Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (4246)
- Physical Sciences and Mathematics (2056)
- Aerospace Engineering (1359)
- Electrical and Computer Engineering (921)
- Computer Sciences (880)
-
- Operations Research, Systems Engineering and Industrial Engineering (875)
- Business (863)
- Physics (561)
- Operational Research (426)
- Computer Engineering (350)
- Signal Processing (330)
- Social and Behavioral Sciences (316)
- Civil and Environmental Engineering (314)
- Operations and Supply Chain Management (291)
- Aviation (241)
- Materials Science and Engineering (223)
- Human Resources Management (220)
- Electrical and Electronics (212)
- Oceanography and Atmospheric Sciences and Meteorology (211)
- Navigation, Guidance, Control and Dynamics (202)
- Optics (178)
- Other Operations Research, Systems Engineering and Industrial Engineering (167)
- Information Security (166)
- Aerodynamics and Fluid Mechanics (165)
- Environmental Sciences (161)
- Systems Engineering (158)
- Environmental Engineering (153)
- Digital Communications and Networking (152)
- Space Vehicles (150)
- Engineering Science and Materials (141)
- Keyword
-
- #antcenter (347)
- Decision making (88)
- Global Positioning System (71)
- Algorithms (67)
- Computer networks--Security measures (62)
-
- Drone aircraft (59)
- Computer security (56)
- Kalman filtering (55)
- Target acquisition (51)
- Image processing (50)
- Machine learning (47)
- Optimization (46)
- Software engineering (46)
- Microelectromechanical systems (44)
- Remote sensing (42)
- Wireless communication systems (41)
- Composite materials (39)
- Decision support systems (39)
- Computer vision (38)
- #afcec (36)
- Flight control (36)
- Artificial satellites (35)
- Neural networks (Computer science) (35)
- Signal processing (35)
- Synthetic aperture radar (35)
- Adaptive optics (34)
- Additive manufacturing (33)
- Drone aircraft--Control systems (31)
- Pattern recognition systems (31)
- Scheduling (31)
- Publication Year
Articles 1 - 30 of 6880
Full-Text Articles in Entire DC Network
Assessment Of Emergency Cooling Requirement For Nuclear Reactor Loss-Of-Coolant Accidents, Michael T. Lindsay
Assessment Of Emergency Cooling Requirement For Nuclear Reactor Loss-Of-Coolant Accidents, Michael T. Lindsay
Theses and Dissertations
The 2022 Russia-Ukraine War marks the first time in modern history of conventional military forces targeting and seizing control of an operational nuclear power plant. Power supply and operational cooling systems are critical to avert reactor loss-of-coolant accidents (LOCA) in the event of emergency shutdown, or SCRAM. A wartime non-design based reactor accident causing loss of reactor power and coolant supply would require an emergency heat exchange via coolant to mitigate reactor core heat. At present, the military does not have a well-defined model which characterizes this requirement for operational planning should such an event occur. SCALE 6.2.4 is used …
Lunar Search And Rescue: The Next Step For Human Spaceflight Recovery, Benjamin J. Johnis
Lunar Search And Rescue: The Next Step For Human Spaceflight Recovery, Benjamin J. Johnis
Theses and Dissertations
Humans return to the Moon in 2024 under the NASA Artemis mission. Commercial space explorations are rapidly expanding. The sudden increase of human spaceflight calls for increased emphasis on space rescue. These revelations drove an AFRL/AFIT capability gap assessment to provide specific proposals for a modern space rescue program guided by Transaction Cost Economics Theory. The mission analysis arms USSPACECOM and NASA to coordinate an interagency approach to Lunar Search and Rescue, positioning America to compete in the new space race. The strategic consequences of failing to act could fundamentally jeopardize American leadership in space.
Team And Skill Matching For Disaster Recovery Operations, Emily B. Frahm
Team And Skill Matching For Disaster Recovery Operations, Emily B. Frahm
Theses and Dissertations
United States Air Force (USAF) bases are key power projection platforms that ensure mission readiness and help bring humanitarian aid to locations in need. Recovering airfields after attack or natural disaster is a key mission of USAF civil engineers, and accomplishing this repair as swiftly as possible is key to maintaining our position in the global order. Accomplishing a disaster recovery project is a set of teams, each assigned to a specific task, and made up of a series of personnel. The question answered within this paper is: how do we match the right person with the appropriate skills to …
A Comparison Of Wireless Sensor Networks Under Stochastic Deployment Methods To Ideal Network Structures, Andrew J. Grove
A Comparison Of Wireless Sensor Networks Under Stochastic Deployment Methods To Ideal Network Structures, Andrew J. Grove
Theses and Dissertations
This research addresses the ideal structure of a deployed network of sensors over a geographical area based on metrics such as coverage and connectivity. Using a genetic algorithm, the ideal structure for a range of target network sizes is determined. Then, a series of realistic methods of sensor distribution simulating the scattering of sensors such as a single linear pass, perpendicular passes, and parallel passes are compared to determine the ability of each method to achieve the ideal structure for each target network size. From the results, it is determined that the ideal structure for smaller networks contains a highly …
Air Force Cadet To Career Field Matching Problem, Ian P. Macdonald
Air Force Cadet To Career Field Matching Problem, Ian P. Macdonald
Theses and Dissertations
This research examines the Cadet to Air Force Specialty Code (AFSC) Matching Problem (CAMP). Currently, the matching problem occurs annually at the Air Force Personnel Center (AFPC) using an integer program and value focused thinking approach. This paper presents a novel method to match cadets with AFSCs using a generalized structure of the Hospitals Residents problem with special emphasis on lower quotas. This paper also examines the United States Army Matching problem and compares it to the techniques and constraints applied to solve the CAMP. The research culminates in the presentation of three algorithms created to solve the CAMP and …
Student Performance In Traditional In-Person Vs. Online Sections Of An Introductory Graduate Mathematics Course, Lauran E. Kittle
Student Performance In Traditional In-Person Vs. Online Sections Of An Introductory Graduate Mathematics Course, Lauran E. Kittle
Theses and Dissertations
The growth of technology impacts nearly every aspect of everyday life, to include education and learning. The availability of distance learning (online) classes has increased drastically in the last few decades, expanding access to education for millions of people. However, it is imperative to consider exactly how the growth of technology impacts education – whether it is a positive, negative, or neutral impact. Previous research comparing distance learning and in-residence (traditional) classes have widely mixed, disparate conclusions. This type of research, two-stage analysis, and modeling has yet to be conducted on a graduate school level. For this reason, a detailed …
Regular Simplices Within Doubly Transitive Equiangular Tight Frames, Evan C. Lake
Regular Simplices Within Doubly Transitive Equiangular Tight Frames, Evan C. Lake
Theses and Dissertations
An equiangular tight frame (ETF) yields an optimal way to pack a given number of lines into a given space of lesser dimension. Every ETF has minimal coherence, and this makes it potentially useful for compressed sensing. But, its usefulness also depends on its spark: the size of the smallest linearly dependent subsequence of the ETF. When formed into a sensing matrix, a larger spark means a lower chance that information is lost when sensing a sparse vector. Spark is difficult to compute in general, but if an ETF contains a regular simplex, then every such simplex is a linearly …
Distributed Reconnaissance Deception Using Software-Defined Networking In A Dynamic Network Environment, Richard Hunter Feustel
Distributed Reconnaissance Deception Using Software-Defined Networking In A Dynamic Network Environment, Richard Hunter Feustel
Theses and Dissertations
This research outlines the design and implementation of a DRDS, which is a RDS distributed across multiple controllers that is capable of deploying reconnaissance deception across multiple switches to mitigate network enumeration by a compromised host. This research outlines the design and development of the DRDS as well as tests its functional abilities and routing performance when compared to a two other network routing solutions: a legacy network solution and centralized ONOS controller scheme deploying layer 2 forwarding. The functional tests proved the system can properly route traffic across 100% of the tested scenarios carrying traffic that includes IP, ARP, …
Belief Space Planning For Alternative Navigation In Gnss-Denied Environments, Timothy I. Machin
Belief Space Planning For Alternative Navigation In Gnss-Denied Environments, Timothy I. Machin
Theses and Dissertations
Robust alternative navigation for autonomous agents becomes critical without reliable GNSS. Autonomous agents utilize measurement updates to constrain uncertainty. Belief space planning builds graph structures of beliefs within environments based on probable paths, agent and measurement models, and information of the environment. The Rapidly-exploring Random Alt-Nav Belief Graph (RRBANG) algorithm leverages stochastic filtering to implement a range of alt-nav measurement capabilities for robust navigation in GNSS-denied environments.
Safe And Reliable Software And The Formal Verification Of Prim's Algorithm In Spark, Brian S. Wheelhouse
Safe And Reliable Software And The Formal Verification Of Prim's Algorithm In Spark, Brian S. Wheelhouse
Theses and Dissertations
Despite evidence that formal verification helps produce highly reliable and secure code, formal methods, i.e., mathematically based tools and approaches for software and hardware verification, are not commonly used in software and hardware development. The limited emphasis on formal verification in software education and training suggests that many developers have never considered the benefits of formal verification. Despite the challenging nature of their mathematical roots, software verification tools have improved; making it easier than ever to verify software. SPARK, a programming language and a formal verification toolset, is of particular interest for the AFRL, and will be a primary focus …
Transition Analysis Of Innovative Technologies Into Military Applications, Cristian J. Henandez-Rivera
Transition Analysis Of Innovative Technologies Into Military Applications, Cristian J. Henandez-Rivera
Theses and Dissertations
The Department of Defense (DoD) invests over 1 billion dollars annually in Small Business Innovation Research (SBIR) efforts. These SBIR efforts are similar to venture capital investments, where a transition beyond seed funding is considered a success. A baseline study of 2015-2018 Air Force SBIR investments indicates that 8.8% of the efforts secured long-term funding. Current data allows for an assessment of whether or not a project scores long-term funding; however, there is no measurement of whether or not the technology transitions to DoD usage. Transition is the rate at which SBIR investments are fielded or integrated into a military …
Topological Variability In Water Distribution Networks, James M. Anderson
Topological Variability In Water Distribution Networks, James M. Anderson
Theses and Dissertations
Water distribution networks are critical infrastructure characterized by difficulties in their assessment and deteriorating performance due to aging components. Resilience analysis of networked infrastructure has replaced traditional risk analysis to focus on performance. Global Resilience Analysis can provide useful information to decision makers and system managers regarding repair and expansion of networks. Network performance has been found to be directly informed by network structure. This work leverages graph theory to assess network qualities that correlate with resiliency characteristics across 69 real world water networks. These networks are then grouped by their structural properties through k-means clustering and compared using parametric …
An Analysis On Recommended United States Air Force Additive Manufacturing Construction Unit Type Code Package For Expeditionary Deployment, Caleb G. Dann
Theses and Dissertations
Additive Manufacturing Construction (AMC) is an emerging technology in the construction industry which utilizes 3-D printing to reduce costs, labor requirements and deviations in quality. This technology has the ability to rapidly produce repeatable construction projects while tailoring each to specific requirements through the use of 3-D designs. One of the primary objectives of the 2018 National Defense Strategy (NDS) is to continue meeting mission demands with a greater focus on the efficient use of resources. AMC has the ability to satisfy the requirements of this objective. The United States Air Force has begun initial print trials but have not …
Method Development Biological Agent Personal Decontamination Effectiveness For Airman Battle Uniform Fabric Material: Ms2 Bacteriophage, Alisha Helm
Theses and Dissertations
This article presents a study that investigates the effectiveness of a common decontamination (decon) strategy used by Airmen in the United States Air Force who may find themselves in a densely populated area during an emergency evacuation. Ultimately, this study addresses the following questions: Is there a significant difference in the number of viral particles being re-aerosolized before and after the applied decon strategy, and is this difference significant enough to consider the decon strategy effective? The study entails using MS2 bacteriophage to contaminate swatches of Airman Battle Uniform (ABU) fabric. Swatches were secured to a vortex centered in the …
Human-Machine Teaming Optimization: Creating A Measurement Tool For Operator Trust In Autonomous Systems, Kevin R. Hieronymus
Human-Machine Teaming Optimization: Creating A Measurement Tool For Operator Trust In Autonomous Systems, Kevin R. Hieronymus
Theses and Dissertations
Automation has become a critical component in the modern economy. Augmenting limited human attention resources allows for greater productivity in numerous businesses, tasks, and projects. As automated processes become more integrated into everyday life, the need to understand the relationship between human operators and automation becomes paramount. In the past, automation development relied on operator feedback which can vary depending on the operator’s familiarity with similar systems and acceptance of modern technology. This fact highlights the lack of a standardized measure that can quantify the amount of trust an individual displays in an automated system. This research establishes such a …
An Analysis Of Cloud Computing Migration Costs And Effects For Dod Applications, Joseph S. Moore Iv
An Analysis Of Cloud Computing Migration Costs And Effects For Dod Applications, Joseph S. Moore Iv
Theses and Dissertations
The Air Force launched “Cloud One” in 2017. Cloud One provides cloud computing options for military applications. Cloud One provides common secure computing environments, standardized platforms, application migration and support services, and data management. Currently, Cloud One has over one hundred mission applications on board. Although there is information on the cost, performance, personnel requirements, risks, and migration of the commercial sector and cloud options, there is limited recorded information on the same topics for Cloud One. As such, there is a gap in the literature regarding data/feedback for mission applications that have migrated to Cloud One. This research takes …
Decontamination Of Perfluoroalkyl Substances From Stainless Steel Piping Used In Aqueous Film Forming Foam Fire Suppression Systems, Ryan M. Register
Decontamination Of Perfluoroalkyl Substances From Stainless Steel Piping Used In Aqueous Film Forming Foam Fire Suppression Systems, Ryan M. Register
Theses and Dissertations
This study examines the removal of perfluoroalkyl substances (PFAS) from legacy hangar fire suppression systems which utilized PFAS containing aqueous film forming foam (AFFF). Hundreds of these systems are currently in place throughout the Department of Defense, with planned phase-out occurring by 2024. The estimated cost of replacing these systems is $2.1 billion dollars. To mitigate this cost, a triple-rinse method of decontamination has been proposed. This thesis explores the release of PFAS from AFFF systems during a triple-rinse decontamination, and the continued removal of PFAS after a triple-rinse is complete while simultaneously analyzing methylene blue dye as a potential …
Integrating Ace And Mca Requirements Into The Civil Engineer Officer Occupational Competency Framework, Stone D. Williford
Integrating Ace And Mca Requirements Into The Civil Engineer Officer Occupational Competency Framework, Stone D. Williford
Theses and Dissertations
The Air Force Civil Engineer officer career field has made dedicated efforts to the professional development of its company grade officers. In response to the 2015 Air Force Strategic Master plan, the Civil Engineer officer career field adopted a competency-based education approach. In 2020, the Civil Engineer Officer Career Field Education and Training Plan was published, officially integrating the career field’s operational requirements into a competency framework. However, since 2020, the Air Force has adopted an updated force generation strategy, and with it, changes to the way the Air Force assets are employed in contingency environments. This new scheme of …
Garbage In ≠ Garbage Out: Exploring Gan Resilience To Image Training Set Degradations, Nicholas M. Crino
Garbage In ≠ Garbage Out: Exploring Gan Resilience To Image Training Set Degradations, Nicholas M. Crino
Theses and Dissertations
Generative Adversarial Networks (GANs) have received increasing attention in recent years due to their ability to capture complex, high-dimensional data distributions without the need for extensive labeling. Since their conception in 2014, a wide array of GAN variants have been proposed featuring alternative architectures, optimizers, and loss functions with the goal of improving performance and training stability. While this research has yielded GAN variants robust to training set shrinkage and corruption, our research focuses on quantifying the resilience of a GAN architecture to specific modes of image degradation. We conduct systematic experimentation to determine empirically the effects of 10 fundamental …
The U.S. Army Officer-To-Unit Assignment Problem, Andrea L. Phillips
The U.S. Army Officer-To-Unit Assignment Problem, Andrea L. Phillips
Theses and Dissertations
Every two to three years, U.S. Army officers must change duty stations, which entails a selection process based on preferences. Currently, officers are assigned to units using a stable-marriage algorithm. Two impracticalities occur within this process. First, officers are required to submit strictly ranked preferences, not allowing indifference among units. Second, the stable-marriage algorithm does not give flexibility to alternative priorities. This research focuses on two modifications to the current model. First, a mixed integer program is created that allows the user, U.S. Army Human Resources Command, to consider other priorities: unit preferences and maximum officer disappointment. Second, generated data …
Analysis And Optimization Of Contract Data Schema, Franklin Sun
Analysis And Optimization Of Contract Data Schema, Franklin Sun
Theses and Dissertations
agement, development, and growth of U.S Air Force assets demand extensive organizational communication and structuring. These interactions yield substantial amounts of contracting and administrative information. Over 4 million such contracts as a means towards obtaining valuable insights on Department of Defense resource usage. This set of contracting data is largely not optimized for backend service in an analytics environment. To this end, the following research evaluates the efficiency and performance of various data structuring methods. Evaluated designs include a baseline unstructured schema, a Data Mart schema, and a snowflake schema. Overall design success metrics include ease of use by end …
Experimental And Computational Bearing Strength Of Fiber Metal Laminate With And Without Film Adhesive, Christopher L. Bellanova Jr.
Experimental And Computational Bearing Strength Of Fiber Metal Laminate With And Without Film Adhesive, Christopher L. Bellanova Jr.
Theses and Dissertations
This research characterized the performance of a fiber metal laminate composed of carbon fiber and stainless steel without film adhesive and compared it to a similar, previously tested, fiber metal laminate including film adhesive. Removal of the adhesive layers reduced the localized thickness, simplified manufacturing, and allowed for a 20% increase in foil thickness. Quasi-static testing was conducted in double shear, single shear protruding, and single shear countersunk configurations. The results were compared to adhesive hybrid and control samples. To study the affects of bolt tension, samples at low torque in double shear were also tested. Progressive failure samples revealed …
Anisotropic Characterization Of Additively Manufactured Ti 6-4 Via Tension, Compression, And Three Point Bend Experimentation, James M. Gunderson
Anisotropic Characterization Of Additively Manufactured Ti 6-4 Via Tension, Compression, And Three Point Bend Experimentation, James M. Gunderson
Theses and Dissertations
Titanium's ability to fill existing material gaps because of its higher strength and higher melting temperature compared to other common materials used in aircraft structures requires a need to understand the behavior of the material. Titanium's properties and the development of additive manufacturing also open an opportunity for it to be used in aerospace systems of the future in applications where traditionally manufactured titanium cannot meet the desired system requirements. Compressive, tensile, and three point bend experimental data collected from this research under varying temperatures, print orientations, print layer build heights, and surface finishes were analyzed to determine favorable material …
Investigation Of Hypersonic Near-Wake Relaminarization Over A 7 Degree Half-Angle Cone, Jesse L. Roberts
Investigation Of Hypersonic Near-Wake Relaminarization Over A 7 Degree Half-Angle Cone, Jesse L. Roberts
Theses and Dissertations
To investigate the potential for relaminarization in the near-wake of a 7-degree half-angle cone, a series of hypersonic wake experiments were conducted in the Air Force Research Laboratory Mach 6.1 Ludwieg tube. Relaminarization is a spatial phenomenon that occurs when a turbulent flow reverts to a laminar-like state at a downstream location, where turbulent fluctuations negligibly contribute to average flow properties. Although relaminarization has been documented in subsonic and supersonic flows, the current body of knowledge related to the occurrence of, and mechanisms that drive, relaminarization at hypersonic speeds is sparse. Measurements were obtained across a range of freestream unit …
Improving Accessibility And Efficiency Of Analytic Provenance Tools For Reverse Engineering, Caleb W. Richardson
Improving Accessibility And Efficiency Of Analytic Provenance Tools For Reverse Engineering, Caleb W. Richardson
Theses and Dissertations
Reverse engineering is a vital technique for identifying and mitigating cyber threats. Yet, despite its importance, reverse engineering is a time-consuming process. Provenance tools help to improve the workflow of reverse engineers by providing an accessible method of viewing their flow through a binary. The current state-of-theart provenance tool for reverse engineering software called SensorRE, leverages an external server, web browser, and a large array of javascript libraries. This thesis presents Provenance Ninja, a software reverse engineering tool developed in Python that runs directly within Binary Ninja. Provenance Ninja captures reverse engineers’ provenance data and provides an interactive graph within …
Direct Collocation Methods For Comparison Of Aerothermodynamic Models Effect On Hypersonic Trajectory Optimization By The Process Of Continuation, Noor K. Khan
Theses and Dissertations
An algorithm was created to optimize trajectories of hypersonic glide vehicles with selected cost functions by applying the process of continuation to direct orthogonal collocation methods. The trajectory was optimized to maximize the range of launch position given a fixed terminal location. The hypersonic glide vehicle system dynamics were modeled with three-dimensional, three degree of freedom equations of motion assuming no thrust and a non-rotating Earth with the control as bank angle. Three aerothermodynamic models were compared when input as path constraints to calculate the stagnation point heating rate at the nose as well as integrated for heat load. Use …
Debris Survivability Study For Mega-Constellation Architectures, Joseph C. Canoy
Debris Survivability Study For Mega-Constellation Architectures, Joseph C. Canoy
Theses and Dissertations
The analysis for the overall theoretical debris survivabilty of mega-constellation architectures, with an emphasis on space-based ballistic missile defense constellation (SB-BMD), is explored via three extensive different Monte Carlo simulations: preliminary analysis of low Earth Orbit (LEO) mega-constellation survivabilty following a fragmentation event within the constellation, analysis of LEO mega-constellation survivability with a fragmentation event occurring on a satellite performing a maneuver to insert itself within the constellation, and the analysis of LEO mega-constellation survivabilty after a fragmentation event resulting from the destruction of a missile. The LEO mega-constellations represent the SB-BMD constellation. The first two analysis sections will include …
Critical Infrastructure System Resiliency Modeling Using Multi-Layer Network Optimization, Spencer R. Figge
Critical Infrastructure System Resiliency Modeling Using Multi-Layer Network Optimization, Spencer R. Figge
Theses and Dissertations
ccurately modeling the interdependent operation of critical infrastructure systems is an effective and efficient way of proactively evaluating system vulnerabilities and resiliency. Infrastructure systems are designed to transport essential commodities from where they are produced to where they are consumed and network flow-based models are one of the most effective ways to simulate and quantify infrastructure performance. The literature is populated with proposed models that must balance accuracy of interdependent operations, capability to include real-world considerations, and computational cost. This research proposes an alternative network-flow based model called the Critical Infrastructure System Resiliency Model (CISRM) that focuses on modeling a …
Inducing Sparsity Within High-Dimensional Remote Sensing Modalities For Lightning Prediction, Grace E. Metzgar
Inducing Sparsity Within High-Dimensional Remote Sensing Modalities For Lightning Prediction, Grace E. Metzgar
Theses and Dissertations
The uncertainty of lightning constantly threatens many weather-sensitive fields where the slightest presence of lightning can endanger valuable personnel and assets. The consequences of delaying operations have incited the research of methods that can accurately predict the location of future lightning strikes from the current weather conditions. High-dimensional remote sensing modalities contain information capable of detecting significant patterns and intensities within storms that could indicate the presence of lightning. This thesis induces sparsity into convolutional neural networks (CNNs) and remote sensing modalities through a combination of regularization and tensor decomposition techniques to call attention to sparse features that are most …
Probability Of Agreement As A Simulation Validation Methodology, Matthew C. Ledwith
Probability Of Agreement As A Simulation Validation Methodology, Matthew C. Ledwith
Theses and Dissertations
Determining whether a simulation model is operationally valid requires the rigorous assessment of agreement between observed functional responses of the simulation model and the corresponding real world system or process of interest. This research seeks to extend and formulate the probability of agreement approach to the operational validation of simulation models. The first paper provides a methodological approach and an initial demonstration which leverages bootstrapping to overcome situations where one’s ability to collect real-world data is limited. The second paper extends the probability of agreement approach to account for second-order heteroscedastic variability structures and establishes a weighted probability of agreement …