Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

2010

Discipline
Keyword
Publication
Publication Type

Articles 61 - 90 of 149

Full-Text Articles in Engineering

Rubidium Recycling In A High Intensity Short Duration Pulsed Alkali Laser, Wooddy S. Miller Mar 2010

Rubidium Recycling In A High Intensity Short Duration Pulsed Alkali Laser, Wooddy S. Miller

Theses and Dissertations

Laser induced fluorescence was used to study how pump pulse duration and alkali recycle time effects maximum power output in a Diode Pumped Alkali Laser (DPAL) system. A high intensity short pulsed pump source was used to excited rubidium atoms inside a DPAL-type laser. The maximum output power of the laser showed a strong dependence upon the temporal width of the pump pulse in addition to the input pump intensity. A linear relationship was observed between the maximum output power and the pulse width due to the effective lifetime of the excited state, defined as the time it takes for …


Application Of Satellite-Derived Wind Profiles To Joint Precision Airdrop System (Jpads) Operations, David C. Meier Mar 2010

Application Of Satellite-Derived Wind Profiles To Joint Precision Airdrop System (Jpads) Operations, David C. Meier

Theses and Dissertations

The Joint Precision Airdrop System has revolutionized military airdrop capability, allowing accurate delivery of equipment and supplies to smaller drop zones, from higher altitudes than was previously possible. This capability depends on accurate wind data which is currently provided by a combination of high-resolution forecast models and GPS dropsondes released in the vicinity of the dropzone shortly before the airdrop. This research develops a windprofiling algorithm to derive the needed wind data from passive IR satellite soundings, eliminating the requirement for a hazardous dropsonde pass near the drop zone, or allowing the dropsonde to be dropped farther from the dropzone. …


Development And Demonstration Of A Field-Deployable Fast Chromotomographic Imager, Daniel C. O'Dell Mar 2010

Development And Demonstration Of A Field-Deployable Fast Chromotomographic Imager, Daniel C. O'Dell

Theses and Dissertations

A field deployable hyperspectral imager utilizing chromotomography (CT), with a direct vision prism (DVP) as the dispersive element, has been constructed at AFIT. This research is focused on the development and demonstration of the CT imager. An overview of hyperspectral imaging, chromotomography, a synopsis of reconstruction algorithms, and other CT instruments are given. The importance of component alignment, instrument calibration, and exact prism angular position data are discussed. A simplistic \shift and add" reconstruction algorithm was utilized for this research. Although limited in its ability to reconstruct a spatially and spectrally diverse scene, the algorithm was adequate for the testing …


Uncertainty Quantification Of Multi-Component Isotope-Separation Cascade Model, Khoi D. Tran Mar 2010

Uncertainty Quantification Of Multi-Component Isotope-Separation Cascade Model, Khoi D. Tran

Theses and Dissertations

Monte Carlo uncertainty quantification (UQ) capability has been added to a code for modeling multi-component steady-state isotope-separation enrichment cascades to characterize the propagation of uncertainties in input data that define the cascade and the feed. Random samples of error for every computational input are drawn from its individual uncertainty distribution and added to the inputs, creating a set of enrichment cascade problems with perturbed inputs. The set of problems is solved using the verified code. The cascade outputs are then characterized using the empirical cumulative distribution. The uncertainty output data are analyzed to gain new insights into the behaviors of …


Changes To Electrical Conductivity In Irradiated Carbon-Nickel Nanocomposites, David F. Coy Mar 2010

Changes To Electrical Conductivity In Irradiated Carbon-Nickel Nanocomposites, David F. Coy

Theses and Dissertations

Pre and post irradiation resistivity and XAFS measurements have been conducted to examine the effects of 0.5 MeV electron irradiations on nickel-carbon composites. Results showed a decrease in surface resistivity in all sample types of 14-30% following irradiation with a total electron exposure of 4 x 10-16 cm-2. Results also showed a corresponding decrease in NiO content for the irradiated samples as compared to measurements of non-irradiated samples. Surface resistivity measurement capabilities were established and measurement techniques refined to produce repeatable results of sufficient precision to discern changes in resistivity for an exposure of 2 x 10 …


Multi-Objective Constraint Satisfaction For Mobile Robot Area Defense, Kenneth W. Mayo Mar 2010

Multi-Objective Constraint Satisfaction For Mobile Robot Area Defense, Kenneth W. Mayo

Theses and Dissertations

In developing multi-robot cooperative systems, there are often competing objectives that need to be met. For example in automating area defense systems, multiple robots must work together to explore the entire area, and maintain consistent communications to alert the other agents and ensure trust in the system. This research presents an algorithm that tasks robots to meet the two specific goals of exploration and communication maintenance in an uncoordinated environment reducing the need for a user to pre-balance the objectives. This multi-objective problem is defined as a constraint satisfaction problem solved using the Non-dominated Sorting Genetic Algorithm II (NSGA-II). Both …


Flexible Computing Architecture For Real Time Skin Detection, Matthew P. Hornung Mar 2010

Flexible Computing Architecture For Real Time Skin Detection, Matthew P. Hornung

Theses and Dissertations

In both the Air Force and Search and Rescue Communities, there is a current need to detect and characterize persons. Existing methods use red-green-blue (RGB) imagery, but produce high false alarm rates. New technology in multi-spectral skin detection is better than the existing RGB methods, but lacks a control and processing architecture to make them efficient for real time problems. We hypothesize that taking a minimalistic approach to the software design, we can perform image preprocessing, feature computation, and skin detection in real time. A number of applications require accurate detection and characterization of persons, human measurement and signature intelligence …


Real Time Fault Detection And Diagnostics Using Fpga-Based Architecture, Nathan P. Naber Mar 2010

Real Time Fault Detection And Diagnostics Using Fpga-Based Architecture, Nathan P. Naber

Theses and Dissertations

Errors within circuits caused by radiation continue to be an important concern to developers. A new methodology of real time fault detection and diagnostics utilizing FPGA based architectures while under radiation were investigated in this research. The contributions of this research are focused on three areas; a full test platform to evaluate a circuit while under irradiation, an algorithm to detect and diagnose fault locations within a circuit, and finally to characterize Triple Design Triple Modular Redundancy (TDTMR), a new form of TMR. Five different test setups, injected fault test, gamma radiation test, thermal radiation test, optical laser test, and …


Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr. Mar 2010

Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr.

Theses and Dissertations

Communication network simulations have typically been visualized in the past through 2D representations, but this is insufficient for battlefield network scenarios. Visual representations of battlefield networks greatly benefit from 3D visualization due to its ability to retain asset location. This research investigates the feasibility of modeling a typical battlefield communication network in a realistic 3D manner and discusses the effects of doing so. The result is an open source, 3D network visualization tool that can create highly intuitive connected battlefield scenes, enabling the user to quickly comprehend network state. It highlights mobile assets, packet movement, and node connectivity while allowing …


Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai Mar 2010

Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai

Theses and Dissertations

Insider threats can pose a great risk to organizations and by their very nature are difficult to protect against. Auditing and system logging are capabilities present in most operating systems and can be used for detecting insider activity. However, current auditing methods are typically applied in a haphazard way, if at all, and are not conducive to contributing to an effective insider threat security policy. This research develops a methodology for designing a customized auditing and logging template for a Linux operating system. An intent-based insider threat risk assessment methodology is presented to create use case scenarios tailored to address …


Reputation-Based Trust For A Cooperative, Agent-Based Backup Protection Scheme For Power Networks, John F. Borowski Mar 2010

Reputation-Based Trust For A Cooperative, Agent-Based Backup Protection Scheme For Power Networks, John F. Borowski

Theses and Dissertations

This thesis research explores integrating a reputation-based trust mechanism with an agent-based backup protection system to improve the performance of traditional backup relay methods that are currently in use in power transmission systems. Integrating agent technology into relay protection schemes has been previously proposed to clear faults more rapidly and to add precision by enabling the use of adaptive protection methods. A distributed, cooperative trust system such as that used in peer-to-peer file sharing networks has the potential to add an additional layer of defense in a protection system designed to operate with greater autonomy. This trust component enables agents …


A Distributed Network Logging Topology, Nicholas E. Fritts Mar 2010

A Distributed Network Logging Topology, Nicholas E. Fritts

Theses and Dissertations

Network logging is used to monitor computer systems for potential problems and threats by network administrators. Research has found that the more logging enabled, the more potential threats can be detected in the logs (Levoy, 2006). However, generally it is considered too costly to dedicate the manpower required to analyze the amount of logging data that it is possible to generate. Current research is working on different correlation and parsing techniques to help filter the data, but these methods function by having all of the data dumped in to a central repository. Central repositories are limited in the amount of …


Visually Managing Ipsec, Peter J. Dell'accio Mar 2010

Visually Managing Ipsec, Peter J. Dell'accio

Theses and Dissertations

The United States Air Force relies heavily on computer networks to transmit vast amounts of information throughout its organizations and with agencies throughout the Department of Defense. The data take many forms, utilize different protocols, and originate from various platforms and applications. It is not practical to apply security measures specific to individual applications, platforms, and protocols. Internet Protocol Security (IPsec) is a set of protocols designed to secure data traveling over IP networks, including the Internet. By applying security at the network layer of communications, data packets can be secured regardless of what application generated the data or which …


Handshaking Protocols And Jamming Mechanisms For Blind Rendezvous In A Dynamic Spectrum Access Environment, Aaron A. Gross Mar 2010

Handshaking Protocols And Jamming Mechanisms For Blind Rendezvous In A Dynamic Spectrum Access Environment, Aaron A. Gross

Theses and Dissertations

Blind frequency rendezvous is an important process for bootstrapping communications between radios without the use of pre-existing infrastructure or common control channel in a Dynamic Spectrum Access (DSA) environment. In this process, radios attempt to arrive in the same frequency channel and recognize each other’s presence in changing, under-utilized spectrum. This paper refines existing blind rendezvous techniques by introducing a handshaking algorithm for setting up communications once two radios have arrived in the same frequency channel. It then investigates the effect of different jamming techniques on blind rendezvous algorithms that utilize this handshake. The handshake performance is measured by determining …


Codifying Information Assurance Controls For Department Of Defense (Dod) Supervisory Control And Data Acquisition (Scada) Systems (U), Eddie A. Mendezllovet Mar 2010

Codifying Information Assurance Controls For Department Of Defense (Dod) Supervisory Control And Data Acquisition (Scada) Systems (U), Eddie A. Mendezllovet

Theses and Dissertations

Protecting DoD critical infrastructure resources and Supervisory Control and Data Acquisition (SCADA) systems from cyber attacks is becoming an increasingly challenging task. DoD Information Assurance controls provide a sound framework to achieve an appropriate level of confidentiality, integrity, and availability. However, these controls have not been updated since 2003 and currently do not adequately address the security of DoD SCADA systems. This research sampled U.S. Air Force Civil Engineering subject matter experts representing eight Major Commands that manage and operate SCADA systems. They ranked 30 IA controls in three categories, and evaluated eight SCADA specific IA controls for inclusion into …


Developing Cyberspace Data Understanding: Using Crisp-Dm For Host-Based Ids Feature Mining, Joseph R. Erskine Mar 2010

Developing Cyberspace Data Understanding: Using Crisp-Dm For Host-Based Ids Feature Mining, Joseph R. Erskine

Theses and Dissertations

Current intrusion detection systems generate a large number of specific alerts, but do not provide actionable information. Many times, these alerts must be analyzed by a network defender, a time consuming and tedious task which can occur hours or days after an attack occurs. Improved understanding of the cyberspace domain can lead to great advancements in Cyberspace situational awareness research and development. This thesis applies the Cross Industry Standard Process for Data Mining (CRISP-DM) to develop an understanding about a host system under attack. Data is generated by launching scans and exploits at a machine outfitted with a set of …


Scalable And Fault Tolerant Group Key Management, Nicholas A. Lupien Mar 2010

Scalable And Fault Tolerant Group Key Management, Nicholas A. Lupien

Theses and Dissertations

To address the group key management problem for modern networks this research proposes a lightweight group key management protocol with a gossip-based dissemination routine. Experiments show that by slightly increasing workload for the key update mechanism, this protocol is superior to currently available tree-based protocols with respect to reliability and fault tolerance, while remaining scalable to large groups. Java simulations show that the protocol efficiently distributes keys to large groups in the midst of up to 35 percent node failure rates. In addition, it eliminates the need for logical key hierarchy while preserving an overall reduction in rekey messages to …


Toward A Mobile Agent Relay Network, Hyon H. Kwak Mar 2010

Toward A Mobile Agent Relay Network, Hyon H. Kwak

Theses and Dissertations

Although wireless communication provides connectivity where hardwired links are difficult or impractical, it is still hindered by the environmental conditions where the communicators reside. Signal loss over large distances or because of intervening obstacles can be mitigated by increasing the user's transmission power or adding repeater nodes between the users. Unfortunately, increasing the signal strength strains limited power resources and increases the likelihood of eavesdropping. Stationary repeaters are impractical for highly mobile users in dangerous environments. While mobile relay nodes might be a preferred solution, a centralized control scheme saps bandwidth from important traffic and introduces a single point of …


Developing An Effective And Efficient Real Time Strategy Agent For Use As A Computer Generated Force, Kurt Weissgerber Mar 2010

Developing An Effective And Efficient Real Time Strategy Agent For Use As A Computer Generated Force, Kurt Weissgerber

Theses and Dissertations

Computer Generated Forces (CGF) are used to represent units or individuals in military training and constructive simulation. The use of CGF significantly reduces the time and money required for effective training. For CGF to be effective, they must behave as a human would in the same environment. Real Time Strategy (RTS) games place players in control of a large force whose goal is to defeat the opponent. The military setting of RTS games makes them an excellent platform for the development and testing of CGF. While there has been significant research in RTS agent development, most of the developed agents …


Effects Of Channel Mismatches On Beamforming And Signal Detection, Christopher I. Allen Mar 2010

Effects Of Channel Mismatches On Beamforming And Signal Detection, Christopher I. Allen

Theses and Dissertations

Tuner gain measurements of a multichannel receiver are reported. A linear regression model is used to characterize the gain, as a function of channel number, tuner set-on frequency, and intermediate frequency. Residual errors of this model are characterized by a t distribution. Very strong autocorrelation of tuner gain at various frequencies is noted. Tuner performance from one channel to the next is diverse; several defects at specific frequencies are noted. The Wilcoxon signed rank test is used to test normality of tuner gain among devices; normality is rejected. Antenna directivity and phase pattern measurements are also reported. An antenna element …


Improved Multispectral Skin Detection And Its Application To Search Space Reduction For Dismount Detection Based On Histograms Of Oriented Gradients, Adam L. Brooks Mar 2010

Improved Multispectral Skin Detection And Its Application To Search Space Reduction For Dismount Detection Based On Histograms Of Oriented Gradients, Adam L. Brooks

Theses and Dissertations

Due to the general shift from conventional warfare to terrorism and urban warfare by enemies of the United States in the late 20th Century, locating and tracking individuals of interest have become critically important. Dismount detection and tracking are vital to provide security and intelligence in both combat and homeland defense scenarios including base defense, combat search and rescue (CSAR), and border patrol. This thesis focuses on exploiting recent advances in skin detection research to reliably detect dismounts in a scene. To this end, a signal-plus-noise model is developed to map modeled skin spectra to the imaging response of an …


Pulse Shape Correlation For Laser Detection And Ranging (Ladar), Brian T. Deas Mar 2010

Pulse Shape Correlation For Laser Detection And Ranging (Ladar), Brian T. Deas

Theses and Dissertations

Radar systems provide an important remote sensing capability, and are crucial to the layered sensing vision; a concept of operation that aims to apply the right number of the right types of sensors, in the right places, at the right times for superior battle space situational awareness. The layered sensing vision poses a range of technical challenges, including radar, that are yet to be addressed. To address the radar-specific design challenges, the research community responded with waveform diversity; a relatively new field of study which aims reduce the cost of remote sensing while improving performance. Early work suggests that the …


Frequency Diverse Array Radar: Signal Characterization And Measurement Accuracy, Steven H. Brady Mar 2010

Frequency Diverse Array Radar: Signal Characterization And Measurement Accuracy, Steven H. Brady

Theses and Dissertations

Radar systems provide an important remote sensing capability, and are crucial to the layered sensing vision; a concept of operation that aims to apply the right number of the right types of sensors, in the right places, at the right times for superior battle space situational awareness. The layered sensing vision poses a range of technical challenges, including radar, that are yet to be addressed. To address the radar-specific design challenges, the research community responded with waveform diversity; a relatively new field of study which aims reduce the cost of remote sensing while improving performance. Early work suggests that the …


High Power Microwave (Hpm) And Ionizing Radiation Effects On Cmos Devices, Nicholas A. Estep Mar 2010

High Power Microwave (Hpm) And Ionizing Radiation Effects On Cmos Devices, Nicholas A. Estep

Theses and Dissertations

Integrated circuits (ICs) are inherently complicated and made worse by increasing transistor quantity and density. This trend potentially enhances concomitant effects of high energy radiation and local or impressed electromagnetic interference (EMI). The reduced margin for signal error may counter any gain in radiation hardness from smaller device dimensions. Isolated EMI and ionizing radiation studies on circuits have been conducted extensively over the past 30 years. However, little focus has been placed on the combined effects. To investigate the effect of combined EMI and ionizing radiation, two complementary metal oxide semiconductor (CMOS) inverter technologies (CD4069 and SN74AUC1G04) were analyzed for …


Analysis Of A Rumor Routing Protocol With Limited Packet Lifetimes, Peter R. Francik Mar 2010

Analysis Of A Rumor Routing Protocol With Limited Packet Lifetimes, Peter R. Francik

Theses and Dissertations

Wireless sensor networks require specialized protocols that conserve power and minimize network traffic. Therefore, it is vitally important to analyze how the parameters of a protocol affect these metrics. In doing so, a more efficient protocol can be developed. This research evaluates how the number of nodes in a network, time between generated agents, lifetime of agents, number of agent transmissions, time between generated queries, lifetime of queries, and node transmission time affect a modified rumor routing protocol for a large-scale, wireless sensor network. Furthermore, it analyzes how the probability distribution of certain protocol parameters affects the network performance. The …


Application Of The Three Short Calibration Technique In A Low Frequency Focus Beam System, William E. Gunn Jr. Mar 2010

Application Of The Three Short Calibration Technique In A Low Frequency Focus Beam System, William E. Gunn Jr.

Theses and Dissertations

Electromagnetic material characterization is the process of determining the constitutive parameters of matter. In simple media, these parameters are permittivity and permeability. Characterization of these values is often accomplished through the use of waveguides, transmission lines, coaxial cables, and resonant cavities. Free space measurements systems are employed since they are non destructive (i.e., no sample machining is required) and broadband. Traditionally, time domain gating is utilized to mitigate systematic errors. However, an artifact of this calibration technique is band edge corruption due to data windowing. The goal of this research is to develop and apply a Three Short Calibration Technique …


Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady Mar 2010

Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady

Theses and Dissertations

Computing systems are used in virtually every aspect of our lives. Technology such as smart phones and electronically controlled subsystems in cars is becoming so commonly used that it is virtually ubiquitous. Sometimes, this technology can be exploited to perform functions that it was never intended to perform, or fail to provide information that it is supposed to protect. X-HIA was shown to be effective at identifying several circuit components in a significantly shorter time than previous identification methods. Instead of requiring a number of input/output pairings that grows factorially or exponentially as the circuit size grows, it requires only …


An Approach To Large Scale Radar-Based Modeling And Simulation, Lester C. Long Iv Mar 2010

An Approach To Large Scale Radar-Based Modeling And Simulation, Lester C. Long Iv

Theses and Dissertations

This research presents a method of aggregating, or reducing the resolution, of a commonly available Department of Defense (DoD) simulation. It addresses the differences between varying levels of resolution and scope used in the DoD’s hierarchy of models pyramid. A data representation that aggregates engagement-level simulation data to use at a lower resolution level, the mission-level, is presented and analyzed. Two formats of implementing this data representation are developed and compared: the rigid cylinder format and the expanding tables format. The rigid cylinder format provides an intuitive way to visualize the data and is used to develop the theory. The …


Characterization And Measurement Of Passive And Active Metamaterial Devices, Christopher A. Lundell Mar 2010

Characterization And Measurement Of Passive And Active Metamaterial Devices, Christopher A. Lundell

Theses and Dissertations

This document addresses two major obstacles facing metamaterial development: uncertainty in the characterization of electromagnetic field behavior in metamaterial structures and the relatively small operational bandwidth of metamaterial structures. To address the first obstacle, a new method to characterize electromagnetic field behavior in a metamaterial is presented. This new method is a bistatic radar cross section (RCS) measurement technique. RCS measurements are well-suited to measuring bulk metamaterial samples because they show frequency dependence of scattering angles and offer common postprocessing techniques that can be useful for visualizing results. To address the second obstacle, this document characterizes the effectiveness of an …


Global Navigation Satellite System Software Defined Radio, Jason M. Mcginthy Mar 2010

Global Navigation Satellite System Software Defined Radio, Jason M. Mcginthy

Theses and Dissertations

The GNSS world is quickly growing. The United States’ GPS, the European Union’s Galileo, China’s Compass, and Russia’s GLONASS systems are all developing or modernizing their signals, and there will soon be more navigation satellites in space than ever before. The goal of this research was to develop an initial capability for an AFIT GNSS software receiver. This software receiver is intended to be used for research purposes at the Advanced Navigation Technology (ANT) Center. First a GPS-only software receiver was built. It successfully acquired, tracked, and provided reasonable position estimates. Next, the receiver was successfully modified to acquire and …