Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (138)
- Physical Sciences and Mathematics (84)
- Aerospace Engineering (58)
- Electrical and Computer Engineering (37)
- Computer Engineering (31)
-
- Computer Sciences (27)
- Physics (26)
- Business (19)
- Navigation, Guidance, Control and Dynamics (17)
- Digital Communications and Networking (16)
- Information Security (16)
- Space Vehicles (15)
- Systems and Communications (14)
- Environmental Sciences (13)
- Electrical and Electronics (12)
- Propulsion and Power (11)
- Social and Behavioral Sciences (11)
- Signal Processing (10)
- Structures and Materials (10)
- Aeronautical Vehicles (9)
- Chemistry (9)
- Computer and Systems Architecture (9)
- Optics (9)
- Astrodynamics (8)
- Inorganic Chemistry (8)
- Operations and Supply Chain Management (8)
- Aerodynamics and Fluid Mechanics (7)
- Data Storage Systems (7)
- Nuclear (7)
- Applied Mathematics (6)
- Keyword
-
- #antcenter (13)
- Computer networks--Security measures (7)
- Artificial satellites--Orbits--Mathematical models (4)
- Computer security (4)
- Decision making (4)
-
- Image processing--Digital techniques (4)
- Imaging systems (4)
- Pattern recognition systems (4)
- Remote sensing (4)
- Drone aircraft (3)
- Global Positioning System (3)
- Lasers (3)
- Target acquisition (3)
- Algorithms (2)
- Artificial intelligence (2)
- Artificial satellites (2)
- Artificial satellites in navigation (2)
- Atmospheric turbulence (2)
- Business logistics (2)
- Cesium (2)
- Chromatographic analysis (2)
- Composite materials (2)
- Computers--Access control (2)
- Data encryption (Computer science) (2)
- Data protection (2)
- Distances--Measurement (2)
- Elliptical orbits (2)
- Experimental design (2)
- Expert systems (Computer science) (2)
- Government purchasing (2)
Articles 1 - 30 of 223
Full-Text Articles in Entire DC Network
A Linear Combination Of Heuristics Approach To Spatial Sampling Hyperspectral Data For Target Tracking, Barry R. Secrest
A Linear Combination Of Heuristics Approach To Spatial Sampling Hyperspectral Data For Target Tracking, Barry R. Secrest
Theses and Dissertations
Persistent surveillance of the battlespace results in better battlespace awareness which aids in obtaining air superiority, winning battles, and saving friendly lives. Although hyperspectral imagery (HSI) data has proven useful for discriminating targets, it presents many challenges as a useful tool in persistent surveillance. A new sensor under development has the potential of overcoming these challenges and transforming our persistent surveillance capability by providing HSI data for a limited number of pixels and grayscale video for the remainder. The challenge of exploiting this new sensor is determining where the HSI data in the sensor's field of view will be the …
Fatigue Behavior Of A Sic/Sic Composite At 1000⁰C In Air And In Steam, Michael W. Knauf
Fatigue Behavior Of A Sic/Sic Composite At 1000⁰C In Air And In Steam, Michael W. Knauf
Theses and Dissertations
Tension-tension fatigue behavior of a prototype Silicon Carbide/Silicon Carbide (SiC/SiC) ceramic matrix composite (CMC) material was investigated at 1000°C in laboratory air and in steam environments. The material consists of a SiC matrix reinforced with CG NICALON™ fibers woven in an eight harness satin weave (8HSW) and coated with a BN/SiC dual-layer interphase. The composite was manufactured by a Polymer Infiltration and Pyrolysis (PIP) process. A seal coat of SiC and elemental boron was applied to the test specimens after machining. The tensile stress-strain behavior was investigated and the tensile properties were measured at 1000°C. Tension-tension fatigue behavior was studied …
Flow Control Application On A Submerged Inlet Characterized By Three-Component Ldv, Tina H. Reynolds
Flow Control Application On A Submerged Inlet Characterized By Three-Component Ldv, Tina H. Reynolds
Theses and Dissertations
A submerged inlet investigation, using flow control in the form of discrete blowing, examined proximity and jet directionality to improve compressor face uniformity. The flow control locations were at the head of the ramp and part way down the ramp, providing four configurations under examination. Laser Doppler velocimetry (LDV)measurements at the throat determined the effect of the flow control based on the statistical velocity measurements. Blowing at closer proximity to the throat and targeting the largest velocity deficit region provided the best results. The airspeed and inlet velocity simulated takeoff and landing conditions; velocities ranged from Mach 0.1-0.3 at the …
Network Security Toolkit Including Heuristic Solutions For Trust System Placement And Network Obfuscation, Gabriel H. Greve
Network Security Toolkit Including Heuristic Solutions For Trust System Placement And Network Obfuscation, Gabriel H. Greve
Theses and Dissertations
For Part I, a supervisory control and data acquisition (SCADA) network consists of a group stations and substations in a portion of the power grid. The use of Internet technology in SCADA communications as well as other factors has caused vulnerabilities. One idea to help mitigate this risk is to strategically place trust nodes to compartmentalize and secure the SCADA systems without disturbing its finely honed processes. The trust nodes combine firewall and intrusion detection technology to provide more secure communication. An optimal solution to this problem has already been developed using a mixed-integer linear programming model. Because the problem …
A Space Acquisition Leading Indicator Based On System Interoperation Maturity, Jason T. Shibata
A Space Acquisition Leading Indicator Based On System Interoperation Maturity, Jason T. Shibata
Theses and Dissertations
The Department of Defense‘s space acquisition enterprise has experienced numerous challenges since the advent of space power. Space borne capabilities are needed more than ever, but space acquisition frequently fails to meet its goals. The decades of space acquisition experience form a rich history that can be used to build a leading indicator of success to enable effective program execution. First, the space acquisition areas of greatest concern were determined to be cost, schedule and requirements. These areas are considered as systems composed of the people, processes and products that execute the program. Second, the vital interoperation characteristics, or attributes …
Performance Characterization Of A Three-Axis Hall Effect Thruster, Spencer E. Temkin
Performance Characterization Of A Three-Axis Hall Effect Thruster, Spencer E. Temkin
Theses and Dissertations
No abstract provided.
Effects Of Prior Aging At 274⁰C In Argon On Inelastic Deformation Behavior Of Pmr-15 Polymer At 288⁰C: Experiment And Modeling, Joseph A. Wahlquist
Effects Of Prior Aging At 274⁰C In Argon On Inelastic Deformation Behavior Of Pmr-15 Polymer At 288⁰C: Experiment And Modeling, Joseph A. Wahlquist
Theses and Dissertations
No abstract provided.
Navigation With Limited Prior Information Using Time Difference Of Arrival Measurements From Signals Of Opportunity, Christopher M. Rondeau
Navigation With Limited Prior Information Using Time Difference Of Arrival Measurements From Signals Of Opportunity, Christopher M. Rondeau
Theses and Dissertations
The Global Positioning System (GPS) provides world-wide availability to high-accuracy navigation and positioning information. However, the threats to GPS are increasing, and many limitations of GPS are being encountered. Simultaneously, systems previously considered as viable backups or supplements to GPS are being shut down. This creates the need for system alternatives. Navigation using signals of opportunity (SoOP) exploits any signal that is available in a given area, regardless of whether or not the original intent of the signal was for navigation. Common techniques to compute a position estimate using SoOP include received signal strength, angle of arrival, time of arrival, …
Tunable Optical Delay In Doppler-Broadened Cesium Vapor, Monte D. Anderson
Tunable Optical Delay In Doppler-Broadened Cesium Vapor, Monte D. Anderson
Theses and Dissertations
Variable-delay tunable optical delay line or optical buffers are critical for the development of all-optical networks components as well as interferometry and analytic instruments. Recent research on slow light may hold the key for the development of the first practical tunable optical delay device. In this research the linear dispersion delay effects in an alkali vapor. The hyperfine relaxation observations present insight into the complex bleach wave dynamics during a high-intensity pulsed pump in DPAL systems.
An Analysis Of How Education, Age, Overseas Assignments, And Mavenism Impact Use Of New Media Technology, Thomas E. Enright Jr.
An Analysis Of How Education, Age, Overseas Assignments, And Mavenism Impact Use Of New Media Technology, Thomas E. Enright Jr.
Theses and Dissertations
Previous research into new media technology usage has typically been limited to young adults ages 18-24. However this study will include age, education, overseas assignments, presence of mavenism, and information security concerns as variables impacting new media usage. For the purpose of this study, new media is defined by devices, activities, and social arrangements (Lievrouw & Livingstone, 2006). While dozens of new media technology are available, the scope of this research examined individual’s use of blogs, online social networks, and downloadable content. Data about new media was gathered through a literature review and by conducting interviews with people that are …
Conceptual Design And Analysis Of Service Oriented Architecture (Soa) For Command And Control Of Space Assets, Eric B. Snyder
Conceptual Design And Analysis Of Service Oriented Architecture (Soa) For Command And Control Of Space Assets, Eric B. Snyder
Theses and Dissertations
The mission-unique model that has dominated the DoD satellite Command and Control community is costly and inefficient. It requires repeatedly “reinventing” established common C2 components for each program, unnecessarily inflating budgets and delivery schedules. The effective utilization of standards is scarce, and proprietary, non-open solutions are commonplace. IT professionals have trumpeted Service Oriented Architectures (SOAs) as the solution to large enterprise situations where multiple, functionally redundant but non-compatible information systems create large recurring development, test, maintenance, and tech refresh costs. This thesis describes the current state of Service Oriented Architectures as related to satellite operations and presents a functional analysis …
Scattering Matrix Elements For The Nonadiabatic Collision B (2PJₐ) + H2 (1Σ+G, Ν, Ј) ↔ B (2PJ’ₐ) + H2 (1Σ+G, Ν’, J’), Luke A. Barger
Scattering Matrix Elements For The Nonadiabatic Collision B (2PJₐ) + H2 (1Σ+G, Ν, Ј) ↔ B (2PJ’ₐ) + H2 (1Σ+G, Ν’, J’), Luke A. Barger
Theses and Dissertations
Scattering matrix elements are calculated for the nonadiabatic inelastic collision B (2Pjₐ) + H2 (1Σ+g, ν, ј) ↔ B (2Pj’ₐ) + H2 (1Σ+g, ν’, j’). This calculation utilizes the effective potential energy surfaces for this collision generated by Garvin along with a correction to the asymptotic H2 potential. Wavepackets are propagated on these surfaces using a split-operator propagator. This propagation yields correlation functions between reactant and product Møller states which are used to calculate the scattering …
Cyber Situational Awareness Using Live Hypervisor-Based Virtual Machine Introspection, Dustyn A. Dodge
Cyber Situational Awareness Using Live Hypervisor-Based Virtual Machine Introspection, Dustyn A. Dodge
Theses and Dissertations
In this research, a compiled memory analysis tool for virtualization (CMAT-V) is developed as a virtual machine introspection (VMI) utility to conduct live analysis during cyber attacks. CMAT-V leverages static memory dump analysis techniques to provide live dynamic system state data. Unlike some VMI applications, CMAT-V bridges the semantic gap using derivation techniques. CMAT-V detects Windows-based operating systems and uses the Microsoft Symbol Server to provide this context to the user. This research demonstrates the usefulness of CMAT-V as a situational awareness tool during cyber attacks, tests the detection of CMAT-V from the guest system level and measures its impact …
Collisional Dynamics Of The Cesium D1 And D2 Transitions, Greg A. Pitz
Collisional Dynamics Of The Cesium D1 And D2 Transitions, Greg A. Pitz
Theses and Dissertations
The collisional dynamics of the 62P levels in cesium have been studied utilizing steady state laser absorption and laser induced florescence techniques. In addition the production of a blue beam produced by two photon absorption has been observed in potassium. The collisional broadening rate for cesium, λL, for He, Ne, Ar, Kr, Xe, N2, H2, HD, D2, CH4, C2H6, CF4, and 3He are 24.13, 10.85, 18.31, 17.82, 19.74, 16.64, 20.81, 20.06, 18.04, 29.00, 26.70, 18.84, and 26.00 MHz/torr, respectively for the …
Improving Range Estimation Of A 3d Flash Ladar Via Blind Deconvolution, Jason R. Mcmahon
Improving Range Estimation Of A 3d Flash Ladar Via Blind Deconvolution, Jason R. Mcmahon
Theses and Dissertations
The purpose of this research effort is to improve and characterize range estimation in a three-dimensional FLASH LAser Detection And Ranging (3D FLASH LADAR) by investigating spatial dimension blurring effects. The myriad of emerging applications for 3D FLASH LADAR both as primary and supplemental sensor necessitate superior performance including accurate range estimates. Along with range information, this sensor also provides an imaging or laser vision capability. Consequently, accurate range estimates would also greatly aid in image quality of a target or remote scene under interrogation. Unlike previous efforts, this research accounts for pixel coupling by defining the range image mathematical …
A Comparative Analysis Of Ascii And Xml Logging Systems, Eric C. Hanington
A Comparative Analysis Of Ascii And Xml Logging Systems, Eric C. Hanington
Theses and Dissertations
This research compares XML and ASCII based event logging systems in terms of their storage and processing efficiency. XML has been an emerging technology, even for security. Therefore, it is researched as a logging system with the mitigation of its verbosity. Each system consists of source content, the network transmission, database storage, and querying which are all studied as individual parts. The ASCII logging system consists of the text file as source, FTP as transport, and a relational database system for storage and querying. The XML system has the XML files and XML files in binary form using Efficient XML …
Satellite Capabilities Mapping - Utilizing Small Satellites, David A. Grigsby
Satellite Capabilities Mapping - Utilizing Small Satellites, David A. Grigsby
Theses and Dissertations
The cost and schedule advantages small satellites have over larger legacy systems have been studied, but there has been very little experimentation performed to determine whether small satellites can actually deliver the capabilities of larger spacecraft. To date, a desired operational capability has not been fully realized by a scalable satellite design. Advances in sensor technology have led to significant reductions in size, weight, and power (SWaP) presenting an opportunity to exploit the evolution of space operations by using small satellites to perform specific missions. This paper describes a methodology that maps a specific set of large space vehicle capabilities …
Laser Demonstration And Performance Characterization Of An Optically Pumped Alkali Laser System, Clifford V. Sulham
Laser Demonstration And Performance Characterization Of An Optically Pumped Alkali Laser System, Clifford V. Sulham
Theses and Dissertations
Diode Pumped Alkali Lasers (DPALs) offer a promising approach for high power lasers in military applications that will not suffer from the long logistical trails of chemical lasers or the thermal management issues of diode pumped solid state lasers. This research focuses on characterizing a DPAL-type system to gain a better understanding of using this type of laser as a directed energy weapon. A rubidium laser operating at 795 nm is optically pumped by a pulsed titanium sapphire laser to investigate the dynamics of DPALs at pump intensities between 1.3 and 45 kW/cm2. Linear scaling as high as …
Exploring The Effects Of International Traffic In Arms Regulations Restrictions On Innovation In The U.S. Space Industrial Base, Kalliroi L. Landry
Exploring The Effects Of International Traffic In Arms Regulations Restrictions On Innovation In The U.S. Space Industrial Base, Kalliroi L. Landry
Theses and Dissertations
The International Traffic in Arms Regulations (ITAR) are used to protect United States (U.S.) military technologies. However, changes to ITAR export controls regarding space technologies have had a major impact to the U.S. space industry. The literature mentions a concern for the health of lower-tier firms because they are a major source of innovation, but there is no additional information considering the effects of ITAR on space innovation at those lower tiers. The purpose of this thesis was to explore the implications of continuing the current ITAR restrictions with regard to innovation in the space industry. This research used a …
Neural Extensions To Robust Parameter Design, Bernard Jacob Loeffelholz
Neural Extensions To Robust Parameter Design, Bernard Jacob Loeffelholz
Theses and Dissertations
Robust parameter design (RPD) is implemented in systems in which a user wants to minimize the variance of a system response caused by uncontrollable factors while obtaining a consistent and reliable system response over time. We propose the use of artificial neural networks to compensate for highly non-linear problems that quadratic regression fails to accurately model. RPD is conducted under the assumption that the relationship between system response and controllable and uncontrollable variables does not change over time. We propose a methodology to find a new set of settings that will be robust to moderate system degradation while remaining robust …
Improving The Quality Of Service And Security Of Military Networks With A Network Tasking Order Process, Matthew D. Compton
Improving The Quality Of Service And Security Of Military Networks With A Network Tasking Order Process, Matthew D. Compton
Theses and Dissertations
This research presents a Network Tasking Order process that collects mission plans, network capabilities, and historical records to build a Network Tasking Order (NTO). The NTO document directs the form and usage of the network, much like an Air Tasking Order (ATO) directs the usage of air power. The NTO process is fleshed out with the content and format of the NTO given herein for the first time. Tools such as topology control algorithms are then shown through simulation to improve the quality of service of the network by finding favorable ways to connect the assets identified during the NTO …
Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey
Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey
Theses and Dissertations
This research effort examines the theory, application, and results for a Reputation-based Internet Protocol Security (RIPSec) framework that provides security for an ad-hoc network operating in a hostile environment. In RIPSec, protection from external threats is provided in the form of encrypted communication links and encryption-wrapped nodes while internal threats are mitigated by behavior grading that assigns reputations to nodes based on their demonstrated participation in the routing process. Network availability is provided by behavior grading and round-robin multipath routing. If a node behaves faithfully, it earns a positive reputation over time. If a node misbehaves (for any number of …
Determining The Index Of Refraction Of An Unknown Object Using Passive Polarimetric Imagery Degraded By Atmospheric Turbulence, Milo W. Hyde Iv
Determining The Index Of Refraction Of An Unknown Object Using Passive Polarimetric Imagery Degraded By Atmospheric Turbulence, Milo W. Hyde Iv
Theses and Dissertations
In this research, an algorithm is developed to estimate the index of refraction of an unknown object using passive polarimetric images degraded by atmospheric turbulence. The algorithm uses a variant of the maximum-likelihood blind-deconvolution algorithm developed by LeMaster and Cain to recover the true object (i.e., the first Stokes parameter), the degree of linear polarization, and the polarimetric-image point spread functions. Nonlinear least squares is then used to find the value of the complex index of refraction which best fits the theoretical degree of linear polarization, derived using a polarimetric bidirectional reflectance distribution function, to the turbulence-corrected degree of linear …
Statistical Image Recovery From Laser Speckle Patterns With Polarization Diversity, Donald B. Dixon
Statistical Image Recovery From Laser Speckle Patterns With Polarization Diversity, Donald B. Dixon
Theses and Dissertations
This research extends the theory and understanding of the laser speckle imaging technique. This non-traditional imaging technique may be employed to improve space situational awareness and image deep space objects from a ground-based sensor system. The use of this technique is motivated by the ability to overcome aperture size limitations and the distortion effects from Earth’s atmosphere. Laser speckle imaging is a lensless, coherent method for forming two-dimensional images from their autocorrelation functions. Phase retrieval from autocorrelation data is an ill-posed problem where multiple solutions exist. This research introduces polarization diversity as a method for obtaining additional information so the …
Applying Image Matching To Video Analysis, Adam J. Behring
Applying Image Matching To Video Analysis, Adam J. Behring
Theses and Dissertations
Dealing with the volume of multimedia collected on a daily basis for intelligence gathering and digital forensics investigations requires significant manual analysis. A component of this problem is that a video may be reanalyzed that has already been analyzed. Identifying duplicate video sequences is difficult due to differences in videos of varying quality and size. This research uses a kd-tree structure to increase image matching speed. Keypoints are generated and added to a kd-tree of a large dimensionality (128 dimensions). All of the keypoints for the set of images are used to construct a global kd-tree, which allows nearest neighbor …
Code White: A Signed Code Protection Mechanism For Smartphones, Joseph M. Hinson Iv
Code White: A Signed Code Protection Mechanism For Smartphones, Joseph M. Hinson Iv
Theses and Dissertations
This research develops Code White, a hardware-implemented trusted execution mechanism for the Symbian mobile operating system. Code White combines a signed whitelist approach with the execution prevention technology offered by the ARM architecture. Testing shows that it prevents all untrusted user applications from executing while allowing all trusted applications to load and run. Performance testing in contrast with an unmodified Symbian system shows that the difference in load time increases linearly as the application file size increases. The predicted load time for an application with a one megabyte code section remains well below one second, ensuring uninterrupted experience for the …
Accelerating Malware Detection Via A Graphics Processing Unit, Nicholas S. Kovach
Accelerating Malware Detection Via A Graphics Processing Unit, Nicholas S. Kovach
Theses and Dissertations
Real-time malware analysis requires processing large amounts of data storage to look for suspicious files. This is a time consuming process that (requires a large amount of processing power) often affecting other applications running on a personal computer. This research investigates the viability of using Graphic Processing Units (GPUs), present in many personal computers, to distribute the workload normally processed by the standard Central Processing Unit (CPU). Three experiments are conducted using an industry standard GPU, the NVIDIA GeForce 9500 GT card. The goal of the first experiment is to find the optimal number of threads per block for calculating …
Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard
Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard
Theses and Dissertations
As malware has evolved over the years, it has gone from harmless programs that copy themselves into other executables to modern day botnets that perform bank fraud and identity theft. Modern malware often has a need to communicate back to the author, or other machines that are also infected. Several techniques for transmitting this data covertly have been developed over the years which vary significantly in their level of sophistication. This research creates a new covert channel technique for stealing information from a network by piggybacking on user-generated network traffic. Specifically, steganography drop boxes and passive covert channels are merged …
Orbital Tori Construction Using Trajectory Following Spectral Methods, Ralph E. Bordner Iii
Orbital Tori Construction Using Trajectory Following Spectral Methods, Ralph E. Bordner Iii
Theses and Dissertations
By assuming the motion of a satellite about the earth’s geopotential mimics the known Kolmogorov-Arnold-Moser (KAM) solution of a lightly perturbed integrable Hamiltonian system, this research focused on applying trajectory following spectral methods to estimate orbital tori from sampled orbital data. From an estimated basis frequency set, orbital data was decomposed into multi-periodic Fourier series, essentially compressing ephemerides for long-term use. Real-world Global Positioning System (GPS) orbital tracks were decomposed and reconstructed with error from as low as few kilometers per coordinate axis over a 10-week span to tens of kilometers per coordinate axis over the same time period, depending …
Providing A Theoretical Basis For Nanotoxicity Risk Analysis Departing From Traditional Physiologically-Based Pharmacokinetic (Pbpk) Modeling, Dirk P. Yamamoto
Providing A Theoretical Basis For Nanotoxicity Risk Analysis Departing From Traditional Physiologically-Based Pharmacokinetic (Pbpk) Modeling, Dirk P. Yamamoto
Theses and Dissertations
The same novel properties of engineered nanoparticles that make them attractive may also present unique exposure risks. But, the traditional physiologically-based pharmacokinetic (PBPK) modeling assumption of instantaneous equilibration likely does not apply to nanoparticles. This simulation-based research begins with development of a model that includes diffusion, active transport, and carrier mediated transport. An eigenvalue analysis methodology was developed to examine model behavior to focus future research. Simulations using the physicochemical properties of size, shape, surface coating, and surface charge were performed and an equation was determined which estimates area under the curve for arterial blood concentration, which is a surrogate …