Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

PDF

Air Force Institute of Technology

Software engineering

Articles 1 - 30 of 33

Full-Text Articles in Entire DC Network

Analytic Provenance For Software Reverse Engineers, Wayne C. Henry Sep 2020

Analytic Provenance For Software Reverse Engineers, Wayne C. Henry

Theses and Dissertations

Reverse engineering is a time-consuming process essential to software-security tasks such as malware analysis and vulnerability discovery. During the process, an engineer will follow multiple leads to determine how the software functions. The combination of time and possible explanations makes it difficult for the engineers to maintain a context of their findings within the overall task. Analytic provenance tools have demonstrated value in similarly complex fields that require open-ended exploration and hypothesis vetting. However, they have not been explored in the reverse engineering domain. This dissertation presents SensorRE, the first analytic provenance tool designed to support software reverse engineers. A …


Unified Behavior Framework For Discrete Event Simulation Systems, Alexander J. Kamrud Mar 2015

Unified Behavior Framework For Discrete Event Simulation Systems, Alexander J. Kamrud

Theses and Dissertations

Intelligent agents provide simulations a means to add lifelike behavior in place of manned entities. Generally when developed, a single intelligent agent model is chosen, such as rule based, behavior trees, etc. This choice introduces restrictions into what behaviors agents can manifest, and can require significant testing in edge cases. This thesis presents the use of the UBF in the AFSIM environment. The UBF provides the flexibility to implement any and all intelligent agent models, allowing the developer to choose the model he/she feels best fits the experiment at hand. Furthermore, the UBF demonstrates several key software engineering principles through …


Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire Dec 2008

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire

Theses and Dissertations

Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …


Obfuscation Framework Based On Functionally Equivalent Combinatorial Logic Families, Moses C. James Mar 2008

Obfuscation Framework Based On Functionally Equivalent Combinatorial Logic Families, Moses C. James

Theses and Dissertations

This thesis aims to be a few building blocks in the bridge between theoretical and practical software obfuscation that researchers will one day construct. We provide a method for random uniform selection of circuits based on a functional signature and specific construction specifiers. Additionally, this thesis includes the first formal definition of an algorithm that performs only static analysis on a program; that is analysis that does not rely on the input and output behavior of the analyzed program. This is analogous to some techniques used in real-world software reverse engineering. Finally, this thesis uses the equivalent circuit library to …


Inquisitive Pattern Recognition, Amy L. Magnus Mar 2003

Inquisitive Pattern Recognition, Amy L. Magnus

Theses and Dissertations

The Department of Defense and the Department of the Air Force have funded automatic target recognition for several decades with varied success. The foundation of automatic target recognition is based upon pattern recognition. In this work, we present new pattern recognition concepts specifically in the area of classification and propose new techniques that will allow one to determine when a classifier is being arrogant. Clearly arrogance in classification is an undesirable attribute. A human is being arrogant when their expressed conviction in a decision overstates their actual experience in making similar decisions. Likewise given an input feature vector, we say …


The Generalizability Of Private Sector Research On Software Project Management In Two Usaf Organizations: An Exploratory Study, Michael R. Garman Mar 2003

The Generalizability Of Private Sector Research On Software Project Management In Two Usaf Organizations: An Exploratory Study, Michael R. Garman

Theses and Dissertations

Project managers typically set three success criteria for their projects: meet specifications, be on time, and be on budget. However, software projects frequently fail to meet these criteria. Software engineers, acquisition officers, and project managers have all studied this issue and made recommendations for achieving success. But most of this research in peer reviewed journals has focused on the private sector. Researchers have also identified software acquisitions as one of the major differences between the private sector and public sector MIS. This indicates that the elements for a successful software project in the public sector may be different from the …


Visual Execution Analysis For Multiagent Systems, Chong Kil Aug 2002

Visual Execution Analysis For Multiagent Systems, Chong Kil

Theses and Dissertations

Multiagent systems have become increasingly important in developing complex software systems. Multiagent systems introduce collective intelligence and provide benefits such as flexibility, scalability, decentralization, and increased reliability. A software agent is a high-level software abstraction that is capable of performing given tasks in an environment without human intervention. Although multiagent systems provide a convenient and powerful way to organize complex software systems, developing such system is very complicated. To help manage this complexity this research develops a methodology and technique for analyzing, monitoring and troubleshooting multiagent systems execution. This is accomplished by visualizing a multiagent system at multiple levels of …


Suitability Of Unidata Metapps For Incorporation In Platform-Independent User-Customized Aviation Weather Products Generation Software, Harmen P. Visser Mar 2002

Suitability Of Unidata Metapps For Incorporation In Platform-Independent User-Customized Aviation Weather Products Generation Software, Harmen P. Visser

Theses and Dissertations

The Air Force Combat Climatology Center (AFCCC) is tasked to provide long-range seasonal forecasts for worldwide locations. Currently, the best long-range temperature forecasts the weather community has are the climatological standard normals. This study creates a stepping-stone into the solution of long-range forecasting by finding a process to predict temperatures better than those using climatological standard normals or simple frequency distributions of occurrences. Northern Hemispheric teleconnection indices and the standardized Southern Oscillation index are statistically compared to three-month summed Heating Degree Days (HDDs) and Cooling Degree Days (CDDs) at 14 U.S. locations. First, linear regression was accomplished. The results showed …


Design And Specification Of Dynamic, Mobile And Reconfigurable Multiagent Systems, Athie L. Self Mar 2001

Design And Specification Of Dynamic, Mobile And Reconfigurable Multiagent Systems, Athie L. Self

Theses and Dissertations

Multiagent Systems use the power of collaborative software agents to solve complex distributed problems. There are many Agent-Oriented Software Engineering (AOSE) methodologies available to assist system designers to create multiagent systems. However, none of these methodologies can specify agents with dynamic properties such as cloning, mobility or agent instantiation. This thesis starts the process to bridge the gap between AOSE methodologies and dynamic agent platforms by incorporating mobility into the current Multiagent Systems Engineering (MaSE) methodology. Mobility was specified within all components composing a mobile agent class. An agent component was also created that integrated the behavior of the components …


Selecting A Software Engineering Methodology Using Multiobjective Decision Analysis, Scott A. O'Malley Mar 2001

Selecting A Software Engineering Methodology Using Multiobjective Decision Analysis, Scott A. O'Malley

Theses and Dissertations

With the emergence of agent-oriented software engineering methodologies, software developers have a new set of tools to solve complex software requirements. One problem software developers face is to determine which methodology is the best approach to take to developing a solution. A number of factors go into the decision process. This thesis defines a decision making process that can be used by a software engineer to determine whether or not a software engineering approach is an appropriate system development strategy. This decision analysis process allows the software engineer to classify and evaluate a set of methodologies while specifically considering the …


Transforming Analysis Models Into Design Models For The Multiagent Engineering Systems (Mase) Methodology, Clint H. Sparkman Mar 2001

Transforming Analysis Models Into Design Models For The Multiagent Engineering Systems (Mase) Methodology, Clint H. Sparkman

Theses and Dissertations

Agent technology has received much attention in the last few years because of the advantages that multiagent systems have in complex, distributed environments. For multiagent systems are to be effective, they must be reliable, robust, and secure. AFIT's Agent Research Group has developed a complete lifecycle methodology, called Multiagent Systems Engineering (MaSE), for analyzing, designing, and developing heterogeneous multiagent systems. However, developing multiagent systems is a complicated process, and there is no guarantee that the resulting system meets the initial requirements and will operate reliably with the desired behavior. The purpose of this research was to develop a semi-automated formal …


Distributed Object System Engineering For Terminal Aerodrome Forecast Validation And Metrics Processing, James S. Douglas Mar 2000

Distributed Object System Engineering For Terminal Aerodrome Forecast Validation And Metrics Processing, James S. Douglas

Theses and Dissertations

Distributed object systems are a very complex intertwining of heterogeneous hardware, software, and operating systems coupled with communication networks of varying protocols and capacities. Distributed components offer improved performance through parallel processing, improved expansion and scalability opportunities through modularity, improved availability through replication, and improved resource sharing and interoperability through interconnection. This research provides a distributed system design methodology to validate terminal forecasts and gather metrics for the Air Force Weather Agency. Proven principles such as component reuse and architectural development are applied through the use of parameterized types and design patterns. A client/server measurement model is developed to show …


An Object-Oriented Repository-Based Software Synthesis System, Gary L. Cornn Jr. Mar 2000

An Object-Oriented Repository-Based Software Synthesis System, Gary L. Cornn Jr.

Theses and Dissertations

This research provides a repository on which various Air Force Institute of Technology (AFIT) transformational software synthesis tools can store, share, and manage data using a common repository information model. This information model was created by integrating a variety of separately developed AFIT software synthesis object models into a "wide-spectrum" model. Additionally, a methodology for describing complex relationships between artifacts in the repository is described. These relationships can be used to relate software synthesis artifacts created in a variety of formats, including text, binary, and the AFIT Wide-Spectrum Object Modeling Environment (AWSOME) information model. The relationships can be exploited for …


Generating Executable Persistent Data Storage/Retrieval Code From Object-Oriented Specifications, Steven R. Buckwalter Mar 2000

Generating Executable Persistent Data Storage/Retrieval Code From Object-Oriented Specifications, Steven R. Buckwalter

Theses and Dissertations

This research creates a methodology and corresponding prototype for the transformation of object-oriented (OO) specifications to represent the corresponding relational schemas that are used to automatically generate database design language (DDL). The transformation design decisions and specifications are then used to generate database manipulation language (DML) that can be embedded within the software application code generated from the same OO specifications. This concept of developing a model for producing compilable and executable code from formal software specifications has long been a goal of software engineers. Previous research at the Air Force Institute of Technology (AFIT) has not focused on the …


Transforming Aggregate Object-Oriented Formal Specifications To Code, John A. Kissack Mar 1999

Transforming Aggregate Object-Oriented Formal Specifications To Code, John A. Kissack

Theses and Dissertations

The feasibility of a transformational formal-based software engineering tool has been the focus of AFIT research for several years. Until now, the main research emphasis has been placed on the individual components that would comprise such a transformational system; therefore, this research demonstrates how a representative collection of aggregate objects would be transformed from specification to code. The research focused on critical integration issues associated with a formal-based software transformation system, such as the source specification, the problem space architecture, design architecture, design transforms, and target software transforms. Software is critical in today's Air Force, yet its specification, design, and …


Graphical User Interface And Microprocessor Control Enhancement Of A Pseudorandom Code Generator, John M. Kos Mar 1999

Graphical User Interface And Microprocessor Control Enhancement Of A Pseudorandom Code Generator, John M. Kos

Theses and Dissertations

Modern digital communication techniques often require the generation of pseudorandom numbers or sequences. The ability to quickly and easily produce various codes such as maximal length codes, Gold codes, Jet Propulsion Laboratory ranging codes, syncopated codes, and non-linear codes in a laboratory environment is essential. This thesis addresses the issue of providing automated computer control to previously built, manually controlled hardware incorporating the Stanford Telecom STEL-1032 Pseudo-Random Number (PRN) Coder. By incorporating a microcontroller into existing hardware, the STEL-1032 can now be conveniently controlled from a MATLAB Graphical User Interface (GUI). The user can quickly create, save, and recall various …


A Web-Based Prototype For Afit Edplan Administration, Tien-Chen Lee Dec 1998

A Web-Based Prototype For Afit Edplan Administration, Tien-Chen Lee

Theses and Dissertations

This document details the design, development, and evaluation of a prototype course registration and reporting system for the students and faculty of the United States Air Force Institute of Technology. The web-based system provides HTML-based client interfaces and Active Server Page server processes for interaction with the relational databases used to manage course and personnel data. The system prototype was developed following the "Engineering Software Components for Web-Database Access" methodology of Dipiro. A survey of modern web-based database access techniques is first provided and Dipiro's methodology is reviewed as background. The remainder of the document details the application of the …


A Decision Theoretic Approach For Interface Agent Development, Scott M. Brown Sep 1998

A Decision Theoretic Approach For Interface Agent Development, Scott M. Brown

Theses and Dissertations

The complexity of current software applications is overwhelming users. The need exists for intelligent interface agents to address the problem of increasing taskload that is overwhelming the human user. Interface agents could help alleviate user taskload by extracting and analyzing relevant information, and providing information abstractions of that information, and providing timely, beneficial assistance to users. These agents could communicate with the user through the existing user interface and also adapt to user needs and behaviors. Central to providing assistance to a user is the issue of correctly determining the user's intent. This dissertation presents an effective, efficient, and extensible …


An Advanced Visualization Method For An Operations Research Analysis, Steven C. Oimoen Mar 1998

An Advanced Visualization Method For An Operations Research Analysis, Steven C. Oimoen

Theses and Dissertations

Visualizing multidimensional data using only two dimensions and conventional visualization techniques limits the understanding of the data set. Underlying structures or patterns within the data can easily go unnoticed. In order to gain additional insight into an analysis, incorporation of visualization and multidimensional graphics into the analysis results should be accomplished. The results must ensure that the information portrayed is not misleading or misunderstood. The integrity of the data must be preserved throughout the transformation. The primary objective of this research effort is to identify techniques to visualize multidimensional data and then develop a software tool to display the multidimensional …


Methodology For The Analysis And Design Of Internet Software Components Providing Relational Database Access Through The World Wide Web, Daniel L. Dipiro Mar 1998

Methodology For The Analysis And Design Of Internet Software Components Providing Relational Database Access Through The World Wide Web, Daniel L. Dipiro

Theses and Dissertations

This work examines the application of Internet software technologies to provide access to remote relational databases via the World Wide Web. The research applies these software technologies to assist the Air Force Institute of Technology Civilian Institute Program in improving operations and student to staff communication. An analysis of the existing Internet software technologies revealed several competing technologies capable of performing the same database access functions. The analysis further revealed weaknesses and inconsistencies in the existing AFIT/CI database. A methodology is proposed to assist in analyzing an existing development environment and in selecting among the competing technologies to provide the …


A Representational Approach To Knowledge And Multiple Skill Levels For Broad Classes Of Computer Generated Forces, Larry J. Hutson Dec 1997

A Representational Approach To Knowledge And Multiple Skill Levels For Broad Classes Of Computer Generated Forces, Larry J. Hutson

Theses and Dissertations

Current computer generated forces (CGFs) in the 'synthetic battlespace', a training arena used by the military, exhibit several deficiencies. Human actors within the battlespace rapidly identify these CGFs and defeat them using unrealistic and potentially fatal tactics, reducing the overall effectiveness of this training arena. Simulators attached to the synthetic battlespace host local threat systems, leading to training inconsistencies when different simulators display the same threat at different levels of fidelity. Finally, current CGFs are engineered 'from the ground up', often without exploiting commonalities with other existing CGFs, increasing development (and ultimately training) costs. This thesis addresses these issues by …


Calibration Of The Softcost-R Software Cost Model To The Space And Missile Systems Center (Smc) Software Database (Swdb), Steven V. Southwell Sep 1996

Calibration Of The Softcost-R Software Cost Model To The Space And Missile Systems Center (Smc) Software Database (Swdb), Steven V. Southwell

Theses and Dissertations

The rising number and importance of Department of Defense software developments, when combined with declining defense budgets, has resulted in a critical need to accurately plan and manage software development costs and schedules. Unfortunately, the increasing size, complexity, and diversity of these software developments has made accurate estimating problematic. Uncalibrated software cost models have not generally produced reliable results due to generic default parameters and improper usage. The default parameters cannot hope to accurately represent and predict the wide variability of software efforts to which the models are being applied. However, some of the models have achieved improved accuracy by …


An Object-Oriented, Formal Methods Approach To Organizational Process Modeling, Vincent S. Hibdon Dec 1995

An Object-Oriented, Formal Methods Approach To Organizational Process Modeling, Vincent S. Hibdon

Theses and Dissertations

This document presents a methodology for developing an organizational process model which is based on the principles of object oriented design and formal software engineering methods. The methodology begins with the development of an object oriented Rumbaugh model (27). The Rumbaugh model is then formally specified in Z (Zed) schemas. Finally, the Z specifications are translated into an executable model in the Software Refinery Environment(TM). This model is described based on the AF wing domain and developed in this domain. The proposed methodology is then shown to produce a very general model which is extendable across almost any domain. The …


Transforming Algebraically-Based Object Models Into A Canonical Form For Design Refinement, Charles G. Beem Dec 1995

Transforming Algebraically-Based Object Models Into A Canonical Form For Design Refinement, Charles G. Beem

Theses and Dissertations

The understandability of object-oriented design techniques and the rigor of formal methods have improved the state of software development; however, both ideas have limitations. Object-oriented techniques, which are semi-formal, can still result in incorrect designs, while formal methods are complex and require an extensive mathematical background. The two approaches can be coupled, however, to produce designs that are both understandable and verifiable, and to produce executable code. This research proposes an approach where object-oriented models are first represented algebraically in a formal specification language such as LARCH and then transformed into a canonical form suitable for design refinement. In the …


Formal Foundations For The Specification Of Software Architecture, Mark J. Gerken Mar 1995

Formal Foundations For The Specification Of Software Architecture, Mark J. Gerken

Theses and Dissertations

This investigation establishes a formal foundation for software architecture that allows for the specification of large, non-trivial software systems using well founded, consistency preserving construction techniques. Two fundamental problems were addressed: how to define and express architectures formally using the concept of theories, and how architecture theories can be practically applied in specification construction. The initial stages of this investigation sought to establish a formal, mathematical relationship between functional specifications of behavior and specifications defining system structure. Experimental results lead to the conclusion that architectures defining the structure of functional operations can be defined using functional logic, but more complex …


Analysis And Extension Of Model-Based Software Executives, Keith E. Lewis Jan 1995

Analysis And Extension Of Model-Based Software Executives, Keith E. Lewis

Theses and Dissertations

This research developed a comprehensive description of the simulation environment of Architect, a domain-oriented application composition system being developed at the Air Force Institute of Technology to explore new software engineering technologies. The description combines information from several previous research efforts and Architect's source code into a single, comprehensive document. A critical evaluation of the simulation environment was also performed, identifying improvements and modifications that enhance Architecture's application execution capabilities by reducing complexity and execution time. The analysis was then taken one step further and presented extensions to the current simulation environment. The extensions included investigating the feasibility of mixed-mode …


Multiple Model Adaptive Estimation And Head Motion Tracking In A Virtual Environment: An Engineering Approach, James E. Russell Dec 1994

Multiple Model Adaptive Estimation And Head Motion Tracking In A Virtual Environment: An Engineering Approach, James E. Russell

Theses and Dissertations

Software engineering tools and techniques were applied to design and implement an application that reduces lag typically present in virtual environment displays. The application was a Multiple Model Adaptive Estimator (MMAE), composed of three Kalman filters, that predicted head orientation one sample period into the future. The environment rendering software used these predictions to generate the environment display. Each of the filters in the MMAE was designed for a different assumed head motion type (benign, moderate, or heavy), which allowed the MMAE to adapt to changes in head movement characteristics. The use of Ada 9X as an implementation language for …


Modeiing Operational Task Assignment In Air Force Wing Command And Control, Robert J. Hunt Dec 1994

Modeiing Operational Task Assignment In Air Force Wing Command And Control, Robert J. Hunt

Theses and Dissertations

This research investigated the feasibility of applying software engineering technology to the Air Force wing command and control (C2) domain. As part of this research, domain analysis and object-oriented techniques were investigated and a specific approach was chosen to analyze the domain. Analysis of the domain resulted in an object-oriented domain model that captured the key objects, operations, and associations, and behavior of wing C2. The domain model was used to design and implement a prototype software tool that enables wing decision makers to assign resources to mission tasks and to make assessments about automation's impact on wing C2 operations.


Using Database Technology To Support Domain-Oriented Application Composition Systems, Danny A. Cecil, Joseph A. Fullenkamp Dec 1993

Using Database Technology To Support Domain-Oriented Application Composition Systems, Danny A. Cecil, Joseph A. Fullenkamp

Theses and Dissertations

This research designed and prototyped an OODBMS technology base to store and retrieve various types of domain artifacts for domain-oriented application composition systems (DOACS). We developed object-oriented database schemas for a validating domain and the Object-Connection-Update software architecture. We implemented an inheritance relationship between the schemas so a domain model can inherit an architectural structure from an architecture model allowing us to isolate domain-specific knowledge from architecture-specific knowledge. We also developed a meta-model to formally define domain models in the database. We then developed a set of database methods to transform a domain model into a database schema for storing …


Alternative Architectures For Domain-Oriented Application Composition And Generation Systems, Warren E. Gool Dec 1993

Alternative Architectures For Domain-Oriented Application Composition And Generation Systems, Warren E. Gool

Theses and Dissertations

This thesis presents a formalized framework for comparing the structure and semantics of software architectures. The framework uses object diagrams for analyzing the structure of the architectures and the axiomatic approach for analyzing the semantics. This framework is used to compare the Object Connection Update OCU model developed by the Software Engineering Institute against four other software architectures VHDL defined by Lipsett, MetaH defined by Honeywell, microRapide defined by Luckham, and hierarchical software systems as defined by Batory. The goal of the comparison was to evaluate the OCU model for suitability within prototype application composition and generation systems. This research …