Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Air Force Institute of Technology

Theses and Dissertations

2010

Discipline
Keyword

Articles 1 - 30 of 84

Full-Text Articles in Physical Sciences and Mathematics

Tunable Optical Delay In Doppler-Broadened Cesium Vapor, Monte D. Anderson Dec 2010

Tunable Optical Delay In Doppler-Broadened Cesium Vapor, Monte D. Anderson

Theses and Dissertations

Variable-delay tunable optical delay line or optical buffers are critical for the development of all-optical networks components as well as interferometry and analytic instruments. Recent research on slow light may hold the key for the development of the first practical tunable optical delay device. In this research the linear dispersion delay effects in an alkali vapor. The hyperfine relaxation observations present insight into the complex bleach wave dynamics during a high-intensity pulsed pump in DPAL systems.


Scattering Matrix Elements For The Nonadiabatic Collision B (2PJ) + H2 (1Σ+G, Ν, Ј) ↔ B (2PJ’) + H2 (1Σ+G, Ν’, J’), Luke A. Barger Dec 2010

Scattering Matrix Elements For The Nonadiabatic Collision B (2PJₐ) + H2 (1Σ+G, Ν, Ј) ↔ B (2PJ’ₐ) + H2 (1Σ+G, Ν’, J’), Luke A. Barger

Theses and Dissertations

Scattering matrix elements are calculated for the nonadiabatic inelastic collision B (2Pj) + H2 (1Σ+g, ν, ј) ↔ B (2Pj’) + H2 (1Σ+g, ν’, j’). This calculation utilizes the effective potential energy surfaces for this collision generated by Garvin along with a correction to the asymptotic H2 potential. Wavepackets are propagated on these surfaces using a split-operator propagator. This propagation yields correlation functions between reactant and product Møller states which are used to calculate the scattering …


Cyber Situational Awareness Using Live Hypervisor-Based Virtual Machine Introspection, Dustyn A. Dodge Sep 2010

Cyber Situational Awareness Using Live Hypervisor-Based Virtual Machine Introspection, Dustyn A. Dodge

Theses and Dissertations

In this research, a compiled memory analysis tool for virtualization (CMAT-V) is developed as a virtual machine introspection (VMI) utility to conduct live analysis during cyber attacks. CMAT-V leverages static memory dump analysis techniques to provide live dynamic system state data. Unlike some VMI applications, CMAT-V bridges the semantic gap using derivation techniques. CMAT-V detects Windows-based operating systems and uses the Microsoft Symbol Server to provide this context to the user. This research demonstrates the usefulness of CMAT-V as a situational awareness tool during cyber attacks, tests the detection of CMAT-V from the guest system level and measures its impact …


Collisional Dynamics Of The Cesium D1 And D2 Transitions, Greg A. Pitz Sep 2010

Collisional Dynamics Of The Cesium D1 And D2 Transitions, Greg A. Pitz

Theses and Dissertations

The collisional dynamics of the 62P levels in cesium have been studied utilizing steady state laser absorption and laser induced florescence techniques. In addition the production of a blue beam produced by two photon absorption has been observed in potassium. The collisional broadening rate for cesium, λL, for He, Ne, Ar, Kr, Xe, N2, H2, HD, D2, CH4, C2H6, CF4, and 3He are 24.13, 10.85, 18.31, 17.82, 19.74, 16.64, 20.81, 20.06, 18.04, 29.00, 26.70, 18.84, and 26.00 MHz/torr, respectively for the …


A Comparative Analysis Of Ascii And Xml Logging Systems, Eric C. Hanington Sep 2010

A Comparative Analysis Of Ascii And Xml Logging Systems, Eric C. Hanington

Theses and Dissertations

This research compares XML and ASCII based event logging systems in terms of their storage and processing efficiency. XML has been an emerging technology, even for security. Therefore, it is researched as a logging system with the mitigation of its verbosity. Each system consists of source content, the network transmission, database storage, and querying which are all studied as individual parts. The ASCII logging system consists of the text file as source, FTP as transport, and a relational database system for storage and querying. The XML system has the XML files and XML files in binary form using Efficient XML …


Laser Demonstration And Performance Characterization Of An Optically Pumped Alkali Laser System, Clifford V. Sulham Sep 2010

Laser Demonstration And Performance Characterization Of An Optically Pumped Alkali Laser System, Clifford V. Sulham

Theses and Dissertations

Diode Pumped Alkali Lasers (DPALs) offer a promising approach for high power lasers in military applications that will not suffer from the long logistical trails of chemical lasers or the thermal management issues of diode pumped solid state lasers. This research focuses on characterizing a DPAL-type system to gain a better understanding of using this type of laser as a directed energy weapon. A rubidium laser operating at 795 nm is optically pumped by a pulsed titanium sapphire laser to investigate the dynamics of DPALs at pump intensities between 1.3 and 45 kW/cm2. Linear scaling as high as …


Neural Extensions To Robust Parameter Design, Bernard Jacob Loeffelholz Sep 2010

Neural Extensions To Robust Parameter Design, Bernard Jacob Loeffelholz

Theses and Dissertations

Robust parameter design (RPD) is implemented in systems in which a user wants to minimize the variance of a system response caused by uncontrollable factors while obtaining a consistent and reliable system response over time. We propose the use of artificial neural networks to compensate for highly non-linear problems that quadratic regression fails to accurately model. RPD is conducted under the assumption that the relationship between system response and controllable and uncontrollable variables does not change over time. We propose a methodology to find a new set of settings that will be robust to moderate system degradation while remaining robust …


Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey Sep 2010

Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey

Theses and Dissertations

This research effort examines the theory, application, and results for a Reputation-based Internet Protocol Security (RIPSec) framework that provides security for an ad-hoc network operating in a hostile environment. In RIPSec, protection from external threats is provided in the form of encrypted communication links and encryption-wrapped nodes while internal threats are mitigated by behavior grading that assigns reputations to nodes based on their demonstrated participation in the routing process. Network availability is provided by behavior grading and round-robin multipath routing. If a node behaves faithfully, it earns a positive reputation over time. If a node misbehaves (for any number of …


Determining The Index Of Refraction Of An Unknown Object Using Passive Polarimetric Imagery Degraded By Atmospheric Turbulence, Milo W. Hyde Iv Sep 2010

Determining The Index Of Refraction Of An Unknown Object Using Passive Polarimetric Imagery Degraded By Atmospheric Turbulence, Milo W. Hyde Iv

Theses and Dissertations

In this research, an algorithm is developed to estimate the index of refraction of an unknown object using passive polarimetric images degraded by atmospheric turbulence. The algorithm uses a variant of the maximum-likelihood blind-deconvolution algorithm developed by LeMaster and Cain to recover the true object (i.e., the first Stokes parameter), the degree of linear polarization, and the polarimetric-image point spread functions. Nonlinear least squares is then used to find the value of the complex index of refraction which best fits the theoretical degree of linear polarization, derived using a polarimetric bidirectional reflectance distribution function, to the turbulence-corrected degree of linear …


Statistical Image Recovery From Laser Speckle Patterns With Polarization Diversity, Donald B. Dixon Sep 2010

Statistical Image Recovery From Laser Speckle Patterns With Polarization Diversity, Donald B. Dixon

Theses and Dissertations

This research extends the theory and understanding of the laser speckle imaging technique. This non-traditional imaging technique may be employed to improve space situational awareness and image deep space objects from a ground-based sensor system. The use of this technique is motivated by the ability to overcome aperture size limitations and the distortion effects from Earth’s atmosphere. Laser speckle imaging is a lensless, coherent method for forming two-dimensional images from their autocorrelation functions. Phase retrieval from autocorrelation data is an ill-posed problem where multiple solutions exist. This research introduces polarization diversity as a method for obtaining additional information so the …


Code White: A Signed Code Protection Mechanism For Smartphones, Joseph M. Hinson Iv Sep 2010

Code White: A Signed Code Protection Mechanism For Smartphones, Joseph M. Hinson Iv

Theses and Dissertations

This research develops Code White, a hardware-implemented trusted execution mechanism for the Symbian mobile operating system. Code White combines a signed whitelist approach with the execution prevention technology offered by the ARM architecture. Testing shows that it prevents all untrusted user applications from executing while allowing all trusted applications to load and run. Performance testing in contrast with an unmodified Symbian system shows that the difference in load time increases linearly as the application file size increases. The predicted load time for an application with a one megabyte code section remains well below one second, ensuring uninterrupted experience for the …


Accelerating Malware Detection Via A Graphics Processing Unit, Nicholas S. Kovach Sep 2010

Accelerating Malware Detection Via A Graphics Processing Unit, Nicholas S. Kovach

Theses and Dissertations

Real-time malware analysis requires processing large amounts of data storage to look for suspicious files. This is a time consuming process that (requires a large amount of processing power) often affecting other applications running on a personal computer. This research investigates the viability of using Graphic Processing Units (GPUs), present in many personal computers, to distribute the workload normally processed by the standard Central Processing Unit (CPU). Three experiments are conducted using an industry standard GPU, the NVIDIA GeForce 9500 GT card. The goal of the first experiment is to find the optimal number of threads per block for calculating …


Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard Sep 2010

Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard

Theses and Dissertations

As malware has evolved over the years, it has gone from harmless programs that copy themselves into other executables to modern day botnets that perform bank fraud and identity theft. Modern malware often has a need to communicate back to the author, or other machines that are also infected. Several techniques for transmitting this data covertly have been developed over the years which vary significantly in their level of sophistication. This research creates a new covert channel technique for stealing information from a network by piggybacking on user-generated network traffic. Specifically, steganography drop boxes and passive covert channels are merged …


Consistency Properties For Growth Model Parameters Under An Infill Asymptotics Domain, David T. Mills Sep 2010

Consistency Properties For Growth Model Parameters Under An Infill Asymptotics Domain, David T. Mills

Theses and Dissertations

Growth curves are used to model various processes, and are often seen in biological and agricultural studies. Underlying assumptions of many studies are that the process may be sampled forever, and that samples are statistically independent. We instead consider the case where sampling occurs in a finite domain, so that increased sampling forces samples closer together, and also assume a distance-based covariance function. We first prove that, under certain conditions, the mean parameter of a fixed-mean model cannot be estimated within a finite domain. We then numerically consider more complex growth curves, examining sample sizes, sample spacing, and quality of …


All Solid-State Mid-Ir Laser Development, Nonlinear Absorption Investigation And Laser-Induced Damage Study, Torrey J. Wagner Sep 2010

All Solid-State Mid-Ir Laser Development, Nonlinear Absorption Investigation And Laser-Induced Damage Study, Torrey J. Wagner

Theses and Dissertations

In this research, nonlinear optical absorption coefficients and laser-induced damage thresholds are measured in Ge and GaSb, which are materials that are used in IR detectors. Using a simultaneous fitting technique to extract nonlinear absorption coefficients from data at two pulse widths, two-photon and free-carrier absorption coefficients are measured in Ge and GaSb at 2.05 and 2.5 μm for the first time. At these wavelengths, nonlinear absorption is the primary damage mechanism, and damage thresholds at picosecond and nanosecond pulse widths were measured and agreed well with modeled thresholds using experimentally measured parameters. The damage threshold for a single-layer Al …


Electronic Structure Of Lithium Tetraborate, David J. Wooten Jun 2010

Electronic Structure Of Lithium Tetraborate, David J. Wooten

Theses and Dissertations

Due to interest as neutron detection material, an investigation of Li2B4O7(110) and Li2B4O7(100) was undertaken, utilizing photoemission and inverse photoemission spectroscopic techniques. The measured band gap depended on crystallographic direction with the band gaps ranging from 8.9±0.5 eV to 10.1±0.5 eV. The measurement yielded a density of states that qualitatively agreed with the theoretical results from model bulk band structure calculations for Li2B4O7; albeit with a larger band gap than predicted, but consistent with the known deficiencies of LDA and DFT calculations. …


The Combined Effects Of Radio Frequency And Gamma Irradiation On P-Channel Mosfets, Joshua D. Daniel Jun 2010

The Combined Effects Of Radio Frequency And Gamma Irradiation On P-Channel Mosfets, Joshua D. Daniel

Theses and Dissertations

The purpose of this research was to investigate the combined effects of continuous gigahertz radio frequency signals and gamma irradiation on the threshold voltage of metal oxide semiconductor field effect transistors. The combined effects of gigahertz radio frequency waves and gamma irradiation on electronics presents a new challenge in electronic warfare and little is known of the combined effect on threshold voltage damage and recovery. The Fairchild NDS352AP, a commonly used commercial device, was irradiated by a cobalt-60 source under a +5 V bias with and without a radio frequency signal applied to the gate. The threshold voltage was measured …


Deterministic, Efficient Variation Of Circuit Components To Improve Resistance To Reverse Engineering, Daniel F. Koranek Jun 2010

Deterministic, Efficient Variation Of Circuit Components To Improve Resistance To Reverse Engineering, Daniel F. Koranek

Theses and Dissertations

This research proposes two alternative methods for generating semantically equivalent circuit variants which leave the circuit's internal structure pseudo-randomly determined. Component fusion deterministically selects subcircuits using a component identification algorithm and replaces them using a deterministic algorithm that generates canonical logic forms. Component encryption seeks to alter the semantics of individual circuit components using an encoding function, but preserves the overall circuit semantics by decoding signal values later in the circuit. Experiments were conducted to examine the performance of component fusion and component encryption against representative trials of subcircuit selection-and-replacement and Boundary Blurring, two previously defined methods for circuit obfuscation. …


Developing A Hybrid Virtualization Platform Design For Cyber Warfare And Simulation, Kyle E. Stewart Jun 2010

Developing A Hybrid Virtualization Platform Design For Cyber Warfare And Simulation, Kyle E. Stewart

Theses and Dissertations

Virtualization is a technique used to model and simulate the cyber domain, as well as train and educate. Different types of virtualization techniques exist that each support a unique set of benefits and requirements. This research proposes a novel design that incorporates host and network virtualization concepts for a cyber warfare training platform. At the host level, hybrid virtualization combines full and operating system virtualization techniques in order to leverage the benefits and minimize the drawbacks of each individual technique. Network virtualization allows virtual machines to connect in flexible topologies, but it also incurs additional processing overhead. Quantitative analysis falls …


An Application Of Automated Theorem Provers To Computer System Security: The Schematic Protection Model, Mitchell D.I. Hirschfeld Jun 2010

An Application Of Automated Theorem Provers To Computer System Security: The Schematic Protection Model, Mitchell D.I. Hirschfeld

Theses and Dissertations

The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology File System schemes are proven. Arbitrary systems can be specified in SPM and analyzed. This is the first known automated analysis of SPM specifications in a theorem prover. The SPM specification was created in such a way that new specifications share the underlying framework and are configurable within the specifications file alone. This allows new specifications to be created with ease as demonstrated by the four unique models included within this document. This also allows future users to more easily specify models without recreating the …


Realistic Vertical Atmospheric Profiles And Effects From Limited Surface Observations, Dane P. Ranney Jun 2010

Realistic Vertical Atmospheric Profiles And Effects From Limited Surface Observations, Dane P. Ranney

Theses and Dissertations

The ability to accurately describe the atmospheric conditions around us is not only important to the Air Force, but to anyone involved in signal propagation. The programs currently utilized to describe the atmosphere take into account a variety of measures. The LEEDR (Laser Environmental Effects Definition and Reference) program in particular, allows the user to select a location, aerosol and molecular effects model, numerous cloud and precipitation events, as well as other features. Even with the control that the user has, the output that the program provides can vary from actual conditions on a day to day basis. This is …


Maximizing Strike Planning Efficiency For A Given Class Of Targets, Necip Dirik Mar 2010

Maximizing Strike Planning Efficiency For A Given Class Of Targets, Necip Dirik

Theses and Dissertations

Strike planning is one of the fundamental tasks of the Turkish Air Force and involves assignment of strike aircraft to targets with a maximum level of efficiency. Therefore, planning an optimal strike plan based on the preferences of the decision maker is crucial. The efficiency of the strike plan in this research implies attacking the maximum number of targets while considering target priority and the desired level of damage on each target. Another objective is to minimize the cost of the plan. This research develops an exact model that maximizes the efficiency of the strike plan using LINGO with Excel …


Developing A Qualia-Based Multi-Agent Architecture For Use In Malware Detection, Bobby D. Birrer Mar 2010

Developing A Qualia-Based Multi-Agent Architecture For Use In Malware Detection, Bobby D. Birrer

Theses and Dissertations

Detecting network intruders and malicious software is a significant problem for network administrators and security experts. New threats are emerging at an increasing rate, and current signature and statistics-based techniques are not keeping pace. Intelligent systems that can adapt to new threats are needed to mitigate these new strains of malware as they are released. This research detects malware based on its qualia, or essence rather than its low-level implementation details. By looking for the underlying concepts that make a piece of software malicious, this research avoids the pitfalls of static solutions that focus on predefined bit sequence signatures or …


Economic Feasibility Of Installing An Anaerobic Digester On A Department Of Defense Installation, Russell A. Strange Mar 2010

Economic Feasibility Of Installing An Anaerobic Digester On A Department Of Defense Installation, Russell A. Strange

Theses and Dissertations

Improving technology has made anaerobic digestion a viable method for disposing of organic waste and creating alternative energy. The purpose of this research was to examine the feasibility of installing an anaerobic digester on a Department of Defense installation, and measure its contribution to the execution of Executive Order 13423. A present worth equation was derived in accordance with 10 Code of Federal Regulations 436 expressing viable costs and benefits of an anaerobic digester. A case study of Wright Patterson Air Force Base (WPAFB) was then presented using the derived equation and operational data from functional digesters in the Ohio …


Positron Annihilation Ratio Spectroscopy (Psars) Applied To Positronium Formation Studies, Robert C. Slaughter Mar 2010

Positron Annihilation Ratio Spectroscopy (Psars) Applied To Positronium Formation Studies, Robert C. Slaughter

Theses and Dissertations

A Positron Annihilation of Radiation Spectrometer (PsARS) was developed and characterized. PsARS spectroscopy as well as digital Positron Annihilation Lifetime Spectroscopy (PALS) was applied to measure positronium formation on gold nanoparticles deposited through an evaporative method onto a thin capillary tube. This gold coated capillary tube was designed to be used for positronium lifetime studies in local electric field experiments. High local electric fields can polarize a positron-electron pair, which may result in an extended lifetime of the positron. These fields may be created through the interaction of an external electric field with silver nanoparticles deposited onto the surface of …


Screening And Sufficiency In Multiobjective Decision Problems With Large Alternative Sets, Michael D. Cote Mar 2010

Screening And Sufficiency In Multiobjective Decision Problems With Large Alternative Sets, Michael D. Cote

Theses and Dissertations

Portfolio selection problems with combinatorially-large alternative sets can be impossible to evaluate precisely on a reasonable timescale. When portfolios require complex modeling for performance assessment, prohibitive computational processing times can result. Eliminating a small number of alternatives through an intelligent screening process can greatly reduce the number of alternative combinations, thereby decreasing a problem's evaluation time and cost. A methodology was developed for the class of hierarchical portfolio selection problems in which multiple objectives are all judged on the same sub-objectives. First, a novel capability-based alternative screening process was devised to identify and remove poor alternatives, thereby reducing the number …


Environmental Life Cycle Assessment Of Coal-Biomass To Liquid Jet Fuel Compared To Petroleum-Derived Jp-8 Jet Fuel, Wayne C. Kinsel Mar 2010

Environmental Life Cycle Assessment Of Coal-Biomass To Liquid Jet Fuel Compared To Petroleum-Derived Jp-8 Jet Fuel, Wayne C. Kinsel

Theses and Dissertations

The United States (U.S.) imported 57% of the petroleum products that it consumed in 2008. The Department of Defense (DOD) and in particular, the United States Air Force (USAF), consumes a large amount of oil to support the mission of defending the U.S. According to the USAF energy policy, by 2016, the Air Force (AF) must be prepared to cost competitively acquire 50% of its domestic aviation fuel requirement via an alternative fuel blend in which the alternative component is derived from domestic sources produced in a manner that is “greener” than fuels produced from conventional petroleum. This study employed …


Three Dimensional Positron Annihilation Momentum Measurement Technique (3dpamm) Applied To Measure Oxygen-Atom Defects In 6h Silicon Carbide, Christopher S. Williams Mar 2010

Three Dimensional Positron Annihilation Momentum Measurement Technique (3dpamm) Applied To Measure Oxygen-Atom Defects In 6h Silicon Carbide, Christopher S. Williams

Theses and Dissertations

A three-dimensional Positron Annihilation Spectroscopy System (3DPASS) capable to simultaneously measure three-dimensional electron-positron (e--e+) momentum densities measuring photons derived from e--e+ annihilation events was designed and characterized. 3DPASS simultaneously collects a single data set of correlated energies and positions for two coincident annihilation photons using solid-state double-sided strip detectors (DSSD). Positions of photons were determined using an interpolation method which measures a figure-of-merit proportional to the areas of transient charges induced on both charge collection strips directly adjacent to the charge collection strips interacting with the annihilation photons. The subpixel resolution was measured for both double-sided strip detectors (DSSD) and …


Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai Mar 2010

Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai

Theses and Dissertations

Insider threats can pose a great risk to organizations and by their very nature are difficult to protect against. Auditing and system logging are capabilities present in most operating systems and can be used for detecting insider activity. However, current auditing methods are typically applied in a haphazard way, if at all, and are not conducive to contributing to an effective insider threat security policy. This research develops a methodology for designing a customized auditing and logging template for a Linux operating system. An intent-based insider threat risk assessment methodology is presented to create use case scenarios tailored to address …


Coalition Formation Under Uncertainty, Daylond J. Hooper Mar 2010

Coalition Formation Under Uncertainty, Daylond J. Hooper

Theses and Dissertations

Many multiagent systems require allocation of agents to tasks in order to ensure successful task execution. Most systems that perform this allocation assume that the quantity of agents needed for a task is known beforehand. Coalition formation approaches relax this assumption, allowing multiple agents to be dynamically assigned. Unfortunately, many current approaches to coalition formation lack provisions for uncertainty. This prevents application of coalition formation techniques to complex domains, such as real-world robotic systems and agent domains where full state knowledge is not available. Those that do handle uncertainty have no ability to handle dynamic addition or removal of agents …