Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Physical Sciences and Mathematics

Structured P2p Technologies For Distributed Command And Control, Daniel R. Karrels, Gilbert L. Peterson, Barry E. Mullins Dec 2009

Structured P2p Technologies For Distributed Command And Control, Daniel R. Karrels, Gilbert L. Peterson, Barry E. Mullins

Faculty Publications

The utility of Peer-to-Peer (P2P) systems extends far beyond traditional file sharing. This paper provides an overview of how P2P systems are capable of providing robust command and control for Distributed Multi-Agent Systems (DMASs). Specifically, this article presents the evolution of P2P architectures to date by discussing supporting technologies and applicability of each generation of P2P systems. It provides a detailed survey of fundamental design approaches found in modern large-scale P2P systems highlighting design considerations for building and deploying scalable P2P applications. The survey includes unstructured P2P systems, content retrieval systems, communications structured P2P systems, flat structured P2P systems and …


An Efficient And Effective Implementation Of The Trust System For Power Grid Compartmentalization, Juan M. Carlos Gonzalez Jun 2009

An Efficient And Effective Implementation Of The Trust System For Power Grid Compartmentalization, Juan M. Carlos Gonzalez

Theses and Dissertations

As utility companies develop and incorporate new technologies, such as moving to utility Internet technology based architecture and standard; it is crucial that we do so with history in mind. We know that traditional utility protection and control systems were not designed with security in their top priorities. This presents a danger in an environment where near real-time responses are required to ensure safe operations. As a consequence, system security becomes a burden to the system rather than necessary protection. Unfortunately, technology implementation is not the only concern. The number of utility privately-owned companies has multiplied as the market has …


Frequency Diversity For Improving Synthetic Aperture Radar Imaging, Jawad L. Farooq Mar 2009

Frequency Diversity For Improving Synthetic Aperture Radar Imaging, Jawad L. Farooq

Theses and Dissertations

In this work, a novel theoretical framework is presented for using recent advances in frequency diversity arrays (FDAs). Unlike a conventional array, the FDA simultaneously transmits a unique frequency from each element in the array. As a result, special time and space properties of the radiation pattern are exploited to improve cross-range resolution. The idealized FDA radiation pattern is compared with and validated against a full-wave electromagnetic solver, and it is shown that the conventional array is a special case of the FDA. A new signal model, based on the FDA, is used to simulate SAR imagery of ideal point …


Determining The Orbit Locations Of Turkish Airborne Early Warning And Control Aircraft Over The Turkish Air Space, Nebi Sarikaya Mar 2009

Determining The Orbit Locations Of Turkish Airborne Early Warning And Control Aircraft Over The Turkish Air Space, Nebi Sarikaya

Theses and Dissertations

The technology improvement affects the military needs of individual countries. The new doctrine of defense for many countries emphasizes detecting threats as far away as you can from your homeland. Today, the military uses both ground RADAR and Airborne Early Warning and Control (AEW&C) Aircraft. AEW&C aircraft has become vital to detect low altitude threats that a ground RADAR cannot detect because of obstacles on the earth. Turkey has ordered four AEW&C aircraft for her air defense system because of the lack of complete coverage by ground RADAR. This research provides optimal orbit locations that can be updated according to …


Bit-Error-Rate-Minimizing Channel Shortening Using Post-Feq Diversity Combining And A Genetic Algorithm, Gokhan Altin Mar 2009

Bit-Error-Rate-Minimizing Channel Shortening Using Post-Feq Diversity Combining And A Genetic Algorithm, Gokhan Altin

Theses and Dissertations

In advanced wireline or wireless communication systems, i.e., DSL, IEEE 802.11a/g, HIPERLAN/2, etc., a cyclic prefix which is proportional to the channel impulse response is needed to append a multicarrier modulation (MCM) frame for operating the MCM accurately. This prefix is used to combat inter symbol interference (ISI). In some cases, the channel impulse response can be longer than the cyclic prefix (CP). One of the most useful techniques to mitigate this problem is reuse of a Channel Shortening Equalizer (CSE) as a linear preprocessor before the MCM receiver in order to shorten the effective channel length. Channel shortening filter …


Dynamic Network Formation Using Ant Colony Optimization, Steven C. Oimoen Mar 2009

Dynamic Network Formation Using Ant Colony Optimization, Steven C. Oimoen

Theses and Dissertations

Military and industry are moving toward every device being network enabled and connected for reliable availability of communication and information. To make this type of system a reality, the devices must be capable of forming a network topology on their own in a dynamic environment to ensure that the correct information reaches a desired location and on-time. This research presents three contributions for solving highly dynamic (i.e. drastic change within the network) Multi-commodity Capacitated Network Design Problems (MCNDPs) resulting in a distributed multi-agent network design algorithm. The first contribution incorporates an Ant Colony Optimization (ACO) algorithm Ant Colony System (ACS) …


A Taxonomy For And Analysis Of Anonymous Communications Networks, Douglas J. Kelly Mar 2009

A Taxonomy For And Analysis Of Anonymous Communications Networks, Douglas J. Kelly

Theses and Dissertations

Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama’s Cybersecurity Chief-elect recognizes the challenge of increasingly sophisticated cyber attacks. Now through April 2009, the White House is reviewing federal cyber initiatives to protect US citizen privacy rights. Indeed, the rising quantity and ubiquity …


Blind Deconvolution Through Polarization Diversity Of Long Exposure Imagery, Steven P. James Mar 2009

Blind Deconvolution Through Polarization Diversity Of Long Exposure Imagery, Steven P. James

Theses and Dissertations

The purpose of the algorithm developed in this thesis was to create a post processing method that could resolve objects at low signal levels using polarization diversity and no knowledge of the atmospheric seeing conditions. The process uses a two-channel system, one unpolarized image and one linearly polarized image, in a GEM algorithm to reconstruct the object. Previous work done by Strong showed that a two-channel system using polarization diversity on short exposure imagery could produce images up to twice the diffraction limit. In this research, long exposure images were simulated and a simple Kolmogorov model used. This allowed for …


Detecting Near-Earth Objects Using Cross-Correlation With A Point Spread Function, Anthony P. O'Dell Mar 2009

Detecting Near-Earth Objects Using Cross-Correlation With A Point Spread Function, Anthony P. O'Dell

Theses and Dissertations

This thesis describes a process to help discover Near-Earth Objects (NEOs) of larger than 140 meters in diameter from ground based telescopes. The process involves using Nyquist sampling rate to take data from a ground-based telescope and measuring the atmospheric seeing parameter, r0, at the time of data collection. r0 is then used to create a point spread function (PSF) for a NEO at the visual magnitude limit of the telescope and exposure time. This PSF is cross-correlated with the Nyquist sampling rate image from the telescope to reduce the noise and therefore increase the detection probability of …


Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy Mar 2009

Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy

Theses and Dissertations

With the increase in speed and availability of computers, our nation's computer and information systems are being attacked with increased sophistication. The Air Force Research Laboratory (AFRL) Information Directorate (RI) is researching a next generation network defense architecture, called Cybercraft, that provides automated and trusted cyber defense capabilities for AF network assets. This research we consider the issues to protect or obfuscate command and control aspects of Cybercraft. In particular, we present a methodology to hide aspects of Cybercraft platform initialization in context to formation of hierarchical, peer-to-peer groups that collectively form the Cybercraft network. Because malicious code networks (known …


Cooperative Unmanned Aerial Surveillance Control System Architecture, Theodore T. Diamond, Adam L. Rutherford, Jonathan B. Taylor Mar 2009

Cooperative Unmanned Aerial Surveillance Control System Architecture, Theodore T. Diamond, Adam L. Rutherford, Jonathan B. Taylor

Theses and Dissertations

Intelligence, surveillance and reconnaissance (ISR) is a high-demand Department of Defense mission performed by unmanned aircraft systems (UASs) at the tactical and theater levels. Coordinating UASs through cooperative control offers the advantages of persistence, distributed and adaptable sensor coverage, and reduced revisit time on points of interest. The purpose of this thesis is to apply systems engineering principles to the problem of developing a flexible, common control system for cooperative UAS surveillance at the tactical level. The AFIT team developed a concept of operations (CONOPS) encompassing various users and surveillance tasks. The team then used the scenarios in the CONOPS …


Waypoint Generation Based On Sensor Aimpoint, Shannon M. Farrell Mar 2009

Waypoint Generation Based On Sensor Aimpoint, Shannon M. Farrell

Theses and Dissertations

Secretary of Defense Robert M. Gates has emphasized a need for a greater number of intelligence, surveillance, and reconnaissance (ISR) assets to support combatant commanders and military operations globally. Unmanned systems, especially MAVs, used as ISR platforms provide the ability to maintain covertness during missions and help reduce the risk to human life. This research develops waypoint generation algorithms required to keep a point of interest (POI) in the field of view (FOV) of a fixed sensor on a micro air vehicle (MAV) in the presence of a constant wind.
Fixed sensors, while cheaper and less prone to mechanical failure …


Analysis And Application Of The Bi-Directional Scatter Distribution Function Of Photonic Crystals, Robert B. Lamott Mar 2009

Analysis And Application Of The Bi-Directional Scatter Distribution Function Of Photonic Crystals, Robert B. Lamott

Theses and Dissertations

Photonic crystals (PCs) are periodic structures built from materials with different refractive indices repeated at sub-wavelength intervals, which results in unusual optical characteristics, including narrowband laser protection, and zero reflectance and high absorption anomalies. Most of the research into the optical properties of PCs has concentrated only on the small range of wavelengths and angles where these effects occur. To better understand where all light leaving a PC is scattered, a Complete Angle Scatter Instrument was used to analyze the scatter from three Guided Mode Resonance Filters designed for laser protection. In the plane of incidence, measurements of the scatter …


Misregistration In Adaptive Optics Systems, Nathan D. Engstrom Mar 2009

Misregistration In Adaptive Optics Systems, Nathan D. Engstrom

Theses and Dissertations

An adaptive optics (AO) system is most effective when there is a known alignment between the wave front sensor (WFS) and the deformable mirror (DM). Misregistration is the term for the unknown alignment between the WFS and DM. Misregistration degrades system performance and can make the system unstable. An AO system uses a reconstruction matrix to transform WFS measurements into DM commands. A standard AO system uses a model reconstruction matrix that assumes perfect registration between the WFS and DM. The object of this research is to mitigate the negative effects of misregistration by using offline WFS measurements to create …


A Comparative Study Of The Bidirectional Reflectance Distribution Function Of Several Surfaces As A Mid-Wave Infrared Diffuse Reflectance Standard, Bradley Balling Mar 2009

A Comparative Study Of The Bidirectional Reflectance Distribution Function Of Several Surfaces As A Mid-Wave Infrared Diffuse Reflectance Standard, Bradley Balling

Theses and Dissertations

The Bi-Directional Reflectance Distribution Function (BRDF) has a well defined diffuse measurement standard in the ultraviolet, visible, and near infrared (NIR), Spectralon(trade name). It is predictable, stable, repeatable, and has low surface variation because it is a bulk scatterer. In the mid-wave IR (MWIR) and long-wave IR (LWIR), there is not such a well-defined standard. There are well-defined directional hemispherical reflectance (DHR) standards, but the process of integrating BRDF measurements into DHR for the purpose of calibration is problematic, at best. Direct BRDF measurement standards are needed. This study use current calibration techniques to ensure valid measurements and then systematically …


Image Processing For Multiple-Target Tracking On A Graphics Processing Unit, Michael A. Tanner Mar 2009

Image Processing For Multiple-Target Tracking On A Graphics Processing Unit, Michael A. Tanner

Theses and Dissertations

Multiple-target tracking (MTT) systems have been implemented on many different platforms, however these solutions are often expensive and have long development times. Such MTT implementations require custom hardware, yet offer very little flexibility with ever changing data sets and target tracking requirements. This research explores how to supplement and enhance MTT performance with an existing graphics processing unit (GPU) on a general computing platform. Typical computers are already equipped with powerful GPUs to support various games and multimedia applications. However, such GPUs are not currently being used in desktop MTT applications. This research explores if and how a GPU can …


Probabilistic Estimation Of Rare Random Collisions In 3-Space, Timothy Holzmann Mar 2009

Probabilistic Estimation Of Rare Random Collisions In 3-Space, Timothy Holzmann

Theses and Dissertations

A study of risk assessment for artillery fire randomly colliding with fixed wing aircraft is presented. The research lends itself to a general study of collision models. Current models of object collisions fall under one of three categories: the historical model, the gas particle model, and the satellite model. These three vary in data requirements and mathematical representation of the impact event. The gas particle model is selected for its flexibility and robust estimation. However, current mathematical development in the literature does not include certain spatial and dynamic components necessary for a general encounter (collision) model. These are derived in …


Investigation Of Electrical And Optical Properties Of Bulk Iii-V Ternary Semiconductors, Travis C. Gomez Mar 2009

Investigation Of Electrical And Optical Properties Of Bulk Iii-V Ternary Semiconductors, Travis C. Gomez

Theses and Dissertations

Bulk grown III-V ternary semiconductors of In0.08Ga0.92Sb and In0.15Ga0.85As were investigated through Hall-effect and photoluminescence measurements to determine carrier concentration, mobility, sheet resistivity, and luminescence spectrum. In the past, epitaxial layers of ternary compounds have been grown on binary compound substrates, and thus very limited lattice matched ternary alloys were available. Recently, bulk grown ternary substrates have been developed, and it has presented a renewed interest in using these substrates to grow high quality ternary compounds for use in many next generation optoelectronic devices. The results of photoluminescence (PL) study for the …


Wave Optics Simulation Of Optically Augmented Retroreflections For Monostatic/Bistatic Detection, John J. Tatar Iii Mar 2009

Wave Optics Simulation Of Optically Augmented Retroreflections For Monostatic/Bistatic Detection, John J. Tatar Iii

Theses and Dissertations

Optical devices interrogated with a laser in the appropriate band can exhibit strong, deterministic reflections of the incident beam. This characteristic could be exploited for optical target detection and identification. The distribution of reflected power is strongly dependent on the geometry of the interrogation scenario, atmospheric conditions, and the cross section of the target optical device. Previous work on laser interrogation systems in this area has focused on analytic models or testing. To the best of my knowledge, I am presenting for the first time an approach to predict reflected power for a variety of interrogation configurations, targets, and propagation …


Electron Multipactor: Theory Review, Comparison And Modeling Of Mitigation Techniques In Icepic, Neil G. Rogers Mar 2009

Electron Multipactor: Theory Review, Comparison And Modeling Of Mitigation Techniques In Icepic, Neil G. Rogers

Theses and Dissertations

Mitigation approaches for single surface multipactor at dielectric windows are investigated using Particle-In-Cell (PIC) simulations. Initially baseline susceptibility diagrams are constructed analytically and compared with self-consistent, dynamic system trajectories. The power deposited on the surface of a dielectric window in an HPM system is considered using three different methods and the results of PIC simulations. Geometric mitigation is then considered by varying the window orientation with respect to the HPM electric held. Small angular deviations, less than 20 degrees, from the nominal case of normal incidence show dramatic changes in the susceptibility diagram. A materials approach to mitigation is then …


Advanced Radiometry For High Discrimination Explosive Fireball Discrimination, Steven E. Slagle Mar 2009

Advanced Radiometry For High Discrimination Explosive Fireball Discrimination, Steven E. Slagle

Theses and Dissertations

The high explosive fireball phenomenological model for the mid wave infrared spectrum, developed by AFIT, performs classification from spectral signatures was modified to use radiometric intensities. Five bands were sequentially fit to derive the five physical fit parameters describing the fireball's temperature, size, soot absorption coefficient within 16% and emissions from the H2O and CO2 concentrations within 333% of the spectral model. This was improved by changing the model's band sizes, center, and fitting methods where all five fit parameters were matched to within 17% of spectral model. This demonstrated that a combination of radiometric intensities could …


Hyperspectral Imaging Of A Turbine Engine Exhaust Plume To Determine Radiance, Temperature, And Concentration Spatial Distributions, Spencer J. Bowen Mar 2009

Hyperspectral Imaging Of A Turbine Engine Exhaust Plume To Determine Radiance, Temperature, And Concentration Spatial Distributions, Spencer J. Bowen

Theses and Dissertations

The usefulness of imaging Fourier transform spectroscopy (IFTS) when looking at a rapidly varying turbine engine exhaust scene was explored by characterizing the scene change artifacts (SCAs) present in the plume and the effect they have on the calibrated spectra using the Telops, Inc.-manufactured Field-portable Imaging Radiometric Spectrometer Technology, Midwave Extended (FIRST-MWE). It was determined that IFTS technology can be applied to the problem of a rapidly varying turbine engine exhaust plume due to the zero mean, stochastic nature of the SCAs, through the use of temporal averaging. The FIRST-MWE produced radiometrically calibrated hyperspectral datacubes, with calibration uncertainty of 35% …


Production And Characterization Of High Repetition Rate Terahertz Radiation In Femtosecond-Laser-Induced Air Plasma, Michael L. Dexter Mar 2009

Production And Characterization Of High Repetition Rate Terahertz Radiation In Femtosecond-Laser-Induced Air Plasma, Michael L. Dexter

Theses and Dissertations

The purpose of this research was to produce and characterize high repetition rate terahertz radiation in ionized air plasma. An 800 nanometer, 50 femtosecond, 0.35 Watt, 40 KHz, pulsed Ti:Sapphire laser system was used as the source infrared beam. This beam was focused onto a second harmonic generation crystal to produce a collinear, perpendicularly polarized secondary beam at 400 nm. After realigning the polarization of the fundamental to the second harmonic and compensating for group velocity dispersion introduced by the optics, both beams were recombined and focused by a 3.75 cm focal length mirror to form an air plasma. An …


Predicting Solar Protons: A Statistical Approach, Jonathan C. Spaulding Mar 2009

Predicting Solar Protons: A Statistical Approach, Jonathan C. Spaulding

Theses and Dissertations

A small fraction of solar flares are accompanied by high energy (>10 MeV) protons. These events can cause degradation or failure of satellite systems and can be harmful to humans in space or in high altitude flight. For risk management purposes, the Air Force is interested in predicting these events. Several algorithms exist to do this operationally, but none predict when these events will occur with much accuracy. Here, we analyzed 3610 M1 and greater flares including 106 with proton events from the GOES sensors from 1 Jan 1986 to 31 Dec 2004 to produce new results, including a …


Host-Based Multivariate Statistical Computer Operating Process Anomaly Intrusion Detection System (Paids), Glen R. Shilland Mar 2009

Host-Based Multivariate Statistical Computer Operating Process Anomaly Intrusion Detection System (Paids), Glen R. Shilland

Theses and Dissertations

No abstract provided.


Architecting Human Operator Trust In Automation To Improve System Effectiveness In Multiple Unmanned Aerial Vehicles (Uav), Eric A. Cring, Adam G. Lenfestey Mar 2009

Architecting Human Operator Trust In Automation To Improve System Effectiveness In Multiple Unmanned Aerial Vehicles (Uav), Eric A. Cring, Adam G. Lenfestey

Theses and Dissertations

Current Unmanned Aerial System (UAS) designs require multiple operators for each vehicle, partly due to imperfect automation matched with the complex operational environment. This study examines the effectiveness of future UAS automation by explicitly addressing the human/machine trust relationship during system architecting. A pedigreed engineering model of trust between human and machine was developed and applied to a laboratory-developed micro-UAS for Special Operations. This unprecedented investigation answered three primary questions. Can previous research be used to create a useful trust model for systems engineering? How can trust be considered explicitly within the DoD Architecture Framework? Can the utility of architecting …


Low Probability Of Intercept Waveforms Via Intersymbol Dither Performance Under Multipath Conditions, Jonathan K. Keen Mar 2009

Low Probability Of Intercept Waveforms Via Intersymbol Dither Performance Under Multipath Conditions, Jonathan K. Keen

Theses and Dissertations

This thesis examines the effects of multipath interference on Low Probability of Intercept (LPI) waveforms generated using intersymbol dither. LPI waveforms are designed to be difficult for non-cooperative receivers to detect and manipulate, and have many uses in secure communications applications. In prior research, such a waveform was designed using a dither algorithm to vary the time between the transmission of data symbols in a communication system. This work showed that such a method can be used to frustrate attempts to use non-cooperative receiver algorithms to recover the data. This thesis expands on prior work by examining the effects of …


The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis Mar 2009

The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis

Theses and Dissertations

This thesis examines the problem in initializing communications whereby cognitive radios need to find common spectrum with other cognitive radios, a process known as frequency rendezvous. It examines the rendezvous problem as it exists in a dynamic spectrum access cognitive network. Specifically, it addresses the problem of rendezvous in an infrastructureless environment. A new algorithm, the modular clock algorithm, is developed and analyzed as a solution for the simple rendezvous environment model, coupled with a modified version for environment models with less information. The thesis includes a taxonomy of commonly used environment models, and analysis of previous efforts to solve …


Using Agent-Based Modeling To Evaluate Uas Behaviors In A Target-Rich Environment, Joseph A. Van Kuiken Mar 2009

Using Agent-Based Modeling To Evaluate Uas Behaviors In A Target-Rich Environment, Joseph A. Van Kuiken

Theses and Dissertations

The trade-off between accuracy and speed is a re-occurring dilemma in many facets of military performance evaluation. This is an especially important issue in the world of ISR. One of the most progressive areas of ISR capabilities has been the utilization of Unmanned Aircraft Systems (UAS). Many people believe that the future of UAS lies in smaller vehicles flying in swarms. We use the agent-based System Effectiveness and Analysis Simulation (SEAS) to create a simulation environment where different configurations of UAS vehicles can process targets and provide output that allows us to gain insight into the benefits and drawbacks of …


A Hybrid Templated-Based Composite Classification System, Michael A. Turnbaugh Mar 2009

A Hybrid Templated-Based Composite Classification System, Michael A. Turnbaugh

Theses and Dissertations

An automatic target classification system contains a classifier which reads a feature as an input and outputs a class label. Typically, the feature is a vector of real numbers. Other features can be non-numeric, such as a string of symbols or alphabets. One method of improving the performance of an automatic classification system is through combining two or more independent classifiers that are complementary in nature. Complementary classifiers are observed by finding an optimal method for partitioning the problem space. For example, the individual classifiers may operate to identify specific objects. Another method may be to use classifiers that operate …