Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 83

Full-Text Articles in Entire DC Network

Cyber Power In The 21st Century, Joseph M. Elbaum Dec 2008

Cyber Power In The 21st Century, Joseph M. Elbaum

Theses and Dissertations

Historically, the United States Congress has acknowledged that a separate branch of military service is required to exert supremacy over each of the recognized Domains of Operation. Throughout the evolution of modern warfare, leading minds in military theory have come to the conclusion that due to fundamental differences inherent in the theory and tactics that must be employed in order to successfully wage war within a domain’s associated environment, a specialized force was needed - until now. With the recent inclusion of Cyberspace as an operational domain by the Department of Defense, the case should be made that it, too, …


Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire Dec 2008

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire

Theses and Dissertations

Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …


Secureqemu: Emulation-Based Software Protection Providing Encrypted Code Execution And Page Granularity Code Signing, William B. Kimball Dec 2008

Secureqemu: Emulation-Based Software Protection Providing Encrypted Code Execution And Page Granularity Code Signing, William B. Kimball

Theses and Dissertations

This research presents an original emulation-based software protection scheme providing protection from reverse code engineering (RCE) and software exploitation using encrypted code execution and page-granularity code signing, respectively. Protection mechanisms execute in trusted emulators while remaining out-of-band of untrusted systems being emulated. This protection scheme is called SecureQEMU and is based on a modified version of Quick Emulator (QEMU) [5]. RCE is a process that uncovers the internal workings of a program. It is used during vulnerability and intellectual property (IP) discovery. To protect from RCE program code may have anti-disassembly, anti-debugging, and obfuscation techniques incorporated. These techniques slow the …


Nondestructive Evaluation Of Aircraft Composites Using Terahertz Time Domain Spectroscopy, Christopher D. Stoik Dec 2008

Nondestructive Evaluation Of Aircraft Composites Using Terahertz Time Domain Spectroscopy, Christopher D. Stoik

Theses and Dissertations

Terahertz (THz) time domain spectroscopy (TDS) was assessed as a nondestructive evaluation technique for aircraft composites. Material properties of glass fiber composite were measured using both transmission and reflection configuration. The interaction of THz with a glass fiber composite was then analyzed, including the effects of scattering, absorption, and the index of refraction, as well as effective medium approximations. THz TDS, in both transmission and reflection configuration, was used to study composite damage, including voids, delaminations, mechanical damage, and heat damage. Measurement of the material properties on samples with localized heat damage showed that burning did not change the refractive …


Application Of Optimization Techniques To Spectrally Modulated, Spectrally Encoded Waveform Design, Todd W. Beard Sep 2008

Application Of Optimization Techniques To Spectrally Modulated, Spectrally Encoded Waveform Design, Todd W. Beard

Theses and Dissertations

A design process is demonstrated for a coexistent scenario containing Spectrally Modulated, Spectrally Encoded (SMSE) and Direct Sequence Spread Spectrum (DSSS) signals. Coexistent SMSE-DSSS designs are addressed under both perfect and imperfect DSSS code tracking conditions using a non-coherent delay-lock loop (DLL). Under both conditions, the number of SMSE subcarriers and subcarrier spacing are the optimization variables of interest. For perfect DLL code tracking conditions, the GA and RSM optimization processes are considered independently with the objective function being end-to-end DSSS bit error rate. A hybrid GA-RSM optimization process is used under more realistic imperfect DLL code tracking conditions. In …


Closed-Loop Adaptive Optics Control In Strong Atmospheric Turbulence, Todd M. Venema Sep 2008

Closed-Loop Adaptive Optics Control In Strong Atmospheric Turbulence, Todd M. Venema

Theses and Dissertations

A self-referencing interferometer based closed-loop adaptive optics controller is developed which is designed to operate effectively under strong turbulence conditions. The aberrated optical field is modeled stochastically and then estimates of the state of the system are developed using a steady-state, fixed-gain Kalman filter. The phase of the optical field is considered the state of the system which is wrapped in a limited range of (-π, π]. This phase is unwrapped through the use of a least-squares reconstructor which has been modified to work effectively in the presence of branch points associated with strong turbulence. The conjugate of the optical …


Electronic State Distributions Of Y Ba2Cu3O7-X Laser Ablated Plumes, Patrick D. Kee Sep 2008

Electronic State Distributions Of Y Ba2Cu3O7-X Laser Ablated Plumes, Patrick D. Kee

Theses and Dissertations

The application of spectral and imagery diagnostics to YBa2Cu3O7 (YBCO) laser-ablated plumes was systematically studied to determine their effectiveness for process control. Emission signatures were collected for plumes created by ablating bulk YBCO with a pulsed laser source. A KrF (λ=248 nm) laser source operating at 4-10 J/cm2 at a 4-10 Hz pulse repetition frequency was used to ablate a bulk YBCO target at O2 background pressures ranging from 50 to 400 mTorr. Emission spectra were collected over the 500 to 860 nm bandpass at distances from the target ranging from 31.4 to …


A Study Of The Irradiance-And-Temperature-Dependence Of Mid-Wave-Infrared (Mwir)Absorption In Indium Antimonide (Insb), John M. Callahan Sep 2008

A Study Of The Irradiance-And-Temperature-Dependence Of Mid-Wave-Infrared (Mwir)Absorption In Indium Antimonide (Insb), John M. Callahan

Theses and Dissertations

This work entails further investigation of the absorption of photons in indium antimonide (InSb). Previously work at the Air Force Institute of Technology (AFIT) attributed laser blooming effects in InSb focal plane arrays (FPA’s) to the Burstein-Moss effect. The contributing effect is from a decrease in the absorption of the InSb material, such that the transmitted optical energy scatters off the integrated circuitry beneath the InSb thin film back into the optical system. To evaluate this, irradiance-dependent laser-absorption experiments were performed on thinned, InSb wafers prior to their FPA fabrication. The samples were illuminated with a focused CO2 laser at …


A Confidence Paradigm For Classification Systems, Nathan J. Leap Sep 2008

A Confidence Paradigm For Classification Systems, Nathan J. Leap

Theses and Dissertations

There is no universally accepted methodology to determine how much confidence one should have in a classifier output. This research proposes a framework to determine the level of confidence in an indication from a classifier system where the output is or can be transformed into a posterior probability estimate. This is a theoretical framework that attempts to unite the viewpoints of the classification system developer (or engineer) and the classification system user (or war-fighter). The paradigm is based on the assumptions that the system confidence acts like, or can be modeled as a value and that indication confidence can be …


The Roc Curves Of Fused Independent Classification Systems, Michael B. Walsh Sep 2008

The Roc Curves Of Fused Independent Classification Systems, Michael B. Walsh

Theses and Dissertations

The need for optimal target detection arises in many different fields. Due to the complexity of many targets, it is thought that the combination of multiple classification systems, which can be tuned to several individual target attributes or features, might lead to more optimal target detection performance. The ROC curves of fused independent two-label classification systems may be generated by the mathematical combination of their ROC curves to achieve optimal classifier performance without the need to test every Boolean combination. The monotonic combination of two-label independent classification systems which assign labels to the same target types results in a lattice …


On Graph Isomorphism And The Pagerank Algorithm, Christopher J. Augeri Aug 2008

On Graph Isomorphism And The Pagerank Algorithm, Christopher J. Augeri

Theses and Dissertations

A graph is a key construct for expressing relationships among objects, such as the radio connectivity between nodes contained in an unmanned vehicle swarm. The study of such networks may include ranking nodes based on importance, for example, by applying the PageRank algorithm used in some search engines to order their query responses. The PageRank values correspond to a unique eigenvector typically computed by applying the power method, an iterative technique based on matrix multiplication. The first new result described herein is a lower bound on the execution time of the PageRank algorithm that is derived by applying standard assumptions …


Stimulated Brillouin Scattering Phase Conjugation In Fiber Optic Waveguides, Steven M. Massey Aug 2008

Stimulated Brillouin Scattering Phase Conjugation In Fiber Optic Waveguides, Steven M. Massey

Theses and Dissertations

The objective of this research effort was to demonstrate the path to continuous wave, coherent beam combination through stimulated Brillouin scattering phase conjugation in optical fiber. This work experimentally determined the fiber parameters necessary for phase conjugation in step-index optical fiber. Continuous wave phase conjugation using stimulated Brillouin scattering in step-index fibers was achieved for the first time with a fidelity of 0.8 and a threshold power of 16 W in a 15-m fiber with 0.13 NA. A fidelity of 0.8 was also achieved using 40 m of fiber with 0.06-NA and a threshold power of 15 W. The fidelity …


Multi-Class Classification For Identifying Jpeg Steganography Embedding Methods, Benjamin M. Rodriguez Ii Aug 2008

Multi-Class Classification For Identifying Jpeg Steganography Embedding Methods, Benjamin M. Rodriguez Ii

Theses and Dissertations

Over 725 steganography tools are available over the Internet, each providing a method for covert transmission of secret messages. This research presents four steganalysis advancements that result in an algorithm that identifies the steganalysis tool used to embed a secret message in a JPEG image file. The algorithm includes feature generation, feature preprocessing, multi-class classification and classifier fusion. The first contribution is a new feature generation method which is based on the decomposition of discrete cosine transform (DCT) coefficients used in the JPEG image encoder. The generated features are better suited to identifying discrepancies in each area of the decomposed …


Material Perturbations To Enhance Performance Of The Theile Half-Width Leaky Mode Antenna, Jason A. Girard Jun 2008

Material Perturbations To Enhance Performance Of The Theile Half-Width Leaky Mode Antenna, Jason A. Girard

Theses and Dissertations

Microstrip traveling-wave antennas, often referred to as leaky-wave antennas, have been shown to radiate when the dominant or fundamental mode is suppressed and the first higher-order mode is excited. One such microstrip variation is the Thiele Half-Width (THW) antenna, which operates from 5.9 - 8.2 GHz for this research. Increasing the bandwidth over which the THW antenna radiates is desired, as is a fundamental understanding of the propagation characteristics over this region. This dissertation seeks to vary or perturb the material and physical properties of the THW antenna, including strip-width variations and modifications of the substrate layer, to achieve these …


Characterizing Effects And Benefits Of Beam Defocus On High Energy Laser Performance Under Thermal Blooming And Turbulence Conditions For Air-To-Ground Engagements, Scott N. Long Jun 2008

Characterizing Effects And Benefits Of Beam Defocus On High Energy Laser Performance Under Thermal Blooming And Turbulence Conditions For Air-To-Ground Engagements, Scott N. Long

Theses and Dissertations

This dissertation makes contributions towards knowledge of optimizing of laser weapon performance when operating in the air-to-ground (ATG) regime in thermal blooming conditions. Wave optics modeling techniques were used to represent laser weapon performance in a high fidelity sense to allow progress to be made toward improving lower-fidelity scaling laws that can be used in systems level analysis which has need for better representations of thermal blooming. Chemical-oxygen iodine laser (COIL) based weapon systems that operate near the ground will experience thermal blooming due to atmospheric absorption if output power is sufficiently high. The thermal lens in the ATG case …


Hardware, Software And Data Analysis Techniques For Sram-Based Field Programmable Gate Array Circuits, Eugene B. Hockenberry Jun 2008

Hardware, Software And Data Analysis Techniques For Sram-Based Field Programmable Gate Array Circuits, Eugene B. Hockenberry

Theses and Dissertations

This work presents a built, tested, and demonstrated test structure that is low-cost, flexible, and re-usable for robust radiation experimentation, primarily to investigate memory, in this case SRAMs and SRAM-based FPGAs. The space environment can induce many kinds of failures due to radiation effects. These failures result in a loss of money, time, intelligence, and information. In order to evaluate technologies for potential failures, a detailed test methodology and associated structure are required. In this solution, an FPGA board was used as the controller platform, with multiple VHDL circuit controllers, data collection and reporting modules. The structure was demonstrated by …


Developing Network Situational Awareness Through Visualization Of Fused Intrusion Detection System Alerts, Serafin A. Avitia V Jun 2008

Developing Network Situational Awareness Through Visualization Of Fused Intrusion Detection System Alerts, Serafin A. Avitia V

Theses and Dissertations

With networks increasing in physical size, bandwidth, traffic volume, and malicious activity, network analysts are experiencing greater difficulty in developing network situational awareness. Traditionally, network analysts have used Intrusion Detection Systems to gain awareness but this method is outdated when analysts are unable to process the alerts at the rate they are being generated. Analysts are unwittingly placing the computer assets they are charged to protect at risk when they are unable to detect these network attacks. This research effort examines the theory, application, and results of using visualizations of fused alert data to develop network situational awareness. The fused …


A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko Jun 2008

A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko

Theses and Dissertations

With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration. The United States Department of Defense’s (DoD) Network-Centric Enterprise Services initiative, along with the notion of pushing the “power to the edge,” aims to provide end-users with maximum situational awareness, a comprehensive view of the battlespace, all within a secure networking environment. Building from previous AFIT research efforts, this research developed a novel security framework architecture to address the lack of efficient and scalable secure multicasting in the low earth orbit …


Statistical Methods For Image Registration And Denoising, Matthew D. Sambora Jun 2008

Statistical Methods For Image Registration And Denoising, Matthew D. Sambora

Theses and Dissertations

This dissertation describes research into image processing techniques that enhance military operational and support activities. The research extends existing work on image registration by introducing a novel method that exploits local correlations to improve the performance of projection-based image registration algorithms. The dissertation also extends the bounds on image registration performance for both projection-based and full-frame image registration algorithms and extends the Barankin bound from the one-dimensional case to the problem of two-dimensional image registration. It is demonstrated that in some instances, the Cramer-Rao lower bound is an overly-optimistic predictor of image registration performance and that under some conditions, the …


An Analysis Of Botnet Vulnerabilities, Sean W. Hudson Jun 2008

An Analysis Of Botnet Vulnerabilities, Sean W. Hudson

Theses and Dissertations

Botnets are a significant threat to computer networks and data stored on networked computers. The ability to inhibit communication between servers controlling the botnet and individual hosts would be an effective countermeasure. The objective of this research was to find vulnerabilities in Unreal IRCd that could be used to shut down the server. Analysis revealed that Unreal IRCd is a very mature and stable IRC server and no significant vulnerabilities were found. While this research does not eliminate the possibility that a critical vulnerability is present in the Unreal IRCd software, none were identified during this effort.


Time-Frequency Analysis Of Terahertz Radar Signals For Rapit Heart And Breath Rate Detection, Melody L. Massar Jun 2008

Time-Frequency Analysis Of Terahertz Radar Signals For Rapit Heart And Breath Rate Detection, Melody L. Massar

Theses and Dissertations

We develop new time-frequency analytic techniques which facilitate the rapid detection of a person's heart and breath rates from the Doppler shift the movement of their body induces in a terahertz radar signal. In particular, the Doppler shift in the continuous radar return is proportional to the velocity of the person's body. Thus, a time-frequency analysis of the radar return will yield a velocity signal. This signal, in turn, may undergo a second time-frequency analysis to yield any periodic components of the velocity signal, which are often related to the heart and breath rates of the individual. One straightforward means …


Mitigating Reversing Vulnerabilities In .Net Applications Using Virtualized Software Protection, Matthew A. Zimmerman Jun 2008

Mitigating Reversing Vulnerabilities In .Net Applications Using Virtualized Software Protection, Matthew A. Zimmerman

Theses and Dissertations

Protecting intellectual property contained in application source code and preventing tampering with application binaries are both major concerns for software developers. Simply by possessing an application binary, any user is able to attempt to reverse engineer valuable information or produce unanticipated execution results through tampering. As reverse engineering tools become more prevalent, and as the knowledge required to effectively use those tools decreases, applications come under increased attack from malicious users. Emerging development tools such as Microsoft's .NET Application Framework allow diverse source code composed of multiple programming languages to be integrated into a single application binary, but the potential …


Development Of A Night Vision Goggle Heads Up Display For Paratrooper Guidance, Fernando Ontiveros Jun 2008

Development Of A Night Vision Goggle Heads Up Display For Paratrooper Guidance, Fernando Ontiveros

Theses and Dissertations

This thesis provides the proof of concept for the development and implementation of a Global Positioning System (GPS) display via Night Vision Goggles (NVG) Heads-Up Display (HUD) for paratroopers. The system has been designed for soldiers who will be able to utilize the technology in the form of a processing system worn in an ammo pouch and displayed via NVG HUD as a tunnel in the sky. The tunnel in the sky display design is essentially a series of boxes displayed within the goggle's HUD leading the paratrooper to the desired Landing Zone (LZ). The algorithm developed receives GPS and …


Using Hierarchical Temporal Memory For Detecting Anomalous Network Activity, Gerod M. Bonhoff Mar 2008

Using Hierarchical Temporal Memory For Detecting Anomalous Network Activity, Gerod M. Bonhoff

Theses and Dissertations

This thesis explores the nature of cyberspace and forms an argument for it as an intangible world. This research is motivated by the notion of creating intelligently autonomous cybercraft to reside in that environment and maintain domain superiority. Specifically, this paper offers 7 challenges associated with development of intelligent, autonomous cybercraft. The primary focus is an analysis of the claims of a machine learning language called Hierarchical Temporal Memory (HTM). In particular, HTM theory claims to facilitate intelligence in machines via accurate predictions. It further claims to be able to make accurate predictions of unusual worlds, like cyberspace. The research …


Tightly Integrating Optical And Inertial Sensors For Navigation Using The Ukf, Sedat Ebcin Mar 2008

Tightly Integrating Optical And Inertial Sensors For Navigation Using The Ukf, Sedat Ebcin

Theses and Dissertations

The motivation of this research is to address the benefits of tightly integrating optical and inertial sensors where GNSS signals are not available. The research begins with describing the navigation problem. Then, error and measurement models are presented. Given a set of features, a feature detection and projection algorithm is developed which utilizes inertial measurements to predict vectors in the feature space between images. The unscented Kalman filter is applied to the navigation system using the inertial measurements and feature matches to estimate the navigation trajectory. Finally, the image-aided navigation algorithm is tested using a simulation and an experiment. As …


Analysis Of Non-Uniform Gain For Control Of A Deformable Mirror In An Adaptive-Optics System, Kevin P. Vitayaudom Mar 2008

Analysis Of Non-Uniform Gain For Control Of A Deformable Mirror In An Adaptive-Optics System, Kevin P. Vitayaudom

Theses and Dissertations

The Air Force Research Laboratory’s Sodium Guidestar Adaptive Optics for Space Situational Awareness program (NGAS) has sponsored research on spatially non-uniform gain for the servo-loop controller of an adaptive optics (AO) system. The edge subapertures of a Shack-Hartmann wavefront sensor have lower signal-to-noise ratios and are more susceptible to measurement errors than fully illuminated center subapertures. These measurement errors produce errant commands over the corresponding edge actuators and can induce instabilities over these regions in strong turbulence conditions. The objective of this research was to develop and experimentally verify the use of spatially varying gain maps on the servo-loop controller …


Scramjet Fuel Injection Array Optimization Utilizing Mixed Variable Pattern Search With Kriging Surrogates, Bryan Sparkman Mar 2008

Scramjet Fuel Injection Array Optimization Utilizing Mixed Variable Pattern Search With Kriging Surrogates, Bryan Sparkman

Theses and Dissertations

Fuel-air mixing analysis of scramjet aircraft is often performed through ex- perimental research or Computational Fluid Dynamics (cfd) algorithms. Design optimization with these approaches is often impossible under a limited budget due to their high cost per run. This investigation uses jetpen, a known inexpensive analysis tool, to build upon a previous case study of scramjet design optimization. Mixed Variable Pattern Search (mvps) is compared to evolutionary algorithms in the optimization of two scramjet designs. The ¯rst revisits the previously stud- ied approach and compares the quality of mvps to prior results. The second applies mvps to a new scramjet …


What Constitutes An Act Of War In Cyberspace, Kelli S. Kinley Mar 2008

What Constitutes An Act Of War In Cyberspace, Kelli S. Kinley

Theses and Dissertations

In December 2005 a new mission statement was released by the Air Force Leadership, "to deliver sovereign options for the defense of the United States of America and its global interests...to fly and fight in Air, Space and Cyberspace." (Wynne & Mosley, 2005) With the stand up of the AFCYBER command and the use of cyberspace to carry out our daily mission the U.S. needs to have a clear understanding of what war in cyberspace looks like and what the laws are governing war in cyberspace. This research and it's resulting data analysis is intended to provide a better understanding …


Comparing Information Assurance Awareness Training For End-Users: A Content Analysis Examination Of Air Force And Defense Information Systems Agency User Training Modules, John W. Frugé Mar 2008

Comparing Information Assurance Awareness Training For End-Users: A Content Analysis Examination Of Air Force And Defense Information Systems Agency User Training Modules, John W. Frugé

Theses and Dissertations

Today, the threats to information security and assurance are great. While there are many avenues for IT professionals to safeguard against these threats, many times these defenses prove useless against typical system users. Mandated by laws and regulations, all government agencies and most private companies have established information assurance (IA) awareness programs, most of which include user training. Much has been given in the existing literature to laying out the guidance for the roles and responsibilities of IT professionals and higher level managers, but less is specified for "everyday" users of information systems. This thesis attempts to determine the content …


An Evaluation And Implementation Guide For Current Groundwater Mass Flux Measurement Practices, Jack G. Wheeldon Iii Mar 2008

An Evaluation And Implementation Guide For Current Groundwater Mass Flux Measurement Practices, Jack G. Wheeldon Iii

Theses and Dissertations

Contaminant mass flux is an important parameter needed for decision making at sites with contaminated groundwater. New and potentially better methods for measuring mass flux are emerging. This study looks at the conventional transect method (TM), and the newer passive flux meter (PFM), modified integral pump test (MIPT), and tandem circulating well (TCW) methods. In order to facilitate transfer and application of these innovative technologies, it is essential that potential technology users have access to credible information that addresses technology capabilities, limitations, and costs. This study provides such information on each of the methods by reviewing implementation practices and comparing …