Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Theses and Dissertations

2005

Discipline
Keyword

Articles 31 - 58 of 58

Full-Text Articles in Physical Sciences and Mathematics

National Security Agency (Nsa) Systems And Network Attack Center (Snac) Security Guides Versus Known Worms, Matthew W. Sullivan Mar 2005

National Security Agency (Nsa) Systems And Network Attack Center (Snac) Security Guides Versus Known Worms, Matthew W. Sullivan

Theses and Dissertations

Internet worms impact Internet security around the world even though there are many defenses to prevent the damage they inflict. The National Security Agency (NSA) Systems and Network Attack Center (SNAC) publishes in-depth configuration guides to protect networks from intrusion; however, the effectiveness of these guides in preventing the spread of worms hasn't been studied. This thesis establishes how well the NSA SNAC guides protect against various worms and exploits compared to Microsoft patches alone. It also identifies the aspects of the configuration guidance that is most effective in the absence of patches and updates, against network worm and e-mail …


Limitations In Time Resolved Photoluminescence Of Gallium Nitride Using A Streak Camera, Thomas R. Jost Mar 2005

Limitations In Time Resolved Photoluminescence Of Gallium Nitride Using A Streak Camera, Thomas R. Jost

Theses and Dissertations

Semiconductor performance is often characterized in terms of the rate at which its carrier recombination processes occur. Carrier recombination, including radiative, and Shockley-Read-Hall and Auger (both nonradiative), occurs at ultra-fast times in the picosecond or femtosecond regimes. A device which can measure both spectral data and temporal phenomena at this speed is the streak camera. The capability to do time-resolved spectroscopy of wide band gap semiconductors using a streak camera has been established at AFIT for the first time. Time resolved photoluminescence (TRPL) from samples of gallium nitride were measured at temperatures of 5 K over spectral bands of 36.6 …


Electro-Optic Beam Steering Using Domain Engineered Lithium Tantalate, Daren J. Chauvin Mar 2005

Electro-Optic Beam Steering Using Domain Engineered Lithium Tantalate, Daren J. Chauvin

Theses and Dissertations

The operation of a 14-channel five stage electro-optic beam steering device was studied. Beam deflection scanned from 0° to 10.1° was demonstrated. The maximum angle is within 0.3% of design. Many laser systems in operation today implement mechanical beam steering methods that are often expensive in terms of cost, weight and power. They are slow and subject to wear and vibration. A non-inertial beam scanning mechanism, such as one based on the device studied in this research could enhance the performance of these systems. The device studied here is fabricated in LiTaO3 using micro-patterned domain reversal. The 14 channels …


Modeling Groundwater Flow And Contaminant Transporting Fractured Aquifers, Jason M. Bordas Mar 2005

Modeling Groundwater Flow And Contaminant Transporting Fractured Aquifers, Jason M. Bordas

Theses and Dissertations

The hybrid discrete fracture network/equivalent porous medium (DFN/EPM) model was selected for analysis and application to simulate a contaminated site in this study. The DFN/EPM was selected because it appeared to have the potential to aid decision making by remedial project managers at contaminated DoD fractured aquifer sites. This model can use data that are typically available at a site while incorporating the important processes relevant to describing contaminant transport in a fractured medium. The model was applied to simulate the operation of a pump-and-treat remedial action at a trichloroethene-contaminated fractured aquifer at Pease AFB. The model was able to …


Assessing The Usefulness Of Visualization Tools To Investigate Hidden Patterns With Insider Attack Cases, Amy M. Rammel Mar 2005

Assessing The Usefulness Of Visualization Tools To Investigate Hidden Patterns With Insider Attack Cases, Amy M. Rammel

Theses and Dissertations

The insider threat is a major concern for organizations. Open markets, technological advances, and the evolving definition of employee have exacerbated the insider threat. Insider threat research efforts are focusing on both prevention and detection techniques. However, recent security violation trends highlight the damage insider attacks cause organizations and illuminate why organizations and researchers must develop new approaches to this challenge. Although fruitful research is being conducted and new technologies are being applied to the insider threat problem, companies remain susceptible to the costly damage generated by insider threat actions. This research explored how visualization tools may be useful in …


Daytime Detection Of Space Objects, Alistair D. Funge Mar 2005

Daytime Detection Of Space Objects, Alistair D. Funge

Theses and Dissertations

Space Situational Awareness (SSA) requires repeated object updates for orbit accuracy. Detection of unknown objects is critical. A daytime model was developed that evaluated sun flares and assessed thermal emissions from space objects. Iridium satellites generate predictable sun glints. These were used as a model baseline for daytime detections. Flares and space object thermal emissions were examined for daytime detection. A variety of geometric, material and atmospheric characteristics affected this daytime detection capability. In a photon noise limited mode, simulated Iridium flares were detected. The peak Signal-to- Noise Ratios (SNR) were 6.05e18, 9.63e5, and 1.65e7 for the nighttime, daytime and …


Determination Of Structure From Motion Using Aerial Imagery, Paul R. Graham Mar 2005

Determination Of Structure From Motion Using Aerial Imagery, Paul R. Graham

Theses and Dissertations

The structure from motion process creates three-dimensional models from a sequence of images. Until recently, most research in this field has been restricted to land-based imagery. This research examines the current methods of land-based structure from motion and evaluates their performance for aerial imagery. Current structure from motion algorithms search the initial image for features to track though the subsequent images. These features are used to create point correspondences between the two images. The correspondences are used to estimate the motion of the camera and then the three-dimensional structure of the scene. This research tests current algorithms using synthetic data …


Real-Time Mapping Using Stereoscopic Vision Optimization, Kevin M. Biggs Mar 2005

Real-Time Mapping Using Stereoscopic Vision Optimization, Kevin M. Biggs

Theses and Dissertations

This research focuses on efficient methods of generating 2D maps from stereo vision in real-time. Instead of attempting to locate edges between objects, we make the assumption that the representative surfaces of objects in a view provide enough information to generate a map while taking less time to locate during processing. Since all real-time vision processing endeavors are extremely computationally intensive, numerous optimization techniques are applied to allow for a real-time application: horizontal spike smoothing for post-disparity noise, masks to focus on close-proximity objects, melding for object synthesis, and rectangular fitting for object extraction under a planar assumption. Additionally, traditional …


Robot Mapping With Real-Time Incremental Localization Using Expectation Maximization, Kevin L. Owens Mar 2005

Robot Mapping With Real-Time Incremental Localization Using Expectation Maximization, Kevin L. Owens

Theses and Dissertations

This research effort explores and develops a real-time sonar-based robot mapping and localization algorithm that provides pose correction within the context of a single room, to be combined with pre-existing global localization techniques, and thus produce a single, well-formed map of an unknown environment. Our algorithm implements an expectation maximization algorithm that is based on the notion of the alpha-beta functions of a Hidden Markov Model. It performs a forward alpha calculation as an integral component of the occupancy grid mapping procedure using local maps in place of a single global map, and a backward beta calculation that considers the …


A Three Dimensional Helmet Mounted Primary Flight Reference For Paratroopers, Jason I. Thompson Mar 2005

A Three Dimensional Helmet Mounted Primary Flight Reference For Paratroopers, Jason I. Thompson

Theses and Dissertations

This thesis seeks to develop a Heads Up Display (HUD) presented on a Helmet Mounted Display (HMD), which presents a three-dimensional, graphical, predictive navigational reference to a paratrooper during a High Altitude, High Opening (HAHO) parachute jump. A Path Generating Algorithm (PGA) takes as input the Landing Zone's (LZ) location, the wind profile, and the paratrooper's parachute's performance characteristics, and returns a set of waypoints for the paratrooper to follow. The PGA attempts to maximize the distance that the paratrooper travels. The PGA's output is used to build a path to the LZ from a Release Point (RP). During the …


Efficient Generation Of Social Network Data From Computer-Mediated Communication Logs, Jason Wei Sung Yee Mar 2005

Efficient Generation Of Social Network Data From Computer-Mediated Communication Logs, Jason Wei Sung Yee

Theses and Dissertations

The insider threat poses a significant risk to any network or information system. A general definition of the insider threat is an authorized user performing unauthorized actions, a broad definition with no specifications on severity or action. While limited research has been able to classify and detect insider threats, it is generally understood that insider attacks are planned, and that there is a time period in which the organization's leadership can intervene and prevent the attack. Previous studies have shown that the person's behavior will generally change, and it is possible that social network analysis could be used to observe …


Analysis Of Effects Of Bgp Black Hole Routing On A Network Like The Niprnet, Michael D. Kleffman Mar 2005

Analysis Of Effects Of Bgp Black Hole Routing On A Network Like The Niprnet, Michael D. Kleffman

Theses and Dissertations

The Department of Defense (DoD) relies heavily on the Non-secure Internet Protocol Router Network (NIPRNET) to exchange information freely between departments, services, bases, posts, and ships. The NIPRNET is vulnerable to various attacks, to include physical and cyber attacks. One of the most frequently used cyber attacks by criminally motivated hackers is a Distributed Denial of Service (DDoS) attack. DDoS attacks can be used to exhaust network bandwidth and router processing capabilities, and as a leveraging tool for extortion. Border Gateway Protocol (BGP) black hole routing is a responsive defensive network technique for mitigating DDoS attacks. BGP black hole routing …


Deep Level Defects In Electron-Irradiated Aluminum Gallium Nitride Grown By Molecular Beam Epitaxy, Michael R. Hogsed Mar 2005

Deep Level Defects In Electron-Irradiated Aluminum Gallium Nitride Grown By Molecular Beam Epitaxy, Michael R. Hogsed

Theses and Dissertations

Aluminum gallium nitride (AlGaN)-based devices are attractive candidates for integration into future Air Force communication and sensor platforms, including those that must operate in harsh radiation environments. In this study, the electrical and optical properties of 1.0 MeV electron irradiated n-AlxGa1-xN are characterized for aluminum mole fraction x = 0.0 to 0.3 using deep level transient spectroscopy (DLTS), temperature-dependent Hall, and cathodoluminescence (CL) measurements. Following irradiation of the AlGaN, it is found that four different electron traps are created, having energy levels within 0.4 eV below the conduction band edge. Three of these traps correspond to …


Modeling The Infrared Intensity Of A Large Commercial Aircraft, Ruben Martinez Mar 2005

Modeling The Infrared Intensity Of A Large Commercial Aircraft, Ruben Martinez

Theses and Dissertations

Measuring the infrared signature of large civilian aircraft has become increasingly important due to the proliferation of man-portable air defense systems (MANPADS) and the increasing threat of their use by terrorists. Because of the range of these shoulder-fired weapons, most aircraft flying over 20,000 feet are safe from the threat; however, aircraft taking-off or landing are extremely vulnerable. A radiometric model was developed to simulate a large commercial aircraft’s infrared intensity during these two critical phases of flight. The radiometric model was largely based on the dimensions of a Boeing 747-400 aircraft. It is capable of simulating elevation angles between …


Validation Of An Innovative Groundwater Contaminant Flux Measurement Method, Seh J. Kim Mar 2005

Validation Of An Innovative Groundwater Contaminant Flux Measurement Method, Seh J. Kim

Theses and Dissertations

The ability to measure groundwater contaminant flux is increasingly being recognized as crucial in order to prioritize contaminated site cleanups, estimate the efficiency of remediation technologies, measure rates of natural attenuation, and apply proper source terms to model groundwater contaminant transport. An innovative mass flux measurement method using horizontal flow treatment wells (HFTWs) was developed recently to compensate for the disadvantages of other flux measurement methods that are being used. Flux measurement methods can be categorized as either point methods or integral methods. As the name suggests, point methods measure flux at a specific point or points in the subsurface. …


Evaluation Of Fuel Oxygenate Degradation In The Vadose Zone, David A. Torres Mar 2005

Evaluation Of Fuel Oxygenate Degradation In The Vadose Zone, David A. Torres

Theses and Dissertations

Groundwater contamination by petroleum products poses a potential human health and safety risk. Methyl tert-butyl ether (MTBE) was a commonly used fuel oxygenate that was added to gasoline to meet environmental regulations. The widespread use of MTBE resulted in significant contamination of drinking water supplies across the United States. This research evaluated the degradation characteristics of potential alternative fuel oxygenates in the vadose zone. One fuel oxygenate being considered as an alternative to MTBE is diisopropyl ether (DIPE). Specifically, this thesis sought to answer three research questions: what is the potential for DIPE degradation in soil without prior microbial augmentation, …


Passwords: A Survey On Usage And Policy, Kurt W. Martinson Mar 2005

Passwords: A Survey On Usage And Policy, Kurt W. Martinson

Theses and Dissertations

Computer password use is on the rise. Passwords have become one of the primary authentication methods used today. It is because of their high use that organizations have started to place parameters on passwords. Are password restrictions a nuisance? What are some of the consequences that result as organizations place the burden of their computer security on passwords? This thesis analyzes the results of a survey instrument that was used to determine if individuals are using similar techniques or patterns when choosing or remembering their passwords. It also looks at how individuals feel about using passwords. In addition, the authors …


A Genetic Algorithm For Uav Routing Integrated With A Parallel Swarm Simulation, Matthew A. Russell Mar 2005

A Genetic Algorithm For Uav Routing Integrated With A Parallel Swarm Simulation, Matthew A. Russell

Theses and Dissertations

This research investigation addresses the problem of routing and simulating swarms of UAVs. Sorties are modeled as instantiations of the NP-Complete Vehicle Routing Problem, and this work uses genetic algorithms (GAs) to provide a fast and robust algorithm for a priori and dynamic routing applications. Swarms of UAVs are modeled based on extensions of Reynolds' swarm research and are simulated on a Beowulf cluster as a parallel computing application using the Synchronous Environment for Emulation and Discrete Event Simulation (SPEEDES). In a test suite, standard measures such as benchmark problems, best published results, and parallel metrics are used as performance …


Accelerating Missile Threat Engagement Simulations Using Personal Computer Graphics Cards, Sean E. Jeffers Mar 2005

Accelerating Missile Threat Engagement Simulations Using Personal Computer Graphics Cards, Sean E. Jeffers

Theses and Dissertations

The 453rd Electronic Warfare Squadron supports on-going military operations by providing battlefield commanders with aircraft ingress and egress routes that minimize the risk of shoulder or ground-fired missile attacks on our aircraft. To determine these routes, the 453rd simulates engagements between ground-to-air missiles and allied aircraft to determine the probability of a successful attack. The simulations are computationally expensive, often requiring two-hours for a single 10-second missile engagement. Hundreds of simulations are needed to perform a complete risk assessment which includes evaluating the effectiveness of countermeasures such as flares, chaff, jammers, and missile warning systems. Thus, the need for faster …


An Analysis Of Perturbed Quantization Steganography In The Spatial Domain, Matthew D. Spisak Mar 2005

An Analysis Of Perturbed Quantization Steganography In The Spatial Domain, Matthew D. Spisak

Theses and Dissertations

Steganography is a form of secret communication in which a message is hidden into a harmless cover object, concealing the actual existence of the message. Due to the potential abuse by criminals and terrorists, much research has also gone into the field of steganalysis - the art of detecting and deciphering a hidden message. As many novel steganographic hiding algorithms become publicly known, researchers exploit these methods by finding statistical irregularities between clean digital images and images containing hidden data. This creates an on-going race between the two fields and requires constant countermeasures on the part of steganographers in order …


Detection Of Bacillus Spores By Aptamer Selectivity Using Atomic Force Microscopy, Nina M. Houtkooper Mar 2005

Detection Of Bacillus Spores By Aptamer Selectivity Using Atomic Force Microscopy, Nina M. Houtkooper

Theses and Dissertations

The anthrax attack of Oct 2001 demonstrates the need for a rapid detector for spores of Bacillus anthracis (BA). Current technology requires cultures of BA to be grown for 24 hours. Using aptamers, a type of nucleic acid ligand selective for a target molecule, to select BA spores for measurement without culturing is a possible solution for quicker detection. An aptamer having a specially selected structure is expected to selectively bind to the surface of its target spore, separating it from other material. An atomic force microscopy (AFM) method was developed to test this selectivity. Aptamers having structure selected to …


Lethality Of Bacillus Anthracis Spores Due To Short Duration Heating Measured Using Infrared Spectroscopy, Kristina M. Goetz Mar 2005

Lethality Of Bacillus Anthracis Spores Due To Short Duration Heating Measured Using Infrared Spectroscopy, Kristina M. Goetz

Theses and Dissertations

There are a number of analytical and semi-empirical models that describe the behavior of particulate matter in the atmosphere. Many of these require modification for all types of weather, dry versus wet deposition, and overall effects can be quite non-linear. Rainfall (rate, drop size, etc.), snowfall (rate, flake size, etc.), humidity, pressure, temperature, and combination of these greatly affect particle settling and washout rates. To that end, a method for tracking released constituents using the Regional Atmospheric Modeling System (RAMS) microphysics package is developed by modifying one of the hydrometeor categories (hail) in the microphysics package. The RAMS microphysics package …


An Analysis Of Biometric Technology As An Enabler To Information Assurance, Darren A. Deschaine Mar 2005

An Analysis Of Biometric Technology As An Enabler To Information Assurance, Darren A. Deschaine

Theses and Dissertations

The use of and dependence on, Information technology (IT) has grown tremendously in the last two decades. Still, some believe the United States is only in the infancy of this growth. This explosive growth has opened the door to capabilities that were only dreamed of in the past. As easy as it is to see how advantageous this technology is, it also is clear that with its advantages come distinct responsibilities and new problems that must be addressed. For instance, the minute one begins using information processing systems, the world of information assurance (IA) becomes far more complex. As a …


Environmental Acoustic Transfer Functions And Filtering Acoustic Signals, Brandon P. Dias Mar 2005

Environmental Acoustic Transfer Functions And Filtering Acoustic Signals, Brandon P. Dias

Theses and Dissertations

Signal processing is the method of taking a given signal and extracting useful information, usually by a means of a transformation of some kind. Acoustic signals are functions of time in which the output is a pressure or a velocity potential response. An acoustic signal is affected by the environment in which it propagates, so one can attempt to remove the environmental effects to extract the useful information, in this case the original signal. This thesis will derive, in a mathematical framework, the process of filtering extraneous signals in a way that yields the original signal, and will then apply …


Customization Of Discriminant Function Analysis For Prediction Of Solar Flares, Evelyn A. Schumer Mar 2005

Customization Of Discriminant Function Analysis For Prediction Of Solar Flares, Evelyn A. Schumer

Theses and Dissertations

This research is an extension to the research conducted by K. Leka and G. Barnes of the Colorado Research Associates Division, Northwest Research Associates, Inc. in Boulder, Colorado (CORA) in which they found no single photospheric solar parameter they considered could sufficiently identify a flare-producing active region (AR). Their research then explored the possibility a linear combination of parameters used in a multivariable discriminant function (DF) could adequately predict solar activity. The purpose of this research is to extend the DF research conducted by Leka and Barnes by refining the method of statistical discriminant analysis (DA) with the goal of …


An Investigation Into Palladium-Catalyzed Reduction Of Perchlorate In Water, Eric G. Barney Mar 2005

An Investigation Into Palladium-Catalyzed Reduction Of Perchlorate In Water, Eric G. Barney

Theses and Dissertations

In this study, application of a catalytic reactor to facilitate chemical reduction of perchlorate was investigated. Palladium-coated pellets were used as the catalyst, and formic acid was used as the reductant. Reactor performance was evaluated under a variety of operating conditions (influent pH, reductant concentration, residence time). Very little perchlorate reduction was observed under any operating condition. At best, approximately 8% perchlorate reduction was observed. This small reduction efficiency is clearly not sufficient for environmental treatment applications. Perchlorate strongly adsorbed to the catalyst at low pH (3 - 3.3). At higher pH (4 - 10), little adsorption was observed. This …


Modeling Information Quality Expectation In Unmanned Aerial Vehicle Swarm Sensor Databases, Patrick D. Baldwin Mar 2005

Modeling Information Quality Expectation In Unmanned Aerial Vehicle Swarm Sensor Databases, Patrick D. Baldwin

Theses and Dissertations

Swarming Unmanned Aerial Vehicles (UAVs) are the future of Intelligence, Surveillance and Reconnaissance (ISR). Swarms of hundreds of these vehicles, each equipped with multiple sensors, will one day fill the skies over hostile areas. As the sensors collect hundreds of gigabytes of data, telemetry data links will be unable to transmit the complete data picture to the ground in real time. The collected data will be stored on board the UAVs and selectively downloaded through queries issued from analysts on the ground. Analysts expect to find relevant sensor data within the collection of acquired sensor data. This expectation is not …


An Evolutionary Algorithm To Generate Ellipsoid Detectors For Negative Selection, Joseph M. Shapiro Mar 2005

An Evolutionary Algorithm To Generate Ellipsoid Detectors For Negative Selection, Joseph M. Shapiro

Theses and Dissertations

Negative selection is a process from the biological immune system that can be applied to two-class (self and nonself) classification problems. Negative selection uses only one class (self) for training, which results in detectors for the other class (nonself). This paradigm is especially useful for problems in which only one class is available for training, such as network intrusion detection. Previous work has investigated hyper-rectangles and hyper-spheres as geometric detectors. This work proposes ellipsoids as geometric detectors. First, the author establishes a mathematical model for ellipsoids. He develops an algorithm to generate ellipsoids by training on only one class of …