Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Physical Sciences and Mathematics

Quad General Tree Drawing Algorithm And General Trees Characterization: Towards An Environment For The Experimental Study On General Tree Drawing Algorithms, Chu Yao Dec 2008

Quad General Tree Drawing Algorithm And General Trees Characterization: Towards An Environment For The Experimental Study On General Tree Drawing Algorithms, Chu Yao

Theses and Dissertations

Information visualization produces (interactive) visual representations of abstract data to reinforce human cognition and perception; thus enabling the viewer to gain knowledge about the internal structure of the data and causal relationships in it. The visualization of information hierarchies is concerned with the presentation of abstract hierarchical information about relationships between various entities. It has many applications in diverse domains such as software engineering, information systems, biology, and chemistry. Information hierarchies are typically modeled by an abstract tree, where vertices are entities and edges represent relationships between entities. The aim of visualizing tree drawings is to automatically produce drawings of …


Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire Dec 2008

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire

Theses and Dissertations

Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …


Nondestructive Evaluation Of Aircraft Composites Using Terahertz Time Domain Spectroscopy, Christopher D. Stoik Dec 2008

Nondestructive Evaluation Of Aircraft Composites Using Terahertz Time Domain Spectroscopy, Christopher D. Stoik

Theses and Dissertations

Terahertz (THz) time domain spectroscopy (TDS) was assessed as a nondestructive evaluation technique for aircraft composites. Material properties of glass fiber composite were measured using both transmission and reflection configuration. The interaction of THz with a glass fiber composite was then analyzed, including the effects of scattering, absorption, and the index of refraction, as well as effective medium approximations. THz TDS, in both transmission and reflection configuration, was used to study composite damage, including voids, delaminations, mechanical damage, and heat damage. Measurement of the material properties on samples with localized heat damage showed that burning did not change the refractive …


A Confidence Paradigm For Classification Systems, Nathan J. Leap Sep 2008

A Confidence Paradigm For Classification Systems, Nathan J. Leap

Theses and Dissertations

There is no universally accepted methodology to determine how much confidence one should have in a classifier output. This research proposes a framework to determine the level of confidence in an indication from a classifier system where the output is or can be transformed into a posterior probability estimate. This is a theoretical framework that attempts to unite the viewpoints of the classification system developer (or engineer) and the classification system user (or war-fighter). The paradigm is based on the assumptions that the system confidence acts like, or can be modeled as a value and that indication confidence can be …


Predicting The Longevity Of Dvdr Media By Periodic Analysis Of Parity, Jitter, And Ecc Performance Parameters, Daniel Patrick Wells Jul 2008

Predicting The Longevity Of Dvdr Media By Periodic Analysis Of Parity, Jitter, And Ecc Performance Parameters, Daniel Patrick Wells

Theses and Dissertations

For the last ten years, DVD-R media have played an important role in the storage of large amounts of digital data throughout the world. During this time it was assumed that the DVD-R was as long-lasting and stable as its predecessor, the CD-R. Several reports have surfaced over the last few years questioning the DVD-R's ability to maintain many of its claims regarding archival quality life spans. These reports have shown a wide range of longevity between the different brands. While some DVD-Rs may last a while, others may result in an early and unexpected failure. Compounding this problem is …


Material Perturbations To Enhance Performance Of The Theile Half-Width Leaky Mode Antenna, Jason A. Girard Jun 2008

Material Perturbations To Enhance Performance Of The Theile Half-Width Leaky Mode Antenna, Jason A. Girard

Theses and Dissertations

Microstrip traveling-wave antennas, often referred to as leaky-wave antennas, have been shown to radiate when the dominant or fundamental mode is suppressed and the first higher-order mode is excited. One such microstrip variation is the Thiele Half-Width (THW) antenna, which operates from 5.9 - 8.2 GHz for this research. Increasing the bandwidth over which the THW antenna radiates is desired, as is a fundamental understanding of the propagation characteristics over this region. This dissertation seeks to vary or perturb the material and physical properties of the THW antenna, including strip-width variations and modifications of the substrate layer, to achieve these …


A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko Jun 2008

A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko

Theses and Dissertations

With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration. The United States Department of Defense’s (DoD) Network-Centric Enterprise Services initiative, along with the notion of pushing the “power to the edge,” aims to provide end-users with maximum situational awareness, a comprehensive view of the battlespace, all within a secure networking environment. Building from previous AFIT research efforts, this research developed a novel security framework architecture to address the lack of efficient and scalable secure multicasting in the low earth orbit …


Statistical Methods For Image Registration And Denoising, Matthew D. Sambora Jun 2008

Statistical Methods For Image Registration And Denoising, Matthew D. Sambora

Theses and Dissertations

This dissertation describes research into image processing techniques that enhance military operational and support activities. The research extends existing work on image registration by introducing a novel method that exploits local correlations to improve the performance of projection-based image registration algorithms. The dissertation also extends the bounds on image registration performance for both projection-based and full-frame image registration algorithms and extends the Barankin bound from the one-dimensional case to the problem of two-dimensional image registration. It is demonstrated that in some instances, the Cramer-Rao lower bound is an overly-optimistic predictor of image registration performance and that under some conditions, the …


An Analysis Of Botnet Vulnerabilities, Sean W. Hudson Jun 2008

An Analysis Of Botnet Vulnerabilities, Sean W. Hudson

Theses and Dissertations

Botnets are a significant threat to computer networks and data stored on networked computers. The ability to inhibit communication between servers controlling the botnet and individual hosts would be an effective countermeasure. The objective of this research was to find vulnerabilities in Unreal IRCd that could be used to shut down the server. Analysis revealed that Unreal IRCd is a very mature and stable IRC server and no significant vulnerabilities were found. While this research does not eliminate the possibility that a critical vulnerability is present in the Unreal IRCd software, none were identified during this effort.


Tightly Integrating Optical And Inertial Sensors For Navigation Using The Ukf, Sedat Ebcin Mar 2008

Tightly Integrating Optical And Inertial Sensors For Navigation Using The Ukf, Sedat Ebcin

Theses and Dissertations

The motivation of this research is to address the benefits of tightly integrating optical and inertial sensors where GNSS signals are not available. The research begins with describing the navigation problem. Then, error and measurement models are presented. Given a set of features, a feature detection and projection algorithm is developed which utilizes inertial measurements to predict vectors in the feature space between images. The unscented Kalman filter is applied to the navigation system using the inertial measurements and feature matches to estimate the navigation trajectory. Finally, the image-aided navigation algorithm is tested using a simulation and an experiment. As …


Improving Mixed Variable Optimization Of Computational And Model Parameters Using Multiple Surrogate Functions, David Bethea Mar 2008

Improving Mixed Variable Optimization Of Computational And Model Parameters Using Multiple Surrogate Functions, David Bethea

Theses and Dissertations

This research focuses on reducing computational time in parameter optimization by using multiple surrogates and subprocess CPU times without compromising the quality of the results. This is motivated by applications that have objective functions with expensive computational times at high fidelity solutions. Applying, matching, and tuning optimization techniques at an algorithm level can reduce the time spent on unprofitable computations for parameter optimization. The objective is to recover known parameters of a flow property reference image by comparing to a template image that comes from a computational fluid dynamics simulation, followed by a numerical image registration and comparison process. Mixed …


Demonstration Of A Strategy To Perform Two-Dimensional Diode Laser Tomography, Ryan N. Givens Mar 2008

Demonstration Of A Strategy To Perform Two-Dimensional Diode Laser Tomography, Ryan N. Givens

Theses and Dissertations

Demonstration of a strategy to perform two-dimensional diode laser tomography using a priori knowledge from symmetry arguments and computational fluid dynamic (CFD) calculations is presented for a flat flame burner. The strategy uses an optimization technique to determine flame diameter and location using a vector quantization approach. Next, the variance in a training set, produced from CFD calculations, is captured using principal components analysis. The information in the training set allows interpolation between beam paths resulting in temperature and density maps. Finally, the TDLAS temperature and density maps are shown to agree with traditional thermocouple measurements of the flat flame …


Composable Distributed Access Control And Integrity Policies For Query-Based Wireless Sensor Networks, David W. Marsh Mar 2008

Composable Distributed Access Control And Integrity Policies For Query-Based Wireless Sensor Networks, David W. Marsh

Theses and Dissertations

An expected requirement of wireless sensor networks (WSN) is the support of a vast number of users while permitting limited access privileges. While WSN nodes have severe resource constraints, WSNs will need to restrict access to data, enforcing security policies to protect data within WSNs. To date, WSN security has largely been based on encryption and authentication schemes. WSN Authorization Specification Language (WASL) is specified and implemented using tools coded in JavaTM. WASL is a mechanism{independent policy language that can specify arbitrary, composable security policies. The construction, hybridization, and composition of well{known security models is demonstrated and shown to preserve …


Risk-Based Comparison Of Classification Systems, Seth B. Wagenman Mar 2008

Risk-Based Comparison Of Classification Systems, Seth B. Wagenman

Theses and Dissertations

Performance measures for families of classification system families that rely upon the analysis of receiver operating characteristics (ROCs), such as area under the ROC curve (AUC), often fail to fully address the issue of risk, especially for classification systems involving more than two classes. For the general case, we denote matrices of class prevalences, costs, and class-conditional probabilities, and assume costs are subjectively fixed, acceptable estimates for expected values of class-conditional probabilities exist, and mutual independence between a variable in one such matrix and those of any other matrix. The ROC Risk Functional (RRF), valid for any finite number of …


Digital Signal Processing Leveraged For Intrusion Detection, Theodore J. Erickson Mar 2008

Digital Signal Processing Leveraged For Intrusion Detection, Theodore J. Erickson

Theses and Dissertations

This thesis describes the development and evaluation of a novel system called the Network Attack Characterization Tool (NACT). The NACT employs digital signal processing to detect network intrusions, by exploiting the Lomb-Scargle periodogram method to obtain a spectrum for sampled network traffic. The Lomb-Scargle method for generating a periodogram allows for the processing of unevenly sampled network data. This method for determining a periodogram has not yet been used for intrusion detection. The spectrum is examined to determine if features exist above a significance level chosen by the user. These features are considered an attack, triggering an alarm. Two traffic …


Signal Processing Design Of Low Probability Of Intercept Waveforms, Nathaniel C. Liefer Mar 2008

Signal Processing Design Of Low Probability Of Intercept Waveforms, Nathaniel C. Liefer

Theses and Dissertations

This thesis investigates a modification to Differential Phase Shift Keyed (DPSK) modulation to create a Low Probability of Interception/Exploitation (LPI/LPE) communications signal. A pseudorandom timing offset is applied to each symbol in the communications stream to intentionally create intersymbol interference (ISI) that hinders accurate symbol estimation and bit sequence recovery by a non-cooperative receiver. Two cooperative receiver strategies are proposed to mitigate the ISI due to symbol timing offset: a modified minimum Mean Square Error (MMSE) equalization algorithm and a multiplexed bank of equalizer filters determined by an adaptive Least Mean Square (LMS) algorithm. Both cooperative receivers require some knowledge …


Hardware Algorithm Implementation For Mission Specific Processing, Jason W. Shirley Mar 2008

Hardware Algorithm Implementation For Mission Specific Processing, Jason W. Shirley

Theses and Dissertations

There is a need to expedite the process of designing military hardware to stay ahead of the adversary. The core of this project was to build reusable, synthesizeable libraries to make this a possibility. In order to build these libraries, Matlab® commands and functions, such as Conv2, Round, Floor, Pinv, etc., had to be converted into reusable VHDL modules. These modules make up reusable libraries for the Mission Specific Process (MSP) which will support AFRL/RY. The MSP allows the VLSI design process to be completed in a mere matter of days or months using an FPGA or ASIC design, as …