Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Entire DC Network
Scattering From Dielectric Bodies, Jeffery M. Parks
Scattering From Dielectric Bodies, Jeffery M. Parks
Theses and Dissertations
The purpose of this study was to develop an RCS measured database of non-PEC targets and provide an example of its use to validate a code, 3D-RCIE. RCS prediction codes that handle penetrable materials require measured data to determine their accuracy. The materials used for this research include polyethylene and polyurethane with dielectric constants around 2.3 and 1.03, respectively. The polyethylene targets include a mini-arrow, ogive, conesphere, conesphere with a gap, sphere, and a large and small cube. The cubes were the only targets made from the polyurethane foam. Additionally, r-card was applied to the cubes and mini-arrow. The material …
Constrained Model Predictive Control Of A Nonlinear Aerospace System, Christopher M. Shearer
Constrained Model Predictive Control Of A Nonlinear Aerospace System, Christopher M. Shearer
Theses and Dissertations
Recent research efforts have applied the receding horizon Model Predictive Control (MPC) strategy to linearized high performance aerospace systems. The research contained in this thesis used these recent results in order to apply the MPC strategy to a nonlinear high performance aerospace system, specifically an F-16 fighter aircraft model. The model was commanded to follow dynamic trajectories of roll angle and altitude. Further, adaptive constraint techniques were used to improve system tracking. To accomplish these tasks, code and block diagrams were generated using the commercial software packages of Matlab and Simulink. Numerous simulations were conducted with the goal of achieving …
A Model For Determining Information To Be Captured Regarding Unauthorized Computer Entry Of An Air Force Computer System, Leslie F. Himebrook
A Model For Determining Information To Be Captured Regarding Unauthorized Computer Entry Of An Air Force Computer System, Leslie F. Himebrook
Theses and Dissertations
This thesis presents a model of information to capture regarding unauthorized computer systems access attempts. This model takes a management focus, and incorporates the technical focus, intelligence focus, and legal focus as inputs. The author used an exploratory, qualitative methodology consisting of an extensive literature review and interviews with experts in the field. These efforts produced the proposed model, which was reviewed by experts in the field using a delphi technique. The model consists of information that is divided into the following areas: 1. What information was compromised. 2. What type of intrusion occurred. 3. How the intrusion was attempted. …