Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1891 - 1920 of 2678

Full-Text Articles in Physical Sciences and Mathematics

Analysis Of Cloud-To-Ground Lightning Clusters With Radar Composite Imagery, Rhonda B. Scott Mar 2001

Analysis Of Cloud-To-Ground Lightning Clusters With Radar Composite Imagery, Rhonda B. Scott

Theses and Dissertations

The most recent research conducted at the Air Force Institute of Technology involved studying a large volume of lightning data without coupling radar imagery (Parsons 2000). Parsons finding could not be acted on because no individual storms were studied. The primary goal of this research is to determine whether the techniques used by Parsons can be applied to storms by examining the radar imagery and lightning data. This research used the methodology applied to lightning data by Parsons and radar imagery to determine whether the location of lightning clusters were located near storms. A composite reflectivity radar image was generated …


The Effect Of Contextual-Based Training On Artifact-Based Deception Detection, Elizabeth A. Autrey Mar 2001

The Effect Of Contextual-Based Training On Artifact-Based Deception Detection, Elizabeth A. Autrey

Theses and Dissertations

Air Force dependence on information technology (IT) creates vulnerabilities that it cannot ignore. With global availability of commercial IT and the Internet, the Air Force does not necessarily have the high technological advantage over potential adversaries that it once had. Furthermore, it is possible to directly and covertly manipulate information within information systems, or artifacts, without notice. This directly affects decision makers since the availability and integrity of information is critical. Air Force physical and network security measures taken to protect its information do not guarantee detection of direct information manipulation. This leaves it to information artifact users to detect …


Photoluminescence Of Single Quantum Well Structures In Gallium Arsenide, Christian A. Bartholomew Mar 2001

Photoluminescence Of Single Quantum Well Structures In Gallium Arsenide, Christian A. Bartholomew

Theses and Dissertations

The continued development of state-of the-art semiconductor technologies and devices by the United States Air Force and the Department of Defense requires accurate and efficient techniques to evaluate and model these new materials. Of particular interest to the Air Force are quantum well structures which can be used for small-scale laser sources in fly-by-light applications, as efficient infrared countermeasures to heat-seeking missiles, or as advanced seekers in optically guided missiles. This thesis provides the initial experimental procedures and data necessary to begin producing accurate yet robust models. Although carrier effective masses could not be evaluated using hot-electron photoluminescence, photoluminescence excitation …


A Semantic Interface To Scenario Component Reuse In Dod Simulation Systems, Lawrence A. Breighner Mar 2001

A Semantic Interface To Scenario Component Reuse In Dod Simulation Systems, Lawrence A. Breighner

Theses and Dissertations

The Department of Defense utilizes various simulation systems to model employment of forces and weapons systems in operational environments. The data files that model these environments and weapons systems are extremely large and complex, and require many person-hours to develop. Compounding the problem, these data files are distributed across multiple systems in a heterogeneous environment. Currently, there is no automated means of identifying and retrieving reusable portions of these files for reuse in a new scenario under development. This work develops a multi-agent system that catalogs the files, and provides the user with a means of identifying and retrieving reusable …


Optimization Of Palladium-Catalyzed In Situ Destruction Of Trichloroethylene-Contaminated Groundwater Using A Genetic Algorithm, Manuel Fernandez Mar 2001

Optimization Of Palladium-Catalyzed In Situ Destruction Of Trichloroethylene-Contaminated Groundwater Using A Genetic Algorithm, Manuel Fernandez

Theses and Dissertations

Conventional technologies for the treatment of groundwater contaminated with chlorinated solvents have limitations that have motivated development of innovative technologies. One such technology currently under development involves using palladium-on-alumina (Pd/Al) as a catalyst to promote dechlorination. Pd/Al catalyst may be used in-well as part of a re-circulating horizontal flow treatment well (HFTW) system. An HFTW system involves two or more dual-screened wells, with in-well reactors, to capture and treat contaminated groundwater without the need to pump the water to the surface. In this study, objective and fitness functions, based on system costs and TCE concentration requirements, were developed to optimize …


Control And Characterization Of Line-Addressable Micromirror Arrays, Harris J. Hall Mar 2001

Control And Characterization Of Line-Addressable Micromirror Arrays, Harris J. Hall

Theses and Dissertations

This research involved the design and implementation of a complete line-addressable control system for a 32x32 electrostatic piston-actuated micromirror array device. Line addressing reduces the number of control lines from N2 to 2N making it possible to design larger arrays and arrays with smaller element sizes. The system utilizes the electromechanical bi-stability of individual elements to bold arbitrary bi-stable phase patterns. The control system applies pulse width modulated (PWM) signals to the rows and columns of the micromirror array. Three modes of operation were conceived and built into the system. The first was the traditional signal scheme which requires …


A Traffic Pattern-Based Comparison Of Bulk Image Request Response Times For A Virtual Distributed Laboratory, David B. Hooten Mar 2001

A Traffic Pattern-Based Comparison Of Bulk Image Request Response Times For A Virtual Distributed Laboratory, David B. Hooten

Theses and Dissertations

Various agencies throughout the Department of Defense possess intelligence imagery and electrooptical signature data required by researchers in the field of automatic target recognition (ATR). The Air Force Research Laboratory, Sensors Directorate, as been tasked with creating a virtual distributed laboratory (VDL) which will make this data available to ATR researchers via high speed networks such as the defense research and engineering network (DREN). For this research, a model for simulating potential operational network configurations and collaboration scenarios was developed and implemented using OPNET. The results of the simulations were analyzed using statistical methods to determine the impact on performance …


Validation And Characterization Of Ionospheric Densities Measured By Dmsp, Herbert L. Keyser Mar 2001

Validation And Characterization Of Ionospheric Densities Measured By Dmsp, Herbert L. Keyser

Theses and Dissertations

Future models of the thermosphere-ionosphere-magnetosphere system will require near real-time assimilation of ionospheric parameters to specify% and forecast these regions One of the current sensors that will be used in the GAIM model is the DMSP SSIES. Knowledge of the SSIES's reliability and data characteristics is key to using the data when relying on automated processes to ingest the data. To validate the DMSP value, the DMSP-measured density is compared to ground-based ISR measurements from solar minimum to solar maximum. The DMSP data are compared to data from the ISRs located at the Millstone Hill Observatory in Massachusetts and Sondrestrom …


Selecting A Software Engineering Methodology Using Multiobjective Decision Analysis, Scott A. O'Malley Mar 2001

Selecting A Software Engineering Methodology Using Multiobjective Decision Analysis, Scott A. O'Malley

Theses and Dissertations

With the emergence of agent-oriented software engineering methodologies, software developers have a new set of tools to solve complex software requirements. One problem software developers face is to determine which methodology is the best approach to take to developing a solution. A number of factors go into the decision process. This thesis defines a decision making process that can be used by a software engineer to determine whether or not a software engineering approach is an appropriate system development strategy. This decision analysis process allows the software engineer to classify and evaluate a set of methodologies while specifically considering the …


Using A Distributed Object-Oriented Database Management System In Support Of A High-Speed Network Intrusion Detection System Data Repository, Phillip W. Polk Mar 2001

Using A Distributed Object-Oriented Database Management System In Support Of A High-Speed Network Intrusion Detection System Data Repository, Phillip W. Polk

Theses and Dissertations

The Air Force has multiple initiatives to develop data repositories for high-speed network intrusion detection systems (IDS). All of the developed systems utilize a relational database management system (RDBMS) as the primary data storage mechanism. The purpose of this thesis is to replace the RDBMS in one such system developed by AFRL, the Automated Intrusion Detection Environment (AIDE), with a distributed object-oriented database management system (DOODBMS) and observe a number of areas: its performance against the RDBMS in terms of IDS event insertion and retrieval, the distributed aspects of the new system, and the resulting object-oriented architecture. The resulting system, …


Determining The Value Of Groundwater Contamination Source Removal: A Methodology, Benjamin C. Recker Mar 2001

Determining The Value Of Groundwater Contamination Source Removal: A Methodology, Benjamin C. Recker

Theses and Dissertations

Subsurface contamination by industrial chemicals is one of the most prevalent and costly environmental problems facing the United States government. This contamination problem must be managed to protect human health and the environment. Two basic strategies are used to deal with subsurface contamination: source removal and contaminant containment. While much cost and performance data are available for individual technologies associated with each of these strategies, there have been very few studies that have examined the benefits of implementing source removal technologies in order to reduce contaminant containment (and hopefully total) costs. This study examines the tradeoff between extent of source …


Effects On The Red-Cockaded Woodpecker From Various Spatial And Temporal Applications Of Management Practices, Chad F. Schroeder Mar 2001

Effects On The Red-Cockaded Woodpecker From Various Spatial And Temporal Applications Of Management Practices, Chad F. Schroeder

Theses and Dissertations

The Red-Cockaded Woodpecker (RCW) is an endangered species endemic to southeastern pine forests in the United States. RCWs are cooperative breeding birds that live together in clusters of old-growth pine trees in which they construct their nesting cavities. The cavities are constructed in living pines, which are predominantly longleaf pines. RCWs also forage upon older pines, preferably longleaf pine. The Endangered Species Act, along with other DoD regulations, requires DoD installations to protect the RCWs and restore their habitat. A popular management practice converts off-site (non-native) pines back to a region's indigenous pines. Conversion provides the best long term RCW …


Transforming Analysis Models Into Design Models For The Multiagent Engineering Systems (Mase) Methodology, Clint H. Sparkman Mar 2001

Transforming Analysis Models Into Design Models For The Multiagent Engineering Systems (Mase) Methodology, Clint H. Sparkman

Theses and Dissertations

Agent technology has received much attention in the last few years because of the advantages that multiagent systems have in complex, distributed environments. For multiagent systems are to be effective, they must be reliable, robust, and secure. AFIT's Agent Research Group has developed a complete lifecycle methodology, called Multiagent Systems Engineering (MaSE), for analyzing, designing, and developing heterogeneous multiagent systems. However, developing multiagent systems is a complicated process, and there is no guarantee that the resulting system meets the initial requirements and will operate reliably with the desired behavior. The purpose of this research was to develop a semi-automated formal …


The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait Mar 2001

The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait

Theses and Dissertations

Information warfare (IW) has developed into a significant threat to the national security of the United States. Our critical infrastructures, linked together by information systems, are increasingly vulnerable to information attack. This study seeks to understand some of those factors which affect the ability of an individual to make accurate decisions in an IW environment. The study used game theory to analyze the behavior of decision-makers within an IW simulation. The IW game model is based on a set of games known as infinitely repeated games of incomplete information. It uses the Bayesian Nash equilibrium concept to determine the strategy …


Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas Mar 2001

Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas

Theses and Dissertations

With the rise of mobile computing and an increasing need for ubiquitous high speed data connections, Internet-in-the-sky solutions are becoming increasingly viable. To reduce the network overhead of one-to-many transmissions, the multicast protocol has been devised. The implementation of multicast in these Low Earth Orbit (LEO) constellations is a critical component to achieving an omnipresent network environment. This research examines the system performance associated with two terrestrial-based multicast mobility solutions, Distance Vector Multicast Routing Protocol (DVMRP) with mobile IP and On Demand Multicast Routing Protocol (ODMRP). These protocols are implemented and simulated in a six plane, 66 satellite LEO constellation. …


Atmospheric Conditions Associated With Lightning During Snow And Ice Events, Randall J. Haeberle Mar 2001

Atmospheric Conditions Associated With Lightning During Snow And Ice Events, Randall J. Haeberle

Theses and Dissertations

The purpose of this research was to find the atmospheric mechanisms associated with lightning in snow and ice events. The specific mechanisms that were examined were low-level wind shear, upper level divergence, surface temperature, low-level temperature, the -10 ° C level, and precipitable water. A chi-squared dependency test showed the strong association of low-level wind shear to each precipitation type (snow, sleet/freezing rain, rain) in two separate studies. Surface temperature appeared to have a relationship to lightning in all precipitation categories, while no significant relationship to lightning in all precipitation categories, while no significant relationship was found with upper level …


Simulating Wet Deposition Of Radiocesium From The Chernobyl Accident, Aaron M. Kinser Mar 2001

Simulating Wet Deposition Of Radiocesium From The Chernobyl Accident, Aaron M. Kinser

Theses and Dissertations

In response to the Chernobyl nuclear power plant accident of 1986, a cesium-137 deposition dataset was assembled. Most of the airborne Chernobyl cesium was wet deposited, either via interception by falling raindrops or via absorption into cloud droplets destined to become raindrops. The Hybrid Single-Particle Lagrangian rated Transport (HYSPLIT) model, developed at Air Resources Laboratory, is used to simulate the transport and deposition of Chernobyl cesium-137. A cloud base parameterization modification is tested and appears to slightly improve the accuracy of one HYSPLIT simulation of daily Chernobyl cesium-137 deposition over the course of the accident at isolated European sites, and …


Attenuation And Refraction Of An Electromagnetic Wave In An Electron Beam Generated Plasma, Nathaniel P. Lockwood Mar 2001

Attenuation And Refraction Of An Electromagnetic Wave In An Electron Beam Generated Plasma, Nathaniel P. Lockwood

Theses and Dissertations

Artificially generated plasmas may be employed to alter the propagation characteristics of electromagnetic waves. The purpose of this report is to study the propagation of electromagnetic waves in an electron beam generated plasma. To understand the physics related to this concept requires the development of computational tools dealing with a plasma created by an electron beam, an assessment of the temporal and spatial evolution of the plasma, and a characterization of the refraction and attenuation of electromagnetic (EM) waves in a collisional plasma. Three computer programs were developed to characterize the effectiveness of an electron beam generated plasma in refracting …


Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson Mar 2001

Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson

Theses and Dissertations

Group Support System (355) research has found this content and process anonymity influence problem solving groups. However, previous studies report mixed results on how OSS technology changes social influence processes and recognition of expertise which affect group performance. This thesis explored content and process anonymity's affect on influence and perceived expertise using three treatments to derive possible explanations for the mixed results found in previous GSS research. The study developed a theoretical model of influence, perceived expertise, and performance. Using structural equation modeling the study tested the relationships between expertise and participation rates, and overall group performance. An experiment was …


An Objective Evaluation Of Four Sar Image Segmentation Algorithms, Jason B. Gregga Mar 2001

An Objective Evaluation Of Four Sar Image Segmentation Algorithms, Jason B. Gregga

Theses and Dissertations

Because of the large number of SAR images the Air Force generates and the dwindling number of available human analysts, automated methods must be developed. A key step towards automated SAR image analysis is image segmentation. There are many segmentation algorithms, but they have not been tested on a common set of images, and there are no standard test methods. This thesis evaluates four SAR image segmentation algorithms by running them on a common set of data and objectively comparing them to each other and to human segmentors. This objective comparison uses a multi-metric a approach with a set of …


A Low Power Application-Specific Integrated Circuit (Asic) Implementation Of Wavelet Transform/Inverse Transform, Daniel N. Harvala Mar 2001

A Low Power Application-Specific Integrated Circuit (Asic) Implementation Of Wavelet Transform/Inverse Transform, Daniel N. Harvala

Theses and Dissertations

A unique ASIC was designed implementing the Haar Wavelet transform for image compression/decompression. ASIC operations include performing the Haar wavelet transform on a 512 by 512 square pixel image, preparing the image for transmission by quantizing and thresholding the transformed data, and performing the inverse Haar wavelet transform, returning the original image with only minor degradation. The ASIC is based on an existing four-chip FPGA implementation. Implementing the design using a dedicated ASIC enhances the speed, decreases chip count to a single die, and uses significantly less power compared to the FPGA implementation. A reduction of RAM accesses was realized …


Use Of Quantum Mechanical Calculations To Investigate Small Silicon Carbide Clusters, Jean W. Henry Mar 2001

Use Of Quantum Mechanical Calculations To Investigate Small Silicon Carbide Clusters, Jean W. Henry

Theses and Dissertations

Density Functional Theory (DFT) method was employed to model silicon carbide small clusters. Comparing the DFT calculation results with experimental results that observed by using photoelectron spectroscopy (PES), DFT predicts the same structures that experiment observed. For electron affinity, DFT results are in good agreement with experimental results, the root mean square negative offset 0.1 eV found using medium size of basis set (cc-pVDZ+) calculation. DFT results for vibrational frequencies are in good agreement with experiment results; the root mean square error is 72.5 cm-1 wave number. 16 ground state structures of SimCn (m ≤ 4, …


The Affect Of Varying Arousal Methods Upon Vigilance And Error Detection In An Automated Command And Control Environment, Brent T. Langhals Mar 2001

The Affect Of Varying Arousal Methods Upon Vigilance And Error Detection In An Automated Command And Control Environment, Brent T. Langhals

Theses and Dissertations

This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack. The study suggests that by continuously applying arousal stimuli, subjects would retain initially high vigilance levels thereby avoiding the vigilance decrement phenomenon and improving error detection. The research focused on which methods were the most effective as well the impact of age upon the arousability of the subjects. Further the implications of vigilance and vigilance decrement for correct detections as well as productivity were explored. The study used a simulation experiment to provide a vigilance …


Solving The Protein Structure Prediction Problem With Fast Messy Genetic Algorithms (Scaling The Fast Messy Genetic Algorithm To Medium-Sized Peptides By Detecting Secondary Structures), Steven R. Michaud Mar 2001

Solving The Protein Structure Prediction Problem With Fast Messy Genetic Algorithms (Scaling The Fast Messy Genetic Algorithm To Medium-Sized Peptides By Detecting Secondary Structures), Steven R. Michaud

Theses and Dissertations

The ability to accurately predict a polypeptide's molecular structure given its amino acid sequence is important to numerous scientific, medical, and engineering applications. Studies have been conducted in the application of Genetic Algorithms (GAs) to this problem with promising initial results. In this thesis report, we use the fast messy Genetic Algorithm (fmGA) to attempt to find the minimization of an empirical CHARMM energy model and generation of the associated conformation. Previous work has shown that the fmGA provided favorable results, at least when applied to the pentapeptide Met-Enkephalin. We extend these results to a larger Polyalinine peptide by utilizing …


Software Domain Model Integration Methodology For Formal Specifications, Joel C. Nonnweiler Mar 2001

Software Domain Model Integration Methodology For Formal Specifications, Joel C. Nonnweiler

Theses and Dissertations

Using formal methods to create automatic code generation systems is one of the goals of Knowledge Based Software Engineering (KBSE) groups. The research of the Air Force Institute of Technology KBSE group has focused on the utilization of formal languages to represent domain model knowledge within this process. The code generation process centers around correctness preserving transformations that convert domain models from their analysis representations through design to the resulting implementation code. The diversity of the software systems that can be developed in this manner is limited only by the availability of suitable domain models. Therefore it should be possible …


Influence Of Anonymity In A Group Problem-Solving Environment, Robert A. Sylvester Mar 2001

Influence Of Anonymity In A Group Problem-Solving Environment, Robert A. Sylvester

Theses and Dissertations

A group support system (GSS) uses a combination of networked personal computers, software that collects, manipulates, and aggregates member's individual input, and human facilitation to improve the group decision-making process. Prior GSS research has found that content and process anonymity influence problem solving groups. However, previous studies report mixed results on which levels of anonymity positively influence group performance. This thesis looked at content and process anonymity using four treatments to explore possible explanations for the mixed results found in previous GSS research. The study examined numerous theories including anonymity, identification, social loafing, and social comparison. An experiment was developed …


Development Of Predictors For Cloud-To-Ground Lightning Activity Using Atmospheric Stability Indices, Kenneth C. Venzke Mar 2001

Development Of Predictors For Cloud-To-Ground Lightning Activity Using Atmospheric Stability Indices, Kenneth C. Venzke

Theses and Dissertations

A detailed examination was performed on several commonly applied atmospheric stability indices and lightning activity from 1993 to 2000 to determine the indices usefulness as predictive tools for determining cloud-to-ground lightning activity. Predetermined radii of 50 nautical miles around upper-air stations in the Midwest U.S. were used for the lightning summaries. Also explored is an improvement upon the commonly accepted thresholds of the stability indices as general thunderstorm indicators. An improvement was found and new threshold ranges were developed for relating stability index values to lightning occurrence. Traditional statistical regression methods failed to find a significant predictive relationship. By examining …


Quantitative Validation Of A Model Of Chlorinated Ethene Natural Attenuation, Harold C. Young Mar 2001

Quantitative Validation Of A Model Of Chlorinated Ethene Natural Attenuation, Harold C. Young

Theses and Dissertations

Chlorinated ethenes are among the most prevalent groundwater contaminants at hazardous waste sites nationwide. In an attempt to manage the risks posed by these contaminants, while controlling costs, monitored natural attenuation (MNA) is being considered as a remediation strategy at many sites. MNA relies on naturally occurring physical, chemical, and biological processes in the subsurface to reduce the risk posed by the contamination. The implementation of MNA, however, requires a detailed understanding of these processes, and how they impact contamination at a particular site. One way to gain this understanding is through contaminant fate and transport modeling. In this study, …


Analyzing The Effects Of Meteorology On Radar Measured Index Of Refraction Structure Parameter, Jeffrey W. Budai Mar 2001

Analyzing The Effects Of Meteorology On Radar Measured Index Of Refraction Structure Parameter, Jeffrey W. Budai

Theses and Dissertations

Forecasting optical turbulence is essential for the Air Force's Airborne Laser program to optimize placement of aircraft. To find bow meteorology affects Cn2, the intensity of turbulence in the index of refraction, case studies of synoptically interesting times are first chosen. Correlation coefficients are then computed between radar measured Cn2 and meteorological quantities. The potential for mechanically turbulent activity is looked at. In the analysis of this work, six meteorological features were found likely to affect Cn2. Two features associated with affecting potential refractivity, and thus Cn2, are jets …


Modeling Information Assurance, Joseph E. Beauregard Mar 2001

Modeling Information Assurance, Joseph E. Beauregard

Theses and Dissertations

The ever-increasing speed of information systems allows decision-makers around the world to gather, process, and disseminate information almost instantaneously. However, with this benefit there comes a price. Information is valuable and therefore a target to those who do not have it or wish to destroy it. The Internet has allowed information to flow freely, but it has also made information vulnerable to many forms of corruption. The U. S. military controls much of the world's most sensitive information, and since it cannot sacrifice losing the speed at which this information is currently processed and disseminated, it must find a way …