Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

2010

Discipline
Keyword
Publication
Publication Type

Articles 31 - 60 of 149

Full-Text Articles in Engineering

Developing A Hybrid Virtualization Platform Design For Cyber Warfare And Simulation, Kyle E. Stewart Jun 2010

Developing A Hybrid Virtualization Platform Design For Cyber Warfare And Simulation, Kyle E. Stewart

Theses and Dissertations

Virtualization is a technique used to model and simulate the cyber domain, as well as train and educate. Different types of virtualization techniques exist that each support a unique set of benefits and requirements. This research proposes a novel design that incorporates host and network virtualization concepts for a cyber warfare training platform. At the host level, hybrid virtualization combines full and operating system virtualization techniques in order to leverage the benefits and minimize the drawbacks of each individual technique. Network virtualization allows virtual machines to connect in flexible topologies, but it also incurs additional processing overhead. Quantitative analysis falls …


An Integrity Framework For Image-Based Navigation Systems, Craig D. Larson Jun 2010

An Integrity Framework For Image-Based Navigation Systems, Craig D. Larson

Theses and Dissertations

This work first examines fundamental differences between measurement models established for GPS and those of proposed image-based navigation systems. In contrast to single value per satellite GPS pseudorange measurements, image measurements are inherently angle-based and represent pixel coordinate pairs for each mapped target. Thus, in the image-based case, special consideration must be given to the units of the transformations between the states and measurements, and also to the fact that multiple rows of the observation matrix relate to particular error states. An algorithm is developed to instantiate a framework for image-based integrity analogous to that of GPS RAIM. The algorithm …


Attaining Realistic Simulations Of Mobile Ad-Hoc Networks, Derek J. Huber Jun 2010

Attaining Realistic Simulations Of Mobile Ad-Hoc Networks, Derek J. Huber

Theses and Dissertations

Mobile Ad-hoc Networks (MANET) are comprised of wireless systems that communicate without the assistance of centrally managed routers or base stations. MANET research and development has increased due to computing technologies offering smaller, faster, smarter, and more power efficient platforms to operate on. Largely the testing and evaluation of new and existing MANET protocols has resided in simulation environments. This is due in part to the complexities and expenses incurred when conducting real world tests. Many researchers have come to recognize that these current simulations tend to assume away critical components of the MANET domain. These assumptions are made either …


A Photogrammetry-Based Hybrid System For Dynamic Tracking And Measurement, Daniel P. Magree Jun 2010

A Photogrammetry-Based Hybrid System For Dynamic Tracking And Measurement, Daniel P. Magree

Theses and Dissertations

Noncontact measurements of lightweight flexible aerospace structures present several challenges. Objects are usually mounted on a test stand because current noncontact measurement techniques require that the net motion of the object be zero. However, it is often desirable to take measurements of the object under operational conditions, and in the case of miniature aerial vehicles (MAVs) and deploying space structures, the test article will undergo significant translational motion. This thesis describes a hybrid noncontact measurement system which will enable measurement of structural kinematics of an object freely moving about a volume. By using a real-time videogrammetry system, a set of …


Simulation Modeling And Analysis Of Tnmcs For The B-1 Strategic Bomber, Carl R. Parson Jun 2010

Simulation Modeling And Analysis Of Tnmcs For The B-1 Strategic Bomber, Carl R. Parson

Theses and Dissertations

Simulation provides a method of modeling complex systems which would otherwise be impractical for quantitative experimentation. While other analytic techniques have been used to explore Total Non-Mission Capable [due to] Supply (TNMCS) rates, simulation offers a novel approach to discovering what aspects of the supply chain impact this metric. This research develops a discrete event simulation to investigate factors which affect TNMCS rates for the B-1B by modeling the core processes within the Air Force (AF) supply chain. A notional fleet of 16 aircraft at a single air base (Ellsworth AFB, SD) is modeled based on historical supply and maintenance …


A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator, Justin M. Myers Jun 2010

A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator, Justin M. Myers

Theses and Dissertations

Log event correlation is an effective means of detecting system faults and security breaches encountered in information technology environments. Centralized, database-driven log event correlation is common, but suffers from flaws such as high network bandwidth utilization, significant requirements for system resources, and difficulty in detecting certain suspicious behaviors. This research presents a distributed event correlation system which performs security event detection, and compares it with a centralized alternative. The comparison measures the value in distributed event correlation by considering network bandwidth utilization, detection capability and database query efficiency, as well as through the implementation of remote configuration scripts and correlation …


Deterministic, Efficient Variation Of Circuit Components To Improve Resistance To Reverse Engineering, Daniel F. Koranek Jun 2010

Deterministic, Efficient Variation Of Circuit Components To Improve Resistance To Reverse Engineering, Daniel F. Koranek

Theses and Dissertations

This research proposes two alternative methods for generating semantically equivalent circuit variants which leave the circuit's internal structure pseudo-randomly determined. Component fusion deterministically selects subcircuits using a component identification algorithm and replaces them using a deterministic algorithm that generates canonical logic forms. Component encryption seeks to alter the semantics of individual circuit components using an encoding function, but preserves the overall circuit semantics by decoding signal values later in the circuit. Experiments were conducted to examine the performance of component fusion and component encryption against representative trials of subcircuit selection-and-replacement and Boundary Blurring, two previously defined methods for circuit obfuscation. …


Stochastic Feature Selection With Distributed Feature Spacing For Hyperspectral Data, Jeffrey D. Clark, Michael J. Mendenhall, Gilbert L. Peterson Jun 2010

Stochastic Feature Selection With Distributed Feature Spacing For Hyperspectral Data, Jeffrey D. Clark, Michael J. Mendenhall, Gilbert L. Peterson

Faculty Publications

Feature subset selection is a well studied problem in machine learning. One short-coming of many methods is the selection of highly correlated features; a characteristic of hyperspectral data. A novel stochastic feature selection method with three major components is presented. First, we present an optimized feature selection method that maximizes a heuristic using a simulated annealing search which increases the chance of avoiding locally optimum solutions. Second, we exploit local cross correlation pair-wise amongst classes of interest to select suitable features for class discrimination. Third, we adopt the concept of distributed spacing from the multi-objective optimization community to distribute features …


Cyber This, Cyber That...So What?, Eric D. Trias, Bryan Bell [*] Apr 2010

Cyber This, Cyber That...So What?, Eric D. Trias, Bryan Bell [*]

Faculty Publications

This article endorses the idea that cyber operations may be conducted in all war-fighting domains: air, space, cyberspace, land, and sea. In addition, despite the immaturity of cyberspace operational doctrines, the doctrines from air and space remain relevant and applicable to the cyberspace domain. Cyber operations are just another set of tools in the commander's toolbox. Although cyber operations have distinct ways of achieving effects, from an Air Force perspective they are similar too the air and space operations that support air and space (and cyberspace) functions. Known and established cyber operations provide war fighters with viable options to kinetic …


Application Of Satellite-Derived Wind Profiles To Joint Precision Airdrop System (Jpads) Operations, David C. Meier Mar 2010

Application Of Satellite-Derived Wind Profiles To Joint Precision Airdrop System (Jpads) Operations, David C. Meier

Theses and Dissertations

The Joint Precision Airdrop System has revolutionized military airdrop capability, allowing accurate delivery of equipment and supplies to smaller drop zones, from higher altitudes than was previously possible. This capability depends on accurate wind data which is currently provided by a combination of high-resolution forecast models and GPS dropsondes released in the vicinity of the dropzone shortly before the airdrop. This research develops a windprofiling algorithm to derive the needed wind data from passive IR satellite soundings, eliminating the requirement for a hazardous dropsonde pass near the drop zone, or allowing the dropsonde to be dropped farther from the dropzone. …


Hard Collisions In Rubidium Using Sub-Doppler Spectroscopy, Douglas E. Thornton Mar 2010

Hard Collisions In Rubidium Using Sub-Doppler Spectroscopy, Douglas E. Thornton

Theses and Dissertations

To better understand the laser kinetics of an alkali gain medium, hard collisions, or velocity-changing collisions, has been studied and a velocity-changing collisional rate has been calculated. Previous works have studied these collisions, but no rate has been calculated. Using the precise tool of sub-Doppler spectroscopy, atomic hard collisions can be observed. The collected spectra are fitted with two different line shapes to demonstrate the accuracy of this method. From the fits, the number of hard collisions can be extracted. The time scale of the hard collisions in rubidium is interpolated by varying the chopping frequency of the pump beam, …


Visually Managing Ipsec, Peter J. Dell'accio Mar 2010

Visually Managing Ipsec, Peter J. Dell'accio

Theses and Dissertations

The United States Air Force relies heavily on computer networks to transmit vast amounts of information throughout its organizations and with agencies throughout the Department of Defense. The data take many forms, utilize different protocols, and originate from various platforms and applications. It is not practical to apply security measures specific to individual applications, platforms, and protocols. Internet Protocol Security (IPsec) is a set of protocols designed to secure data traveling over IP networks, including the Internet. By applying security at the network layer of communications, data packets can be secured regardless of what application generated the data or which …


The Effect Of Synthetic Aperture Radar Image Resolution On Target Discrimination, John E. Mcgowan Mar 2010

The Effect Of Synthetic Aperture Radar Image Resolution On Target Discrimination, John E. Mcgowan

Theses and Dissertations

This research details the effect of spatial resolution on target discrimination in Synthetic Aperture Radar (SAR) images. Multiple SAR image chips containing targets and non-targets are used to test a baseline Automatic Target Recognition (ATR) system with reduced spatial resolution. Spatial resolution is reduced by lowering the pixel count or synthesizing a degraded image by filtering and reducing the pixel count. A two-parameter Constant False Alarm Rate (CFAR) detector is tested, and three feature sets, size, contrast, and texture, are used to train a linear classifier and to estimate probability density functions for the two classes. The results are scored …


Reputation-Based Trust For A Cooperative, Agent-Based Backup Protection Scheme For Power Networks, John F. Borowski Mar 2010

Reputation-Based Trust For A Cooperative, Agent-Based Backup Protection Scheme For Power Networks, John F. Borowski

Theses and Dissertations

This thesis research explores integrating a reputation-based trust mechanism with an agent-based backup protection system to improve the performance of traditional backup relay methods that are currently in use in power transmission systems. Integrating agent technology into relay protection schemes has been previously proposed to clear faults more rapidly and to add precision by enabling the use of adaptive protection methods. A distributed, cooperative trust system such as that used in peer-to-peer file sharing networks has the potential to add an additional layer of defense in a protection system designed to operate with greater autonomy. This trust component enables agents …


High Power Microwave (Hpm) And Ionizing Radiation Effects On Cmos Devices, Nicholas A. Estep Mar 2010

High Power Microwave (Hpm) And Ionizing Radiation Effects On Cmos Devices, Nicholas A. Estep

Theses and Dissertations

Integrated circuits (ICs) are inherently complicated and made worse by increasing transistor quantity and density. This trend potentially enhances concomitant effects of high energy radiation and local or impressed electromagnetic interference (EMI). The reduced margin for signal error may counter any gain in radiation hardness from smaller device dimensions. Isolated EMI and ionizing radiation studies on circuits have been conducted extensively over the past 30 years. However, little focus has been placed on the combined effects. To investigate the effect of combined EMI and ionizing radiation, two complementary metal oxide semiconductor (CMOS) inverter technologies (CD4069 and SN74AUC1G04) were analyzed for …


Monocular Vision Localization Using A Gimbaled Laser Range Sensor, Don J. Yates Mar 2010

Monocular Vision Localization Using A Gimbaled Laser Range Sensor, Don J. Yates

Theses and Dissertations

There have been great advances in recent years in the area of indoor navigation. Many of these new navigation systems rely on digital images to aid an inertial navigation estimates. The Air Force Institute of Technology (AFIT) has been conducting research in this area for a number of years. The image-aiding techniques are centered around tracking stationary features in order to improve inertial navigation estimates. Previous research has used stereo vision systems or terrain constraints with monocular systems to estimate feature locations. While these methods have shown good results, they do have drawbacks. First, as unmanned exploration vehicles become smaller …


A Structural Dynamic Analysis Of A Manduca Sexta Forewing, Travis W. Sims Mar 2010

A Structural Dynamic Analysis Of A Manduca Sexta Forewing, Travis W. Sims

Theses and Dissertations

Micro air vehicles (MAVs) are intended for future intelligence, surveillance, and reconnaissance use. To adequately fulfill a clandestine capacity, MAVs must operate in close proximity to their intended target without eliciting counter-observation. This objective, along with DARPA’s constraint of a sub-15 centimeter span, requires future MAVs to mimic insect appearance and flight characteristics. This thesis describes an experimental method for conducting a structural analysis of a Manduca Sexta (hawkmoth) forewing. Geometry is captured via computed tomography (CT), and frequency data is collected using laser vibrometry in air and vacuum. A finite element (FE) model is constructed using quadratic beams and …


Relative Orbit Elements For Satellites In Elliptical Orbits, Kirk W. Johnson Mar 2010

Relative Orbit Elements For Satellites In Elliptical Orbits, Kirk W. Johnson

Theses and Dissertations

The purpose of this research was to describe the unperturbed relative motion of Earth satellites in elliptical orbits using a simple dynamics model whose parameters allow significant geometrical insight and operational efficacy. The goal was to retain the advantages of the Relative Orbit Elements (ROE) realization of the Hill-Clohessy-Wiltshire (HCW) equations, a linearized dynamics model for circular reference orbits. Specifically, this thesis analyzed the geometry of satellite rendezvous and proximity operations using the ROE parameters to characterize the model’s utility. Next, through a comprehensive literature review, this thesis sought possible approaches for developing a similarly useful parameterization for chief orbits …


Development Of A Remotely Operated Autonomous Satellite Tracking System, Michael E. Graff Mar 2010

Development Of A Remotely Operated Autonomous Satellite Tracking System, Michael E. Graff

Theses and Dissertations

AFIT is currently developing a capability to remotely and autonomously track LEO satellites using commercial telescopes. Currently, the system is capable of open-loop tracking based on Two-Line Element sets (TLEs) downloaded from NORAD’s space object catalog. The ability to actively track using a closed-loop control system would allow tracking of satellites which deviated from the published TLEs along with providing some information about the object’s new orbital elements. To accomplish closed-loop tracking, the object is imaged by a digital camera connected to a wide field-of-view (WFOV) spotting scope. Software was developed to provide azimuth and elevation inputs in order to …


Analysis Of Slewing And Attitude Determination Requirements For Ctex, William J. Starr Jr. Mar 2010

Analysis Of Slewing And Attitude Determination Requirements For Ctex, William J. Starr Jr.

Theses and Dissertations

This thesis examines the slewing and attitude determination requirements for the Chromotomographic Experiment (CTEX), a chromotomographic-based hyperspectral imager, to be mounted on-board the Japanese Experiment Module (JEM) External Facility (EF). The in-track slewing requirement is driven by the facts that CTEx has a very small field of view (FOV) and is required to collect 10 seconds of data for any given collection window. The need to slew in the cross-track direction is a product of the small FOV and target/calibration site access. CTEx incorporates a two-axis slow-steering dwell mirror with a range of ± 8 degrees and an accuracy of …


Optimization Of Environmental Conditions To Maximize Carbon Dioxide Sequestration Through Algal Growth, Kenneth M. Karcher Mar 2010

Optimization Of Environmental Conditions To Maximize Carbon Dioxide Sequestration Through Algal Growth, Kenneth M. Karcher

Theses and Dissertations

The micro-alga Chlorella vulgaris was cultivated under a variety of environmental conditions in various culture media solutions to assess and optimize growth rate and biomass productivity. Efforts during this work investigated growth parameters at the micro-scale in an air-lift bubble system with the goal of interpreting performance characteristics that can be applied to a larger serpentine tubular Photo-bioreactor. Maximum growth rates and biomass yields were 0.65 d-1 and 2.003 g biomass/L and achieved in seven days using urea in de-ionized water under a 24:0 Photoperiod (Light:Dark). Additionally, growth rates and biomass yields of 0.65 d-1 and 1.964 g …


Mechanical Properties Characterization And Business Case Analysis Of The Fiber Metal Laminate Glare-3 For Use As Secondary Aircraft Structure, Benjamin O. Elton Mar 2010

Mechanical Properties Characterization And Business Case Analysis Of The Fiber Metal Laminate Glare-3 For Use As Secondary Aircraft Structure, Benjamin O. Elton

Theses and Dissertations

This effort explored the mechanical characteristics and economic feasibility of using the fiber metal laminate, GLARE-3, as a secondary aircraft structure; specifically, the cargo floor of a C-130. The mechanical properties were determined through static four-point bending and tensile testing and dynamic impact testing. Aggregate behavior of the constituent materials was predicted using a model which consisted of Mass Volume Fraction (MVF) and Classical Laminated Plate Theory (CLPT) methods using known values for the constituents. Static testing was conducted on coupon-level specimens using standardized testing procedures. Static tensile tests were conducted on specimens with four different fiber orientations, 0°, 22.5°, …


Development Of Morphing Aircraft Structure Using Smp, Soo-Chan Jee Mar 2010

Development Of Morphing Aircraft Structure Using Smp, Soo-Chan Jee

Theses and Dissertations

The U.S Air Force needs new aircraft which provide longer flight time, less fuel consumption, better aerodynamics in order to perform Air Force missions successfully as the mission environment changes rapidly. A morphing wing aircraft is considered as a potential new aircraft for those missions. This thesis explores Shape Memory Polymer (SMP) properties test results and its application for morphing wing skin. Several SMP composite laminates were considered for investigating shape changing characteristics required for morphing skin. The braided composite preforms used in making SMP composites were explored in morphing wing operating system based on the results of property tests. …


Changes To Electrical Conductivity In Irradiated Carbon-Nickel Nanocomposites, David F. Coy Mar 2010

Changes To Electrical Conductivity In Irradiated Carbon-Nickel Nanocomposites, David F. Coy

Theses and Dissertations

Pre and post irradiation resistivity and XAFS measurements have been conducted to examine the effects of 0.5 MeV electron irradiations on nickel-carbon composites. Results showed a decrease in surface resistivity in all sample types of 14-30% following irradiation with a total electron exposure of 4 x 10-16 cm-2. Results also showed a corresponding decrease in NiO content for the irradiated samples as compared to measurements of non-irradiated samples. Surface resistivity measurement capabilities were established and measurement techniques refined to produce repeatable results of sufficient precision to discern changes in resistivity for an exposure of 2 x 10 …


Scalable And Fault Tolerant Group Key Management, Nicholas A. Lupien Mar 2010

Scalable And Fault Tolerant Group Key Management, Nicholas A. Lupien

Theses and Dissertations

To address the group key management problem for modern networks this research proposes a lightweight group key management protocol with a gossip-based dissemination routine. Experiments show that by slightly increasing workload for the key update mechanism, this protocol is superior to currently available tree-based protocols with respect to reliability and fault tolerance, while remaining scalable to large groups. Java simulations show that the protocol efficiently distributes keys to large groups in the midst of up to 35 percent node failure rates. In addition, it eliminates the need for logical key hierarchy while preserving an overall reduction in rekey messages to …


Utilizing The Digital Fingerprint Method For Secure Key Generation, Jennifer C. Anilao Mar 2010

Utilizing The Digital Fingerprint Method For Secure Key Generation, Jennifer C. Anilao

Theses and Dissertations

This research examines a new way to generate an uncloneable secure key by taking advantage of the delay characteristics of individual transistors. The user profiles the circuit to deduce the glitch count of each output line for each number of selectable buffers added to the circuit. The user can then use this information to generate a specific glitch count on each output line, which is passed to an encryption algorithm as its key. The results detail tests of two configurations for adding a selectable amount of buffers into each glitch circuit in order to induce additional delay. One configuration adds …


Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady Mar 2010

Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady

Theses and Dissertations

Computing systems are used in virtually every aspect of our lives. Technology such as smart phones and electronically controlled subsystems in cars is becoming so commonly used that it is virtually ubiquitous. Sometimes, this technology can be exploited to perform functions that it was never intended to perform, or fail to provide information that it is supposed to protect. X-HIA was shown to be effective at identifying several circuit components in a significantly shorter time than previous identification methods. Instead of requiring a number of input/output pairings that grows factorially or exponentially as the circuit size grows, it requires only …


Investigating The Use Of Frequency Selective Surfaces In High Power Microwave Applications, Steven M. Pugh Mar 2010

Investigating The Use Of Frequency Selective Surfaces In High Power Microwave Applications, Steven M. Pugh

Theses and Dissertations

This thesis explores new territory with the theoretical investigation of the use of Frequency Selective Surfaces (FSS) in High Power Microwave (HPM) applications. Work was performed in a simulation environment where rectangular and ring-shaped FSS elements were evaluated. Incident electric field levels of 0.5MV/m were propagated toward the FSS in a plane wave that was perpendicular to the surface. Results show that the total electric field in the apertures of the FSS can reach more than 6MV/m. This necessitates the use of high strength dielectric materials surrounding the FSS to reduce the risk of electrical breakdown. It is shown that …


Off-Design Analysis Of A High Bypass Turbofan Using A Pulsed Detonation Combustor, Caitlin R. Thorn Mar 2010

Off-Design Analysis Of A High Bypass Turbofan Using A Pulsed Detonation Combustor, Caitlin R. Thorn

Theses and Dissertations

Past research has indicated that implementation of a pulsed detonation combustor (PDC) into a high-bypass turbofan engine yields a more efficient engine at design conditions. It is proposed that performance gains can be made utilizing this hybrid engine off-design. A hybrid high-bypass turbofan engine with a PDC model was evaluated for a range of Mach numbers, altitudes, and fill fractions in the Numerical Propulsion System Simulation (NPSS). Results were compared to a conventional baseline high-bypass turbofan engine that shares the same architecture with the hybrid. The NPSS baseline engine was validated using the Aircraft Engine Design System (AEDsys) program and …


Simulation And Application Of Gpops For Trajectory Optimization And Mission Planning Tool, Danielle E. Yaple Mar 2010

Simulation And Application Of Gpops For Trajectory Optimization And Mission Planning Tool, Danielle E. Yaple

Theses and Dissertations

Rapid trajectory generation is crucial to prompt global warfare. To meet the USAF’s objective of Persistent and Responsive Precision Engagement, a rapid mission planning tool is required. This research creates the framework for the mission planning tool and provides a sample optimal trajectory which is solved using the GPOPS software package. GPOPS employs a Gaussian pseudospectral method to solve the non-linear equations of motion with both end conditions and path constraints. By simultaneously solving the entire trajectory based on an initial guess and small number of nodes, this method is ideal for generating rapid solutions. The sample case is a …