Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Physical Sciences and Mathematics

Parallel Fast Multipole Method For Molecular Dynamics, Reid G. Ormseth Jun 2007

Parallel Fast Multipole Method For Molecular Dynamics, Reid G. Ormseth

Theses and Dissertations

We report on a parallel version of the Fast Multipole Method (FMM) implemented in the classical molecular dynamics code, NAMD (Not Another Molecular Dynamics program). This novel implementation of FMM aims to minimize interprocessor communication through the modification of the FMM grid to match the hybrid force and spatial decomposition scheme already present in NAMD. This new implementation has the benefit of replacing all-to-all communications broadcasts with direct communications between nearest neighbors. This results in a significant reduction in the amount of communication compared to earlier attempts to integrate FMM into common molecular dynamics programs. The early performance of FMM …


Steganalysis Feature Improvement Using Expectation Maximization, Benjamin M. Rodriguez, Gilbert L. Peterson, Sos S. Agaian Apr 2007

Steganalysis Feature Improvement Using Expectation Maximization, Benjamin M. Rodriguez, Gilbert L. Peterson, Sos S. Agaian

Faculty Publications

No abstract provided.


A Multivariate Magnitude Robust Control Chart For Mean Shift Detection And Change Point Estimation, Ryan M. Harrell Mar 2007

A Multivariate Magnitude Robust Control Chart For Mean Shift Detection And Change Point Estimation, Ryan M. Harrell

Theses and Dissertations

Statistical control charts are often used to detect a change in an otherwise stable process. This process may contain several variables affecting process stability. The goal of any control chart is to detect an out-of-control state quickly and provide insight on when the process actually changed. This reduces the off-line time the quality engineer spends assigning causality. In this research, a multivariate magnitude robust chart (MMRC) was developed using a change point model and a likelihood-ratio approach. Here the process is considered in-control until one or more normally distributed process variables permanently and suddenly shifts to out-of-control, stable value. Using …


Wide Area Search And Engagement Simulation Validation, Michael J. Marlin Mar 2007

Wide Area Search And Engagement Simulation Validation, Michael J. Marlin

Theses and Dissertations

As unmanned aerial vehicles (UAVs) increase in capability, the ability to refuel them in the air is becoming more critical. Aerial refueling will extend the range, shorten the response times, and extend loiter time of UAVs. Executing aerial refueling autonomously will reduce the command and control, logistics, and training efforts associated with fielding UAV systems. Currently, the Air Force Research Lab is researching the various technologies required to conduct automated aerial refueling (AAR). One of the required technologies is the ability to autonomously rendezvous with the tanker. The goal of this research is to determine the control required to fly …


Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl Mar 2007

Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl

Theses and Dissertations

Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geographic location of an IP addressable node, has proven useful in a wide variety of commercial applications. Commercial applications of IP Geolocation include market research, redirection for performance enhancement, restricting content, and combating fraud. The potential for military applications include securing remote access via geographic authentication, intelligence collection, and cyber attack attribution. IP Geolocation methods can be divided into three basic categories based upon what information is used to determine the geographic location of the given IP address: 1) Information contained in databases, 2) information that is leaked during …


Spacecraft Proximity Operations Used To Estimate The Dynamical & Physical Properties Of A Resident Space Object, Abraham F. Brunner Mar 2007

Spacecraft Proximity Operations Used To Estimate The Dynamical & Physical Properties Of A Resident Space Object, Abraham F. Brunner

Theses and Dissertations

When conducting a space proximity operation, developing high-fidelity estimates of the dynamical and physical properties of a Resident Space Object (RSO) based on post-rendezvous observational data acquired, is imperative for the understanding of the RSO itself and the operating environment. This research investigates the estimation of relative motion dynamics, rotational dynamics, and the feasibility of estimating the moments of inertia of a RSO. Using the Hill-Clohessy-Wiltshire equations, rigid-body dynamics, and estimation theory, a nonlinear least squares estimation algorithm is implemented in the processing of range data from tracked observation points on the RSO body. Through simulation, it was determined that …


Development Of A Screening Model For Design And Costing Of An Innovative Tailored Granular Activated Carbon Technology To Treat Perchlorate-Contaminated Water, William C. Powell Mar 2007

Development Of A Screening Model For Design And Costing Of An Innovative Tailored Granular Activated Carbon Technology To Treat Perchlorate-Contaminated Water, William C. Powell

Theses and Dissertations

Perchlorate contamination of drinking water is a problem that has recently gained national attention. The purpose of this research was to develop a tool to predict the cost and performance of tailored granular activated carbon (T-GAC), an innovative technology to treat perchlorate-contaminated water. The ability to predict cost and performance is essential to promote transfer and commercialization of innovative technologies. This study investigated how data obtained from small-scale laboratory tests could be applied to predict cost and performance of a full-scale T-GAC system to treat perchlorate-contaminated water. A technology model was developed using GAC design principles and using a multi-component …


Use Of Tabu Search In A Solver To Map Complex Networks Onto Emulab Testbeds, Jason E. Macdonald Mar 2007

Use Of Tabu Search In A Solver To Map Complex Networks Onto Emulab Testbeds, Jason E. Macdonald

Theses and Dissertations

The University of Utah's solver for the testbed mapping problem uses a simulated annealing metaheuristic algorithm to map a researcher's experimental network topology onto available testbed resources. This research uses tabu search to find near-optimal physical topology solutions to user experiments consisting of scale-free complex networks. While simulated annealing arrives at solutions almost exclusively by chance, tabu search incorporates the use of memory and other techniques to guide the search towards good solutions. Both search algorithms are compared to determine whether tabu search can produce equal or higher quality solutions than simulated annealing in a shorter amount of time. It …


Optical Tracking For Relative Positioning In Automated Aerial Refueling, James H. Spencer Mar 2007

Optical Tracking For Relative Positioning In Automated Aerial Refueling, James H. Spencer

Theses and Dissertations

An algorithm is designed to extract features from video of an air refueling tanker for use in determining the precise relative position of a receiver aircraft. The algorithm is based on receiving a known estimate of the tanker aircraft's position and attitude. The algorithm then uses a known feature model of the tanker to predict the location of those features on a video frame. A corner detector is used to extract features from the video. The measured corners are then associated with known features and tracked from frame to frame. For each frame, the associated features are used to calculate …


The Effects Of Orthophosphate As A Copper Corrosion Control Inhibitor In High Alkalinity Drinking Water Systems, Stephen Grace Mar 2007

The Effects Of Orthophosphate As A Copper Corrosion Control Inhibitor In High Alkalinity Drinking Water Systems, Stephen Grace

Theses and Dissertations

The purpose of this research was to investigate orthophosphate as a corrosion inhibitor for copper pipe in a high-alkalinity drinking water system. Specifically, this thesis sought to answer three research questions regarding the impact of orthophosphate treatment, the nature of the mechanism by which orthophosphate controls copper corrosion, and the value of equilibrium modeling in predicting orthophosphate’s effects. The research questions were answered through a comprehensive literature review and experimental methodology integrating laboratory jar tests, water sampling and analysis from a field investigation, qualitative solids analysis, and equilibrium model application. This study analyzed field data obtained over the course of …


Hardware Virtualization Applied To Rootkit Defense, Douglas P. Medley Mar 2007

Hardware Virtualization Applied To Rootkit Defense, Douglas P. Medley

Theses and Dissertations

This research effort examines the idea of applying virtualization hardware to enhance operating system security against rootkits. Rootkits are sets of tools used to hide code and/or functionality from the user and operating system. Rootkits can accomplish this feat through using access to one part of an operating system to change another part that resides at the same privilege level. Hardware assisted virtualization (HAV) provides an opportunity to defeat this tactic through the introduction of a new operating mode. Created to aid operating system virtualization, HAV provides hardware support for managing and saving multiple states of the processor. This hardware …


Beyond Passswords: Usage And Policy Transformation, Alan S. Alsop Mar 2007

Beyond Passswords: Usage And Policy Transformation, Alan S. Alsop

Theses and Dissertations

The purpose of this research is to determine whether the transition to a two-factor authentication system is more secure than a system that relied only on what users “know” for authentication. While we found that factors that made passwords inherently vulnerable did not transfer to the PIN portion of a two-factor authentication system, we did find significant problems relating to usability, worker productivity, and the loss and theft of smart cards. The new authentication method has disrupted our ability to stay connected to ongoing mission issues, forced some installations to cut off remote access for their users and in one …


Using Concept Maps To More Efficiently Create Intelligence Information Models, Christopher E. Coryell Mar 2007

Using Concept Maps To More Efficiently Create Intelligence Information Models, Christopher E. Coryell

Theses and Dissertations

Information models are a critical tool that enables intelligence customers to quickly and accurately comprehend U.S. intelligence agency products. The Knowledge Pre-positioning System (KPS) is the standard repository for information models at the National Air and Space Intelligence Center (NASIC). The current approach used by NASIC to build a KPS information model is laborious and costly. Intelligence analysts design an information model using a manual, butcher-paper-based process. The output of their work is then entered into KPS by either a single NASIC KPS "database modeler" or a contractor (at a cost of roughly $100K to the organization). This thesis proposes …


Implementation And Optimization Of The Advanced Encryption Standard Algorithm On An 8-Bit Field Programmable Gate Array Hardware Platform, Ryan J. Silva Mar 2007

Implementation And Optimization Of The Advanced Encryption Standard Algorithm On An 8-Bit Field Programmable Gate Array Hardware Platform, Ryan J. Silva

Theses and Dissertations

The contribution of this research is three-fold. The first is a method of converting the area occupied by a circuit implemented on a Field Programmable Gate Array (FPGA) to an equivalent as a measure of total gate count. This allows direct comparison between two FPGA implementations independent of the manufacturer or chip family. The second contribution improves the performance of the Advanced Encryption Standard (AES) on an 8-bit computing platform. This research develops an AES design that occupies less than three quarters of the area reported by the smallest design in current literature as well as significantly increases area efficiency. …


Assessment Of Optical Turbulence Profiles Derived From Probabilistic Climatology, Brett W. Wisdom Mar 2007

Assessment Of Optical Turbulence Profiles Derived From Probabilistic Climatology, Brett W. Wisdom

Theses and Dissertations

This research effort assesses the performance of the High Energy Laser End-to-End Operational Simulation (HELEEOS) Climatological C2n optical turbulence model. Path-integrated C2n values of two HELEEOS optical turbulence pro les at 3 distinct operational altitudes are compared to values determined from measured thermosonde data. HELEEOS desert and mid-latitude sites are selected from the Extreme and Percentile Environmental Reference Tables (ExPERT) database for comparison to the thermosonde data. Statistical equivalence of the two datasets is determined through a Design of Experiments (DOE) factorial test to within 80% confidence. The HELEEOS profiles are shown to be equivalent to …


Thermally Activated, Variable Blazed Grating For Coherent Beam Steering, Matthew T. Johnson Mar 2007

Thermally Activated, Variable Blazed Grating For Coherent Beam Steering, Matthew T. Johnson

Theses and Dissertations

The ability to perform non-mechanical optical beam steering is of critical importance in laser communication and remote sensing; it is as vital as a phased-array antenna is for RADAR. Directed energy transmission and direction-selective reception increase performance and produce tactical advantage in DoD applications. However, specific geometric features of non-mechanical beam steering devices must be designed in proportion to the wavelength of the monochromatic light to be steered. Also, the ability to handle higher energies by reducing the energy per unit requires large areas of uniform properties on the micrometer scale. These challenges have been addressed in the past using …


Improved Hyperspectral Image Testing Using Synthetic Imagery And Factorial Designed Experiments, Joseph P. Bellucci Mar 2007

Improved Hyperspectral Image Testing Using Synthetic Imagery And Factorial Designed Experiments, Joseph P. Bellucci

Theses and Dissertations

The goal of any remote sensing system is to gather data about the geography it is imaging. In order to gain knowledge of the earth's landscape, post-processing algorithms are developed to extract information from the collected data. The algorithms can be intended to classify the various ground covers in a scene, identify specific targets of interest, or detect anomalies in an image. After the design of an algorithm comes the difficult task of testing and evaluating its performance. Traditionally, algorithms are tested using sets of extensively ground truthed test images. However, the lack of well characterized test data sets and …


Modeling, Simulation, And Estimation Of Optical Turbulence, Byron P. Formwalt Mar 2007

Modeling, Simulation, And Estimation Of Optical Turbulence, Byron P. Formwalt

Theses and Dissertations

This dissertation documents three new contributions to simulation and modeling of optical turbulence. The first contribution is the formalization, optimization, and validation of a modeling technique called successively conditioned rendering (SCR). The SCR technique is empirically validated by comparing the statistical error of random phase screens generated with the technique. The second contribution is the derivation of the covariance delineation theorem, which provides theoretical bounds on the error associated with SCR. It is shown empirically that the theoretical bound may be used to predict relative algorithm performance. Therefore, the covariance delineation theorem is a powerful tool for optimizing SCR algorithms. …


Recommendations For A Standardized Program Management Office (Pmo) Time Compliance Network Order (Tcno) Patching Process, Michael Czumak Iii Mar 2007

Recommendations For A Standardized Program Management Office (Pmo) Time Compliance Network Order (Tcno) Patching Process, Michael Czumak Iii

Theses and Dissertations

Network security is a paramount concern for organizations utilizing computer technology, and the Air Force is no exception. Network software vulnerability patching is a critical determinant of network security. The Air Force deploys these patches as Time Compliance Network Orders (TCNOs), which together with associated processes and enforced timelines ensure network compliance. While the majority of the network assets affected by this process are Air Force owned and operated, a large number are maintained by external entities known as Program Management Offices (PMOs). Although these externally controlled systems provide a service to the Air Force and reside on its network, …


Towards The Development Of A Defensive Cyber Damage And Mission Impact Methodology, Larry W. Fortson Jr. Mar 2007

Towards The Development Of A Defensive Cyber Damage And Mission Impact Methodology, Larry W. Fortson Jr.

Theses and Dissertations

The purpose of this research is to establish a conceptual methodological framework that will facilitate effective cyber damage and mission impact assessment and reporting following a cyber-based information incidents. Joint and service guidance requires mission impact reporting, but current efforts to implement such reporting have proven ineffective. This research seeks to understand the impediments existing in the current implementation and to propose an improved methodology. The research employed a hybrid historical analysis and case study methodology for data collection through extensive literature review, examination of existing case study research and interviews with Air Force members and civilian personnel employed as …


Performance Evaluation Of Ad Hoc Routing In A Swarm Of Autonomous Aerial Vehicles, Matthew T. Hyland Mar 2007

Performance Evaluation Of Ad Hoc Routing In A Swarm Of Autonomous Aerial Vehicles, Matthew T. Hyland

Theses and Dissertations

This thesis investigates the performance of three mobile ad hoc routing protocols in the context of a swarm of autonomous unmanned aerial vehicles (UAVs). It is proposed that a wireless network of nodes having an average of 5.1774 log n neighbors, where n is the total number of nodes in the network, has a high probability of having no partitions. By decreasing transmission range while ensuring network connectivity, and implementing multi-hop routing between nodes, spatial multiplexing is exploited whereby multiple pairs of nodes simultaneously transmit on the same channel. The proposal is evaluated using the Greedy Perimeter Stateless Routing (GPSR), …


On-Demand Key Distribution For Mobile Ad-Hoc Networks, Daniel F. Graham Mar 2007

On-Demand Key Distribution For Mobile Ad-Hoc Networks, Daniel F. Graham

Theses and Dissertations

Mobile ad-hoc networks offer dynamic portable communication with little or no infrastructure. While this has many benefits, there are additional shortcomings specific to wireless communication that must be addressed. This research proposes gossip-based on-demand key distribution as a means to provide data encryption for mobile ad-hoc networks. This technique uses message keys to avoid encrypting and decrypting a message at every node. Other optimizations used include secure channel caching and joint rekey messages. The use of gossip makes the scheme robust to node failure. Experimental results show only a 15% increase in end-to-end delay with a node failure rate of …


Analysis Of Routing Worm Infection Rates On An Ipv4 Network, James Gorsuch Mar 2007

Analysis Of Routing Worm Infection Rates On An Ipv4 Network, James Gorsuch

Theses and Dissertations

Malicious logic, specifically worms, has caused monetary expenditure problems to network users in the past. Worms, like Slammer and Code Red, have infected thousands of systems and brought the Internet to a standstill. This research examines the ability of the original Slammer worm, the Slammer based routing worm proposed by Zou et al, and a new Single Slash Eight (SSE) routing worm proposed by this research to infect vulnerable systems within a given address space. This research investigates the Slammer worm's ability to generate a uniform random IP addresses in a given address space. Finally, a comparison of the speed …


Characterization Of Chlorinated Ethene Degradation In A Vertical Flow Constructed Wetland, James M. Waldron Mar 2007

Characterization Of Chlorinated Ethene Degradation In A Vertical Flow Constructed Wetland, James M. Waldron

Theses and Dissertations

Chlorinated solvents, including perchloroethene (PCE) and trichlorethene (TCE), are among the most common groundwater contaminants found in the United States. Once released into the environment, chlorinated solvents are extremely persistent and often require costly and lengthy remedial actions. The use of constructed wetlands has shown promise as an effective and less costly alternative for the treatment of chlorinated solvent contaminated groundwater. This study characterized and evaluated the concentration of chlorinated ethenes within a vertical flow constructed wetland, fed with PCE contaminated groundwater, at Wright-Patterson Air Force Base (WPAFB), Ohio. Chlorinated ethene concentrations were characterized within three distinct layers of the …


Using Value-Focused Thinking To Evaluate The Use Of Innovative Stormwater Management Technologies On Air Force Installations, Jeffrey T. Falcone Mar 2007

Using Value-Focused Thinking To Evaluate The Use Of Innovative Stormwater Management Technologies On Air Force Installations, Jeffrey T. Falcone

Theses and Dissertations

Stormwater runoff occurs naturally after every storm event; however, traditional development practices have created many impervious surfaces, such as buildings, parking lots, and streets that increase runoff volume and flow rate. Conventional stormwater management practices focus on collecting runoff into centralized channels and conveying it as quickly as possible to local bodies of water. This type of conveyance system decreases the opportunity for stormwater to naturally infiltrate back into the ground. It also prevents contaminants from being naturally filtered out of stormwater flows. As a result, centralized conveyance systems can cause flooding, erosion, and terrestrial and aquatic habitat degradation. Innovative …


Stochastic Estimation And Control Of Queues Within A Computer Network, Nathan C. Stuckey Mar 2007

Stochastic Estimation And Control Of Queues Within A Computer Network, Nathan C. Stuckey

Theses and Dissertations

An extended Kalman filter is used to estimate size and packet arrival rate of network queues. These estimates are used by a LQG steady state linear perturbation PI controller to regulate queue size within a computer network. This paper presents the derivation of the transient queue behavior for a system with Poisson traffic and exponential service times. This result is then validated for ideal traffic using a network simulated in OPNET. A more complex OPNET model is then used to test the adequacy of the transient queue size model when non-Poisson traffic is combined. The extended Kalman filter theory is …