Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

Scattering From Dielectric Bodies, Jeffery M. Parks Dec 1997

Scattering From Dielectric Bodies, Jeffery M. Parks

Theses and Dissertations

The purpose of this study was to develop an RCS measured database of non-PEC targets and provide an example of its use to validate a code, 3D-RCIE. RCS prediction codes that handle penetrable materials require measured data to determine their accuracy. The materials used for this research include polyethylene and polyurethane with dielectric constants around 2.3 and 1.03, respectively. The polyethylene targets include a mini-arrow, ogive, conesphere, conesphere with a gap, sphere, and a large and small cube. The cubes were the only targets made from the polyurethane foam. Additionally, r-card was applied to the cubes and mini-arrow. The material …


Constrained Model Predictive Control Of A Nonlinear Aerospace System, Christopher M. Shearer Dec 1997

Constrained Model Predictive Control Of A Nonlinear Aerospace System, Christopher M. Shearer

Theses and Dissertations

Recent research efforts have applied the receding horizon Model Predictive Control (MPC) strategy to linearized high performance aerospace systems. The research contained in this thesis used these recent results in order to apply the MPC strategy to a nonlinear high performance aerospace system, specifically an F-16 fighter aircraft model. The model was commanded to follow dynamic trajectories of roll angle and altitude. Further, adaptive constraint techniques were used to improve system tracking. To accomplish these tasks, code and block diagrams were generated using the commercial software packages of Matlab and Simulink. Numerous simulations were conducted with the goal of achieving …


A Model For Determining Information To Be Captured Regarding Unauthorized Computer Entry Of An Air Force Computer System, Leslie F. Himebrook Dec 1997

A Model For Determining Information To Be Captured Regarding Unauthorized Computer Entry Of An Air Force Computer System, Leslie F. Himebrook

Theses and Dissertations

This thesis presents a model of information to capture regarding unauthorized computer systems access attempts. This model takes a management focus, and incorporates the technical focus, intelligence focus, and legal focus as inputs. The author used an exploratory, qualitative methodology consisting of an extensive literature review and interviews with experts in the field. These efforts produced the proposed model, which was reviewed by experts in the field using a delphi technique. The model consists of information that is divided into the following areas: 1. What information was compromised. 2. What type of intrusion occurred. 3. How the intrusion was attempted. …