Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 79

Full-Text Articles in Entire DC Network

Electroluminescence Studies On Longwavelength Indium Arsenide Quantum Dot Microcavities Grown On Gallium Arsenide, John C. Ramsey Dec 2011

Electroluminescence Studies On Longwavelength Indium Arsenide Quantum Dot Microcavities Grown On Gallium Arsenide, John C. Ramsey

Theses and Dissertations

A comprehensive study of the electroluminescence of four GaAs/AlGaAs microcavity devices with InAs/GaInAs quantum dot active regions emitting near 1.3 µm was conducted. The four molecular beam epitaxial grown samples with AlAs oxide aperture confinement layers were fabricated, characterized, and optically modeled. Optical power transmission of the samples was modeled using Matlab and compared with measured transmission data. Resonant cavity light emitting diodes (RCLEDs) and three vertical cavity surface emitting laser (VCSEL) samples were fabricated and electro-optically characterized over a range of injection currents and temperatures. Devices achieved continuous wave room temperature lasing at 1.28 µm with an output power …


Kinetics Of The Electrical Discharge Pumped Oxygen-Iodine Laser, Matthew A. Lange Dec 2011

Kinetics Of The Electrical Discharge Pumped Oxygen-Iodine Laser, Matthew A. Lange

Theses and Dissertations

A systematic study of microwave discharges at 2.45 GHz has been performed through the pressure range of sustainable electric discharges in pure oxygen flows of 2 to 10 Torr. A corresponding study of 13.56 MHz has also been performed at pressures of 2, 4, and 7 Torr. Optical emissions from O2(a 1Δ), O2(b 1Σ), and O-atoms have been measured from the center of a μ-wave discharge. Discharge residence times from 0.1 to 5 ms have been reported. The O2(b 1Σ) emissions, with a spectral resolution of 0.01 nm, have been used to measure the temperature of the gas, which typically …


Characterization And Discrimination Of Large Caliber Gun Blast And Flash Signatures, Bryan J. Steward Dec 2011

Characterization And Discrimination Of Large Caliber Gun Blast And Flash Signatures, Bryan J. Steward

Theses and Dissertations

Two hundred and one firings of three 152 mm howitzer munitions were observed to characterize firing signatures of a large caliber gun. Muzzle blast expansion was observed with high-speed (1600 Hz) optical imagery. The trajectory of the blast front was well approximated by a modified point-blast model described by constant rate of energy deposition. Visible and near-infrared (450 - 850 nm) spectra of secondary combustion were acquired at 0.75 nm spectral resolution and depict strong contaminant emissions including Li, Na, K, Cu, and Ca. The O2 (X-b) absorption band is evident in the blue wing of the potassium D lines …


Background-Oriented Schlieren Pattern Optimization, Jeffery E. Hartberger Dec 2011

Background-Oriented Schlieren Pattern Optimization, Jeffery E. Hartberger

Theses and Dissertations

This paper describes a test series to investigate background patterns used for the Background-Oriented Schlieren field density measurement technique. Several varying background patterns were substituted under similar fluid density conditions to visualize and isolate the effects of patterns in the background images. A qualitative comparison was completed of the flow visualization results of each background pattern to categorize background conditions that improved the flow visualization image. Changes in background patterns revealed significant changes in flow visualization. Pattern contrast, spacing and sizing all played large parts in the quality of the visual density gradient imaging during the test series.


An Empirical Analysis Of The Cascade Secret Key Reconciliation Protocol For Quantum Key Distribution, Timothy I. Calver Sep 2011

An Empirical Analysis Of The Cascade Secret Key Reconciliation Protocol For Quantum Key Distribution, Timothy I. Calver

Theses and Dissertations

The need to share key material with authorized entities in a secure, efficient and timely manner has driven efforts to develop new key distribution methods. The most promising method is Quantum Key Distribution (QKD) and is considered to be “unconditionally secure” because it relies upon the immutable laws of quantum physics rather than computational complexity. Unfortunately, the nonidealities present in actual implementations of QKD systems also result in errors manifested in the quantum data channel. As a consequence, an important component of any QKD system is the error reconciliation protocol which is used to identify and correct inconsistencies in the …


Distributed Spacing Stochastic Feature Selection And Its Application To Textile Classification, Jeffrey D. Clark Sep 2011

Distributed Spacing Stochastic Feature Selection And Its Application To Textile Classification, Jeffrey D. Clark

Theses and Dissertations

Many situations require the need to quickly and accurately locate dismounted individuals in a variety of environments. In conjunction with other dismount detection techniques, being able to detect and classify clothing (textiles) provides a more comprehensive and complete dismount characterization capability. Because textile classification depends on distinguishing between different material types, hyperspectral data, which consists of several hundred spectral channels sampled from a continuous electromagnetic spectrum, is used as a data source. However, a hyperspectral image generates vast amounts of information and can be computationally intractable to analyze. A primary means to reduce the computational complexity is to use feature …


A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube Sep 2011

A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube

Theses and Dissertations

The rapid transition of critical business processes to computer networks potentially exposes organizations to digital theft or corruption by advanced competitors. One tool used for these tasks is malware, because it circumvents legitimate authentication mechanisms. Malware is an epidemic problem for organizations of all types. This research proposes and evaluates a novel Malware Target Recognition (MaTR) architecture for malware detection and identification of propagation methods and payloads to enhance situation awareness in tactical scenarios using non-instruction-based, static heuristic features. MaTR achieves a 99.92% detection accuracy on known malware with false positive and false negative rates of 8.73e-4 and 8.03e-4 respectively. …


Phase History Decomposition For Efficient Scatterer Classification In Sar Imagery, Dane F. Fuller Sep 2011

Phase History Decomposition For Efficient Scatterer Classification In Sar Imagery, Dane F. Fuller

Theses and Dissertations

A new theory and algorithm for scatterer classification in SAR imagery is presented. The automated classification process is operationally efficient compared to existing image segmentation methods requiring human supervision. The algorithm reconstructs coarse resolution subimages from subdomains of the SAR phase history. It analyzes local peaks in the subimages to determine locations and geometric shapes of scatterers in the scene. Scatterer locations are indicated by the presence of a stable peak in all subimages for a given subaperture, while scatterer shapes are indicated by changes in pixel intensity. A new multi-peak model is developed from physical models of electromagnetic scattering …


Detecting Man-In-The-Middle Attacks Against Transport Layer Security Connections With Timing Analysis, Lauren M. Wagoner Sep 2011

Detecting Man-In-The-Middle Attacks Against Transport Layer Security Connections With Timing Analysis, Lauren M. Wagoner

Theses and Dissertations

The Transport Layer Security (TLS) protocol is a vital component to the protection of data as it traverses across networks. From e-commerce websites to Virtual Private Networks (VPNs), TLS protects massive amounts of private information, and protecting this data from Man-in-the-Middle (MitM) attacks is imperative to keeping the information secure. This thesis illustrates how an attacker can successfully perform a MitM attack against a TLS connection without alerting the user to his activities. By deceiving the client machine into using a false certificate, an attacker takes away the only active defense mechanism a user has against a MitM. The goal …


Integrated Approach To Free Space Optical Communications In Strong Turbulence, Jason A. Tellez Sep 2011

Integrated Approach To Free Space Optical Communications In Strong Turbulence, Jason A. Tellez

Theses and Dissertations

The propagation of a free space optical communication signal through atmospheric turbulence experiences random fluctuations in intensity, including signal fades which negatively impact the communications link performance. This research develops an analytical probability density function (PDF) to model the best case scenario of using multiple independent beams to reduce the intensity fluctuations. The PDF was further developed to account for partially correlated beams, such as would be experienced by beams having finite separation. The PDF was validated with results obtained from digital simulations as well as lab experiments. The research showed that as the number of transmitted beams increases the …


Modeling Self-Referencing Interferometers With Extended Beacons And Strong Turbulence, Daniel J. Wheeler Sep 2011

Modeling Self-Referencing Interferometers With Extended Beacons And Strong Turbulence, Daniel J. Wheeler

Theses and Dissertations

The overall purpose of this research was to better understand the performance of a self-referencing interferometer (SRI) when used with extended beacons in strong atmospheric turbulence. It was performed by assuming the extended beacon could be modeled as a Gaussian Schell-model beam, then analyzing the effect of propagating this beam through strong atmospheric turbulence. Since the operation of an SRI requires coupling this light into a single-mode optical fiber, analytic expressions of the mean and normalized variance of the coupling efficiency were derived. An improved noise model for the SRI was then developed that included all potential noise sources such …


Verification Of Global Assimilation Of Ionospheric Measurements Gauss Markov (Gaim-Gm) Model Forecast Accuracy, Paul H. Domm Sep 2011

Verification Of Global Assimilation Of Ionospheric Measurements Gauss Markov (Gaim-Gm) Model Forecast Accuracy, Paul H. Domm

Theses and Dissertations

GAIM-GM is an operational Kalman filter data assimilation model of the ionosphere that can assimilate data from GPS total electron content (TEC), ionosonde electron density profiles, and satellite based in situ electron densities. The Air Force Weather Agency (AFWA) uses GAIM-GM to specify and forecast the ionosphere. An in depth investigation into the accuracy of these forecasts has not been completed. GAIM-GM output obtained from four cases run from combinations of geomagnetic and solar activity was used to determine GAIM-GM forecast accuracy. Forecast accuracy was determined through the use of a skill score as well as other statistical tools to …


Assessment Of The Effects Of Plasma Bubbles On Gaim-Gm, Kenneth R. Fenton Sep 2011

Assessment Of The Effects Of Plasma Bubbles On Gaim-Gm, Kenneth R. Fenton

Theses and Dissertations

Plasma bubbles are regions of depleted plasma density generated in the post-sunset equatorial region of the ionosphere. Bubbles significantly affect total electron count (TEC) and consequently alter communication and navigation capabilities. Here, the Global Assimilation of Ionospheric Measurements Gauss-Markov (GAIM-GM) model is studied in order to assess its capability to accurately model equatorial plasma bubbles. GAIM-GM uses the Ionospheric Forecast Model (IFM) as a background state modified through the application of a Kalman Filter to incorporate ionospheric observations such as Global Positioning System (GPS) total electron content (TEC) values. GPS TEC values representative of plasma bubble conditions are modeled and …


The Effects Of Rare Earth Doping On Gallium Nitride Thin Films, Stephen R. Mchale Sep 2011

The Effects Of Rare Earth Doping On Gallium Nitride Thin Films, Stephen R. Mchale

Theses and Dissertations

The thermal neutron capture cross section of the rare earth (RE) metal isotope Gd-157 is the largest of all known natural elements, which distinguishes the material as a logical candidate for neutron detection. To address an incomplete understanding of rare earth doped Gallium Nitride (GaN) materials, investigations of the surface electronic structure and interface properties of GaN thin films doped with rare earths (Yb, Er, Gd) were undertaken. Lattice ion occupation, bonding, rare earth 4f occupation, and gold Schottky barrier formation were examined using synchrotron photoemission spectroscopy. Measured Debye temperatures indicate substitutional occupation of Ga sites by RE ions. The …


Source Normalization Constants For Ground Distributed Fallout Fields, Justin M. Smith Sep 2011

Source Normalization Constants For Ground Distributed Fallout Fields, Justin M. Smith

Theses and Dissertations

Five assumptions regarding a first order model developed to calculate dose rate at a detector above a fallout field are analyzed. The omission of scattering is relaxed by the method of successive scatters resulting in a build up factor of 1.1. The use of a single average photon energy to represent a fallout distribution is analyzed using the Oak Ridge National Laboratory Isotope Generator (ORIGEN) Fallout Analysis Tool. An average photon energy of 0.81MeV is calculated and shown to be an accurate approximation of the fallout field energy distribution. A Gaussian distribution is used to calculate the minimal impact of …


Effect Of Storm Enhanced Densities On Geo-Location Accuracy Over Conus, Lindon H. Steadman Sep 2011

Effect Of Storm Enhanced Densities On Geo-Location Accuracy Over Conus, Lindon H. Steadman

Theses and Dissertations

Storm enhanced densities (SEDs) are ionospheric plasma enhancements that disrupt radio communications in the near-Earth space environment, degrading the Global Positioning System (GPS) and other key technologies. Accurate GPS/total electron content (TEC) correction maps produced by ionosphere models can mitigate degradations from SEDs. An artificial SED was created and ingested via slant TEC measurements into the Global Assimilation of Ionospheric Measurements Gauss-Markov Kalman Filter Model to determine how many ground GPS receivers are needed to produce reliable GPS/TEC correction maps over the continental United States during geomagnetic storming. It was found that 110 well-positioned GPS receivers produced the best overall …


Non-Adiabatic Atomic Transitions: Computational Cross Section Calculations Of Alkali Metal-Noble Gas Collisions, Charlton D. Lewis Ii Sep 2011

Non-Adiabatic Atomic Transitions: Computational Cross Section Calculations Of Alkali Metal-Noble Gas Collisions, Charlton D. Lewis Ii

Theses and Dissertations

Diode Pumped Alkali Lasers operate by exciting a gaseous cell of alkali metal to its P3/2 excited energy state. A noble gas, present in the cell, collisionally de-excites the alkali metal to its P1/2 state. The alkali atoms then relax to their S1/2 ground state by emitting photons. The non-radiative de-excitation due to inert gas atoms represents an interesting juncture for DPALs operation. This process must be faster than the radiative relaxation back to the S1/2 state for lasing to occur. The rate of non-radiative de-excitation is related to the collisional cross section and the cross …


Analysis Of Transient Electromagnetic Scattering From An Overfilled Cavity Embedded In An Impedance Ground Plane, Robert S. Callihan Sep 2011

Analysis Of Transient Electromagnetic Scattering From An Overfilled Cavity Embedded In An Impedance Ground Plane, Robert S. Callihan

Theses and Dissertations

We consider the transient, or time-domain, scattering problem of a two-dimensional overfilled cavity embedded in an impedance ground plane. This problem is a significant advancement from previous work where more simplified boundary conditions were used, which can limit the number of applications. This research supports a wide range of military applications such as the study of cavity-like structures on aircraft and vehicles. More importantly, this research helps detect the biggest threat on today's battlefield: improvised explosive devices. An important step in solving the problem is introducing an artificial boundary condition on a semicircle enclosing the cavity; this couples the fields …


Hyperspectral-Based Adaptive Matched Filter Detector Error As A Function Of Atmospheric Profile Estimation, Allan W. Yarbrough Sep 2011

Hyperspectral-Based Adaptive Matched Filter Detector Error As A Function Of Atmospheric Profile Estimation, Allan W. Yarbrough

Theses and Dissertations

Hyperspectral imagery is collected as radiance data. This data is a function of multiple variables: the radiation profile of the light source, the reflectance of the target, and the absorption and scattering profile of the medium through which the radiation travels as it reflects off the target and reaches the imager. Accurate target detection requires that the collected image matches as closely as possible the known "true" target in the classification database. Therefore, the effect of the radiation source and the atmosphere must be removed before detection is attempted. While the spectrum of solar light is relatively stable, the effect …


Combinational Circuit Obfuscation Through Power Signature Manipulation, Hyunchul Ko Jun 2011

Combinational Circuit Obfuscation Through Power Signature Manipulation, Hyunchul Ko

Theses and Dissertations

Today's military systems are composed of hardware and software systems, many of which are critical technologies, and must be protected to ensure our adversaries cannot gain any information from a various analysis attacks. Side Channel Analysis (SCA) attacks allow an attacker to gain the significant information from the measured signatures leaked by side-channels such as power consumption, and electro-magnetic emission. In this research the focus on detecting, characterizing, and manipulating the power signature by designing a power signature estimation and manipulation method. This research has determined that the proposed method capable of characterizing and altering the type of power signature …


Optical Flow-Based Odometry For Underground Tunnel Exploration, Terra Kier Jun 2011

Optical Flow-Based Odometry For Underground Tunnel Exploration, Terra Kier

Theses and Dissertations

As military operations in degraded or GPS-denied environments continue to increase in frequency and importance, there is an increased necessity to be able to determine precision location within these environments. Furthermore, authorities are finding a record number of tunnels along the U.S.-Mexico border; therefore, underground tunnel characterization is becoming a high priority for U.S. Homeland Security as well. This thesis investigates the performance of a new image registration technique based on a two camera optical- flow configuration using phase correlation techniques. These techniques differ from other image based navigation methods but present a viable alternative increasing autonomy and answering the …


Context Aided Tracking With Adaptive Hyperspectral Imagery, Andrew C. Rice Jun 2011

Context Aided Tracking With Adaptive Hyperspectral Imagery, Andrew C. Rice

Theses and Dissertations

A methodology for the context-aided tracking of ground vehicles in remote airborne imagery is developed in which a background model is inferred from hyperspectral imagery. The materials comprising the background of a scene are remotely identified and lead to this model. Two model formation processes are developed: a manual method, and method that exploits an emerging adaptive, multiple-object-spectrometer instrument. A semi-automated background modeling approach is shown to arrive at a reasonable background model with minimal operator intervention. A novel, adaptive, and autonomous approach uses a new type of adaptive hyperspectral sensor, and converges to a 66% correct background model in …


Estimating Anthropometric Marker Locations From 3-D Ladar Point Clouds, Matthew J. Maier Jun 2011

Estimating Anthropometric Marker Locations From 3-D Ladar Point Clouds, Matthew J. Maier

Theses and Dissertations

An area of interest for improving the identification portion of the system is in extracting anthropometric markers from a Laser Detection and Ranging (LADAR) point cloud. Analyzing anthropometrics markers is a common means of studying how a human moves and has been shown to provide good results in determining certain demographic information about the subject. This research examines a marker extraction method utilizing principal component analysis (PCA), self-organizing maps (SOM), alpha hulls, and basic anthropometric knowledge. The performance of the extraction algorithm is tested by performing gender classification with the calculated markers.


Software And Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert Mar 2011

Software And Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert

Theses and Dissertations

Side Channel Analysis (SCA) is a method by which an adversary can gather information about a processor by examining the activity being done on a microchip though the environment surrounding the chip. Side Channel Analysis attacks use SCA to attack a microcontroller when it is processing cryptographic code, and can allow an attacker to gain secret information, like a crypto-algorithm's key. The purpose of this thesis is to test proposed dynamic hardware methods to increase the hardware security of a microprocessor such that the software code being run on the microprocessor can be made more secure without having to change …


Spear Phishing Attack Detection, David T. Merritt Mar 2011

Spear Phishing Attack Detection, David T. Merritt

Theses and Dissertations

This thesis addresses the problem of identifying email spear phishing attacks, which are indicative of cyber espionage. Spear phishing consists of targeted emails sent to entice a victim to open a malicious file attachment or click on a malicious link that leads to a compromise of their computer. Current detection methods fail to detect emails of this kind consistently. The SPEar phishing Attack Detection system (SPEAD) is developed to analyze all incoming emails on a network for the presence of spear phishing attacks. SPEAD analyzes the following file types: Windows Portable Executable and Common Object File Format (PE/COFF), Adobe Reader, …


Diffusion Of Rubidium Vapor Through Hollow-Core Fibers For Gas-Phase Fiber Lasers, Eric M. Guild Mar 2011

Diffusion Of Rubidium Vapor Through Hollow-Core Fibers For Gas-Phase Fiber Lasers, Eric M. Guild

Theses and Dissertations

This work examines the diffusion of rubidium through a small diameter tube alone and in the presence of noble gases. A fluid dynamics analysis is investigated to aid in choosing a method for transferring atomic rubidium vapor that is reliable and efficient. Solutions to the time dependant ordinary differential equation describing the experimental flow properties of the system reveal more precise outcomes than previously practiced routines. Resolved viscosities and Poiseuille flow theory velocity profile distributions are characterized for noble gas carriers of the rubidium vapor. Applying Reynolds Numbers to the flow experiments provides pressure differential boundaries that are employed in …


Sensitivity Analysis Of Empirical Parameters In The Ionosphere-Plasmasphere Model, Janelle V. Jenniges Mar 2011

Sensitivity Analysis Of Empirical Parameters In The Ionosphere-Plasmasphere Model, Janelle V. Jenniges

Theses and Dissertations

A sensitivity analysis of empirical parameters used in physics-based models was completed in this study to determine their effect on electron densities and total electron content (TEC) in the ionosphere. The model used was the Ionosphere-Plasmasphere Model (IPM) developed by Utah State University. The empirical parameters studied include the O+/O collision frequency, zonal wind, secondary electron production, nighttime ExB drifts, and tidal structure. The sensitivity analysis was completed by comparing a default run of the IPM to a run with the parameter adjusted for three geophysical cases. Many of the comparisons resulted in nonlinear changes to the model …


Investigation Of Gate Leakage Current In Nitrogen-Irradiated Algan/Gan Heterostructures, Rose E. May Mar 2011

Investigation Of Gate Leakage Current In Nitrogen-Irradiated Algan/Gan Heterostructures, Rose E. May

Theses and Dissertations

Due to commercial and government interest in devices capable of functioning in high-power, high-frequency space applications, radiation tolerant AlGaN/GaN devices have been under study in recent years. Passivation of the AlGaN surface by (Si3N4) prevents electron trapping and enhances the 2DEG, but it also increases gate leakage currents, which can lead to device failure. This study sought information about current leakage mechanisms by introducing displacement damage close to the Si3N4/AlGaN interface. The effects of irradiation damage around the Si3N4/AlGaN interface on irradiation-induced leakage current were investigated for three …


Immediate And Delayed Drug Therapy Effects On Low Dose Sarin Exposed Mice Myocardial Performance, Joshua T. Miller Mar 2011

Immediate And Delayed Drug Therapy Effects On Low Dose Sarin Exposed Mice Myocardial Performance, Joshua T. Miller

Theses and Dissertations

Recent studies have shown that a single asymptomatic dose exposure to the nerve agent sarin can lead to long term cardiac dysfunction. This study looked at immediate and delayed treatment therapies post exposure on cardiac function. The mice were studied using electrocardiography (QTc, STc, and Tc intervals) and histological techniques (hematoxylin and eosin staining and brain natriuretic peptide (BNP) staining). Male C57BL/6J mice were injected with sarin (0.4LD50) and studied up to 11 weeks. Mice which were given a single dose of the nerve agent treatment atropine/2PAMCL, showed significantly higher cell size and BNP levels than the control (p = …


Android Protection System: A Signed Code Security Mechanism For Smartphone Applications, Jonathan D. Stueckle Mar 2011

Android Protection System: A Signed Code Security Mechanism For Smartphone Applications, Jonathan D. Stueckle

Theses and Dissertations

This research develops the Android Protection System (APS), a hardware-implemented application security mechanism on Android smartphones. APS uses a hash-based white-list approach to protect mobile devices from unapproved application execution. Functional testing confirms this implementation allows approved content to execute on the mobile device while blocking unapproved content. Performance benchmarking shows system overhead during application installation increases linearly as the application package size increases. APS presents no noticeable performance degradation during application execution. The security mechanism degrades system performance only during application installation, when users expect delay. APS is implemented within the default Android application installation process. Applications are hashed …