Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1741 - 1770 of 2678

Full-Text Articles in Physical Sciences and Mathematics

An Automated Method Of Predicting Clear-Air Turbulence, Brian L. Belson Mar 2004

An Automated Method Of Predicting Clear-Air Turbulence, Brian L. Belson

Theses and Dissertations

Clear-air turbulence (CAT) prediction is vitally important to military aviation and the successful completion of Department of Defense (DoD) operations such as air to air refueling and new national defensive weapon systems such as directed energy platforms. The unique mission requirements of military aircraft often require strict avoidance of turbulent regions. Traditionally, weather forecasters have found it difficult to accurately predict CAT. In order to forecast regions where CAT might occur, forecasters must first determine the location of breaking waves caused by either Kelvin-Helmholtz instabilities or topographically forced internal gravity waves (mountain waves) in the atmosphere. The United States Air …


Comparative Analysis Of Active And Passive Mapping Techniques In An Internet-Based Local Area Network, James B. Kuntzelman Mar 2004

Comparative Analysis Of Active And Passive Mapping Techniques In An Internet-Based Local Area Network, James B. Kuntzelman

Theses and Dissertations

Network mapping technologies allow quick and easy discovery of computer systems throughout a network. Active mapping methods, such as using nmap, capitalize on the standard stimulus-response of network systems to probe target systems. In doing so, they create extra traffic on the network, both for the initial probe and for the target system's response. Passive mapping methods work opportunistically, listening for network traffic as it transits the system. As such, passive methods generate minimal network traffic overhead. Active methods are still standard methods for network information gathering; passive techniques are not normally used due to the possibility of missing important …


An Investigation Of The Effects Of Correlation, Autocorrelation, And Sample Size In Classifier Fusion, Nathan J. Leap Mar 2004

An Investigation Of The Effects Of Correlation, Autocorrelation, And Sample Size In Classifier Fusion, Nathan J. Leap

Theses and Dissertations

This thesis extends the research found in Storm, Bauer, and Oxley, 2003. Data correlation effects and sample size effects on three classifier fusion techniques and one data fusion technique were investigated. Identification System Operating Characteristic Fusion (Haspert, 2000), the Receiver Operating Characteristic Within Fusion method (Oxley and Bauer, 2002), and a Probabilistic Neural Network were the three classifier fusion techniques; a Generalized Regression Neural Network was the data fusion technique. Correlation was injected into the data set both within a feature set (autocorrelation) and across feature sets for a variety of classification problems, and sample size was varied throughout. Total …


Analysis Of Uncertainties In Infrared Camera Measurements Of A Turbofan Engine In An Altitude Test Cell, Thomas A. Morris Mar 2004

Analysis Of Uncertainties In Infrared Camera Measurements Of A Turbofan Engine In An Altitude Test Cell, Thomas A. Morris

Theses and Dissertations

This research investigated the uncertainties in measuring the IR signature of a General Electric F110-GE-129 turbofan engine inside an altitude test cell. The requirements for the measurement system include the intensity and radiance of the engine surfaces in three bands of operation, two Medium Wave IR (MWIR) bands and one Long Wave IR (LWIR) band. The altitude test cell provides a venue for measuring the IR signature in simulated altitude operation, but the imaging process is laden with measurement uncertainty due to stray radiation from the facility structure, hot exhaust gases, and the measurement equipment itself. The atmosphere and a …


A Rapidly-Converging Alternative To Source Iteration For Solving The Discrete Ordinates Radiation Transport Equations In Slab Geometry, Nicholas J. Wager Mar 2004

A Rapidly-Converging Alternative To Source Iteration For Solving The Discrete Ordinates Radiation Transport Equations In Slab Geometry, Nicholas J. Wager

Theses and Dissertations

I present a numerical technique to solve the time independent Boltzmann Transport Equation for the transport of neutrons and photons. The technique efficiently solves the discrete ordinates equations with a new iteration scheme. I call this new scheme the angle space distribution iteration method because it combines a non-linear, high angular-resolution flux approximation within individual spatial cells with a coarse angular-resolution flux approximation that couples all cells in a spatial mesh. This shown to be an efficient alternative to source iteration. The new method is implemented using the step characteristic and exponential characteristic spatial quadrature schemes. The latter was introduced …


Modeling A Field Application Of In Situ Bioremediation Of Perchlorate-Contaminated Groundwater Using Horizontal Flow Treatment Wells (Hftws), Peter G. Chosa Mar 2004

Modeling A Field Application Of In Situ Bioremediation Of Perchlorate-Contaminated Groundwater Using Horizontal Flow Treatment Wells (Hftws), Peter G. Chosa

Theses and Dissertations

Perchlorate contaminated groundwater is rapidly becoming a significant environmental remediation issue for the Department of Defense. In this study, an existing numerical model that simulates the operation of a Horizontal Flow Treatment Well (HFTW) system to effect the in situ biodegradation of perchlorate through the addition of an electron donor is modified to include a submodel that describes bioclogging. Bioclogging restricts flow out of the HFTW due to the accumulation of biomass directly adjacent to the well. The modified model is then applied to an existing perchlorate contaminated site that will be used for an evaluation of the HFTW technology. …


An Evaluation Of Vegetated Roofing Technology: Application At Air Force Plant Four, Building 15, Benjamin J. Morgan Mar 2004

An Evaluation Of Vegetated Roofing Technology: Application At Air Force Plant Four, Building 15, Benjamin J. Morgan

Theses and Dissertations

The United States Air Force maintains thousands of facilities around the world. Many of these facilities have asphalt built up roofs or some other less than sustainable roofing system. In an effort to find roofing systems suitable for Air Force facilities that are both economically and environmentally friendly, this thesis investigated vegetated roofing as a possible alternative to conventional roofing systems. While vegetated roofs are a relatively new roofing system, they exhibit performance qualities that seem to be in line with Air Force needs. An investigation into the feasibility of vegetated roofing technology revealed that this roofing system has many …


Application Of Horizontal Flow Treatment Wells For In Situ Treatment Of Mtbe-Contaminated Groundwater, Preston F. Rufe Mar 2004

Application Of Horizontal Flow Treatment Wells For In Situ Treatment Of Mtbe-Contaminated Groundwater, Preston F. Rufe

Theses and Dissertations

This study utilized a three-dimensional numerical model to evaluate the potential application of HFTWs to manage MTBE-contaminated groundwater. HFTWs consist of two dual-screened treatment wells. One well operates in an upflow mode, with MTBE-contaminated water extracted from an aquifer through a screen in the deep portion of an aquifer and injected into the aquifer through a shallow well screen, while the adjacent well operates in a downflow mode, extracting water from the shallow zone of the aquifer and injecting it into the deep zone. As the MTBE-contaminated water flows through the wells, an electron acceptor and/or another electron donor is …


Investigation Of Geobase Implementation Issues: Case Study Of Information Resource Management, Mario L. Oliver Mar 2004

Investigation Of Geobase Implementation Issues: Case Study Of Information Resource Management, Mario L. Oliver

Theses and Dissertations

Billions of dollars have been wasted on failed information system (IS) projects over the last decade in the private and public sectors. More specifically, the tri-service environment of the U.S. military has not implemented a single successful geospatial IS (GIS). The lack of a service-wide insertion process for GIS was cited as the most significant cause for military GIS failures. GeoBase represents the USAF's most recent GIS implementation. The GeoBase program focuses on Information Resource Management (IRM) and cultural issues. The GeoBase Sustainment Model (GSM), anecdotally developed by GeoBase leadership to reflect implementation issues and the IRM practices of the …


Automated Agent Ontology Creation For Distributed Databases, Austin A. Bartolo Mar 2004

Automated Agent Ontology Creation For Distributed Databases, Austin A. Bartolo

Theses and Dissertations

In distributed database environments, the combination of resources from multiple sources requiring different interfaces is a universal problem. The current solution requires an expert to generate an ontology, or mapping, which contains all interconnections between the various fields in the databases. This research proposes the application of software agents in automating the ontology creation for distributed database environments with minimal communication. The automatic creation of a domain ontology alleviates the need for experts to manually map one database to other databases in the environment. Using several combined comparison methods, these agents communicate and negotiate similarities between information sources and retain …


An Analysis Of The Performance And Security Of J2sdk 1.4 Jsse Implementation Of Ssl/Tls, Danny R. Bias Mar 2004

An Analysis Of The Performance And Security Of J2sdk 1.4 Jsse Implementation Of Ssl/Tls, Danny R. Bias

Theses and Dissertations

The Java SSL/TLS package distributed with the J2SE 1.4.2 runtime is a Java implementation of the SSLv3 and TLSv1 protocols. Java-based web services and other systems deployed by the DoD will depend on this implementation to provide confidentiality, integrity, and authentication. Security and performance assessment of this implementation is critical given the proliferation of web services within DoD channels. This research assessed the performance of the J2SE 1.4.2 SSL and TLS implementations, paying particular attention to identifying performance limitations given a very secure configuration. The performance metrics of this research were CPU utilization, network bandwidth, memory, and maximum number of …


Netwars Based Study Of A Joint Stars Link-16 Network, Charlie I. Cruz Mar 2004

Netwars Based Study Of A Joint Stars Link-16 Network, Charlie I. Cruz

Theses and Dissertations

Both secure and anti-jam resistant, the Link-16 is the primary communications channel used by the Joint Surveillance Target Attack Radar System (Joint STARS) for the exchange of real-time tactical data among various ground, air, and sea platforms of the United States of America and North Atlantic Treaty Organization forces. This research explored the effect of increasing network traffic for imagery transfer to the mean delay when operating under different network topologies. Using Network Warfare Simulation (NETWARS), three different missions were simulated to run on five network topologies having a different number of participants, different assigned time slots, and stacked nets. …


Software Development Outsourcing Decision Support Tool With Neural Network Learning, James D. Newberry Mar 2004

Software Development Outsourcing Decision Support Tool With Neural Network Learning, James D. Newberry

Theses and Dissertations

The Air Force (AF) needs an evolving software tool for guiding decision makers through the complexities of software outsourcing. Previous research identified specific outsourcing strategies and linked them to goals and consequences through a variety of relationship rules. These strategies and relationship rules were inserted into a decision support tool. Since that time, more historical data and outsourcing literature has been collected thus necessitating an update to such a tool. As the number of software outsourcing projects are completed, the AF must capture the outsourcing decision experiences which guided the projects and their outcomes. In order to efficiently incorporate this …


An Evaluation Of Formate As An Electron Donor To Facilitate Palladium (Pd) - Catalyzed Destruction Of Chlorinated Aliphatic Hydrocarbons, Matthew D. Welling Mar 2004

An Evaluation Of Formate As An Electron Donor To Facilitate Palladium (Pd) - Catalyzed Destruction Of Chlorinated Aliphatic Hydrocarbons, Matthew D. Welling

Theses and Dissertations

Chlorinated aliphatic hydrocarbons (CAHs) such as trichloroethylene (TCE), tetrachloroethylene (PCE), and trichloroethane (TCA) are probable human carcinogens that have been used widely within the DoD, primarily as solvents for cleaning and metal degreasing. These compounds are frequently found to be groundwater contaminants. In fact, TCE and PCE are the first and third most commonly detected groundwater contaminants nationwide. The focus of this study was to determine the effectiveness of using a palladium (Pd) catalyst with formate as a reductant to treat CAH-contaminated groundwater. TCE was used as a model CAH. Other investigators have focused on hydrogen gas (H2) …


Machine Learning Techniques For Characterizing Ieee 802.11b Encrypted Data Streams, Michael J. Henson Mar 2004

Machine Learning Techniques For Characterizing Ieee 802.11b Encrypted Data Streams, Michael J. Henson

Theses and Dissertations

As wireless networks become an increasingly common part of the infrastructure in industrialized nations, the vulnerabilities of this technology need to be evaluated. Even though there have been major advancements in encryption technology, security protocols and packet header obfuscation techniques, other distinguishing characteristics do exist in wireless network traffic. These characteristics include packet size, signal strength, channel utilization and others. Using these characteristics, windows of size 11, 31, and 51 packets are collected and machine learning (ML) techniques are trained to classify applications accessing the 802.11b wireless channel. The four applications used for this study included E-Mail, FTP, HTTP, and …


Packet Analysis Of Unmodified Bluetooth Communication Devices, Neal A. Watts Mar 2004

Packet Analysis Of Unmodified Bluetooth Communication Devices, Neal A. Watts

Theses and Dissertations

Bluetooth technology has potential for widespread use within the Department of Defense and the Air Force. An office environment using Bluetooth technology can wirelessly connect computers, printers, and other office equipment in order to share information over short distances. The clutter and annoyance of cables connecting equipment can be eliminated. Bluetooth provides a standard interface for connection, as opposed to many different proprietary cables. The research is conducted indoors in a climate controlled environment, with minimal obstructions, to closely follow free-space signal propagation. Four different antenna orientations are used. The factors varied are the distance between devices, and the antenna …


Agent Based Simulation Seas Evaluation Of Dodaf Architecture, Gregory V. Destefano Mar 2004

Agent Based Simulation Seas Evaluation Of Dodaf Architecture, Gregory V. Destefano

Theses and Dissertations

With Department of Defense (DoD) weapon systems being deeply rooted in the command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) structure, it is necessary for combat models to capture C4ISR effects in order to properly assess military worth. Unlike many DoD legacy combat models, the agent based model System Effectiveness and Analysis Simulation (SEAS) is identified as having C4ISR analysis capabilities. In lieu of requirements for all new DoD C4ISR weapon systems to be placed within a DoD Architectural Framework (DoDAF), investigation of means to export data from the Framework to the combat model SEAS began. Through operational, system, …


Characterization Of Chlorinated Solvent Degradation Profile Due To Microbial And Chemical Processes In A Constructed Wetland, Teresa A. Sobolewski Mar 2004

Characterization Of Chlorinated Solvent Degradation Profile Due To Microbial And Chemical Processes In A Constructed Wetland, Teresa A. Sobolewski

Theses and Dissertations

Perchloroethene (PCE) and its degradation products are among the most common organic groundwater contaminants in the United States. Constructed wetlands are a relatively new approach to dealing with this contamination problem. With their upward flow capability it is possible to introduce an aerobic and anaerobic environment with a consortium of microorganisms available to degrade the contaminants to within acceptable levels established by the Environmental Protection Agency (EPA). This study is a follow-up to the previous two years of research on PCE degradation in cell 1 at Wright-Patterson Air Force Base. This thesis was conducted in order to study the wetland …


Making The Business Case For Sustainable Design In The Department Of Defense, David M. Warnke Mar 2004

Making The Business Case For Sustainable Design In The Department Of Defense, David M. Warnke

Theses and Dissertations

Buildings are one of the largest consumers of natural resources, a major source of ecological pollution, and occasionally toxic to human health. Sustainable design is the common term associated with buildings which, during their construction, use, and eventual disposal, seek to minimize their negative impact on the environment and human health. The U.S. Green Building Council's Leadership in Energy and Environmental Design (LEED) rating system helps to assess a building's sustainability level. In the Federal Government's push to set the example for the rest of the nation, nearly every Federal Agency has chosen to adopt the LEED assessment tool. Each …


An Analysis Of Coast Guard Hh-65 Engine Reliability: A Comparison Of Malfunctions To Component Removals, Donna L. Cottrell Mar 2004

An Analysis Of Coast Guard Hh-65 Engine Reliability: A Comparison Of Malfunctions To Component Removals, Donna L. Cottrell

Theses and Dissertations

The Coast Guard HH-65 helicopter experienced 31 in-flight loss of power incidents during FY 2003 and 21 during the first two months of FY 2003. Concurrent with this apparent decrease in reliability, the Coast Guard seeks ways to expand the HH- 65’s Airborne Use of Force capabilities as a result of the September 11th, 2001 terrorists’ attacks. This study is an exploratory, empirical analysis of engine and airframe component replacements as related to engine mishaps and reliability in the HH-65. We use contingency table analysis, ordinary least squares regression, and logistic regression to examine the mishap history and component replacement …


Characterization Of Microbial Processes That Degrade Chlorinated Solvents In A Constructed Wetland Using Organic Acid And Inorganic Anion Concentration Profiles, Chad B. Bondurant Mar 2004

Characterization Of Microbial Processes That Degrade Chlorinated Solvents In A Constructed Wetland Using Organic Acid And Inorganic Anion Concentration Profiles, Chad B. Bondurant

Theses and Dissertations

Chlorinated solvents have been used in industrial cleaning and degreasing processes in the United States since the early 1900s, and their induction into the environment increased significantly with the growth of industrial processes over the past century. PCE, TCE and their daughter products have been associated with a number of human health concerns and are currently the most common contaminants found in groundwater in the United States. Wetlands possess characteristics necessary for the complete degradation of chlorinated ethenes by microorganisms via anaerobic and aerobic regions that foster the necessary oxidation-reduction conditions. Organic acid and inorganic anion concentrations were evaluated in …


Visual Debugging Of Object-Oriented Systems With The Unified Modeling Language, Wendell E. Fox Mar 2004

Visual Debugging Of Object-Oriented Systems With The Unified Modeling Language, Wendell E. Fox

Theses and Dissertations

The Department of Defense (DoD) is developing a Joint Battlespace Infosphere, linking a large number of data sources and user applications. Debugging and analysis tools are required to aid in this process. Debugging of large object-oriented systems is a difficult cognitive process that requires understanding of both the overall and detailed behavior of the application. In addition, many such applications linked through a distributed system add to this complexity. Standard debuggers do not utilize visualization techniques, focusing mainly on information extracted directly from the source code. To overcome this deficiency, this research designs and implements a methodology that enables developers …


Concurrent Cognitive Mapping And Localization Using Expectation Maximization, Kennard R. Laviers Mar 2004

Concurrent Cognitive Mapping And Localization Using Expectation Maximization, Kennard R. Laviers

Theses and Dissertations

Robot mapping remains one of the most challenging problems in robot programming. Most successful methods use some form of occupancy grid for representing a mapped region. An occupancy grid is a two dimensional array in which the array cells represents (x,y) coordinates of a cartesian map. This approach becomes problematic in mapping large environments as the map quickly becomes too large for processing and storage. Rather than storing the map as an occupancy grid, our robot (equipped with ultrasonic sonars) views the world as a series of connected spaces. These spaces are initially mapped as an occupancy grid in a …


Generalized Residual Multiple Model Adaptive Estimation Of Parameters And States, Charles D. Ormsby Oct 2003

Generalized Residual Multiple Model Adaptive Estimation Of Parameters And States, Charles D. Ormsby

Theses and Dissertations

This dissertation develops a modification to the standard Multiple Model Adaptive Estimator (MMAE) which allows the use of a new "generalized residual" in the hypothesis conditional probability calculation. The generalized residual is a linear combination of traditional Kalman filter residuals and "post-fit" Kalman filter residuals which are calculated after measurement incorporation. This modified MMAE is termed a Generalized Residual Multiple Model Adaptive Estimator (GRMMAE). The dissertation provides a derivation of the hypothesis conditional probability formula which the GRMMAE uses to calculate probabilities that each elemental filter in the GRMMAE contains the correct parameter value. Through appropriate choice of a single …


Broadening And Shifting Of Atomic Strontium And Diatomic Bismuth Spectral Lines, Jeremy C. Holtgrave May 2003

Broadening And Shifting Of Atomic Strontium And Diatomic Bismuth Spectral Lines, Jeremy C. Holtgrave

Theses and Dissertations

The objective of this research is to study the effects of noble gases on atomic strontium and diatomic bismuth visible transitions, Specifically, this research seeks to determine if the line broadening and, in the case of atomic strontium, line shifting rates of these transitions in the presence of noble gases depend on the total angular momenta of the energy states involved. It has been known for more than a century that atomic and molecular spectral lines are broadened and shifted by perturbing species. While a considerable body of theoretical work has been accomplished on this topic over the years, only …


Characterization Of Chlorinated Solvent Degradation In A Constructed Wetland, Nathan D. Clemmer Mar 2003

Characterization Of Chlorinated Solvent Degradation In A Constructed Wetland, Nathan D. Clemmer

Theses and Dissertations

Widespread chlorinated ethene contamination of aquifers coupled with high costs of current treatment technologies demand innovative remediation solutions. Wetlands, maintaining anaerobic and aerobic zones promoting the complete degradation of chlorinated ethenes such as Tetrachloroethylene (PCE), could be the answer. This thesis characterized the chlorinated solvent contamination levels in three strata of an upward flow constructed wetland. Analysis of samples was accomplished by purge-and-trap gas chromatography. Water quality parameters, Dissolved Oxygen (DO), Oxidation Reduction Potential (ORP), pH, Conductivity, and Temperature, were also measured in monitoring wells with a water monitoring sonde. After removing data outliers caused by short-circuiting flow, PCE concentrations …


Spacecraft Charging At Geosynchronous Altitudes: Current Balance And Critical Temperature In A Non-Maxwellian Plasma, Jose T. Harris Mar 2003

Spacecraft Charging At Geosynchronous Altitudes: Current Balance And Critical Temperature In A Non-Maxwellian Plasma, Jose T. Harris

Theses and Dissertations

Spacecraft charging threatens to disable spacecraft components and adversely impact any satellite function. Electrostatic charge, and especially discharge, can hinder the proper operation of, or destroy, spacecraft components, thereby rendering the spacecraft ineffective or inoperative. The level of charging is dependent on the particle energy (speed) distribution. Current spacecraft design and material provide limited protection against the dangers of electrostatic discharge, and active measures such as beam emission are also employed.


Transient Analysis And Applications Of Markov Reward Processes, Jeffrey A. Sipe Mar 2003

Transient Analysis And Applications Of Markov Reward Processes, Jeffrey A. Sipe

Theses and Dissertations

In this thesis, the problem of computing the cumulative distribution function (cdf) of the random time required for a system to first reach a specified reward threshold when the rate at which the reward accrues is controlled by a continuous time stochastic process is considered. This random time is a type of first passage time for the cumulative reward process. The major contribution of this work is a simplified, analytical expression for the Laplace-Stieltjes Transform of the cdf in one dimension rather than two. The result is obtained using two techniques: i) by converting an existing partial differential equation to …


Implementing An Information Retrieval And Visualization Framework For Heterogeneous Data Types, Andrew J. Kowalchuk Mar 2003

Implementing An Information Retrieval And Visualization Framework For Heterogeneous Data Types, Andrew J. Kowalchuk

Theses and Dissertations

In today's information focused world, there is no lack of entities focused on information gathering. However, there is still a widespread epidemic of information starvation in the Department of Defense (DoD). This starvation is attributed to the lack of interoperability between information gatherers and information consumers. To alleviate this problem, the DoD has put forth a vision of a Joint Battlespace Infosphere (JBI). This research proposes a framework for sharing and finding resources in a JBI. The framework uses an extensible metadata specification, agent technology, and the Control of Agent Based Systems (CoABS). It provides several tools for publication and …


Using Sequence Analysis To Perform Application-Based Anomaly Detection Within An Artificial Immune System Framework, Larissa A. O'Brien Mar 2003

Using Sequence Analysis To Perform Application-Based Anomaly Detection Within An Artificial Immune System Framework, Larissa A. O'Brien

Theses and Dissertations

The Air Force and other Department of Defense (DoD) computer systems typically rely on traditional signature-based network IDSs to detect various types of attempted or successful attacks. Signature-based methods are limited to detecting known attacks or similar variants; anomaly-based systems, by contrast, alert on behaviors previously unseen. The development of an effective anomaly-detecting, application based IDS would increase the Air Force's ability to ward off attacks that are not detected by signature-based network IDSs, thus strengthening the layered defenses necessary to acquire and maintain safe, secure communication capability. This system follows the Artificial Immune System (AIS) framework, which relies on …