Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2001

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1531 - 1560 of 3030

Full-Text Articles in Physical Sciences and Mathematics

Development Of Sarcocystis Falcatula In Its Intermediate Host, The Brown-Headed Cowbird (Molothrus Ater), Shannon L. Luznar, Michael L. Avery, John B. Dame, Robert J. Mackay, Ellis C. Greiner Mar 2001

Development Of Sarcocystis Falcatula In Its Intermediate Host, The Brown-Headed Cowbird (Molothrus Ater), Shannon L. Luznar, Michael L. Avery, John B. Dame, Robert J. Mackay, Ellis C. Greiner

United States Department of Agriculture Wildlife Services: Staff Publications

Sporocysts of Sarcocystis falcatula obtained from experimentally infected Virginia opossums (Didelphis virginiana) were inoculated orally to 60 wild-caught Brown-headed Cowbirds (Molothrus ater). Another 30 Brown-headed Cowbirds were not challenged and served as uninfected controls. Two inoculated and one control cowbird were necropsied every 2 weeks and the pectoral and thigh muscles were examined grossly for cyst development. Stained histologic sections of pectoral muscle, thigh muscle, and lung were examined by light microscopy and presence, density, and size of sarcocysts were determined. Sarcocysts were present by 6 weeks post-inoculation (PI) and were still growing at …


Bear Behavior In The Vicinity Of Supplemental Feeding Stations In Western Washington, Dale L. Nolte, Timothy J. Veenendaal, George J. Ziegltrum, Philipp Fersterer Mar 2001

Bear Behavior In The Vicinity Of Supplemental Feeding Stations In Western Washington, Dale L. Nolte, Timothy J. Veenendaal, George J. Ziegltrum, Philipp Fersterer

United States Department of Agriculture Wildlife Services: Staff Publications

Black bear can inflict severe negative Impacts on timber stands in the northwestern United States. A supplemental feeding program to provide bears an alternative food source during spring is practiced in the stat e of Washington, and to a lesser extent in other states. We initiated concurrent studies to assess characteristics of bear that forage at feeding stations, the interactions of bears around feeders, and impacts of the program on bear territories. Numerous bears fed at stations, including females with and without cubs, yearlings. and males. Bear feeding bouts at stations were generally short, less than 15 minutes. Bears generally …


A Process For Vectoring Offensive Information Warfare As A Primary Weapon Option Within The United States Air Force, Sheila G. Bennett Mar 2001

A Process For Vectoring Offensive Information Warfare As A Primary Weapon Option Within The United States Air Force, Sheila G. Bennett

Theses and Dissertations

Consistently and comprehensively using Information Operations (IO) capabilities as primary weapon option within the Air Force is the next step to operationalizing IO within the Air Force. Doctrine and official guidance has set the variables of mission and concepts of operations, organizational structure, and IW players in place. The missing variable to operationalizing IO and probably the most difficult is the 'how' or process of the equation. This research will introduce a useable process that can be incorporated within the Air Force for integrating offensive IW activities into the current and given environment. The process is the basis for further …


Dissolution Of Chromium From Inhalable Primer Paint Particles Into A Simulated Lung Fluid, David A. Kauth Mar 2001

Dissolution Of Chromium From Inhalable Primer Paint Particles Into A Simulated Lung Fluid, David A. Kauth

Theses and Dissertations

The use of chromate as a corrosion inhibitor in primer paint is an essential component for the protection of aluminum-skinned aircraft and the primary source of hexavalent chromium (Cr (VI)) exposure to USAF aircraft painters. The objective of this research was to quantify the dissolution of chromate from freshly sprayed paint particles into a simulated lung fluid (SLF). Two primer paints were sprayed with a paint spray gun to generate overspray particles for collection into impingers filled with SLF. Particles were allowed to soak in SLF for 24 and 48 hours and then the particles were removed by centrifugation. The …


Malicious Hackers: A Framework For Analysis And Case Study, Laura J. Kleen Mar 2001

Malicious Hackers: A Framework For Analysis And Case Study, Laura J. Kleen

Theses and Dissertations

Recent years have seen an increase in the number and severity of Information Operations (IO) attacks upon DoD resources. At a higher level, the US as a whole has come under cyber attack by individuals and groups seeking thrills, monetary gain, publicity for their causes, and myriad other goals. This effort develops a first cut model of individual hacker mentality that can be utilized to improve threat assessment, mitigate Information Assurance (IA) vulnerabilities, and improve risk assessment. Further, it is a first step toward automated characterization of Information Warfare (IW) attacks based upon hacker types. All hackers are not the …


Scripting Maine’S Environmentalist Majority: The “Theater Of Oil,” 1968-1975, Christopher S. Beach Mar 2001

Scripting Maine’S Environmentalist Majority: The “Theater Of Oil,” 1968-1975, Christopher S. Beach

Maine History

Christopher Beach argues that Maine's contemporary environmental movement was created in the late 1960s when oil companies seeking sites for new refineries and tanker ports saw the Maine coast as ideally situated for expansion: close to southern New England and the mid-Atlantic coast, but relatively undeveloped and in need of economic re-energizing or so they thought. Hearings and conflict among fishers, state and local officials and politicians, residents (seasonal and permanent) and environmentalists created a long-term debate that in turn spawned a new understanding of Maine as a pastoral landscape for the modern world. Christopher Beach received his J.D. from …


New Solvable Singular Potentials , R. Dutt, Asim Gangopadhyaya, C. Rasinariu, Uday P. Sukhatne Mar 2001

New Solvable Singular Potentials , R. Dutt, Asim Gangopadhyaya, C. Rasinariu, Uday P. Sukhatne

Physics: Faculty Publications and Other Works

We obtain three new solvable, real, shape invariant potentials starting from the harmonic oscillator, Pöschl-Teller I and Pöschl-Teller II potentials on the half-axis and extending their domain to the full line, while taking special care to regularize the inverse square singularity at the origin. The regularization procedure gives rise to a delta-function behavior at the origin. Our new systems possess underlying non-linear potential algebras, which can also be used to determine their spectra analytically.


Analysis Of Cloud-To-Ground Lightning Clusters With Radar Composite Imagery, Rhonda B. Scott Mar 2001

Analysis Of Cloud-To-Ground Lightning Clusters With Radar Composite Imagery, Rhonda B. Scott

Theses and Dissertations

The most recent research conducted at the Air Force Institute of Technology involved studying a large volume of lightning data without coupling radar imagery (Parsons 2000). Parsons finding could not be acted on because no individual storms were studied. The primary goal of this research is to determine whether the techniques used by Parsons can be applied to storms by examining the radar imagery and lightning data. This research used the methodology applied to lightning data by Parsons and radar imagery to determine whether the location of lightning clusters were located near storms. A composite reflectivity radar image was generated …


The Effect Of Contextual-Based Training On Artifact-Based Deception Detection, Elizabeth A. Autrey Mar 2001

The Effect Of Contextual-Based Training On Artifact-Based Deception Detection, Elizabeth A. Autrey

Theses and Dissertations

Air Force dependence on information technology (IT) creates vulnerabilities that it cannot ignore. With global availability of commercial IT and the Internet, the Air Force does not necessarily have the high technological advantage over potential adversaries that it once had. Furthermore, it is possible to directly and covertly manipulate information within information systems, or artifacts, without notice. This directly affects decision makers since the availability and integrity of information is critical. Air Force physical and network security measures taken to protect its information do not guarantee detection of direct information manipulation. This leaves it to information artifact users to detect …


Photoluminescence Of Single Quantum Well Structures In Gallium Arsenide, Christian A. Bartholomew Mar 2001

Photoluminescence Of Single Quantum Well Structures In Gallium Arsenide, Christian A. Bartholomew

Theses and Dissertations

The continued development of state-of the-art semiconductor technologies and devices by the United States Air Force and the Department of Defense requires accurate and efficient techniques to evaluate and model these new materials. Of particular interest to the Air Force are quantum well structures which can be used for small-scale laser sources in fly-by-light applications, as efficient infrared countermeasures to heat-seeking missiles, or as advanced seekers in optically guided missiles. This thesis provides the initial experimental procedures and data necessary to begin producing accurate yet robust models. Although carrier effective masses could not be evaluated using hot-electron photoluminescence, photoluminescence excitation …


A Semantic Interface To Scenario Component Reuse In Dod Simulation Systems, Lawrence A. Breighner Mar 2001

A Semantic Interface To Scenario Component Reuse In Dod Simulation Systems, Lawrence A. Breighner

Theses and Dissertations

The Department of Defense utilizes various simulation systems to model employment of forces and weapons systems in operational environments. The data files that model these environments and weapons systems are extremely large and complex, and require many person-hours to develop. Compounding the problem, these data files are distributed across multiple systems in a heterogeneous environment. Currently, there is no automated means of identifying and retrieving reusable portions of these files for reuse in a new scenario under development. This work develops a multi-agent system that catalogs the files, and provides the user with a means of identifying and retrieving reusable …


Optimization Of Palladium-Catalyzed In Situ Destruction Of Trichloroethylene-Contaminated Groundwater Using A Genetic Algorithm, Manuel Fernandez Mar 2001

Optimization Of Palladium-Catalyzed In Situ Destruction Of Trichloroethylene-Contaminated Groundwater Using A Genetic Algorithm, Manuel Fernandez

Theses and Dissertations

Conventional technologies for the treatment of groundwater contaminated with chlorinated solvents have limitations that have motivated development of innovative technologies. One such technology currently under development involves using palladium-on-alumina (Pd/Al) as a catalyst to promote dechlorination. Pd/Al catalyst may be used in-well as part of a re-circulating horizontal flow treatment well (HFTW) system. An HFTW system involves two or more dual-screened wells, with in-well reactors, to capture and treat contaminated groundwater without the need to pump the water to the surface. In this study, objective and fitness functions, based on system costs and TCE concentration requirements, were developed to optimize …


Control And Characterization Of Line-Addressable Micromirror Arrays, Harris J. Hall Mar 2001

Control And Characterization Of Line-Addressable Micromirror Arrays, Harris J. Hall

Theses and Dissertations

This research involved the design and implementation of a complete line-addressable control system for a 32x32 electrostatic piston-actuated micromirror array device. Line addressing reduces the number of control lines from N2 to 2N making it possible to design larger arrays and arrays with smaller element sizes. The system utilizes the electromechanical bi-stability of individual elements to bold arbitrary bi-stable phase patterns. The control system applies pulse width modulated (PWM) signals to the rows and columns of the micromirror array. Three modes of operation were conceived and built into the system. The first was the traditional signal scheme which requires …


A Traffic Pattern-Based Comparison Of Bulk Image Request Response Times For A Virtual Distributed Laboratory, David B. Hooten Mar 2001

A Traffic Pattern-Based Comparison Of Bulk Image Request Response Times For A Virtual Distributed Laboratory, David B. Hooten

Theses and Dissertations

Various agencies throughout the Department of Defense possess intelligence imagery and electrooptical signature data required by researchers in the field of automatic target recognition (ATR). The Air Force Research Laboratory, Sensors Directorate, as been tasked with creating a virtual distributed laboratory (VDL) which will make this data available to ATR researchers via high speed networks such as the defense research and engineering network (DREN). For this research, a model for simulating potential operational network configurations and collaboration scenarios was developed and implemented using OPNET. The results of the simulations were analyzed using statistical methods to determine the impact on performance …


Validation And Characterization Of Ionospheric Densities Measured By Dmsp, Herbert L. Keyser Mar 2001

Validation And Characterization Of Ionospheric Densities Measured By Dmsp, Herbert L. Keyser

Theses and Dissertations

Future models of the thermosphere-ionosphere-magnetosphere system will require near real-time assimilation of ionospheric parameters to specify% and forecast these regions One of the current sensors that will be used in the GAIM model is the DMSP SSIES. Knowledge of the SSIES's reliability and data characteristics is key to using the data when relying on automated processes to ingest the data. To validate the DMSP value, the DMSP-measured density is compared to ground-based ISR measurements from solar minimum to solar maximum. The DMSP data are compared to data from the ISRs located at the Millstone Hill Observatory in Massachusetts and Sondrestrom …


Selecting A Software Engineering Methodology Using Multiobjective Decision Analysis, Scott A. O'Malley Mar 2001

Selecting A Software Engineering Methodology Using Multiobjective Decision Analysis, Scott A. O'Malley

Theses and Dissertations

With the emergence of agent-oriented software engineering methodologies, software developers have a new set of tools to solve complex software requirements. One problem software developers face is to determine which methodology is the best approach to take to developing a solution. A number of factors go into the decision process. This thesis defines a decision making process that can be used by a software engineer to determine whether or not a software engineering approach is an appropriate system development strategy. This decision analysis process allows the software engineer to classify and evaluate a set of methodologies while specifically considering the …


Using A Distributed Object-Oriented Database Management System In Support Of A High-Speed Network Intrusion Detection System Data Repository, Phillip W. Polk Mar 2001

Using A Distributed Object-Oriented Database Management System In Support Of A High-Speed Network Intrusion Detection System Data Repository, Phillip W. Polk

Theses and Dissertations

The Air Force has multiple initiatives to develop data repositories for high-speed network intrusion detection systems (IDS). All of the developed systems utilize a relational database management system (RDBMS) as the primary data storage mechanism. The purpose of this thesis is to replace the RDBMS in one such system developed by AFRL, the Automated Intrusion Detection Environment (AIDE), with a distributed object-oriented database management system (DOODBMS) and observe a number of areas: its performance against the RDBMS in terms of IDS event insertion and retrieval, the distributed aspects of the new system, and the resulting object-oriented architecture. The resulting system, …


Determining The Value Of Groundwater Contamination Source Removal: A Methodology, Benjamin C. Recker Mar 2001

Determining The Value Of Groundwater Contamination Source Removal: A Methodology, Benjamin C. Recker

Theses and Dissertations

Subsurface contamination by industrial chemicals is one of the most prevalent and costly environmental problems facing the United States government. This contamination problem must be managed to protect human health and the environment. Two basic strategies are used to deal with subsurface contamination: source removal and contaminant containment. While much cost and performance data are available for individual technologies associated with each of these strategies, there have been very few studies that have examined the benefits of implementing source removal technologies in order to reduce contaminant containment (and hopefully total) costs. This study examines the tradeoff between extent of source …


Effects On The Red-Cockaded Woodpecker From Various Spatial And Temporal Applications Of Management Practices, Chad F. Schroeder Mar 2001

Effects On The Red-Cockaded Woodpecker From Various Spatial And Temporal Applications Of Management Practices, Chad F. Schroeder

Theses and Dissertations

The Red-Cockaded Woodpecker (RCW) is an endangered species endemic to southeastern pine forests in the United States. RCWs are cooperative breeding birds that live together in clusters of old-growth pine trees in which they construct their nesting cavities. The cavities are constructed in living pines, which are predominantly longleaf pines. RCWs also forage upon older pines, preferably longleaf pine. The Endangered Species Act, along with other DoD regulations, requires DoD installations to protect the RCWs and restore their habitat. A popular management practice converts off-site (non-native) pines back to a region's indigenous pines. Conversion provides the best long term RCW …


Transforming Analysis Models Into Design Models For The Multiagent Engineering Systems (Mase) Methodology, Clint H. Sparkman Mar 2001

Transforming Analysis Models Into Design Models For The Multiagent Engineering Systems (Mase) Methodology, Clint H. Sparkman

Theses and Dissertations

Agent technology has received much attention in the last few years because of the advantages that multiagent systems have in complex, distributed environments. For multiagent systems are to be effective, they must be reliable, robust, and secure. AFIT's Agent Research Group has developed a complete lifecycle methodology, called Multiagent Systems Engineering (MaSE), for analyzing, designing, and developing heterogeneous multiagent systems. However, developing multiagent systems is a complicated process, and there is no guarantee that the resulting system meets the initial requirements and will operate reliably with the desired behavior. The purpose of this research was to develop a semi-automated formal …


The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait Mar 2001

The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait

Theses and Dissertations

Information warfare (IW) has developed into a significant threat to the national security of the United States. Our critical infrastructures, linked together by information systems, are increasingly vulnerable to information attack. This study seeks to understand some of those factors which affect the ability of an individual to make accurate decisions in an IW environment. The study used game theory to analyze the behavior of decision-makers within an IW simulation. The IW game model is based on a set of games known as infinitely repeated games of incomplete information. It uses the Bayesian Nash equilibrium concept to determine the strategy …


Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas Mar 2001

Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas

Theses and Dissertations

With the rise of mobile computing and an increasing need for ubiquitous high speed data connections, Internet-in-the-sky solutions are becoming increasingly viable. To reduce the network overhead of one-to-many transmissions, the multicast protocol has been devised. The implementation of multicast in these Low Earth Orbit (LEO) constellations is a critical component to achieving an omnipresent network environment. This research examines the system performance associated with two terrestrial-based multicast mobility solutions, Distance Vector Multicast Routing Protocol (DVMRP) with mobile IP and On Demand Multicast Routing Protocol (ODMRP). These protocols are implemented and simulated in a six plane, 66 satellite LEO constellation. …


An Optical Survey Of Outlying Ejecta In Cassiopeia A: Evidence For A Turbulent, Asymmetric Explosion, Robert A. Fesen Mar 2001

An Optical Survey Of Outlying Ejecta In Cassiopeia A: Evidence For A Turbulent, Asymmetric Explosion, Robert A. Fesen

Dartmouth Scholarship

A deep optical survey of the Cassiopeia A supernova remnant has revealed dozens of new emissionline ejecta knots out beyond the remnantÏs bright nebular shell. Most of the newly detected knots exhibit a 4500È 7500 A. spectrum dominated by [N II ] jj 6548,6583 line emissions. After accounting for possible decelerations, the estimated space velocities for about four dozen of these [N II ] knots suggest a nearly isotropic ^ 10,000 km s~1 ejection velocity. However, a small group along the southwestern limb show signi‹cantly higher velocities of up to 12,000 km s~1 . Over 20 outlying O] S emission …


Atmospheric Conditions Associated With Lightning During Snow And Ice Events, Randall J. Haeberle Mar 2001

Atmospheric Conditions Associated With Lightning During Snow And Ice Events, Randall J. Haeberle

Theses and Dissertations

The purpose of this research was to find the atmospheric mechanisms associated with lightning in snow and ice events. The specific mechanisms that were examined were low-level wind shear, upper level divergence, surface temperature, low-level temperature, the -10 ° C level, and precipitable water. A chi-squared dependency test showed the strong association of low-level wind shear to each precipitation type (snow, sleet/freezing rain, rain) in two separate studies. Surface temperature appeared to have a relationship to lightning in all precipitation categories, while no significant relationship to lightning in all precipitation categories, while no significant relationship was found with upper level …


Simulating Wet Deposition Of Radiocesium From The Chernobyl Accident, Aaron M. Kinser Mar 2001

Simulating Wet Deposition Of Radiocesium From The Chernobyl Accident, Aaron M. Kinser

Theses and Dissertations

In response to the Chernobyl nuclear power plant accident of 1986, a cesium-137 deposition dataset was assembled. Most of the airborne Chernobyl cesium was wet deposited, either via interception by falling raindrops or via absorption into cloud droplets destined to become raindrops. The Hybrid Single-Particle Lagrangian rated Transport (HYSPLIT) model, developed at Air Resources Laboratory, is used to simulate the transport and deposition of Chernobyl cesium-137. A cloud base parameterization modification is tested and appears to slightly improve the accuracy of one HYSPLIT simulation of daily Chernobyl cesium-137 deposition over the course of the accident at isolated European sites, and …


Attenuation And Refraction Of An Electromagnetic Wave In An Electron Beam Generated Plasma, Nathaniel P. Lockwood Mar 2001

Attenuation And Refraction Of An Electromagnetic Wave In An Electron Beam Generated Plasma, Nathaniel P. Lockwood

Theses and Dissertations

Artificially generated plasmas may be employed to alter the propagation characteristics of electromagnetic waves. The purpose of this report is to study the propagation of electromagnetic waves in an electron beam generated plasma. To understand the physics related to this concept requires the development of computational tools dealing with a plasma created by an electron beam, an assessment of the temporal and spatial evolution of the plasma, and a characterization of the refraction and attenuation of electromagnetic (EM) waves in a collisional plasma. Three computer programs were developed to characterize the effectiveness of an electron beam generated plasma in refracting …


Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson Mar 2001

Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson

Theses and Dissertations

Group Support System (355) research has found this content and process anonymity influence problem solving groups. However, previous studies report mixed results on how OSS technology changes social influence processes and recognition of expertise which affect group performance. This thesis explored content and process anonymity's affect on influence and perceived expertise using three treatments to derive possible explanations for the mixed results found in previous GSS research. The study developed a theoretical model of influence, perceived expertise, and performance. Using structural equation modeling the study tested the relationships between expertise and participation rates, and overall group performance. An experiment was …


An Objective Evaluation Of Four Sar Image Segmentation Algorithms, Jason B. Gregga Mar 2001

An Objective Evaluation Of Four Sar Image Segmentation Algorithms, Jason B. Gregga

Theses and Dissertations

Because of the large number of SAR images the Air Force generates and the dwindling number of available human analysts, automated methods must be developed. A key step towards automated SAR image analysis is image segmentation. There are many segmentation algorithms, but they have not been tested on a common set of images, and there are no standard test methods. This thesis evaluates four SAR image segmentation algorithms by running them on a common set of data and objectively comparing them to each other and to human segmentors. This objective comparison uses a multi-metric a approach with a set of …


A Low Power Application-Specific Integrated Circuit (Asic) Implementation Of Wavelet Transform/Inverse Transform, Daniel N. Harvala Mar 2001

A Low Power Application-Specific Integrated Circuit (Asic) Implementation Of Wavelet Transform/Inverse Transform, Daniel N. Harvala

Theses and Dissertations

A unique ASIC was designed implementing the Haar Wavelet transform for image compression/decompression. ASIC operations include performing the Haar wavelet transform on a 512 by 512 square pixel image, preparing the image for transmission by quantizing and thresholding the transformed data, and performing the inverse Haar wavelet transform, returning the original image with only minor degradation. The ASIC is based on an existing four-chip FPGA implementation. Implementing the design using a dedicated ASIC enhances the speed, decreases chip count to a single die, and uses significantly less power compared to the FPGA implementation. A reduction of RAM accesses was realized …


Use Of Quantum Mechanical Calculations To Investigate Small Silicon Carbide Clusters, Jean W. Henry Mar 2001

Use Of Quantum Mechanical Calculations To Investigate Small Silicon Carbide Clusters, Jean W. Henry

Theses and Dissertations

Density Functional Theory (DFT) method was employed to model silicon carbide small clusters. Comparing the DFT calculation results with experimental results that observed by using photoelectron spectroscopy (PES), DFT predicts the same structures that experiment observed. For electron affinity, DFT results are in good agreement with experimental results, the root mean square negative offset 0.1 eV found using medium size of basis set (cc-pVDZ+) calculation. DFT results for vibrational frequencies are in good agreement with experiment results; the root mean square error is 72.5 cm-1 wave number. 16 ground state structures of SimCn (m ≤ 4, …