Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Aerospace Engineering (58)
- Electrical and Computer Engineering (41)
- Physical Sciences and Mathematics (36)
- Computer Engineering (32)
- Navigation, Guidance, Control and Dynamics (17)
-
- Computer Sciences (16)
- Digital Communications and Networking (16)
- Space Vehicles (15)
- Systems and Communications (14)
- Electrical and Electronics (13)
- Signal Processing (12)
- Propulsion and Power (11)
- Information Security (10)
- Physics (10)
- Structures and Materials (10)
- Aeronautical Vehicles (9)
- Computer and Systems Architecture (9)
- Astrodynamics (8)
- Materials Science and Engineering (8)
- Aerodynamics and Fluid Mechanics (7)
- Data Storage Systems (7)
- Operations Research, Systems Engineering and Industrial Engineering (6)
- Aviation (5)
- Civil and Environmental Engineering (5)
- Optics (5)
- Electromagnetics and Photonics (4)
- Management and Operations (4)
- Construction Engineering and Management (3)
- Controls and Control Theory (3)
- Keyword
-
- #antcenter (11)
- Computer networks--Security measures (5)
- Artificial satellites--Orbits--Mathematical models (4)
- Image processing--Digital techniques (4)
- Pattern recognition systems (4)
-
- Remote sensing (4)
- Global Positioning System (3)
- Imaging systems (3)
- Target acquisition (3)
- AFIT/CSE (2)
- AFIT/SY (2)
- Artificial satellites (2)
- Artificial satellites in navigation (2)
- Chromatographic analysis (2)
- Composite materials (2)
- Computer security (2)
- Data encryption (Computer science) (2)
- Data protection (2)
- Distances--Measurement (2)
- Drone aircraft (2)
- Elliptical orbits (2)
- Field programmable gate arrays (2)
- Hamiltonian systems (2)
- Heat--Transmission (2)
- Image processing (2)
- Information retrieval (2)
- Lasers (2)
- Micro air vehicles (2)
- Microelectromechanical systems (2)
- Microspacecraft (2)
- Publication
- Publication Type
Articles 61 - 90 of 149
Full-Text Articles in Engineering
Rubidium Recycling In A High Intensity Short Duration Pulsed Alkali Laser, Wooddy S. Miller
Rubidium Recycling In A High Intensity Short Duration Pulsed Alkali Laser, Wooddy S. Miller
Theses and Dissertations
Laser induced fluorescence was used to study how pump pulse duration and alkali recycle time effects maximum power output in a Diode Pumped Alkali Laser (DPAL) system. A high intensity short pulsed pump source was used to excited rubidium atoms inside a DPAL-type laser. The maximum output power of the laser showed a strong dependence upon the temporal width of the pump pulse in addition to the input pump intensity. A linear relationship was observed between the maximum output power and the pulse width due to the effective lifetime of the excited state, defined as the time it takes for …
Application Of Satellite-Derived Wind Profiles To Joint Precision Airdrop System (Jpads) Operations, David C. Meier
Application Of Satellite-Derived Wind Profiles To Joint Precision Airdrop System (Jpads) Operations, David C. Meier
Theses and Dissertations
The Joint Precision Airdrop System has revolutionized military airdrop capability, allowing accurate delivery of equipment and supplies to smaller drop zones, from higher altitudes than was previously possible. This capability depends on accurate wind data which is currently provided by a combination of high-resolution forecast models and GPS dropsondes released in the vicinity of the dropzone shortly before the airdrop. This research develops a windprofiling algorithm to derive the needed wind data from passive IR satellite soundings, eliminating the requirement for a hazardous dropsonde pass near the drop zone, or allowing the dropsonde to be dropped farther from the dropzone. …
Development And Demonstration Of A Field-Deployable Fast Chromotomographic Imager, Daniel C. O'Dell
Development And Demonstration Of A Field-Deployable Fast Chromotomographic Imager, Daniel C. O'Dell
Theses and Dissertations
A field deployable hyperspectral imager utilizing chromotomography (CT), with a direct vision prism (DVP) as the dispersive element, has been constructed at AFIT. This research is focused on the development and demonstration of the CT imager. An overview of hyperspectral imaging, chromotomography, a synopsis of reconstruction algorithms, and other CT instruments are given. The importance of component alignment, instrument calibration, and exact prism angular position data are discussed. A simplistic \shift and add" reconstruction algorithm was utilized for this research. Although limited in its ability to reconstruct a spatially and spectrally diverse scene, the algorithm was adequate for the testing …
Uncertainty Quantification Of Multi-Component Isotope-Separation Cascade Model, Khoi D. Tran
Uncertainty Quantification Of Multi-Component Isotope-Separation Cascade Model, Khoi D. Tran
Theses and Dissertations
Monte Carlo uncertainty quantification (UQ) capability has been added to a code for modeling multi-component steady-state isotope-separation enrichment cascades to characterize the propagation of uncertainties in input data that define the cascade and the feed. Random samples of error for every computational input are drawn from its individual uncertainty distribution and added to the inputs, creating a set of enrichment cascade problems with perturbed inputs. The set of problems is solved using the verified code. The cascade outputs are then characterized using the empirical cumulative distribution. The uncertainty output data are analyzed to gain new insights into the behaviors of …
Changes To Electrical Conductivity In Irradiated Carbon-Nickel Nanocomposites, David F. Coy
Changes To Electrical Conductivity In Irradiated Carbon-Nickel Nanocomposites, David F. Coy
Theses and Dissertations
Pre and post irradiation resistivity and XAFS measurements have been conducted to examine the effects of 0.5 MeV electron irradiations on nickel-carbon composites. Results showed a decrease in surface resistivity in all sample types of 14-30% following irradiation with a total electron exposure of 4 x 10-16 cm-2. Results also showed a corresponding decrease in NiO content for the irradiated samples as compared to measurements of non-irradiated samples. Surface resistivity measurement capabilities were established and measurement techniques refined to produce repeatable results of sufficient precision to discern changes in resistivity for an exposure of 2 x 10 …
Multi-Objective Constraint Satisfaction For Mobile Robot Area Defense, Kenneth W. Mayo
Multi-Objective Constraint Satisfaction For Mobile Robot Area Defense, Kenneth W. Mayo
Theses and Dissertations
In developing multi-robot cooperative systems, there are often competing objectives that need to be met. For example in automating area defense systems, multiple robots must work together to explore the entire area, and maintain consistent communications to alert the other agents and ensure trust in the system. This research presents an algorithm that tasks robots to meet the two specific goals of exploration and communication maintenance in an uncoordinated environment reducing the need for a user to pre-balance the objectives. This multi-objective problem is defined as a constraint satisfaction problem solved using the Non-dominated Sorting Genetic Algorithm II (NSGA-II). Both …
Flexible Computing Architecture For Real Time Skin Detection, Matthew P. Hornung
Flexible Computing Architecture For Real Time Skin Detection, Matthew P. Hornung
Theses and Dissertations
In both the Air Force and Search and Rescue Communities, there is a current need to detect and characterize persons. Existing methods use red-green-blue (RGB) imagery, but produce high false alarm rates. New technology in multi-spectral skin detection is better than the existing RGB methods, but lacks a control and processing architecture to make them efficient for real time problems. We hypothesize that taking a minimalistic approach to the software design, we can perform image preprocessing, feature computation, and skin detection in real time. A number of applications require accurate detection and characterization of persons, human measurement and signature intelligence …
Real Time Fault Detection And Diagnostics Using Fpga-Based Architecture, Nathan P. Naber
Real Time Fault Detection And Diagnostics Using Fpga-Based Architecture, Nathan P. Naber
Theses and Dissertations
Errors within circuits caused by radiation continue to be an important concern to developers. A new methodology of real time fault detection and diagnostics utilizing FPGA based architectures while under radiation were investigated in this research. The contributions of this research are focused on three areas; a full test platform to evaluate a circuit while under irradiation, an algorithm to detect and diagnose fault locations within a circuit, and finally to characterize Triple Design Triple Modular Redundancy (TDTMR), a new form of TMR. Five different test setups, injected fault test, gamma radiation test, thermal radiation test, optical laser test, and …
Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr.
Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr.
Theses and Dissertations
Communication network simulations have typically been visualized in the past through 2D representations, but this is insufficient for battlefield network scenarios. Visual representations of battlefield networks greatly benefit from 3D visualization due to its ability to retain asset location. This research investigates the feasibility of modeling a typical battlefield communication network in a realistic 3D manner and discusses the effects of doing so. The result is an open source, 3D network visualization tool that can create highly intuitive connected battlefield scenes, enabling the user to quickly comprehend network state. It highlights mobile assets, packet movement, and node connectivity while allowing …
Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai
Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai
Theses and Dissertations
Insider threats can pose a great risk to organizations and by their very nature are difficult to protect against. Auditing and system logging are capabilities present in most operating systems and can be used for detecting insider activity. However, current auditing methods are typically applied in a haphazard way, if at all, and are not conducive to contributing to an effective insider threat security policy. This research develops a methodology for designing a customized auditing and logging template for a Linux operating system. An intent-based insider threat risk assessment methodology is presented to create use case scenarios tailored to address …
Reputation-Based Trust For A Cooperative, Agent-Based Backup Protection Scheme For Power Networks, John F. Borowski
Reputation-Based Trust For A Cooperative, Agent-Based Backup Protection Scheme For Power Networks, John F. Borowski
Theses and Dissertations
This thesis research explores integrating a reputation-based trust mechanism with an agent-based backup protection system to improve the performance of traditional backup relay methods that are currently in use in power transmission systems. Integrating agent technology into relay protection schemes has been previously proposed to clear faults more rapidly and to add precision by enabling the use of adaptive protection methods. A distributed, cooperative trust system such as that used in peer-to-peer file sharing networks has the potential to add an additional layer of defense in a protection system designed to operate with greater autonomy. This trust component enables agents …
A Distributed Network Logging Topology, Nicholas E. Fritts
A Distributed Network Logging Topology, Nicholas E. Fritts
Theses and Dissertations
Network logging is used to monitor computer systems for potential problems and threats by network administrators. Research has found that the more logging enabled, the more potential threats can be detected in the logs (Levoy, 2006). However, generally it is considered too costly to dedicate the manpower required to analyze the amount of logging data that it is possible to generate. Current research is working on different correlation and parsing techniques to help filter the data, but these methods function by having all of the data dumped in to a central repository. Central repositories are limited in the amount of …
Visually Managing Ipsec, Peter J. Dell'accio
Visually Managing Ipsec, Peter J. Dell'accio
Theses and Dissertations
The United States Air Force relies heavily on computer networks to transmit vast amounts of information throughout its organizations and with agencies throughout the Department of Defense. The data take many forms, utilize different protocols, and originate from various platforms and applications. It is not practical to apply security measures specific to individual applications, platforms, and protocols. Internet Protocol Security (IPsec) is a set of protocols designed to secure data traveling over IP networks, including the Internet. By applying security at the network layer of communications, data packets can be secured regardless of what application generated the data or which …
Handshaking Protocols And Jamming Mechanisms For Blind Rendezvous In A Dynamic Spectrum Access Environment, Aaron A. Gross
Handshaking Protocols And Jamming Mechanisms For Blind Rendezvous In A Dynamic Spectrum Access Environment, Aaron A. Gross
Theses and Dissertations
Blind frequency rendezvous is an important process for bootstrapping communications between radios without the use of pre-existing infrastructure or common control channel in a Dynamic Spectrum Access (DSA) environment. In this process, radios attempt to arrive in the same frequency channel and recognize each other’s presence in changing, under-utilized spectrum. This paper refines existing blind rendezvous techniques by introducing a handshaking algorithm for setting up communications once two radios have arrived in the same frequency channel. It then investigates the effect of different jamming techniques on blind rendezvous algorithms that utilize this handshake. The handshake performance is measured by determining …
Codifying Information Assurance Controls For Department Of Defense (Dod) Supervisory Control And Data Acquisition (Scada) Systems (U), Eddie A. Mendezllovet
Codifying Information Assurance Controls For Department Of Defense (Dod) Supervisory Control And Data Acquisition (Scada) Systems (U), Eddie A. Mendezllovet
Theses and Dissertations
Protecting DoD critical infrastructure resources and Supervisory Control and Data Acquisition (SCADA) systems from cyber attacks is becoming an increasingly challenging task. DoD Information Assurance controls provide a sound framework to achieve an appropriate level of confidentiality, integrity, and availability. However, these controls have not been updated since 2003 and currently do not adequately address the security of DoD SCADA systems. This research sampled U.S. Air Force Civil Engineering subject matter experts representing eight Major Commands that manage and operate SCADA systems. They ranked 30 IA controls in three categories, and evaluated eight SCADA specific IA controls for inclusion into …
Developing Cyberspace Data Understanding: Using Crisp-Dm For Host-Based Ids Feature Mining, Joseph R. Erskine
Developing Cyberspace Data Understanding: Using Crisp-Dm For Host-Based Ids Feature Mining, Joseph R. Erskine
Theses and Dissertations
Current intrusion detection systems generate a large number of specific alerts, but do not provide actionable information. Many times, these alerts must be analyzed by a network defender, a time consuming and tedious task which can occur hours or days after an attack occurs. Improved understanding of the cyberspace domain can lead to great advancements in Cyberspace situational awareness research and development. This thesis applies the Cross Industry Standard Process for Data Mining (CRISP-DM) to develop an understanding about a host system under attack. Data is generated by launching scans and exploits at a machine outfitted with a set of …
Scalable And Fault Tolerant Group Key Management, Nicholas A. Lupien
Scalable And Fault Tolerant Group Key Management, Nicholas A. Lupien
Theses and Dissertations
To address the group key management problem for modern networks this research proposes a lightweight group key management protocol with a gossip-based dissemination routine. Experiments show that by slightly increasing workload for the key update mechanism, this protocol is superior to currently available tree-based protocols with respect to reliability and fault tolerance, while remaining scalable to large groups. Java simulations show that the protocol efficiently distributes keys to large groups in the midst of up to 35 percent node failure rates. In addition, it eliminates the need for logical key hierarchy while preserving an overall reduction in rekey messages to …
Toward A Mobile Agent Relay Network, Hyon H. Kwak
Toward A Mobile Agent Relay Network, Hyon H. Kwak
Theses and Dissertations
Although wireless communication provides connectivity where hardwired links are difficult or impractical, it is still hindered by the environmental conditions where the communicators reside. Signal loss over large distances or because of intervening obstacles can be mitigated by increasing the user's transmission power or adding repeater nodes between the users. Unfortunately, increasing the signal strength strains limited power resources and increases the likelihood of eavesdropping. Stationary repeaters are impractical for highly mobile users in dangerous environments. While mobile relay nodes might be a preferred solution, a centralized control scheme saps bandwidth from important traffic and introduces a single point of …
Developing An Effective And Efficient Real Time Strategy Agent For Use As A Computer Generated Force, Kurt Weissgerber
Developing An Effective And Efficient Real Time Strategy Agent For Use As A Computer Generated Force, Kurt Weissgerber
Theses and Dissertations
Computer Generated Forces (CGF) are used to represent units or individuals in military training and constructive simulation. The use of CGF significantly reduces the time and money required for effective training. For CGF to be effective, they must behave as a human would in the same environment. Real Time Strategy (RTS) games place players in control of a large force whose goal is to defeat the opponent. The military setting of RTS games makes them an excellent platform for the development and testing of CGF. While there has been significant research in RTS agent development, most of the developed agents …
Effects Of Channel Mismatches On Beamforming And Signal Detection, Christopher I. Allen
Effects Of Channel Mismatches On Beamforming And Signal Detection, Christopher I. Allen
Theses and Dissertations
Tuner gain measurements of a multichannel receiver are reported. A linear regression model is used to characterize the gain, as a function of channel number, tuner set-on frequency, and intermediate frequency. Residual errors of this model are characterized by a t distribution. Very strong autocorrelation of tuner gain at various frequencies is noted. Tuner performance from one channel to the next is diverse; several defects at specific frequencies are noted. The Wilcoxon signed rank test is used to test normality of tuner gain among devices; normality is rejected. Antenna directivity and phase pattern measurements are also reported. An antenna element …
Improved Multispectral Skin Detection And Its Application To Search Space Reduction For Dismount Detection Based On Histograms Of Oriented Gradients, Adam L. Brooks
Theses and Dissertations
Due to the general shift from conventional warfare to terrorism and urban warfare by enemies of the United States in the late 20th Century, locating and tracking individuals of interest have become critically important. Dismount detection and tracking are vital to provide security and intelligence in both combat and homeland defense scenarios including base defense, combat search and rescue (CSAR), and border patrol. This thesis focuses on exploiting recent advances in skin detection research to reliably detect dismounts in a scene. To this end, a signal-plus-noise model is developed to map modeled skin spectra to the imaging response of an …
Pulse Shape Correlation For Laser Detection And Ranging (Ladar), Brian T. Deas
Pulse Shape Correlation For Laser Detection And Ranging (Ladar), Brian T. Deas
Theses and Dissertations
Radar systems provide an important remote sensing capability, and are crucial to the layered sensing vision; a concept of operation that aims to apply the right number of the right types of sensors, in the right places, at the right times for superior battle space situational awareness. The layered sensing vision poses a range of technical challenges, including radar, that are yet to be addressed. To address the radar-specific design challenges, the research community responded with waveform diversity; a relatively new field of study which aims reduce the cost of remote sensing while improving performance. Early work suggests that the …
Frequency Diverse Array Radar: Signal Characterization And Measurement Accuracy, Steven H. Brady
Frequency Diverse Array Radar: Signal Characterization And Measurement Accuracy, Steven H. Brady
Theses and Dissertations
Radar systems provide an important remote sensing capability, and are crucial to the layered sensing vision; a concept of operation that aims to apply the right number of the right types of sensors, in the right places, at the right times for superior battle space situational awareness. The layered sensing vision poses a range of technical challenges, including radar, that are yet to be addressed. To address the radar-specific design challenges, the research community responded with waveform diversity; a relatively new field of study which aims reduce the cost of remote sensing while improving performance. Early work suggests that the …
High Power Microwave (Hpm) And Ionizing Radiation Effects On Cmos Devices, Nicholas A. Estep
High Power Microwave (Hpm) And Ionizing Radiation Effects On Cmos Devices, Nicholas A. Estep
Theses and Dissertations
Integrated circuits (ICs) are inherently complicated and made worse by increasing transistor quantity and density. This trend potentially enhances concomitant effects of high energy radiation and local or impressed electromagnetic interference (EMI). The reduced margin for signal error may counter any gain in radiation hardness from smaller device dimensions. Isolated EMI and ionizing radiation studies on circuits have been conducted extensively over the past 30 years. However, little focus has been placed on the combined effects. To investigate the effect of combined EMI and ionizing radiation, two complementary metal oxide semiconductor (CMOS) inverter technologies (CD4069 and SN74AUC1G04) were analyzed for …
Analysis Of A Rumor Routing Protocol With Limited Packet Lifetimes, Peter R. Francik
Analysis Of A Rumor Routing Protocol With Limited Packet Lifetimes, Peter R. Francik
Theses and Dissertations
Wireless sensor networks require specialized protocols that conserve power and minimize network traffic. Therefore, it is vitally important to analyze how the parameters of a protocol affect these metrics. In doing so, a more efficient protocol can be developed. This research evaluates how the number of nodes in a network, time between generated agents, lifetime of agents, number of agent transmissions, time between generated queries, lifetime of queries, and node transmission time affect a modified rumor routing protocol for a large-scale, wireless sensor network. Furthermore, it analyzes how the probability distribution of certain protocol parameters affects the network performance. The …
Application Of The Three Short Calibration Technique In A Low Frequency Focus Beam System, William E. Gunn Jr.
Application Of The Three Short Calibration Technique In A Low Frequency Focus Beam System, William E. Gunn Jr.
Theses and Dissertations
Electromagnetic material characterization is the process of determining the constitutive parameters of matter. In simple media, these parameters are permittivity and permeability. Characterization of these values is often accomplished through the use of waveguides, transmission lines, coaxial cables, and resonant cavities. Free space measurements systems are employed since they are non destructive (i.e., no sample machining is required) and broadband. Traditionally, time domain gating is utilized to mitigate systematic errors. However, an artifact of this calibration technique is band edge corruption due to data windowing. The goal of this research is to develop and apply a Three Short Calibration Technique …
Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady
Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady
Theses and Dissertations
Computing systems are used in virtually every aspect of our lives. Technology such as smart phones and electronically controlled subsystems in cars is becoming so commonly used that it is virtually ubiquitous. Sometimes, this technology can be exploited to perform functions that it was never intended to perform, or fail to provide information that it is supposed to protect. X-HIA was shown to be effective at identifying several circuit components in a significantly shorter time than previous identification methods. Instead of requiring a number of input/output pairings that grows factorially or exponentially as the circuit size grows, it requires only …
An Approach To Large Scale Radar-Based Modeling And Simulation, Lester C. Long Iv
An Approach To Large Scale Radar-Based Modeling And Simulation, Lester C. Long Iv
Theses and Dissertations
This research presents a method of aggregating, or reducing the resolution, of a commonly available Department of Defense (DoD) simulation. It addresses the differences between varying levels of resolution and scope used in the DoD’s hierarchy of models pyramid. A data representation that aggregates engagement-level simulation data to use at a lower resolution level, the mission-level, is presented and analyzed. Two formats of implementing this data representation are developed and compared: the rigid cylinder format and the expanding tables format. The rigid cylinder format provides an intuitive way to visualize the data and is used to develop the theory. The …
Characterization And Measurement Of Passive And Active Metamaterial Devices, Christopher A. Lundell
Characterization And Measurement Of Passive And Active Metamaterial Devices, Christopher A. Lundell
Theses and Dissertations
This document addresses two major obstacles facing metamaterial development: uncertainty in the characterization of electromagnetic field behavior in metamaterial structures and the relatively small operational bandwidth of metamaterial structures. To address the first obstacle, a new method to characterize electromagnetic field behavior in a metamaterial is presented. This new method is a bistatic radar cross section (RCS) measurement technique. RCS measurements are well-suited to measuring bulk metamaterial samples because they show frequency dependence of scattering angles and offer common postprocessing techniques that can be useful for visualizing results. To address the second obstacle, this document characterizes the effectiveness of an …
Global Navigation Satellite System Software Defined Radio, Jason M. Mcginthy
Global Navigation Satellite System Software Defined Radio, Jason M. Mcginthy
Theses and Dissertations
The GNSS world is quickly growing. The United States’ GPS, the European Union’s Galileo, China’s Compass, and Russia’s GLONASS systems are all developing or modernizing their signals, and there will soon be more navigation satellites in space than ever before. The goal of this research was to develop an initial capability for an AFIT GNSS software receiver. This software receiver is intended to be used for research purposes at the Advanced Navigation Technology (ANT) Center. First a GPS-only software receiver was built. It successfully acquired, tracked, and provided reasonable position estimates. Next, the receiver was successfully modified to acquire and …