Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 20 of 20
Full-Text Articles in Physical Sciences and Mathematics
Electroluminescence Studies On Longwavelength Indium Arsenide Quantum Dot Microcavities Grown On Gallium Arsenide, John C. Ramsey
Electroluminescence Studies On Longwavelength Indium Arsenide Quantum Dot Microcavities Grown On Gallium Arsenide, John C. Ramsey
Theses and Dissertations
A comprehensive study of the electroluminescence of four GaAs/AlGaAs microcavity devices with InAs/GaInAs quantum dot active regions emitting near 1.3 µm was conducted. The four molecular beam epitaxial grown samples with AlAs oxide aperture confinement layers were fabricated, characterized, and optically modeled. Optical power transmission of the samples was modeled using Matlab and compared with measured transmission data. Resonant cavity light emitting diodes (RCLEDs) and three vertical cavity surface emitting laser (VCSEL) samples were fabricated and electro-optically characterized over a range of injection currents and temperatures. Devices achieved continuous wave room temperature lasing at 1.28 µm with an output power …
A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube
A Novel Malware Target Recognition Architecture For Enhanced Cyberspace Situation Awareness, Thomas E. Dube
Theses and Dissertations
The rapid transition of critical business processes to computer networks potentially exposes organizations to digital theft or corruption by advanced competitors. One tool used for these tasks is malware, because it circumvents legitimate authentication mechanisms. Malware is an epidemic problem for organizations of all types. This research proposes and evaluates a novel Malware Target Recognition (MaTR) architecture for malware detection and identification of propagation methods and payloads to enhance situation awareness in tactical scenarios using non-instruction-based, static heuristic features. MaTR achieves a 99.92% detection accuracy on known malware with false positive and false negative rates of 8.73e-4 and 8.03e-4 respectively. …
Integrated Approach To Free Space Optical Communications In Strong Turbulence, Jason A. Tellez
Integrated Approach To Free Space Optical Communications In Strong Turbulence, Jason A. Tellez
Theses and Dissertations
The propagation of a free space optical communication signal through atmospheric turbulence experiences random fluctuations in intensity, including signal fades which negatively impact the communications link performance. This research develops an analytical probability density function (PDF) to model the best case scenario of using multiple independent beams to reduce the intensity fluctuations. The PDF was further developed to account for partially correlated beams, such as would be experienced by beams having finite separation. The PDF was validated with results obtained from digital simulations as well as lab experiments. The research showed that as the number of transmitted beams increases the …
Distributed Spacing Stochastic Feature Selection And Its Application To Textile Classification, Jeffrey D. Clark
Distributed Spacing Stochastic Feature Selection And Its Application To Textile Classification, Jeffrey D. Clark
Theses and Dissertations
Many situations require the need to quickly and accurately locate dismounted individuals in a variety of environments. In conjunction with other dismount detection techniques, being able to detect and classify clothing (textiles) provides a more comprehensive and complete dismount characterization capability. Because textile classification depends on distinguishing between different material types, hyperspectral data, which consists of several hundred spectral channels sampled from a continuous electromagnetic spectrum, is used as a data source. However, a hyperspectral image generates vast amounts of information and can be computationally intractable to analyze. A primary means to reduce the computational complexity is to use feature …
Hyperspectral-Based Adaptive Matched Filter Detector Error As A Function Of Atmospheric Profile Estimation, Allan W. Yarbrough
Hyperspectral-Based Adaptive Matched Filter Detector Error As A Function Of Atmospheric Profile Estimation, Allan W. Yarbrough
Theses and Dissertations
Hyperspectral imagery is collected as radiance data. This data is a function of multiple variables: the radiation profile of the light source, the reflectance of the target, and the absorption and scattering profile of the medium through which the radiation travels as it reflects off the target and reaches the imager. Accurate target detection requires that the collected image matches as closely as possible the known "true" target in the classification database. Therefore, the effect of the radiation source and the atmosphere must be removed before detection is attempted. While the spectrum of solar light is relatively stable, the effect …
Optical Flow-Based Odometry For Underground Tunnel Exploration, Terra Kier
Optical Flow-Based Odometry For Underground Tunnel Exploration, Terra Kier
Theses and Dissertations
As military operations in degraded or GPS-denied environments continue to increase in frequency and importance, there is an increased necessity to be able to determine precision location within these environments. Furthermore, authorities are finding a record number of tunnels along the U.S.-Mexico border; therefore, underground tunnel characterization is becoming a high priority for U.S. Homeland Security as well. This thesis investigates the performance of a new image registration technique based on a two camera optical- flow configuration using phase correlation techniques. These techniques differ from other image based navigation methods but present a viable alternative increasing autonomy and answering the …
Holistic Network Defense: Fusing Host And Network Features For Attack Classification, Jenny W. Ji
Holistic Network Defense: Fusing Host And Network Features For Attack Classification, Jenny W. Ji
Theses and Dissertations
This work presents a hybrid network-host monitoring strategy, which fuses data from both the network and the host to recognize malware infections. This work focuses on three categories: Normal, Scanning, and Infected. The network-host sensor fusion is accomplished by extracting 248 features from network traffic using the Fullstats Network Feature generator and from the host using text mining, looking at the frequency of the 500 most common strings and analyzing them as word vectors. Improvements to detection performance are made by synergistically fusing network features obtained from IP packet flows and host features, obtained from text mining port, processor, logon …
Overcoming Pose Limitations Of A Skin-Cued Histograms Of Oriented Gradients Dismount Detector Through Contextual Use Of Skin Islands And Multiple Support Vector Machines, Jonathon R. Climer
Overcoming Pose Limitations Of A Skin-Cued Histograms Of Oriented Gradients Dismount Detector Through Contextual Use Of Skin Islands And Multiple Support Vector Machines, Jonathon R. Climer
Theses and Dissertations
This thesis provides a novel visualization method to analyze the impact that articulations in dismount pose and camera aspect angle have on histograms of oriented gradients (HOG) features and eventual detections. Insights from these relationships are used to identify limitations in a state of the art skin cued HOG dismount detector's ability to detect poses not in a standard upright stances. Improvements to detector performance are made by further leveraging available skin information, reducing false detections by an additional order of magnitude. In addition, a method is outlined for training supplemental support vector machines (SVMs) from computer generated data, for …
Software And Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert
Software And Critical Technology Protection Against Side Channel Analysis Through Dynamic Hardware Obfuscation, John R. Bochert
Theses and Dissertations
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a processor by examining the activity being done on a microchip though the environment surrounding the chip. Side Channel Analysis attacks use SCA to attack a microcontroller when it is processing cryptographic code, and can allow an attacker to gain secret information, like a crypto-algorithm's key. The purpose of this thesis is to test proposed dynamic hardware methods to increase the hardware security of a microprocessor such that the software code being run on the microprocessor can be made more secure without having to change …
Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy
Malicious And Malfunctioning Node Detection Via Observed Physical Layer Data, Tyler J. Hardy
Theses and Dissertations
There are many mechanisms that can cause inadequate or unreliable information in sensor networks. A user of the network might be interested in detecting and classifying specific sensors nodes causing these problems. Several network layer based trust methods have been developed in previous research to assess these issues; in contrast this work develops a trust protocol based on observations of physical layer data collected by the sensors. Observations of physical layer data are used for decisions and calculations, and are based on just the measurements collected by the sensors. Although this information is packaged and distributed on the network layer, …
Optical Metamaterial Design, Fabrication And Test, Jack P. Lombardi
Optical Metamaterial Design, Fabrication And Test, Jack P. Lombardi
Theses and Dissertations
Metamaterials, materials that make use of naturally occurring materials and designed structures to create materials with special properties not found in nature, are a fascinating new area of research, combining the fields of physics, microfabrication, and material science. This work will focus on the development of metamaterials operating in the visible and infrared which will be constructed and tested for basic optical properties. Possible applications for these materials will not be investigated. The this work will go into the fabrication and test of layered metal-dielectric structures, called layered metamaterials, as these structures hold potential for applications in advanced optical systems. …
An Architecture For Improving Timeliness And Relevance Of Cyber Incident Notifications, James L. Miller
An Architecture For Improving Timeliness And Relevance Of Cyber Incident Notifications, James L. Miller
Theses and Dissertations
This research proposes a communications architecture to deliver timely and relevant cyber incident notifications to dependent mission stakeholders. This architecture, modeled in Unified Modeling Language (UML), eschews the traditional method of pushing notifications via message as dictated in Air Force Instruction 33-138. It instead shifts to a pull or publish and subscribe method of making notifications. Shifting this paradigm improves the notification process by empowering mission owners to identify those resources on which they depend for mission accomplishment, provides a direct conduit between providing and dependent mission owners for notifications when an incident occurs, and provides a shared representation for …
Kernelized Locality-Sensitive Hashing For Fast Image Landmark Association, Mark A. Weems
Kernelized Locality-Sensitive Hashing For Fast Image Landmark Association, Mark A. Weems
Theses and Dissertations
As the concept of war has evolved, navigation in urban environments where GPS may be degraded is increasingly becoming more important. Two existing solutions are vision-aided navigation and vision-based Simultaneous Localization and Mapping (SLAM). The problem, however, is that vision-based navigation techniques can require excessive amounts of memory and increased computational complexity resulting in a decrease in speed. This research focuses on techniques to improve such issues by speeding up and optimizing the data association process in vision-based SLAM. Specifically, this work studies the current methods that algorithms use to associate a current robot pose to that of one previously …
An Analytical Model Of Nanometer Scale Viscoelastic Properties Of Polymer Surfaces Measured Using An Atomic Force Microscope, Jacob B. Goldberg
An Analytical Model Of Nanometer Scale Viscoelastic Properties Of Polymer Surfaces Measured Using An Atomic Force Microscope, Jacob B. Goldberg
Theses and Dissertations
The United States Air Force and the Department of Defense is increasingly interested in nanomaterials. To study these materials, one needs to measure the mechanics of materials on the nanoscale. Over the past few decades the atomic force microscope (AFM) has been used in various methods to establish local surface properties at the nanoscale. In particular, surface elasticity measurements are crucial to understanding nanoscale surface properties. Problems arise, however, when measuring soft surfaces such as polymers and biological specimens, because these materials have a more complex viscoelastic response. This research focuses on modeling an AFM dynamic nanoindentation experiment intended to …
Measuring The Utility Of A Cyber Incident Mission Impact Assessment (Cimia) Process For Mission Assurance, Christy L. Peterson
Measuring The Utility Of A Cyber Incident Mission Impact Assessment (Cimia) Process For Mission Assurance, Christy L. Peterson
Theses and Dissertations
Information is a critical asset on which virtually all modern organizations depend upon to meet their operational mission objectives. Military organizations, in particular, have embedded Information and Communications Technologies (ICT) into their core mission processes as a means to increase their operational efficiency, exploit automation, improve decision quality, and shorten the kill chain. However, the extreme dependence upon ICT results in an environment where a cyber incident can result in severe mission degradation, or possibly failure, with catastrophic consequences to life, limb, and property. These consequences can be minimized by maintaining real-time situational awareness of mission critical resources so appropriate …
A Multi Agent System For Flow-Based Intrusion Detection Using Reputation And Evolutionary Computation, David Hancock
A Multi Agent System For Flow-Based Intrusion Detection Using Reputation And Evolutionary Computation, David Hancock
Theses and Dissertations
The rising sophistication of cyber threats as well as the improvement of physical computer network properties present increasing challenges to contemporary Intrusion Detection (ID) techniques. To respond to these challenges, a multi agent system (MAS) coupled with flow-based ID techniques may effectively complement traditional ID systems. This paper develops: 1) a scalable software architecture for a new, self-organized, multi agent, flow-based ID system; and 2) a network simulation environment suitable for evaluating implementations of this MAS architecture and for other research purposes. Self-organization is achieved via 1) a reputation system that influences agent mobility in the search for effective vantage …
Polarimetric Enhancements To Electro-Optical Aided Navigation Techniques, Jeremiah D. Johnson
Polarimetric Enhancements To Electro-Optical Aided Navigation Techniques, Jeremiah D. Johnson
Theses and Dissertations
Navigation in indoor and urban environments by small unmanned systems is a topic of interest for the Air Force. The Advanced Navigation Technology Center at the Air Force Institute of Technology is continually looking for novel approaches to navigation in GPS deprived environments. Inertial sensors have been coupled with image aided concepts, such as feature tracking, with good results. However, feature density in areas with large, flat, smooth surfaces tends to be low. Polarimetric sensors have been used for surface reconstruction, surface characterization and outdoor navigation. This thesis combines aspects of some of these algorithms along with a realistic, micro-facet …
Spear Phishing Attack Detection, David T. Merritt
Spear Phishing Attack Detection, David T. Merritt
Theses and Dissertations
This thesis addresses the problem of identifying email spear phishing attacks, which are indicative of cyber espionage. Spear phishing consists of targeted emails sent to entice a victim to open a malicious file attachment or click on a malicious link that leads to a compromise of their computer. Current detection methods fail to detect emails of this kind consistently. The SPEar phishing Attack Detection system (SPEAD) is developed to analyze all incoming emails on a network for the presence of spear phishing attacks. SPEAD analyzes the following file types: Windows Portable Executable and Common Object File Format (PE/COFF), Adobe Reader, …
Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen
Evaluating Information Assurance Control Effectiveness On An Air Force Supervisory Control And Data Acquisition (Scada) System, Jason R. Nielsen
Theses and Dissertations
Supervisory Control and Data Acquisition (SCADA) systems are increasingly being connected to corporate networks which has dramatically expanded their attack surface to remote cyber attack. Adversaries are targeting these systems with increasing frequency and sophistication. This thesis seeks to answer the research question addressing which Information Assurance (IA) controls are most significant for network defenders and SCADA system managers/operators to focus on in order to increase the security of critical infrastructure systems against a Stuxnet-like cyber attack. This research applies the National Institute of Science and Technology (NIST) IA controls to an attack tree modeled on a remote Stuxnet-like cyber …
Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling, Ryan T. Ostler
Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling, Ryan T. Ostler
Theses and Dissertations
Due to the growing sophisticated capabilities of advanced persistent cyber threats, it is necessary to understand and accurately assess cyber attack damage to digital assets. This thesis proposes a Defensive Cyber Battle Damage Assessment (DCBDA) process which utilizes the comprehensive understanding of all possible cyber attack methodologies captured in a Cyber Attack Methodology Exhaustive List (CAMEL). This research proposes CAMEL to provide detailed knowledge of cyber attack actions, methods, capabilities, forensic evidence and evidence collection methods. This product is modeled as an attack tree called the Cyber Attack Methodology Attack Tree (CAMAT). The proposed DCBDA process uses CAMAT to analyze …