Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Air Force Institute of Technology

2011

Other Electrical and Computer Engineering

Keyword

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Integrated Approach To Free Space Optical Communications In Strong Turbulence, Jason A. Tellez Sep 2011

Integrated Approach To Free Space Optical Communications In Strong Turbulence, Jason A. Tellez

Theses and Dissertations

The propagation of a free space optical communication signal through atmospheric turbulence experiences random fluctuations in intensity, including signal fades which negatively impact the communications link performance. This research develops an analytical probability density function (PDF) to model the best case scenario of using multiple independent beams to reduce the intensity fluctuations. The PDF was further developed to account for partially correlated beams, such as would be experienced by beams having finite separation. The PDF was validated with results obtained from digital simulations as well as lab experiments. The research showed that as the number of transmitted beams increases the …


Performance Analysis And Optimization Of The Winnow Secret Key Reconciliation Protocol, Kevin C. Lustic Jun 2011

Performance Analysis And Optimization Of The Winnow Secret Key Reconciliation Protocol, Kevin C. Lustic

Theses and Dissertations

Currently, private communications in public and government sectors rely on methods of cryptographic key distribution that will likely be rendered obsolete the moment a full-scale quantum computer is realized, or efficient classical methods of factoring are discovered. There are alternative methods for distributing secret key material in a post-quantum era. One example of a system capable of securely distributing cryptographic key material, known as Quantum Key Distribution (QKD), is secure against quantum factorization techniques as its security rests on generally accepted laws of quantum physics. QKD protocols typically include a phase called Error Reconciliation, a clear-text classical-channel discussion between legitimate …


Software And Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert Mar 2011

Software And Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert

Theses and Dissertations

Side Channel Analysis (SCA) is a method by which an adversary can gather information about a processor by examining the activity being done on a microchip though the environment surrounding the chip. Side Channel Analysis attacks use SCA to attack a microcontroller when it is processing cryptographic code, and can allow an attacker to gain secret information, like a crypto-algorithm's key. The purpose of this thesis is to test proposed dynamic hardware methods to increase the hardware security of a microprocessor such that the software code being run on the microprocessor can be made more secure without having to change …


Effects Of Cyclic Prefix Jamming Versus Noise Jamming In Ofdm Signals, Amber L. Scott Mar 2011

Effects Of Cyclic Prefix Jamming Versus Noise Jamming In Ofdm Signals, Amber L. Scott

Theses and Dissertations

Signal jamming of an orthogonal frequency-division multiplexing (OFDM) signal is simulated in MATLAB. Two different means of jamming are used to see, which is a more efficient way to disrupt a signal using the same signal power. The first way is a basic additive white Gaussian noise (AWGN) jammer that equally jams the entire signal. The second way is an AWGN jammer that targets only the cyclic prefix (CP) of the signal. These two methods of jamming are simulated using different channel models and unknowns to get varying results. The three channel models used in the simulations are the no …


Characteristics Of A High Intensity, Pulsed, Potassium Vapor Laser In A Heat Pipe, Edward J. Hurd Mar 2011

Characteristics Of A High Intensity, Pulsed, Potassium Vapor Laser In A Heat Pipe, Edward J. Hurd

Theses and Dissertations

This thesis research paper presents the results of experiments using an optically pumped, pulsed potassium vapor laser in a heat pipe. The absorption on the potassium D2 line, output laser characteristics, and Raman scattering in potassium vapor are discussed. The spectral full width at half maximum (FWHM) of the D2 absorption line was much greater than predicted values for pressure broadening due to the high number density of potassium atoms and the long path length. At 320°C and 0 torr of helium, the FWHM was 765 GHz. At 100 torr it was 968 GHz. At 200 torr it …


Blind Deconvolution Method Of Image Deblurring Using Convergence Of Variance, Quentin D. Macmanus Mar 2011

Blind Deconvolution Method Of Image Deblurring Using Convergence Of Variance, Quentin D. Macmanus

Theses and Dissertations

Images are used for both aerial and space imagery applications, including target detection and tracking. The current problem concerning objects in geosynchronous orbit is that they are dim and hard to resolve because of their distance. This work will further the combined effort of AFIT and AFRL to provide enhanced space situational awareness (SSA) and space surveillance. SSA is critical in a time when many countries possess the technology to put satellites into orbit. Enhanced imaging technology improves the Air Force's ability to see if foreign satellites or other space hardware are operating in the vicinity of our own assets …