Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1501 - 1530 of 2678

Full-Text Articles in Physical Sciences and Mathematics

Holes: Ionospheric Scintillation, Gps And Imputation, Robert A. Steenburgh Mar 2007

Holes: Ionospheric Scintillation, Gps And Imputation, Robert A. Steenburgh

Theses and Dissertations

Ionospheric scintillation of Global Positioning System (GPS) signals threatens navigation and military operations by degrading performance or making GPS unavailable. Scintillation is particularly active, although not limited to, a belt encircling the earth within ± 20 degrees of the geomagnetic equator. This belt also hosted roughly half of the completed U.S. military operations in the last decade. The authors examined scintillation data from Ascension Island, United Kingdom, and Ancon, Peru, in the Atlantic longitudinal sector as well as data from Parepare, Indonesia, and Marak Parak, Malaysia, in the Pacific longitudinal sector. From these data, they calculate percent probability of occurrence …


A Multivariate Magnitude Robust Control Chart For Mean Shift Detection And Change Point Estimation, Ryan M. Harrell Mar 2007

A Multivariate Magnitude Robust Control Chart For Mean Shift Detection And Change Point Estimation, Ryan M. Harrell

Theses and Dissertations

Statistical control charts are often used to detect a change in an otherwise stable process. This process may contain several variables affecting process stability. The goal of any control chart is to detect an out-of-control state quickly and provide insight on when the process actually changed. This reduces the off-line time the quality engineer spends assigning causality. In this research, a multivariate magnitude robust chart (MMRC) was developed using a change point model and a likelihood-ratio approach. Here the process is considered in-control until one or more normally distributed process variables permanently and suddenly shifts to out-of-control, stable value. Using …


Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl Mar 2007

Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl

Theses and Dissertations

Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geographic location of an IP addressable node, has proven useful in a wide variety of commercial applications. Commercial applications of IP Geolocation include market research, redirection for performance enhancement, restricting content, and combating fraud. The potential for military applications include securing remote access via geographic authentication, intelligence collection, and cyber attack attribution. IP Geolocation methods can be divided into three basic categories based upon what information is used to determine the geographic location of the given IP address: 1) Information contained in databases, 2) information that is leaked during …


Wide Area Search And Engagement Simulation Validation, Michael J. Marlin Mar 2007

Wide Area Search And Engagement Simulation Validation, Michael J. Marlin

Theses and Dissertations

As unmanned aerial vehicles (UAVs) increase in capability, the ability to refuel them in the air is becoming more critical. Aerial refueling will extend the range, shorten the response times, and extend loiter time of UAVs. Executing aerial refueling autonomously will reduce the command and control, logistics, and training efforts associated with fielding UAV systems. Currently, the Air Force Research Lab is researching the various technologies required to conduct automated aerial refueling (AAR). One of the required technologies is the ability to autonomously rendezvous with the tanker. The goal of this research is to determine the control required to fly …


Geospatial Informational Security Risks And Concerns Of The U.S. Air Force Geobase Program, Scott A. Bryant Mar 2007

Geospatial Informational Security Risks And Concerns Of The U.S. Air Force Geobase Program, Scott A. Bryant

Theses and Dissertations

Technological advancements such as Geospatial Information Systems (GIS) and the Internet have made it easier and affordable to share information, which enables complex and time sensitive decisions to be made with higher confidence. Further, advancements in information technology have dramatically increased the ability to store, manage, integrate, and correlate larger amounts of data to improve operational efficiency. However, the same technologies that enable increased productivity also provide increased capabilities to those wishing to do harm. Today’s military leaders are faced with the challenge of deciding how to make geospatial information collected on military installations and organizations available to authorized communities …


Adaptive Gravitational Gossip In Monitoring The Joint Battlespace Infosphere, Edmund Descartes Aban Mar 2007

Adaptive Gravitational Gossip In Monitoring The Joint Battlespace Infosphere, Edmund Descartes Aban

Theses and Dissertations

Future USAF operations will be heavily dependent on having the "right information" at the "right time," and Joint Battlespace Infospheres (JBIs) are poised to fill that role. To do this, JBIs must be ubiquitous -- always accessible, secure and responsive. Of all the literature written regarding JBIs, the most important problem to solve in order to make JBIs work in mobile scenarios are scalability, reliability and adaptability to changing battlefield conditions. This paper explores the use of SBCast, a novel adaptive probabilistic protocol and a delivery mechanism for JBI updates and as a possible solution towards guaranteeing these qualities. It …


Stimulated Brillouin Scattering Beam Cleanup And Beam Phasing Through Two Passive Channels, Omar Gamboa Mar 2007

Stimulated Brillouin Scattering Beam Cleanup And Beam Phasing Through Two Passive Channels, Omar Gamboa

Theses and Dissertations

Stimulated Brillouin scattering (SBS) beam cleanup and SBS piston correction properties are explored. This research measures the beam cleaning and phase-conjugating properties of stimulated Brillouin scattering in an optical fiber. The first stage of this research began by coupling an aberrated beam into a long multimode 62.5 micron core fiber to demonstrate its beam cleanup properties. The Stokes beam obtained was shown to be the fundamental fiber mode, LP01. The second stage spatially divided the pump beam into two equal halves. Each half was then sent through two different channels. The path length of one channel remained fixed while the …


Assessment Of The Impact Of Various Ionospheric Models On High Frequency Signal Raytracing, Joshua T. Werner Mar 2007

Assessment Of The Impact Of Various Ionospheric Models On High Frequency Signal Raytracing, Joshua T. Werner

Theses and Dissertations

An assessment of the impact of various ionospheric models on high-frequency (HF) signal raytracing is presented. Ionospheric refraction can strongly affect the propagation of HF signals. Consequently, Department of Defense missions such as over-the-horizon RADAR, HF communications, and geo-location all depend on an accurate specification of the ionosphere. Five case studies explore ionospheric conditions ranging from quiet conditions to solar flares and geomagnetic storms. It is shown that an E layer by itself can increase an HF signal’s ground range by over 100 km, stressing the importance of accurately specifying the lower ionosphere. It is also shown that the GPSII …


Spacecraft Proximity Operations Used To Estimate The Dynamical & Physical Properties Of A Resident Space Object, Abraham F. Brunner Mar 2007

Spacecraft Proximity Operations Used To Estimate The Dynamical & Physical Properties Of A Resident Space Object, Abraham F. Brunner

Theses and Dissertations

When conducting a space proximity operation, developing high-fidelity estimates of the dynamical and physical properties of a Resident Space Object (RSO) based on post-rendezvous observational data acquired, is imperative for the understanding of the RSO itself and the operating environment. This research investigates the estimation of relative motion dynamics, rotational dynamics, and the feasibility of estimating the moments of inertia of a RSO. Using the Hill-Clohessy-Wiltshire equations, rigid-body dynamics, and estimation theory, a nonlinear least squares estimation algorithm is implemented in the processing of range data from tracked observation points on the RSO body. Through simulation, it was determined that …


Anisotropy In The South Atlantic Anomaly, Shaun M. Easley Mar 2007

Anisotropy In The South Atlantic Anomaly, Shaun M. Easley

Theses and Dissertations

From June 2000 through July 2006, the TSX-5 satellite measured proton fluxes in the Earth’s magnetosphere using its CEASE instrument. A review of the satellite data by scientists at AFRL/VSBX revealed an unanticipated, recurring bi-modal structure in histograms of the proton counts. This research identified the bi-modal behavior as anisotropic in nature, and the result of two separate processes. At low altitudes the anisotropy was well described by the classic “East-West Effect.” Comparisons of the satellite data to simple analytical models are presented. At high altitudes, the anisotropy was the result of the detector measuring protons at different pitch angles …


Portable Diode Pumped Femtosecond Laser, David A. Jones Mar 2007

Portable Diode Pumped Femtosecond Laser, David A. Jones

Theses and Dissertations

This thesis discusses the work to make ultrashort pulsed lasers smaller and more economical. While sharing many of the basic properties of normal beam optics there are some specific properties in both creating and exploiting those pulses that must be understood. The discussion will focus on mode locking as the primary way of producing ultrashort pulses. Particular attention will be paid to intracavity group velocity dispersion and how to correct it inside the cavity. The discussion then turns to the basis of our work including initial cavity design and component selection with focus on the specific crystals used in the …


Development Of A Screening Model For Design And Costing Of An Innovative Tailored Granular Activated Carbon Technology To Treat Perchlorate-Contaminated Water, William C. Powell Mar 2007

Development Of A Screening Model For Design And Costing Of An Innovative Tailored Granular Activated Carbon Technology To Treat Perchlorate-Contaminated Water, William C. Powell

Theses and Dissertations

Perchlorate contamination of drinking water is a problem that has recently gained national attention. The purpose of this research was to develop a tool to predict the cost and performance of tailored granular activated carbon (T-GAC), an innovative technology to treat perchlorate-contaminated water. The ability to predict cost and performance is essential to promote transfer and commercialization of innovative technologies. This study investigated how data obtained from small-scale laboratory tests could be applied to predict cost and performance of a full-scale T-GAC system to treat perchlorate-contaminated water. A technology model was developed using GAC design principles and using a multi-component …


Use Of Tabu Search In A Solver To Map Complex Networks Onto Emulab Testbeds, Jason E. Macdonald Mar 2007

Use Of Tabu Search In A Solver To Map Complex Networks Onto Emulab Testbeds, Jason E. Macdonald

Theses and Dissertations

The University of Utah's solver for the testbed mapping problem uses a simulated annealing metaheuristic algorithm to map a researcher's experimental network topology onto available testbed resources. This research uses tabu search to find near-optimal physical topology solutions to user experiments consisting of scale-free complex networks. While simulated annealing arrives at solutions almost exclusively by chance, tabu search incorporates the use of memory and other techniques to guide the search towards good solutions. Both search algorithms are compared to determine whether tabu search can produce equal or higher quality solutions than simulated annealing in a shorter amount of time. It …


Optical Tracking For Relative Positioning In Automated Aerial Refueling, James H. Spencer Mar 2007

Optical Tracking For Relative Positioning In Automated Aerial Refueling, James H. Spencer

Theses and Dissertations

An algorithm is designed to extract features from video of an air refueling tanker for use in determining the precise relative position of a receiver aircraft. The algorithm is based on receiving a known estimate of the tanker aircraft's position and attitude. The algorithm then uses a known feature model of the tanker to predict the location of those features on a video frame. A corner detector is used to extract features from the video. The measured corners are then associated with known features and tracked from frame to frame. For each frame, the associated features are used to calculate …


A Study Of Bi-Directional Reflectance Distribution Functions And Their Effects On Infrared Signature Models, Samuel I. Harkiss Mar 2007

A Study Of Bi-Directional Reflectance Distribution Functions And Their Effects On Infrared Signature Models, Samuel I. Harkiss

Theses and Dissertations

Since 2004, AFIT has been developing a trend-analysis tool to assess large commercial aircraft infrared (LCAIR) signatures. In many cases, this code predicted signatures to within 10% of measured data. However, other results indicated that the single-bounce, specular-reflection algorithm being used failed to adequately simulate interactions between aircraft parts where either the specular component is dominated by diffuse reflection or part-to-part multiple-bounce reflections contribute significantly to the signature. This research incorporates Bi-Directional Reflectance Distribution Functions (BRDF's) and multiple-bounce calculations into the LCAIR model. A physical aircraft model was constructed from aluminum, and measurements were taken before and after a surface …


Refinement Of An Instrument To Assess Readiness For Knowledge Management, Landon C. Bailey Mar 2007

Refinement Of An Instrument To Assess Readiness For Knowledge Management, Landon C. Bailey

Theses and Dissertations

Academics and practitioners have described knowledge as a primary source for competitive advantage for organizations; however, many attempts at instituting knowledge management programs to increase organizational competitiveness do not succeed. Instituting knowledge management programs generally requires organizations to make significant changes and the concept of readiness has long been believed to be an important precondition for successful organizational change. By linking previous research in enablers for knowledge management and organizational change, it is possible to adapt an established organizational change readiness instrument to measure readiness for knowledge management. This study culminates in the development and field-testing of the resultant knowledge …


The Effects Of Orthophosphate As A Copper Corrosion Control Inhibitor In High Alkalinity Drinking Water Systems, Stephen Grace Mar 2007

The Effects Of Orthophosphate As A Copper Corrosion Control Inhibitor In High Alkalinity Drinking Water Systems, Stephen Grace

Theses and Dissertations

The purpose of this research was to investigate orthophosphate as a corrosion inhibitor for copper pipe in a high-alkalinity drinking water system. Specifically, this thesis sought to answer three research questions regarding the impact of orthophosphate treatment, the nature of the mechanism by which orthophosphate controls copper corrosion, and the value of equilibrium modeling in predicting orthophosphate’s effects. The research questions were answered through a comprehensive literature review and experimental methodology integrating laboratory jar tests, water sampling and analysis from a field investigation, qualitative solids analysis, and equilibrium model application. This study analyzed field data obtained over the course of …


Using Concept Maps To More Efficiently Create Intelligence Information Models, Christopher E. Coryell Mar 2007

Using Concept Maps To More Efficiently Create Intelligence Information Models, Christopher E. Coryell

Theses and Dissertations

Information models are a critical tool that enables intelligence customers to quickly and accurately comprehend U.S. intelligence agency products. The Knowledge Pre-positioning System (KPS) is the standard repository for information models at the National Air and Space Intelligence Center (NASIC). The current approach used by NASIC to build a KPS information model is laborious and costly. Intelligence analysts design an information model using a manual, butcher-paper-based process. The output of their work is then entered into KPS by either a single NASIC KPS "database modeler" or a contractor (at a cost of roughly $100K to the organization). This thesis proposes …


Use Of Thrust Vectors In Support Of The Cybercraft Initiative, Michael Stevens Mar 2007

Use Of Thrust Vectors In Support Of The Cybercraft Initiative, Michael Stevens

Theses and Dissertations

The CyberCraft Initiative is designing a framework for command and control of future Air Force Cyber-weapon systems, that autonomously operate and defend the Air Force networks and information systems to provide Cyberspace Superiority in support of the defense of the United States. The fundamental research question of the CyberCraft Initiative is "What is required for a commander to trust a CyberCraft to autonomously defend military information systems?" The Trust Vector model is one method of integrating trust into the CyberCraft fleet. Trust Vectors define trust and distrust between agents based on three components; current and historical data, intrinsic knowledge of …


Implementation And Optimization Of The Advanced Encryption Standard Algorithm On An 8-Bit Field Programmable Gate Array Hardware Platform, Ryan J. Silva Mar 2007

Implementation And Optimization Of The Advanced Encryption Standard Algorithm On An 8-Bit Field Programmable Gate Array Hardware Platform, Ryan J. Silva

Theses and Dissertations

The contribution of this research is three-fold. The first is a method of converting the area occupied by a circuit implemented on a Field Programmable Gate Array (FPGA) to an equivalent as a measure of total gate count. This allows direct comparison between two FPGA implementations independent of the manufacturer or chip family. The second contribution improves the performance of the Advanced Encryption Standard (AES) on an 8-bit computing platform. This research develops an AES design that occupies less than three quarters of the area reported by the smallest design in current literature as well as significantly increases area efficiency. …


Professionalism In The Air Force: A Comparative Analysis Of Commissioned Officers With Non-Commissioned Officers, Edward K. Boyd Mar 2007

Professionalism In The Air Force: A Comparative Analysis Of Commissioned Officers With Non-Commissioned Officers, Edward K. Boyd

Theses and Dissertations

Decades ago, military sociologists predicted a rising trend among officers away from traditional institutional military values and toward more economically-based occupational values due to the effects of the transition from a conscription-based military to an all-volunteer force. Subsequent empirical research resulted in data that supports such predictions. More recent researchers have suggested that in addition to the all-volunteer force, an increase on technology may also accelerate the trend toward occupationalism and away from traditional institutional military values and the warrior ethos that typically define successful military organizations. The officer corps may be particularly vulnerable to occupationalism due to increased technical …


Beyond Passswords: Usage And Policy Transformation, Alan S. Alsop Mar 2007

Beyond Passswords: Usage And Policy Transformation, Alan S. Alsop

Theses and Dissertations

The purpose of this research is to determine whether the transition to a two-factor authentication system is more secure than a system that relied only on what users “know” for authentication. While we found that factors that made passwords inherently vulnerable did not transfer to the PIN portion of a two-factor authentication system, we did find significant problems relating to usability, worker productivity, and the loss and theft of smart cards. The new authentication method has disrupted our ability to stay connected to ongoing mission issues, forced some installations to cut off remote access for their users and in one …


Hardware Virtualization Applied To Rootkit Defense, Douglas P. Medley Mar 2007

Hardware Virtualization Applied To Rootkit Defense, Douglas P. Medley

Theses and Dissertations

This research effort examines the idea of applying virtualization hardware to enhance operating system security against rootkits. Rootkits are sets of tools used to hide code and/or functionality from the user and operating system. Rootkits can accomplish this feat through using access to one part of an operating system to change another part that resides at the same privilege level. Hardware assisted virtualization (HAV) provides an opportunity to defeat this tactic through the introduction of a new operating mode. Created to aid operating system virtualization, HAV provides hardware support for managing and saving multiple states of the processor. This hardware …


Thermally Activated, Variable Blazed Grating For Coherent Beam Steering, Matthew T. Johnson Mar 2007

Thermally Activated, Variable Blazed Grating For Coherent Beam Steering, Matthew T. Johnson

Theses and Dissertations

The ability to perform non-mechanical optical beam steering is of critical importance in laser communication and remote sensing; it is as vital as a phased-array antenna is for RADAR. Directed energy transmission and direction-selective reception increase performance and produce tactical advantage in DoD applications. However, specific geometric features of non-mechanical beam steering devices must be designed in proportion to the wavelength of the monochromatic light to be steered. Also, the ability to handle higher energies by reducing the energy per unit requires large areas of uniform properties on the micrometer scale. These challenges have been addressed in the past using …


Assessment Of Optical Turbulence Profiles Derived From Probabilistic Climatology, Brett W. Wisdom Mar 2007

Assessment Of Optical Turbulence Profiles Derived From Probabilistic Climatology, Brett W. Wisdom

Theses and Dissertations

This research effort assesses the performance of the High Energy Laser End-to-End Operational Simulation (HELEEOS) Climatological C2n optical turbulence model. Path-integrated C2n values of two HELEEOS optical turbulence pro les at 3 distinct operational altitudes are compared to values determined from measured thermosonde data. HELEEOS desert and mid-latitude sites are selected from the Extreme and Percentile Environmental Reference Tables (ExPERT) database for comparison to the thermosonde data. Statistical equivalence of the two datasets is determined through a Design of Experiments (DOE) factorial test to within 80% confidence. The HELEEOS profiles are shown to be equivalent to …


Locating Encrypted Data Hidden Among Non-Encrypted Data Using Statistical Tools, Walter J. Hayden Mar 2007

Locating Encrypted Data Hidden Among Non-Encrypted Data Using Statistical Tools, Walter J. Hayden

Theses and Dissertations

This research tests the security of software protection techniques that use encryption to protect code segments containing critical algorithm implementation to prevent reverse engineering. Using the National Institute of Standards and Technology (NIST) Tests for Randomness encrypted regions hidden among non-encrypted bits of a binary executable file are located. The location of ciphertext from four encryption algorithms (AES, DES, RSA, and TEA) and three block sizes (10, 100, and 500 32-bit words) were tested during the development of the techniques described in this research. The test files were generated from the Win32 binary executable file of Adobe's Acrobat Reader version …


Direct Diode Pumped Raman Amplifier Based On A Multimode Graded Index Fiberr, Charles James Baird Mar 2007

Direct Diode Pumped Raman Amplifier Based On A Multimode Graded Index Fiberr, Charles James Baird

Theses and Dissertations

The direct pumping of a Raman fiber amplifier (RFA) was attempted using an array of four 25W, fiber pigtailed diodes at 936nm, combined via a 7 channel fiber beam combiner. The initial attempt was conducted using a 1.8 km, 100 micron core, GRIN fiber with an NA of .29 and attenuation 3.6 dB/km at 936nm. While amplification was not achieved, over 200mW of conversion was shown, with 10.4W of pump power and 3.5W of seed. This corresponds to an average conversion efficiency of 2.2%. The subsequent effort utilized a 2km long, 200 micron core, GRIN fiber, with NA of .27 …


Multi-Dimensional Range Querying Using A Modification Of The Skip Graph, Gregory J. Brault Mar 2007

Multi-Dimensional Range Querying Using A Modification Of The Skip Graph, Gregory J. Brault

Theses and Dissertations

Skip graphs are an application layer-based distributed routing data structure that can be used in a sensor network to facilitate user queries of data collected by the sensor nodes. This research investigates the impact of a proposed modification to the skip graph proposed by Aspnes and Shah. Nodes contained in a standard skip graph are sorted by their key value into successively smaller groups based on random membership vectors computed locally at each node. The proposed modification inverts the node key and membership vector roles, where group membership is computed deterministically and node keys are computed randomly. Both skip graph …


Heuristically Driven Search Methods For Topology Control In Directional Wireless Hybrid Network, Roger L. Garner Mar 2007

Heuristically Driven Search Methods For Topology Control In Directional Wireless Hybrid Network, Roger L. Garner

Theses and Dissertations

Information and Networked Communications play a vital role in the everyday operations of the United States Armed Forces. This research establishes a comparative analysis of the unique network characteristics and requirements introduced by the Topology Control Problem (also known as the Network Design Problem). Previous research has focused on the development of Mixed-Integer Linear Program (MILP) formulations, simple heuristics, and Genetic Algorithm (GA) strategies for solving this problem. Principal concerns with these techniques include runtime and solution quality. To reduce runtime, new strategies have been developed based on the concept of flow networks using the novel combination of three well-known …


An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm With Application To The Detection Of Distributed Computer Network Intrusions, Charles R. Haag Mar 2007

An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm With Application To The Detection Of Distributed Computer Network Intrusions, Charles R. Haag

Theses and Dissertations

Today's predominantly-employed signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus after a potentially successful attack, performing post-mortem analysis on that instance and encoding it into a signature that is stored in its anomaly database. The time required to perform these tasks provides a window of vulnerability to DoD computer systems. Further, because of the current maximum size of an Internet Protocol-based message, the database would have to be able to maintain 25665535 possible signature combinations. In order to tighten this response cycle within storage constraints, …