Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Physical Sciences and Mathematics

Electroluminescence Studies On Longwavelength Indium Arsenide Quantum Dot Microcavities Grown On Gallium Arsenide, John C. Ramsey Dec 2011

Electroluminescence Studies On Longwavelength Indium Arsenide Quantum Dot Microcavities Grown On Gallium Arsenide, John C. Ramsey

Theses and Dissertations

A comprehensive study of the electroluminescence of four GaAs/AlGaAs microcavity devices with InAs/GaInAs quantum dot active regions emitting near 1.3 µm was conducted. The four molecular beam epitaxial grown samples with AlAs oxide aperture confinement layers were fabricated, characterized, and optically modeled. Optical power transmission of the samples was modeled using Matlab and compared with measured transmission data. Resonant cavity light emitting diodes (RCLEDs) and three vertical cavity surface emitting laser (VCSEL) samples were fabricated and electro-optically characterized over a range of injection currents and temperatures. Devices achieved continuous wave room temperature lasing at 1.28 µm with an output power …


A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube Sep 2011

A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube

Theses and Dissertations

The rapid transition of critical business processes to computer networks potentially exposes organizations to digital theft or corruption by advanced competitors. One tool used for these tasks is malware, because it circumvents legitimate authentication mechanisms. Malware is an epidemic problem for organizations of all types. This research proposes and evaluates a novel Malware Target Recognition (MaTR) architecture for malware detection and identification of propagation methods and payloads to enhance situation awareness in tactical scenarios using non-instruction-based, static heuristic features. MaTR achieves a 99.92% detection accuracy on known malware with false positive and false negative rates of 8.73e-4 and 8.03e-4 respectively. …


Distributed Spacing Stochastic Feature Selection And Its Application To Textile Classification, Jeffrey D. Clark Sep 2011

Distributed Spacing Stochastic Feature Selection And Its Application To Textile Classification, Jeffrey D. Clark

Theses and Dissertations

Many situations require the need to quickly and accurately locate dismounted individuals in a variety of environments. In conjunction with other dismount detection techniques, being able to detect and classify clothing (textiles) provides a more comprehensive and complete dismount characterization capability. Because textile classification depends on distinguishing between different material types, hyperspectral data, which consists of several hundred spectral channels sampled from a continuous electromagnetic spectrum, is used as a data source. However, a hyperspectral image generates vast amounts of information and can be computationally intractable to analyze. A primary means to reduce the computational complexity is to use feature …


Integrated Approach To Free Space Optical Communications In Strong Turbulence, Jason A. Tellez Sep 2011

Integrated Approach To Free Space Optical Communications In Strong Turbulence, Jason A. Tellez

Theses and Dissertations

The propagation of a free space optical communication signal through atmospheric turbulence experiences random fluctuations in intensity, including signal fades which negatively impact the communications link performance. This research develops an analytical probability density function (PDF) to model the best case scenario of using multiple independent beams to reduce the intensity fluctuations. The PDF was further developed to account for partially correlated beams, such as would be experienced by beams having finite separation. The PDF was validated with results obtained from digital simulations as well as lab experiments. The research showed that as the number of transmitted beams increases the …


Hyperspectral-Based Adaptive Matched Filter Detector Error As A Function Of Atmospheric Profile Estimation, Allan W. Yarbrough Sep 2011

Hyperspectral-Based Adaptive Matched Filter Detector Error As A Function Of Atmospheric Profile Estimation, Allan W. Yarbrough

Theses and Dissertations

Hyperspectral imagery is collected as radiance data. This data is a function of multiple variables: the radiation profile of the light source, the reflectance of the target, and the absorption and scattering profile of the medium through which the radiation travels as it reflects off the target and reaches the imager. Accurate target detection requires that the collected image matches as closely as possible the known "true" target in the classification database. Therefore, the effect of the radiation source and the atmosphere must be removed before detection is attempted. While the spectrum of solar light is relatively stable, the effect …


Extracting Forensic Artifacts From Windows O/S Memory, James S. Okolica, Gilbert L. Peterson Aug 2011

Extracting Forensic Artifacts From Windows O/S Memory, James S. Okolica, Gilbert L. Peterson

AFIT Documents

Memory analysis is a rapidly growing area in both digital forensics and cyber situational awareness (SA). Memory provides the most accurate snapshot of what is occurring on a computer at a moment in time. By combining it with event and network logs as well as the files present on the filesystem, an analyst can re-create much of what has occurred and is occuring on a computer. The Compiled Memory Analysis Tool (CMAT) takes either a disk image of memory from a Windows operating system or an interface into a virtual machine running a Windows operating system and extracts forensic artifacts …


Using Nanotechnology To Detect Nerve Agents, Mark N. Goltz, Dong-Shik Kim, Leeann Racz Jul 2011

Using Nanotechnology To Detect Nerve Agents, Mark N. Goltz, Dong-Shik Kim, Leeann Racz

Faculty Publications

Nanotechnology has opened a wide range of opportunities having potential impacts in areas as diverse as medicine and consumer products. In collaboration with researchers at the University of Toledo UT, Air Force Institute of Technology AFIT scientists are exploring the possibility of using a nanoscale organic matrix to detect organophosphate OP nerve agents. Current techniques for detecting OP compounds are expensive and time consuming. Developing a nanoscale organic matrix sensor would allow for direct, real-time sensing under field conditions. This article describes the science behind such a sensor and its possible applications. High-performance sensors are needed to protect Soldiers and …


Unintended Consequences: Potential Downsides Of The Air Force's Conversion To Biofuels, Mark N. Goltz, Charles A. Bleckmann, Charles M. Mackay, Khai Vuong, Jerrod P. Mccomb Jul 2011

Unintended Consequences: Potential Downsides Of The Air Force's Conversion To Biofuels, Mark N. Goltz, Charles A. Bleckmann, Charles M. Mackay, Khai Vuong, Jerrod P. Mccomb

Faculty Publications

The desire to reduce US dependence on foreign energy, ongoing environmental concerns, and the rising cost of petroleum have sparked significant development of greener alternative and renewable energy sources such as alcohol-based biofuels. To address these issues, the Department of Defense DOD has moved to diminish its reliance on petroleum for fueling aircraft and ground equipment. The US Air Force, in alignment with DOD objectives, has initiated several goals for reducing its use of energy: (1) decrease the use of petroleum-based fuel by 2 percent annually for the vehicle fleet, (2) increase the use of alternative fuel in motor vehicles …


Optical Flow-Based Odometry For Underground Tunnel Exploration, Terra Kier Jun 2011

Optical Flow-Based Odometry For Underground Tunnel Exploration, Terra Kier

Theses and Dissertations

As military operations in degraded or GPS-denied environments continue to increase in frequency and importance, there is an increased necessity to be able to determine precision location within these environments. Furthermore, authorities are finding a record number of tunnels along the U.S.-Mexico border; therefore, underground tunnel characterization is becoming a high priority for U.S. Homeland Security as well. This thesis investigates the performance of a new image registration technique based on a two camera optical- flow configuration using phase correlation techniques. These techniques differ from other image based navigation methods but present a viable alternative increasing autonomy and answering the …


Wolf Ant, Gilbert L. Peterson, Christopher M. Mayer, Kevin Cousin Jun 2011

Wolf Ant, Gilbert L. Peterson, Christopher M. Mayer, Kevin Cousin

Faculty Publications

Ant colony optimization (ACO) algorithms can generate quality solutions to combinatorial optimization problems. However, like many stochastic algorithms, the quality of solutions worsen as problem sizes grow. In an effort to increase performance, we added the variable step size off-policy hill-climbing algorithm called PDWoLF (Policy Dynamics Win or Learn Fast) to several ant colony algorithms: Ant System, Ant Colony System, Elitist-Ant System, Rank-based Ant System, and Max-Min Ant System. Easily integrated into each ACO algorithm, the PDWoLF component maintains a set of policies separate from the ant colony's pheromone. Similar to pheromone but with different update rules, the PDWoLF policies …


Ir Nonlinear Absorption Leading To Laser-Induced Damage In Ge & Gasb, Torrey J. Wagner, Matthew J. Bohn, Ronald A. Coutu Jr., L. P. Gonzales, J. M. Murray, K. L. Schepler, S. Guha Jun 2011

Ir Nonlinear Absorption Leading To Laser-Induced Damage In Ge & Gasb, Torrey J. Wagner, Matthew J. Bohn, Ronald A. Coutu Jr., L. P. Gonzales, J. M. Murray, K. L. Schepler, S. Guha

Faculty Publications

Using a simultaneous fitting technique to extract nonlinear absorption coefficients from data at two pulse widths, we measure two-photon and free-carrier absorption coefficients for Ge and GaSb at 2.05 and 2.5 μm for the first time. Results agreed well with published theory. Single-shot damage thresholds were also measured at 2.5 μm and agreed well with modeled thresholds using experimentally determined parameters including nonlinear absorption coefficients and temperature dependent linear absorption. The damage threshold for a single-layer Al2O3 anti-reflective coating on Ge was 55% or 35% lower than the uncoated threshold for ps or ns pulses, respectively. Wavelength-dependant …


Complementary Metal-Oxide Semiconductor-Compatible Detector Materials With Enhanced 1550 Nm Responsivity Via Sn-Doping Of Ge/Si(100), Richard T. Beeler, Jay Mathews, Mee-Yi Ryu, Yung-Kee Yeo, Jose Menendez, John Kouvetakis May 2011

Complementary Metal-Oxide Semiconductor-Compatible Detector Materials With Enhanced 1550 Nm Responsivity Via Sn-Doping Of Ge/Si(100), Richard T. Beeler, Jay Mathews, Mee-Yi Ryu, Yung-Kee Yeo, Jose Menendez, John Kouvetakis

Faculty Publications

Previously developed methods used to grow Ge1−ySny alloys on Si are extended to Sn concentrations in the 1019−1020 cm−3 range. These concentrations are shown to be sufficient to engineer large increases in the responsivity of detectors operating at 1550 nm. The dopant levels of Sn are incorporated at temperatures in the 370–390 °C range, yielding atomically smooth layers devoid of threading defects at high growth rates of 15–30 nm/min. These conditions are far more compatible with complementary metal-oxide semiconductor processing than the high growth and processing temperatures required to achieve the same …


Oxygen Vacancies Adjacent To Cu(2+) Ions In Tio(2) (Rutile) Crystals, A. T. Brant, Shan Yang (杨山), Nancy C. Giles, Zafar Iqbal, A. Manivannan, Larry E. Halliburton Apr 2011

Oxygen Vacancies Adjacent To Cu(2+) Ions In Tio(2) (Rutile) Crystals, A. T. Brant, Shan Yang (杨山), Nancy C. Giles, Zafar Iqbal, A. Manivannan, Larry E. Halliburton

Faculty Publications

Electron paramagnetic resonance (EPR) and electron-nuclear double resonance (ENDOR) are used to characterize Cu2+ ions substituting for Ti4+ ions in nominally undoped TiO2 crystals having the rutile structure. Illumination at 25 K with 442 nm laser light reduces the concentration of Cu2+ ions by more than a factor of 2. The laser light also reduces the EPR signals from Fe3+ and Cr3+ ions and introduces signals from Ti3+ ions. Warming in the dark to room temperature restores the crystal to its preilluminated state. Monitoring the recovery of the photoinduced changes in the Cu …


Relocatable Field Programmable Gate Array Bitstreams For Fault Tolerance, David P. Montminy, Rusty O. Baldwin, Paul D. Williams Mar 2011

Relocatable Field Programmable Gate Array Bitstreams For Fault Tolerance, David P. Montminy, Rusty O. Baldwin, Paul D. Williams

AFIT Patents

A Field Programmable Gate Array (FPGA) circuit capable of operating through at least one fault. The FPGA circuit includes a configuration memory and an embedded microprocessor. The embedded microprocessor having access to the configuration memory, static modules, at least one relocatable module, and at least one spare module. The relocatable module being relocatable from a first target area to a second target area. The relocatable module being relocatable by manipulating a partial bitstream with the embedded microprocessor. The microprocessor calculating a plurality of bitstream changes, to relocate the at least one relocatable module using at least triple modular redundancy (TMR).


Optical Metamaterial Design, Fabrication And Test, Jack P. Lombardi Mar 2011

Optical Metamaterial Design, Fabrication And Test, Jack P. Lombardi

Theses and Dissertations

Metamaterials, materials that make use of naturally occurring materials and designed structures to create materials with special properties not found in nature, are a fascinating new area of research, combining the fields of physics, microfabrication, and material science. This work will focus on the development of metamaterials operating in the visible and infrared which will be constructed and tested for basic optical properties. Possible applications for these materials will not be investigated. The this work will go into the fabrication and test of layered metal-dielectric structures, called layered metamaterials, as these structures hold potential for applications in advanced optical systems. …


Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy Mar 2011

Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy

Theses and Dissertations

There are many mechanisms that can cause inadequate or unreliable information in sensor networks. A user of the network might be interested in detecting and classifying specific sensors nodes causing these problems. Several network layer based trust methods have been developed in previous research to assess these issues; in contrast this work develops a trust protocol based on observations of physical layer data collected by the sensors. Observations of physical layer data are used for decisions and calculations, and are based on just the measurements collected by the sensors. Although this information is packaged and distributed on the network layer, …


Overcoming Pose Limitations Of A Skin-Cued Histograms Of Oriented Gradients Dismount Detector Through Contextual Use Of Skin Islands And Multiple Support Vector Machines, Jonathon R. Climer Mar 2011

Overcoming Pose Limitations Of A Skin-Cued Histograms Of Oriented Gradients Dismount Detector Through Contextual Use Of Skin Islands And Multiple Support Vector Machines, Jonathon R. Climer

Theses and Dissertations

This thesis provides a novel visualization method to analyze the impact that articulations in dismount pose and camera aspect angle have on histograms of oriented gradients (HOG) features and eventual detections. Insights from these relationships are used to identify limitations in a state of the art skin cued HOG dismount detector's ability to detect poses not in a standard upright stances. Improvements to detector performance are made by further leveraging available skin information, reducing false detections by an additional order of magnitude. In addition, a method is outlined for training supplemental support vector machines (SVMs) from computer generated data, for …


Holistic Network Defense: Fusing Host And Network Features For Attack Classification, Jenny W. Ji Mar 2011

Holistic Network Defense: Fusing Host And Network Features For Attack Classification, Jenny W. Ji

Theses and Dissertations

This work presents a hybrid network-host monitoring strategy, which fuses data from both the network and the host to recognize malware infections. This work focuses on three categories: Normal, Scanning, and Infected. The network-host sensor fusion is accomplished by extracting 248 features from network traffic using the Fullstats Network Feature generator and from the host using text mining, looking at the frequency of the 500 most common strings and analyzing them as word vectors. Improvements to detection performance are made by synergistically fusing network features obtained from IP packet flows and host features, obtained from text mining port, processor, logon …


Measuring The Utility Of A Cyber Incident Mission Impact Assessment (Cimia) Process For Mission Assurance, Christy L. Peterson Mar 2011

Measuring The Utility Of A Cyber Incident Mission Impact Assessment (Cimia) Process For Mission Assurance, Christy L. Peterson

Theses and Dissertations

Information is a critical asset on which virtually all modern organizations depend upon to meet their operational mission objectives. Military organizations, in particular, have embedded Information and Communications Technologies (ICT) into their core mission processes as a means to increase their operational efficiency, exploit automation, improve decision quality, and shorten the kill chain. However, the extreme dependence upon ICT results in an environment where a cyber incident can result in severe mission degradation, or possibly failure, with catastrophic consequences to life, limb, and property. These consequences can be minimized by maintaining real-time situational awareness of mission critical resources so appropriate …


Polarimetric Enhancements To Electro-Optical Aided Navigation Techniques, Jeremiah D. Johnson Mar 2011

Polarimetric Enhancements To Electro-Optical Aided Navigation Techniques, Jeremiah D. Johnson

Theses and Dissertations

Navigation in indoor and urban environments by small unmanned systems is a topic of interest for the Air Force. The Advanced Navigation Technology Center at the Air Force Institute of Technology is continually looking for novel approaches to navigation in GPS deprived environments. Inertial sensors have been coupled with image aided concepts, such as feature tracking, with good results. However, feature density in areas with large, flat, smooth surfaces tends to be low. Polarimetric sensors have been used for surface reconstruction, surface characterization and outdoor navigation. This thesis combines aspects of some of these algorithms along with a realistic, micro-facet …


Software And Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert Mar 2011

Software And Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert

Theses and Dissertations

Side Channel Analysis (SCA) is a method by which an adversary can gather information about a processor by examining the activity being done on a microchip though the environment surrounding the chip. Side Channel Analysis attacks use SCA to attack a microcontroller when it is processing cryptographic code, and can allow an attacker to gain secret information, like a crypto-algorithm's key. The purpose of this thesis is to test proposed dynamic hardware methods to increase the hardware security of a microprocessor such that the software code being run on the microprocessor can be made more secure without having to change …


A Multi Agent System For Flow-Based Intrusion Detection Using Reputation And Evolutionary Computation, David Hancock Mar 2011

A Multi Agent System For Flow-Based Intrusion Detection Using Reputation And Evolutionary Computation, David Hancock

Theses and Dissertations

The rising sophistication of cyber threats as well as the improvement of physical computer network properties present increasing challenges to contemporary Intrusion Detection (ID) techniques. To respond to these challenges, a multi agent system (MAS) coupled with flow-based ID techniques may effectively complement traditional ID systems. This paper develops: 1) a scalable software architecture for a new, self-organized, multi agent, flow-based ID system; and 2) a network simulation environment suitable for evaluating implementations of this MAS architecture and for other research purposes. Self-organization is achieved via 1) a reputation system that influences agent mobility in the search for effective vantage …


Spear Phishing Attack Detection, David T. Merritt Mar 2011

Spear Phishing Attack Detection, David T. Merritt

Theses and Dissertations

This thesis addresses the problem of identifying email spear phishing attacks, which are indicative of cyber espionage. Spear phishing consists of targeted emails sent to entice a victim to open a malicious file attachment or click on a malicious link that leads to a compromise of their computer. Current detection methods fail to detect emails of this kind consistently. The SPEar phishing Attack Detection system (SPEAD) is developed to analyze all incoming emails on a network for the presence of spear phishing attacks. SPEAD analyzes the following file types: Windows Portable Executable and Common Object File Format (PE/COFF), Adobe Reader, …


An Architecture For Improving Timeliness And Relevance Of Cyber Incident Notifications, James L. Miller Mar 2011

An Architecture For Improving Timeliness And Relevance Of Cyber Incident Notifications, James L. Miller

Theses and Dissertations

This research proposes a communications architecture to deliver timely and relevant cyber incident notifications to dependent mission stakeholders. This architecture, modeled in Unified Modeling Language (UML), eschews the traditional method of pushing notifications via message as dictated in Air Force Instruction 33-138. It instead shifts to a pull or publish and subscribe method of making notifications. Shifting this paradigm improves the notification process by empowering mission owners to identify those resources on which they depend for mission accomplishment, provides a direct conduit between providing and dependent mission owners for notifications when an incident occurs, and provides a shared representation for …


Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen Mar 2011

Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen

Theses and Dissertations

Supervisory Control and Data Acquisition (SCADA) systems are increasingly being connected to corporate networks which has dramatically expanded their attack surface to remote cyber attack. Adversaries are targeting these systems with increasing frequency and sophistication. This thesis seeks to answer the research question addressing which Information Assurance (IA) controls are most significant for network defenders and SCADA system managers/operators to focus on in order to increase the security of critical infrastructure systems against a Stuxnet-like cyber attack. This research applies the National Institute of Science and Technology (NIST) IA controls to an attack tree modeled on a remote Stuxnet-like cyber …


An Analytical Model Of Nanometer Scale Viscoelastic Properties Of Polymer Surfaces Measured Using An Atomic Force Microscope, Jacob B. Goldberg Mar 2011

An Analytical Model Of Nanometer Scale Viscoelastic Properties Of Polymer Surfaces Measured Using An Atomic Force Microscope, Jacob B. Goldberg

Theses and Dissertations

The United States Air Force and the Department of Defense is increasingly interested in nanomaterials. To study these materials, one needs to measure the mechanics of materials on the nanoscale. Over the past few decades the atomic force microscope (AFM) has been used in various methods to establish local surface properties at the nanoscale. In particular, surface elasticity measurements are crucial to understanding nanoscale surface properties. Problems arise, however, when measuring soft surfaces such as polymers and biological specimens, because these materials have a more complex viscoelastic response. This research focuses on modeling an AFM dynamic nanoindentation experiment intended to …


Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling, Ryan T. Ostler Mar 2011

Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling, Ryan T. Ostler

Theses and Dissertations

Due to the growing sophisticated capabilities of advanced persistent cyber threats, it is necessary to understand and accurately assess cyber attack damage to digital assets. This thesis proposes a Defensive Cyber Battle Damage Assessment (DCBDA) process which utilizes the comprehensive understanding of all possible cyber attack methodologies captured in a Cyber Attack Methodology Exhaustive List (CAMEL). This research proposes CAMEL to provide detailed knowledge of cyber attack actions, methods, capabilities, forensic evidence and evidence collection methods. This product is modeled as an attack tree called the Cyber Attack Methodology Attack Tree (CAMAT). The proposed DCBDA process uses CAMAT to analyze …


Kernelized Locality-Sensitive Hashing For Fast Image Landmark Association, Mark A. Weems Mar 2011

Kernelized Locality-Sensitive Hashing For Fast Image Landmark Association, Mark A. Weems

Theses and Dissertations

As the concept of war has evolved, navigation in urban environments where GPS may be degraded is increasingly becoming more important. Two existing solutions are vision-aided navigation and vision-based Simultaneous Localization and Mapping (SLAM). The problem, however, is that vision-based navigation techniques can require excessive amounts of memory and increased computational complexity resulting in a decrease in speed. This research focuses on techniques to improve such issues by speeding up and optimizing the data association process in vision-based SLAM. Specifically, this work studies the current methods that algorithms use to associate a current robot pose to that of one previously …