Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1441 - 1470 of 2678

Full-Text Articles in Physical Sciences and Mathematics

Dynamic Behavior Sequencing In A Hybrid Robot Architecture, Jeffrey P. Duffy Mar 2008

Dynamic Behavior Sequencing In A Hybrid Robot Architecture, Jeffrey P. Duffy

Theses and Dissertations

Hybrid robot control architectures separate plans, coordination, and actions into separate processing layers to provide deliberative and reactive functionality. This approach promotes more complex systems that perform well in goal-oriented and dynamic environments. In various architectures, the connections and contents of the functional layers are tightly coupled so system updates and changes require major changes throughout the system. This work proposes an abstract behavior representation, a dynamic behavior hierarchy generation algorithm, and an architecture design to reduce this major change incorporation process. The behavior representation provides an abstract interface for loose coupling of behavior planning and execution components. The hierarchy …


Exploitation Of Self Organization In Uav Swarms For Optimization In Combat Environments, Dustin J. Nowak Mar 2008

Exploitation Of Self Organization In Uav Swarms For Optimization In Combat Environments, Dustin J. Nowak

Theses and Dissertations

This investigation focuses primarily on the development of effective target engagement for unmanned aerial vehicle (UAV) swarms using autonomous self-organized cooperative control. This development required the design of a new abstract UAV swarm control model which flows from an abstract Markov structure, a Partially Observable Markov Decision Process. Self-organization features, bio-inspired attack concepts, evolutionary computation (multi-objective genetic algorithms, differential evolution), and feedback from environmental awareness are instantiated within this model. The associated decomposition technique focuses on the iterative deconstruction of the problem domain state and dynamically building-up of self organizational rules as related to the problem domain environment. Resulting emergent …


Applying Automated Theorem Proving To Computer Security, Kelly K. Mcelroy Mar 2008

Applying Automated Theorem Proving To Computer Security, Kelly K. Mcelroy

Theses and Dissertations

While more and more data is stored and accessed electronically, better access control methods need to be implemented for computer security. Formal modelling and analysis have been successfully used in certain areas of computer systems, such as verifying the security properties of cryptographic and authentication protocols. However, formal models for computer systems in cyberspace, like networks, have hardly advanced. A highly regarded graduate textbook cites the Take-Grant model created in 1977 as one of the \current" examples of security modelling and analysis techniques. This model is rarely used in practice though. This research implements the Take-Grant Protection model's four de …


Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson Mar 2008

Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson

Faculty Publications

No abstract provided.


An Investigation Into The Advantages, Mechanisms, And Developmental Challenges Of Scripted Mobile Routing, Boyeon Jang Mar 2008

An Investigation Into The Advantages, Mechanisms, And Developmental Challenges Of Scripted Mobile Routing, Boyeon Jang

Theses and Dissertations

Mobile Ad Hoc Network (MANET) routing protocols provide routing solutions in mobile wireless networks, without assuming any prior knowledge of topology nor any prediction of future topology. However, the resulting routes suffer from delay and consume precious bandwidth. Perfectly scripted routing could theoretically be optimal, (i.e., introduce no delay and cost no additional bandwidth), but would naturally be very fragile. This thesis explores a merging of these approaches, following a routing script if and when available, but reverting to a robust recovery approach otherwise. Script-Assisted Ad Hoc On-demand Distance Vector (S-AODV) routing protocol is designed to take advantage of prior …


Software Obfuscation With Symmetric Cryptography, Alan C. Lin Mar 2008

Software Obfuscation With Symmetric Cryptography, Alan C. Lin

Theses and Dissertations

Software protection is of great interest to commercial industry. Millions of dollars and years of research are invested in the development of proprietary algorithms used in software programs. A reverse engineer that successfully reverses another company‘s proprietary algorithms can develop a competing product to market in less time and with less money. The threat is even greater in military applications where adversarial reversers can use reverse engineering on unprotected military software to compromise capabilities on the field or develop their own capabilities with significantly less resources. Thus, it is vital to protect software, especially the software’s sensitive internal algorithms, from …


Measuring Dispersion In Laser Cavity Mirrors Using White-Light Interferometry, Allison S. Goodspeed Mar 2008

Measuring Dispersion In Laser Cavity Mirrors Using White-Light Interferometry, Allison S. Goodspeed

Theses and Dissertations

Terahertz radiation is an emerging field that has far reaching applications. There is a need for portable and affordable terahertz sources that may be used for detection of structural weaknesses in aerospace composites. One possibility for terahertz generation is a femtosecond Cr:LiSAF laser. However, controlling intracavity dispersion is necessary in order to get the ultrashort pulses needed to generate terahertz radiation. This research measures dispersion of the chirped femtosecond intracavity mirrors by employing white-light interferometry and explains the theory behind the curve-fitting process used to calculate dispersion. To compensate for the narrow reflectivity band of the mirrors, a CaF2 …


A Novel Communications Protocol Using Geographic Routing For Swarming Uavs Performing A Search Mission, Robert L. Lidowski Mar 2008

A Novel Communications Protocol Using Geographic Routing For Swarming Uavs Performing A Search Mission, Robert L. Lidowski

Theses and Dissertations

This research develops the UAV Search Mission Protocol (USMP) for swarming UAVs and determines the protocol's effect on search mission performance. It is hypothesized that geographically routing USMP messages improves search performance by providing geography-dependent data to locations where it impacts search decisions. It is also proposed that the swarm can use data collected by the geographic routing protocol to accurately determine UAV locations and avoid sending explicit location updates. The hypothesis is tested by developing several USMP designs that are combined with the Greedy Perimeter Stateless Routing (GPSR) protocol and a search mission swarm logic into a single network …


Dynamic Protocol Reverse Engineering A Grammatical Inference Approach, Mark E. Deyoung Mar 2008

Dynamic Protocol Reverse Engineering A Grammatical Inference Approach, Mark E. Deyoung

Theses and Dissertations

Round trip engineering of software from source code and reverse engineering of software from binary files have both been extensively studied and the state-of-practice have documented tools and techniques. Forward engineering of protocols has also been extensively studied and there are firmly established techniques for generating correct protocols. While observation of protocol behavior for performance testing has been studied and techniques established, reverse engineering of protocol control flow from observations of protocol behavior has not received the same level of attention. State-of-practice in reverse engineering the control flow of computer network protocols is comprised of mostly ad hoc approaches. We …


Creating An Agent Based Framework To Maximize Information Utility, John M. Pecarina Mar 2008

Creating An Agent Based Framework To Maximize Information Utility, John M. Pecarina

Theses and Dissertations

With increased reliance on communications to conduct military operations, information centric network management becomes vital. A Defense department study of information management for net-centric operations lists the need for tools for information triage (based on relevance, priority, and quality) to counter information overload, semi-automated mechanisms for assessment of quality and relevance of information, and advances to enhance cognition and information understanding in the context of missions [30]. Maximizing information utility to match mission objectives is a complex problem that requires a comprehensive solution in information classification, in scheduling, in resource allocation, and in QoS support. Of these research areas, the …


Street Gangs: A Modeling Approach To Evaluation "At Risk" Youth, Bernard Jacob Loeffelholz Mar 2008

Street Gangs: A Modeling Approach To Evaluation "At Risk" Youth, Bernard Jacob Loeffelholz

Theses and Dissertations

Street gangs have plagued the United States for decades. One focus of current gang prevention efforts strives to reduce the number of new recruits to local street gangs. This research proposes the uses of modeling and decision analysis to aid in identifying potentially “at risk” children likely to join a street gang in Montgomery County, Ohio. A stronger means of identification of “at risk” children can lead to a more efficient placement of resources to reduce the number of street gang recruits. The approach also aids in differentiating between neighborhoods to help focus efforts. Information obtained from value-focused thinking (VFT) …


Comparative Kinetics And Distribution To Target Tissues Of Organophosphates Using Physiologically-Based Pharmacokinetic Modeling, Rick E. Vermillion Mar 2008

Comparative Kinetics And Distribution To Target Tissues Of Organophosphates Using Physiologically-Based Pharmacokinetic Modeling, Rick E. Vermillion

Theses and Dissertations

A physiologically-based pharmacokinetic model has been developed to examine the effects of organophosphates on the levels of acetylcholine in different tissues throughout the mammalian body. Many organophosphate-like chemical and kinetic characteristics are tested without reference to a specific chemical. Characteristics include partition coefficients, metabolic constants, the inhibition coefficient, the aging rate, and the regeneration rate. Two separate exposure scenarios are tested and compared against a baseline. The baseline consists of a direct inhalation exposure. The first exposure scenario examines the effects of bronchial scrubbing (via inhalation) and the second scenario is a study of dermal exposures and compares the levels …


Oxygenation Of The Root Zone And Tce Remediation: A Plant Model Of Rhizosphere Dynamics, Ian F. Thompson Mar 2008

Oxygenation Of The Root Zone And Tce Remediation: A Plant Model Of Rhizosphere Dynamics, Ian F. Thompson

Theses and Dissertations

This study analyzes rhizosphere conditions that enhance the effective aerobic degradation of TCE in wetland bioremediation systems. A plant model was built using Stella 9.0 modeling software and uses numerical integration evaluation; it addresses movement of oxygen through plant vascular and aerenchymal systems, and into the rhizosphere where oxygen and other substrates influence bacteria. Methanotrophs and heterotrophs are assumed to be influential bacteria groups. Variations of humidity-induced-convection, methane, soil carbon, and copper concentrations are evaluated. Varying concentrations and hydraulic loadings of TCE are assessed with respect to TCE consumption rate and TCE treatment efficiency. Soil conditions most directly affected TCE …


An Analysis Of Information Asset Valuation (Iav) Quantification Methodology For Application With Cyber Information Mission Impact Assessment (Cimia), Denzil L. Hellesen Mar 2008

An Analysis Of Information Asset Valuation (Iav) Quantification Methodology For Application With Cyber Information Mission Impact Assessment (Cimia), Denzil L. Hellesen

Theses and Dissertations

The purpose of this research is to develop a standardized Information Asset Valuation (IAV) methodology. The IAV methodology proposes that accurate valuation for an Information Asset (InfoA) is the convergence of information tangible, intangible, and flow attributes to form a functional entity that enhances mission capability. The IAV model attempts to quantify an InfoA to a single value through the summation of weighted criteria. Standardizing the InfoA value criteria will enable decision makers to comparatively analyze dissimilar InfoAs across the tactical, operational, and strategic domains. This research develops the IAV methodology through a review of existing military and non-military valuation …


Statistical Removal Of Shadow For Applications To Gait Recognition, Brian D. Hockersmith Mar 2008

Statistical Removal Of Shadow For Applications To Gait Recognition, Brian D. Hockersmith

Theses and Dissertations

The purpose of this thesis is to mathematically remove the shadow of an individual on video. The removal of the shadow will aid in the rendering of higher quality binary silhouettes than previously allowed. These silhouettes will allow researchers studying gait recognition to work with silhouettes unhindered by unrelated data. The thesis begins with the analysis of videos of solid colored backgrounds. A formulation of the effect of shadow on specified colors will aid in the derivation of a hypothesis test to remove an individual’s shadow. Video of an individual walking normally, perpendicular to the camera will be utilized to …


Digital Signal Processing Leveraged For Intrusion Detection, Theodore J. Erickson Mar 2008

Digital Signal Processing Leveraged For Intrusion Detection, Theodore J. Erickson

Theses and Dissertations

This thesis describes the development and evaluation of a novel system called the Network Attack Characterization Tool (NACT). The NACT employs digital signal processing to detect network intrusions, by exploiting the Lomb-Scargle periodogram method to obtain a spectrum for sampled network traffic. The Lomb-Scargle method for generating a periodogram allows for the processing of unevenly sampled network data. This method for determining a periodogram has not yet been used for intrusion detection. The spectrum is examined to determine if features exist above a significance level chosen by the user. These features are considered an attack, triggering an alarm. Two traffic …


Entire Blow-Up Solutions Of Semilinear Elliptic Equations And Systems, Jesse D. Peterson Mar 2008

Entire Blow-Up Solutions Of Semilinear Elliptic Equations And Systems, Jesse D. Peterson

Theses and Dissertations

We examine two problems concerning semilinear elliptic equations. We consider single equations of the form Δu = p(x)uα + q(x)uβ for 0 <α ≤ β ≤1 and systems Δu = p(| x |) f (v), Δv = q(| x |)g(u) , both in Euclidean n -space, n ≥ 3 . These types of problems arise in steady state diffusion, the electric potential of some bodies, subsonic motion of gases, and control theory. For the single equation case, we present sufficient conditions on p and q to …


Predicting Cost And Schedule Growth For Military And Civil Space Systems, Christina F. Rusnock Mar 2008

Predicting Cost And Schedule Growth For Military And Civil Space Systems, Christina F. Rusnock

Theses and Dissertations

Military and civil space acquisitions have received much criticism for their inability to produce realistic cost and schedule estimates. This research seeks to provide space systems cost estimators with a forecasting tool for space system cost and schedule growth by identifying factors contributing to growth, quantifying the relative impact of these factors, and establishing a set of models for predicting space system cost and schedule growth. The analysis considers data from both Department of Defense (DoD) and National Aeronautics and Space Administration (NASA) space programs. The DoD dataset includes 21 space programs that submitted developmental Selected Acquisition Reports between 1969 …


Production And Characterization Of Femtosecond-Laser-Induced Air Plasma, David R. Armbruster Mar 2008

Production And Characterization Of Femtosecond-Laser-Induced Air Plasma, David R. Armbruster

Theses and Dissertations

The purpose of this research was to produce, characterize, and optimize laser induced air plasma as a preliminary step in using the plasma as a source of terahertz radiation. An 800 nanometer, 50 femtosecond, 0.75 Watt, pulsed Ti:Sapphire laser system was used as the source infrared beam. A beam expander was used to expand the beam to a diameter of approximately 6.5 mm, and the beam was focused through a 25 mm focal length achromatic lens to produce laser-induced plasma in ambient air. A 40 kHz ultrasonic transducer was used to detect the plasma. A second harmonic generation crystal was …


Algorithms For White-Box Obfuscation Using Randomized Subcircuit Selection And Replacement, Kenneth E. Norman Mar 2008

Algorithms For White-Box Obfuscation Using Randomized Subcircuit Selection And Replacement, Kenneth E. Norman

Theses and Dissertations

Software protection remains an active research area with the goal of preventing adversarial software exploitation such as reverse engineering, tampering, and piracy. Heuristic obfuscation techniques lack strong theoretical underpinnings while current theoretical research highlights the impossibility of creating general, efficient, and information theoretically secure obfuscators. In this research, we consider a bridge between these two worlds by examining obfuscators based on the Random Program Model (RPM). Such a model envisions the use of program encryption techniques which change the black-box (semantic) and white-box (structural) representations of underlying programs. In this thesis we explore the possibilities for white-box transformation. Under an …


Ant Clustering With Locally Weighting Ant Perception And Diversified Memory, Gilbert L. Peterson, Christopher B. Mayer, Thomas L. Kubler Mar 2008

Ant Clustering With Locally Weighting Ant Perception And Diversified Memory, Gilbert L. Peterson, Christopher B. Mayer, Thomas L. Kubler

Faculty Publications

Ant clustering algorithms are a robust and flexible tool for clustering data that have produced some promising results. This paper introduces two improvements that can be incorporated into any ant clustering algorithm: kernel function similarity weights and a similarity memory model replacement scheme. A kernel function weights objects within an ant’s neighborhood according to the object distance and provides an alternate interpretation of the similarity of objects in an ant’s neighborhood. Ants can hill-climb the kernel gradients as they look for a suitable place to drop a carried object. The similarity memory model equips ants with a small memory consisting …


Cyber Flag: A Realistic Cyberspace Training Construct, Andrew P. Hansen Mar 2008

Cyber Flag: A Realistic Cyberspace Training Construct, Andrew P. Hansen

Theses and Dissertations

As is well understood, the rapidly unfolding challenges of cyberspace is a fundamental warfare paradigm shift revolutionizing the way future wars will be fought and won. A significant test for the Air Force (indeed any organization with a credible presence in cyberspace) will be providing a realistic training environment that fully meets this challenge. Why create another Flag level exercise? Realistic training (that which is effective, comprehensive and coordinated) is crucial to success in time of war. Red Flag provides dominant training within the air domain and now with the evolution of cyberspace, a comprehensive training environment is necessary to …


Statistical Approach To The Characterization And Recognition Of Human Gaits, Derrick M. Chelliah Mar 2008

Statistical Approach To The Characterization And Recognition Of Human Gaits, Derrick M. Chelliah

Theses and Dissertations

This thesis addresses the final portion of a complete process for human gait recognition. The thesis takes as input information that has been generated from videotaping walking individuals and converting their gaits into numerical data that measures the locations of various points on the body through time. Beginning with this data, this thesis uses a variety of mathematical and statistical methods to create identifying signatures for each individual and identify them on the basis of that signature. The end goal is to achieve under controlled laboratory conditions human gait recognition, an identification method which does not require contact or cooperation …


Risk-Based Comparison Of Classification Systems, Seth B. Wagenman Mar 2008

Risk-Based Comparison Of Classification Systems, Seth B. Wagenman

Theses and Dissertations

Performance measures for families of classification system families that rely upon the analysis of receiver operating characteristics (ROCs), such as area under the ROC curve (AUC), often fail to fully address the issue of risk, especially for classification systems involving more than two classes. For the general case, we denote matrices of class prevalences, costs, and class-conditional probabilities, and assume costs are subjectively fixed, acceptable estimates for expected values of class-conditional probabilities exist, and mutual independence between a variable in one such matrix and those of any other matrix. The ROC Risk Functional (RRF), valid for any finite number of …


Nonmechanical Multizoom Telescope Design Using A Liquid Crystal Spatial Light Modulator And Focus-Correction Algorithm, Eric W. Thompson Mar 2008

Nonmechanical Multizoom Telescope Design Using A Liquid Crystal Spatial Light Modulator And Focus-Correction Algorithm, Eric W. Thompson

Theses and Dissertations

Theoretical development and design of a compact nonmechanical multi-zoom telescope system is presented. A liquid crystal spatial light modulator (LC SLM) enables selection of four separate beam paths without the use of moving parts. Each path incurs a different focus aberration in the image plane that can be deconvolved with postprocessing to yield four possible corrected magnification options. To increase flexibility, each region has a 40-wave subrange of focus. Optical zooms of up to 10 times magnification are feasible and are limited only by system noise and signal to noise ratio. Elimination of moving parts for focus could prove beneficial …


Dod Role For Securing United States Cyberspace, Jane J. Griffin Mar 2008

Dod Role For Securing United States Cyberspace, Jane J. Griffin

Theses and Dissertations

The cyber attacks on Estonia in late April and the early weeks of May 2007 significantly crippled the country, preventing it from performing banking, communications, news reporting, government transactions and command and control activities. Estonia is considered a “Wired Society”, much like the United States. Both countries rely on the cyberspace infrastructure economically and politically. Estonia sought assistance outside the country to recover from and to address the attacks. The cyber attacks on Estonia focused world-wide attention on the effects that cyberspace attacks could have on countries. If a cyber attack of national significance occurred against the United States, what …


Obfuscation Framework Based On Functionally Equivalent Combinatorial Logic Families, Moses C. James Mar 2008

Obfuscation Framework Based On Functionally Equivalent Combinatorial Logic Families, Moses C. James

Theses and Dissertations

This thesis aims to be a few building blocks in the bridge between theoretical and practical software obfuscation that researchers will one day construct. We provide a method for random uniform selection of circuits based on a functional signature and specific construction specifiers. Additionally, this thesis includes the first formal definition of an algorithm that performs only static analysis on a program; that is analysis that does not rely on the input and output behavior of the analyzed program. This is analogous to some techniques used in real-world software reverse engineering. Finally, this thesis uses the equivalent circuit library to …


The Importance Of Generalizability To Anomaly Detection, Gilbert L. Peterson, Brent T. Mcbride Mar 2008

The Importance Of Generalizability To Anomaly Detection, Gilbert L. Peterson, Brent T. Mcbride

Faculty Publications

In security-related areas there is concern over novel “zero-day” attacks that penetrate system defenses and wreak havoc. The best methods for countering these threats are recognizing “nonself” as in an Artificial Immune System or recognizing “self” through clustering. For either case, the concern remains that something that appears similar to self could be missed. Given this situation, one could incorrectly assume that a preference for a tighter fit to self over generalizability is important for false positive reduction in this type of learning problem. This article confirms that in anomaly detection as in other forms of classification a tight fit, …


Ultrafast Spectroscopy Of Mid-Infrared Semiconductors Using The Signal And Idler Beams Of A Synchronous Optical Parametric Oscillator, Richard M. Derbis Mar 2008

Ultrafast Spectroscopy Of Mid-Infrared Semiconductors Using The Signal And Idler Beams Of A Synchronous Optical Parametric Oscillator, Richard M. Derbis

Theses and Dissertations

Mid-Wave Infrared (MWIR) semiconductors are of use to the Air Force for several applications. Ultrafast spectroscopy can be used to better quantify the effectiveness of semiconductor opto-electronic devices. The objective of this thesis was to improve the procedure for taking ultrafast, time-resolved measurements of photoluminescence from MWIR semiconductors. Previous work has used a mode-locked titanium sapphire (Ti:Saph) laser to excite the semiconductor sample and to upconvert the photoluminescence from the semiconductor. Work completed in this thesis improved on the techniques developed during previous work. A synchronous Optical Parameter Oscillator (OPO) will be used to convert the Ti:Saph laser (0.830 µm) …


Limitations Of Segmented Wavefront Control Devices In Emulating Optical Turbulence, Michael D. Plourde Mar 2008

Limitations Of Segmented Wavefront Control Devices In Emulating Optical Turbulence, Michael D. Plourde

Theses and Dissertations

Using a device to act as a surrogate for atmospheric turbulence in a laboratory is necessary to build and test optical systems for imaging, lidar, laser weapons, and laser communications. Liquid-crystal spatial light modulators (LC SLMs) and segmented micro-electro-mechanical-system (MEMS) deformable mirrors (DMs) are commonly used devices for altering wavefronts in order to simulate a portion of atmospheric turbulence. The best location of these devices was theoretically analyzed to obtain the broadest possible range of atmospheric conditions. It was found that two phase screens should be placed at the beginning of the optical path to achieve maximum turbulence strength for …