Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Air Force Institute of Technology

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 149

Full-Text Articles in Engineering

Network Security Toolkit Including Heuristic Solutions For Trust System Placement And Network Obfuscation, Gabriel H. Greve Dec 2010

Network Security Toolkit Including Heuristic Solutions For Trust System Placement And Network Obfuscation, Gabriel H. Greve

Theses and Dissertations

For Part I, a supervisory control and data acquisition (SCADA) network consists of a group stations and substations in a portion of the power grid. The use of Internet technology in SCADA communications as well as other factors has caused vulnerabilities. One idea to help mitigate this risk is to strategically place trust nodes to compartmentalize and secure the SCADA systems without disturbing its finely honed processes. The trust nodes combine firewall and intrusion detection technology to provide more secure communication. An optimal solution to this problem has already been developed using a mixed-integer linear programming model. Because the problem …


Flow Control Application On A Submerged Inlet Characterized By Three-Component Ldv, Tina H. Reynolds Dec 2010

Flow Control Application On A Submerged Inlet Characterized By Three-Component Ldv, Tina H. Reynolds

Theses and Dissertations

A submerged inlet investigation, using flow control in the form of discrete blowing, examined proximity and jet directionality to improve compressor face uniformity. The flow control locations were at the head of the ramp and part way down the ramp, providing four configurations under examination. Laser Doppler velocimetry (LDV)measurements at the throat determined the effect of the flow control based on the statistical velocity measurements. Blowing at closer proximity to the throat and targeting the largest velocity deficit region provided the best results. The airspeed and inlet velocity simulated takeoff and landing conditions; velocities ranged from Mach 0.1-0.3 at the …


Navigation With Limited Prior Information Using Time Difference Of Arrival Measurements From Signals Of Opportunity, Christopher M. Rondeau Dec 2010

Navigation With Limited Prior Information Using Time Difference Of Arrival Measurements From Signals Of Opportunity, Christopher M. Rondeau

Theses and Dissertations

The Global Positioning System (GPS) provides world-wide availability to high-accuracy navigation and positioning information. However, the threats to GPS are increasing, and many limitations of GPS are being encountered. Simultaneously, systems previously considered as viable backups or supplements to GPS are being shut down. This creates the need for system alternatives. Navigation using signals of opportunity (SoOP) exploits any signal that is available in a given area, regardless of whether or not the original intent of the signal was for navigation. Common techniques to compute a position estimate using SoOP include received signal strength, angle of arrival, time of arrival, …


Fatigue Behavior Of A Sic/Sic Composite At 1000⁰C In Air And In Steam, Michael W. Knauf Dec 2010

Fatigue Behavior Of A Sic/Sic Composite At 1000⁰C In Air And In Steam, Michael W. Knauf

Theses and Dissertations

Tension-tension fatigue behavior of a prototype Silicon Carbide/Silicon Carbide (SiC/SiC) ceramic matrix composite (CMC) material was investigated at 1000°C in laboratory air and in steam environments. The material consists of a SiC matrix reinforced with CG NICALON™ fibers woven in an eight harness satin weave (8HSW) and coated with a BN/SiC dual-layer interphase. The composite was manufactured by a Polymer Infiltration and Pyrolysis (PIP) process. A seal coat of SiC and elemental boron was applied to the test specimens after machining. The tensile stress-strain behavior was investigated and the tensile properties were measured at 1000°C. Tension-tension fatigue behavior was studied …


Performance Characterization Of A Three-Axis Hall Effect Thruster, Spencer E. Temkin Dec 2010

Performance Characterization Of A Three-Axis Hall Effect Thruster, Spencer E. Temkin

Theses and Dissertations

No abstract provided.


A Space Acquisition Leading Indicator Based On System Interoperation Maturity, Jason T. Shibata Dec 2010

A Space Acquisition Leading Indicator Based On System Interoperation Maturity, Jason T. Shibata

Theses and Dissertations

The Department of Defense‘s space acquisition enterprise has experienced numerous challenges since the advent of space power. Space borne capabilities are needed more than ever, but space acquisition frequently fails to meet its goals. The decades of space acquisition experience form a rich history that can be used to build a leading indicator of success to enable effective program execution. First, the space acquisition areas of greatest concern were determined to be cost, schedule and requirements. These areas are considered as systems composed of the people, processes and products that execute the program. Second, the vital interoperation characteristics, or attributes …


Conceptual Design And Analysis Of Service Oriented Architecture (Soa) For Command And Control Of Space Assets, Eric B. Snyder Dec 2010

Conceptual Design And Analysis Of Service Oriented Architecture (Soa) For Command And Control Of Space Assets, Eric B. Snyder

Theses and Dissertations

The mission-unique model that has dominated the DoD satellite Command and Control community is costly and inefficient. It requires repeatedly “reinventing” established common C2 components for each program, unnecessarily inflating budgets and delivery schedules. The effective utilization of standards is scarce, and proprietary, non-open solutions are commonplace. IT professionals have trumpeted Service Oriented Architectures (SOAs) as the solution to large enterprise situations where multiple, functionally redundant but non-compatible information systems create large recurring development, test, maintenance, and tech refresh costs. This thesis describes the current state of Service Oriented Architectures as related to satellite operations and presents a functional analysis …


A Linear Combination Of Heuristics Approach To Spatial Sampling Hyperspectral Data For Target Tracking, Barry R. Secrest Dec 2010

A Linear Combination Of Heuristics Approach To Spatial Sampling Hyperspectral Data For Target Tracking, Barry R. Secrest

Theses and Dissertations

Persistent surveillance of the battlespace results in better battlespace awareness which aids in obtaining air superiority, winning battles, and saving friendly lives. Although hyperspectral imagery (HSI) data has proven useful for discriminating targets, it presents many challenges as a useful tool in persistent surveillance. A new sensor under development has the potential of overcoming these challenges and transforming our persistent surveillance capability by providing HSI data for a limited number of pixels and grayscale video for the remainder. The challenge of exploiting this new sensor is determining where the HSI data in the sensor's field of view will be the …


Effects Of Prior Aging At 274⁰C In Argon On Inelastic Deformation Behavior Of Pmr-15 Polymer At 288⁰C: Experiment And Modeling, Joseph A. Wahlquist Dec 2010

Effects Of Prior Aging At 274⁰C In Argon On Inelastic Deformation Behavior Of Pmr-15 Polymer At 288⁰C: Experiment And Modeling, Joseph A. Wahlquist

Theses and Dissertations

No abstract provided.


Measurement And Modeling Of Infrared Nonlinear Absorption Coefficients And Laser-Induced Damage Thresholds In Ge And Gasb, Torrey J. Wagner, Matthew J. Bohn, Ronald A. Coutu Jr., L. P. Gonzales, J. M. Murray, K. L. Schepler, S. Guha Oct 2010

Measurement And Modeling Of Infrared Nonlinear Absorption Coefficients And Laser-Induced Damage Thresholds In Ge And Gasb, Torrey J. Wagner, Matthew J. Bohn, Ronald A. Coutu Jr., L. P. Gonzales, J. M. Murray, K. L. Schepler, S. Guha

Faculty Publications

Using a simultaneous fitting technique to extract nonlinear absorption coefficients from data at two pulse widths, we measure two-photon and free-carrier absorption coefficients for Ge and GaSb at 2.05 and 2.5 µm for the first time, to our knowledge. Results agreed well with published theory. Single-shot damage thresholds were also measured at 2.5 µm and agreed well with modeled thresholds using experimentally determined parameters including nonlinear absorption coefficients and temperature dependent linear absorption. The damage threshold for a single-layer Al2O3 anti-reflective coating on Ge was 55% or 35% lower than the uncoated threshold for picosecond or nanosecond …


Orbital Tori Construction Using Trajectory Following Spectral Methods, Ralph E. Bordner Iii Sep 2010

Orbital Tori Construction Using Trajectory Following Spectral Methods, Ralph E. Bordner Iii

Theses and Dissertations

By assuming the motion of a satellite about the earth’s geopotential mimics the known Kolmogorov-Arnold-Moser (KAM) solution of a lightly perturbed integrable Hamiltonian system, this research focused on applying trajectory following spectral methods to estimate orbital tori from sampled orbital data. From an estimated basis frequency set, orbital data was decomposed into multi-periodic Fourier series, essentially compressing ephemerides for long-term use. Real-world Global Positioning System (GPS) orbital tracks were decomposed and reconstructed with error from as low as few kilometers per coordinate axis over a 10-week span to tens of kilometers per coordinate axis over the same time period, depending …


Knowledge-Based Decision Support In Department Of Defense Acquisitions, Clifton L. Hicks Sep 2010

Knowledge-Based Decision Support In Department Of Defense Acquisitions, Clifton L. Hicks

Theses and Dissertations

Despite numerous reform efforts over the past 30 years, acquisition programs in the Department of Defense (DoD) continue to experience cost overruns and schedule delays. One contributing factor is the decision-making process used by defense officials. The General Accounting Office (GAO) has stated that ‘poor program outcomes are the lack of widespread adoption of a knowledge-based acquisition process within DoD despite polices that support such a process. A knowledge-based business case at the outset of each program would alleviate overpromising on cost, schedule, and performance and would empower program managers.’ Effective decision-making for acquisition programs is very important. It not …


Applying Image Matching To Video Analysis, Adam J. Behring Sep 2010

Applying Image Matching To Video Analysis, Adam J. Behring

Theses and Dissertations

Dealing with the volume of multimedia collected on a daily basis for intelligence gathering and digital forensics investigations requires significant manual analysis. A component of this problem is that a video may be reanalyzed that has already been analyzed. Identifying duplicate video sequences is difficult due to differences in videos of varying quality and size. This research uses a kd-tree structure to increase image matching speed. Keypoints are generated and added to a kd-tree of a large dimensionality (128 dimensions). All of the keypoints for the set of images are used to construct a global kd-tree, which allows nearest neighbor …


Determining The Index Of Refraction Of An Unknown Object Using Passive Polarimetric Imagery Degraded By Atmospheric Turbulence, Milo W. Hyde Iv Sep 2010

Determining The Index Of Refraction Of An Unknown Object Using Passive Polarimetric Imagery Degraded By Atmospheric Turbulence, Milo W. Hyde Iv

Theses and Dissertations

In this research, an algorithm is developed to estimate the index of refraction of an unknown object using passive polarimetric images degraded by atmospheric turbulence. The algorithm uses a variant of the maximum-likelihood blind-deconvolution algorithm developed by LeMaster and Cain to recover the true object (i.e., the first Stokes parameter), the degree of linear polarization, and the polarimetric-image point spread functions. Nonlinear least squares is then used to find the value of the complex index of refraction which best fits the theoretical degree of linear polarization, derived using a polarimetric bidirectional reflectance distribution function, to the turbulence-corrected degree of linear …


Exploring The Effects Of International Traffic In Arms Regulations Restrictions On Innovation In The U.S. Space Industrial Base, Kalliroi L. Landry Sep 2010

Exploring The Effects Of International Traffic In Arms Regulations Restrictions On Innovation In The U.S. Space Industrial Base, Kalliroi L. Landry

Theses and Dissertations

The International Traffic in Arms Regulations (ITAR) are used to protect United States (U.S.) military technologies. However, changes to ITAR export controls regarding space technologies have had a major impact to the U.S. space industry. The literature mentions a concern for the health of lower-tier firms because they are a major source of innovation, but there is no additional information considering the effects of ITAR on space innovation at those lower tiers. The purpose of this thesis was to explore the implications of continuing the current ITAR restrictions with regard to innovation in the space industry. This research used a …


Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard Sep 2010

Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard

Theses and Dissertations

As malware has evolved over the years, it has gone from harmless programs that copy themselves into other executables to modern day botnets that perform bank fraud and identity theft. Modern malware often has a need to communicate back to the author, or other machines that are also infected. Several techniques for transmitting this data covertly have been developed over the years which vary significantly in their level of sophistication. This research creates a new covert channel technique for stealing information from a network by piggybacking on user-generated network traffic. Specifically, steganography drop boxes and passive covert channels are merged …


Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey Sep 2010

Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey

Theses and Dissertations

This research effort examines the theory, application, and results for a Reputation-based Internet Protocol Security (RIPSec) framework that provides security for an ad-hoc network operating in a hostile environment. In RIPSec, protection from external threats is provided in the form of encrypted communication links and encryption-wrapped nodes while internal threats are mitigated by behavior grading that assigns reputations to nodes based on their demonstrated participation in the routing process. Network availability is provided by behavior grading and round-robin multipath routing. If a node behaves faithfully, it earns a positive reputation over time. If a node misbehaves (for any number of …


Improving Range Estimation Of A 3d Flash Ladar Via Blind Deconvolution, Jason R. Mcmahon Sep 2010

Improving Range Estimation Of A 3d Flash Ladar Via Blind Deconvolution, Jason R. Mcmahon

Theses and Dissertations

The purpose of this research effort is to improve and characterize range estimation in a three-dimensional FLASH LAser Detection And Ranging (3D FLASH LADAR) by investigating spatial dimension blurring effects. The myriad of emerging applications for 3D FLASH LADAR both as primary and supplemental sensor necessitate superior performance including accurate range estimates. Along with range information, this sensor also provides an imaging or laser vision capability. Consequently, accurate range estimates would also greatly aid in image quality of a target or remote scene under interrogation. Unlike previous efforts, this research accounts for pixel coupling by defining the range image mathematical …


Providing A Theoretical Basis For Nanotoxicity Risk Analysis Departing From Traditional Physiologically-Based Pharmacokinetic (Pbpk) Modeling, Dirk P. Yamamoto Sep 2010

Providing A Theoretical Basis For Nanotoxicity Risk Analysis Departing From Traditional Physiologically-Based Pharmacokinetic (Pbpk) Modeling, Dirk P. Yamamoto

Theses and Dissertations

The same novel properties of engineered nanoparticles that make them attractive may also present unique exposure risks. But, the traditional physiologically-based pharmacokinetic (PBPK) modeling assumption of instantaneous equilibration likely does not apply to nanoparticles. This simulation-based research begins with development of a model that includes diffusion, active transport, and carrier mediated transport. An eigenvalue analysis methodology was developed to examine model behavior to focus future research. Simulations using the physicochemical properties of size, shape, surface coating, and surface charge were performed and an equation was determined which estimates area under the curve for arterial blood concentration, which is a surrogate …


Satellite Capabilities Mapping - Utilizing Small Satellites, David A. Grigsby Sep 2010

Satellite Capabilities Mapping - Utilizing Small Satellites, David A. Grigsby

Theses and Dissertations

The cost and schedule advantages small satellites have over larger legacy systems have been studied, but there has been very little experimentation performed to determine whether small satellites can actually deliver the capabilities of larger spacecraft. To date, a desired operational capability has not been fully realized by a scalable satellite design. Advances in sensor technology have led to significant reductions in size, weight, and power (SWaP) presenting an opportunity to exploit the evolution of space operations by using small satellites to perform specific missions. This paper describes a methodology that maps a specific set of large space vehicle capabilities …


Improving The Quality Of Service And Security Of Military Networks With A Network Tasking Order Process, Matthew D. Compton Sep 2010

Improving The Quality Of Service And Security Of Military Networks With A Network Tasking Order Process, Matthew D. Compton

Theses and Dissertations

This research presents a Network Tasking Order process that collects mission plans, network capabilities, and historical records to build a Network Tasking Order (NTO). The NTO document directs the form and usage of the network, much like an Air Tasking Order (ATO) directs the usage of air power. The NTO process is fleshed out with the content and format of the NTO given herein for the first time. Tools such as topology control algorithms are then shown through simulation to improve the quality of service of the network by finding favorable ways to connect the assets identified during the NTO …


The Electronic Structure And Secondary Pyroelectric Properties Of Lithium Tetraborate, Volodymyr T. Adamiv, Yaroslav V. Burak, David J. Wooten, John W. Mcclory, James C. Petrosky, Ihor Ketsman, Ya B. Losovyj, Peter A. Dowben, Jie Xiao Sep 2010

The Electronic Structure And Secondary Pyroelectric Properties Of Lithium Tetraborate, Volodymyr T. Adamiv, Yaroslav V. Burak, David J. Wooten, John W. Mcclory, James C. Petrosky, Ihor Ketsman, Ya B. Losovyj, Peter A. Dowben, Jie Xiao

Faculty Publications

We review the pyroelectric properties and electronic structure of Li2B4O7(110) and Li2B4O7(100) surfaces. There is evidence for a pyroelectric current along the [110] direction of stoichiometric Li2B4O7 so that the pyroelectric coefficient is nonzero but roughly 103 smaller than along the [001] direction of spontaneous polarization. Abrupt decreases in the pyroelectric coefficient along the [110] direction can be correlated with anomalies in the elastic stiffness contributing to the concept that the pyroelectric coefficient is not simply a vector but has qualities of …


All Solid-State Mid-Ir Laser Development, Nonlinear Absorption Investigation And Laser-Induced Damage Study, Torrey J. Wagner Sep 2010

All Solid-State Mid-Ir Laser Development, Nonlinear Absorption Investigation And Laser-Induced Damage Study, Torrey J. Wagner

Theses and Dissertations

In this research, nonlinear optical absorption coefficients and laser-induced damage thresholds are measured in Ge and GaSb, which are materials that are used in IR detectors. Using a simultaneous fitting technique to extract nonlinear absorption coefficients from data at two pulse widths, two-photon and free-carrier absorption coefficients are measured in Ge and GaSb at 2.05 and 2.5 μm for the first time. At these wavelengths, nonlinear absorption is the primary damage mechanism, and damage thresholds at picosecond and nanosecond pulse widths were measured and agreed well with modeled thresholds using experimentally measured parameters. The damage threshold for a single-layer Al …


International Space Station Systems Engineering Case Study, Air Force Center For Systems Engineering, Bill Stockman, Joe Boyle, John Bacon Aug 2010

International Space Station Systems Engineering Case Study, Air Force Center For Systems Engineering, Bill Stockman, Joe Boyle, John Bacon

AFIT Documents

This case study on the International Space Station considers what many believe to have been the ultimate international engineering project in history. The initial plans involved the direct participation of 16 nations, 88 launches and over 160 spacewalks-more space activities than NASA had accomplished prior to the 1993 International Space Station decision. Probably more important was the significant leap in System Engineering (SE) execution that would be required to build and operate a multi-national space station. In a short period of time, NASA and its partners had to work out how to integrate culturally different SE approaches, designs, languages and …


Analytical Solutions For Efficient Interpretation Of Single-Well Push-Pull Tracer Tests, Junqi Huang, John A. Christ, Mark N. Goltz Aug 2010

Analytical Solutions For Efficient Interpretation Of Single-Well Push-Pull Tracer Tests, Junqi Huang, John A. Christ, Mark N. Goltz

Faculty Publications

Single-well push-pull tracer tests have been used to characterize the extent, fate, and transport of subsurface contamination. Analytical solutions provide one alternative for interpreting test results. In this work, an exact analytical solution to two-dimensional equations describing the governing processes acting on a dissolved compound during a modified push-pull test (advection, longitudinal and transverse dispersion, first-order decay, and rate-limited sorption/partitioning in steady, divergent, and convergent flow fields) is developed. The coupling of this solution with inverse modeling to estimate aquifer parameters provides an efficient methodology for subsurface characterization. Synthetic data for single-well push-pull tests are employed to demonstrate the utility …


Mission Assurance: A Review Of Continuity Of Operations Guidance For Application To Cyber Incident Mission Impact Assessment (Cimia), Brian L. Hale Jun 2010

Mission Assurance: A Review Of Continuity Of Operations Guidance For Application To Cyber Incident Mission Impact Assessment (Cimia), Brian L. Hale

Theses and Dissertations

Military organizations have embedded information technology (IT) into their core mission processes as a means to increase operational efficiency, improve decision-making quality, and shorten the sensor-to-shooter cycle. This IT-to-mission dependence can place the organizational mission at risk when an information incident (e.g., the loss or manipulation of a critical information resource) occurs. Non-military organizations typically address this type of IT risk through an introspective, enterprise-wide focused risk management program that continuously identifies, prioritizes, and documents risks so an economical set of control measures (e.g., people, processes, technology) can be selected to mitigate the risks to an acceptable level. The explicit …


Deterministic, Efficient Variation Of Circuit Components To Improve Resistance To Reverse Engineering, Daniel F. Koranek Jun 2010

Deterministic, Efficient Variation Of Circuit Components To Improve Resistance To Reverse Engineering, Daniel F. Koranek

Theses and Dissertations

This research proposes two alternative methods for generating semantically equivalent circuit variants which leave the circuit's internal structure pseudo-randomly determined. Component fusion deterministically selects subcircuits using a component identification algorithm and replaces them using a deterministic algorithm that generates canonical logic forms. Component encryption seeks to alter the semantics of individual circuit components using an encoding function, but preserves the overall circuit semantics by decoding signal values later in the circuit. Experiments were conducted to examine the performance of component fusion and component encryption against representative trials of subcircuit selection-and-replacement and Boundary Blurring, two previously defined methods for circuit obfuscation. …


Architectural Considerations For Single Operator Management Of Multiple Unmanned Aerial Vehicles, Gabriel T. Bugajski Jun 2010

Architectural Considerations For Single Operator Management Of Multiple Unmanned Aerial Vehicles, Gabriel T. Bugajski

Theses and Dissertations

Recently, small Unmanned Aircraft Systems (UAS) have become ubiquitous in military battlefield operations due to their intelligence collection capabilities. However, these unmanned systems consistently demonstrate limitations and shortfalls with respect to size, weight, range, line of sight and information management. The United States Air Force Unmanned Aircraft Systems Flight Plan 2009-2047 describes an action plan for improved UAS employment which calls out single operator, multi-vehicle mission configurations. This thesis analyzes the information architecture using future concepts of operations, such as biologically-inspired flocking mechanisms. The analysis and empirical results present insight into the engineering of single-operator multiple-vehicle architectures.


Attaining Realistic Simulations Of Mobile Ad-Hoc Networks, Derek J. Huber Jun 2010

Attaining Realistic Simulations Of Mobile Ad-Hoc Networks, Derek J. Huber

Theses and Dissertations

Mobile Ad-hoc Networks (MANET) are comprised of wireless systems that communicate without the assistance of centrally managed routers or base stations. MANET research and development has increased due to computing technologies offering smaller, faster, smarter, and more power efficient platforms to operate on. Largely the testing and evaluation of new and existing MANET protocols has resided in simulation environments. This is due in part to the complexities and expenses incurred when conducting real world tests. Many researchers have come to recognize that these current simulations tend to assume away critical components of the MANET domain. These assumptions are made either …


A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator, Justin M. Myers Jun 2010

A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator, Justin M. Myers

Theses and Dissertations

Log event correlation is an effective means of detecting system faults and security breaches encountered in information technology environments. Centralized, database-driven log event correlation is common, but suffers from flaws such as high network bandwidth utilization, significant requirements for system resources, and difficulty in detecting certain suspicious behaviors. This research presents a distributed event correlation system which performs security event detection, and compares it with a centralized alternative. The comparison measures the value in distributed event correlation by considering network bandwidth utilization, detection capability and database query efficiency, as well as through the implementation of remote configuration scripts and correlation …