Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses and Dissertations

Discipline
Institution
Keyword
Publication Year
File Type

Articles 6301 - 6330 of 8341

Full-Text Articles in Physical Sciences and Mathematics

Locating Encrypted Data Hidden Among Non-Encrypted Data Using Statistical Tools, Walter J. Hayden Mar 2007

Locating Encrypted Data Hidden Among Non-Encrypted Data Using Statistical Tools, Walter J. Hayden

Theses and Dissertations

This research tests the security of software protection techniques that use encryption to protect code segments containing critical algorithm implementation to prevent reverse engineering. Using the National Institute of Standards and Technology (NIST) Tests for Randomness encrypted regions hidden among non-encrypted bits of a binary executable file are located. The location of ciphertext from four encryption algorithms (AES, DES, RSA, and TEA) and three block sizes (10, 100, and 500 32-bit words) were tested during the development of the techniques described in this research. The test files were generated from the Win32 binary executable file of Adobe's Acrobat Reader version …


Direct Diode Pumped Raman Amplifier Based On A Multimode Graded Index Fiberr, Charles James Baird Mar 2007

Direct Diode Pumped Raman Amplifier Based On A Multimode Graded Index Fiberr, Charles James Baird

Theses and Dissertations

The direct pumping of a Raman fiber amplifier (RFA) was attempted using an array of four 25W, fiber pigtailed diodes at 936nm, combined via a 7 channel fiber beam combiner. The initial attempt was conducted using a 1.8 km, 100 micron core, GRIN fiber with an NA of .29 and attenuation 3.6 dB/km at 936nm. While amplification was not achieved, over 200mW of conversion was shown, with 10.4W of pump power and 3.5W of seed. This corresponds to an average conversion efficiency of 2.2%. The subsequent effort utilized a 2km long, 200 micron core, GRIN fiber, with NA of .27 …


Multi-Dimensional Range Querying Using A Modification Of The Skip Graph, Gregory J. Brault Mar 2007

Multi-Dimensional Range Querying Using A Modification Of The Skip Graph, Gregory J. Brault

Theses and Dissertations

Skip graphs are an application layer-based distributed routing data structure that can be used in a sensor network to facilitate user queries of data collected by the sensor nodes. This research investigates the impact of a proposed modification to the skip graph proposed by Aspnes and Shah. Nodes contained in a standard skip graph are sorted by their key value into successively smaller groups based on random membership vectors computed locally at each node. The proposed modification inverts the node key and membership vector roles, where group membership is computed deterministically and node keys are computed randomly. Both skip graph …


Stylized Hatching For 3d Animation, Trent Fielding Crow Mar 2007

Stylized Hatching For 3d Animation, Trent Fielding Crow

Theses and Dissertations

Much research has been done in creating non-photorealistic renderings of objects that mimic the look of hand-made drawings by traditional artists. This thesis extends work in this area by presenting an NPR hatching method that can be applied to 3D animated films to help them feel more hand drawn. In contrast to most other NPR methods, this method preserves the 3D lighting and effects of the film that make it interesting to watch. This process includes a procedural algorithm to create a hatching pattern that can be easily integrated into any film's pipeline that uses Renderman. In addition, we create …


Heuristically Driven Search Methods For Topology Control In Directional Wireless Hybrid Network, Roger L. Garner Mar 2007

Heuristically Driven Search Methods For Topology Control In Directional Wireless Hybrid Network, Roger L. Garner

Theses and Dissertations

Information and Networked Communications play a vital role in the everyday operations of the United States Armed Forces. This research establishes a comparative analysis of the unique network characteristics and requirements introduced by the Topology Control Problem (also known as the Network Design Problem). Previous research has focused on the development of Mixed-Integer Linear Program (MILP) formulations, simple heuristics, and Genetic Algorithm (GA) strategies for solving this problem. Principal concerns with these techniques include runtime and solution quality. To reduce runtime, new strategies have been developed based on the concept of flow networks using the novel combination of three well-known …


An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm With Application To The Detection Of Distributed Computer Network Intrusions, Charles R. Haag Mar 2007

An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm With Application To The Detection Of Distributed Computer Network Intrusions, Charles R. Haag

Theses and Dissertations

Today's predominantly-employed signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus after a potentially successful attack, performing post-mortem analysis on that instance and encoding it into a signature that is stored in its anomaly database. The time required to perform these tasks provides a window of vulnerability to DoD computer systems. Further, because of the current maximum size of an Internet Protocol-based message, the database would have to be able to maintain 25665535 possible signature combinations. In order to tighten this response cycle within storage constraints, …


Corporate Entrepreneurship Assessment Instrument (Ceai): Refinement And Validation Of A Survey Measure, Michael S. Cates Mar 2007

Corporate Entrepreneurship Assessment Instrument (Ceai): Refinement And Validation Of A Survey Measure, Michael S. Cates

Theses and Dissertations

The study of corporate entrepreneurship has established itself as a valuable area of research for both public and private-sector organizations. The measurement instrument known as the Corporate Entrepreneurship Assessment Index (CEAI) has been designed to tap the climate-related organizational factors that represent and potentially encourage corporate entrepreneurship. This study is an attempt to refine the CEAI. The core constructs of the CEAI are redefined, the items are tested for content validity, the factor structure is analyzed, and the CEAI is correlated to other known measures to validate the CEAI. Through this testing, the CEAI was refined and found to be …


Graphical And Bayesian Analysis Of Unbalanced Patient Management Data, Emily Stewart Righter Mar 2007

Graphical And Bayesian Analysis Of Unbalanced Patient Management Data, Emily Stewart Righter

Theses and Dissertations

The International Normalizing Ratio (INR) measures the speed at which blood clots. Healthy people have an INR of about one. Some people are at greater risk of blood clots and their physician prescribes a target INR range, generally 2-3. The farther a patient is above or below their prescribed range, the more dangerous their situation. A variety of point-of-care (POC) devices has been developed to monitor patients. The purpose of this research was to develop innovative graphics to help describe a highly unbalanced dataset and to carry out Bayesian analyses to determine which of five devices best manages patients. An …


Surrogate Strategies For Computationally Expensive Optimization Problems With Cpu-Time Correlated Functions, Raymond Magallanez Jr. Mar 2007

Surrogate Strategies For Computationally Expensive Optimization Problems With Cpu-Time Correlated Functions, Raymond Magallanez Jr.

Theses and Dissertations

This research focuses on numerically solving a class of computationally expensive optimization problems that possesses a unique characteristic: as the optimal solution is approached, the computational time required to compute an objective function value decreases. This is motivated by an application in which each objective function evaluation requires both a numerical fluid dynamics simulation and an image registration and comparison process. The goal is to find the parameters of a predetermined image by comparing the flow dynamics from the numerical simulation and the predetermined image through the image comparison process. The generalized pattern search and mesh adaptive direct search methods …


Characterization Of Chlorinated Ethene Degradation In A Vertical Flow Constructed Wetland, James M. Waldron Mar 2007

Characterization Of Chlorinated Ethene Degradation In A Vertical Flow Constructed Wetland, James M. Waldron

Theses and Dissertations

Chlorinated solvents, including perchloroethene (PCE) and trichlorethene (TCE), are among the most common groundwater contaminants found in the United States. Once released into the environment, chlorinated solvents are extremely persistent and often require costly and lengthy remedial actions. The use of constructed wetlands has shown promise as an effective and less costly alternative for the treatment of chlorinated solvent contaminated groundwater. This study characterized and evaluated the concentration of chlorinated ethenes within a vertical flow constructed wetland, fed with PCE contaminated groundwater, at Wright-Patterson Air Force Base (WPAFB), Ohio. Chlorinated ethene concentrations were characterized within three distinct layers of the …


A Meta-Analysis Of Questionaire Response Rates In Military Samples, Michael R. Parrish Mar 2007

A Meta-Analysis Of Questionaire Response Rates In Military Samples, Michael R. Parrish

Theses and Dissertations

The purpose of this research was to examine if factors related to questionnaire response rate in the general public also affect response rate in military-only samples. Very little research pertaining to this specific group was located during the literature review. Four response rate factors taken from studies conducted in the general public were selected for this research topic: questionnaire length, questionnaire delivery mode (postal, e-mail, web-based, direct administration, and mixed mode), use of advance notices, and use of follow-up reminders. Data were gathered for a meta-analysis of 73 previously published studies which utilized a survey or questionnaire to collect data …


Unified Behavior Framework For Reactive Robot Control In Real-Time Systems, Brian G. Woolley Mar 2007

Unified Behavior Framework For Reactive Robot Control In Real-Time Systems, Brian G. Woolley

Theses and Dissertations

Endeavors in mobile robotics focus on developing autonomous vehicles that operate in dynamic and uncertain environments. By reducing the need for human-in- the-loop control, unmanned vehicles are utilized to achieve tasks considered dull or dangerous by humans. Because unexpected latency can adversely affect the quality of an autonomous system's operations, which in turn can affect lives and property in the real-world, their ability to detect and handle external events is paramount to providing safe and dependable operation. Behavior-based systems form the basis of autonomous control for many robots. This thesis presents the unified behavior framework, a new and novel approach …


Modeling, Simulation, And Estimation Of Optical Turbulence, Byron P. Formwalt Mar 2007

Modeling, Simulation, And Estimation Of Optical Turbulence, Byron P. Formwalt

Theses and Dissertations

This dissertation documents three new contributions to simulation and modeling of optical turbulence. The first contribution is the formalization, optimization, and validation of a modeling technique called successively conditioned rendering (SCR). The SCR technique is empirically validated by comparing the statistical error of random phase screens generated with the technique. The second contribution is the derivation of the covariance delineation theorem, which provides theoretical bounds on the error associated with SCR. It is shown empirically that the theoretical bound may be used to predict relative algorithm performance. Therefore, the covariance delineation theorem is a powerful tool for optimizing SCR algorithms. …


Using Value-Focused Thinking To Evaluate The Use Of Innovative Stormwater Management Technologies On Air Force Installations, Jeffrey T. Falcone Mar 2007

Using Value-Focused Thinking To Evaluate The Use Of Innovative Stormwater Management Technologies On Air Force Installations, Jeffrey T. Falcone

Theses and Dissertations

Stormwater runoff occurs naturally after every storm event; however, traditional development practices have created many impervious surfaces, such as buildings, parking lots, and streets that increase runoff volume and flow rate. Conventional stormwater management practices focus on collecting runoff into centralized channels and conveying it as quickly as possible to local bodies of water. This type of conveyance system decreases the opportunity for stormwater to naturally infiltrate back into the ground. It also prevents contaminants from being naturally filtered out of stormwater flows. As a result, centralized conveyance systems can cause flooding, erosion, and terrestrial and aquatic habitat degradation. Innovative …


Recommendations For A Standardized Program Management Office (Pmo) Time Compliance Network Order (Tcno) Patching Process, Michael Czumak Iii Mar 2007

Recommendations For A Standardized Program Management Office (Pmo) Time Compliance Network Order (Tcno) Patching Process, Michael Czumak Iii

Theses and Dissertations

Network security is a paramount concern for organizations utilizing computer technology, and the Air Force is no exception. Network software vulnerability patching is a critical determinant of network security. The Air Force deploys these patches as Time Compliance Network Orders (TCNOs), which together with associated processes and enforced timelines ensure network compliance. While the majority of the network assets affected by this process are Air Force owned and operated, a large number are maintained by external entities known as Program Management Offices (PMOs). Although these externally controlled systems provide a service to the Air Force and reside on its network, …


Microbial Degradation Of Fuel Oxygenates Under Aerobic Conditions, John M. Dietz Mar 2007

Microbial Degradation Of Fuel Oxygenates Under Aerobic Conditions, John M. Dietz

Theses and Dissertations

This research determined the rate and extent of aerobic biodegradation of fuel oxygenates ethyl tert butyl ether (ETBE), tert amyl methyl ether (TAME), and ethyl alcohol (ethanol). Biodegradation was measured using gas chromatography (GC), respirometry, and biochemical oxygen demand (BOD) tests. Additionally, the research determined the effects of toluene on degradation rates. This microcosm study used a microbial consortium obtained from a petroleum refinery wastewater treatment facility. Respirometry data were collected from chambers containing pure oxygenates, or oxygenate/toluene mixtures. Samples were withdrawn periodically for GC analysis. Aerobic conditions were maintained in the chambers at all times. The five-day BOD test …


Improved Hyperspectral Image Testing Using Synthetic Imagery And Factorial Designed Experiments, Joseph P. Bellucci Mar 2007

Improved Hyperspectral Image Testing Using Synthetic Imagery And Factorial Designed Experiments, Joseph P. Bellucci

Theses and Dissertations

The goal of any remote sensing system is to gather data about the geography it is imaging. In order to gain knowledge of the earth's landscape, post-processing algorithms are developed to extract information from the collected data. The algorithms can be intended to classify the various ground covers in a scene, identify specific targets of interest, or detect anomalies in an image. After the design of an algorithm comes the difficult task of testing and evaluating its performance. Traditionally, algorithms are tested using sets of extensively ground truthed test images. However, the lack of well characterized test data sets and …


Software Protection Against Reverse Engineering Tools, Joshua A. Benson Mar 2007

Software Protection Against Reverse Engineering Tools, Joshua A. Benson

Theses and Dissertations

Advances in technology have led to the use of simple to use automated debugging tools which can be extremely helpful in troubleshooting problems in code. However, a malicious attacker can use these same tools. Securely designing software and keeping it secure has become extremely difficult. These same easy to use debuggers can be used to bypass security built into software. While the detection of an altered executable file is possible, it is not as easy to prevent alteration in the first place. One way to prevent alteration is through code obfuscation or hiding the true function of software so as …


Towards The Development Of A Defensive Cyber Damage And Mission Impact Methodology, Larry W. Fortson Jr. Mar 2007

Towards The Development Of A Defensive Cyber Damage And Mission Impact Methodology, Larry W. Fortson Jr.

Theses and Dissertations

The purpose of this research is to establish a conceptual methodological framework that will facilitate effective cyber damage and mission impact assessment and reporting following a cyber-based information incidents. Joint and service guidance requires mission impact reporting, but current efforts to implement such reporting have proven ineffective. This research seeks to understand the impediments existing in the current implementation and to propose an improved methodology. The research employed a hybrid historical analysis and case study methodology for data collection through extensive literature review, examination of existing case study research and interviews with Air Force members and civilian personnel employed as …


Predicting Argentine Jet Fuel Prices, Juan A. Salaverry Mar 2007

Predicting Argentine Jet Fuel Prices, Juan A. Salaverry

Theses and Dissertations

Oil distillates are considered important elements to accomplish the missions of the Argentine Air Force (AAF). Of all oil products consumed by the AAF, jet fuel is the resource with highest demand and at the end of the day the most expensive support item procured by the Argentine Air Force. Accurate predictions of Argentine jet fuel prices are necessary to improve AAF financial and logistics planning. This thesis presents a systematic, statistical regression approach to forecast Argentine jet fuel prices. The application of this methodology has allowed us to obtain a very useful model that utilizes information available on the …


An Evaluation Of Organizational And Experience Factors Affecting The Perceived Transfer Of U.S. Air Force Basic Combat Skills Training, Shirley D. Crow Mar 2007

An Evaluation Of Organizational And Experience Factors Affecting The Perceived Transfer Of U.S. Air Force Basic Combat Skills Training, Shirley D. Crow

Theses and Dissertations

The United States Air Force is in a state of transformation. Due to ongoing operations in Iraq and Afghanistan, the focus of Basic Military Training is shifting to basic combat skills, or the skills needed to survive and operate in a hostile environment. In this study, basic combat skills training was evaluated using a number of training factors that potentially affect trainees’ perception of training transfer, or their ability to apply the skills they learned in training on the job or in a hostile environment. The analysis used structural equation modeling to evaluate the paths between each of the factors …


On-Demand Key Distribution For Mobile Ad-Hoc Networks, Daniel F. Graham Mar 2007

On-Demand Key Distribution For Mobile Ad-Hoc Networks, Daniel F. Graham

Theses and Dissertations

Mobile ad-hoc networks offer dynamic portable communication with little or no infrastructure. While this has many benefits, there are additional shortcomings specific to wireless communication that must be addressed. This research proposes gossip-based on-demand key distribution as a means to provide data encryption for mobile ad-hoc networks. This technique uses message keys to avoid encrypting and decrypting a message at every node. Other optimizations used include secure channel caching and joint rekey messages. The use of gossip makes the scheme robust to node failure. Experimental results show only a 15% increase in end-to-end delay with a node failure rate of …


Stochastic Estimation And Control Of Queues Within A Computer Network, Nathan C. Stuckey Mar 2007

Stochastic Estimation And Control Of Queues Within A Computer Network, Nathan C. Stuckey

Theses and Dissertations

An extended Kalman filter is used to estimate size and packet arrival rate of network queues. These estimates are used by a LQG steady state linear perturbation PI controller to regulate queue size within a computer network. This paper presents the derivation of the transient queue behavior for a system with Poisson traffic and exponential service times. This result is then validated for ideal traffic using a network simulated in OPNET. A more complex OPNET model is then used to test the adequacy of the transient queue size model when non-Poisson traffic is combined. The extended Kalman filter theory is …


Multi-Robot Fastslam For Large Domains, Choyong G. Koperski Mar 2007

Multi-Robot Fastslam For Large Domains, Choyong G. Koperski

Theses and Dissertations

For a robot to build a map of its surrounding area, it must have accurate position information within the area, and to obtain accurate position information within the area, the robot needs to have an accurate map of the area. This circular problem is the Simultaneous Localization and Mapping (SLAM) problem. An efficient algorithm to solve it is FastSLAM, which is based on the Rao-Blackwellized particle filter. FastSLAM solves the SLAM problem for single-robot mapping using particles to represent the posterior of the robot pose and the map. Each particle of the filter possesses its own global map which is …


Performance Evaluation Of Ad Hoc Routing In A Swarm Of Autonomous Aerial Vehicles, Matthew T. Hyland Mar 2007

Performance Evaluation Of Ad Hoc Routing In A Swarm Of Autonomous Aerial Vehicles, Matthew T. Hyland

Theses and Dissertations

This thesis investigates the performance of three mobile ad hoc routing protocols in the context of a swarm of autonomous unmanned aerial vehicles (UAVs). It is proposed that a wireless network of nodes having an average of 5.1774 log n neighbors, where n is the total number of nodes in the network, has a high probability of having no partitions. By decreasing transmission range while ensuring network connectivity, and implementing multi-hop routing between nodes, spatial multiplexing is exploited whereby multiple pairs of nodes simultaneously transmit on the same channel. The proposal is evaluated using the Greedy Perimeter Stateless Routing (GPSR), …


Analysis Of Routing Worm Infection Rates On An Ipv4 Network, James Gorsuch Mar 2007

Analysis Of Routing Worm Infection Rates On An Ipv4 Network, James Gorsuch

Theses and Dissertations

Malicious logic, specifically worms, has caused monetary expenditure problems to network users in the past. Worms, like Slammer and Code Red, have infected thousands of systems and brought the Internet to a standstill. This research examines the ability of the original Slammer worm, the Slammer based routing worm proposed by Zou et al, and a new Single Slash Eight (SSE) routing worm proposed by this research to infect vulnerable systems within a given address space. This research investigates the Slammer worm's ability to generate a uniform random IP addresses in a given address space. Finally, a comparison of the speed …


Classifying Failing States, Nathan E. Nysether Mar 2007

Classifying Failing States, Nathan E. Nysether

Theses and Dissertations

The US is heavily involved in the first major war of the 21st Century -- The Global War on Terror (GWOT). As with any militant group, the foundation of the enemy's force is their people. There are two primary strategies for defeating the terrorists and achieving victory in the GWOT. First, we must root out terrorists where they live, train, plan, and recruit and attack them militarily. Second, we must suffocate them by cutting off the supply of new soldiers willing to choose aggression or even death over their current life. This thesis helps to achieve these objectives by applying …


Live Surface, Christopher J. Armstrong Feb 2007

Live Surface, Christopher J. Armstrong

Theses and Dissertations

Live Surface allows users to segment and render complex surfaces from 3D image volumes at interactive (sub-second) rates using a novel, Cascading Graph Cut (CGC). Live Surface consists of two phases. (1) Preprocessing for generation of a complete 3D watershed hierarchy followed by tracking of all catchment basin surfaces. (2) User interaction in which, with each mouse movement, the 3D object is selected and rendered in real time. Real-time segmentation is ccomplished by cascading through the 3D watershed hierarchy from the top, applying graph cut successively at each level only to catchment basins bordering the segmented surface from the previous …


Analysis Using Smoothing Via Penalized Splines As Implemented In Lme() In R, John R. Howell Feb 2007

Analysis Using Smoothing Via Penalized Splines As Implemented In Lme() In R, John R. Howell

Theses and Dissertations

Spline smoothers as implemented in common mixed model software provide a familiar framework for estimating semi-parametric and non-parametric models. Following a review of literature on splines and mixed models, details for implementing mixed model splines are presented. The examples use an experiment in the health sciences to demonstrate how to use mixed models to generate the smoothers. The first example takes a simple one-group case, while the second example fits an expanded model using three groups simultaneously. The second example also demonstrates how to fit confidence bands to the three-group model. The examples use mixed model software as implemented in …


Stratification Of Southern Georgia Streams For Rapid Bioassessment Focusing On Differences In Structure And Function Of Black Water And Clear Water Streams, Salini Pradeep Pillai Feb 2007

Stratification Of Southern Georgia Streams For Rapid Bioassessment Focusing On Differences In Structure And Function Of Black Water And Clear Water Streams, Salini Pradeep Pillai

Theses and Dissertations

As part of a rapid bioassessment project for the state of Georgia, relatively unimpaired reference streams and impaired sites were sampled for biological, chemical and physical parameters, and macroinvertebrates were identified. The metrics, biological, physical and chemical metrics, were selected using Ecological Data Application System Version 3.3.2k (EDAS). Discrimination efficiency and correlations were performed to determine the best metrics that separated impaired streams from reference streams and later on to form the index of stream water quality. Principal components analysis of the selected metrics showed that some of the blackwater reference streams and clearwater reference streams are randomly placed over …