Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 40

Full-Text Articles in Engineering

Improving Detection Of Dim Targets: Optimization Of A Moment-Based Detection Algorithm, Shannon R. Young Dec 2018

Improving Detection Of Dim Targets: Optimization Of A Moment-Based Detection Algorithm, Shannon R. Young

Theses and Dissertations

Wide area motion imagery (WAMI) sensor technology is advancing rapidly. Increases in frame rates and detector array sizes have led to a dramatic increase in the volume of data that can be acquired. Without a corresponding increase in analytical manpower, much of these data remain underutilized. This creates a need for fast, automated, and robust methods for detecting dim, moving signals of interest. Current approaches fall into two categories: detect-before-track (DBT) and track-before-detect (TBD) methods. The DBT methods use thresholding to reduce the quantity of data to be processed, making real time implementation practical but at the cost of the …


Reconstruction Of The 3d Temperature And Species Concentration Spatial Distribution Of A Jet Engine Exhaust Plume Using An Infrared Fourier Transform Spectrometer Hyperspectral Imager, Mason D. Paulec Sep 2018

Reconstruction Of The 3d Temperature And Species Concentration Spatial Distribution Of A Jet Engine Exhaust Plume Using An Infrared Fourier Transform Spectrometer Hyperspectral Imager, Mason D. Paulec

Theses and Dissertations

The measurement of combustion byproducts is useful for determining pollution of any fuel burning application, efficiency of combustion, and determining detectability of aircraft exhausts. Both intrusive and non-intrusive techniques have been utilized to measure these quantities. For the majority of the non-intrusive techniques, the absorption and emission spectra of the gases are utilized for measurements. For this research, the use of the Telops Infrared Fourier Transform Spectrometer (IFTS) Hyperspectral Imager (HSI) was explored within the scope of combustion diagnostic methods, as an option for remote measurements of a jet turbine to determine concentration of species and temperature of the combustion …


Application Of Spectral Solution And Neural Network Techniques In Plasma Modeling For Electric Propulsion, Joseph R. Whitman Sep 2018

Application Of Spectral Solution And Neural Network Techniques In Plasma Modeling For Electric Propulsion, Joseph R. Whitman

Theses and Dissertations

A solver for Poisson's equation was developed using the Radix-2 FFT method first invented by Carl Friedrich Gauss. Its performance was characterized using simulated data and identical boundary conditions to those found in a Hall Effect Thruster. The characterization showed errors below machine-zero with noise-free data, and above 20% noise-to-signal strength, the error increased linearly with the noise. This solver can be implemented into AFRL's plasma simulator, the Thermophysics Universal Research Framework (TURF) and used to quickly and accurately compute the electric field based on charge distributions. The validity of a machine learning approach and data-based complex system modeling approach …


Evaluation Criteria For Selecting Nosql Databases In A Single Box Environment, Ryan D. Engle, Brent T. Langhals, Michael R. Grimaila, Douglas D. Hodson Aug 2018

Evaluation Criteria For Selecting Nosql Databases In A Single Box Environment, Ryan D. Engle, Brent T. Langhals, Michael R. Grimaila, Douglas D. Hodson

Faculty Publications

In recent years, NoSQL database systems have become increasingly popular, especially for big data, commercial applications. These systems were designed to overcome the scaling and flexibility limitations plaguing traditional relational database management systems (RDBMSs). Given NoSQL database systems have been typically implemented in large-scale distributed environments serving large numbers of simultaneous users across potentially thousands of geographically separated devices, little consideration has been given to evaluating their value within single-box environments. It is postulated some of the inherent traits of each NoSQL database type may be useful, perhaps even preferable, regardless of scale. Thus, this paper proposes criteria conceived to …


Arrhenius Rate Chemistry-Informed Inter-Phase Source Terms (Arciist), Matthew J. Schwaab, Robert B. Greendyke, Bryan J. Steward Jul 2018

Arrhenius Rate Chemistry-Informed Inter-Phase Source Terms (Arciist), Matthew J. Schwaab, Robert B. Greendyke, Bryan J. Steward

Faculty Publications

Currently, in macro-scale hydrocodes designed to simulate explosive material undergoing shock-induced ignition, the state of the art is to use one of numerous reaction burn rate models. These burn models are designed to estimate the bulk chemical reaction rate. Unfortunately, these burn rate models are largely based on empirical data and must be recalibrated for every new material being simulated. We propose that the use of Arrhenius Rate Chemistry-Informed Interphase Source Terms (ARCIIST) in place of empirically derived burn models will improve the accuracy for these computational codes. A reacting chemistry model of this form was developed for the cyclic …


Photovoltaic System Optimization For An Austere Location Using Time Series Data, Torrey J. Wagner, Eric Lang, Warren Assink, Douglas S. Dudis Jun 2018

Photovoltaic System Optimization For An Austere Location Using Time Series Data, Torrey J. Wagner, Eric Lang, Warren Assink, Douglas S. Dudis

Faculty Publications

In this work we test experimental photovoltaic, storage and generator technologies and investigate their potential to meet austere location energy needs. After defining the energy requirements and insolation of a 1,100-person base, we develop a microgrid model and simulation. Cost optimizations were then performed using hourly time-series data to explore the cost and performance trade-space of a PV-battery-generator system. The work highlights the cost of resiliency and the dependencies of optimum system component sizes on duration and the fully burdened cost of fuel.


Uncertainty Evaluation In The Design Of Structural Health Monitoring Systems For Damage Detection, Christine M. Schubert Kabban, Richard P. Uber, Kevin J. Lin, Bin Lin, M. Bhuiyan, Victor Giurgiutiu Apr 2018

Uncertainty Evaluation In The Design Of Structural Health Monitoring Systems For Damage Detection, Christine M. Schubert Kabban, Richard P. Uber, Kevin J. Lin, Bin Lin, M. Bhuiyan, Victor Giurgiutiu

Faculty Publications

The validation of structural health monitoring (SHM) systems for aircraft is complicated by the extent and number of factors that the SHM system must demonstrate for robust performance. Therefore, a time- and cost-efficient method for examining all of the sensitive factors must be conducted. In this paper, we demonstrate the utility of using the simulation modeling environment to determine the SHM sensitive factors that must be considered for subsequent experiments, in order to enable the SHM validation. We demonstrate this concept by examining the effect of SHM system configuration and flaw characteristics on the response of a signal from a …


Wall-Modeled Large Eddy Simulation Of A Three-Dimensional Shock-Boundary Layer Interaction, Nicholas J. Marco Mar 2018

Wall-Modeled Large Eddy Simulation Of A Three-Dimensional Shock-Boundary Layer Interaction, Nicholas J. Marco

Theses and Dissertations

The direct simulation of turbulent flows is prohibitive at high Reynolds numbers; thus, methods such as RANS and LES are used. However, these methods still require a large number of cells near a solid boundary. To circumvent this issue, a Wall-Modeled Large Eddy Simulation (WM-LES) can be used. Of interest is how these wall models perform in comparison to a Wall-Resolved Large Eddy Simulation (WR-LES) and experimental results of a shock turbulent boundary layer interactions (STBLI) and specifically, whether equilibrium wall models are sufficient to resolve the oscillatory and hence non-equilibrium nature of these flows or whether a non-equilibrium model …


Behavior Flexibility For Autonomous Unmanned Aerial Systems, Taylor B. Bodin Mar 2018

Behavior Flexibility For Autonomous Unmanned Aerial Systems, Taylor B. Bodin

Theses and Dissertations

Autonomous unmanned aerial systems (UAS) could supplement and eventually subsume a substantial portion of the mission set currently executed by remote pilots, making UAS more robust, responsive, and numerous than permitted by teleoperation alone. Unfortunately, the development of robust autonomous systems is difficult, costly, and time-consuming. Furthermore, the resulting systems often make little reuse of proven software components and offer limited adaptability for new tasks. This work presents a development platform for UAS which promotes behavioral flexibility. The platform incorporates the Unified Behavior Framework (a modular, extensible autonomy framework), the Robotic Operating System (a RSF), and PX4 (an open- source …


Passive Radiolocation Of Ieee 802.11 Emitters Using Directional Antennae, Bradford E. Law Mar 2018

Passive Radiolocation Of Ieee 802.11 Emitters Using Directional Antennae, Bradford E. Law

Theses and Dissertations

Low-cost commodity hardware and cheaper, more capable consumer-grade drones make the threat of home-made, inexpensive drone-mounted wireless attack platforms (DWAPs) greater than ever. Fences and physical security do little to impede a drone from approaching private, commercial, or government wireless access points (WAPs) and conducting wireless attacks. At the same time, unmanned aerial vehicles (UAVs) present a valuable tool for network defenders conducting site surveys and emulating threats. These platforms present near-term dangers and opportunities for corporations and governments. Despite the vast leaps in technology these capabilities represent, UAVs are noisy and consequently difficult to conceal as they approach a …


Special Perturbations On The Jetson Tx1 And Tx2 Computers, Tyler M. Moore Mar 2018

Special Perturbations On The Jetson Tx1 And Tx2 Computers, Tyler M. Moore

Theses and Dissertations

Simplified General Perturbations Number 4 (SGP4) has been the traditional algorithm for performing Orbit Determination (OD) onboard orbiting spacecraft. However, the recent rise of high-performance computers with low Size, Weight, and Power (SWAP) factors has provided the opportunity to use Special Perturbations (SP), a more accurate algorithm to perform onboard OD. This research evaluates the most efficient way to implement SP on NVIDIA’s Jetson TX series of integrated Graphical Processing Units (GPUs). An initial serial version was implemented on the Jetson TX1 and TX2's Central Processing Units (CPUs). The runtimes of the initial version are the benchmark that the runtimes …


Integrity Monitoring For Automated Aerial Refueling: A Stereo Vision Approach, Thomas R. Stuart Mar 2018

Integrity Monitoring For Automated Aerial Refueling: A Stereo Vision Approach, Thomas R. Stuart

Theses and Dissertations

Unmanned aerial vehicles (UAVs) increasingly require the capability to y autonomously in close formation including to facilitate automated aerial refueling (AAR). The availability of relative navigation measurements and navigation integrity are essential to autonomous relative navigation. Due to the potential non-availability of the global positioning system (GPS) during military operations, it is highly desirable that relative navigation can be accomplished without the use of GPS. This paper develops two algorithms designed to provide relative navigation measurements solely from a stereo image pair. These algorithms were developed and analyzed in the context of AAR using a stereo camera system modeling that …


Analysis Of Temperature And Humidity Effects On Horizontal Photovoltaic Panels, Corey J. Booker Mar 2018

Analysis Of Temperature And Humidity Effects On Horizontal Photovoltaic Panels, Corey J. Booker

Theses and Dissertations

The United States Air Force seeks to address power grid vulnerability and bolster energy resilience through the use of renewable energy sources. Air Force Institute of Technology engineers designed and manufactured control systems to monitor power production from the most widely-used silicon-based solar cells at 38 testing locations around the globe spanning the majority of climate types. Researchers conducted multivariate regression analysis to establish a statistical relationship between photovoltaic power output, ambient temperature, and humidity pertaining to monocrystalline and polycrystalline photovoltaic panels. Formulated models first characterized power output globally, then by specific climate type with general inaccuracy. Location-specific models are …


Quantifying Permafrost Extent, Condition, And Degradation Rates At Department Of Defense Installations In The Arctic, Christopher A.J. Edlund Mar 2018

Quantifying Permafrost Extent, Condition, And Degradation Rates At Department Of Defense Installations In The Arctic, Christopher A.J. Edlund

Theses and Dissertations

The DoD is planning over $500M in military construction on Eielson Air Force Base (AFB) within the next three years. This construction program will expand the footprint of facilities and change parts of the storm water management scheme, which may have second order effects on the underlying permafrost layer. These changes in permafrost will drive engineering decision making at local and regional levels, and help shape the overall strategy for military readiness in the Arctic. Little site-specific knowledge exists on the human caused effects to permafrost at this location. In 2016, the permafrost degradation rates at Eielson AFB were modeled …


Estimating Defensive Cyber Operator Decision Confidence, Markus M. Borneman Mar 2018

Estimating Defensive Cyber Operator Decision Confidence, Markus M. Borneman

Theses and Dissertations

As technology continues to advance the domain of cyber defense, signature and heuristic detection mechanisms continue to require human operators to make judgements about the correctness of machine decisions. Human cyber defense operators rely on their experience, expertise, and understanding of network security, when conducting cyber-based investigations, in order to detect and respond to cyber alerts. Ever growing quantities of cyber alerts and network traffic, coupled with systemic manpower issues, mean no one has the time to review or change decisions made by operators. Since these cyber alert decisions ultimately do not get reviewed again, an inaccurate decision could cause …


Progressive Network Deployment, Performance, And Control With Software-Defined Networking, Daniel J. Casey Mar 2018

Progressive Network Deployment, Performance, And Control With Software-Defined Networking, Daniel J. Casey

Theses and Dissertations

The inflexible nature of traditional computer networks has led to tightly-integrated systems that are inherently difficult to manage and secure. New designs move low-level network control into software creating software-defined networks (SDN). Augmenting an existing network with these enhancements can be expensive and complex. This research investigates solutions to these problems. It is hypothesized that an add-on device, or "shim" could be used to make a traditional switch behave as an OpenFlow SDN switch while maintaining reasonable performance. A design prototype is found to cause approximately 1.5% reduction in throughput for one ow and less than double increase in latency, …


Modeling A Space-Based Quantum Link, Alexander W. Duchane Mar 2018

Modeling A Space-Based Quantum Link, Alexander W. Duchane

Theses and Dissertations

Quantum sources and single photon detectors have improved, allowing quantum algorithms for communication, encryption, computing, and sensing to transition from theory and small-scale laboratory experiments to field experiments. One such quantum algorithm, Quantum Key Distribution, uses optical pulses to generate shared random bit strings between two locations. These shared bit strings can be turned into encryption keys to be used as a one-time-pad or integrated with symmetric encryption techniques such as the Advanced Encryption Standard. This method of key generation and encryption is resistant to future advances in quantum computing which significantly degrade the effectiveness of current asymmetric key sharing …


Assured Android Execution Environments, Brandon P. Froberg Mar 2018

Assured Android Execution Environments, Brandon P. Froberg

Theses and Dissertations

Current cybersecurity best practices, techniques, tactics and procedures are insufficient to ensure the protection of Android systems. Software tools leveraging formal methods use mathematical means to assure both a design and implementation for a system and these methods can be used to provide security assurances. The goal of this research is to determine methods of assuring isolation when executing Android software in a contained environment. Specifically, this research demonstrates security properties relevant to Android software containers can be formally captured and validated, and that an implementation can be formally verified to satisfy a corresponding specification. A three-stage methodology called "The …


Mitigating The Effects Of Boom Occlusion On Automated Aerial Refueling Through Shadow Volumes, Zachary C. Paulson Mar 2018

Mitigating The Effects Of Boom Occlusion On Automated Aerial Refueling Through Shadow Volumes, Zachary C. Paulson

Theses and Dissertations

In flight refueling of Unmanned Aerial Vehicles (UAVs) is critical to the United States Air Force (USAF). However, the large communication latency between a ground-based operator and his/her remote UAV makes docking with a refueling tanker unsafe. This latency may be mitigated by leveraging a tanker-centric stereo vision system. The vision system observes and computes an approaching receiver's relative position and orientation offering a low-latency, high frequency docking solution. Unfortunately, the boom -- an articulated refueling arm responsible for physically pumping fuel into the receiver -- occludes large portions of the receiver especially as the receiver approaches and docks with …


Rss-Based Device-Free Passive Detection And Localization Using Home Automation Network Radio Frequencies, Tiffany M. Phan Mar 2018

Rss-Based Device-Free Passive Detection And Localization Using Home Automation Network Radio Frequencies, Tiffany M. Phan

Theses and Dissertations

This research provided a proof of concept for a device-free passive (DfP) system capable of detecting and localizing a target through exploitation of a home automation network’s radio frequency (RF) signals. The system was developed using Insteon devices with a 915 MHz center frequency. Without developer privileges, limitations of the Insteon technology like no intrinsic received signal strength (RSS) field and silent periods between messages were overcome by using software-defined radios to simulate Insteon devices capable of collecting and reporting RSS, and by creating a message generation script and implementing a calibrated filter threshold to reduce silent periods. Evaluation of …


Stereo Vision: A Comparison Of Synthetic Imagery Vs. Real World Imagery For The Automated Aerial Refueling Problem, Nicholas J. Seydel Mar 2018

Stereo Vision: A Comparison Of Synthetic Imagery Vs. Real World Imagery For The Automated Aerial Refueling Problem, Nicholas J. Seydel

Theses and Dissertations

Missions using unmanned aerial vehicles have increased in the past decade. Currently, there is no way to refuel these aircraft. Accomplishing automated aerial refueling can be made possible using the stereo vision system on a tanker. Real world experiments for the automated aerial refueling problem are expensive and time consuming. Currently, simulations performed in a virtual world have shown promising results using computer vision. It is possible to use the virtual world as a substitute environment for the real world. This research compares the performance of stereo vision algorithms on synthetic and real world imagery.


Near Earth Space Object Detection Utilizing Parallax As Multi-Hypothesis Test Criterion, Joseph C. Tompkins Mar 2018

Near Earth Space Object Detection Utilizing Parallax As Multi-Hypothesis Test Criterion, Joseph C. Tompkins

Theses and Dissertations

The US Strategic Command (USSTRATCOM) operated Space Surveillance Network (SSN) is tasked with Space Situational Awareness (SSA) for the US military. This system is made up of Electro-Optic sensors such as the Space Surveillance Telescope (SST) and Ground-based Electro-Optical Deep Space Surveillance (GEODSS) as well as RADAR based sensors such as the Space Fence. While Lockheed Martin’s Space Fence is very adept at detecting & tracking objects in Low Earth Orbit (LEO) below 3000 Km in height [1], gaps remain in the tracking of Resident Space Objects (RSO’s) in Geosynchronous Orbits (GEO) due to limitations associated with the implementation of …


An Analysis Of Multi-Domain Command And Control And The Development Of Software Solutions Through Devops Toolsets And Practices, Mason R. Bruza Mar 2018

An Analysis Of Multi-Domain Command And Control And The Development Of Software Solutions Through Devops Toolsets And Practices, Mason R. Bruza

Theses and Dissertations

Multi-Domain Command and Control (MDC2) is the exercise of command and control over forces in multiple operational domains (namely air, land, sea, space, and cyberspace) in order to produce synergistic effects in the battlespace, and enhancing this capability has become a major focus area for the United States Air Force (USAF). In order to meet demands for MDC2 software, solutions need to be acquired and/or developed in a timely manner, information technology infrastructure needs to be adaptable to new software requirements, and user feedback needs to drive iterative updates to fielded software. In commercial organizations, agile software development methodologies and …


Plasmonic Grating Geometrics And Wavelength-Dependent Focus Depth In Infrared Detectors, Patrick R. Kennedy Mar 2018

Plasmonic Grating Geometrics And Wavelength-Dependent Focus Depth In Infrared Detectors, Patrick R. Kennedy

Theses and Dissertations

The objective for this research is to determine a relationship between plasmonic grating geometries and the wavelength-dependent focus depth. This research is focused on enhancing the signal collected by infrared detectors by using a metal grating as a planar lens to focus light in the detecting region of the substrate. This can be used to maintain a thinner absorbing region and possibly to create multi-color imaging in a single pixel. Simulations demonstrate that the plasmonic lens is capable of creating a wavelength dependent focus spot.


Variable Speed Simulation For Accelerated Industrial Control System Cyber Training, Luke M. Bradford Mar 2018

Variable Speed Simulation For Accelerated Industrial Control System Cyber Training, Luke M. Bradford

Theses and Dissertations

It is important for industrial control system operators to receive quality training to defend against cyber attacks. Hands-on training exercises with real-world control systems allow operators to learn various defensive techniques and see the real-world impact of changes made to a control system. Cyber attacks and operator actions can have unforeseen effects that take a significant amount of time to manifest and potentially cause physical harm to the system, making high-fidelity training exercises time-consuming and costly. This thesis presents a method for accelerating training exercises by simulating and predicting the effects of a cyber event on a partially-simulated control system. …


Securing Critical Infrastructure: A Ransomware Study, Blaine M. Jeffries Mar 2018

Securing Critical Infrastructure: A Ransomware Study, Blaine M. Jeffries

Theses and Dissertations

This thesis reviews traditional ransomware attack trends in order to present a taxonomy for ransomware targeting industrial control systems. After reviewing a critical infrastructure ransomware attack methodology, a corresponding response and recovery plan is described. The plan emphasizes security through redundancy, specifically the incorporation of standby programmable logic controllers. This thesis goes on to describe a set of experiments conducted to test the viability of defending against a specialized ransomware attack with a redundant controller network. Results support that specific redundancy schemes are effective in recovering from a successful attack. Further experimentation is conducted to test the feasibility of industrial …


Quality Of Service Impacts Of A Moving Target Defense With Software-Defined Networking, Samuel A. Mayer Mar 2018

Quality Of Service Impacts Of A Moving Target Defense With Software-Defined Networking, Samuel A. Mayer

Theses and Dissertations

An analysis of the impact a defensive network technique implemented with software-defined networking has upon quality of service experienced by legitimate users. The research validates previous work conducted at AFIT to verify claims of defensive efficacy and then tests network protocols in common use (FTP, HTTP, IMAP, POP, RTP, SMTP, and SSH) on a network that uses this technique. Metrics that indicate the performance of the protocols under test are reported with respect to data gathered in a control network. The conclusions of these experiments enable network engineers to determine if this defensive technique is appropriate for the quality of …


Assessment Of Structure From Motion For Reconnaissance Augmentation And Bandwidth Usage Reduction, Jonathan B. Roeber Mar 2018

Assessment Of Structure From Motion For Reconnaissance Augmentation And Bandwidth Usage Reduction, Jonathan B. Roeber

Theses and Dissertations

Modern militaries rely upon remote image sensors for real-time intelligence. A typical remote system consists of an unmanned aerial vehicle, or UAV, with an attached camera. A video stream is sent from the UAV, through a bandwidth-constrained satellite connection, to an intelligence processing unit. In this research, an upgrade to this method of collection is proposed. A set of synthetic images of a scene captured by a UAV in a virtual environment is sent to a pipeline of computer vision algorithms, collectively known as Structure from Motion. The output of Structure from Motion, a three-dimensional model, is then assessed in …


Expected Coverage (Excov): A Proposal To Compare Fuzz Test Coverage Within An Infinite Input Space, Evan V. Swihart Mar 2018

Expected Coverage (Excov): A Proposal To Compare Fuzz Test Coverage Within An Infinite Input Space, Evan V. Swihart

Theses and Dissertations

A Fuzz test is an approach used to discover vulnerabilities by intentionally sending invalid inputs to a system for the purpose of triggering some type of fault or unintended effect that renders the system vulnerable to an exploit. Fuzz testing is an important cyber-testing technique used to find and fix vulnerabilities before they are exploited. The fuzzing of military data links presents a particular challenge because existing fuzzing tools cannot be easily applied to these systems. As a result, the tools and techniques used to fuzz these links vary widely in sophistication and effectiveness. Because of the infinite, or nearly …


Securing Data In Transit Using Two Channel Communication, Clark L. Wolfe Mar 2018

Securing Data In Transit Using Two Channel Communication, Clark L. Wolfe

Theses and Dissertations

Securing data in transit is critically important to the Department of Defense in todays contested environments. While encryption is often the preferred method to provide security, there exist applications for which encryption is too resource intensive, not cost-effective or simply not available. In this thesis, a two-channel communication system is proposed in which the message being sent can be intelligently and dynamically split over two or more channels to provide a measure of data security either when encryption is not available, or perhaps in addition to encryption. This data spiting technique employs multiple wireless channels operating at the physical layer, …