Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 43

Full-Text Articles in Physical Sciences and Mathematics

Bayesian Convolutional Neural Network With Prediction Smoothing And Adversarial Class Thresholds, Noah M. Miller Mar 2022

Bayesian Convolutional Neural Network With Prediction Smoothing And Adversarial Class Thresholds, Noah M. Miller

Theses and Dissertations

Using convolutional neural networks (CNNs) for image classification for each frame in a video is a very common technique. Unfortunately, CNNs are very brittle and have a tendency to be over confident in their predictions. This can lead to what we will refer to as “flickering,” which is when the predictions between frames jump back and forth between classes. In this paper, new methods are proposed to combat these shortcomings. This paper utilizes a Bayesian CNN which allows for a distribution of outputs on each data point instead of just a point estimate. These distributions are then smoothed over multiple …


A Methodology To Identify Alternative Suitable Nosql Data Models Via Observation Of Relational Database Interactions, Paul M. Beach Sep 2020

A Methodology To Identify Alternative Suitable Nosql Data Models Via Observation Of Relational Database Interactions, Paul M. Beach

Theses and Dissertations

The effectiveness and performance of data-intensive applications are influenced by the suitability of the data models upon which they are built. The relational data model has been the de facto data model underlying most database systems since the 1970’s. However, the recent emergence of NoSQL data models have provided users with alternative ways of storing and manipulating data. Previous research has demonstrated the potential value in applying NoSQL data models in non-distributed environments. However, knowing when to apply these data models has generally required inputs from system subject matter experts to make this determination. This research, sponsored by the Air …


Relational Database Design And Multi-Objective Database Queries For Position Navigation And Timing Data, Sean A. Mochocki Mar 2020

Relational Database Design And Multi-Objective Database Queries For Position Navigation And Timing Data, Sean A. Mochocki

Theses and Dissertations

Performing flight tests is a natural part of researching cutting edge sensors and filters for sensor integration. Unfortunately, tests are expensive, and typically take many months of planning. A sensible goal would be to make previously collected data readily available to researchers for future development. The Air Force Institute of Technology (AFIT) has hundreds of data logs potentially available to aid in facilitating further research in the area of navigation. A database would provide a common location where older and newer data sets are available. Such a database must be able to store the sensor data, metadata about the sensors, …


Testing The Fault Tolerance Of A Wide Area Backup Protection System Using Spin, Kenneth James Mar 2019

Testing The Fault Tolerance Of A Wide Area Backup Protection System Using Spin, Kenneth James

Theses and Dissertations

Cyber-physical systems are increasingly prevalent in daily life. Smart grids in particular are becoming more interconnected and autonomously operated. Despite the advantages, new challenges arise in the form of defending these assets. Recent studies reveal that small-scale, coordinated cyber-attacks on only a few substations across the U.S. could result in cascading failures affecting the entire nation. In support of defending critical infrastructure, this thesis tests the fault tolerance of a backup protection system. Each transmission line in the system incorporates autonomous agents which monitor the status of the line and make decisions regarding the safety of the grid. Various malfunctions …


Evaluating Machine Learning Techniques For Smart Home Device Classification, Angelito E. Aragon Jr. Mar 2019

Evaluating Machine Learning Techniques For Smart Home Device Classification, Angelito E. Aragon Jr.

Theses and Dissertations

Smart devices in the Internet of Things (IoT) have transformed the management of personal and industrial spaces. Leveraging inexpensive computing, smart devices enable remote sensing and automated control over a diverse range of processes. Even as IoT devices provide numerous benefits, it is vital that their emerging security implications are studied. IoT device design typically focuses on cost efficiency and time to market, leading to limited built-in encryption, questionable supply chains, and poor data security. In a 2017 report, the United States Government Accountability Office recommended that the Department of Defense investigate the risks IoT devices pose to operations security, …


Imitating Human Responses Via A Dual-Process Model Approach, Matthew A. Grimm Mar 2019

Imitating Human Responses Via A Dual-Process Model Approach, Matthew A. Grimm

Theses and Dissertations

Human-autonomous system teaming is becoming more prevalent in the Air Force and in society. Often, the concept of a shared mental model is discussed as a means to enhance collaborative work arrangements between a human and an autonomous system. The idea being that when the models are aligned, the team is more productive due to an increase in trust, predictability, and apparent understanding. This research presents the Dual-Process Model using multivariate normal probability density functions (DPM-MN), which is a cognitive architecture algorithm based on the psychological dual-process theory. The dual-process theory proposes a bipartite decision-making process in people. It labels …


A Methodology For Evaluating Relational And Nosql Databases For Small-Scale Storage And Retrieval, Ryan D. Engle Sep 2018

A Methodology For Evaluating Relational And Nosql Databases For Small-Scale Storage And Retrieval, Ryan D. Engle

Theses and Dissertations

Modern systems record large quantities of electronic data capturing time-ordered events, system state information, and behavior. Subsequent analysis enables historic and current system status reporting, supports fault investigations, and may provide insight for emerging system trends. Unfortunately, the management of log data requires ever more efficient and complex storage tools to access, manipulate, and retrieve these records. Truly effective solutions also require a well-planned architecture supporting the needs of multiple stakeholders. Historically, database requirements were well-served by relational data models, however modern, non-relational databases, i.e. NoSQL, solutions, initially intended for “big data” distributed system may also provide value for smaller-scale …


The Application Of Text Mining And Data Visualization Techniques To Textual Corpus Exploration, Jeffrey R. Smith Jr. Mar 2018

The Application Of Text Mining And Data Visualization Techniques To Textual Corpus Exploration, Jeffrey R. Smith Jr.

Theses and Dissertations

Unstructured data in the digital universe is growing rapidly and shows no evidence of slowing anytime soon. With the acceleration of growth in digital data being generated and stored on the World Wide Web, the prospect of information overload is much more prevalent now than it has been in the past. As a preemptive analytic measure, organizations across many industries have begun implementing text mining techniques to analyze such large sources of unstructured data. Utilizing various text mining techniques such as n -gram analysis, document and term frequency analysis, correlation analysis, and topic modeling methodologies, this research seeks to develop …


Multi-Objective Constraint Satisfaction For Mobile Robot Area Defense, Kenneth W. Mayo Mar 2010

Multi-Objective Constraint Satisfaction For Mobile Robot Area Defense, Kenneth W. Mayo

Theses and Dissertations

In developing multi-robot cooperative systems, there are often competing objectives that need to be met. For example in automating area defense systems, multiple robots must work together to explore the entire area, and maintain consistent communications to alert the other agents and ensure trust in the system. This research presents an algorithm that tasks robots to meet the two specific goals of exploration and communication maintenance in an uncoordinated environment reducing the need for a user to pre-balance the objectives. This multi-objective problem is defined as a constraint satisfaction problem solved using the Non-dominated Sorting Genetic Algorithm II (NSGA-II). Both …


Mitigating Insider Sabotage And Espionage: A Review Of The United States Air Force's Current Posture, Erika C. Leach Mar 2009

Mitigating Insider Sabotage And Espionage: A Review Of The United States Air Force's Current Posture, Erika C. Leach

Theses and Dissertations

The security threat from malicious insiders affects all organizations. Mitigating this problem is quite difficult due to the fact that (1) there is no definitive profile for malicious insiders, (2) organizations have placed trust in these individuals, and (3) insiders have a vast knowledge of their organization’s personnel, security policies, and information systems. The purpose of this research is to analyze to what extent the United States Air Force (USAF) security policies address the insider threat problem. The policies are reviewed in terms of how well they align with best practices published by the Carnegie Mellon University Computer Emergency Readiness …


Cyber Power In The 21st Century, Joseph M. Elbaum Dec 2008

Cyber Power In The 21st Century, Joseph M. Elbaum

Theses and Dissertations

Historically, the United States Congress has acknowledged that a separate branch of military service is required to exert supremacy over each of the recognized Domains of Operation. Throughout the evolution of modern warfare, leading minds in military theory have come to the conclusion that due to fundamental differences inherent in the theory and tactics that must be employed in order to successfully wage war within a domain’s associated environment, a specialized force was needed - until now. With the recent inclusion of Cyberspace as an operational domain by the Department of Defense, the case should be made that it, too, …


Identification Of Command And Control Information Requirements For The Cyberspace Domain, Brian D. Aschenbrenner Mar 2008

Identification Of Command And Control Information Requirements For The Cyberspace Domain, Brian D. Aschenbrenner

Theses and Dissertations

The purpose of this research was to develop an information requirements analysis method that would provide the Director of Cyberspace Forces with the information required to support effective command and control of cyberspace. This research investigates the role of information in command and control, information in the traditional war fighting domains, cyberspace as a war fighting domain, and various methods of determining information requirements of organizations. This research produced an information requirements analysis method that is suitable for identifying the command and control information requirements of the Director of Cyberspace Forces.


Using Concept Maps To More Efficiently Create Intelligence Information Models, Christopher E. Coryell Mar 2007

Using Concept Maps To More Efficiently Create Intelligence Information Models, Christopher E. Coryell

Theses and Dissertations

Information models are a critical tool that enables intelligence customers to quickly and accurately comprehend U.S. intelligence agency products. The Knowledge Pre-positioning System (KPS) is the standard repository for information models at the National Air and Space Intelligence Center (NASIC). The current approach used by NASIC to build a KPS information model is laborious and costly. Intelligence analysts design an information model using a manual, butcher-paper-based process. The output of their work is then entered into KPS by either a single NASIC KPS "database modeler" or a contractor (at a cost of roughly $100K to the organization). This thesis proposes …


Multi-Dimensional Range Querying Using A Modification Of The Skip Graph, Gregory J. Brault Mar 2007

Multi-Dimensional Range Querying Using A Modification Of The Skip Graph, Gregory J. Brault

Theses and Dissertations

Skip graphs are an application layer-based distributed routing data structure that can be used in a sensor network to facilitate user queries of data collected by the sensor nodes. This research investigates the impact of a proposed modification to the skip graph proposed by Aspnes and Shah. Nodes contained in a standard skip graph are sorted by their key value into successively smaller groups based on random membership vectors computed locally at each node. The proposed modification inverts the node key and membership vector roles, where group membership is computed deterministically and node keys are computed randomly. Both skip graph …


Towards The Development Of A Defensive Cyber Damage And Mission Impact Methodology, Larry W. Fortson Jr. Mar 2007

Towards The Development Of A Defensive Cyber Damage And Mission Impact Methodology, Larry W. Fortson Jr.

Theses and Dissertations

The purpose of this research is to establish a conceptual methodological framework that will facilitate effective cyber damage and mission impact assessment and reporting following a cyber-based information incidents. Joint and service guidance requires mission impact reporting, but current efforts to implement such reporting have proven ineffective. This research seeks to understand the impediments existing in the current implementation and to propose an improved methodology. The research employed a hybrid historical analysis and case study methodology for data collection through extensive literature review, examination of existing case study research and interviews with Air Force members and civilian personnel employed as …


Bda Enhancement Methodology Using Situational Parameter Adjustments, Michael V. Carras Jr. Mar 2006

Bda Enhancement Methodology Using Situational Parameter Adjustments, Michael V. Carras Jr.

Theses and Dissertations

In the context of close ground combat, the perception of Battle Damage Assessment (BDA) is closely linked with a soldier’s engagement decisions and has significant effects on the battlefield. Perceived BDA is also one of the most complex and uncertain processes facing the soldier in live combat. As a result, the modeling and simulation community has yet to adequately model the perceived BDA process in combat models. This research effort examines the BDA process from a perception standpoint and proposes a methodology to collect the pertinent data and model this perception in the Army’s current force-on-force model, CASTFOREM. A subject …


The United States Marine Corps Data Collaboration Requirements: Retrieving And Integrating Data From Multiple Databases, Pamela J. Cole Mar 2004

The United States Marine Corps Data Collaboration Requirements: Retrieving And Integrating Data From Multiple Databases, Pamela J. Cole

Theses and Dissertations

The goal of this research is to develop an information sharing and database integration model and suggest a framework to fully satisfy the United States Marine Corps collaboration requirements as well as its information sharing and database integration needs. This research is exploratory; it focuses on only one initiative: the IT-21 initiative. The IT-21 initiative dictates The Technology for the United States Navy and Marine Corps, 2000-2035: Becoming a 21st Century Force. The IT-21 initiative states that Navy and Marine Corps information infrastructure will be based largely on commercial systems and services, and the Department of the Navy must ensure …


An Exploratory Analysis Of Factors Affecting Participation In Air Force Knowledge Now Communities Of Practice, David C. Fitzgerald Mar 2004

An Exploratory Analysis Of Factors Affecting Participation In Air Force Knowledge Now Communities Of Practice, David C. Fitzgerald

Theses and Dissertations

As the AF continues to lose its knowledge base through retirements and downsizing, the need to get maximum use from the remaining knowledge base becomes increasingly important. In their efforts to help the Department of Defense and the Air Force Chief Information Officer (AFCIO) meet their knowledge management goals, Air Force Material Command (AFMC) has been working to implement the use of communities of practice. A primary goal of AFMC/DRW , the AF Knowledge Now program office, and the office of the AFCIO is to increase effectiveness and participation within communities of practice. The goal of this research is to …


An Exploration Of Cultural Factors Affecting Use Of Communities Of Practice, Peter L. Hinrichsen Mar 2004

An Exploration Of Cultural Factors Affecting Use Of Communities Of Practice, Peter L. Hinrichsen

Theses and Dissertations

On-line communities of practice are potentially powerful social learning networks that can improve organizational performance. Unfortunately, administrators of on-line communities of practice report that community members do not take full advantage of this potential. This study used Shaw and Tuggle's (2003) factors of knowledge management (KM) culture affecting organizational acceptance of a knowledge management initiative to explore this issue. It was hypothesized that respondents whose communities of practice possessed higher average community use per member would rate KM culture variables higher than respondents whose communities possessed a lower average community use. An analysis of survey data collected from Air Force …


Exploring Content Management Issues In Air Force On-Line Communities Of Practice: A Multiple Case Study Approach, Jaime A. Rodriguez Mar 2004

Exploring Content Management Issues In Air Force On-Line Communities Of Practice: A Multiple Case Study Approach, Jaime A. Rodriguez

Theses and Dissertations

The practice of content management attempts regardless of platform to ensure that pertinent information is current, relevant, and presented in a usable manner. The Air Force Communities of Practice (CoPs) are hosted by AFMC/DRW, The purpose of these CoPs is to facilitate and promote an environment of capturing and sharing knowledge among members of a particular field task or common practice. As the host for these CoPs AFMC/DRW desires to increase CoP participation efficiency and effectiveness. Addressing existing or potential content management issues will help do so. This multiple-case study research observed and interviewed managers and members of eight active …


Investigation Of Geobase Implementation Issues: Case Study Of Information Resource Management, Mario L. Oliver Mar 2004

Investigation Of Geobase Implementation Issues: Case Study Of Information Resource Management, Mario L. Oliver

Theses and Dissertations

Billions of dollars have been wasted on failed information system (IS) projects over the last decade in the private and public sectors. More specifically, the tri-service environment of the U.S. military has not implemented a single successful geospatial IS (GIS). The lack of a service-wide insertion process for GIS was cited as the most significant cause for military GIS failures. GeoBase represents the USAF's most recent GIS implementation. The GeoBase program focuses on Information Resource Management (IRM) and cultural issues. The GeoBase Sustainment Model (GSM), anecdotally developed by GeoBase leadership to reflect implementation issues and the IRM practices of the …


Swarm Based Implementation Of A Virtual Distributed Database System In A Sensor Network, Wen C. Lee Mar 2004

Swarm Based Implementation Of A Virtual Distributed Database System In A Sensor Network, Wen C. Lee

Theses and Dissertations

The deployment of unmanned aerial vehicles (UAVs) in recent military operations has had success in carrying out surveillance and combat missions in sensitive areas. An area of intense research on UAVs has been on controlling a group of small-sized UAVs to carry out reconnaissance missions normally undertaken by large UAVs such as Predator or Global Hawk. A control strategy for coordinating the UAV movements of such a group of UAVs adopts the bio-inspired swarm model to produce autonomous group behavior. This research proposes establishing a distributed database system on a group of swarming UAVs, providing for data storage during a …


Automated Agent Ontology Creation For Distributed Databases, Austin A. Bartolo Mar 2004

Automated Agent Ontology Creation For Distributed Databases, Austin A. Bartolo

Theses and Dissertations

In distributed database environments, the combination of resources from multiple sources requiring different interfaces is a universal problem. The current solution requires an expert to generate an ontology, or mapping, which contains all interconnections between the various fields in the databases. This research proposes the application of software agents in automating the ontology creation for distributed database environments with minimal communication. The automatic creation of a domain ontology alleviates the need for experts to manually map one database to other databases in the environment. Using several combined comparison methods, these agents communicate and negotiate similarities between information sources and retain …


Application Of Information Retrieval Techniques To Heterogeneous Databases In The Virtual Distributed Laboratory, Rodney D. Lykins Mar 2002

Application Of Information Retrieval Techniques To Heterogeneous Databases In The Virtual Distributed Laboratory, Rodney D. Lykins

Theses and Dissertations

The Department of Defense (DoD) maintains thousands of Synthetic Aperture Radar (SAR), Infrared (IR), Hyper-Spectral intelligence imagery and Electro-Optical (EO) target signature data. These images are essential to evaluating and testing individual algorithm methodologies and development techniques within the Automatic Target Recognition (ATR) community. The Air Force Research Laboratory Sensors Directorate (AFRL/SN) has proposed the Virtual Distributed Laboratory (VDL) to maintain a central collection of the associated imagery metadata and a query mechanism to retrieve the desired imagery. All imagery metadata is stored in relational database format for access from agencies throughout the federal government and large civilian universities. Each …


Using A Distributed Object-Oriented Database Management System In Support Of A High-Speed Network Intrusion Detection System Data Repository, Phillip W. Polk Mar 2001

Using A Distributed Object-Oriented Database Management System In Support Of A High-Speed Network Intrusion Detection System Data Repository, Phillip W. Polk

Theses and Dissertations

The Air Force has multiple initiatives to develop data repositories for high-speed network intrusion detection systems (IDS). All of the developed systems utilize a relational database management system (RDBMS) as the primary data storage mechanism. The purpose of this thesis is to replace the RDBMS in one such system developed by AFRL, the Automated Intrusion Detection Environment (AIDE), with a distributed object-oriented database management system (DOODBMS) and observe a number of areas: its performance against the RDBMS in terms of IDS event insertion and retrieval, the distributed aspects of the new system, and the resulting object-oriented architecture. The resulting system, …


Enhancing A Virtual Distributed Library User Interface Via Server-Side User Profile Caching, Jason T. Ward Mar 2000

Enhancing A Virtual Distributed Library User Interface Via Server-Side User Profile Caching, Jason T. Ward

Theses and Dissertations

Various Department of Defense (DoD) agencies archive terabytes of intelligence imagery and electrooptical signature data. The Air Force Research Laboratory, Sensors Directorate (AFRL/SN), is tasked with creating and managing a virtual distributed library that facilitates secure, detailed queries across these distributed holdings using the internally developed Advanced Query Tool (AQT). In this research, a methodology is proposed to utilize user profiling techniques to augment a digital library. As part of this methodology, product-oriented usability analysis metrics are introduced that quantitatively verify the usability of an interface. The methodology is applied to the AFRL/SN's Virtual Distributed Laboratory AQT and subsequently analyzed …


Data Warehouse Techniques To Support Global On-Demand Weather Forecast Metrics, Meriellen C. Joga Mar 2000

Data Warehouse Techniques To Support Global On-Demand Weather Forecast Metrics, Meriellen C. Joga

Theses and Dissertations

Air Force pilots and other operators make crucial mission planning decisions based on weather forecasts; therefore, the ability to forecast the weather accurately is a critical issue to Air Force Weather (AFW) and its customers. The goal of this research is to provide Air Force Weather with a methodology to automate statistical data analysis for the purpose of providing on-demand metrics. A data warehousing methodology is developed and applied to the weather metrics problem in order to present an option that will facilitate on-demand metrics. On-line analytical processing (OLAP) and data mining solutions are also discussed.


Analysis Of N-Tier Architecture Applied To Distributed-Database Systems, Alexandre G. Valente Jun 1999

Analysis Of N-Tier Architecture Applied To Distributed-Database Systems, Alexandre G. Valente

Theses and Dissertations

N-tier architecture has been more commonly used as a methodology for developing large database applications. This work evaluates the use of this architecture instead of the classical Client/Server architecture in developing corporate applications based on distributed databases. The comparison between architectures is performed using applications that execute transactions similar to those defined in the Transaction Process Council Type C benchmark (TPC-C). The environment used for development and testing was the AFIT Bimodal Cluster (ABC); a heterogeneous cluster of PCs, running Microsoft Windows NT 4.0 OS. The comparative experimental analysis demonstrated that the N-tier architecture allows more efficient bandwidth utilization between …


Methodology For Integrating The Scenario Databases Of Simulation Systems, Emilia M. Colonese Jun 1999

Methodology For Integrating The Scenario Databases Of Simulation Systems, Emilia M. Colonese

Theses and Dissertations

The use of many different simulation systems by the United States Department of Defense has resulted in many different scenario data representations contained in heterogeneous databases. These heterogeneous databases all represent the same data concept, but have different semantics due to intrinsic variations among the data models. In this research, I describe a unified scenario database to allow interoperability and reuse of the scenario data components while avoiding the problems of data redundancy. Using the object oriented approach, the data and schema of the scenario databases, represented in an object oriented model, are integrated into a global database also represented …


Multiobjective Evolutionary Algorithms: Classifications, Analyses, And New Innovations, David A. Van Veldhuizen Jun 1999

Multiobjective Evolutionary Algorithms: Classifications, Analyses, And New Innovations, David A. Van Veldhuizen

Theses and Dissertations

This research organizes, presents, and analyzes contemporary Multiobjective Evolutionary Algorithm (MOEA) research and associated Multiobjective Optimization Problems (MOPs). Using a consistent MOEA terminology and notation, each cited MOEAs' key factors are presented in tabular form for ease of MOEA identification and selection. A detailed quantitative and qualitative MOEA analysis is presented, providing a basis for conclusions about various MOEA-related issues. The traditional notion of building blocks is extended to the MOP domain in an effort to develop more effective and efficient MOEAs. Additionally, the MOEA community's limited test suites contain various functions whose origins and rationale for use are often …