Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1561 - 1590 of 2678

Full-Text Articles in Physical Sciences and Mathematics

Fuzzy State Aggregation And Policy Hill Climbing For Stochastic Environments, Dean C. Wardell, Gilbert L. Peterson Sep 2006

Fuzzy State Aggregation And Policy Hill Climbing For Stochastic Environments, Dean C. Wardell, Gilbert L. Peterson

Faculty Publications

Reinforcement learning is one of the more attractive machine learning technologies, due to its unsupervised learning structure and ability to continually learn even as the operating environment changes. Additionally, by applying reinforcement learning to multiple cooperative software agents (a multi-agent system) not only allows each individual agent to learn from its own experience, but also opens up the opportunity for the individual agents to learn from the other agents in the system, thus accelerating the rate of learning. This research presents the novel use of fuzzy state aggregation, as the means of function approximation, combined with the fastest policy hill …


A New Application Of The Channel Packet Method For Low Energy 1-D Elastic Scattering, Clint M. Zeringue Sep 2006

A New Application Of The Channel Packet Method For Low Energy 1-D Elastic Scattering, Clint M. Zeringue

Theses and Dissertations

An algorithm is presented which uses the channel packet method (CPM) to simulate low-energy, wave-packet propagation and compute S-matrix elements. A four-by-four matrix containing the momentum, expansion coefficients of the reactants and products is introduced to account for initial and final states having both positive and negative momentum. The approach does not consider scattering from one side or the other, rather it considers both incoming and outgoing wave packets from the left and right simultaneously. Therefore, during one simulation all four S-matrix elements, and elements, S+k,-K, S-k, +k, S+k, +k and S-k,-k are computed. …


An Experimental Study Of A Pulsed Dc Plasma Flow Control Actuator, Jennifer D. Wall Jun 2006

An Experimental Study Of A Pulsed Dc Plasma Flow Control Actuator, Jennifer D. Wall

Theses and Dissertations

An experiment on the effects of a pulsed DC plasma actuator on a separated flow in a low speed wind tunnel was conducted. The actuator consisted of two asymmetric copper electrodes oriented normal to the flow separated by a dielectric barrier and mounted on a flat plate in the center of the tunnel. A contoured insert was constructed and used to create an adverse pressure gradient in the test section comparable to a Pak-B low pressure turbine blade distribution. Suction was applied from the upper wall to induce separation along the flat plate over the electrodes. The DC power supply …


Robot Localization Using Visual Image Mapping, Carrie D. Crews Jun 2006

Robot Localization Using Visual Image Mapping, Carrie D. Crews

Theses and Dissertations

One critical step in providing the Air Force the capability to explore unknown environments is for an autonomous agent to be able to determine its location. The calculation of the robot's pose is an optimization problem making use of the robot's internal navigation sensors and data fusion of range sensor readings to find the most likely pose. This data fusion process requires the simultaneous generation of a map which the autonomous vehicle can then use to avoid obstacles, communicate with other agents in the same environment, and locate targets. Our solution entails mounting a Class 1 laser to an ERS-7 …


Mitigating Insider Threat Using Human Behavior Influence Models, Anthony J. Puleo Jun 2006

Mitigating Insider Threat Using Human Behavior Influence Models, Anthony J. Puleo

Theses and Dissertations

Insider threat is rapidly becoming the largest information security problem that organizations face. With large numbers of personnel having access to internal systems, it is becoming increasingly difficult to protect organizations from malicious insiders. The typical methods of mitigating insider threat are simply not working, primarily because this threat is a people problem, and most mitigation strategies are geared towards profiling and anomaly detection, which are problematic at best. As a result, a new type of model is proposed in this thesis, one that incorporates risk management with human behavioral science. The new risk-based model focuses on observable influences that …


Characterizing A Co-Flow Nozzle For Use In A Filtered Rayleigh Scattering System, David S. Miceli Jun 2006

Characterizing A Co-Flow Nozzle For Use In A Filtered Rayleigh Scattering System, David S. Miceli

Theses and Dissertations

Research was conducted on the flow field exiting a co-annular flow nozzle for use in filtered Rayleigh scattering flow visualizations. More specifically, the flow visualizations were of the flow field exiting a coflow nozzle and illuminated by a tunable, nominal 4.2 watt narrow line width Argon laser operating at 514.5nm. ND:YAG lasers are typically used in this application, but some of the properties of a tunable Argon laser make it an attractive alternative. Before generating flow visualizations, the coflow nozzle was characterized both experimentally and computationally. Due to a flow asymmetry in the outer annulus flow field, the nozzle was …


A Multidiscipline Approach To Mitigating The Insider Threat, Jonathan W. Butts, Robert F. Mills, Gilbert L. Peterson Jun 2006

A Multidiscipline Approach To Mitigating The Insider Threat, Jonathan W. Butts, Robert F. Mills, Gilbert L. Peterson

Faculty Publications

Preventing and detecting the malicious insider is an inherently difficult problem that expands across many areas of expertise such as social, behavioral and technical disciplines. Unfortunately, current methodologies to combat the insider threat have had limited success primarily because techniques have focused on these areas in isolation. The technology community is searching for technical solutions such as anomaly detection systems, data mining and honeypots. The law enforcement and counterintelligence communities, however, have tended to focus on human behavioral characteristics to identify suspicious activities. These independent methods have limited effectiveness because of the unique dynamics associated with the insider threat. The …


Development Of A Methodology For Customizing Insider Threat Auditing On A Microsoft Windows Xp® Operating System, Terry E. Levoy Jun 2006

Development Of A Methodology For Customizing Insider Threat Auditing On A Microsoft Windows Xp® Operating System, Terry E. Levoy

Theses and Dissertations

Most organizations are aware that threats from trusted insiders pose a great risk to their organization and are very difficult to protect against. Auditing is recognized as an effective technique to detect malicious insider activities. However, current auditing methods are typically applied with a one-size-fits-all approach and may not be an appropriate mitigation strategy, especially towards insider threats. This research develops a 4-step methodology for designing a customized auditing template for a Microsoft Windows XP operating system. Two tailoring methods are presented which evaluate both by category and by configuration. Also developed are various metrics and weighting factors as a …


Mitigating Tcp Degradation Over Intermittent Link Failures Using Intermediate Buffers, M. Brent Reynolds Jun 2006

Mitigating Tcp Degradation Over Intermittent Link Failures Using Intermediate Buffers, M. Brent Reynolds

Theses and Dissertations

This thesis addresses the improvement of data transmission performance in a challenged network. It is well known that the popular Transmission Control Protocol degrades in environments where one or more of the links along the route is intermittently available. To avoid this degradation, this thesis proposes placing at least one node along the path of transmission to buffer and retransmit as needed to overcome the intermittent link. In the four-node, three-link testbed under particular conditions, file transmission time was reduced 20 fold in the case of an intermittent second link when the second node strategically buffers for retransmission opportunity.


Evaluation Of Microbial Diversity In Wetland Through Polymerase Chain Reaction (Pcr) And Restriction Fragment Length Polymorphism (Rflp), Gregory K. Joseph Jun 2006

Evaluation Of Microbial Diversity In Wetland Through Polymerase Chain Reaction (Pcr) And Restriction Fragment Length Polymorphism (Rflp), Gregory K. Joseph

Theses and Dissertations

The diversity of microbial communities in wetlands has not been fully measured. These communities may offer tools to naturally remediate sites polluted with chlorinated compounds. Polmerase Chain Reaction (PCR) and Restriction Fragment Length Polymorphism (RFLP) are genomic techniques that are capable of rapidly characterizing bacteria communities and can provide valuable information about the diversity of microbial communities.


Afit Uav Swarm Mission Planning And Simulation System, James N. Slear Jun 2006

Afit Uav Swarm Mission Planning And Simulation System, James N. Slear

Theses and Dissertations

The purpose of this research is to design and implement a comprehensive mission planning system for swarms of autonomous aerial vehicles. The system integrates several problem domains including path planning, vehicle routing, and swarm behavior. The developed system consists of a parallel, multi-objective evolutionary algorithm-based path planner, a genetic algorithm-based vehicle router, and a parallel UAV swarm simulator. Each of the system's three primary components are developed on AFIT's Beowulf parallel computer clusters. Novel aspects of this research include: integrating terrain following technology into a swarm model as a means of detection avoidance, combining practical problems of path planning and …


Development And Validation Of Reentry Simulation Using Matlab, Robert E. Jameson Jr. Jun 2006

Development And Validation Of Reentry Simulation Using Matlab, Robert E. Jameson Jr.

Theses and Dissertations

This research effort develops a program using MATLAB to solve the equations of motion for atmospheric reentry and analyzes the validity of the program for use as a tool to expeditiously predict reentry profiles. The reentry vehicle is modeled as a point mass with constant aerodynamic properties as defined by the user. The equations of motion for reentry are based on the two-body problem. The atmosphere is modeled as a single layer exponentially decreasing in density. The MATLAB program has the ability to derive the initial trajectory conditions from the position and velocity relative to the rotating surface of the …


Development Of A Malicious Insider Composite Vulnerability Assessment Methodology, William H. King Jun 2006

Development Of A Malicious Insider Composite Vulnerability Assessment Methodology, William H. King

Theses and Dissertations

Trusted employees pose a major threat to information systems. Despite advances in prevention, detection, and response techniques, the number of malicious insider incidents and their associated costs have yet to decline. There are very few vulnerability and impact models capable of providing information owners with the ability to comprehensively assess the effectiveness an organization's malicious insider mitigation strategies. This research uses a multi-dimensional approach: content analysis, attack tree framework, and an intent driven taxonomy model are used to develop a malicious insider Decision Support System (DSS) tool. The DSS tool's utility and applicability is demonstrated using a notional example. This …


Molecular Characterization Of Wetland Soil Bacterial Community In Constructed Mesocosms, Ethan C. Bishop Jun 2006

Molecular Characterization Of Wetland Soil Bacterial Community In Constructed Mesocosms, Ethan C. Bishop

Theses and Dissertations

The use of wetlands to effectively remediate aquifers contaminated with chlorinated solvents is an emerging technique, which shows high promise. In order to better understand this process and test its legitimacy, a treatment wetland was constructed at Wright-Patterson AFB, Dayton, Ohio and, in a joint effort with Wright State University (WSU), has previously shown the effective removal of PCE. The purpose of this research was to characterize the soil bacterial community, pre-PCE injection, among three wetland plant species from the sedge family (Cyperaceae) within constructed wetland mesocosms and to identify any bacterial dominance. Carex comosa, Scirpus atrovirens, and Eleocharis erythropoda …


An Analysis Of Nonlinear Elastic Deformations For A Homogeneous Beam At Varying Tip Loads And Pitch Angles, Robert J. Mcgraw Jun 2006

An Analysis Of Nonlinear Elastic Deformations For A Homogeneous Beam At Varying Tip Loads And Pitch Angles, Robert J. Mcgraw

Theses and Dissertations

The Princeton beam experiments of 1975 were performed in hopes of producing viable data for beam nonlinear elastic deformation models in hopes of improving helicopter main beam designs. The recorded data, specifically for homogeneous beams of 7075 aluminum, have been referenced as a baseline for the past thirty years to validate numerous computer models and theories in an effort to build beams capable of withstanding aeroelastic, static, and dynamic loading. The purpose of this study is to improve upon the data recorded in 1975 using newer technologies including a laser distance meter, digital inclinometer, and three-dimensional traverse to test X-axis, …


Small Sample Confidence Intervals In Log Space Back-Transformed From Normal Space, Jason E. Tisdel Jun 2006

Small Sample Confidence Intervals In Log Space Back-Transformed From Normal Space, Jason E. Tisdel

Theses and Dissertations

The logarithmic transformation is commonly applied to a lognormal data set to improve symmetry, homoscedasticity, and linearity. Simple to implement and easy to understand, the logarithm function transforms the original data to closely resemble a normal distribution. Analysis in the normal space provides point estimates and confidence intervals, but transformation back to the original space using the naive approach yields confidence intervals of impractical width. The naive approach offers results that are often inadequate for practical purpose. We present an alternative approach that provides improved results in the form of decreased interval width, increased confidence level, or both. Our alternative …


Multiple Masks-Based Pixel Comparison Steganalysis Method For Mobile Imaging, Sos S. Agaian, Gilbert L. Peterson, Benjamin M. Rodriguez May 2006

Multiple Masks-Based Pixel Comparison Steganalysis Method For Mobile Imaging, Sos S. Agaian, Gilbert L. Peterson, Benjamin M. Rodriguez

Faculty Publications

No abstract provided.


Fuzzy State Aggregation And Off-Policy Reinforcement Learning For Stochastic Environments, Dean C. Wardell, Gilbert L. Peterson May 2006

Fuzzy State Aggregation And Off-Policy Reinforcement Learning For Stochastic Environments, Dean C. Wardell, Gilbert L. Peterson

Faculty Publications

Reinforcement learning is one of the more attractive machine learning technologies, due to its unsupervised learning structure and ability to continually learn even as the environment it is operating in changes. This ability to learn in an unsupervised manner in a changing environment is applicable in complex domains through the use of function approximation of the domain’s policy. The function approximation presented here is that of fuzzy state aggregation. This article presents the use of fuzzy state aggregation with the current policy hill climbing methods of Win or Lose Fast (WoLF) and policy-dynamics based WoLF (PD-WoLF), exceeding the learning rate …


An Interactive Relaxation Approach For Anomaly Detection And Preventive Measures In Computer Networks, Garrick A. Bell Apr 2006

An Interactive Relaxation Approach For Anomaly Detection And Preventive Measures In Computer Networks, Garrick A. Bell

Theses and Dissertations

It is proposed to develop a framework of detecting and analyzing small and widespread changes in specific dynamic characteristics of several nodes. The characteristics are locally measured at each node in a large network of computers and analyzed using a computational paradigm known as the Relaxation technique. The goal is to be able to detect the onset of a worm or virus as it originates, spreads-out, attacks and disables the entire network. Currently, selective disabling of one or more features across an entire subnet, e.g. firewalls, provides limited security and keeps us from designing high performance net-centric systems. The most …


Performance-Metric Driven Atmospheric Compensation For Robust Free-Space Laser Communication, Peter N. Crabtree Apr 2006

Performance-Metric Driven Atmospheric Compensation For Robust Free-Space Laser Communication, Peter N. Crabtree

Theses and Dissertations

The effect of turbulence on laser propagation is a significant challenge to current electro-optical systems. While atmospheric compensation techniques in space object imaging and high-energy laser weapons have been thoroughly investigated, optimizing these techniques for Laser Communication (LaserCom) has not been examined to the same degree. Average Strehl ratio is the typical design metric for current atmospheric compensation systems. However, fade probability is the relevant metric for LaserCom. This difference motivated the investigation into metric-driven atmospheric compensation. Metric-based tracking techniques for fade mitigation is the first major focus of this research. In a moderate range air-to-air scenario, focal plane spot …


Factors Impacting Key Management Effectiveness In Secured Wireless Networks, Yongjoo Shin Mar 2006

Factors Impacting Key Management Effectiveness In Secured Wireless Networks, Yongjoo Shin

Theses and Dissertations

The use of a Public Key Infrastructure (PKI) offers a cryptographic solution that can overcome many, but not all, of the MANET security problems. One of the most critical aspects of a PKI system is how well it implements Key Management. Key Management deals with key generation, key storage, key distribution, key updating, key revocation, and certificate service in accordance with security policies over the lifecycle of the cryptography. The approach supported by traditional PKI works well in fixed wired networks, but it may not appropriate for MANET due to the lack of fixed infrastructure to support the PKI. This …


Investigation Of Copper Contamination And Corrosion Scale Mineralogy In Aging Drink Water Distributions Systems, Nadja F. Turek Mar 2006

Investigation Of Copper Contamination And Corrosion Scale Mineralogy In Aging Drink Water Distributions Systems, Nadja F. Turek

Theses and Dissertations

Research has shown higher levels of copper appear in drinking water conveyed through relatively new copper piping systems; older piping systems typically deliver lower copper levels in their drinking water. This research contributes field data from a real drinking water distribution system, providing a better understanding of this phenomenon, as it relates to treatment considerations and compliance with the Lead and Copper Rule. Copper pipes and copper levels were sampled from drinking water taps of 16 buildings with pipes ranging in age from less than 1 to 48 years. Water samples from each building were collected before and following a …


Backward Amplification And Beam Cleanup Of A Raman Fiber Laser Oscillator Using A Multi-Mode Graded Index Fiber Amplifier, Jesse D. S. Morgan Iii Mar 2006

Backward Amplification And Beam Cleanup Of A Raman Fiber Laser Oscillator Using A Multi-Mode Graded Index Fiber Amplifier, Jesse D. S. Morgan Iii

Theses and Dissertations

This thesis tested a CW fiber-based Raman amplifier implemented in a backward pumped geometry. To create a seed for the amplifier, a CW Nd:YAG laser operating at 1.064µm was used to pump a 50µm multimode graded index fiber using fiber Bragg gratings to create a Raman Fiber Laser (RFL) Oscillator with a Stokes beam at 1.116µm. The Stokes beam was then used to seed two lengths, 5.3km and 2.5km, of 50µm multimode graded index fiber. The fiber amplifier was pumped by a second CW Nd:YAG laser in the backward geometry. Spectral data taken for both fibers indicated that the backward …


Development Of A Three-Dimensional Air Blast Propagation Model Based Upon The Weighted Average Flux Method, Stephen R. Mchale Mar 2006

Development Of A Three-Dimensional Air Blast Propagation Model Based Upon The Weighted Average Flux Method, Stephen R. Mchale

Theses and Dissertations

Accurate numerical modeling of complex, multi-dimensional shock propagation is needed for many Department of Defense applications. A three-dimensional code, based upon E.F. Toro's weighted average flux (WAF) method has been developed, tested, and validated. Code development begins with the introduction and application of all techniques in a single dimension. First-order accuracy is achieved via Godunov's scheme using an exact Riemann solver. Adaptive techniques, which employ approximate solutions, are implemented to improve computational efficiency. The WAF method produces second-order accurate solutions, but introduces spurious oscillations near shocks and contact discontinuities. Total variation diminishing (TVD) flux and weight limiting schemes are added …


Assessing The Potential For Improved Scramjet Performance Through Application Of Electromagnetic Flow Control, Martin F. Lindsey Mar 2006

Assessing The Potential For Improved Scramjet Performance Through Application Of Electromagnetic Flow Control, Martin F. Lindsey

Theses and Dissertations

Hypersonic flight using scramjet propulsion bridges the gap between turbojets and rockets. Recent efforts focus on magnetogasdynamic (MGD) flow control to mitigate the problems of high thermomechanical loads and low efficiencies associated with scramjets. This research is the first flight-scale, three-dimensional computational analysis of a realistic scramjet to assess how MGD flow control improves scramjet performance. Developing a quasi-one dimensional design tool culminated in the first open source scramjet geometry. This geometry was tested with the Air Force Research Laboratory's electromagnetic computational code. To increase fidelity, an algorithm was developed to incorporate thermochemistry, resulting in the only open-source model of …


Modeling Study To Quantify The Benefits Of Groundwater Contaminant Source Remediation, David E. Wagner Mar 2006

Modeling Study To Quantify The Benefits Of Groundwater Contaminant Source Remediation, David E. Wagner

Theses and Dissertations

The purpose of this research was to quantify the benefits of groundwater contaminant source remediation by using a model to simulate how reduction of source mass was related to reduction of contaminant concentration at a receptor. This thesis sought to answer three research questions: (1) how are contaminant source mass reduction and reduction of mass flux leaving the source-zone related; (2) how can we quantify the effect of the important natural attenuation processes that act upon the dissolved contaminant as it travels from the source zone to downgradient receptors, and (3) under specified site conditions, what is the maximum contaminant …


Efficient And Accurate Computation Of Elastic Cross Sections In The Single-Level Breit-Wigner Resonance Region, Edward L. Hobbs Mar 2006

Efficient And Accurate Computation Of Elastic Cross Sections In The Single-Level Breit-Wigner Resonance Region, Edward L. Hobbs

Theses and Dissertations

The use of piecewise cubic Hermite polynomials to approximate resonance region cross sections provides a means to accomplish the same task with increased accuracy and fewer points that require exact cross section calculation. Once the derivative of the cross section formula is derived and the interpolating cubic is appropriately shifted and scaled for numerical stability, use of the piecewise cubic Hermite polynomial is easily inserted into computer codes that depend on cross section calculation in the resonance energy region.


Comparison Of Climatological Optical Turbulence Profiles To Standard, Statistical And Numerical Models Using Heleeos, Liesebet E. Gravley Mar 2006

Comparison Of Climatological Optical Turbulence Profiles To Standard, Statistical And Numerical Models Using Heleeos, Liesebet E. Gravley

Theses and Dissertations

Optical turbulence within earth’s atmosphere plays a significant role in electromagnetic radiation propagation from a high energy laser. The index of refraction structure constant, Cn2, characterizes turbulent spatial fluctuations due to temperature gradients. These changes in the index of refraction affect the intensity of the laser wave front on its intended target. It is important to characterize this parameter throughout the atmosphere, the boundary layer and above, for its applications regarding the Airborne Laser (ABL) and the Advanced Tactical Laser (ATL). There are several ways to obtain values of optical turbulence, including standard and statistical models, physically-based numerical models, and …


Comparative Analysis Of Biosurveillance Methodologies, David M. Kempisty Mar 2006

Comparative Analysis Of Biosurveillance Methodologies, David M. Kempisty

Theses and Dissertations

The purpose of this research is to compare two different biosurveillance methodologies: BioWatch and "A Hot Idea". BioWatch is fielded and operating in major US cities today. Air samples are collected on filter paper and analyzed for the presence of harmful biological agents. "A Hot Idea" is an evolving methodology using the human body's immune response to identify the onset of infection from a harmful pathogen. Detecting a temperature increase, using infrared thermographers, in a statistically significant portion of population would allow earlier identification of a biological release, accelerating initiation of response actions. A selected population including policemen, firemen, and …


Radiometric Analysis Of Daytime Satellite Detection, Katherine B. Lilevjen Mar 2006

Radiometric Analysis Of Daytime Satellite Detection, Katherine B. Lilevjen

Theses and Dissertations

A radiometric model for daylight satellite detection is developed and used to evaluate the effects of various parameters on signal-to-noise ratio (SNR). Detection of reflected sunlight from a low-earth orbit, diffuse, planar satellite by a single-pixel infrared photovoltaic detector is considered. Noise considered includes photon noise from the background and signal, as well as thermal noise. Parameters considered include atmospheric conditions, optical parameters, and detector parameters. The Phillips Laboratory Expert-assisted User System, an atmospheric modeling tool that employs the MODTRAN and FASCODE transmission codes, is used to model wavelength-dependent atmospheric transmission and background radiance. The SNR is found to increase …