Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1591 - 1620 of 2678

Full-Text Articles in Physical Sciences and Mathematics

Evaluation Of Chlorinated Solvent Removal Efficiency Among Three Wetland Plant Species: A Mesocom Study, Jun Yan Mar 2006

Evaluation Of Chlorinated Solvent Removal Efficiency Among Three Wetland Plant Species: A Mesocom Study, Jun Yan

Theses and Dissertations

Different species of plants need to be studied individually to compare the remediation efficiency of each species. This research will study three different wetland plants species and an unplanted control, under a laboratory setting. Each plant has a different characteristic favorable for chlorinated solvent degradation. Eleocharis erythropoda (Spike Rush) are plants with thin tube like leaves and large root mass. Carex comosa (Bearded Sedge) has broad leaves and Scirpus atrovirens (Green Bulrush) are broad leafed wetland plants with a long flowering stem during reproduction. PCE will be injected into the plant mesocosm and any possible PCE degradation will be observed. …


Type Ii Quantum Computing Algorithm For Computational Fluid Dynamics, James A. Scoville Mar 2006

Type Ii Quantum Computing Algorithm For Computational Fluid Dynamics, James A. Scoville

Theses and Dissertations

An algorithm is presented to simulate fluid dynamics on a three qubit type II quantum computer: a lattice of small quantum computers that communicate classical information. The algorithm presented is called a three qubit factorized quantum lattice gas algorithm. It is modeled after classical lattice gas algorithms which move virtual particles along an imaginary lattice and change the particles’ momentums using collision rules when they meet at a lattice node. Instead of moving particles, the quantum algorithm presented here moves probabilities, which interact via a unitary collision operator. Probabilities are determined using ensemble measurement and are moved with classical communications …


A Study Of Collapse Events In Ultraviolet Light Filaments Due To Transient Edge Effects, Paul L. Muller Mar 2006

A Study Of Collapse Events In Ultraviolet Light Filaments Due To Transient Edge Effects, Paul L. Muller

Theses and Dissertations

Intense, short light pulses can form filaments capable of propagating kilometers through the atmosphere. This is due to the nonlinear index of refraction of the atmosphere in response to the pulse's high intensity, which creates a self-focusing effect that further intensifies the pulse. This focusing is balanced by the formation of defocusing plasma by the pulse. A split-step propagation model was used to simulate the propagation of these pulses through the atmosphere and investigate the collapse of long ultraviolet pulses of 10-100 picoseconds in duration due to transient edge effects. The structures of individual collapse events in the pulse were …


The Longitudinal Effect Of Self-Monitoring And Locus Of Control On Social Network Position In Friendship Networks, Gary J. Moore Mar 2006

The Longitudinal Effect Of Self-Monitoring And Locus Of Control On Social Network Position In Friendship Networks, Gary J. Moore

Theses and Dissertations

The purpose of this research was to identify how enduring personality characteristics predict a person's location in a network, locations which in turn affect outcomes such as performance. Specifically, this thesis examines how self-monitoring and locus of control influence an individual's location in a friendship social network over time. Hierarchical Linear Modeling (HLM) was used to analyze 28 groups of students and instructors at a military training course over six and one half weeks. Self-monitoring predicted betweenness centrality in five of six time periods while locus of control predicted betweenness centrality in three of six time periods. The moderation of …


Shockwave Interactions With Argon Glow Discharges, Nicholas S. Siefert Mar 2006

Shockwave Interactions With Argon Glow Discharges, Nicholas S. Siefert

Theses and Dissertations

The purpose of this research was study shock wave interactions with argon glow discharges. Specifically, this thesis sought to answer whether it is possible to compress nonequilibrium electrons at the shock wave. The results in the thesis found that both equilibrium and nonequilibrium electrons could be compressed at the shock front. The double layer at the shock front, normalized by electron temperature, matched the calculated values for the double layer within a factor or two in all cases. The results also demonstrate that excited metastable states can be compressed at the shock front, as well. The culmination of this effort …


Modeling E & F Region Ionospheric Response To X-Ray Solar Flares, Annette M. Parsons Mar 2006

Modeling E & F Region Ionospheric Response To X-Ray Solar Flares, Annette M. Parsons

Theses and Dissertations

This research takes an existing ionospheric model and modifies it to include the effects of solar flare activity. Solar flares are a localized explosive release of magnetic energy that appears as a sudden, short-lived brightening in the sun’s chromosphere. This additional energy is deposited in the earth’s ionosphere, temporarily changing its properties, which can affect military communications. Studying the effects of moderate solar flares will improve our understanding of the ionosphere’s response, leading to better operational models. Modification of the model is accomplished by adding a flare irradiance model to represent solar irradiance changes due to a flare. The irradiance …


Reproducibility Distinguishability And Correlation Of Fireball And Shockwave Dynamics In Explosive Munitions Detonations, Bryan J. Steward Mar 2006

Reproducibility Distinguishability And Correlation Of Fireball And Shockwave Dynamics In Explosive Munitions Detonations, Bryan J. Steward

Theses and Dissertations

The classification of battlespace detonations, specifically the determination of munitions type and size using temporal and spectral features of infrared emissions, is a particularly challenging problem. The intense infrared radiation produced by the detonation of high explosives is largely unstudied. Furthermore, the time-varying fireball imagery and spectra are driven by many factors including the type, size and age of the chemical explosive, method of detonation, interaction with the environment, and the casing used to enclose the explosive. To distinguish between conventional military munitions and improvised or enhanced explosives, the current study investigates fireball expansion dynamics using high speed, multi-band imagery. …


Development Of A Multiple Beam Combiner Using Stimulated Raman Scattering In Multimode Fiber, Brian M. Flusche Mar 2006

Development Of A Multiple Beam Combiner Using Stimulated Raman Scattering In Multimode Fiber, Brian M. Flusche

Theses and Dissertations

Beam combination was demonstrated by splitting the beam from a diode pumped Q-switched Nd:YAG laser and pumping a multiple input, single output fiber squid. Beam cleanup of the resulting output beam using stimulated Raman scattering was then demonstrated in both 100 μm fiber (Stokes M2 = 1.86) and 200 μm fiber (Stokes M2 = 1.40). The performance of the 200 μm fiber was compared to that of the 100 μm fiber. Energy conversion efficiency into the Stokes beam was measured as a function of input energy and found to be limited by the attenuation characteristics of the fiber. …


Passive Multiple Beam Combination In Optical Fibers Via Stimulated Brillouin Scattering, Kirk C. Brown Mar 2006

Passive Multiple Beam Combination In Optical Fibers Via Stimulated Brillouin Scattering, Kirk C. Brown

Theses and Dissertations

Many active methods of scaling laser brightness have been demonstrated in recent years. The goal of this research was to demonstrate the feasibility of passively combining multiple laser beams using Stimulated Brillouin Scattering (SBS) in a long multimode optical fiber. This method of combination employed a “Gatling gun” fiber array that allowed several collimated beams to be focused by a lens into an optical fiber. The retroreflected Stokes beam is passed through the center of the beam combiner for analysis. In addition to experimental methodology and equipment used, the theoretical and historical background of SBS in optical fibers is provided. …


Singlet Delta Oxygen: A Quantitative Analysis Using Off-Axis Integrated-Cavity-Output-Spectroscopy (Icos), Jeffrey E. Gallagher Mar 2006

Singlet Delta Oxygen: A Quantitative Analysis Using Off-Axis Integrated-Cavity-Output-Spectroscopy (Icos), Jeffrey E. Gallagher

Theses and Dissertations

A new spectroscopic technique applicable to the detection of ultra-weak and for- bidden molecular transitions is presented. The method is based on off-axis integrated-cavity-output spectroscopy (ICOS). The primary goal for this research effort is to utilize the ICOS technique and demonstrate its ability to provide quantitative data of singlet delta oxygen. This thesis will focus on three areas of characterization to achieve this goal. First, the absolute line positions will be determined and compared to values derived from the most recent theory. Second, the integrated absorption cross-sections will be verified using Boltzmann analysis. Finally, pressure broadening coefficients will be determined …


Prediction Of Flight-Level Radiation Hazards Due To Solar Energetic Protons, Matthew P. Sattler Mar 2006

Prediction Of Flight-Level Radiation Hazards Due To Solar Energetic Protons, Matthew P. Sattler

Theses and Dissertations

The radiation environment at aircraft altitudes is caused primarily by high-energy particles originating from outside the near-earth environment. These particles generally come from outside our solar system and are called galactic cosmic rays. Occasionally however, a transient solar event will also accelerate energetic protons toward the earth. If these protons reach the upper atmosphere, they produce secondary particles via collisions, resulting in increased radiation levels in the atmosphere. Air crews and electronic systems flying at high altitudes during one of these events are subjected to these increased levels of radiation which can result in health problems for personnel and soft …


Validation Of Methods To Measure Mass Flux Of A Groundwater Contaminant, Hyouk Yoon Mar 2006

Validation Of Methods To Measure Mass Flux Of A Groundwater Contaminant, Hyouk Yoon

Theses and Dissertations

In this study, flux measurements obtained using two methods are compared with known mass fluxes in a meso-scale three-dimensional artificial aquifer. One method, the tandem recirculating well (TRW) method, is applied using two different techniques. One technique is simple and inexpensive, only requiring measurement of heads, while the second technique requires conducting a tracer test. The second method, the integrated pump test (IPT) method, requires use of one or more pumping and observation wells in various configurations. The results of the experiments in the artificial aquifer show that the most expensive technique, the TRW method using tracers, provides the most …


Formal Mitigation Strategies For The Insider Threat: A Security Model And Risk Analysis Framework, Jonathan W. Butts Mar 2006

Formal Mitigation Strategies For The Insider Threat: A Security Model And Risk Analysis Framework, Jonathan W. Butts

Theses and Dissertations

The advancement of technology and reliance on information systems have fostered an environment of sharing and trust. The rapid growth and dependence on these systems, however, creates an increased risk associated with the insider threat. The insider threat is one of the most challenging problems facing the security of information systems because the insider already has capabilities within the system. Despite research efforts to prevent and detect insiders, organizations remain susceptible to this threat because of inadequate security policies and a willingness of some individuals to betray their organization. To investigate these issues, a formal security model and risk analysis …


Prediction Of The Temporal Evolution Of Solar X-Ray Flares, Aaron J. Williams Mar 2006

Prediction Of The Temporal Evolution Of Solar X-Ray Flares, Aaron J. Williams

Theses and Dissertations

A solar flare is an explosive release of stored magnetic energy on the Sun. Much of this energy is converted into x-ray photons which escape into space. As a solar flare begins, the 1-8 Å x-ray photon flux at Earth’s orbit, as measured by the GOES satellite, rapidly increases. It quickly reaches a peak and slowly decays. A plot of this flux exhibits an approximate lognormal shape. A lognormal function becomes a normal, symmetric, function when the logarithm of the independent variable is taken. Once the peak flux is reached, this symmetry is used to make a prediction of the …


Existence Of Explosive Solutions To Non-Monotone Semilinear Elliptic Equations, Zachary H. Proano Mar 2006

Existence Of Explosive Solutions To Non-Monotone Semilinear Elliptic Equations, Zachary H. Proano

Theses and Dissertations

We consider the semilinear elliptic equation Δu = p(x)f(u) on a domain ­ Ω ⊆ Rn, n ≥ 3, where f is a nonnegative function which vanishes at the origin and satisfies g1f g2 where g1; g2 are nonnegative, nondecreasing functions which also vanish at the origin, and p is a nonnegative continuous function with the property that any zero of p is contained in a bounded domain in ­ such that p is positive on its boundary. For Ω­ bounded, we show that a nonnegative solution u satisfying u(x) …


Doppler-Only Multistatic Radar, Dustin G. Mixon Mar 2006

Doppler-Only Multistatic Radar, Dustin G. Mixon

Theses and Dissertations

In order to estimate the position and velocity of a target, most multistatic radar systems require multiple independent target measurements, such as angle-of-arrival, time-of-arrival, and Doppler information. Though inexpensive and reliable, Doppler-only systems have not been widely implemented due to the inherent nonlinear problem of determining a target’s position and velocity from their measurements. We solve this problem. In particular, we first establish the lack of observability in the Doppler-only bistatic system, thereby demonstrating the need for multiple transmitters and/or receivers. Next, for a multistatic system with a sufficient number of transmitter-receiver pairs, we invoke classical optimization techniques, such as …


Cryptanalysis Of Pseudorandom Number Generators In Wireless Sensor Networks, Kevin M. Finnigin Mar 2006

Cryptanalysis Of Pseudorandom Number Generators In Wireless Sensor Networks, Kevin M. Finnigin

Theses and Dissertations

This work presents a brute-force attack on an elliptic curve cryptosystem implemented on UC Berkley's TinyOS operating system for wireless sensor networks. The attack exploits the short period of the pseudorandom number generator (PRNG) used by the cryptosystem to generate private keys. The attack assumes a laptop is listening promiscuously to network traffic for key messages and requires only the sensor node?s public key and network address to discover the private key. Experimental results show that roughly 50% of the address space leads to a private key compromise in 25 minutes on average. Furthermore, approximately 32% of the address space …


Active Optical Tracking With Spatial Light Modulators, Steven R. Mawhorter Mar 2006

Active Optical Tracking With Spatial Light Modulators, Steven R. Mawhorter

Theses and Dissertations

Two spatial light modulators are utilized for beam splitting, steering and tracking. Both linear and holographic phase screens are used in a demonstration of technology to allow real time tracking to communicate in a one-to-several type scenario. One SLM is used to apply a linear phase modulation to steer multiple beams onto a detector. The spots that are produced represent the targets as they move around the field of view of the central communication node. A Gerchberg-Saxton algorithm will subsequently use the detected spots as the desired pointing locations. Using this as input, the Gerchberg-Saxton algorithm yields a phase only …


Control Demonstration Of A Thin Deformable In-Plane Actuated Mirror, Gina A. Peterson Mar 2006

Control Demonstration Of A Thin Deformable In-Plane Actuated Mirror, Gina A. Peterson

Theses and Dissertations

Current imaging satellites are limited in resolution and coverage area by the aperture size of their primary optical mirror. To get a large optical mirror into space, current launch weight and size restrictions must be overcome. Membrane-like optical mirrors can overcome these restrictions with their very lightweight and flexible properties. However, thin, deformable membrane mirrors are very susceptible to the space environment and require active control for surface stabilization and shaping. The primary goal of this research is to demonstrate that an in-plane actuated membrane-like deformable optical mirror can be controlled to optical wavelength tolerances in a closed-loop system. Fabrication …


Multiframe Shift Estimation, Stephen A. Bruckart Mar 2006

Multiframe Shift Estimation, Stephen A. Bruckart

Theses and Dissertations

The purpose of this research was to develop a fundamental framework for a new approach to multiframe translational shift estimation in image processing. This thesis sought to create a new multiframe shift estimator, to theoretically prove and experimentally test key properties of it, and to quantify its performance according to several metrics. The new estimator was modeled successfully and was proven to be an unbiased estimator under certain common image noise conditions. Furthermore its performance was shown to be superior to the cross correlation shift estimator, a robust estimator widely used in similar image processing cases, according to several criteria. …


Metamorphism As A Software Protection For Non-Malicious Code, Thomas E. Dube Mar 2006

Metamorphism As A Software Protection For Non-Malicious Code, Thomas E. Dube

Theses and Dissertations

Most organizations are aware that threats from trusted insiders pose a great risk to their organization and are very difficult to protect against. Auditing is recognized as an effective technique to detect malicious insider activities. However, current auditing methods are typically applied with a one-size-fits-all approach and may not be an appropriate mitigation strategy, especially towards insider threats. This research develops a 4-step methodology for designing a customized auditing template for a Microsoft Windows XP operating system. Two tailoring methods are presented which evaluate both by category and by configuration. Also developed are various metrics and weighting factors as a …


The Simulation Of Off-Axis Laser Propagation Using Heleeos, Scott L. Belton Mar 2006

The Simulation Of Off-Axis Laser Propagation Using Heleeos, Scott L. Belton

Theses and Dissertations

Emerging technology high energy laser (HEL) weapon systems create a myriad of new threats to safety as well as security. One of the primary causes of these concerns is off-axis laser propagation caused by ever-present particulate and molecular scattering medium in the atmosphere. The scatter from these aerosols and molecules can redirect some of the HEL's concentrated energy towards unintended targets such as the eyes of pilots, friendly fighters on the surface, or innocent bystanders. Of particular interest to the laser intelligence (LASINT) community is the possibility that off-axis irradiance from HEL weapon systems could be covertly measured with enough …


Spatially-Resolved Temperature Diagnostic For Supersonic Flow Using Cross-Beam Doppler-Limited Laser Saturation Spectroscopy, Grady T. Phillips Mar 2006

Spatially-Resolved Temperature Diagnostic For Supersonic Flow Using Cross-Beam Doppler-Limited Laser Saturation Spectroscopy, Grady T. Phillips

Theses and Dissertations

Optical techniques for measuring the temperature in three-dimensional supersonic reactive flows have typically depended on lineshape measurements using single-beam laser absorption spectroscopy. However, absorption over extended path lengths in flows with symmetric, turbulent eddies can lead to systematically high extracted temperatures due to Doppler shifts resulting from flow along the absorption path. To eliminate these problems, Cross-Beam Saturation Absorption Spectroscopy (CBSAS) and Cross-Beam Inter-Modulated Fluorescence (CBIMF) have been developed which utilize two crossed and nearly copropogating laser beams.to record the spectral signal of an I2 ro-vibrational line in a small three-dimensional volume using a tunable CW dye laser. Temperature …


Selecting Energy Efficient Building Envelope Retrofits To Existing Department Of Defense Building Using Value Focused Thinking, David M. Pratt Mar 2006

Selecting Energy Efficient Building Envelope Retrofits To Existing Department Of Defense Building Using Value Focused Thinking, David M. Pratt

Theses and Dissertations

The Department of Defense (DoD) has hundreds of thousands of facilities in its inventory, which consume billions of BTUSs of energy per year. Much of that energy is used to heat and cool the facility, and a great deal of this energy is lost through the building envelope. While new military construction works towards energy efficiency, the majority of DoD facilities were built over forty years ago with little regard to energy efficiency, and it is these facilities that have the greatest potential for energy efficient building envelope retrofits. There are hundreds of various new building envelope technologies available to …


Toward The Static Detection Of Deadlock In Java Software, Jose E. Fadul Mar 2006

Toward The Static Detection Of Deadlock In Java Software, Jose E. Fadul

Theses and Dissertations

Concurrency is the source of many real-world software reliability and security problems. Concurrency defects are difficult to detect because they defy conventional software testing techniques due to their non-local and non-deterministic nature. We focus on one important aspect of this problem: static detection of the possibility of deadlock - a situation in which two or more processes are prevented from continuing while each waits for resources to be freed by the continuation of the other. This thesis proposes a flow-insensitive interprocedural static analysis that detects the possibility that a program can deadlock at runtime. Our analysis proceeds in two steps. …


Optimization Of A Multi-Echelon Repair System Via Generalized Pattern Search With Ranking And Selection: A Computational Study, Derek D. Tharaldson Mar 2006

Optimization Of A Multi-Echelon Repair System Via Generalized Pattern Search With Ranking And Selection: A Computational Study, Derek D. Tharaldson

Theses and Dissertations

With increasing developments in computer technology and available software, simulation is becoming a widely used tool to model, analyze, and improve a real world system or process. However, simulation in itself is not an optimization approach. Common optimization procedures require either an explicit mathematical formulation or numerous function evaluations at improving iterative points. Mathematical formulation is generally impossible for problems where simulation is relevant, which are characteristically the types of problems that arise in practical applications. Further complicating matters is the variability in the simulation response which can cause problems in iterative techniques using the simulation model as a function …


Flashlight: A Dynamic Detector Of Shared State, Race Conditions, And Locking Models In Concurrent Java Programs, Scott C. Hale Mar 2006

Flashlight: A Dynamic Detector Of Shared State, Race Conditions, And Locking Models In Concurrent Java Programs, Scott C. Hale

Theses and Dissertations

Concurrent Java programs are difficult to understand and implement correctly. This difficultly leads to code faults that are the source of many real-world reliability and security problems. Many factors contribute to concurrency faults in Java code; for example, programmers may not understand Java language semantics or, when using a Java library or framework, may not understand that their resulting program is concurrent. This thesis describes a dynamic analysis tool, named FlashLight, that detects shared state and possible race conditions within a program. FlashLight illuminates the concurrency within a program for programmers who are wholly or partially "in the dark" about …


Evolving Self-Organized Behavior For Homogeneous And Heterogeneous Uav Or Ucav Swarms, Ian C. Price Mar 2006

Evolving Self-Organized Behavior For Homogeneous And Heterogeneous Uav Or Ucav Swarms, Ian C. Price

Theses and Dissertations

This investigation uses a self-organization (SO) approach to enable cooperative search and destruction of retaliating targets with swarms of homogeneous and heterogeneous unmanned aerial vehicles (UAVs). To facilitate specific system design, a facilitating SO algebraic framework is created that emphasizes scalability, robustness, and flexibility. This framework is then used to implement a UAV behavior architecture relying upon rules governing formation and target interaction. Sets of applicable behaviors are created by weighted summation of the rules where different weights act as distinct behavior archetypes. Appropriate behavior archetypes are based upon sense information distilled from the environment and a simple perceptron mapping. …


A Real-Time Wireless Sensor Media Access Control (Mac) Protocol, Barry W. Park Mar 2006

A Real-Time Wireless Sensor Media Access Control (Mac) Protocol, Barry W. Park

Theses and Dissertations

Wireless sensor networks are rapidly becoming a platform for applications such as battlefield monitoring, intelligence gathering, environmental monitoring, and emergency response. Inherent in these applications is a priority and urgency of the information or messages. This means the messages must be delivered in a timely manner for them to be useful. This research assigns a message priority level and provides high-priority messages quicker access to the channel. Using MICA2 sensors and a modified Media Access Control (MAC) layer, real-time message End-to-End (ETE) delay was reduced by 50 percent. Coupled with this decrease in delay, these same real-time messages also had …


Application Of Fuzzy State Aggregation And Policy Hill Climbing To Multi-Agent Systems In Stochastic Environments, Dean C. Wardell Mar 2006

Application Of Fuzzy State Aggregation And Policy Hill Climbing To Multi-Agent Systems In Stochastic Environments, Dean C. Wardell

Theses and Dissertations

Reinforcement learning is one of the more attractive machine learning technologies, due to its unsupervised learning structure and ability to continually even as the operating environment changes. Applying this learning to multiple cooperative software agents (a multi-agent system) not only allows each individual agent to learn from its own experience, but also opens up the opportunity for the individual agents to learn from the other agents in the system, thus accelerating the rate of learning. This research presents the novel use of fuzzy state aggregation, as the means of function approximation, combined with the policy hill climbing methods of Win …