Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 89

Full-Text Articles in Engineering

Deployed Communications In An Austere Environment: A Delphi Study, Andrew Soine, James Harker, Alan R. Heminger Nov 2013

Deployed Communications In An Austere Environment: A Delphi Study, Andrew Soine, James Harker, Alan R. Heminger

Faculty Publications

The information and communications technology (ICT) field is undergoing a period of tremendous change. The exponential growth rate of ICT capability in recent decades, which has had an undeniable effect on every aspect of our society, will likely have ramifications for military operations in austere environments. 1 The Air Force’s 689th Combat Communications Wing commissioned a study to forecast the future of mobile ICT in such environments. Researchers at the Air Force Institute of Technology chose to employ the Delphi technique as the methodology for executing this task. The following scenario, based on the results of that study, demonstrates how …


Cyber This, Cyber That...So What?, Eric D. Trias, Bryan Bell [*] Apr 2010

Cyber This, Cyber That...So What?, Eric D. Trias, Bryan Bell [*]

Faculty Publications

This article endorses the idea that cyber operations may be conducted in all war-fighting domains: air, space, cyberspace, land, and sea. In addition, despite the immaturity of cyberspace operational doctrines, the doctrines from air and space remain relevant and applicable to the cyberspace domain. Cyber operations are just another set of tools in the commander's toolbox. Although cyber operations have distinct ways of achieving effects, from an Air Force perspective they are similar too the air and space operations that support air and space (and cyberspace) functions. Known and established cyber operations provide war fighters with viable options to kinetic …


Design Of A Monocular Multi-Spectral Skin Detection, Melanin Estimation, And False-Alarm Suppression System, Keith R. Peskosky Mar 2010

Design Of A Monocular Multi-Spectral Skin Detection, Melanin Estimation, And False-Alarm Suppression System, Keith R. Peskosky

Theses and Dissertations

A real-time skin detection, false-alarm reduction, and melanin estimation system is designed targeting search and rescue (SAR) with application to special operations for manhunting and human measurement and signatures intelligence. A mathematical model of the system is developed and used to determine how the physical system performs under illumination, target-to-sensor distance, and target-type scenarios. This aspect is important to the SAR community to gain an understanding of the deployability in different operating environments. A multi-spectral approach is developed and consists of two short-wave infrared cameras and two visible cameras. Through an optical chain of lenses, custom designed and fabricated dichroic …


Precision Navigation Using Pre-Georegistered Map Data, Frederick C. Webber Sep 2009

Precision Navigation Using Pre-Georegistered Map Data, Frederick C. Webber

Theses and Dissertations

Navigation performance in small unmanned aerial vehicles (UAVs) is adversely affected by limitations in current sensor technology for small, lightweight sensors. Because most UAVs are equipped with cameras for mission-related purposes, it is advantageous to utilize the camera to improve the navigation solution. This research improves navigation by matching camera images to a priori georegistered image data and combining this update with existing image-aided navigation technology. The georegistration matching is done by projecting the images into the same plane, extracting features using the techniques Scale Invariant Feature Transform (SIFT) [5] and Speeded-Up Robust Features (SURF) [3]. The features are matched …


Performance Enhancements Of Ranging Radio Aided Navigation, Patric J. Ernsberger Mar 2009

Performance Enhancements Of Ranging Radio Aided Navigation, Patric J. Ernsberger

Theses and Dissertations

Determining the position of team members is always useful information, whether it is a team of firefighters fighting a blaze or combatants clearing a building in the field. This information becomes even more decisive for the people responsible for their safety. To accomplish this in areas denied Global Navigation Satellite System (GNSS), such as around buildings or in steep valleys, alternative methods must be used. Radio ranging systems have been a part of the navigation solution for years. They unfortunately have poor performance in certain areas, such as inside buildings, due to multipath and other errors. To improve the position …


Vision-Aided Cooperative Navigation For Multiple Unmanned Vehicles, Jason K. Bingham Mar 2009

Vision-Aided Cooperative Navigation For Multiple Unmanned Vehicles, Jason K. Bingham

Theses and Dissertations

In the recent past, a shift has taken place from manned to unmanned Intelligence, Surveillance, and Reconnaissance (ISR) missions. This shift has lead to an increase in the number of unmanned vehicles (UV) operating in a theater. Additionally, removal of the crew allows for a reduction in vehicle scale, which leads to an increased ability to operate in GPS degraded environments. With the loss of GPS signals the vehicles must rely on Inertial Navigation Systems (INS) which when reduced to an appropriate size are inherently inaccurate. This research endeavors to exploit three attributes of increased UV use for ISR missions. …


Using Multiple Robust Parameter Design Techniques To Improve Hyperspectral Anomaly Detection Algorithm Performance, Matthew T. Davis Mar 2009

Using Multiple Robust Parameter Design Techniques To Improve Hyperspectral Anomaly Detection Algorithm Performance, Matthew T. Davis

Theses and Dissertations

Detecting and identifying objects of interest is the goal of all remote sensing. New advances, specifically in hyperspectral imaging technology have provided the analyst with immense amounts of data requiring evaluation. Several filtering techniques or anomaly detection algorithms have been proposed. However, most new algorithms are insufficiently verified to be robust to the broad range of hyperspectral data being made available. One such algorithm, AutoGAD, is tested here via two separate robust parameter design techniques to determine optimal parameters for consistent performance on a range of data with large attribute variances. Additionally, the results of the two techniques are compared …


The Hybrid Counterinsurgency Strategy: System Dynamics Employed To Develop A Behavioral Model Of Joint Strategy, Ferdinand Maldonado Mar 2009

The Hybrid Counterinsurgency Strategy: System Dynamics Employed To Develop A Behavioral Model Of Joint Strategy, Ferdinand Maldonado

Theses and Dissertations

Since the recent focus on the Global War on Terror, both military and civilian theorists have begun to “relearn” the intricacies of counterinsurgency warfare. We face difficult challenges when confronting non-state actors that tend to attack in the time between conventional battles and the establishment of stable governments. This research compares and contrasts current counterinsurgency strategies (Hearts and Minds and Cost Benefit Theory) by applying System Dynamics to provide insight into the influences and emergent behavior patterns of counterinsurgency systems. The information gained from the development of the models and from their simulation behaviors is used to construct a System …


Abstracting Gis Layers From Hyperspectral Imagery, Torsten E. Howard Mar 2009

Abstracting Gis Layers From Hyperspectral Imagery, Torsten E. Howard

Theses and Dissertations

Modern warfare methods in the urban environment necessitates the use of multiple layers of sensors to manage the battle space. Hyperspectral imagers are one possible sensor modality to provide remotely sensed images that can be converted into Geographic Information Systems (GIS) layers. GIS layers abstract knowledge of roads, buildings, and scene content and contain shape files that outline and highlight scene features. Creating shape files is a labor-intensive and time-consuming process. The availability of shape files that reflect the current configuration of an area of interest significantly enhances Intelligence Preparation of the Battlespace (IPB). The solution presented in this thesis …


Statistical Methods For Polarimetric Imagery, Daniel A. Lemaster Aug 2008

Statistical Methods For Polarimetric Imagery, Daniel A. Lemaster

Theses and Dissertations

Estimation theory is applied to a physical model of incoherent polarized light to address problems in polarimetric image registration, restoration, and analysis for electro-optical imaging systems. In the image registration case, the Cramer-Rao lower bound on unbiased joint estimates of the registration parameters and the underlying scene is derived, simplified using matrix methods, and used to explain the behavior of multi-channel linear polarimetric imagers. In the image restoration case, a polarimetric maximum likelihood blind deconvolution algorithm is derived and tested using laboratory and simulated imagery. Finally, a principal components analysis is derived for polarization imaging systems. This analysis expands upon …


A System Dynamic Model Of Leader Emergence, Paul S. Wever Mar 2008

A System Dynamic Model Of Leader Emergence, Paul S. Wever

Theses and Dissertations

The purpose of this thesis is to develop a system dynamics model of leader emergence. Longitudinal social network and personality data were collected in a class of enlisted military professionals attending a 6-week leadership development course. Findings support known relationships in existing leadership research. The thesis demonstrates the applicability of system dynamics toward the complex social phenomena of leader emergence.


Forensics Image Background Matching Using Scale Invariant Feature (Sift)Transform And Speeded Up Robust Features (Surf), Paul N. Fogg Ii Dec 2007

Forensics Image Background Matching Using Scale Invariant Feature (Sift)Transform And Speeded Up Robust Features (Surf), Paul N. Fogg Ii

Theses and Dissertations

In criminal investigations, it is not uncommon for investigators to obtain a photograph or image that shows a crime being committed. Additionally, thousands of pictures may exist of a location, taken from the same or varying viewpoints. Some of these images may even include a criminal suspect or witness. One mechanism to identify criminals and witnesses is to group the images found on computers, cell phones, cameras, and other electronic devices into sets representing the same location. One or more images in the group may then prove the suspect was at the crime scene before, during, and/or after a crime. …


Analysis Of Army Transformation And The Effects On Customer Ordering Behavior, Joseph M. Colacicco Jun 2007

Analysis Of Army Transformation And The Effects On Customer Ordering Behavior, Joseph M. Colacicco

Theses and Dissertations

The United States Army began a major force transformation in 2003, which required a significant shift in logistics support constructs. This thesis provides an in-process review of the effects of the current transformation efforts on supply effectiveness and attempts to determine factors that influence customer ordering behavior. Specifically, the thesis sought to answer three subproblems addressing the effect of transformation on supply effectiveness, the correlation of supply effectiveness metrics to customer ordering behavior, and other potential sources of variance in ordering behavior. The subproblems were answered through an examination of the supply document histories of two Brigades, one legacy Brigade …


A Layered Social And Operational Network Analysis, Jennifer L. Geffre Mar 2007

A Layered Social And Operational Network Analysis, Jennifer L. Geffre

Theses and Dissertations

To provide maximal disruption to a clandestine/terrorist network's ability to conduct missions, we must develop a means to determine the individuals' importance to the network and operations. In a network centric world, this importance is represented as an additive value of their criticality across the convergence of multiple layers of network connections. The connections layers of the network are comprised of social layers (Acquaintance, Friendship, Nuclear Family, Relatives, Student-Teacher, and Religious Mentors, Reverent Power and others), as well as layers representing interactions involving Resources, Knowledge/Skills and Temporal Local. The social criticality of an individual is measured by centrality. Event Trees …


Forecasting Demand For Civilian Pilots: A Cost Savings Approach To Managing Air Force Pilot Resources, Justin W. Collup Mar 2007

Forecasting Demand For Civilian Pilots: A Cost Savings Approach To Managing Air Force Pilot Resources, Justin W. Collup

Theses and Dissertations

The purpose of this research was to create a model that could potentially predict demand for military trained pilots in the airline industry. Specifically, this thesis sought to answer the research question addressing whether or not military trained pilots are currently more in demand or less in demand. The research questions were answered through a comprehensive literature review, collection of data relevant to airline industry growth, and regression analysis. The Aviation Continuation Pay Bonus, offered to all eligible Air Force aviators, has risen from $12,000/year to its current value of $25,000/year. With shrinking budgets, and ever increasing costs of war, …


Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl Mar 2007

Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl

Theses and Dissertations

Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geographic location of an IP addressable node, has proven useful in a wide variety of commercial applications. Commercial applications of IP Geolocation include market research, redirection for performance enhancement, restricting content, and combating fraud. The potential for military applications include securing remote access via geographic authentication, intelligence collection, and cyber attack attribution. IP Geolocation methods can be divided into three basic categories based upon what information is used to determine the geographic location of the given IP address: 1) Information contained in databases, 2) information that is leaked during …


Optimizing The Prioritization Of Natural Disaster Recovery Projects, Jason M. Aftanas Mar 2007

Optimizing The Prioritization Of Natural Disaster Recovery Projects, Jason M. Aftanas

Theses and Dissertations

Prioritizing reconstruction projects to recover a base from a natural disaster is a complicated and arduous process that involves all levels of leadership. The project prioritization phase of base recovery has a direct affect on the allocation of funding, the utilization of human resources, the obligation of projects, and the overall speed and efficiency of the recovery process. The focus of this research is the development of an objective and repeatable process for optimizing the project prioritization phase of the recovery effort. This work will focus on promoting objectivity in the project prioritizing process, improving the communication of the overall …


Planning And Assessing Stability Operations: A Proposed Value-Focused Thinking Approach, Gerald D. Fensterer Mar 2007

Planning And Assessing Stability Operations: A Proposed Value-Focused Thinking Approach, Gerald D. Fensterer

Theses and Dissertations

Stability operations are vital to establish peace in the aftermath of conflict. The United States is often called in for military support during conflict. The new American military paradigms include establishing peace through stability operations after a military conflict. Due to this new role, military decision makers face many difficulties in conducting successful stability operations. Compounding this problem is the limited number of resources pertaining to stability operations: experts, doctrine, knowledge, and technology. Two overarching challenges of stability operations facing decision makers are planning and prioritizing of stability operations and determining progress. This thesis applies a structured analytical approach to …


Quantification Of Risk For Usaf Fire And Emergency Services Flights As A Result Of Shortage In Manpower, Timothy D. Dalby Mar 2007

Quantification Of Risk For Usaf Fire And Emergency Services Flights As A Result Of Shortage In Manpower, Timothy D. Dalby

Theses and Dissertations

The United States Air Force (USAF) is currently experiencing a period of high operations tempo and overseas deployments have become frequent. These deployments will leave home installations short manned. Some amount of risk is incurred by the home installation as a result of the short manning. For an organization, such as an USAF Fire and Emergency Services (FES) flight, whose primary responsibility is the protection of life and property, the incurred risk could be catastrophic. Still no attempt has been made to quantify risk in terms of manpower for the USAF FES flights. The primary purpose of this research was …


The Chaos Of Katrina: A Nonlinear Analysis Of Federal Logistics Support During Hurricane Katrina Relief Operations, Gerald W. Morris Jr. Mar 2007

The Chaos Of Katrina: A Nonlinear Analysis Of Federal Logistics Support During Hurricane Katrina Relief Operations, Gerald W. Morris Jr.

Theses and Dissertations

This thesis presents a case study of federal logistics support during Hurricane Katrina disaster relief operations. Data from federal contracts covering the first 10 weeks of Katrina are used to measure federal logistics activity. The study investigates whether chaos theory, part of complexity science, can extract information from Katrina contracting data to help managers make better logistics decisions during disaster relief operations. The study uses three analytical techniques: embedding, fitting the data to a logistic equation, and plotting the limit-cycle. Embedding and fitting a logistic equation to the data were used to test for deterministic chaos. The logistic equation and …


Critical Infrastructure Rebuild Prioritization Using Simulation Optimization, Namsuk Cho Mar 2007

Critical Infrastructure Rebuild Prioritization Using Simulation Optimization, Namsuk Cho

Theses and Dissertations

This thesis examines the importance of a critical infrastructure rebuild strategy following a terrorist attack or natural disaster such as Hurricane Katrina. Critical infrastructures are very complex and dependent systems in which their re-establishment is an essential part of the rebuilding process. A rebuild simulation model consisting of three layers (physical, information, and spatial) captures the dependency between the six critical infrastructures modeled. We employ a simulation optimization approach to evaluate rebuild prioritization combinations with a goal of minimizing the time needed to achieve an acceptable rebuild level. We use a simulated annealing heuristic as an optimization technique that works …


Patterns Of War Termination: A Statistical Approach, Paul D. Robinson Ii Mar 2007

Patterns Of War Termination: A Statistical Approach, Paul D. Robinson Ii

Theses and Dissertations

This research uses an advanced statistical technique to expand upon the current understanding of war termination. Specifically, this thesis addressed questions concerning the most relevant factors toward predicting both the outcomes of interstate wars and the winners of intrastate and extra-systemic wars, within the limitations of the available data. Open-source war data from the Correlates of War Project was analyzed using both binary and multinomial logistic regression techniques. While the Correlates of War Project did not necessarily focus its data collection efforts on those variables historically associated with war termination, it did provide a sufficient number of variables with which …


Approximate Analysis Of An Unreliable M/M/2 Retrial Queue, Brian P. Crawford Mar 2007

Approximate Analysis Of An Unreliable M/M/2 Retrial Queue, Brian P. Crawford

Theses and Dissertations

This thesis considers the performance evaluation of an M/M/2 retrial queue for which both servers are subject to active and idle breakdowns. Customers may abandon service requests if they are blocked from service upon arrival, or if their service is interrupted by a server failure. Customers choosing to remain in the system enter a retrial orbit for a random amount of time before attempting to re-access an available server. We assume that each server has its own dedicated repair person, and repairs begin immediately following a failure. Interfailure times, repair times and times between retrials are exponentially distributed, and all …


Examining Clandestine Social Networks For The Presence Of Non-Random Structure, Joshua S. Seder Mar 2007

Examining Clandestine Social Networks For The Presence Of Non-Random Structure, Joshua S. Seder

Theses and Dissertations

This thesis develops a tractable, statistically sound hypothesis testing framework for the detection, characterization, and estimation of non-random structure in clandestine social networks. Network structure is studied via an observed adjacency matrix, which is assumed to be subject to sampling variability. The vertex set of the network is partitioned into k mutually exclusive and collectively exhaustive subsets, based on available exogenous nodal attribute information. The proposed hypothesis testing framework is employed to statistically quantify a given partition's relativity in explaining the variability in the observed adjacency matrix relative to what can be explained by chance. As a result, valuable insight …


Dynamics And Control Of Tethered Satellite Formations For The Purpose Of Space-Based Remote Sensing, Kurt A. Vogel Sep 2006

Dynamics And Control Of Tethered Satellite Formations For The Purpose Of Space-Based Remote Sensing, Kurt A. Vogel

Theses and Dissertations

This dissertation assesses the utility of tethered satellite formations for the space-based remote sensing mission. Energy dissipation is found to have an adverse effect on foundational rigid body (Likins-Pringle) equilibria. It is shown that a continuously earth-facing equilibrium condition for a fixed-length tethered system does not exist since the spin rate required for the proper precession would not be high enough to maintain tether tension. The range of required spin rates for steady-spin motion is numerically defined here, but none of these conditions can meet the continuously earth-facing criteria. Of particular note is the discovery that applying certain rigid body …


A Graph Theoretic Analysis Of The Effects Of Organizational Structure On Employee Social Networks, John R. Hutzel Mar 2006

A Graph Theoretic Analysis Of The Effects Of Organizational Structure On Employee Social Networks, John R. Hutzel

Theses and Dissertations

A simulation technique was used to investigate the impacts of organizational structure on an organization's social network. By simulating personnel in an organization as vertices in a graph and the aging of the corporation as the aging of the same graph, the maturation of an organization was realized. The characteristic path length of the graph was measured after each year returning an optimistic average organizational distance. Results include the finding that, per this model, an organization's characteristic path length can drop over 50% in a 20 year period with consideration of edges of all strengths. Next a series of random …


Modeling Network Centric Warfare (Ncw) With The System Effectiveness Analysis Simulation (Seas), Jason B. Honabarger Mar 2006

Modeling Network Centric Warfare (Ncw) With The System Effectiveness Analysis Simulation (Seas), Jason B. Honabarger

Theses and Dissertations

Significant technological advances over the past few decades have fueled the continual and rapid development of an information-based world. Network Centric Warfare (NCW) has become the buzzword of the young millennium within the Department of Defense (DoD) and is quickly becoming a popularly shared vision and rallying cry for force transformation among United States military leaders. An essential element in fully implementing this network-centric way of thinking is to develop useful measures to help gauge the effectiveness and efficiency of both our military networks and our strategic NCW doctrine. The goal of this research is first to provide a comprehensive …


Terrain And Spatial Effects On Hazard Prediction And Assessment Capability (Hpac) Software Dose-Rate Contour Plot Predictions As Compared To A Sample Of Local Fallout Data From Test Detonations In The Continental United States, 1945-1962, Kevin D. Pace Mar 2006

Terrain And Spatial Effects On Hazard Prediction And Assessment Capability (Hpac) Software Dose-Rate Contour Plot Predictions As Compared To A Sample Of Local Fallout Data From Test Detonations In The Continental United States, 1945-1962, Kevin D. Pace

Theses and Dissertations

Hazard Prediction and Capability (HPAC) Software is validated by comparing modeled predictions to historical test data. Reanalysis weather data is acquired and reformatted for use in HPAC. Simulations are made using various amounts of weather data by use of a spatial domain. Simulations are also varied by levels of terrain resolution. The predicted output of the software is numerically compared to historical test data. The result of this research culminated in the knowledge that HPAC prediction accuracy is improved by using terrain resolutions beyond the flat earth assumption. Furthermore, this research establishes that domain size variation produces no significant advantage …


Quantitative Analysis Of A Turbulent Wind Tunnel With Obstructions For Use In Liquid Flame Spread Experiments, Beau M. Brantley Mar 2006

Quantitative Analysis Of A Turbulent Wind Tunnel With Obstructions For Use In Liquid Flame Spread Experiments, Beau M. Brantley

Theses and Dissertations

The research was done as part of an effort to develop alternative fire suppressant technologies for aircraft engine nacelles. The turbulent shear flow behind a surface mounted fence inside an open circuit wind tunnel was investigated experimentally. The tunnel test section was designed to be 2-D and exhibit flow qualities similar to those found in a typical engine nacelle. A 279 mm wide fuel pan was inserted approximately four fence heights downstream of the fence location. The fuel pan was filled using water to simulate fuel with a depth of 32 mm. Cold flow tests were done on different fence …


Strategic Airlift En Route Analysis To Support The Global War On Terrorism Using A Value Focused Thinking Approach, Marykathryn W. Tharaldson Mar 2006

Strategic Airlift En Route Analysis To Support The Global War On Terrorism Using A Value Focused Thinking Approach, Marykathryn W. Tharaldson

Theses and Dissertations

The Global War on Terrorism (GWOT) has yielded new challenges to the United States' strategic airlift infrastructure. The network of en-route airfields that serve as refueling and maintenance stops were designed primarily to service relatively static Cold War requirements. However, the GWOT has resulted in the need for an infrastructure that is responsive to a highly dynamic environment. This research uses a "value focused" methodology to identify en-route airfield locations that simultaneously maximize cargo throughput capability while possessing a high degree of adaptability to volatile cargo delivery requirements.