Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Engineering

Forensics Image Background Matching Using Scale Invariant Feature (Sift)Transform And Speeded Up Robust Features (Surf), Paul N. Fogg Ii Dec 2007

Forensics Image Background Matching Using Scale Invariant Feature (Sift)Transform And Speeded Up Robust Features (Surf), Paul N. Fogg Ii

Theses and Dissertations

In criminal investigations, it is not uncommon for investigators to obtain a photograph or image that shows a crime being committed. Additionally, thousands of pictures may exist of a location, taken from the same or varying viewpoints. Some of these images may even include a criminal suspect or witness. One mechanism to identify criminals and witnesses is to group the images found on computers, cell phones, cameras, and other electronic devices into sets representing the same location. One or more images in the group may then prove the suspect was at the crime scene before, during, and/or after a crime. …


Analysis Of Army Transformation And The Effects On Customer Ordering Behavior, Joseph M. Colacicco Jun 2007

Analysis Of Army Transformation And The Effects On Customer Ordering Behavior, Joseph M. Colacicco

Theses and Dissertations

The United States Army began a major force transformation in 2003, which required a significant shift in logistics support constructs. This thesis provides an in-process review of the effects of the current transformation efforts on supply effectiveness and attempts to determine factors that influence customer ordering behavior. Specifically, the thesis sought to answer three subproblems addressing the effect of transformation on supply effectiveness, the correlation of supply effectiveness metrics to customer ordering behavior, and other potential sources of variance in ordering behavior. The subproblems were answered through an examination of the supply document histories of two Brigades, one legacy Brigade …


A Layered Social And Operational Network Analysis, Jennifer L. Geffre Mar 2007

A Layered Social And Operational Network Analysis, Jennifer L. Geffre

Theses and Dissertations

To provide maximal disruption to a clandestine/terrorist network's ability to conduct missions, we must develop a means to determine the individuals' importance to the network and operations. In a network centric world, this importance is represented as an additive value of their criticality across the convergence of multiple layers of network connections. The connections layers of the network are comprised of social layers (Acquaintance, Friendship, Nuclear Family, Relatives, Student-Teacher, and Religious Mentors, Reverent Power and others), as well as layers representing interactions involving Resources, Knowledge/Skills and Temporal Local. The social criticality of an individual is measured by centrality. Event Trees …


Forecasting Demand For Civilian Pilots: A Cost Savings Approach To Managing Air Force Pilot Resources, Justin W. Collup Mar 2007

Forecasting Demand For Civilian Pilots: A Cost Savings Approach To Managing Air Force Pilot Resources, Justin W. Collup

Theses and Dissertations

The purpose of this research was to create a model that could potentially predict demand for military trained pilots in the airline industry. Specifically, this thesis sought to answer the research question addressing whether or not military trained pilots are currently more in demand or less in demand. The research questions were answered through a comprehensive literature review, collection of data relevant to airline industry growth, and regression analysis. The Aviation Continuation Pay Bonus, offered to all eligible Air Force aviators, has risen from $12,000/year to its current value of $25,000/year. With shrinking budgets, and ever increasing costs of war, …


Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl Mar 2007

Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl

Theses and Dissertations

Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geographic location of an IP addressable node, has proven useful in a wide variety of commercial applications. Commercial applications of IP Geolocation include market research, redirection for performance enhancement, restricting content, and combating fraud. The potential for military applications include securing remote access via geographic authentication, intelligence collection, and cyber attack attribution. IP Geolocation methods can be divided into three basic categories based upon what information is used to determine the geographic location of the given IP address: 1) Information contained in databases, 2) information that is leaked during …


Optimizing The Prioritization Of Natural Disaster Recovery Projects, Jason M. Aftanas Mar 2007

Optimizing The Prioritization Of Natural Disaster Recovery Projects, Jason M. Aftanas

Theses and Dissertations

Prioritizing reconstruction projects to recover a base from a natural disaster is a complicated and arduous process that involves all levels of leadership. The project prioritization phase of base recovery has a direct affect on the allocation of funding, the utilization of human resources, the obligation of projects, and the overall speed and efficiency of the recovery process. The focus of this research is the development of an objective and repeatable process for optimizing the project prioritization phase of the recovery effort. This work will focus on promoting objectivity in the project prioritizing process, improving the communication of the overall …


Planning And Assessing Stability Operations: A Proposed Value-Focused Thinking Approach, Gerald D. Fensterer Mar 2007

Planning And Assessing Stability Operations: A Proposed Value-Focused Thinking Approach, Gerald D. Fensterer

Theses and Dissertations

Stability operations are vital to establish peace in the aftermath of conflict. The United States is often called in for military support during conflict. The new American military paradigms include establishing peace through stability operations after a military conflict. Due to this new role, military decision makers face many difficulties in conducting successful stability operations. Compounding this problem is the limited number of resources pertaining to stability operations: experts, doctrine, knowledge, and technology. Two overarching challenges of stability operations facing decision makers are planning and prioritizing of stability operations and determining progress. This thesis applies a structured analytical approach to …


Quantification Of Risk For Usaf Fire And Emergency Services Flights As A Result Of Shortage In Manpower, Timothy D. Dalby Mar 2007

Quantification Of Risk For Usaf Fire And Emergency Services Flights As A Result Of Shortage In Manpower, Timothy D. Dalby

Theses and Dissertations

The United States Air Force (USAF) is currently experiencing a period of high operations tempo and overseas deployments have become frequent. These deployments will leave home installations short manned. Some amount of risk is incurred by the home installation as a result of the short manning. For an organization, such as an USAF Fire and Emergency Services (FES) flight, whose primary responsibility is the protection of life and property, the incurred risk could be catastrophic. Still no attempt has been made to quantify risk in terms of manpower for the USAF FES flights. The primary purpose of this research was …


The Chaos Of Katrina: A Nonlinear Analysis Of Federal Logistics Support During Hurricane Katrina Relief Operations, Gerald W. Morris Jr. Mar 2007

The Chaos Of Katrina: A Nonlinear Analysis Of Federal Logistics Support During Hurricane Katrina Relief Operations, Gerald W. Morris Jr.

Theses and Dissertations

This thesis presents a case study of federal logistics support during Hurricane Katrina disaster relief operations. Data from federal contracts covering the first 10 weeks of Katrina are used to measure federal logistics activity. The study investigates whether chaos theory, part of complexity science, can extract information from Katrina contracting data to help managers make better logistics decisions during disaster relief operations. The study uses three analytical techniques: embedding, fitting the data to a logistic equation, and plotting the limit-cycle. Embedding and fitting a logistic equation to the data were used to test for deterministic chaos. The logistic equation and …


Critical Infrastructure Rebuild Prioritization Using Simulation Optimization, Namsuk Cho Mar 2007

Critical Infrastructure Rebuild Prioritization Using Simulation Optimization, Namsuk Cho

Theses and Dissertations

This thesis examines the importance of a critical infrastructure rebuild strategy following a terrorist attack or natural disaster such as Hurricane Katrina. Critical infrastructures are very complex and dependent systems in which their re-establishment is an essential part of the rebuilding process. A rebuild simulation model consisting of three layers (physical, information, and spatial) captures the dependency between the six critical infrastructures modeled. We employ a simulation optimization approach to evaluate rebuild prioritization combinations with a goal of minimizing the time needed to achieve an acceptable rebuild level. We use a simulated annealing heuristic as an optimization technique that works …


Patterns Of War Termination: A Statistical Approach, Paul D. Robinson Ii Mar 2007

Patterns Of War Termination: A Statistical Approach, Paul D. Robinson Ii

Theses and Dissertations

This research uses an advanced statistical technique to expand upon the current understanding of war termination. Specifically, this thesis addressed questions concerning the most relevant factors toward predicting both the outcomes of interstate wars and the winners of intrastate and extra-systemic wars, within the limitations of the available data. Open-source war data from the Correlates of War Project was analyzed using both binary and multinomial logistic regression techniques. While the Correlates of War Project did not necessarily focus its data collection efforts on those variables historically associated with war termination, it did provide a sufficient number of variables with which …


Approximate Analysis Of An Unreliable M/M/2 Retrial Queue, Brian P. Crawford Mar 2007

Approximate Analysis Of An Unreliable M/M/2 Retrial Queue, Brian P. Crawford

Theses and Dissertations

This thesis considers the performance evaluation of an M/M/2 retrial queue for which both servers are subject to active and idle breakdowns. Customers may abandon service requests if they are blocked from service upon arrival, or if their service is interrupted by a server failure. Customers choosing to remain in the system enter a retrial orbit for a random amount of time before attempting to re-access an available server. We assume that each server has its own dedicated repair person, and repairs begin immediately following a failure. Interfailure times, repair times and times between retrials are exponentially distributed, and all …


Examining Clandestine Social Networks For The Presence Of Non-Random Structure, Joshua S. Seder Mar 2007

Examining Clandestine Social Networks For The Presence Of Non-Random Structure, Joshua S. Seder

Theses and Dissertations

This thesis develops a tractable, statistically sound hypothesis testing framework for the detection, characterization, and estimation of non-random structure in clandestine social networks. Network structure is studied via an observed adjacency matrix, which is assumed to be subject to sampling variability. The vertex set of the network is partitioned into k mutually exclusive and collectively exhaustive subsets, based on available exogenous nodal attribute information. The proposed hypothesis testing framework is employed to statistically quantify a given partition's relativity in explaining the variability in the observed adjacency matrix relative to what can be explained by chance. As a result, valuable insight …