Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

2016

Discipline
Keyword
Publication
Publication Type

Articles 31 - 60 of 70

Full-Text Articles in Physical Sciences and Mathematics

Investigation Of 186Re Via Radiative Thermal-Neutron Capture On 185Re, David A. Matters, Andrew G. Lerch, A. M. Hurst, L. Szentmiklosi, J. J. Carroll, B. Detwiler, Zs. Revay, John W. Mcclory, Stephen R. Mchale, R. B. Firestone, B. W. Sleaford, M. Krticka, T. Belgya May 2016

Investigation Of 186Re Via Radiative Thermal-Neutron Capture On 185Re, David A. Matters, Andrew G. Lerch, A. M. Hurst, L. Szentmiklosi, J. J. Carroll, B. Detwiler, Zs. Revay, John W. Mcclory, Stephen R. Mchale, R. B. Firestone, B. W. Sleaford, M. Krticka, T. Belgya

Faculty Publications

Partial 𝛾-ray production cross sections and the total radiative thermal-neutron capture cross section for the 185Re(n,𝛾)186Re reaction were measured using the Prompt Gamma Activation Analysis facility at the Budapest Research Reactor with an enriched 185Re target. The 186Re cross sections were standardized using well-known 35Cl(n,𝛾)36Cl cross sections from irradiation of a stoichiometric natReCl3 target. The resulting cross sections for transitions feeding the 186Re ground state from low-lying levels below a cutoff energy of Ec=746keV were combined with a modeled probability of ground-state feeding from levels above E …


Activity Pattern Discovery From Network Captures, Alan C. Lin, Gilbert L. Peterson May 2016

Activity Pattern Discovery From Network Captures, Alan C. Lin, Gilbert L. Peterson

Faculty Publications

Investigating insider threat cases is challenging because activities are conducted with legitimate access that makes distinguishing malicious activities from normal activities difficult. To assist with identifying non-normal activities, we propose using two types of pattern discovery to identify a person's behavioral patterns in network data. The behavioral patterns serve to deemphasize normal behavior so that insider threat investigations can focus attention on potentially more relevant. Results from a controlled experiment demonstrate the highlighting of a suspicious event through the reduction of events belonging to discovered patterns. Abstract © 2016 IEEE.


Method For Determining Time-Resolved Heat Transfer Coefficient And Adiabatic Effectiveness Waveforms With Unsteady Film Cooling, James L. Rutledge, Jonathan F. Mccall Apr 2016

Method For Determining Time-Resolved Heat Transfer Coefficient And Adiabatic Effectiveness Waveforms With Unsteady Film Cooling, James L. Rutledge, Jonathan F. Mccall

AFIT Patents

A new method for determining heat transfer coefficient (h) and adiabatic effectiveness (η) waveforms h(t) and η(t) from a single test uses a novel inverse heat transfer methodology to use surface temperature histories obtained using prior art approaches to approximate the h(t) and η(t) waveforms. The method best curve fits the data to a pair of truncated Fourier series.


Identification Of The Zinc-Oxygen Divacancy In Zno Crystals, Maurio S. Holston, Eric M. Golden, Brant E. Kananen, John W. Mcclory, Nancy C. Giles, Larry E. Halliburton Apr 2016

Identification Of The Zinc-Oxygen Divacancy In Zno Crystals, Maurio S. Holston, Eric M. Golden, Brant E. Kananen, John W. Mcclory, Nancy C. Giles, Larry E. Halliburton

Faculty Publications

An electron paramagnetic resonance (EPR) spectrum in neutron-irradiated ZnO crystals is assigned to the zinc-oxygen divacancy. These divacancies are observed in the bulk of both hydrothermally grown and seeded-chemical-vapor-transport-grown crystals after irradiations with fast neutrons. Neutral nonparamagnetic complexes consisting of adjacent zinc and oxygen vacancies are formed during the irradiation. Subsequent illumination below ∼150 K with 442 nm laser light converts these (V2−Zn − V2+O)0 defects to their EPR-active state (VZn − V2+O)+ as electrons are transferred to donors. The resulting photoinduced S = 1/2 spectrum of the …


Position And Volume Estimation Of Atmospheric Nuclear Detonations From Video Reconstruction, Daniel T. Schmitt Mar 2016

Position And Volume Estimation Of Atmospheric Nuclear Detonations From Video Reconstruction, Daniel T. Schmitt

Theses and Dissertations

Recent work in digitizing films of foundational atmospheric nuclear detonations from the 1950s provides an opportunity to perform deeper analysis on these historical tests. This work leverages multi-view geometry and computer vision techniques to provide an automated means to perform three-dimensional analysis of the blasts for several points in time. The accomplishment of this requires careful alignment of the films in time, detection of features in the images, matching of features, and multi-view reconstruction. Sub-explosion features can be detected with a 67% hit rate and 22% false alarm rate. Hotspot features can be detected with a 71.95% hit rate, 86.03% …


Clustering Theory And Data Driven Health Care Strategies, Takayuki Iguchi Mar 2016

Clustering Theory And Data Driven Health Care Strategies, Takayuki Iguchi

Theses and Dissertations

DoD health care requires reform with growing costs causing concerns of decreased military capability. One proposed radical strategy to fix current health care delivery systems is to organize medical teams around patients with similar treatment requirements. This is a clustering problem; how do you partition the set of patients so that each group has similar treatment needs? We provide advances in clustering theory relevant to this new health care strategy. In particular, we create fast certifiably optimal k-means clustering using what is known as Probably Certifiably Correct (PCC) algorithms which achieves state-of-the-art performance under certain models. Inspired by the health …


A Misuse-Based Intrusion Detection System For Itu-T G.9959 Wireless Networks, Jonathan D. Fuller Mar 2016

A Misuse-Based Intrusion Detection System For Itu-T G.9959 Wireless Networks, Jonathan D. Fuller

Theses and Dissertations

Wireless Sensor Networks (WSNs) provide low-cost, low-power, and low-complexity systems tightly integrating control and communication. Protocols based on the ITU-T G.9959 recommendation specifying narrow-band sub-GHz communications have significant growth potential. The Z-Wave protocol is the most common implementation. Z-Wave developers are required to sign nondisclosure and confidentiality agreements, limiting the availability of tools to perform open source research. This work discovers vulnerabilities allowing the injection of rogue devices or hiding information in Z-Wave packets as a type of covert channel attack. Given existing vulnerabilities and exploitations, defensive countermeasures are needed. A Misuse-Based Intrusion Detection System (MBIDS) is engineered, capable of …


Cross-Subject Continuous Analytic Workload Profiling Using Stochastic Discrete Event Simulation, Joseph J. Giametta Mar 2016

Cross-Subject Continuous Analytic Workload Profiling Using Stochastic Discrete Event Simulation, Joseph J. Giametta

Theses and Dissertations

Operator functional state (OFS) in remotely piloted aircraft (RPA) simulations is modeled using electroencephalograph (EEG) physiological data and continuous analytic workload profiles (CAWPs). A framework is proposed that provides solutions to the limitations that stem from lengthy training data collection and labeling techniques associated with generating CAWPs for multiple operators/trials. The framework focuses on the creation of scalable machine learning models using two generalization methods: 1) the stochastic generation of CAWPs and 2) the use of cross-subject physiological training data to calibrate machine learning models. Cross-subject workload models are used to infer OFS on new subjects, reducing the need to …


A Framework For Incorporating Insurance Into Critical Infrastructure Cyber Risk Strategies, Derek R. Young Mar 2016

A Framework For Incorporating Insurance Into Critical Infrastructure Cyber Risk Strategies, Derek R. Young

Theses and Dissertations

Critical infrastructure owners and operators want to minimize their cyber risk and expenditures on cybersecurity. The insurance industry has been quantitatively assessing risk for hundreds of years in order to minimize risk and maximize profits. To achieve these goals, insurers continuously gather statistical data to improve their predictions, incentivize their clients' investment in self-protection and periodically refine their models to improve the accuracy of risk estimates. This paper presents a framework which incorporates the operating principles of the insurance industry in order to provide quantitative estimates of cyber risk. The framework implements optimization techniques to suggest levels of investment for …


Forecasting Sea Breeze Enhanced Thunderstorms At Eglin Air Force Base: A Comparison Between Empirical Methods And The High Resolution Rapid Refresh Model, Matthew P. King Mar 2016

Forecasting Sea Breeze Enhanced Thunderstorms At Eglin Air Force Base: A Comparison Between Empirical Methods And The High Resolution Rapid Refresh Model, Matthew P. King

Theses and Dissertations

Summer thunderstorms pose the greatest forecast challenge for the United States Air Force's 96th Weather Flight (96WF) which provides weather support for Eglin Air Force Base (AFB). Located on Florida's panhandle, Eglin AFB encompasses the Department of Defense's largest range complex which covers 134,000 sq mi (347,000 sq km) of water and 724 sq mi (1875 sq km) of land. Due to the base's coastal location and unique coastline geometry, sea breeze is a dominant forecast consideration for thunderstorms. The 96 WF currently utilizes an empirical method, called WINNDEX, developed by former staff meteorologist Roger Winn to aid in thunderstorm …


Deception In Game Theory: A Survey And Multiobjective Model, Austin L. Davis Mar 2016

Deception In Game Theory: A Survey And Multiobjective Model, Austin L. Davis

Theses and Dissertations

Game theory is the study of mathematical models of conflict. It provides tools for analyzing dynamic interactions between multiple agents and (in some cases) across multiple interactions. This thesis contains two scholarly articles. The first article is a survey of game-theoretic models of deception. The survey describes the ways researchers use game theory to measure the practicality of deception, model the mechanisms for performing deception, analyze the outcomes of deception, and respond to, or mitigate the effects of deception. The survey highlights several gaps in the literature. One important gap concerns the benefit-cost-risk trade-off made during deception planning. To address …


Removal Of Perfluorooctanoic Acid From Water Using Primitive, Conventional And Novel Carbonaceous Sorbent Materials, Christopher K. Brown Mar 2016

Removal Of Perfluorooctanoic Acid From Water Using Primitive, Conventional And Novel Carbonaceous Sorbent Materials, Christopher K. Brown

Theses and Dissertations

Polyfluoroalkyl Substances (PFAS), like perfluorooctanoic acid, have been used for the last 50 years in a wide variety of industrial processes and consumer-based products, including polymer additives, lubricants, fire retardants and suppressants, pesticides, and surfactants (Buck et al. 2015). The Department of Defense (DoD) has used PFAS-based Aqueous Film Forming Foam (AFFF) at fire training facilities and aircraft hangars. AFFF has contaminated approximately 600 sites classified as fire training facilities with PFAS (Huang, 2013).

This study focused on testing the most likely carbonaceous adsorbent compounds to remediate PFAS-contaminated sites on Air Force installations. Batch tests were performed to determine the …


Determining The Optimal Work Breakdown Structure For Government Acquisition Contracts, Brian J. Fitzpatrick Mar 2016

Determining The Optimal Work Breakdown Structure For Government Acquisition Contracts, Brian J. Fitzpatrick

Theses and Dissertations

The optimal level of Government Contract Work Breakdown Structure (G-CWBS) reporting for the purposes of Earned Value Management was inspected. The G-Score Metric was proposed, which can quantitatively grade a G-CWBS, based on a new method of calculating an Estimate At Completion (EAC) cost for each reported element. A random program generator created in R replicated the characteristics of DOD program artifacts retrieved from the Cost Analysis Data Enterprise (CADE) system. The generated artifacts were validated as a population, however validation at the demographic combination level using an artificial neural network was inconclusive. Comparative WBS forms were created for a …


Predicting Schedule Duration For Defense Acquisition Programs: Program Initiation To Initial Operational Capability, Christopher A. Jimenez Mar 2016

Predicting Schedule Duration For Defense Acquisition Programs: Program Initiation To Initial Operational Capability, Christopher A. Jimenez

Theses and Dissertations

Accurately predicting the most realistic schedule for a defense acquisitions program is an extremely difficult task considering the inherent risk and uncertainties present in the early stages of a program. We use a multiple regression analysis to predict schedule duration in a defense acquisition program. The prediction scope of our research is limited to predicting schedule duration from program initiation to initial operation capability (IOC).We use the data from 56 programs across all services, which was acquired from a SAR database created by RAND. We were able to achieve an R2 of 0.429 and an Adjusted R2 of 0.384 in …


Diagnosing Autism Spectrum Disorder Through Brain Functional Magnetic Resonance Imaging, Kyle A. Palko Mar 2016

Diagnosing Autism Spectrum Disorder Through Brain Functional Magnetic Resonance Imaging, Kyle A. Palko

Theses and Dissertations

Autism spectrum disorder (ASD) is a neurodevelopmental condition that can be debilitating to social functioning. Previous functional Magnetic Resonance Imaging (fMRI) classification studies have included only small subject sample sizes (n 50) and have seen high classification accuracy. The recent release of the Autism Brain Imaging Data Exchange (ABIDE) provides fMRI data for over 1,100 subjects. In our research, we derive a subject's functional network connectivity (FNC) from their fMRI data and develop a regularized logistic classifier to determine whether a subject has autism. We obtained up to 65% classification accuracy, similar to other studies using the ABIDE dataset, suggesting …


A Simulation-Based Analysis Of Chemical And Radiological Hazard Zones Adapted To Physical Boundaries, Mickie J. Sundheim Mar 2016

A Simulation-Based Analysis Of Chemical And Radiological Hazard Zones Adapted To Physical Boundaries, Mickie J. Sundheim

Theses and Dissertations

In the United States, industrial and terrorist use of chemical, biological, radiological, and nuclear (CBRN) materials pose a risk to public safety. During the initial phase of typical CBRN incidents, emergency responders establish hazard zones based on standard distances from published guidelines and recommendations. This research investigates how standard hazard zones change in a real world environment that accounts for physical boundaries. Using a python simulation in ArcGIS®, new hazard zones were created by expanding standard hazard zones to follow nearby roads, railroads, and rivers. The new and standard zones were compared by calculating the population and area affected by …


Application Of Non-Rated Line Officer Attrition Levels And Career Field Stability, Christine L. Zens Mar 2016

Application Of Non-Rated Line Officer Attrition Levels And Career Field Stability, Christine L. Zens

Theses and Dissertations

The Air Force monitors the strength of its active duty officer force and attempts to achieve the difficult challenge of employing a diversity of talent among career specialties and experience levels. This study completes two objectives, predicting future manning levels for 23 career fields, and providing a statistical framework to assess the stability of these fields. The first part of the study applies regression and survival analysis to subpopulations within the active duty Air Force officer corps, and then aggregates them by year to forecast future personnel levels. Four career fields are considered, including Acquisitions (ACQ), Logistics (LOG), Support (SPT), …


Analysis And Modeling Of U.S. Army Recruiting Markets, Joshua L. Mcdonald Mar 2016

Analysis And Modeling Of U.S. Army Recruiting Markets, Joshua L. Mcdonald

Theses and Dissertations

The United States Army Recruiting Command (USAREC) is charged with finding, engaging, and ultimately enlisting young Americans for service as Soldiers in the U.S. Army. USAREC must decide how to allocate monthly enlistment goals, by aptitude and education level, across its 38 subordinate recruiting battalions in order to maximize the number of enlistment contracts produced each year. In our research, we model the production of enlistment contracts as a function of recruiting supply and demand factors which vary over the recruiting battalion areas of responsibility. Using county-level data for the period of recruiting year RY2010 through RY2013 mapped to recruiting …


Framework For Evaluating The Readiness Of Cyber First Responders Responsible For Critical Infrastructure Protection, Jungsang Yoon Mar 2016

Framework For Evaluating The Readiness Of Cyber First Responders Responsible For Critical Infrastructure Protection, Jungsang Yoon

Theses and Dissertations

First responders go through rigorous training and evaluation to ensure they are adequately prepared for an emergency. As an example, firefighters continually evaluate the readiness of their personnel using a defined set of criteria to measure performance for fire suppression and rescue procedures. From a cyber security standpoint, however, this same set of criteria and rigor is severely lacking for the professionals that must detect, respond to and recover from a cyber-based attack against the nation's critical infrastructure. This research provides a framework for evaluating the readiness of cyber first responders responsible for critical infrastructure protection. The framework demonstrates the …


Capturing Atmospheric Effects On 3-D Millimeter Wave Radar Propagation Patterns, Richard D. Cook Mar 2016

Capturing Atmospheric Effects On 3-D Millimeter Wave Radar Propagation Patterns, Richard D. Cook

Theses and Dissertations

The need to model millimeter wave (MMW) radar propagation is imperative to proper design of aeronautical, civil, and military systems. Traditional radar propagation modeling is done using a path transmittance with little to no input for weather and atmospheric conditions. As radar advances into the MMW regime, atmospheric effects, such as attenuation and refraction, become more pronounced than at traditional radar wavelengths. The DoD High Energy Laser Joint Technology Offices High Energy Laser End-to-End Operational Simulation (HELEEOS), in combination with the Laser Environmental Effects Definition and Reference (LEEDR) code, is a powerful tool for simulating laser propagation and effects tied …


Simulation, Design, And Test Of Square, Apodized Photon Sieves For High-Contrast, Exoplanet Imaging, Thomas W.N. Dickinson Mar 2016

Simulation, Design, And Test Of Square, Apodized Photon Sieves For High-Contrast, Exoplanet Imaging, Thomas W.N. Dickinson

Theses and Dissertations

A photon sieve is a lightweight, diffractive optic which is well-suited to be a deployable primary for a space telescope. Point spread functions (PSFs) can be altered by shaping and apodizing an aperture, and a PSF that drops rapidly from the peak is desirable for high-contrast imaging. For this reason, square apodized photon sieves were simulated, designed, and tested for high-contrast performance and use in an exoplanet imaging telescope. These sieves were shown to outperform conventional optics and unapodized sieves for high-contrast imaging in a number of tests. New methods were developed for apodizing sieves, measuring PSFs, and characterizing high-contrast …


Cyberspace And Organizational Structure: An Analysis Of The Critical Infrastructure Environment, Michael D. Quigg Ii Mar 2016

Cyberspace And Organizational Structure: An Analysis Of The Critical Infrastructure Environment, Michael D. Quigg Ii

Theses and Dissertations

Now more than ever, organizations are being created to protect the cyberspace environment. The capability of cyber organizations tasked to defend critical infrastructure has been called into question by numerous cybersecurity experts. Organizational theory states that organizations should be constructed to fit their operating environment properly. Little research in this area links existing organizational theory to cyber organizational structure. Because of the cyberspace connection to critical infrastructure assets, the factors that influence the structure of cyber organizations designed to protect these assets warrant analysis to identify opportunities for improvement.

This thesis analyzes the cyber‐connected critical infrastructure environment using the dominant …


Pointing Analysis And Design Drivers For Low Earth Orbit Satellite Quantum Key Distribution, Jeremiah A. Specht Mar 2016

Pointing Analysis And Design Drivers For Low Earth Orbit Satellite Quantum Key Distribution, Jeremiah A. Specht

Theses and Dissertations

The world relies on encryption to perform critical and sensitive tasks every day. If quantum computing matures, the capability to decode keys and decrypt messages becomes possible. Quantum key distribution (QKD) is a method of distributing secure cryptographic keys which relies on the laws of quantum mechanics. Current implementations of QKD use fiber-based channels which limit the number of users and the distance between users. Satellite-based QKD using free-space channels is proposed as a feasible secure global communication solution. Since a free-space link does not use a waveguide, pointing a transmitter to receiver is required to ensure signal arrival. In …


Radial Basis Function Based Quadrature Over Smooth Surfaces, Maloupu L. Watts Mar 2016

Radial Basis Function Based Quadrature Over Smooth Surfaces, Maloupu L. Watts

Theses and Dissertations

The numerical approximation of denite integrals, or quadrature, often involves the construction of an interpolant of the integrand and subsequent integration of the interpolant. It is natural to rely on polynomial interpolants in the case ofone dimension; however, extension of integration of polynomial interpolants to two or more dimensions can be costly andunstable. A method for computing surface integrals on the sphere is detailed in the literature (Reeger and Fornberg,Studies in Applied Mathematics, 2016). The method uses local radial basis function (RBF) interpolation to reducecomputational complexity when generating quadrature weights for the particular node set. This thesis expands upon thesame …


Image-Based Bidirectional Reflectance Distribution Function Of Human Skin In The Visible And Near Infrared, Jeffrey R. Bintz Mar 2016

Image-Based Bidirectional Reflectance Distribution Function Of Human Skin In The Visible And Near Infrared, Jeffrey R. Bintz

Theses and Dissertations

Human detection is an important first step in locating and tracking people in many missions including SAR and ISR operations. Recent detection systems utilize hyperspectral and multispectral technology to increase the acquired spectral content in imagery and subsequently better identify targets. This research demonstrates human detection through a multispectral skin detection system to exploit the unique optical properties of human skin. At wavelengths in the VIS and NIR regions of the electromagnetic spectrum, an individual can be identified by their unique skin parameters. Current detection methods base the skin pixel selection criteria on a diffuse skin reflectance model; however, it …


Statistic Whitelisting For Enterprise Network Incident Response, Nathan E. Grunzweig Mar 2016

Statistic Whitelisting For Enterprise Network Incident Response, Nathan E. Grunzweig

Theses and Dissertations

This research seeks to satisfy the need for the rapid evaluation of enterprise network hosts in order to identify items of significance through the introduction of a statistic whitelist based on the behavior of the processes on each host. By taking advantage of the repetition of processes and the resources they access, a whitelist can be generated using large quantities of host machines. For each process, the Modules and the TCP & UDP Connections are compared to identify which resources are most commonly accessed by each process. Results show 47% of processes receiving a whitelist score of 75% or greater …


Poco-Moea: Using Evolutionary Algorithms To Solve The Controller Placement Problem, Scott I. Harned Mar 2016

Poco-Moea: Using Evolutionary Algorithms To Solve The Controller Placement Problem, Scott I. Harned

Theses and Dissertations

One of the central tenets of a Software Defined Network (SDN) is the use of controllers, which are responsible for managing how traffic flows through switches, routers, and other data-passing devices on a computer network. Most modern SDNs use multiple controllers to divide responsibility for network switches while keeping communication latency low. A problem that has emerged since approximately 2011 is the decision of where to place these controllers to create the most 'optimum' network. This is known as the Controller Placement Problem (CPP). Such a decision is subject to multiple and sometimes con_icting goals, making the CPP a type …


Whitelisting System State In Windows Forensic Memory Visualizations, Joshua A. Lapso Mar 2016

Whitelisting System State In Windows Forensic Memory Visualizations, Joshua A. Lapso

Theses and Dissertations

Examiners in the field of digital forensics regularly encounter enormous amounts of data and must identify the few artifacts of evidentiary value. The most pressing challenge these examiners face is manual reconstruction of complex datasets with both hierarchical and associative relationships. The complexity of this data requires significant knowledge, training, and experience to correctly and efficiently examine. Current methods provide primarily text-based representations or low-level visualizations, but levee the task of maintaining global context of system state on the examiner. This research presents a visualization tool that improves analysis methods through simultaneous representation of the hierarchical and associative relationships and …


Analysis Of Software Design Patterns In Human Cognitive Performance Experiments, Alexander C. Roosma Mar 2016

Analysis Of Software Design Patterns In Human Cognitive Performance Experiments, Alexander C. Roosma

Theses and Dissertations

As Air Force operations continue to move toward the use of more autonomous systems and more human-machine teaming in general, there is a corresponding need to swiftly evaluate systems with these capabilities. We support this development through software design improvements of the execution of human cognitive performance experiments. This thesis sought to answer the following two research questions addressing the core functionality that these experiments rely on for execution and analysis: 1) What data infrastructure software requirements are necessary to execute the experimental design of human cognitive performance experiments? 2) How effectively does a central data mediator design pattern meet …


The Reliability And Skill Of Air Force Weather’S Ensemble Prediction Suites, Derek A. Burns Mar 2016

The Reliability And Skill Of Air Force Weather’S Ensemble Prediction Suites, Derek A. Burns

Theses and Dissertations

The Ensemble Prediction Suites (EPS) used at the 557th Weather Wing (557 WW) provide probability based forecasts for thousands of worldwide locations. Point Ensemble Probability (PEP) bulletins are tailored specifically to the United States military and its criteria for operationally significant weather. This study assesses the performance of PEPs from each EPS at 17 Continental United States (CONUS) locations. Results from April to October of 2015 show that each EPS is underforecasting ceilings and visibility for most forecast hours at several locations. The underforecasting of ceilings is most severe at Vandenberg AFB, an area prone to frequent marine layer fog …