring, while the six-site GONG network, managed by the National Solar Observatory, provides backup H alpha flare monitoring for SOON. A total of 1000 flares were observed and 100 of these were rated larger or brighter than the 0-F category. In the SOON network, 8% of flares observed by two sites had …


Security Standards And Best Practice Considerations For Quantum Key Distribution (Qkd), Carole A. Harper Mar 2012

Security Standards And Best Practice Considerations For Quantum Key Distribution (Qkd), Carole A. Harper

Theses and Dissertations

Quantum Key Distribution (QKD) systems combine cryptographic primitives with quantum information theory to produce a theoretic unconditionally secure cryptographic key. However, real-world implementations of QKD systems are far from ideal and differ significantly from the theoretic model. Because of this, real-world QKD systems require additional practical considerations when implemented to achieve secure operations. In this thesis, a content analysis of the published literature is conducted to determine if established security and cryptographic standards and best practices are addressed in real world, practical QKD implementations. The research reveals that most published, real world QKD implementations do not take advantage of established …


Optimization Of Nanoscale Zero-Valent Iron For The Remediation Of Groundwater Contaminants, Andrew W. E. Mcpherson Mar 2012

Optimization Of Nanoscale Zero-Valent Iron For The Remediation Of Groundwater Contaminants, Andrew W. E. Mcpherson

Theses and Dissertations

Nanoscale zero-valent iron (nZVI) is an emerging tool for the remediation of groundwater contaminants. The nanoparticles are capable of reductively destroying or immobilizing a wide range of contaminants. Their small size results in a high surface area to mass ratio, making them much more reactive compared to their more-coarse predecessors. Small particle size also allows nZVI particles to be injected directly into contaminated areas via a well, limiting the above-ground footprint and allowing access to contaminated areas that are beyond the reach of some conventional methods. nZVI technology has the potential to facilitate remediation in difficult situations, improve remediation outcomes, …


Prototyping The Use Of Dispersion Models To Predict Ground Concentrations During Burning Of Deployed Military Waste, Val Oppenheimer Mar 2012

Prototyping The Use Of Dispersion Models To Predict Ground Concentrations During Burning Of Deployed Military Waste, Val Oppenheimer

Theses and Dissertations

United States military forces in Iraq and Afghanistan have often used open burning of solid waste as a means to achieve volume reduction and to minimize vector borne illnesses. Assessing exposures to burn pit emissions has proven challenging, requiring significant numbers of personnel and sampling equipment. This study examined the use of three common dispersion models to determine the feasibility of using software modeling to predict short-range exposures to burn pit emissions, in lieu of sole reliance on ground sampling. Four open burn tests of municipal solid waste were conducted at Tooele Army Depot, Utah. Aerial samples were collected above …


Analysis Of Leadership In Energy And Environmental Design® Construction In The Air Force, James M. Rozzoni Mar 2012

Analysis Of Leadership In Energy And Environmental Design® Construction In The Air Force, James M. Rozzoni

Theses and Dissertations

The Air Force uses the Leadership in Energy and Environmental Design (LEED) rating system as a third party verification system to ensure sustainable and resource-conscious facilities. The Federal Government has implemented several mandates in recent years that require certain milestones be met for energy reduction, water conservation, renewable energy use, and so forth. This research aims to determine how the Air Force has implemented LEED through credit analysis, and to better understand why LEED is being used in this way. Using a database of 172 military construction projects, the research evaluates the frequency of credit usage individually and by category. …


A Women-Only Comparision Of The U.S. Air Force Fitness Test And The Marine Combat Fitness Test, Tarah D. Mitchell Mar 2012

A Women-Only Comparision Of The U.S. Air Force Fitness Test And The Marine Combat Fitness Test, Tarah D. Mitchell

Theses and Dissertations

In 2009, Captain Thomas Worden determined the Air Force Physical Fitness Test (AFPFT) poorly predicted combat capability for his 86 study participants. With only 5 of these 86 volunteers being women, this limited Worden's findings to primarily men. This follow-on research investigated whether these results carried over to women. We recruited 61 female volunteers and compared their performance on the AFPFT to the Marine Combat Fitness Test, the proxy for combat capability. Like Worden's research, we discovered little association between the two (R2 of 0.161). However, this association significantly increased (adj R2 of 0.572) when utilizing the raw …


Evaluation Of Malware Target Recognition Deployed In A Cloud-Based Fileserver Environment, G. Parks Masters Mar 2012

Evaluation Of Malware Target Recognition Deployed In A Cloud-Based Fileserver Environment, G. Parks Masters

Theses and Dissertations

Cloud computing, or the migration of computing resources from the end user to remotely managed locations where they can be purchased on-demand, presents several new and unique security challenges. One of these challenges is how to efficiently detect malware amongst files that are possibly spread across multiple locations in the Internet over congested network connections. This research studies how such an environment will impact the performance of malware detection. A simplified cloud environment is created in which network conditions are fully controlled. This environment includes a fileserver, a detection server, the detection mechanism, and clean and malicious file sample sets. …


Ladar Performance Simulations With A High Spectral Resolution Atmospheric Transmittance And Radiance Model- Leedr, Benjamin D. Roth Mar 2012

Ladar Performance Simulations With A High Spectral Resolution Atmospheric Transmittance And Radiance Model- Leedr, Benjamin D. Roth

Theses and Dissertations

In this study of atmospheric effects on Geiger Mode laser ranging and detection (LADAR), the parameter space is explored primarily using the Air Force Institute of Technology Center for Directed Energy's (AFIT/CDE) Laser Environmental Effects Definition and Reference (LEEDR) code. The LADAR system is assessed at operationally representative wavelengths of 1.064, 1.56 and 2.039 μm with several up and down looking engagement geometries at locations worldwide. Results computed with LEEDR are compared to standard atmosphere and Fast Atmospheric Signature Code (FASCODE) assessments. Results show significant climate dependence, but large variances between climatological and standard atmosphere assessments. An overall average absolute …


Turbulence Measurement In The Atmospheric Boundary Layer Using Cellular Telephone Signals, Lee R. Burchett Mar 2012

Turbulence Measurement In The Atmospheric Boundary Layer Using Cellular Telephone Signals, Lee R. Burchett

Theses and Dissertations

This thesis investigated a new method for measuring the intensity of turbulence in the planetary boundary layer that shows a high correlation with measurements from weather radar. The method takes measurements of cell phone signal strength and uses scintillation in the signal to estimate the strength of local turbulence. Using cell phone signals provides unique measurement advantages: it is a passive measurement method, it is not strongly affected by precipitation, and one device can potentially measure several paths at once. The measurements were taken using an Android® cell phone running a custom built application. The strength of turbulence was quantified …


Characterization Of A Hyperspectral Chromotomographic Imaging Ground System, Chad B. Su'e Mar 2012

Characterization Of A Hyperspectral Chromotomographic Imaging Ground System, Chad B. Su'e

Theses and Dissertations

A field-deployable hyperspectral chromotomographic imager has been developed and tested as a risk-reduction prototype to assist design of a space-based system. The instrument uses a high-speed video camera looking through a rotating direct-vision prism to simultaneously observe the full field of view in all visible wavelength channels. The chromotomographic process multiplexes the spectral and spatial so an advanced reconstruction algorithm is required to separate the spectral channels. A physics-based model of the instrument was developed to assist in future trade-space choices for design of the spaced-based system. Additionally, the model is used for the development and assessment of the filtered …


Using Multiattribute Utility Copulas In Support Of Uav Search And Destroy Operations, Beau A. Nunnally Mar 2012

Using Multiattribute Utility Copulas In Support Of Uav Search And Destroy Operations, Beau A. Nunnally

Theses and Dissertations

The multiattribute utility copula is an emerging form of utility function used by decision analysts to study decisions with dependent attributes. Failure to properly address attribute dependence may cause errors in selecting the optimal policy. This research examines two scenarios of interest to the modern warfighter. The first scenario employs a utility copula to determine the type, quantity, and altitude of UAVs to be sent to strike a stationary target. The second scenario employs a utility copula to examine the impact of attribute dependence on the optimal routing of UAVs in a contested operational environment when performing a search and …


Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits, Henry W. Bushey Mar 2012

Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits, Henry W. Bushey

Theses and Dissertations

Supervisory Control and Data Acquisition (SCADA) systems control and monitor services for the nation's critical infrastructure. Recent cyber induced events (e.g., Stuxnet) provide an example of a targeted, covert cyber attack against a SCADA system that resulted in physical effects. Of particular note is how Stuxnet exploited the trust relationship between the human machine interface (HMI) and programmable logic controllers (PLCs). Current methods for validating system operating parameters rely on message exchange and network communications protocols, generally observed at the HMI. Although sufficient at the macro level, this method does not provide detection of malware that exhibits physical effects via …


Spectral And Spatial Coherent Emission Of Thermal Radiation From Metal-Semiconductor Nanostructures, Shane N. Mcconnell Mar 2012

Spectral And Spatial Coherent Emission Of Thermal Radiation From Metal-Semiconductor Nanostructures, Shane N. Mcconnell

Theses and Dissertations

The spectral and spatial radiative properties of coherent thermal emission in the mid- and far-IR through the use of micro and nano-structured metal-semiconductor materials were designed and demonstrated experimentally. Using an implementation of the Rigorous Coupled Wave Analysis and Computer Simulation Technology (CST), two structures were designed to selectively emit at mid- and far-IR wavelengths, a 1-D truncated multilayer resonator and a 3-D hybrid photonic crystal (PC)-multilayer. A High Impulse Power Magnetron Sputtering (HIPIMS) deposition technique was used to fabricate two silver-germanium-silver (Ag-Ge-Ag) resonating structures with layer thicknesses of 6-240-160 nm for one sample and 6-700-200 nm for the other. …


Cesium Absorption Spectrum Perturbed By Argon: Observation Of Non-Lorentzian Far Wings, Gordon E. Lott Mar 2012

Cesium Absorption Spectrum Perturbed By Argon: Observation Of Non-Lorentzian Far Wings, Gordon E. Lott

Theses and Dissertations

The purpose of this research was to observe the core and far wing absorption spectra of the D1 and D2 lines of cesium (Cs) perturbed by argon (Ar). A 1.33 m scanning monochromator with a PMT detector was used to measure the spectra from 8300 Å to 9100 Å. A heat pipe was used to control the Cs concentration and Ar pressure allowing for a broad range of spectra to be collected. Spectra were collected for heat pipe temperatures of 50, 75, 100, 125, 150 and 175 °C, corresponding to Cs concentrations of approximately 6×1011, 4×10 …


Magnesium Object Manager Sandbox, A More Effective Sandbox Method For Windows 7, Martin A. Gilligan Mar 2012

Magnesium Object Manager Sandbox, A More Effective Sandbox Method For Windows 7, Martin A. Gilligan

Theses and Dissertations

A major issue in computer security is limiting the affects a program can have on a computer. One way is to place the program into a sandbox, a limited environment. Many attempts have been made to create a sandbox that maintains the usability of a program and effectively limits the effects of the program. Sandboxes that limit the resources programs can access, have succeeded. To test the effectiveness of a sandbox that limits the resources a program can access on Windows 7, the Magnesium Object Manager Sandbox (MOMS) is created. MOMS uses a kernel mode Windows component to monitor and …


Mfire-2: A Multi Agent System For Flow-Based Intrusion Detection Using Stochastic Search, Timothy J. Wilson Mar 2012

Mfire-2: A Multi Agent System For Flow-Based Intrusion Detection Using Stochastic Search, Timothy J. Wilson

Theses and Dissertations

Detecting attacks targeted against military and commercial computer networks is a crucial element in the domain of cyberwarfare. The traditional method of signature-based intrusion detection is a primary mechanism to alert administrators to malicious activity. However, signature-based methods are not capable of detecting new or novel attacks. This research continues the development of a novel simulated, multiagent, flow-based intrusion detection system called MFIRE. Agents in the network are trained to recognize common attacks, and they share data with other agents to improve the overall effectiveness of the system. A Support Vector Machine (SVM) is the primary classifier with which agents …


Analysis Of The Impact Of Data Normalization On Cyber Event Correlation Query Performance, Smile T. Ludovice Mar 2012

Analysis Of The Impact Of Data Normalization On Cyber Event Correlation Query Performance, Smile T. Ludovice

Theses and Dissertations

A critical capability required in the operation of cyberspace is the ability to maintain situational awareness of the status of the infrastructure elements that constitute cyberspace. Event logs from cyber devices can yield significant information, and when properly utilized they can provide timely situational awareness about the state of the cyber infrastructure. In addition, proper Information Assurance requires the validation and verification of the integrity of results generated by a commercial log analysis tool. Event log analysis can be performed using relational databases. To enhance database query performance, previous literatures affirm denormalization of databases. Yet database normalization can also increase …


Determining Angular Frequency From A Video With A Generalized Fast Fourier Transform, Lindsay N. Smith Mar 2012

Determining Angular Frequency From A Video With A Generalized Fast Fourier Transform, Lindsay N. Smith

Theses and Dissertations

Suppose we are given a video of a rotating object and suppose we want to determine the rate of rotation solely from the video itself and its known frame rate. In this thesis, we present a new mathematical operator called the Geometric Sum Transform (GST) that can help one determine the angular frequency of the object in question. The GST is a generalization of the discrete Fourier transform (DFT) and as such, the two transforms have much in common. However, whereas the DFT is applied to a sequence of scalars, the GST can be applied to a sequence of vectors. …


Electrical And Optical Characterization Of Si-Ge-Sn, Merle D. Hamilton Mar 2012

Electrical And Optical Characterization Of Si-Ge-Sn, Merle D. Hamilton

Theses and Dissertations

The electrical characterization of boron-doped p-Si0.08Ge0.90Sn0.02/p-Ge(100) and p-Si0.112Ge0.86Sn0.028/n-Si(100) with various epilayer thicknesses was measured using the Hall effect. The room temperature sheet carrier concentration ranged from 1.21 x 1013 – 1.32 x 1016 cm-2. The room temperature mobilities were measured to be between 166 and 717 cm2/V·s, depending on sample composition. In the low temperature regime, the mobility was mainly affected by ionized impurity scattering. In the high temperature regime, the mobility was mainly affected by …


A Black Hole Attack Model For Reactive Ad-Hoc Protocols, Christopher W. Badenhop Mar 2012

A Black Hole Attack Model For Reactive Ad-Hoc Protocols, Christopher W. Badenhop

Theses and Dissertations

Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack on ad-hoc networks. An analytical Black Hole attack model is developed for reactive ad-hoc network protocols DSR and AODV. To simplify topology analysis, a hypercube topology is used to approximate ad-hoc topologies that have the same average node degree. An experiment is conducted to compare the predicted results of the analytical …


Computer Aided Multi-Data Fusion Dismount Modeling, Juan L. Morales Mar 2012

Computer Aided Multi-Data Fusion Dismount Modeling, Juan L. Morales

Theses and Dissertations

Recent research efforts strive to address the growing need for dismount surveillance, dismount tracking and characterization. Current work in this area utilizes hyperspectral and multispectral imaging systems to exploit spectral properties in order to detect areas of exposed skin and clothing characteristics. Because of the large bandwidth and high resolution, hyperspectral imaging systems pose great ability to characterize and detect dismounts. A multi-data dismount modeling system where the development and manipulation of dismount models is a necessity. This thesis demonstrates a computer aided multi-data fused dismount model, which facilitates studies of dismount detection, characterization and identification. The system is created …


Security Verification Of Secure Manet Routing Protocols, Matthew F. Steele Mar 2012

Security Verification Of Secure Manet Routing Protocols, Matthew F. Steele

Theses and Dissertations

Secure mobile ad hoc network (MANET) routing protocols are not tested thoroughly against their security properties. Previous research focuses on verifying secure, reactive, accumulation-based routing protocols. An improved methodology and framework for secure MANET routing protocol verification is proposed which includes table-based and proactive protocols. The model checker, SPIN, is selected as the core of the secure MANET verification framework. Security is defined by both accuracy and availability: a protocol forms accurate routes and these routes are always accurate. The framework enables exhaustive verification of protocols and results in a counter-example if the protocol is deemed insecure. The framework is …


Malware Target Recognition Via Static Heuristics, Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer, Michael R. Grimaila, Steven K. Rogers Feb 2012

Malware Target Recognition Via Static Heuristics, Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer, Michael R. Grimaila, Steven K. Rogers

Faculty Publications

Organizations increasingly rely on the confidentiality, integrity and availability of their information and communications technologies to conduct effective business operations while maintaining their competitive edge. Exploitation of these networks via the introduction of undetected malware ultimately degrades their competitive edge, while taking advantage of limited network visibility and the high cost of analyzing massive numbers of programs. This article introduces the novel Malware Target Recognition (MaTR) system which combines the decision tree machine learning algorithm with static heuristic features for malware detection. By focusing on contextually important static heuristic features, this research demonstrates superior detection results. Experimental results on large …