Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 36

Full-Text Articles in Engineering

Measurement And Modeling Of Infrared Nonlinear Absorption Coefficients And Laser-Induced Damage Thresholds In Ge And Gasb, Torrey J. Wagner, Matthew J. Bohn, Ronald A. Coutu Jr., L. P. Gonzales, J. M. Murray, K. L. Schepler, S. Guha Oct 2010

Measurement And Modeling Of Infrared Nonlinear Absorption Coefficients And Laser-Induced Damage Thresholds In Ge And Gasb, Torrey J. Wagner, Matthew J. Bohn, Ronald A. Coutu Jr., L. P. Gonzales, J. M. Murray, K. L. Schepler, S. Guha

Faculty Publications

Using a simultaneous fitting technique to extract nonlinear absorption coefficients from data at two pulse widths, we measure two-photon and free-carrier absorption coefficients for Ge and GaSb at 2.05 and 2.5 µm for the first time, to our knowledge. Results agreed well with published theory. Single-shot damage thresholds were also measured at 2.5 µm and agreed well with modeled thresholds using experimentally determined parameters including nonlinear absorption coefficients and temperature dependent linear absorption. The damage threshold for a single-layer Al2O3 anti-reflective coating on Ge was 55% or 35% lower than the uncoated threshold for picosecond or nanosecond …


Determining The Index Of Refraction Of An Unknown Object Using Passive Polarimetric Imagery Degraded By Atmospheric Turbulence, Milo W. Hyde Iv Sep 2010

Determining The Index Of Refraction Of An Unknown Object Using Passive Polarimetric Imagery Degraded By Atmospheric Turbulence, Milo W. Hyde Iv

Theses and Dissertations

In this research, an algorithm is developed to estimate the index of refraction of an unknown object using passive polarimetric images degraded by atmospheric turbulence. The algorithm uses a variant of the maximum-likelihood blind-deconvolution algorithm developed by LeMaster and Cain to recover the true object (i.e., the first Stokes parameter), the degree of linear polarization, and the polarimetric-image point spread functions. Nonlinear least squares is then used to find the value of the complex index of refraction which best fits the theoretical degree of linear polarization, derived using a polarimetric bidirectional reflectance distribution function, to the turbulence-corrected degree of linear …


Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey Sep 2010

Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey

Theses and Dissertations

This research effort examines the theory, application, and results for a Reputation-based Internet Protocol Security (RIPSec) framework that provides security for an ad-hoc network operating in a hostile environment. In RIPSec, protection from external threats is provided in the form of encrypted communication links and encryption-wrapped nodes while internal threats are mitigated by behavior grading that assigns reputations to nodes based on their demonstrated participation in the routing process. Network availability is provided by behavior grading and round-robin multipath routing. If a node behaves faithfully, it earns a positive reputation over time. If a node misbehaves (for any number of …


Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard Sep 2010

Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard

Theses and Dissertations

As malware has evolved over the years, it has gone from harmless programs that copy themselves into other executables to modern day botnets that perform bank fraud and identity theft. Modern malware often has a need to communicate back to the author, or other machines that are also infected. Several techniques for transmitting this data covertly have been developed over the years which vary significantly in their level of sophistication. This research creates a new covert channel technique for stealing information from a network by piggybacking on user-generated network traffic. Specifically, steganography drop boxes and passive covert channels are merged …


All Solid-State Mid-Ir Laser Development, Nonlinear Absorption Investigation And Laser-Induced Damage Study, Torrey J. Wagner Sep 2010

All Solid-State Mid-Ir Laser Development, Nonlinear Absorption Investigation And Laser-Induced Damage Study, Torrey J. Wagner

Theses and Dissertations

In this research, nonlinear optical absorption coefficients and laser-induced damage thresholds are measured in Ge and GaSb, which are materials that are used in IR detectors. Using a simultaneous fitting technique to extract nonlinear absorption coefficients from data at two pulse widths, two-photon and free-carrier absorption coefficients are measured in Ge and GaSb at 2.05 and 2.5 μm for the first time. At these wavelengths, nonlinear absorption is the primary damage mechanism, and damage thresholds at picosecond and nanosecond pulse widths were measured and agreed well with modeled thresholds using experimentally measured parameters. The damage threshold for a single-layer Al …


Analytical Solutions For Efficient Interpretation Of Single-Well Push-Pull Tracer Tests, Junqi Huang, John A. Christ, Mark N. Goltz Aug 2010

Analytical Solutions For Efficient Interpretation Of Single-Well Push-Pull Tracer Tests, Junqi Huang, John A. Christ, Mark N. Goltz

Faculty Publications

Single-well push-pull tracer tests have been used to characterize the extent, fate, and transport of subsurface contamination. Analytical solutions provide one alternative for interpreting test results. In this work, an exact analytical solution to two-dimensional equations describing the governing processes acting on a dissolved compound during a modified push-pull test (advection, longitudinal and transverse dispersion, first-order decay, and rate-limited sorption/partitioning in steady, divergent, and convergent flow fields) is developed. The coupling of this solution with inverse modeling to estimate aquifer parameters provides an efficient methodology for subsurface characterization. Synthetic data for single-well push-pull tests are employed to demonstrate the utility …


Developing A Hybrid Virtualization Platform Design For Cyber Warfare And Simulation, Kyle E. Stewart Jun 2010

Developing A Hybrid Virtualization Platform Design For Cyber Warfare And Simulation, Kyle E. Stewart

Theses and Dissertations

Virtualization is a technique used to model and simulate the cyber domain, as well as train and educate. Different types of virtualization techniques exist that each support a unique set of benefits and requirements. This research proposes a novel design that incorporates host and network virtualization concepts for a cyber warfare training platform. At the host level, hybrid virtualization combines full and operating system virtualization techniques in order to leverage the benefits and minimize the drawbacks of each individual technique. Network virtualization allows virtual machines to connect in flexible topologies, but it also incurs additional processing overhead. Quantitative analysis falls …


Deterministic, Efficient Variation Of Circuit Components To Improve Resistance To Reverse Engineering, Daniel F. Koranek Jun 2010

Deterministic, Efficient Variation Of Circuit Components To Improve Resistance To Reverse Engineering, Daniel F. Koranek

Theses and Dissertations

This research proposes two alternative methods for generating semantically equivalent circuit variants which leave the circuit's internal structure pseudo-randomly determined. Component fusion deterministically selects subcircuits using a component identification algorithm and replaces them using a deterministic algorithm that generates canonical logic forms. Component encryption seeks to alter the semantics of individual circuit components using an encoding function, but preserves the overall circuit semantics by decoding signal values later in the circuit. Experiments were conducted to examine the performance of component fusion and component encryption against representative trials of subcircuit selection-and-replacement and Boundary Blurring, two previously defined methods for circuit obfuscation. …


Changes To Electrical Conductivity In Irradiated Carbon-Nickel Nanocomposites, David F. Coy Mar 2010

Changes To Electrical Conductivity In Irradiated Carbon-Nickel Nanocomposites, David F. Coy

Theses and Dissertations

Pre and post irradiation resistivity and XAFS measurements have been conducted to examine the effects of 0.5 MeV electron irradiations on nickel-carbon composites. Results showed a decrease in surface resistivity in all sample types of 14-30% following irradiation with a total electron exposure of 4 x 10-16 cm-2. Results also showed a corresponding decrease in NiO content for the irradiated samples as compared to measurements of non-irradiated samples. Surface resistivity measurement capabilities were established and measurement techniques refined to produce repeatable results of sufficient precision to discern changes in resistivity for an exposure of 2 x 10 …


Optical Properties Of Si, Ge, Gaas, Gasb, Inas, And Inp At Elevated Temperatures, Thomas R. Harris Mar 2010

Optical Properties Of Si, Ge, Gaas, Gasb, Inas, And Inp At Elevated Temperatures, Thomas R. Harris

Theses and Dissertations

Investigation of the optical and electrical behavior of some semiconductors at very high temperatures has not been an area of much study, at least not experimentally. The importance of such research becomes obvious due to the effects of high temperatures on semiconductor devices such as infrared detectors and light emitters. Besides the destructive effects of thermal stress and melting, changes in the optical properties of the material can greatly affect device performance. In this research, the infrared absorption of Si, Ge, GaAs, GaSb, InAs, and InP was measured from 0.6 to 25 μm at temperatures ranging from 295 up to …


Afm-Patterned 2-D Thin-Film Photonic Crystal Analyzed By Complete Angle Scatter, Nicholas C. Herr Mar 2010

Afm-Patterned 2-D Thin-Film Photonic Crystal Analyzed By Complete Angle Scatter, Nicholas C. Herr

Theses and Dissertations

The purpose of this research was to use an atomic force microscope (AFM) to generate a 2-D square array of sub-wavelength surface features from a single material over a region large enough to permit optical characterization. This work is an extension of previous AFIT nano-patterning work and is in response to the small subunit sizes demanded for the production of optical metamaterials and photonic crystals. A diamond nano-indentation AFM probe was used to produce a 325-μm by 200-μm array of indentations in a 120-nm thick polystyrene film deposited on silicon. Indentation spacing of 400 nm produced well-defined surface features with …


Handshaking Protocols And Jamming Mechanisms For Blind Rendezvous In A Dynamic Spectrum Access Environment, Aaron A. Gross Mar 2010

Handshaking Protocols And Jamming Mechanisms For Blind Rendezvous In A Dynamic Spectrum Access Environment, Aaron A. Gross

Theses and Dissertations

Blind frequency rendezvous is an important process for bootstrapping communications between radios without the use of pre-existing infrastructure or common control channel in a Dynamic Spectrum Access (DSA) environment. In this process, radios attempt to arrive in the same frequency channel and recognize each other’s presence in changing, under-utilized spectrum. This paper refines existing blind rendezvous techniques by introducing a handshaking algorithm for setting up communications once two radios have arrived in the same frequency channel. It then investigates the effect of different jamming techniques on blind rendezvous algorithms that utilize this handshake. The handshake performance is measured by determining …


Utilizing The Digital Fingerprint Method For Secure Key Generation, Jennifer C. Anilao Mar 2010

Utilizing The Digital Fingerprint Method For Secure Key Generation, Jennifer C. Anilao

Theses and Dissertations

This research examines a new way to generate an uncloneable secure key by taking advantage of the delay characteristics of individual transistors. The user profiles the circuit to deduce the glitch count of each output line for each number of selectable buffers added to the circuit. The user can then use this information to generate a specific glitch count on each output line, which is passed to an encryption algorithm as its key. The results detail tests of two configurations for adding a selectable amount of buffers into each glitch circuit in order to induce additional delay. One configuration adds …


Verification Of Kam Theory On Earth Orbiting Satellites, Christian L. Bisher Mar 2010

Verification Of Kam Theory On Earth Orbiting Satellites, Christian L. Bisher

Theses and Dissertations

This paper uses KAM torus theory and Simplified General Perturbations 4 (SGP4) orbit prediction techniques compiled by Dr. William Wiesel and compares it to Analytical Graphics ® Incorporated (AGI) Satellite Toolkit ® (STK) orbit data. The goal of this paper is to verify KAM torus theory can be used to describe and propagate an Earth satellite orbit with similar accuracy to existing general perturbation techniques. Using SGP4 code including only truncated geopotential effects, KAM torus generating code, and other utilities were used to describe a particular satellite orbit as a torus and then propagate the satellite using traditional and KAM …


Effects Of Channel Mismatches On Beamforming And Signal Detection, Christopher I. Allen Mar 2010

Effects Of Channel Mismatches On Beamforming And Signal Detection, Christopher I. Allen

Theses and Dissertations

Tuner gain measurements of a multichannel receiver are reported. A linear regression model is used to characterize the gain, as a function of channel number, tuner set-on frequency, and intermediate frequency. Residual errors of this model are characterized by a t distribution. Very strong autocorrelation of tuner gain at various frequencies is noted. Tuner performance from one channel to the next is diverse; several defects at specific frequencies are noted. The Wilcoxon signed rank test is used to test normality of tuner gain among devices; normality is rejected. Antenna directivity and phase pattern measurements are also reported. An antenna element …


Developing An Effective And Efficient Real Time Strategy Agent For Use As A Computer Generated Force, Kurt Weissgerber Mar 2010

Developing An Effective And Efficient Real Time Strategy Agent For Use As A Computer Generated Force, Kurt Weissgerber

Theses and Dissertations

Computer Generated Forces (CGF) are used to represent units or individuals in military training and constructive simulation. The use of CGF significantly reduces the time and money required for effective training. For CGF to be effective, they must behave as a human would in the same environment. Real Time Strategy (RTS) games place players in control of a large force whose goal is to defeat the opponent. The military setting of RTS games makes them an excellent platform for the development and testing of CGF. While there has been significant research in RTS agent development, most of the developed agents …


Frequency Diverse Array Radar: Signal Characterization And Measurement Accuracy, Steven H. Brady Mar 2010

Frequency Diverse Array Radar: Signal Characterization And Measurement Accuracy, Steven H. Brady

Theses and Dissertations

Radar systems provide an important remote sensing capability, and are crucial to the layered sensing vision; a concept of operation that aims to apply the right number of the right types of sensors, in the right places, at the right times for superior battle space situational awareness. The layered sensing vision poses a range of technical challenges, including radar, that are yet to be addressed. To address the radar-specific design challenges, the research community responded with waveform diversity; a relatively new field of study which aims reduce the cost of remote sensing while improving performance. Early work suggests that the …


Developing Cyberspace Data Understanding: Using Crisp-Dm For Host-Based Ids Feature Mining, Joseph R. Erskine Mar 2010

Developing Cyberspace Data Understanding: Using Crisp-Dm For Host-Based Ids Feature Mining, Joseph R. Erskine

Theses and Dissertations

Current intrusion detection systems generate a large number of specific alerts, but do not provide actionable information. Many times, these alerts must be analyzed by a network defender, a time consuming and tedious task which can occur hours or days after an attack occurs. Improved understanding of the cyberspace domain can lead to great advancements in Cyberspace situational awareness research and development. This thesis applies the Cross Industry Standard Process for Data Mining (CRISP-DM) to develop an understanding about a host system under attack. Data is generated by launching scans and exploits at a machine outfitted with a set of …


Hard Collisions In Rubidium Using Sub-Doppler Spectroscopy, Douglas E. Thornton Mar 2010

Hard Collisions In Rubidium Using Sub-Doppler Spectroscopy, Douglas E. Thornton

Theses and Dissertations

To better understand the laser kinetics of an alkali gain medium, hard collisions, or velocity-changing collisions, has been studied and a velocity-changing collisional rate has been calculated. Previous works have studied these collisions, but no rate has been calculated. Using the precise tool of sub-Doppler spectroscopy, atomic hard collisions can be observed. The collected spectra are fitted with two different line shapes to demonstrate the accuracy of this method. From the fits, the number of hard collisions can be extracted. The time scale of the hard collisions in rubidium is interpolated by varying the chopping frequency of the pump beam, …


Validation Of A Novel Approach To Solving Multibody Systems Using Hamilton's Weak Principle, Ashton D. Hainge Mar 2010

Validation Of A Novel Approach To Solving Multibody Systems Using Hamilton's Weak Principle, Ashton D. Hainge

Theses and Dissertations

A novel approach for formulating and solving for the dynamic response of multibody systems has been developed using Hamilton’s Law of Varying Action as its unifying principle. In order to assure that the associated computer program is sufficiently robust when applied across a wide range of dynamic systems, the program must be verified and validated. The purpose of the research was to perform the verification and validation of the program. Results from the program were compared with closed-form and numerical solutions of simple systems, such as a simple pendulum and a rotating pendulum. The accuracy of the program for complex …


Numerical Investigation Of Pre-Detonator Geometries For Pde Applications, Robert T. Fievisohn Mar 2010

Numerical Investigation Of Pre-Detonator Geometries For Pde Applications, Robert T. Fievisohn

Theses and Dissertations

A parametric study was performed to determine optimal geometries to allow the successful transition of a detonation from a pre-detonator into the thrust tube of a pulse detonation engine. The study was performed using a two-dimensional Euler solver with progress variables to model the chemistry. The geometrical configurations for the simulations look at the effect of shock reflections, flow obstructions, and detonation diffraction to determine successful geometries. It was observed that there are success and failure rates associated with pre-detonators. These success rates appear to be determined by the transverse wave structure of a stably propagating detonation wave and must …


Mission Analysis And Design For Space Based Inter-Satellite Laser Power Beaming, Nicholas M. Keller Mar 2010

Mission Analysis And Design For Space Based Inter-Satellite Laser Power Beaming, Nicholas M. Keller

Theses and Dissertations

This research effort develops an interdisciplinary design tool to optimize an orbit for the purpose of wirelessly beaming power from the International Space Stations (ISS) Japanese Experimental Module Exposed Facility (JEM/EF) to a target satellite. For the purpose of this initiative, the target satellite will be referred to as FalconSAT6, a reference to the proposed follow-on satellite to the U.S. Air Force Academy’s (USAFA) FalconSAT5 program. The USAFA FalconSAT program provides cadets an opportunity to design, analyze, build, test and operate small satellites to conduct Department of Defense (DoD) space missions. The tool developed for this research is designed to …


Multi-Objective Constraint Satisfaction For Mobile Robot Area Defense, Kenneth W. Mayo Mar 2010

Multi-Objective Constraint Satisfaction For Mobile Robot Area Defense, Kenneth W. Mayo

Theses and Dissertations

In developing multi-robot cooperative systems, there are often competing objectives that need to be met. For example in automating area defense systems, multiple robots must work together to explore the entire area, and maintain consistent communications to alert the other agents and ensure trust in the system. This research presents an algorithm that tasks robots to meet the two specific goals of exploration and communication maintenance in an uncoordinated environment reducing the need for a user to pre-balance the objectives. This multi-objective problem is defined as a constraint satisfaction problem solved using the Non-dominated Sorting Genetic Algorithm II (NSGA-II). Both …


Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai Mar 2010

Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai

Theses and Dissertations

Insider threats can pose a great risk to organizations and by their very nature are difficult to protect against. Auditing and system logging are capabilities present in most operating systems and can be used for detecting insider activity. However, current auditing methods are typically applied in a haphazard way, if at all, and are not conducive to contributing to an effective insider threat security policy. This research develops a methodology for designing a customized auditing and logging template for a Linux operating system. An intent-based insider threat risk assessment methodology is presented to create use case scenarios tailored to address …


A Distributed Network Logging Topology, Nicholas E. Fritts Mar 2010

A Distributed Network Logging Topology, Nicholas E. Fritts

Theses and Dissertations

Network logging is used to monitor computer systems for potential problems and threats by network administrators. Research has found that the more logging enabled, the more potential threats can be detected in the logs (Levoy, 2006). However, generally it is considered too costly to dedicate the manpower required to analyze the amount of logging data that it is possible to generate. Current research is working on different correlation and parsing techniques to help filter the data, but these methods function by having all of the data dumped in to a central repository. Central repositories are limited in the amount of …


Visually Managing Ipsec, Peter J. Dell'accio Mar 2010

Visually Managing Ipsec, Peter J. Dell'accio

Theses and Dissertations

The United States Air Force relies heavily on computer networks to transmit vast amounts of information throughout its organizations and with agencies throughout the Department of Defense. The data take many forms, utilize different protocols, and originate from various platforms and applications. It is not practical to apply security measures specific to individual applications, platforms, and protocols. Internet Protocol Security (IPsec) is a set of protocols designed to secure data traveling over IP networks, including the Internet. By applying security at the network layer of communications, data packets can be secured regardless of what application generated the data or which …


Codifying Information Assurance Controls For Department Of Defense (Dod) Supervisory Control And Data Acquisition (Scada) Systems (U), Eddie A. Mendezllovet Mar 2010

Codifying Information Assurance Controls For Department Of Defense (Dod) Supervisory Control And Data Acquisition (Scada) Systems (U), Eddie A. Mendezllovet

Theses and Dissertations

Protecting DoD critical infrastructure resources and Supervisory Control and Data Acquisition (SCADA) systems from cyber attacks is becoming an increasingly challenging task. DoD Information Assurance controls provide a sound framework to achieve an appropriate level of confidentiality, integrity, and availability. However, these controls have not been updated since 2003 and currently do not adequately address the security of DoD SCADA systems. This research sampled U.S. Air Force Civil Engineering subject matter experts representing eight Major Commands that manage and operate SCADA systems. They ranked 30 IA controls in three categories, and evaluated eight SCADA specific IA controls for inclusion into …


Augmenting Latent Dirichlet Allocation And Rank Threshold Detection With Ontologies, Laura A. Isaly Mar 2010

Augmenting Latent Dirichlet Allocation And Rank Threshold Detection With Ontologies, Laura A. Isaly

Theses and Dissertations

In an ever-increasing data rich environment, actionable information must be extracted, filtered, and correlated from massive amounts of disparate often free text sources. The usefulness of the retrieved information depends on how we accomplish these steps and present the most relevant information to the analyst. One method for extracting information from free text is Latent Dirichlet Allocation (LDA), a document categorization technique to classify documents into cohesive topics. Although LDA accounts for some implicit relationships such as synonymy (same meaning) it often ignores other semantic relationships such as polysemy (different meanings), hyponym (subordinate), meronym (part of), and troponomys (manner). To …


Application Of Satellite-Derived Wind Profiles To Joint Precision Airdrop System (Jpads) Operations, David C. Meier Mar 2010

Application Of Satellite-Derived Wind Profiles To Joint Precision Airdrop System (Jpads) Operations, David C. Meier

Theses and Dissertations

The Joint Precision Airdrop System has revolutionized military airdrop capability, allowing accurate delivery of equipment and supplies to smaller drop zones, from higher altitudes than was previously possible. This capability depends on accurate wind data which is currently provided by a combination of high-resolution forecast models and GPS dropsondes released in the vicinity of the dropzone shortly before the airdrop. This research develops a windprofiling algorithm to derive the needed wind data from passive IR satellite soundings, eliminating the requirement for a hazardous dropsonde pass near the drop zone, or allowing the dropsonde to be dropped farther from the dropzone. …


Monocular Passive Ranging By An Optical System With Band Pass Filtering, Joel R. Anderson Mar 2010

Monocular Passive Ranging By An Optical System With Band Pass Filtering, Joel R. Anderson

Theses and Dissertations

An instrument for monocular passive ranging based on atmospheric oxygen absorption near 762 nm has been designed, built and deployed to track emissive targets, including the plumes from jet engines or rockets. An intensified CCD array is coupled to variable band pass liquid crystal display filter and 3.5 – 8.8 degree field of view optics to observe the target. By recording sequential images at 7 Hz in three 6 nm width bands, the transmittance of the R-branch of the O2 (X-b) (0,0) band is determined. A metric curve for determining range from transmittance is developed using the HITRAN spectral …