Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Theses/Dissertations

2009

Discipline
Keyword

Articles 61 - 74 of 74

Full-Text Articles in Physical Sciences and Mathematics

Low Probability Of Intercept Waveforms Via Intersymbol Dither Performance Under Multipath Conditions, Jonathan K. Keen Mar 2009

Low Probability Of Intercept Waveforms Via Intersymbol Dither Performance Under Multipath Conditions, Jonathan K. Keen

Theses and Dissertations

This thesis examines the effects of multipath interference on Low Probability of Intercept (LPI) waveforms generated using intersymbol dither. LPI waveforms are designed to be difficult for non-cooperative receivers to detect and manipulate, and have many uses in secure communications applications. In prior research, such a waveform was designed using a dither algorithm to vary the time between the transmission of data symbols in a communication system. This work showed that such a method can be used to frustrate attempts to use non-cooperative receiver algorithms to recover the data. This thesis expands on prior work by examining the effects of …


Image Processing For Multiple-Target Tracking On A Graphics Processing Unit, Michael A. Tanner Mar 2009

Image Processing For Multiple-Target Tracking On A Graphics Processing Unit, Michael A. Tanner

Theses and Dissertations

Multiple-target tracking (MTT) systems have been implemented on many different platforms, however these solutions are often expensive and have long development times. Such MTT implementations require custom hardware, yet offer very little flexibility with ever changing data sets and target tracking requirements. This research explores how to supplement and enhance MTT performance with an existing graphics processing unit (GPU) on a general computing platform. Typical computers are already equipped with powerful GPUs to support various games and multimedia applications. However, such GPUs are not currently being used in desktop MTT applications. This research explores if and how a GPU can …


The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis Mar 2009

The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis

Theses and Dissertations

This thesis examines the problem in initializing communications whereby cognitive radios need to find common spectrum with other cognitive radios, a process known as frequency rendezvous. It examines the rendezvous problem as it exists in a dynamic spectrum access cognitive network. Specifically, it addresses the problem of rendezvous in an infrastructureless environment. A new algorithm, the modular clock algorithm, is developed and analyzed as a solution for the simple rendezvous environment model, coupled with a modified version for environment models with less information. The thesis includes a taxonomy of commonly used environment models, and analysis of previous efforts to solve …


Characterizing And Detecting Unrevealed Elements Of Network Systems, James A. Leinart Mar 2009

Characterizing And Detecting Unrevealed Elements Of Network Systems, James A. Leinart

Theses and Dissertations

This dissertation addresses the problem of discovering and characterizing unknown elements in network systems. Klir (1985) provides a general definition of a system as “... a set of some things and a relation among the things" (p. 4). A system, where the `things', i.e. nodes, are related through links is a network system (Klir, 1985). The nodes can represent a range of entities such as machines or people (Pearl, 2001; Wasserman & Faust, 1994). Likewise, links can represent abstract relationships such as causal influence or more visible ties such as roads (Pearl, 1988, pp. 50-51; Wasserman & Faust, 1994; Winston, …


Quantification Of Mandatory Sustainment Requirements, Joe M. Blackman Mar 2009

Quantification Of Mandatory Sustainment Requirements, Joe M. Blackman

Theses and Dissertations

To emphasize the importance of sustainment, the DoD Joint Requirements Oversight Council addressed sustained Materiel readiness and established a mandatory Key Performance Parameter (KPP) for Materiel Availability; it also established supporting Key System Attributes (KSAs) for Materiel Reliability and Ownership Cost (Chairman of the Joint Chiefs of Staff Manual (CJCSM) 3170.01C, 2007). Current guidance requires two numbers: a threshold value and an objective value (Chairman of the Joint Chiefs of Staff Manual (CJCSM) 3170.01C, 2007). No distinction is made between the approaches in establishing these values for major system acquisitions, versus smaller, modification-focused efforts for existing systems. The Joint Staff …


A Hybrid Templated-Based Composite Classification System, Michael A. Turnbaugh Mar 2009

A Hybrid Templated-Based Composite Classification System, Michael A. Turnbaugh

Theses and Dissertations

An automatic target classification system contains a classifier which reads a feature as an input and outputs a class label. Typically, the feature is a vector of real numbers. Other features can be non-numeric, such as a string of symbols or alphabets. One method of improving the performance of an automatic classification system is through combining two or more independent classifiers that are complementary in nature. Complementary classifiers are observed by finding an optimal method for partitioning the problem space. For example, the individual classifiers may operate to identify specific objects. Another method may be to use classifiers that operate …


Numerical Analysis For Relevant Features In Intrusion Detection (Narfid), Jose Andres Gonzalez Mar 2009

Numerical Analysis For Relevant Features In Intrusion Detection (Narfid), Jose Andres Gonzalez

Theses and Dissertations

Identification of cyber attacks and network services is a robust field of study in the machine learning community. Less effort has been focused on understanding the domain space of real network data in identifying important features for cyber attack and network service classification. Motivations for such work allow for anomaly detection systems with less requirements on data “sniffed” off the network, extraction of features from the traffic, reduced learning time of algorithms, and ideally increased classification performance of anomalous behavior. This thesis evaluates the usefulness of a good feature subset for the general classification task of identifying cyber attacks and …


Using Predictive Rendering As A Vision-Aided Technique For Autonomous Aerial Refueling, Adam D. Weaver Mar 2009

Using Predictive Rendering As A Vision-Aided Technique For Autonomous Aerial Refueling, Adam D. Weaver

Theses and Dissertations

This research effort seeks to characterize a vision-aided approach for an Unmanned Aerial System (UAS) to autonomously determine relative position to another aircraft in a formation, specifically to address the autonomous aerial refueling problem. A system consisting of a monocular digital camera coupled with inertial sensors onboard the UAS is analyzed for feasibility of using this vision-aided approach. A three-dimensional rendering of the tanker aircraft is used to generate predicted images of the tanker as seen by the receiver aircraft. A rigorous error model is developed to model the relative dynamics between an INS-equipped receiver and the tanker aircraft. A …


Ohio River Denial As A Transportation Corridor And Its Economic Impacts On The Energy Industry, Caglar Utku Guler Mar 2009

Ohio River Denial As A Transportation Corridor And Its Economic Impacts On The Energy Industry, Caglar Utku Guler

Theses and Dissertations

What if the Ohio River is disrupted or denied partially or completely as a transportation corridor? A disruption may be either a natural or man-made disaster or a planned outage on the river’s lock and dam structures. Recent history is full of water transport disruption events having significant economic effects on the waterside industries. To assess coal-based economic impacts, we developed a network flow model to represent waterside coal-fired power plants situated along the Ohio River, their respective coal supplying mines, and the various transportation modes that connect them. We show that significant transportation-centric insights can be derived by using …


Evaluation Of Performance Of A Maximum Likelihood Estimator For Tracking Purposes In The Presence Of Speckle Noise, Adrian Brett Monz Mar 2009

Evaluation Of Performance Of A Maximum Likelihood Estimator For Tracking Purposes In The Presence Of Speckle Noise, Adrian Brett Monz

Theses and Dissertations

In many cases, optical tracking systems do not have cooperative beacons avail- able. This is particularly true for the case involving tracking a laser illuminated target such as a missile seeker head, where the object of interest is an extended source. Furthermore the extended source is often observed in the presence of noise such as shot and speckle noise as well as atmospheric turbulence which further degrades the signal. This research effort presents the evaluation of an existing algorithm based on the maximum-likelihood technique for tilt estimation in the presence of extended sources and speckle noise, with particular application to …


Satellite-Based Fusion Of Image/Inertial Sensors For Precise Geolocation, Neil R. Jesse Feb 2009

Satellite-Based Fusion Of Image/Inertial Sensors For Precise Geolocation, Neil R. Jesse

Theses and Dissertations

The ability to produce high-resolution images of the Earth’s surface from space has flourished in recent years with the continuous development and improvement of satellite-based imaging sensors. Earth-imaging satellites often rely on complex onboard navigation systems, with dependence on Global Positioning System (GPS) tracking and/or continuous post-capture georegistration, to accurately geolocate ground targets of interest to either commercial and military customers. Consequently, these satellite systems are often massive, expensive, and susceptible to poor or unavailable target tracking capabilities in GPS-denied environments. Previous research has demonstrated that a tightly-coupled image-aided inertial navigation system (INS), using existing onboard imaging sensors, can provide …


Adaptive Control Of Woofer-Tweeter Adaptive Optics, Jimmie J. Perez Feb 2009

Adaptive Control Of Woofer-Tweeter Adaptive Optics, Jimmie J. Perez

Theses and Dissertations

Adaptive optics applies advanced sensing and control to improve the ability of optical systems to collect images through a turbulent atmosphere. The results of this research effort demonstrate that the combination of two recent approaches improves the performance of adaptive optics in directed energy and laser communication scenarios. The first approach is adaptive control, which offers improved performance over fixed-gain controllers in the presence of rapidly changing turbulence. The second approach incorporated into the study is a dual-mirror system. The two mirrors are a high-bandwidth, low-actuator-stroke (tweeter) mirror and a low-bandwidth, large actuator-stroke (woofer) mirror. The woofer-tweeter combination allows for …


Automated Virtual Machine Introspection For Host-Based Intrusion Detection, Brett A. Pagel Feb 2009

Automated Virtual Machine Introspection For Host-Based Intrusion Detection, Brett A. Pagel

Theses and Dissertations

This thesis examines techniques to automate configuration of an intrusion detection system utilizing hardware-assisted virtualization. These techniques are used to detect the version of a running guest operating system, automatically configure version-specific operating system information needed by the introspection library, and to locate and monitor important operating system data structures. This research simplifies introspection library configuration and is a step toward operating system independent introspection. An operating system detection algorithm and Windows virtual machine system service dispatch table monitor are implemented using the Xen hypervisor and a modified version of the XenAccess library. All detection and monitoring is implemented from …


An Fpga-Based System For Tracking Digital Information Transmitted Via Peer-To-Peer Protocols, Karl R. Schrader Feb 2009

An Fpga-Based System For Tracking Digital Information Transmitted Via Peer-To-Peer Protocols, Karl R. Schrader

Theses and Dissertations

This thesis addresses the problem of identifying and tracking digital information that is shared using peer-to-peer file transfer and Voice over IP (VoIP) protocols. The goal of the research is to develop a system for detecting and tracking the illicit dissemination of sensitive government information using file sharing applications within a target network, and tracking terrorist cells or criminal organizations that are covertly communicating using VoIP applications. A digital forensic tool is developed using an FPGA-based embedded software application. The tool is designed to process file transfers using the BitTorrent peer-to-peer protocol and VoIP phone calls made using the Session …