Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses and Dissertations

Discipline
Institution
Keyword
Publication Year
File Type

Articles 7051 - 7080 of 8341

Full-Text Articles in Physical Sciences and Mathematics

Determining The Value Of Groundwater Contamination Source Removal: A Methodology, Benjamin C. Recker Mar 2001

Determining The Value Of Groundwater Contamination Source Removal: A Methodology, Benjamin C. Recker

Theses and Dissertations

Subsurface contamination by industrial chemicals is one of the most prevalent and costly environmental problems facing the United States government. This contamination problem must be managed to protect human health and the environment. Two basic strategies are used to deal with subsurface contamination: source removal and contaminant containment. While much cost and performance data are available for individual technologies associated with each of these strategies, there have been very few studies that have examined the benefits of implementing source removal technologies in order to reduce contaminant containment (and hopefully total) costs. This study examines the tradeoff between extent of source …


Effects On The Red-Cockaded Woodpecker From Various Spatial And Temporal Applications Of Management Practices, Chad F. Schroeder Mar 2001

Effects On The Red-Cockaded Woodpecker From Various Spatial And Temporal Applications Of Management Practices, Chad F. Schroeder

Theses and Dissertations

The Red-Cockaded Woodpecker (RCW) is an endangered species endemic to southeastern pine forests in the United States. RCWs are cooperative breeding birds that live together in clusters of old-growth pine trees in which they construct their nesting cavities. The cavities are constructed in living pines, which are predominantly longleaf pines. RCWs also forage upon older pines, preferably longleaf pine. The Endangered Species Act, along with other DoD regulations, requires DoD installations to protect the RCWs and restore their habitat. A popular management practice converts off-site (non-native) pines back to a region's indigenous pines. Conversion provides the best long term RCW …


Transforming Analysis Models Into Design Models For The Multiagent Engineering Systems (Mase) Methodology, Clint H. Sparkman Mar 2001

Transforming Analysis Models Into Design Models For The Multiagent Engineering Systems (Mase) Methodology, Clint H. Sparkman

Theses and Dissertations

Agent technology has received much attention in the last few years because of the advantages that multiagent systems have in complex, distributed environments. For multiagent systems are to be effective, they must be reliable, robust, and secure. AFIT's Agent Research Group has developed a complete lifecycle methodology, called Multiagent Systems Engineering (MaSE), for analyzing, designing, and developing heterogeneous multiagent systems. However, developing multiagent systems is a complicated process, and there is no guarantee that the resulting system meets the initial requirements and will operate reliably with the desired behavior. The purpose of this research was to develop a semi-automated formal …


The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait Mar 2001

The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait

Theses and Dissertations

Information warfare (IW) has developed into a significant threat to the national security of the United States. Our critical infrastructures, linked together by information systems, are increasingly vulnerable to information attack. This study seeks to understand some of those factors which affect the ability of an individual to make accurate decisions in an IW environment. The study used game theory to analyze the behavior of decision-makers within an IW simulation. The IW game model is based on a set of games known as infinitely repeated games of incomplete information. It uses the Bayesian Nash equilibrium concept to determine the strategy …


Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas Mar 2001

Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas

Theses and Dissertations

With the rise of mobile computing and an increasing need for ubiquitous high speed data connections, Internet-in-the-sky solutions are becoming increasingly viable. To reduce the network overhead of one-to-many transmissions, the multicast protocol has been devised. The implementation of multicast in these Low Earth Orbit (LEO) constellations is a critical component to achieving an omnipresent network environment. This research examines the system performance associated with two terrestrial-based multicast mobility solutions, Distance Vector Multicast Routing Protocol (DVMRP) with mobile IP and On Demand Multicast Routing Protocol (ODMRP). These protocols are implemented and simulated in a six plane, 66 satellite LEO constellation. …


Atmospheric Conditions Associated With Lightning During Snow And Ice Events, Randall J. Haeberle Mar 2001

Atmospheric Conditions Associated With Lightning During Snow And Ice Events, Randall J. Haeberle

Theses and Dissertations

The purpose of this research was to find the atmospheric mechanisms associated with lightning in snow and ice events. The specific mechanisms that were examined were low-level wind shear, upper level divergence, surface temperature, low-level temperature, the -10 ° C level, and precipitable water. A chi-squared dependency test showed the strong association of low-level wind shear to each precipitation type (snow, sleet/freezing rain, rain) in two separate studies. Surface temperature appeared to have a relationship to lightning in all precipitation categories, while no significant relationship to lightning in all precipitation categories, while no significant relationship was found with upper level …


Simulating Wet Deposition Of Radiocesium From The Chernobyl Accident, Aaron M. Kinser Mar 2001

Simulating Wet Deposition Of Radiocesium From The Chernobyl Accident, Aaron M. Kinser

Theses and Dissertations

In response to the Chernobyl nuclear power plant accident of 1986, a cesium-137 deposition dataset was assembled. Most of the airborne Chernobyl cesium was wet deposited, either via interception by falling raindrops or via absorption into cloud droplets destined to become raindrops. The Hybrid Single-Particle Lagrangian rated Transport (HYSPLIT) model, developed at Air Resources Laboratory, is used to simulate the transport and deposition of Chernobyl cesium-137. A cloud base parameterization modification is tested and appears to slightly improve the accuracy of one HYSPLIT simulation of daily Chernobyl cesium-137 deposition over the course of the accident at isolated European sites, and …


Attenuation And Refraction Of An Electromagnetic Wave In An Electron Beam Generated Plasma, Nathaniel P. Lockwood Mar 2001

Attenuation And Refraction Of An Electromagnetic Wave In An Electron Beam Generated Plasma, Nathaniel P. Lockwood

Theses and Dissertations

Artificially generated plasmas may be employed to alter the propagation characteristics of electromagnetic waves. The purpose of this report is to study the propagation of electromagnetic waves in an electron beam generated plasma. To understand the physics related to this concept requires the development of computational tools dealing with a plasma created by an electron beam, an assessment of the temporal and spatial evolution of the plasma, and a characterization of the refraction and attenuation of electromagnetic (EM) waves in a collisional plasma. Three computer programs were developed to characterize the effectiveness of an electron beam generated plasma in refracting …


Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson Mar 2001

Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson

Theses and Dissertations

Group Support System (355) research has found this content and process anonymity influence problem solving groups. However, previous studies report mixed results on how OSS technology changes social influence processes and recognition of expertise which affect group performance. This thesis explored content and process anonymity's affect on influence and perceived expertise using three treatments to derive possible explanations for the mixed results found in previous GSS research. The study developed a theoretical model of influence, perceived expertise, and performance. Using structural equation modeling the study tested the relationships between expertise and participation rates, and overall group performance. An experiment was …


An Objective Evaluation Of Four Sar Image Segmentation Algorithms, Jason B. Gregga Mar 2001

An Objective Evaluation Of Four Sar Image Segmentation Algorithms, Jason B. Gregga

Theses and Dissertations

Because of the large number of SAR images the Air Force generates and the dwindling number of available human analysts, automated methods must be developed. A key step towards automated SAR image analysis is image segmentation. There are many segmentation algorithms, but they have not been tested on a common set of images, and there are no standard test methods. This thesis evaluates four SAR image segmentation algorithms by running them on a common set of data and objectively comparing them to each other and to human segmentors. This objective comparison uses a multi-metric a approach with a set of …


A Low Power Application-Specific Integrated Circuit (Asic) Implementation Of Wavelet Transform/Inverse Transform, Daniel N. Harvala Mar 2001

A Low Power Application-Specific Integrated Circuit (Asic) Implementation Of Wavelet Transform/Inverse Transform, Daniel N. Harvala

Theses and Dissertations

A unique ASIC was designed implementing the Haar Wavelet transform for image compression/decompression. ASIC operations include performing the Haar wavelet transform on a 512 by 512 square pixel image, preparing the image for transmission by quantizing and thresholding the transformed data, and performing the inverse Haar wavelet transform, returning the original image with only minor degradation. The ASIC is based on an existing four-chip FPGA implementation. Implementing the design using a dedicated ASIC enhances the speed, decreases chip count to a single die, and uses significantly less power compared to the FPGA implementation. A reduction of RAM accesses was realized …


Use Of Quantum Mechanical Calculations To Investigate Small Silicon Carbide Clusters, Jean W. Henry Mar 2001

Use Of Quantum Mechanical Calculations To Investigate Small Silicon Carbide Clusters, Jean W. Henry

Theses and Dissertations

Density Functional Theory (DFT) method was employed to model silicon carbide small clusters. Comparing the DFT calculation results with experimental results that observed by using photoelectron spectroscopy (PES), DFT predicts the same structures that experiment observed. For electron affinity, DFT results are in good agreement with experimental results, the root mean square negative offset 0.1 eV found using medium size of basis set (cc-pVDZ+) calculation. DFT results for vibrational frequencies are in good agreement with experiment results; the root mean square error is 72.5 cm-1 wave number. 16 ground state structures of SimCn (m ≤ 4, …


The Affect Of Varying Arousal Methods Upon Vigilance And Error Detection In An Automated Command And Control Environment, Brent T. Langhals Mar 2001

The Affect Of Varying Arousal Methods Upon Vigilance And Error Detection In An Automated Command And Control Environment, Brent T. Langhals

Theses and Dissertations

This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack. The study suggests that by continuously applying arousal stimuli, subjects would retain initially high vigilance levels thereby avoiding the vigilance decrement phenomenon and improving error detection. The research focused on which methods were the most effective as well the impact of age upon the arousability of the subjects. Further the implications of vigilance and vigilance decrement for correct detections as well as productivity were explored. The study used a simulation experiment to provide a vigilance …


Solving The Protein Structure Prediction Problem With Fast Messy Genetic Algorithms (Scaling The Fast Messy Genetic Algorithm To Medium-Sized Peptides By Detecting Secondary Structures), Steven R. Michaud Mar 2001

Solving The Protein Structure Prediction Problem With Fast Messy Genetic Algorithms (Scaling The Fast Messy Genetic Algorithm To Medium-Sized Peptides By Detecting Secondary Structures), Steven R. Michaud

Theses and Dissertations

The ability to accurately predict a polypeptide's molecular structure given its amino acid sequence is important to numerous scientific, medical, and engineering applications. Studies have been conducted in the application of Genetic Algorithms (GAs) to this problem with promising initial results. In this thesis report, we use the fast messy Genetic Algorithm (fmGA) to attempt to find the minimization of an empirical CHARMM energy model and generation of the associated conformation. Previous work has shown that the fmGA provided favorable results, at least when applied to the pentapeptide Met-Enkephalin. We extend these results to a larger Polyalinine peptide by utilizing …


Software Domain Model Integration Methodology For Formal Specifications, Joel C. Nonnweiler Mar 2001

Software Domain Model Integration Methodology For Formal Specifications, Joel C. Nonnweiler

Theses and Dissertations

Using formal methods to create automatic code generation systems is one of the goals of Knowledge Based Software Engineering (KBSE) groups. The research of the Air Force Institute of Technology KBSE group has focused on the utilization of formal languages to represent domain model knowledge within this process. The code generation process centers around correctness preserving transformations that convert domain models from their analysis representations through design to the resulting implementation code. The diversity of the software systems that can be developed in this manner is limited only by the availability of suitable domain models. Therefore it should be possible …


Influence Of Anonymity In A Group Problem-Solving Environment, Robert A. Sylvester Mar 2001

Influence Of Anonymity In A Group Problem-Solving Environment, Robert A. Sylvester

Theses and Dissertations

A group support system (GSS) uses a combination of networked personal computers, software that collects, manipulates, and aggregates member's individual input, and human facilitation to improve the group decision-making process. Prior GSS research has found that content and process anonymity influence problem solving groups. However, previous studies report mixed results on which levels of anonymity positively influence group performance. This thesis looked at content and process anonymity using four treatments to explore possible explanations for the mixed results found in previous GSS research. The study examined numerous theories including anonymity, identification, social loafing, and social comparison. An experiment was developed …


Development Of Predictors For Cloud-To-Ground Lightning Activity Using Atmospheric Stability Indices, Kenneth C. Venzke Mar 2001

Development Of Predictors For Cloud-To-Ground Lightning Activity Using Atmospheric Stability Indices, Kenneth C. Venzke

Theses and Dissertations

A detailed examination was performed on several commonly applied atmospheric stability indices and lightning activity from 1993 to 2000 to determine the indices usefulness as predictive tools for determining cloud-to-ground lightning activity. Predetermined radii of 50 nautical miles around upper-air stations in the Midwest U.S. were used for the lightning summaries. Also explored is an improvement upon the commonly accepted thresholds of the stability indices as general thunderstorm indicators. An improvement was found and new threshold ranges were developed for relating stability index values to lightning occurrence. Traditional statistical regression methods failed to find a significant predictive relationship. By examining …


Quantitative Validation Of A Model Of Chlorinated Ethene Natural Attenuation, Harold C. Young Mar 2001

Quantitative Validation Of A Model Of Chlorinated Ethene Natural Attenuation, Harold C. Young

Theses and Dissertations

Chlorinated ethenes are among the most prevalent groundwater contaminants at hazardous waste sites nationwide. In an attempt to manage the risks posed by these contaminants, while controlling costs, monitored natural attenuation (MNA) is being considered as a remediation strategy at many sites. MNA relies on naturally occurring physical, chemical, and biological processes in the subsurface to reduce the risk posed by the contamination. The implementation of MNA, however, requires a detailed understanding of these processes, and how they impact contamination at a particular site. One way to gain this understanding is through contaminant fate and transport modeling. In this study, …


Analyzing The Effects Of Meteorology On Radar Measured Index Of Refraction Structure Parameter, Jeffrey W. Budai Mar 2001

Analyzing The Effects Of Meteorology On Radar Measured Index Of Refraction Structure Parameter, Jeffrey W. Budai

Theses and Dissertations

Forecasting optical turbulence is essential for the Air Force's Airborne Laser program to optimize placement of aircraft. To find bow meteorology affects Cn2, the intensity of turbulence in the index of refraction, case studies of synoptically interesting times are first chosen. Correlation coefficients are then computed between radar measured Cn2 and meteorological quantities. The potential for mechanically turbulent activity is looked at. In the analysis of this work, six meteorological features were found likely to affect Cn2. Two features associated with affecting potential refractivity, and thus Cn2, are jets …


Modeling Information Assurance, Joseph E. Beauregard Mar 2001

Modeling Information Assurance, Joseph E. Beauregard

Theses and Dissertations

The ever-increasing speed of information systems allows decision-makers around the world to gather, process, and disseminate information almost instantaneously. However, with this benefit there comes a price. Information is valuable and therefore a target to those who do not have it or wish to destroy it. The Internet has allowed information to flow freely, but it has also made information vulnerable to many forms of corruption. The U. S. military controls much of the world's most sensitive information, and since it cannot sacrifice losing the speed at which this information is currently processed and disseminated, it must find a way …


A Flexible Framework For Collaborative Visualization Applications Using Java Spaces, Sean C. Butler Mar 2001

A Flexible Framework For Collaborative Visualization Applications Using Java Spaces, Sean C. Butler

Theses and Dissertations

The complexity of modern tasks is rising along with the level of technology. Two techniques commonly used to deal with complexity are collaboration and information visualization. Recently, computer networks have arisen as a powerful means of collaboration, and many new technologies are being developed to better utilize them. Among the newer, more promising of these technologies is Sun Microsystems' JavaSpaces ™, a high-level network programming API. This thesis describes a tool for developing collaborative visualization software using JavaSpaces-an application framework and accompanying toolkit. In addition to a detailed description of the framework, the thesis also describes an application implemented using …


Traveling Salesman Problem For Surveillance Mission Using Particle Swarm Optimization, Barry R. Secrest Mar 2001

Traveling Salesman Problem For Surveillance Mission Using Particle Swarm Optimization, Barry R. Secrest

Theses and Dissertations

The surveillance mission requires aircraft to fly from a starting point through defended terrain to targets and return to a safe destination (usually the starting point). The process of selecting such a flight path is known as the Mission Route Planning (MRP) Problem and is a three-dimensional, multi-criteria (fuel expenditure, time required, risk taken, priority targeting, goals met, etc.) path search. Planning aircraft routes involves an elaborate search through numerous possibilities, which can severely task the resources of the system being used to compute the routes. Operational systems can take up to a day to arrive at a solution due …


Minimum Distance Estimation For Time Series Analysis With Little Data, Hakan Tekin Mar 2001

Minimum Distance Estimation For Time Series Analysis With Little Data, Hakan Tekin

Theses and Dissertations

Minimum distance estimate is a statistical parameter estimate technique that selects model parameters that minimize a good-of-fit statistic. Minimum distance estimation has been demonstrated better standard approaches, including maximum likelihood estimators and least squares, in estimating statistical distribution parameters with very small data sets. This research applies minimum distance estimation to the task of making time series predictions with very few historical observations. In a Monte Carlo analysis, we test a variety of distance measures and report the results based on many different criteria. Our analysis tests the robustness of the approach by testing its ability to make predictions when …


Investigation Of Gravity Waves Via The Rotational Temperature Of Hydroxyl Nightglow, Erin C. Willingham Mar 2001

Investigation Of Gravity Waves Via The Rotational Temperature Of Hydroxyl Nightglow, Erin C. Willingham

Theses and Dissertations

Measurement of the vibration and rotation bands of mesospheric hydroxyl radicals (OH) has been conducted during the past two decades using ground-based and space-based interferometers to take temperature and wind measurements from 70-100km in altitude. Gravity waves that pass through the mesosphere can be measured by determining the variance over time of the rotational temperature of the OH emissions. Several attempts were made to take spectrum measurements of the nightglow from hydroxyl radicals in the mesosphere using a custom hardware configuration that included a telescope and grating monochrometer optimized for the visible and near infrared. Quantifying gravity wave activity was …


A Model For Palladium Catalyzed Destruction Of Chlorinated Ethenes In Contaminated Groundwater, Christopher M. Stoppel Mar 2001

A Model For Palladium Catalyzed Destruction Of Chlorinated Ethenes In Contaminated Groundwater, Christopher M. Stoppel

Theses and Dissertations

Groundwater contamination by chlorinated ethenes is a widespread environmental problem. Conventional remediation technologies have shortcomings that have prompted further research into the development of novel treatment technologies. A palladium/ alumina catalyst in the presence of dissolved molecular hydrogen (referred to hereafter as a PD/H2 system) has been demonstrated to rapidly destroy chlorinated ethene contaminated groundwater. First-order kinetics have been used to model chlorinated ethene destruction in a PD/H2 reactor. However, catalyst deactivation and regeneration are important processes that also need to be modeled in order to better understand their effect on treatment efficiency. This study presents a model …


Validation And Assessment Of Dmsp Electron Temperatures In The Topside Ionosphere, Bradford S. Green Mar 2001

Validation And Assessment Of Dmsp Electron Temperatures In The Topside Ionosphere, Bradford S. Green

Theses and Dissertations

Geomagnetic disturbances in the near earth space environment can adversely affect numerous military and Department of Defense (DoD) systems and operations. To improve the prediction accuracy of such disturbances, the next generation of space environment forecast models aims to automatically ingest real-time ionospheric measurements. This research validates and assesses one such measurement - the Defense Military Satellite Program (DMSP) measured electron temperature (Te). DMSP Te data were validated against near simultaneous incoherent scatter radar (ISR) Te measurements from Millstone Hill, MA and Sondrestrom, Greenland between Winter 1996 and Summer 2000. Of the 37 Millstone and six …


Information Security: Securing Smart Cards With Iris Recognition, Orval E. Phelps Mar 2001

Information Security: Securing Smart Cards With Iris Recognition, Orval E. Phelps

Theses and Dissertations

This thesis examines the application of iris recognition technology to the problem of keeping smart cards secure. In order to understand the technology, a comprehensive literature review was conducted. The biological components of the iris were examined to ensure that they were truly random in development and static through the lifetime of the individual. Specifically, the physical structure of what comprises the iris was examined in detail. The data gathered indicates that the iris is formed early in development, random in structure, and stable throughout the person's lifetime. Next, the iris recognition process and resulting recognition code was examined to …


Design And Specification Of Dynamic, Mobile And Reconfigurable Multiagent Systems, Athie L. Self Mar 2001

Design And Specification Of Dynamic, Mobile And Reconfigurable Multiagent Systems, Athie L. Self

Theses and Dissertations

Multiagent Systems use the power of collaborative software agents to solve complex distributed problems. There are many Agent-Oriented Software Engineering (AOSE) methodologies available to assist system designers to create multiagent systems. However, none of these methodologies can specify agents with dynamic properties such as cloning, mobility or agent instantiation. This thesis starts the process to bridge the gap between AOSE methodologies and dynamic agent platforms by incorporating mobility into the current Multiagent Systems Engineering (MaSE) methodology. Mobility was specified within all components composing a mobile agent class. An agent component was also created that integrated the behavior of the components …


Implementation And Analysis Of The Parallel Genetic Rule And Classifier Construction Environment, David M. Strong Mar 2001

Implementation And Analysis Of The Parallel Genetic Rule And Classifier Construction Environment, David M. Strong

Theses and Dissertations

This paper discusses the Genetic Rule and Classifier Construction Environment (GRaCCE), which is an alternative to existing decision rule induction (DRI) algorithms. GRaCCE is a multi-phase algorithm which uses evolutionary search to mine classification rules from data. The current implementation uses a genetic algorithm based 0/1 search to reduce the number of features to a minimal set of features that make the most significant contributions to the classification of the input data set. This feature selection increases the efficiency of the rule induction algorithm that follows. However, feature selection is shown to account for more than 98 percent of the …


Lithospheric Flexure Of The Devils Lake Basin, North Dakota, Erica M. Peterson Jan 2001

Lithospheric Flexure Of The Devils Lake Basin, North Dakota, Erica M. Peterson

Theses and Dissertations

Devils Lake is the largest lake in a chain of approximately 20 interconnected lakes in east central North Dakota. The Devils Lake drainage basin of approximately 8,600 km2, lies in a bowl sculpted by glaciation; thus it is closed and receives and loses water only through precipitation and evapotranspiration. Since 1940, the lake level has risen 14.4 m due to increased precipitation. Geological data show that in the past 10,000 years the lake has alternately dried up and filled due to climate fluctuations (Murphy et al., 1997). During this time it has reached its spill elevation of 444. 7 m …