Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Theses and Dissertations

Theses/Dissertations

2010

Discipline
Keyword

Articles 1 - 30 of 223

Full-Text Articles in Entire DC Network

A Linear Combination Of Heuristics Approach To Spatial Sampling Hyperspectral Data For Target Tracking, Barry R. Secrest Dec 2010

A Linear Combination Of Heuristics Approach To Spatial Sampling Hyperspectral Data For Target Tracking, Barry R. Secrest

Theses and Dissertations

Persistent surveillance of the battlespace results in better battlespace awareness which aids in obtaining air superiority, winning battles, and saving friendly lives. Although hyperspectral imagery (HSI) data has proven useful for discriminating targets, it presents many challenges as a useful tool in persistent surveillance. A new sensor under development has the potential of overcoming these challenges and transforming our persistent surveillance capability by providing HSI data for a limited number of pixels and grayscale video for the remainder. The challenge of exploiting this new sensor is determining where the HSI data in the sensor's field of view will be the …


Fatigue Behavior Of A Sic/Sic Composite At 1000⁰C In Air And In Steam, Michael W. Knauf Dec 2010

Fatigue Behavior Of A Sic/Sic Composite At 1000⁰C In Air And In Steam, Michael W. Knauf

Theses and Dissertations

Tension-tension fatigue behavior of a prototype Silicon Carbide/Silicon Carbide (SiC/SiC) ceramic matrix composite (CMC) material was investigated at 1000°C in laboratory air and in steam environments. The material consists of a SiC matrix reinforced with CG NICALON™ fibers woven in an eight harness satin weave (8HSW) and coated with a BN/SiC dual-layer interphase. The composite was manufactured by a Polymer Infiltration and Pyrolysis (PIP) process. A seal coat of SiC and elemental boron was applied to the test specimens after machining. The tensile stress-strain behavior was investigated and the tensile properties were measured at 1000°C. Tension-tension fatigue behavior was studied …


Flow Control Application On A Submerged Inlet Characterized By Three-Component Ldv, Tina H. Reynolds Dec 2010

Flow Control Application On A Submerged Inlet Characterized By Three-Component Ldv, Tina H. Reynolds

Theses and Dissertations

A submerged inlet investigation, using flow control in the form of discrete blowing, examined proximity and jet directionality to improve compressor face uniformity. The flow control locations were at the head of the ramp and part way down the ramp, providing four configurations under examination. Laser Doppler velocimetry (LDV)measurements at the throat determined the effect of the flow control based on the statistical velocity measurements. Blowing at closer proximity to the throat and targeting the largest velocity deficit region provided the best results. The airspeed and inlet velocity simulated takeoff and landing conditions; velocities ranged from Mach 0.1-0.3 at the …


Network Security Toolkit Including Heuristic Solutions For Trust System Placement And Network Obfuscation, Gabriel H. Greve Dec 2010

Network Security Toolkit Including Heuristic Solutions For Trust System Placement And Network Obfuscation, Gabriel H. Greve

Theses and Dissertations

For Part I, a supervisory control and data acquisition (SCADA) network consists of a group stations and substations in a portion of the power grid. The use of Internet technology in SCADA communications as well as other factors has caused vulnerabilities. One idea to help mitigate this risk is to strategically place trust nodes to compartmentalize and secure the SCADA systems without disturbing its finely honed processes. The trust nodes combine firewall and intrusion detection technology to provide more secure communication. An optimal solution to this problem has already been developed using a mixed-integer linear programming model. Because the problem …


A Space Acquisition Leading Indicator Based On System Interoperation Maturity, Jason T. Shibata Dec 2010

A Space Acquisition Leading Indicator Based On System Interoperation Maturity, Jason T. Shibata

Theses and Dissertations

The Department of Defense‘s space acquisition enterprise has experienced numerous challenges since the advent of space power. Space borne capabilities are needed more than ever, but space acquisition frequently fails to meet its goals. The decades of space acquisition experience form a rich history that can be used to build a leading indicator of success to enable effective program execution. First, the space acquisition areas of greatest concern were determined to be cost, schedule and requirements. These areas are considered as systems composed of the people, processes and products that execute the program. Second, the vital interoperation characteristics, or attributes …


Performance Characterization Of A Three-Axis Hall Effect Thruster, Spencer E. Temkin Dec 2010

Performance Characterization Of A Three-Axis Hall Effect Thruster, Spencer E. Temkin

Theses and Dissertations

No abstract provided.


Effects Of Prior Aging At 274⁰C In Argon On Inelastic Deformation Behavior Of Pmr-15 Polymer At 288⁰C: Experiment And Modeling, Joseph A. Wahlquist Dec 2010

Effects Of Prior Aging At 274⁰C In Argon On Inelastic Deformation Behavior Of Pmr-15 Polymer At 288⁰C: Experiment And Modeling, Joseph A. Wahlquist

Theses and Dissertations

No abstract provided.


Navigation With Limited Prior Information Using Time Difference Of Arrival Measurements From Signals Of Opportunity, Christopher M. Rondeau Dec 2010

Navigation With Limited Prior Information Using Time Difference Of Arrival Measurements From Signals Of Opportunity, Christopher M. Rondeau

Theses and Dissertations

The Global Positioning System (GPS) provides world-wide availability to high-accuracy navigation and positioning information. However, the threats to GPS are increasing, and many limitations of GPS are being encountered. Simultaneously, systems previously considered as viable backups or supplements to GPS are being shut down. This creates the need for system alternatives. Navigation using signals of opportunity (SoOP) exploits any signal that is available in a given area, regardless of whether or not the original intent of the signal was for navigation. Common techniques to compute a position estimate using SoOP include received signal strength, angle of arrival, time of arrival, …


Tunable Optical Delay In Doppler-Broadened Cesium Vapor, Monte D. Anderson Dec 2010

Tunable Optical Delay In Doppler-Broadened Cesium Vapor, Monte D. Anderson

Theses and Dissertations

Variable-delay tunable optical delay line or optical buffers are critical for the development of all-optical networks components as well as interferometry and analytic instruments. Recent research on slow light may hold the key for the development of the first practical tunable optical delay device. In this research the linear dispersion delay effects in an alkali vapor. The hyperfine relaxation observations present insight into the complex bleach wave dynamics during a high-intensity pulsed pump in DPAL systems.


An Analysis Of How Education, Age, Overseas Assignments, And Mavenism Impact Use Of New Media Technology, Thomas E. Enright Jr. Dec 2010

An Analysis Of How Education, Age, Overseas Assignments, And Mavenism Impact Use Of New Media Technology, Thomas E. Enright Jr.

Theses and Dissertations

Previous research into new media technology usage has typically been limited to young adults ages 18-24. However this study will include age, education, overseas assignments, presence of mavenism, and information security concerns as variables impacting new media usage. For the purpose of this study, new media is defined by devices, activities, and social arrangements (Lievrouw & Livingstone, 2006). While dozens of new media technology are available, the scope of this research examined individual’s use of blogs, online social networks, and downloadable content. Data about new media was gathered through a literature review and by conducting interviews with people that are …


Conceptual Design And Analysis Of Service Oriented Architecture (Soa) For Command And Control Of Space Assets, Eric B. Snyder Dec 2010

Conceptual Design And Analysis Of Service Oriented Architecture (Soa) For Command And Control Of Space Assets, Eric B. Snyder

Theses and Dissertations

The mission-unique model that has dominated the DoD satellite Command and Control community is costly and inefficient. It requires repeatedly “reinventing” established common C2 components for each program, unnecessarily inflating budgets and delivery schedules. The effective utilization of standards is scarce, and proprietary, non-open solutions are commonplace. IT professionals have trumpeted Service Oriented Architectures (SOAs) as the solution to large enterprise situations where multiple, functionally redundant but non-compatible information systems create large recurring development, test, maintenance, and tech refresh costs. This thesis describes the current state of Service Oriented Architectures as related to satellite operations and presents a functional analysis …


Scattering Matrix Elements For The Nonadiabatic Collision B (2PJ) + H2 (1Σ+G, Ν, Ј) ↔ B (2PJ’) + H2 (1Σ+G, Ν’, J’), Luke A. Barger Dec 2010

Scattering Matrix Elements For The Nonadiabatic Collision B (2PJₐ) + H2 (1Σ+G, Ν, Ј) ↔ B (2PJ’ₐ) + H2 (1Σ+G, Ν’, J’), Luke A. Barger

Theses and Dissertations

Scattering matrix elements are calculated for the nonadiabatic inelastic collision B (2Pj) + H2 (1Σ+g, ν, ј) ↔ B (2Pj’) + H2 (1Σ+g, ν’, j’). This calculation utilizes the effective potential energy surfaces for this collision generated by Garvin along with a correction to the asymptotic H2 potential. Wavepackets are propagated on these surfaces using a split-operator propagator. This propagation yields correlation functions between reactant and product Møller states which are used to calculate the scattering …


Cyber Situational Awareness Using Live Hypervisor-Based Virtual Machine Introspection, Dustyn A. Dodge Sep 2010

Cyber Situational Awareness Using Live Hypervisor-Based Virtual Machine Introspection, Dustyn A. Dodge

Theses and Dissertations

In this research, a compiled memory analysis tool for virtualization (CMAT-V) is developed as a virtual machine introspection (VMI) utility to conduct live analysis during cyber attacks. CMAT-V leverages static memory dump analysis techniques to provide live dynamic system state data. Unlike some VMI applications, CMAT-V bridges the semantic gap using derivation techniques. CMAT-V detects Windows-based operating systems and uses the Microsoft Symbol Server to provide this context to the user. This research demonstrates the usefulness of CMAT-V as a situational awareness tool during cyber attacks, tests the detection of CMAT-V from the guest system level and measures its impact …


Collisional Dynamics Of The Cesium D1 And D2 Transitions, Greg A. Pitz Sep 2010

Collisional Dynamics Of The Cesium D1 And D2 Transitions, Greg A. Pitz

Theses and Dissertations

The collisional dynamics of the 62P levels in cesium have been studied utilizing steady state laser absorption and laser induced florescence techniques. In addition the production of a blue beam produced by two photon absorption has been observed in potassium. The collisional broadening rate for cesium, λL, for He, Ne, Ar, Kr, Xe, N2, H2, HD, D2, CH4, C2H6, CF4, and 3He are 24.13, 10.85, 18.31, 17.82, 19.74, 16.64, 20.81, 20.06, 18.04, 29.00, 26.70, 18.84, and 26.00 MHz/torr, respectively for the …


Improving Range Estimation Of A 3d Flash Ladar Via Blind Deconvolution, Jason R. Mcmahon Sep 2010

Improving Range Estimation Of A 3d Flash Ladar Via Blind Deconvolution, Jason R. Mcmahon

Theses and Dissertations

The purpose of this research effort is to improve and characterize range estimation in a three-dimensional FLASH LAser Detection And Ranging (3D FLASH LADAR) by investigating spatial dimension blurring effects. The myriad of emerging applications for 3D FLASH LADAR both as primary and supplemental sensor necessitate superior performance including accurate range estimates. Along with range information, this sensor also provides an imaging or laser vision capability. Consequently, accurate range estimates would also greatly aid in image quality of a target or remote scene under interrogation. Unlike previous efforts, this research accounts for pixel coupling by defining the range image mathematical …


A Comparative Analysis Of Ascii And Xml Logging Systems, Eric C. Hanington Sep 2010

A Comparative Analysis Of Ascii And Xml Logging Systems, Eric C. Hanington

Theses and Dissertations

This research compares XML and ASCII based event logging systems in terms of their storage and processing efficiency. XML has been an emerging technology, even for security. Therefore, it is researched as a logging system with the mitigation of its verbosity. Each system consists of source content, the network transmission, database storage, and querying which are all studied as individual parts. The ASCII logging system consists of the text file as source, FTP as transport, and a relational database system for storage and querying. The XML system has the XML files and XML files in binary form using Efficient XML …


Satellite Capabilities Mapping - Utilizing Small Satellites, David A. Grigsby Sep 2010

Satellite Capabilities Mapping - Utilizing Small Satellites, David A. Grigsby

Theses and Dissertations

The cost and schedule advantages small satellites have over larger legacy systems have been studied, but there has been very little experimentation performed to determine whether small satellites can actually deliver the capabilities of larger spacecraft. To date, a desired operational capability has not been fully realized by a scalable satellite design. Advances in sensor technology have led to significant reductions in size, weight, and power (SWaP) presenting an opportunity to exploit the evolution of space operations by using small satellites to perform specific missions. This paper describes a methodology that maps a specific set of large space vehicle capabilities …


Laser Demonstration And Performance Characterization Of An Optically Pumped Alkali Laser System, Clifford V. Sulham Sep 2010

Laser Demonstration And Performance Characterization Of An Optically Pumped Alkali Laser System, Clifford V. Sulham

Theses and Dissertations

Diode Pumped Alkali Lasers (DPALs) offer a promising approach for high power lasers in military applications that will not suffer from the long logistical trails of chemical lasers or the thermal management issues of diode pumped solid state lasers. This research focuses on characterizing a DPAL-type system to gain a better understanding of using this type of laser as a directed energy weapon. A rubidium laser operating at 795 nm is optically pumped by a pulsed titanium sapphire laser to investigate the dynamics of DPALs at pump intensities between 1.3 and 45 kW/cm2. Linear scaling as high as …


Exploring The Effects Of International Traffic In Arms Regulations Restrictions On Innovation In The U.S. Space Industrial Base, Kalliroi L. Landry Sep 2010

Exploring The Effects Of International Traffic In Arms Regulations Restrictions On Innovation In The U.S. Space Industrial Base, Kalliroi L. Landry

Theses and Dissertations

The International Traffic in Arms Regulations (ITAR) are used to protect United States (U.S.) military technologies. However, changes to ITAR export controls regarding space technologies have had a major impact to the U.S. space industry. The literature mentions a concern for the health of lower-tier firms because they are a major source of innovation, but there is no additional information considering the effects of ITAR on space innovation at those lower tiers. The purpose of this thesis was to explore the implications of continuing the current ITAR restrictions with regard to innovation in the space industry. This research used a …


Neural Extensions To Robust Parameter Design, Bernard Jacob Loeffelholz Sep 2010

Neural Extensions To Robust Parameter Design, Bernard Jacob Loeffelholz

Theses and Dissertations

Robust parameter design (RPD) is implemented in systems in which a user wants to minimize the variance of a system response caused by uncontrollable factors while obtaining a consistent and reliable system response over time. We propose the use of artificial neural networks to compensate for highly non-linear problems that quadratic regression fails to accurately model. RPD is conducted under the assumption that the relationship between system response and controllable and uncontrollable variables does not change over time. We propose a methodology to find a new set of settings that will be robust to moderate system degradation while remaining robust …


Improving The Quality Of Service And Security Of Military Networks With A Network Tasking Order Process, Matthew D. Compton Sep 2010

Improving The Quality Of Service And Security Of Military Networks With A Network Tasking Order Process, Matthew D. Compton

Theses and Dissertations

This research presents a Network Tasking Order process that collects mission plans, network capabilities, and historical records to build a Network Tasking Order (NTO). The NTO document directs the form and usage of the network, much like an Air Tasking Order (ATO) directs the usage of air power. The NTO process is fleshed out with the content and format of the NTO given herein for the first time. Tools such as topology control algorithms are then shown through simulation to improve the quality of service of the network by finding favorable ways to connect the assets identified during the NTO …


Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey Sep 2010

Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey

Theses and Dissertations

This research effort examines the theory, application, and results for a Reputation-based Internet Protocol Security (RIPSec) framework that provides security for an ad-hoc network operating in a hostile environment. In RIPSec, protection from external threats is provided in the form of encrypted communication links and encryption-wrapped nodes while internal threats are mitigated by behavior grading that assigns reputations to nodes based on their demonstrated participation in the routing process. Network availability is provided by behavior grading and round-robin multipath routing. If a node behaves faithfully, it earns a positive reputation over time. If a node misbehaves (for any number of …


Determining The Index Of Refraction Of An Unknown Object Using Passive Polarimetric Imagery Degraded By Atmospheric Turbulence, Milo W. Hyde Iv Sep 2010

Determining The Index Of Refraction Of An Unknown Object Using Passive Polarimetric Imagery Degraded By Atmospheric Turbulence, Milo W. Hyde Iv

Theses and Dissertations

In this research, an algorithm is developed to estimate the index of refraction of an unknown object using passive polarimetric images degraded by atmospheric turbulence. The algorithm uses a variant of the maximum-likelihood blind-deconvolution algorithm developed by LeMaster and Cain to recover the true object (i.e., the first Stokes parameter), the degree of linear polarization, and the polarimetric-image point spread functions. Nonlinear least squares is then used to find the value of the complex index of refraction which best fits the theoretical degree of linear polarization, derived using a polarimetric bidirectional reflectance distribution function, to the turbulence-corrected degree of linear …


Statistical Image Recovery From Laser Speckle Patterns With Polarization Diversity, Donald B. Dixon Sep 2010

Statistical Image Recovery From Laser Speckle Patterns With Polarization Diversity, Donald B. Dixon

Theses and Dissertations

This research extends the theory and understanding of the laser speckle imaging technique. This non-traditional imaging technique may be employed to improve space situational awareness and image deep space objects from a ground-based sensor system. The use of this technique is motivated by the ability to overcome aperture size limitations and the distortion effects from Earth’s atmosphere. Laser speckle imaging is a lensless, coherent method for forming two-dimensional images from their autocorrelation functions. Phase retrieval from autocorrelation data is an ill-posed problem where multiple solutions exist. This research introduces polarization diversity as a method for obtaining additional information so the …


Applying Image Matching To Video Analysis, Adam J. Behring Sep 2010

Applying Image Matching To Video Analysis, Adam J. Behring

Theses and Dissertations

Dealing with the volume of multimedia collected on a daily basis for intelligence gathering and digital forensics investigations requires significant manual analysis. A component of this problem is that a video may be reanalyzed that has already been analyzed. Identifying duplicate video sequences is difficult due to differences in videos of varying quality and size. This research uses a kd-tree structure to increase image matching speed. Keypoints are generated and added to a kd-tree of a large dimensionality (128 dimensions). All of the keypoints for the set of images are used to construct a global kd-tree, which allows nearest neighbor …


Code White: A Signed Code Protection Mechanism For Smartphones, Joseph M. Hinson Iv Sep 2010

Code White: A Signed Code Protection Mechanism For Smartphones, Joseph M. Hinson Iv

Theses and Dissertations

This research develops Code White, a hardware-implemented trusted execution mechanism for the Symbian mobile operating system. Code White combines a signed whitelist approach with the execution prevention technology offered by the ARM architecture. Testing shows that it prevents all untrusted user applications from executing while allowing all trusted applications to load and run. Performance testing in contrast with an unmodified Symbian system shows that the difference in load time increases linearly as the application file size increases. The predicted load time for an application with a one megabyte code section remains well below one second, ensuring uninterrupted experience for the …


Accelerating Malware Detection Via A Graphics Processing Unit, Nicholas S. Kovach Sep 2010

Accelerating Malware Detection Via A Graphics Processing Unit, Nicholas S. Kovach

Theses and Dissertations

Real-time malware analysis requires processing large amounts of data storage to look for suspicious files. This is a time consuming process that (requires a large amount of processing power) often affecting other applications running on a personal computer. This research investigates the viability of using Graphic Processing Units (GPUs), present in many personal computers, to distribute the workload normally processed by the standard Central Processing Unit (CPU). Three experiments are conducted using an industry standard GPU, the NVIDIA GeForce 9500 GT card. The goal of the first experiment is to find the optimal number of threads per block for calculating …


Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard Sep 2010

Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard

Theses and Dissertations

As malware has evolved over the years, it has gone from harmless programs that copy themselves into other executables to modern day botnets that perform bank fraud and identity theft. Modern malware often has a need to communicate back to the author, or other machines that are also infected. Several techniques for transmitting this data covertly have been developed over the years which vary significantly in their level of sophistication. This research creates a new covert channel technique for stealing information from a network by piggybacking on user-generated network traffic. Specifically, steganography drop boxes and passive covert channels are merged …


Orbital Tori Construction Using Trajectory Following Spectral Methods, Ralph E. Bordner Iii Sep 2010

Orbital Tori Construction Using Trajectory Following Spectral Methods, Ralph E. Bordner Iii

Theses and Dissertations

By assuming the motion of a satellite about the earth’s geopotential mimics the known Kolmogorov-Arnold-Moser (KAM) solution of a lightly perturbed integrable Hamiltonian system, this research focused on applying trajectory following spectral methods to estimate orbital tori from sampled orbital data. From an estimated basis frequency set, orbital data was decomposed into multi-periodic Fourier series, essentially compressing ephemerides for long-term use. Real-world Global Positioning System (GPS) orbital tracks were decomposed and reconstructed with error from as low as few kilometers per coordinate axis over a 10-week span to tens of kilometers per coordinate axis over the same time period, depending …


Providing A Theoretical Basis For Nanotoxicity Risk Analysis Departing From Traditional Physiologically-Based Pharmacokinetic (Pbpk) Modeling, Dirk P. Yamamoto Sep 2010

Providing A Theoretical Basis For Nanotoxicity Risk Analysis Departing From Traditional Physiologically-Based Pharmacokinetic (Pbpk) Modeling, Dirk P. Yamamoto

Theses and Dissertations

The same novel properties of engineered nanoparticles that make them attractive may also present unique exposure risks. But, the traditional physiologically-based pharmacokinetic (PBPK) modeling assumption of instantaneous equilibration likely does not apply to nanoparticles. This simulation-based research begins with development of a model that includes diffusion, active transport, and carrier mediated transport. An eigenvalue analysis methodology was developed to examine model behavior to focus future research. Simulations using the physicochemical properties of size, shape, surface coating, and surface charge were performed and an equation was determined which estimates area under the curve for arterial blood concentration, which is a surrogate …