Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1471 - 1500 of 2678

Full-Text Articles in Physical Sciences and Mathematics

Signal Processing Design Of Low Probability Of Intercept Waveforms, Nathaniel C. Liefer Mar 2008

Signal Processing Design Of Low Probability Of Intercept Waveforms, Nathaniel C. Liefer

Theses and Dissertations

This thesis investigates a modification to Differential Phase Shift Keyed (DPSK) modulation to create a Low Probability of Interception/Exploitation (LPI/LPE) communications signal. A pseudorandom timing offset is applied to each symbol in the communications stream to intentionally create intersymbol interference (ISI) that hinders accurate symbol estimation and bit sequence recovery by a non-cooperative receiver. Two cooperative receiver strategies are proposed to mitigate the ISI due to symbol timing offset: a modified minimum Mean Square Error (MMSE) equalization algorithm and a multiplexed bank of equalizer filters determined by an adaptive Least Mean Square (LMS) algorithm. Both cooperative receivers require some knowledge …


Hardware Algorithm Implementation For Mission Specific Processing, Jason W. Shirley Mar 2008

Hardware Algorithm Implementation For Mission Specific Processing, Jason W. Shirley

Theses and Dissertations

There is a need to expedite the process of designing military hardware to stay ahead of the adversary. The core of this project was to build reusable, synthesizeable libraries to make this a possibility. In order to build these libraries, Matlab® commands and functions, such as Conv2, Round, Floor, Pinv, etc., had to be converted into reusable VHDL modules. These modules make up reusable libraries for the Mission Specific Process (MSP) which will support AFRL/RY. The MSP allows the VLSI design process to be completed in a mere matter of days or months using an FPGA or ASIC design, as …


Identification Of Command And Control Information Requirements For The Cyberspace Domain, Brian D. Aschenbrenner Mar 2008

Identification Of Command And Control Information Requirements For The Cyberspace Domain, Brian D. Aschenbrenner

Theses and Dissertations

The purpose of this research was to develop an information requirements analysis method that would provide the Director of Cyberspace Forces with the information required to support effective command and control of cyberspace. This research investigates the role of information in command and control, information in the traditional war fighting domains, cyberspace as a war fighting domain, and various methods of determining information requirements of organizations. This research produced an information requirements analysis method that is suitable for identifying the command and control information requirements of the Director of Cyberspace Forces.


Using Plsi-U To Detect Insider Threats By Datamining Email, James S. Okolica, Gilbert L. Peterson, Robert F. Mills Feb 2008

Using Plsi-U To Detect Insider Threats By Datamining Email, James S. Okolica, Gilbert L. Peterson, Robert F. Mills

Faculty Publications

Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to an organisation. This paper discusses an approach to assist investigators in identifying potential insider threats. We discern employees' interests from e-mail using an extended version of PLSI. These interests are transformed into implicit and explicit social network graphs, which are used to locate potential insiders by identifying individuals who feel alienated from the organisation or have a hidden interest in a sensitive topic. By applying this technique to the Enron e-mail corpus, a small number of employees appear as potential insider threats.


Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson Jan 2008

Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson

Faculty Publications

A significant area of research in the field of hybrid communications is the Network Design Problem (NDP) [1]. The NDP is an NP complete problem [1] that focuses on identifying the optimal network topology for transmitting commodities between nodes, under constraints such as bandwidth, limited compatible directed channels, and link and commodity costs. The NDP focuses on designing a flexible network while trying to achieve optimal flow or routing. If a link (or arc) is used, then an associated fixed cost of the edge is incurred. In addition, there is a cost for using the arc depending on the flow. …


Performance Comparison Of Pb(Zr0.52Ti0.48)O3-Only And Pb(Zr0.52Ti0.48)O3-On-Silicon Resonators, Hengky Chandrahalim, Sunil A. Bhave, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey Jan 2008

Performance Comparison Of Pb(Zr0.52Ti0.48)O3-Only And Pb(Zr0.52Ti0.48)O3-On-Silicon Resonators, Hengky Chandrahalim, Sunil A. Bhave, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey

Faculty Publications

This paper provides a quantitative comparison and explores the design space of lead zirconium titanate (PZT)–only and PZT-on-silicon length-extensional mode resonators for incorporation into radio frequency microelectromechanical system filters and oscillators. We experimentally measured the correlation of motional impedance (RX) and quality factor (Q) with the resonators’ silicon layer thickness (tSi). For identical lateral dimensions and PZT-layer thicknesses (tPZT), the PZT-on-silicon resonator has higher resonant frequency (fC), higher Q (5100 versus 140), lower RX (51 Ω versus 205 Ω), and better linearity [third-order input intercept …


A Unified Framework For Solving Multiagent Task Assignment Problems, Kevin Cousin Dec 2007

A Unified Framework For Solving Multiagent Task Assignment Problems, Kevin Cousin

Theses and Dissertations

Multiagent task assignment problem descriptors do not fully represent the complex interactions in a multiagent domain, and algorithmic solutions vary widely depending on how the domain is represented. This issue is compounded as related research fields contain descriptors that similarly describe multiagent task assignment problems, including complex domain interactions, but generally do not provide the mechanisms needed to solve the multiagent aspect of task assignment. This research presents a unified approach to representing and solving the multiagent task assignment problem for complex problem domains. Ideas central to multiagent task allocation, project scheduling, constraint satisfaction, and coalition formation are combined to …


A Hybrid Multi-Robot Control Architecture, Daylond J. Hooper Dec 2007

A Hybrid Multi-Robot Control Architecture, Daylond J. Hooper

Theses and Dissertations

Multi-robot systems provide system redundancy and enhanced capability versus single robot systems. Implementations of these systems are varied, each with specific design approaches geared towards an application domain. Some traditional single robot control architectures have been expanded for multi-robot systems, but these expansions predominantly focus on the addition of communication capabilities. Both design approaches are application specific and limit the generalizability of the system. This work presents a redesign of a common single robot architecture in order to provide a more sophisticated multi-robot system. The single robot architecture chosen for application is the Three Layer Architecture (TLA). The primary strength …


Investigation Of Radio Frequency Discharges And Langmuir Probe Diagnostic Methods In A Fast Flowing Electronegative Background Gas, Nathaniel P. Lockwood Dec 2007

Investigation Of Radio Frequency Discharges And Langmuir Probe Diagnostic Methods In A Fast Flowing Electronegative Background Gas, Nathaniel P. Lockwood

Theses and Dissertations

Discharges in a flowing background gas are used to produce charged and excited species for numerous applications including etching semiconductors and pumping gas discharge lasers (Pinhero and others, 1998). The effect of a flowing background gas on the charged and excited neutral species generation by an RF discharge in a flow tube and the diagnostics of the resulting plasma with a Langmuir probe have been investigated for pressures between 0.001 to 1 Torr and flow velocities up to 1000 m/s. This investigation was performed using a fluid method coupled to a chemical kinetic model and a hybrid Particle-In-Cell/Monte Carlo Collision …


Collision Broadening Using Alkali-Filled, Hollow Core Fibers, Luke P. Rodgers Oct 2007

Collision Broadening Using Alkali-Filled, Hollow Core Fibers, Luke P. Rodgers

Theses and Dissertations

The goal of this research was to demonstrate the possibility of collision broadening in a cesium-filled, hollow-core fiber as an alternative to the proven technique of pressure broadening. Theoretically, alkali electrons should relax from the 2P3/2 to the 2P1/2 level and the absorption spectrum should collisionally broaden due to the presence of fiber walls, as opposed to the more common pressure broadening method. An absorption dip located at 852.34nm was recorded in a pressure broadened comparison leg. This data was used as a baseline during analysis of the fiber leg's data. While the fiber was successfully …


Time Resolution Of Collapse Events During The Progation Of Ultraviolet Filaaments, Teresa J. Fondren Oct 2007

Time Resolution Of Collapse Events During The Progation Of Ultraviolet Filaaments, Teresa J. Fondren

Theses and Dissertations

Long distance propagation, or filamentation, of short, intense laser pulses is suggested to be possible through the balance of two effects: self-focusing, when a nonlinear index of refraction of air is induced by high intensities, and de-focusing, due to the plasma created by the pulse. Applications for filamentation include areas such as remote sensing and directed energy. A split-step spectral propagation simulation is used to model the behavior of a high intensity ultraviolet laser pulse propagating through air. Convergence of femtosecond duration collapses that form on the leading edge of the pulse in the time domain is achieved with an …


A General Quantum Mechanical Method To Predict Positron Spectroscopy, Paul E. Adamson Sep 2007

A General Quantum Mechanical Method To Predict Positron Spectroscopy, Paul E. Adamson

Theses and Dissertations

The nuclear-electronic orbital (NEO) method was modified and extended to positron systems. NEO - second-order Moeller-Plesset perturbation (MP2) energies and annihilation rates were calculated for the positronium hydride (PsH) system, and the effects of basis set size on correlation energies captured with the NEO-MP2 and NEO-full configuration interaction (FCI) methods are compared and discussed. Equilibrium geometries and vibrational energy levels were computed for the LiX and e+LiX (X = H, F, Cl) systems at the MP2 and NEO-MP2 levels. It was found that anharmonicity plays a significant role, specifically in the differences between the vibrational energy levels of …


Phenomenological Model For Infrared Emissions From High-Explosive Detonation Fireballs, Kevin C. Gross Sep 2007

Phenomenological Model For Infrared Emissions From High-Explosive Detonation Fireballs, Kevin C. Gross

Theses and Dissertations

Time-resolved infrared spectra were recently collected via a Fourier-transform spectrometer (FTS) from the detonation fireballs of two types of conventional military munitions (CMM) as well as uncased TNT and four types of enhanced novel explosives (ENEs). The CMM spectra are dominated by continuum emission, and a single-temperature Planckian distribution, modified for atmospheric attenuation, captures most of the variation in the data. Some evidence of selective emission is identified by systematic patterns in the fit residuals. The behavior of these systematic residuals affords a distinction between the two types of CMMs studied. The uncased TNT and ENE spectra appear strongly influenced …


Collaborative, Trust-Based Security Mechanisms For A National Utility Intranet, Gregory M. Coates Sep 2007

Collaborative, Trust-Based Security Mechanisms For A National Utility Intranet, Gregory M. Coates

Theses and Dissertations

This thesis investigates security mechanisms for utility control and protection networks using IP-based protocol interaction. It proposes flexible, cost-effective solutions in strategic locations to protect transitioning legacy and full IP-standards architectures. It also demonstrates how operational signatures can be defined to enact organizationally-unique standard operating procedures for zero failure in environments with varying levels of uncertainty and trust. The research evaluates layering encryption, authentication, traffic filtering, content checks, and event correlation mechanisms over time-critical primary and backup control/protection signaling to prevent disruption by internal and external malicious activity or errors. Finally, it shows how a regional/national implementation can protect private …


Parallelization Of Ant Colony Optimization Via Area Of Expertise Learning, Adrian A. De Freitas Sep 2007

Parallelization Of Ant Colony Optimization Via Area Of Expertise Learning, Adrian A. De Freitas

Theses and Dissertations

Ant colony optimization algorithms have long been touted as providing an effective and efficient means of generating high quality solutions to NP-hard optimization problems. Unfortunately, while the structure of the algorithm is easy to parallelize, the nature and amount of communication required for parallel execution has meant that parallel implementations developed suffer from decreased solution quality, slower runtime performance, or both. This thesis explores a new strategy for ant colony parallelization that involves Area of Expertise (AOE) learning. The AOE concept is based on the idea that individual agents tend to gain knowledge of different areas of the search space …


A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees, Kenneth S. Edge Sep 2007

A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees, Kenneth S. Edge

Theses and Dissertations

Attack trees have been developed to describe processes by which malicious users attempt to exploit or break complex systems. Attack trees offer a method of decomposing, visualizing, and determining the cost or likelihood of attacks. Attack trees by themselves do not provide enough decision support to system defenders. This research develops the concept of using protection trees to offer a detailed risk analysis of a system. In addition to developing protection trees, this research improves the existing concept of attack trees and develops rule sets for the manipulation of metrics used in the security of complex systems. This research specifically …


Scaling Ant Colony Optimization With Hierarchical Reinforcement Learning Partitioning, Erik J. Dries Sep 2007

Scaling Ant Colony Optimization With Hierarchical Reinforcement Learning Partitioning, Erik J. Dries

Theses and Dissertations

This research merges the hierarchical reinforcement learning (HRL) domain and the ant colony optimization (ACO) domain. The merger produces a HRL ACO algorithm capable of generating solutions for both domains. This research also provides two specific implementations of the new algorithm: the first a modification to Dietterich's MAXQ-Q HRL algorithm, the second a hierarchical ACO algorithm. These implementations generate faster results, with little to no significant change in the quality of solutions for the tested problem domains. The application of ACO to the MAXQ-Q algorithm replaces the reinforcement learning, Q-learning and SARSA, with the modified ant colony optimization method, Ant-Q. …


Raman Fiber Lasers And Amplifiers Based On Multimode Fibers And Their Applications To Beam Cleanup, Nathan B. Terry Sep 2007

Raman Fiber Lasers And Amplifiers Based On Multimode Fibers And Their Applications To Beam Cleanup, Nathan B. Terry

Theses and Dissertations

Raman fiber lasers (RFLs) and Raman fiber amplifiers (RFAs) in multimode fibers were explored. The RFL based on a graded-index fiber was shown to be very efficient relative to RFLs based on singlemode fibers. Several configurations of the RFL were examined; the beam quality of the Stokes beam depended on the reflectivity of the output coupler and the Stokes power. When used as a beam combiner, the RFL was a highly efficient brightness converter. RFL configurations which used dichroic mirrors were shown to be potentially useful for RFLs based on very large fibers. The forward- and backward-seeded geometries of an …


Multi-Objective Optimization For Speed And Stability Of A Sony Aibo Gait, Christopher A. Patterson Sep 2007

Multi-Objective Optimization For Speed And Stability Of A Sony Aibo Gait, Christopher A. Patterson

Theses and Dissertations

Locomotion is a fundamental facet of mobile robotics that many higher level aspects rely on. However, this is not a simple problem for legged robots with many degrees of freedom. For this reason, machine learning techniques have been applied to the domain. Although impressive results have been achieved, there remains a fundamental problem with using most machine learning methods. The learning algorithms usually require a large dataset which is prohibitively hard to collect on an actual robot. Further, learning in simulation has had limited success transitioning to the real world. Also, many learning algorithms optimize for a single fitness function, …


Using Author Topic To Detect Insider Threats From Email Traffic, James S. Okolica, Gilbert L. Peterson, Robert F. Mills Sep 2007

Using Author Topic To Detect Insider Threats From Email Traffic, James S. Okolica, Gilbert L. Peterson, Robert F. Mills

Faculty Publications

One means of preventing insider theft is by stopping potential insiders from becoming actual thieves. This article discusses an approach to assist managers in identifying potential insider threats. By using the Author Topic [Rosen-Zvi Michal, Griffiths Thomas, Steyvers Mark, Smyth Padhraic. The author-topic model for authors and documents. In: Proceedings of the 20th conference on uncertainty in artificial intelligence; 2004. p. 487–94.] clustering algorithm, we discern employees' interests from their daily emails. These interests then provide a means to create an implicit and an explicit social network graph. This approach locates potential insiders by finding individuals who either (1) feel …


Genetic Evolution Of Hierarchical Behavior Structures, Brian G. Woolley, Gilbert L. Peterson Jul 2007

Genetic Evolution Of Hierarchical Behavior Structures, Brian G. Woolley, Gilbert L. Peterson

Faculty Publications

The development of coherent and dynamic behaviors for mobile robots is an exceedingly complex endeavor ruled by task objectives, environmental dynamics and the interactions within the behavior structure. This paper discusses the use of genetic programming techniques and the unified behavior framework to develop effective control hierarchies using interchangeable behaviors and arbitration components. Given the number of possible variations provided by the framework, evolutionary programming is used to evolve the overall behavior design. Competitive evolution of the behavior population incrementally develops feasible solutions for the domain through competitive ranking. By developing and implementing many simple behaviors independently and then evolving …


An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm With Application To The Detection Of Distributed Computer Network Intrusions, Charles R. Haag, Gary B. Lamont, Paul D. L. Williams, Gilbert L. Peterson Jul 2007

An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm With Application To The Detection Of Distributed Computer Network Intrusions, Charles R. Haag, Gary B. Lamont, Paul D. L. Williams, Gilbert L. Peterson

Faculty Publications

Today's signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and encoding it into a signature that is stored in its anomaly database, providing a window of vulnerability to computer systems during this time. Further, the maximum size of an Internet Protocol-based message requires the database to be huge in order to maintain possible signature combinations. In order to tighten this response cycle within storage constraints, this paper presents an innovative Artificial Immune System-inspired Multiobjective Evolutionary Algorithm. This distributed intrusion detection system (IDS) is intended to measure …


Efficient Gps Position Determination Algorithms, Thao Nguyen Jun 2007

Efficient Gps Position Determination Algorithms, Thao Nguyen

Theses and Dissertations

This research is aimed at improving the state of the art of GPS algorithms, namely, the development of a closed-form positioning algorithm for a standalone user and the development of a novel differential GPS algorithm for a network of users. The stand-alone user GPS algorithm is a direct, closed-form, and efficient new position determination algorithm that exploits the closed-form solution of the GPS trilateration equations and works in the presence of pseudorange measurement noise for an arbitrary number of satellites in view. A two-step GPS position determination algorithm is derived which entails the solution of a linear regression and updates …


An Infrared Camera Simulation For Estimating Spatial Temperature Profiles And Signal-To-Noise Ratios Of An Airborne Laser-Illuminated Target, David F. Orth Jun 2007

An Infrared Camera Simulation For Estimating Spatial Temperature Profiles And Signal-To-Noise Ratios Of An Airborne Laser-Illuminated Target, David F. Orth

Theses and Dissertations

Airborne Laser testing and evaluation can be aided by developing a spectrally-based infrared camera simulation to explore how the target surface's specular and diffuse reflectivities affect the observed signal-to-noise ratio (SNR) and how the target's temperature in the laser spot can estimated. This simulation provides for the observed irradiance, scaled by atmospheric absorption, to consist of the target's self-emission, reflected background emission, and the path emission from the observer to the target. The observed irradiance is scaled and distributed onto a focal plane array by way of a simulated optical system, whose effects are described by modulation transfer functions. The …


Parallel Fast Multipole Method For Molecular Dynamics, Reid G. Ormseth Jun 2007

Parallel Fast Multipole Method For Molecular Dynamics, Reid G. Ormseth

Theses and Dissertations

We report on a parallel version of the Fast Multipole Method (FMM) implemented in the classical molecular dynamics code, NAMD (Not Another Molecular Dynamics program). This novel implementation of FMM aims to minimize interprocessor communication through the modification of the FMM grid to match the hybrid force and spatial decomposition scheme already present in NAMD. This new implementation has the benefit of replacing all-to-all communications broadcasts with direct communications between nearest neighbors. This results in a significant reduction in the amount of communication compared to earlier attempts to integrate FMM into common molecular dynamics programs. The early performance of FMM …


Aerobic Biodegradation Of Fuel Oxygenates, Adam M. Gutshall Jun 2007

Aerobic Biodegradation Of Fuel Oxygenates, Adam M. Gutshall

Theses and Dissertations

Methyl tert-Butyl Ether (MTBE) is the most commonly used fuel oxygenate in the world. Its recalcitrant nature as well as its chemical properties have led to widespread groundwater contamination. Questions regarding its toxicity have spurred a search for viable oxygenate alternatives. Since biodegradability is a key indicator of a chemical’s environmental impact, this research used three different well-known methods, BOD5, respirometry, and GC analysis, to examine the extent and rates of aerobic biodegradation of MTBE along with tert-butyl alcohol (TBA). The common fuel component toluene was added to some of the samples to determine if the presence of …


Steganalysis Feature Improvement Using Expectation Maximization, Benjamin M. Rodriguez, Gilbert L. Peterson, Sos S. Agaian Apr 2007

Steganalysis Feature Improvement Using Expectation Maximization, Benjamin M. Rodriguez, Gilbert L. Peterson, Sos S. Agaian

Faculty Publications

No abstract provided.


Steganography Anomaly Detection Using Simple One Class Classification, Benjamin M. Rodriguez, Gilbert L. Peterson, Sos S. Agaian Apr 2007

Steganography Anomaly Detection Using Simple One Class Classification, Benjamin M. Rodriguez, Gilbert L. Peterson, Sos S. Agaian

Faculty Publications

No abstract provided.


Multi-Class Classification Averaging Fusion For Detecting Steganography, Benjamin M. Rodriguez, Gilbert L. Peterson, Sos S. Agaian Apr 2007

Multi-Class Classification Averaging Fusion For Detecting Steganography, Benjamin M. Rodriguez, Gilbert L. Peterson, Sos S. Agaian

Faculty Publications

Multiple classifier fusion has the capability of increasing classification accuracy over individual classifier systems. This paper focuses on the development of a multi-class classification fusion based on weighted averaging of posterior class probabilities. This fusion system is applied to the steganography fingerprint domain, in which the classifier identifies the statistical patterns in an image which distinguish one steganography algorithm from another. Specifically we focus on algorithms in which jpeg images provide the cover in order to communicate covertly. The embedding methods targeted are F5, JSteg, Model Based, OutGuess, and StegHide. The developed multi-class steganalvsis system consists of three levels: (1) …


In Pursuit Of An Aptitude Test For Potential Cyberspace Warriors, Tiffiny S. Smith Mar 2007

In Pursuit Of An Aptitude Test For Potential Cyberspace Warriors, Tiffiny S. Smith

Theses and Dissertations

The Air Force has officially assumed the cyberspace mission. To perform this mission well, it is important to employ personnel who have the necessary skill sets and motivation to work in a cyberspace environment. The first step in employing the right people is to screen all possible candidates and select those with an aptitude for acquiring the skill sets and with the motivation to perform this work. This thesis attempts to determine the necessary skills and motivations to perform the cyberspace mission and recommends a screening process to select the candidates with the highest probability for success. Since this mission …