Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 58 of 58

Full-Text Articles in Physical Sciences and Mathematics

Combined Visible And Infrared Video For Use In Wilderness Search And Rescue, Nathan D. Rasmussen Mar 2009

Combined Visible And Infrared Video For Use In Wilderness Search And Rescue, Nathan D. Rasmussen

Theses and Dissertations

Mini Unmanned Aerial Vehicles (mUAVs) have the potential to be a great asset to Wilderness Search and Rescue groups by providing a bird's eye view of the search area. These vehicles can carry a variety of sensors to better understand the world below. This paper proposes using both Infrared (IR) and Visible Spectrum cameras on a mUAV for Wilderness Search and Rescue. It details a method for combining the color and heat information from these two cameras into a single fused display to reduce needed screen space for remote field use. To align the video frames for fusion, a method …


Dynamic Network Formation Using Ant Colony Optimization, Steven C. Oimoen Mar 2009

Dynamic Network Formation Using Ant Colony Optimization, Steven C. Oimoen

Theses and Dissertations

Military and industry are moving toward every device being network enabled and connected for reliable availability of communication and information. To make this type of system a reality, the devices must be capable of forming a network topology on their own in a dynamic environment to ensure that the correct information reaches a desired location and on-time. This research presents three contributions for solving highly dynamic (i.e. drastic change within the network) Multi-commodity Capacitated Network Design Problems (MCNDPs) resulting in a distributed multi-agent network design algorithm. The first contribution incorporates an Ant Colony Optimization (ACO) algorithm Ant Colony System (ACS) …


A Framework For Analyzing Biometric Template Aging And Renewal Prediction, John W. Carls Mar 2009

A Framework For Analyzing Biometric Template Aging And Renewal Prediction, John W. Carls

Theses and Dissertations

Biometric technology and systems are modernizing identity capabilities. With maturing biometrics in full, rapid development, a higher accuracy of identity verification is required. An improvement to the security of biometric-based verification systems is provided through higher accuracy; ultimately reducing fraud, theft, and loss of resources from unauthorized personnel. With trivial biometric systems, a higher acceptance threshold to obtain higher accuracy rates increase false rejection rates and user unacceptability. However, maintaining the higher accuracy rate enhances the security of the system. An area of biometrics with a paucity of research is template aging and renewal prediction, specifically in regards to facial …


A Taxonomy For And Analysis Of Anonymous Communications Networks, Douglas J. Kelly Mar 2009

A Taxonomy For And Analysis Of Anonymous Communications Networks, Douglas J. Kelly

Theses and Dissertations

Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama’s Cybersecurity Chief-elect recognizes the challenge of increasingly sophisticated cyber attacks. Now through April 2009, the White House is reviewing federal cyber initiatives to protect US citizen privacy rights. Indeed, the rising quantity and ubiquity …


Blind Deconvolution Through Polarization Diversity Of Long Exposure Imagery, Steven P. James Mar 2009

Blind Deconvolution Through Polarization Diversity Of Long Exposure Imagery, Steven P. James

Theses and Dissertations

The purpose of the algorithm developed in this thesis was to create a post processing method that could resolve objects at low signal levels using polarization diversity and no knowledge of the atmospheric seeing conditions. The process uses a two-channel system, one unpolarized image and one linearly polarized image, in a GEM algorithm to reconstruct the object. Previous work done by Strong showed that a two-channel system using polarization diversity on short exposure imagery could produce images up to twice the diffraction limit. In this research, long exposure images were simulated and a simple Kolmogorov model used. This allowed for …


Range Estimation Algorithm Comparison In 3-D Flash Ladar Data, Steven P. Jordan Mar 2009

Range Estimation Algorithm Comparison In 3-D Flash Ladar Data, Steven P. Jordan

Theses and Dissertations

Range estimation algorithms have been applied to Laser Detection and Ranging (LADAR) data to test for accuracy and precision. Data was acquired from Matlab® simulations and an experiment using the Advanced Scientific Concepts 3-D flash LADAR camera. Simulated LADAR data was based on a Gaussian pulse shape model with Poisson noise added. Simulations were performed to test range estimation algorithm performance with respect to waveform position within the range gate. The effectiveness of each algorithm is presented in terms of its average root mean square error and standard deviation in 1000 trials. The measured data experiment examined the effectiveness of …


Mitigating Insider Sabotage And Espionage: A Review Of The United States Air Force's Current Posture, Erika C. Leach Mar 2009

Mitigating Insider Sabotage And Espionage: A Review Of The United States Air Force's Current Posture, Erika C. Leach

Theses and Dissertations

The security threat from malicious insiders affects all organizations. Mitigating this problem is quite difficult due to the fact that (1) there is no definitive profile for malicious insiders, (2) organizations have placed trust in these individuals, and (3) insiders have a vast knowledge of their organization’s personnel, security policies, and information systems. The purpose of this research is to analyze to what extent the United States Air Force (USAF) security policies address the insider threat problem. The policies are reviewed in terms of how well they align with best practices published by the Carnegie Mellon University Computer Emergency Readiness …


Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy Mar 2009

Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy

Theses and Dissertations

With the increase in speed and availability of computers, our nation's computer and information systems are being attacked with increased sophistication. The Air Force Research Laboratory (AFRL) Information Directorate (RI) is researching a next generation network defense architecture, called Cybercraft, that provides automated and trusted cyber defense capabilities for AF network assets. This research we consider the issues to protect or obfuscate command and control aspects of Cybercraft. In particular, we present a methodology to hide aspects of Cybercraft platform initialization in context to formation of hierarchical, peer-to-peer groups that collectively form the Cybercraft network. Because malicious code networks (known …


Super-Resolution Via Image Recapture And Bayesian Effect Modeling, Neil B. Toronto Mar 2009

Super-Resolution Via Image Recapture And Bayesian Effect Modeling, Neil B. Toronto

Theses and Dissertations

The goal of super-resolution is to increase not only the size of an image, but also its apparent resolution, making the result more plausible to human viewers. Many super-resolution methods do well at modest magnification factors, but even the best suffer from boundary and gradient artifacts at high magnification factors. This thesis presents Bayesian edge inference (BEI), a novel method grounded in Bayesian inference that does not suffer from these artifacts and remains competitive in published objective quality measures. BEI works by modeling the image capture process explicitly, including any downsampling, and modeling a fictional recapture process, which together allow …


Cooperative Unmanned Aerial Surveillance Control System Architecture, Theodore T. Diamond, Adam L. Rutherford, Jonathan B. Taylor Mar 2009

Cooperative Unmanned Aerial Surveillance Control System Architecture, Theodore T. Diamond, Adam L. Rutherford, Jonathan B. Taylor

Theses and Dissertations

Intelligence, surveillance and reconnaissance (ISR) is a high-demand Department of Defense mission performed by unmanned aircraft systems (UASs) at the tactical and theater levels. Coordinating UASs through cooperative control offers the advantages of persistence, distributed and adaptable sensor coverage, and reduced revisit time on points of interest. The purpose of this thesis is to apply systems engineering principles to the problem of developing a flexible, common control system for cooperative UAS surveillance at the tactical level. The AFIT team developed a concept of operations (CONOPS) encompassing various users and surveillance tasks. The team then used the scenarios in the CONOPS …


Waypoint Generation Based On Sensor Aimpoint, Shannon M. Farrell Mar 2009

Waypoint Generation Based On Sensor Aimpoint, Shannon M. Farrell

Theses and Dissertations

Secretary of Defense Robert M. Gates has emphasized a need for a greater number of intelligence, surveillance, and reconnaissance (ISR) assets to support combatant commanders and military operations globally. Unmanned systems, especially MAVs, used as ISR platforms provide the ability to maintain covertness during missions and help reduce the risk to human life. This research develops waypoint generation algorithms required to keep a point of interest (POI) in the field of view (FOV) of a fixed sensor on a micro air vehicle (MAV) in the presence of a constant wind.
Fixed sensors, while cheaper and less prone to mechanical failure …


An Exploratory Social Network Analysis Of Military And Civilian Emergency Operation Centers Focusing On Organization Structure, Joseph D. Legradi Mar 2009

An Exploratory Social Network Analysis Of Military And Civilian Emergency Operation Centers Focusing On Organization Structure, Joseph D. Legradi

Theses and Dissertations

The purpose of this research was to explore how United States Air Force Emergency Operation Centers (EOC) compare to civilian EOCs with respect to their task-based social networks and decision making social networks. Multiple measures were explored to understand the networks, which included analyzing key metrics of the network such as closeness centrality and betweenness centrality, centralization of the network, and comparison of structural holes within the networks. These measures were then used to suggest improvements for the organizations to improve performance and more importantly, interoperability. The results of the study showed that in this data set there were several …


Host-Based Multivariate Statistical Computer Operating Process Anomaly Intrusion Detection System (Paids), Glen R. Shilland Mar 2009

Host-Based Multivariate Statistical Computer Operating Process Anomaly Intrusion Detection System (Paids), Glen R. Shilland

Theses and Dissertations

No abstract provided.


Architecting Human Operator Trust In Automation To Improve System Effectiveness In Multiple Unmanned Aerial Vehicles (Uav), Eric A. Cring, Adam G. Lenfestey Mar 2009

Architecting Human Operator Trust In Automation To Improve System Effectiveness In Multiple Unmanned Aerial Vehicles (Uav), Eric A. Cring, Adam G. Lenfestey

Theses and Dissertations

Current Unmanned Aerial System (UAS) designs require multiple operators for each vehicle, partly due to imperfect automation matched with the complex operational environment. This study examines the effectiveness of future UAS automation by explicitly addressing the human/machine trust relationship during system architecting. A pedigreed engineering model of trust between human and machine was developed and applied to a laboratory-developed micro-UAS for Special Operations. This unprecedented investigation answered three primary questions. Can previous research be used to create a useful trust model for systems engineering? How can trust be considered explicitly within the DoD Architecture Framework? Can the utility of architecting …


Low Probability Of Intercept Waveforms Via Intersymbol Dither Performance Under Multipath Conditions, Jonathan K. Keen Mar 2009

Low Probability Of Intercept Waveforms Via Intersymbol Dither Performance Under Multipath Conditions, Jonathan K. Keen

Theses and Dissertations

This thesis examines the effects of multipath interference on Low Probability of Intercept (LPI) waveforms generated using intersymbol dither. LPI waveforms are designed to be difficult for non-cooperative receivers to detect and manipulate, and have many uses in secure communications applications. In prior research, such a waveform was designed using a dither algorithm to vary the time between the transmission of data symbols in a communication system. This work showed that such a method can be used to frustrate attempts to use non-cooperative receiver algorithms to recover the data. This thesis expands on prior work by examining the effects of …


The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis Mar 2009

The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis

Theses and Dissertations

This thesis examines the problem in initializing communications whereby cognitive radios need to find common spectrum with other cognitive radios, a process known as frequency rendezvous. It examines the rendezvous problem as it exists in a dynamic spectrum access cognitive network. Specifically, it addresses the problem of rendezvous in an infrastructureless environment. A new algorithm, the modular clock algorithm, is developed and analyzed as a solution for the simple rendezvous environment model, coupled with a modified version for environment models with less information. The thesis includes a taxonomy of commonly used environment models, and analysis of previous efforts to solve …


The Development Of It Suspicion As A Construct And Subsequent Measure, Matthew T. Olson Mar 2009

The Development Of It Suspicion As A Construct And Subsequent Measure, Matthew T. Olson

Theses and Dissertations

Suspicion has not been studied in great depth; however, a conceptual understanding of suspicion is no less important than many of the other highly studied constructs related to healthy working relationships. Information technology (IT) is one area where suspicion study is lacking, and this research effort was a study into the specific domain of IT suspicion. An extensive study of the suspicion literature and the suspicion nomological net as well as informal surveys of the general populous and subject matter experts were used to create an IT suspicion conceptual definition and measure. In order to test IT suspicion’s relationships with …


Image Processing For Multiple-Target Tracking On A Graphics Processing Unit, Michael A. Tanner Mar 2009

Image Processing For Multiple-Target Tracking On A Graphics Processing Unit, Michael A. Tanner

Theses and Dissertations

Multiple-target tracking (MTT) systems have been implemented on many different platforms, however these solutions are often expensive and have long development times. Such MTT implementations require custom hardware, yet offer very little flexibility with ever changing data sets and target tracking requirements. This research explores how to supplement and enhance MTT performance with an existing graphics processing unit (GPU) on a general computing platform. Typical computers are already equipped with powerful GPUs to support various games and multimedia applications. However, such GPUs are not currently being used in desktop MTT applications. This research explores if and how a GPU can …


A Hybrid Templated-Based Composite Classification System, Michael A. Turnbaugh Mar 2009

A Hybrid Templated-Based Composite Classification System, Michael A. Turnbaugh

Theses and Dissertations

An automatic target classification system contains a classifier which reads a feature as an input and outputs a class label. Typically, the feature is a vector of real numbers. Other features can be non-numeric, such as a string of symbols or alphabets. One method of improving the performance of an automatic classification system is through combining two or more independent classifiers that are complementary in nature. Complementary classifiers are observed by finding an optimal method for partitioning the problem space. For example, the individual classifiers may operate to identify specific objects. Another method may be to use classifiers that operate …


Numerical Analysis For Relevant Features In Intrusion Detection (Narfid), Jose Andres Gonzalez Mar 2009

Numerical Analysis For Relevant Features In Intrusion Detection (Narfid), Jose Andres Gonzalez

Theses and Dissertations

Identification of cyber attacks and network services is a robust field of study in the machine learning community. Less effort has been focused on understanding the domain space of real network data in identifying important features for cyber attack and network service classification. Motivations for such work allow for anomaly detection systems with less requirements on data “sniffed” off the network, extraction of features from the traffic, reduced learning time of algorithms, and ideally increased classification performance of anomalous behavior. This thesis evaluates the usefulness of a good feature subset for the general classification task of identifying cyber attacks and …


Using Predictive Rendering As A Vision-Aided Technique For Autonomous Aerial Refueling, Adam D. Weaver Mar 2009

Using Predictive Rendering As A Vision-Aided Technique For Autonomous Aerial Refueling, Adam D. Weaver

Theses and Dissertations

This research effort seeks to characterize a vision-aided approach for an Unmanned Aerial System (UAS) to autonomously determine relative position to another aircraft in a formation, specifically to address the autonomous aerial refueling problem. A system consisting of a monocular digital camera coupled with inertial sensors onboard the UAS is analyzed for feasibility of using this vision-aided approach. A three-dimensional rendering of the tanker aircraft is used to generate predicted images of the tanker as seen by the receiver aircraft. A rigorous error model is developed to model the relative dynamics between an INS-equipped receiver and the tanker aircraft. A …


“Humanoid Robot” “Programming Of Movement Patterns” “Humanoid - Bioloid”, Faton Bekteshi Mar 2009

“Humanoid Robot” “Programming Of Movement Patterns” “Humanoid - Bioloid”, Faton Bekteshi

Theses and Dissertations

This thesis was developed in collaboration with Univ.Prof.Dipl.-Ing.Dr.Dr.h.c.mult. Peter Kopacek and Msc. Artan Dermaku and boosted the creation of the Humanoid Robotics Laboratory of UBT, at University for Business and Technology in Prishtina. ( http://www.ubt-uni.net/ ).

The main objective of the Humanoid Robot, for the time being, is to develop a

humanoid robot able to make complex motions like walking, running and jumping through real-time feedback control techniques.

This exposition presents a Linear Quadratic Regulator (LQR) controller for the simulation and control of the humanoid robot. Also our objective during programming the robot was to make him able improving military …


Satellite-Based Fusion Of Image/Inertial Sensors For Precise Geolocation, Neil R. Jesse Feb 2009

Satellite-Based Fusion Of Image/Inertial Sensors For Precise Geolocation, Neil R. Jesse

Theses and Dissertations

The ability to produce high-resolution images of the Earth’s surface from space has flourished in recent years with the continuous development and improvement of satellite-based imaging sensors. Earth-imaging satellites often rely on complex onboard navigation systems, with dependence on Global Positioning System (GPS) tracking and/or continuous post-capture georegistration, to accurately geolocate ground targets of interest to either commercial and military customers. Consequently, these satellite systems are often massive, expensive, and susceptible to poor or unavailable target tracking capabilities in GPS-denied environments. Previous research has demonstrated that a tightly-coupled image-aided inertial navigation system (INS), using existing onboard imaging sensors, can provide …


Automated Virtual Machine Introspection For Host-Based Intrusion Detection, Brett A. Pagel Feb 2009

Automated Virtual Machine Introspection For Host-Based Intrusion Detection, Brett A. Pagel

Theses and Dissertations

This thesis examines techniques to automate configuration of an intrusion detection system utilizing hardware-assisted virtualization. These techniques are used to detect the version of a running guest operating system, automatically configure version-specific operating system information needed by the introspection library, and to locate and monitor important operating system data structures. This research simplifies introspection library configuration and is a step toward operating system independent introspection. An operating system detection algorithm and Windows virtual machine system service dispatch table monitor are implemented using the Xen hypervisor and a modified version of the XenAccess library. All detection and monitoring is implemented from …


An Fpga-Based System For Tracking Digital Information Transmitted Via Peer-To-Peer Protocols, Karl R. Schrader Feb 2009

An Fpga-Based System For Tracking Digital Information Transmitted Via Peer-To-Peer Protocols, Karl R. Schrader

Theses and Dissertations

This thesis addresses the problem of identifying and tracking digital information that is shared using peer-to-peer file transfer and Voice over IP (VoIP) protocols. The goal of the research is to develop a system for detecting and tracking the illicit dissemination of sensitive government information using file sharing applications within a target network, and tracking terrorist cells or criminal organizations that are covertly communicating using VoIP applications. A digital forensic tool is developed using an FPGA-based embedded software application. The tool is designed to process file transfers using the BitTorrent peer-to-peer protocol and VoIP phone calls made using the Session …


A Unified Approach To Gpu-Accelerated Aerial Video Enhancement Techniques, Stephen Thayn Cluff Feb 2009

A Unified Approach To Gpu-Accelerated Aerial Video Enhancement Techniques, Stephen Thayn Cluff

Theses and Dissertations

Video from aerial surveillance can provide a rich source of data for analysts. From the time-critical perspective of wilderness search and rescue operations, information extracted from aerial videos can mean the difference between a successful search and an unsuccessful search. When using low-cost, payload-limited mini-UAVs, as opposed to more expensive platforms, several challenges arise, including jittery video, narrow fields of view, low resolution, and limited time on screen for key features. These challenges make it difficult for analysts to extract key information in a timely manner. Traditional approaches may address some of these issues, but no existing system effectively addresses …


Strategy, Robot Soccer In Fira Mirosot Category, Kushtrim Dragusha Jan 2009

Strategy, Robot Soccer In Fira Mirosot Category, Kushtrim Dragusha

Theses and Dissertations

Robot Soccer strategy is main part of robot soccer system, where strategy makes briefing of the entire system. Where, using different functions and programming hardware features in the way of batter usage of system, should improve the soccer game of robots. Functions combined between each other to make so called strategy where it is called main part of entire system. Because of this beautiful impact on system, any way entire system is just to make strategy working, and for sure devices on system will have also their impact on strategy behaviour. Thesis mainly has to deal with the way of …


Exploring Impact Of Educational And Economic Factors On National Intellectual Productivity Using Machine Learning Methods, Canon Fazenbaker Jan 2009

Exploring Impact Of Educational And Economic Factors On National Intellectual Productivity Using Machine Learning Methods, Canon Fazenbaker

Theses and Dissertations

The patent process is representative of a nationwide means for innovations and new ideas to be recognized. The U.S. Patents Office, since its inception in 1790, has issued nearly five million patents. These patents span from the U.S. Patent #1, which was for an improvement "in the making of Pot ash and Pearl ash by a new Apparatus and Process" to today's patents which deal with technologies and mediums that were unimaginable at the Patent Offices' inception. The purpose of this study is to determine what social and economic factors at the federal level have the highest impact on national …