Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

2013

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 146

Full-Text Articles in Engineering

Using Software-Based Decision Procedures To Control Instruction-Level Execution, William B. Kimball Dec 2013

Using Software-Based Decision Procedures To Control Instruction-Level Execution, William B. Kimball

AFIT Patents

An apparatus, method and program product are provided for securing a computer system. A digital signature of an application is checked, which is loaded into a memory of the computer system configured to contain memory pages. In response to finding a valid digital signature, memory pages containing instructions of the application are set as executable and memory pages other than those containing instructions of the application are set as non-executable. Instructions in executable memory pages are executed. Instructions in non-executable memory pages are prevented from being executed. A page fault is generated in response to an attempt to execute an …


Mems Cantilever Sensor For Thz Photoacoustic Chemical Sensing And Spectroscopy, Nathan E. Glauvitz Dec 2013

Mems Cantilever Sensor For Thz Photoacoustic Chemical Sensing And Spectroscopy, Nathan E. Glauvitz

Theses and Dissertations

Sensitive Microelectromechanical System (MEMS) cantilever designs were modeled, fabricated, and tested to measure the photoacoustic (PA) response of gasses to terahertz (THz) radiation. Surface and bulk micromachining technologies were employed to create the extremely sensitive devices that could detect very small changes in pressure. Fabricated devices were then tested in a custom made THz PA vacuum test chamber where the cantilever deflections caused by the photoacoustic effect were measured with a laser interferometer and iris beam clipped methods. The sensitive cantilever designs achieved a normalized noise equivalent absorption coefficient of 2.83x10-10 cm-1 W Hz-1/2 using a 25 …


Modeling Reliability Growth In Accelerated Stress Testing, Jason K. Freels Dec 2013

Modeling Reliability Growth In Accelerated Stress Testing, Jason K. Freels

Theses and Dissertations

Qualitative accelerated test methods improve system reliability by identifying and removing initial design flaws. However, schedule and cost constraints often preclude sufficient testing to generate a meaningful reliability estimate from the data obtained in these tests. In this dissertation a modified accelerated life test is proposed to assess the likelihood of attaining a reliability requirement based on tests of early system prototypes. Assuming each prototype contains an unknown number of independent competing failure modes whose respective times to occurrence are governed by a distinct Weibull law, the observed failure data from this qualitative test are shown to follow a poly-Weibull …


Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith Dec 2013

Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith

AFIT Patents

A method of managing patient care and emergency response following a Chemical, Biological, Radiological, or Nuclear Explosive (CBRNE) attack and maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA). The method including identifying each patient with a unique patient identifier, the identifier based upon the geospatial location of the patient, the geospatial location including at least the latitude and longitude of the patient when first treated, the unique patient identifier being part of patient data. Providing a collection point of patient data to form a patient data database where in the patient location data may be used to …


Mems Fabrication Process Base On Su-8 Masking Layers, Scott A. Ostrow, Ronald A. Coutu Jr. Nov 2013

Mems Fabrication Process Base On Su-8 Masking Layers, Scott A. Ostrow, Ronald A. Coutu Jr.

AFIT Patents

A novel fabrication process uses a combination of negative and positive photoresists with positive tone photomasks, resulting in masking layers suitable for bulk micromachining high-aspect ratio microelectromechanical systems (MEMS) devices. This technique allows the use of positive photomasks with negative resists, opening the door to an ability to create complementary mechanical structures without the fabrication delays and costs associated with having to obtain a negative photomask. In addition, whereas an SU-8 mask would normally be left in place after processing, a technique utilizing a positive photoresist as a release layer has been developed so that the SU-8 masking material can …


Coded Aperture Aided Navigation And Geolocation Systems, Jamie R. Morrison, John F. Raquet, Michael J. Veth Nov 2013

Coded Aperture Aided Navigation And Geolocation Systems, Jamie R. Morrison, John F. Raquet, Michael J. Veth

AFIT Patents

A micro air vehicle having a navigation system with a single camera to determine position and attitude of the vehicle using changes the direction to the observed features. The difference between the expected directions to the observed features versus the measured direction to the observed features is used to correct a navigation solution.


Deployed Communications In An Austere Environment: A Delphi Study, Andrew Soine, James Harker, Alan R. Heminger Nov 2013

Deployed Communications In An Austere Environment: A Delphi Study, Andrew Soine, James Harker, Alan R. Heminger

Faculty Publications

The information and communications technology (ICT) field is undergoing a period of tremendous change. The exponential growth rate of ICT capability in recent decades, which has had an undeniable effect on every aspect of our society, will likely have ramifications for military operations in austere environments. 1 The Air Force’s 689th Combat Communications Wing commissioned a study to forecast the future of mobile ICT in such environments. Researchers at the Air Force Institute of Technology chose to employ the Delphi technique as the methodology for executing this task. The following scenario, based on the results of that study, demonstrates how …


A Clamped Dual-Ridged Waveguide Measurement System For The Broadband, Nondestructive Characterization Of Sheet Materials, Milo W. Hyde Iv, Michael J. Havrilla Oct 2013

A Clamped Dual-Ridged Waveguide Measurement System For The Broadband, Nondestructive Characterization Of Sheet Materials, Milo W. Hyde Iv, Michael J. Havrilla

Faculty Publications

A novel two-port probe which uses dual-ridged waveguides for the nondestructive, broadband characterization of sheet materials is presented. The new probe is shown to possess approximately 2 to 3 times the bandwidth of traditional coaxial and rectangular/circular waveguide probe systems while maintaining the structural robustness characteristic of rectangular/circular waveguide probe systems. The theoretical development of the probe is presented, namely, by applying Love’s equivalence theorem and enforcing the continuity of transverse fields at the dual-ridged waveguide apertures, a system of coupled magnetic field integral equations is derived. The system of coupled magnetic field integral equations is solved using the method …


Enhancing Electromagnetic Side-Channel Analysis In An Operational Environment, David P. Montminy Sep 2013

Enhancing Electromagnetic Side-Channel Analysis In An Operational Environment, David P. Montminy

Theses and Dissertations

Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template …


Ground State Of The Singly Ionized Oxygen Vacancy In Rutile Tio2, A. T. Brant, Nancy C. Giles, Shan Yang (杨山), M. A. R. Sarker, S. Watauchi, M. Nagao, I. Tanaka, D. A. Tryk, A. Manivannan, Larry E. Halliburton Sep 2013

Ground State Of The Singly Ionized Oxygen Vacancy In Rutile Tio2, A. T. Brant, Nancy C. Giles, Shan Yang (杨山), M. A. R. Sarker, S. Watauchi, M. Nagao, I. Tanaka, D. A. Tryk, A. Manivannan, Larry E. Halliburton

Faculty Publications

Results from electron paramagnetic resonance (EPR) and electron-nuclear double resonance (ENDOR) experiments are used to establish the model for the ground state of the singly ionized oxygen vacancy in the interior of bulk rutile TiO2 crystals. Hyperfine from 47Ti and 49Ti nuclei show that the unpaired electron in this S = 1/2 defect is localized on one titanium ion adjacent to the oxygen vacancy (i.e., the spin is not shared by two titanium ions). These defects are formed at low temperature (∼35 K) in as-grown oxidized crystals when sub-band-gap 442 nm laser light converts doubly ionized nonparamagnetic …


Trajectory Optimization For Spacecraft Collision Avoidance, James W. Sales Sep 2013

Trajectory Optimization For Spacecraft Collision Avoidance, James W. Sales

Theses and Dissertations

The last several decades have resulted in an unfortunate byproduct of space exploration and development: orbital debris. Satellites in Low Earth Orbit have been required to make an ever increasing number of course corrections in order to avoid collisions. Despite efforts to the contrary, collisions continue to occur, each time creating additional debris and increasing the requirement for the remaining satellites to maneuver. Every required maneuver decreases a satellite's service life. The purpose of this study is to develop a minimum thrust profile to maneuver an orbiting satellite out of its projected error ellipse before a collision occurs. For comparison, …


Passive Mimo Radar Detection, Daniel E. Hack Sep 2013

Passive Mimo Radar Detection, Daniel E. Hack

Theses and Dissertations

Passive multiple-input multiple-output (MIMO) radar is a sensor network comprised of multiple distributed receivers that detects and localizes targets using the emissions from multiple non-cooperative radio frequency transmitters. This dissertation advances the theory of centralized passive MIMO radar (PMR) detection by proposing two novel generalized likelihood ratio test (GLRT) detectors. The first addresses detection in PMR networks without direct-path signals. The second addresses detection in PMR networks with direct-path signals. The probability distributions of both test statistics are investigated using recent results from random matrix theory. Equivalence is established between PMR networks without direct-path signals and passive source localization (PSL) …


Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone Sep 2013

Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone

Theses and Dissertations

The research goal involved developing improved methods for securing Programmable Logic Controller (PLC) devices against unauthorized entry and mitigating the risk of Supervisory Control and Data Acquisition (SCADA) attack by detecting malicious software and/or trojan hardware. A Correlation Based Anomaly Detection (CBAD) process was developed to enable 1) software anomaly detection discriminating between various operating conditions to detect malfunctioning or malicious software, firmware, etc., and 2) hardware component discrimination discriminating between various hardware components to detect malfunctioning or counterfeit, trojan, etc., components.


Characterizing G-Loading, Swirl Direction And Rayleigh Losses In An Ultra Compact Combustor, Jacob D. Wilson Sep 2013

Characterizing G-Loading, Swirl Direction And Rayleigh Losses In An Ultra Compact Combustor, Jacob D. Wilson

Theses and Dissertations

Previous research has been conducted showing significant benefits on combustion efficiency and stability by creating high centripetally accelerated, also known as g-loaded, combustion environments. Ultra Compact Combustor systems decrease size and weight of the overall engine by burning in a circumferential direction around a hybrid vane row where the high equivalence ratio cavity flow is quick quenched to lean by the core flow. The hybrid vane row integrates the compressor, combustor, and turbine for further length reduction and weight savings. Fuel and air are brought into the cavity and combusted in a high g-loaded environment driven by air injection at …


Development Of Availability And Sustainability Spares Optimization Models For Aircraft Reparables, Edmund K.W. Pek Sep 2013

Development Of Availability And Sustainability Spares Optimization Models For Aircraft Reparables, Edmund K.W. Pek

Theses and Dissertations

The Republic of Singapore Air Force (RSAF) conducts Logistics Support Analysis (LSA) studies in various engineering and logistics efforts on the myriad of weapon systems. In these studies, inventory spares provisioning, availability and sustainability analyses are key focus areas to ensure asset sustenance. In particular, OPUS10, a commercial-off-the-shelf software, is extensively used to conduct reparable spares optimization in acquisition programs. However, it is limited in its ability to conduct availability and sustainability analyses of time-varying operational demands, crucial in Operations & Support (O&S) and contingency planning. As the RSAF seeks force structure expansion to include more sophisticated weapon systems, the …


Scattering, Adsorption, And Langmuir-Hinshelwood Desorption Models For Physisorptive And Chemisorptive Gas-Surface Systems, Brook I. Bentley Sep 2013

Scattering, Adsorption, And Langmuir-Hinshelwood Desorption Models For Physisorptive And Chemisorptive Gas-Surface Systems, Brook I. Bentley

Theses and Dissertations

Surface effects limit the performance of hypersonic vehicles, micro-electro-mechanical devices, and directed energy systems. This research develops methods to predict adsorption, scattering, and thermal desorption of molecules on a surface. These methods apply to physisorptive (adsorption and scattering) and chemisorptive (thermal desorption) gas-surface systems, and are developed under the Direct Simulation Monte Carlo construct. The novel adsorption and scattering contribution, the Modified Kisliuk with Scattering method, predicts angular and energy distributions, and adsorption probabilities. These results agree more closely with experiment than the state-of-the-art Cercignani-Lampis-Lord scattering kernel. Super-elastic scattering is predicted. Gas-adlayer interactions are included for the first time. The …


Image Annotation And Topic Extraction Using Super-Word Latent Dirichlet, George E. Noel Iii Sep 2013

Image Annotation And Topic Extraction Using Super-Word Latent Dirichlet, George E. Noel Iii

Theses and Dissertations

This research presents a multi-domain solution that uses text and images to iteratively improve automated information extraction. Stage I uses local text surrounding an embedded image to provide clues that help rank-order possible image annotations. These annotations are forwarded to Stage II, where the image annotations from Stage I are used as highly-relevant super-words to improve extraction of topics. The model probabilities from the super-words in Stage II are forwarded to Stage III where they are used to refine the automated image annotation developed in Stage I. All stages demonstrate improvement over existing equivalent algorithms in the literature.


Metrics For Emitter Selection For Multistatic Synthetic Aperture Radar, Sean R. Stevens Sep 2013

Metrics For Emitter Selection For Multistatic Synthetic Aperture Radar, Sean R. Stevens

Theses and Dissertations

A bistatic implementation of synthetic aperture radar (SAR) to form images of the ground from an aircraft makes use of separate emitters and receivers. When not using cooperative emitters, ground based communications systems can provide illumination. One way to improve performance of these waveforms, which are not designed for SAR, is a multistatic implementation, formed from multiple bistatic systems. This leads to the problem of selecting a subset from a potentially large set of emitters to use for image formation. A framework for this selection between sets of emitters is proposed using multiple objective optimization. This approach requires use of …


Architecting Integrated System Health Management For Airworthiness, Kerwin C. Teong Sep 2013

Architecting Integrated System Health Management For Airworthiness, Kerwin C. Teong

Theses and Dissertations

Integrated System Health Management (ISHM) for Unmanned Aerial Systems (UAS) has been a new area of research - seeking to provide situational awareness to mission and maintenance operations, and for improved decision-making with increased self-autonomy. This research effort developed an analytic architecture and an associated discrete-event simulation using Arena to investigate the potential benefits of ISHM implementation onboard an UAS. The objective of this research is two-fold: firstly, to achieve continued airworthiness by investigating the potential extension of UAS expected lifetime through ISHM implementation, and secondly, to reduce life cycle costs by implementing a Condition-Based Maintenance (CBM) policy with better …


Searching For Stable SiNCN Clusters: Combination Of Stochastic Potential Surface Search And Pseudopotential Plane-Wave Car-Parinello Simulated Annealing Simulations, Xiaofeng F. Duan, Lingyu Huang, Larry W. Burggraf Jul 2013

Searching For Stable SiNCN Clusters: Combination Of Stochastic Potential Surface Search And Pseudopotential Plane-Wave Car-Parinello Simulated Annealing Simulations, Xiaofeng F. Duan, Lingyu Huang, Larry W. Burggraf

Faculty Publications

To find low energy SinCn structures out of hundreds to thousands of isomers we have developed a general method to search for stable isomeric structures that combines Stochastic Potential Surface Search and Pseudopotential Plane-Wave Density Functional Theory Car-Parinello Molecular Dynamics simulated annealing (PSPW-CPMD-SA). We enhanced the Sunders stochastic search method to generate random cluster structures used as seed structures for PSPW-CPMD-SA simulations. This method ensures that each SA simulation samples a different potential surface region to find the regional minimum structure. By iterations of this automated, parallel process on a high performance computer we located hundreds to …


Design Of A Lighter Than Air Vehicle That Achieves Positive Buoyancy In Air Using A Vacuum, Trent T. Metlen Jun 2013

Design Of A Lighter Than Air Vehicle That Achieves Positive Buoyancy In Air Using A Vacuum, Trent T. Metlen

Theses and Dissertations

Three designs for a Lighter Than Air (LTA) structure that achieve positive buoyancy using a vacuum in place of a lifting gas were proposed and evaluated. The ratio of structure weight to the weight of displaced air was termed Weight/Buoyant Force (W/B) where a W/B1 corresponds to positive buoyancy. Two methods of geometrically stiffening a sphere were investigated and their W/B evaluated. A thin shelled sphere of beryllium stiffened with an isogrid of blade type stiffeners using Ultra High Modulus (UHM) carbon epoxy was predicted to give a W/B= 0.79. A geodesic sphere composed of a frame of cylindrical, UHM, …


Dynamic Network Topologies, Heather A. Lingg Jun 2013

Dynamic Network Topologies, Heather A. Lingg

Theses and Dissertations

Demand for effective network defense capabilities continues to increase as cyber attacks occur more and more frequently and gain more and more prominence in the media. Current security practices stop after data encryption and network address filtering. Security at the lowest level of network infrastructure allows for greater control of how the network traffic flows around the network. This research details two methods for extending security practices to the physical layer of a network by modifying the network infrastructure. The first method adapts the Advanced Encryption Standard while the second method uses a Steiner tree. After the network connections are …


Crack Initiation And Growth Behavior At Corrosion Pit In 7075-T6 High Strength Aluminum Alloy, Eric M. Hunt Jun 2013

Crack Initiation And Growth Behavior At Corrosion Pit In 7075-T6 High Strength Aluminum Alloy, Eric M. Hunt

Theses and Dissertations

Research on fatigue crack formation from two types corrosion pits tangent to a circular hole in a 7075-T6 aluminum alloy subjected to uni-axial loads (R = 0.5, lambda = 0) in both an air and saltwater environment provides a method for exploring crack initiation and initial growth rates. This work focuses on a fracture mechanics approach to explore the transition from corrosion pit to crack growth. Specimens with a cylinder shaped through-pit tangent to a circular hole have a closed form solution to predict this delta K that closely resembles the finite element solutions. Specimens with a semi-circular corner-pit tangent …


Classification Of Encrypted Web Traffic Using Machine Learning Algorithms, William C. Barto Jun 2013

Classification Of Encrypted Web Traffic Using Machine Learning Algorithms, William C. Barto

Theses and Dissertations

The increasing usage of web services and encrypted network communication makes the network analysis of encrypted web traffic of utmost importance. This research evaluates the feasibility of using ML algorithms to classify web services within encrypted TLS flows. The ML algorithms are compared primarily based on classification accuracy. The runtimes of the classifiers are also considered, as classifiers must be able determine labels quickly in order to be used in near realtime network protection devices. Five ML algorithms are initially considered when analyzing only the first 12 packets: Naive Bayes, NBTree, LibSVM, J4.8, and AdaBoost+J4.8. AdaBoost+J4.8 and J4.8 produce the …


Side-Channel Analysis Of Subscriber Identity Modules, John A. Hearle Jun 2013

Side-Channel Analysis Of Subscriber Identity Modules, John A. Hearle

Theses and Dissertations

Subscriber identity modules (SIMs) contain useful forensic data but are often locked with a PIN code that restricts access to this data. If an invalid PIN is entered several times, the card locks and may even destroy its stored data. This presents a challenge to the retrieval of data from the SIM when the PIN is unknown. The field of side-channel analysis (SCA) collects, identifies, and processes information leaked via inadvertent channels. One promising side-channel leakage is that of electromagnetic (EM) emanations; by monitoring the SIM's emissions, it may be possible to determine the correct PIN to unlock the card. …


Improving Multiple Surface Range Estimation Of A 3-Dimensional Flash Ladar In The Presence Of Atmospheric Turbulence, Brian J. Neff Jun 2013

Improving Multiple Surface Range Estimation Of A 3-Dimensional Flash Ladar In The Presence Of Atmospheric Turbulence, Brian J. Neff

Theses and Dissertations

Laser Radar sensors can be designed to provide two-dimensional and three-dimensional (3-D) images of a scene from a single laser pulse. Currently, there are various data recording and presentation techniques being developed for 3-D sensors. While the technology is still being proven, many applications are being explored and suggested. As technological advancements are coupled with enhanced signal processing algorithms, it is possible that this technology will present exciting new military capabilities for sensor users. The goal of this work is to develop an algorithm to enhance the utility of 3-D Laser Radar sensors through accurate ranging to multiple surfaces per …


The Design And Analysis Of Electrically Large Custom-Shaped Reflector Antennas, Joshua M. Wilson Jun 2013

The Design And Analysis Of Electrically Large Custom-Shaped Reflector Antennas, Joshua M. Wilson

Theses and Dissertations

Designing and analyzing electrically large reflectors poses numerically complex problems because the reflector must be sampled finely to obtain an accurate solution, causing an unwieldy number of samples. In addition to these complexities, a custom-shaped reflector poses a new analysis problem. Previously developed methods and theorems including Geometric Optics, Ray-Tracing, Surface Equivalence Theorems, Image Theory, and Physical Optics can be applied to these custom-shaped reflectors however. These methods all share in common their capability to provide accurate results in the analysis of electrically large structures. In this thesis, two custom-shaped reflector concepts are explored which include a rectangular shaped, spherically …


Applied Hypergame Theory For Network Defense, Alan S. Gibson Jun 2013

Applied Hypergame Theory For Network Defense, Alan S. Gibson

Theses and Dissertations

Cyber operations are the most important aspect of military conflicts in the 21st century, but unfortunately they are also among the least understood. The continual battle for network dominance between attackers and defenders is considered to be a complex game. Hypergame theory is an extension of game theory that addresses the kind of games where misperception exists, as is often the case in military engagements. Hypergame theory, like game theory, uses a game model to determine strategy selection, but goes beyond game theory by examining subgames that exist within the full game. The inclusion of misperception and misinformation in the …


Development Of A Model And Localization Algorithm For Received Signal Strength-Based Geolocation, Amanda S. King Jun 2013

Development Of A Model And Localization Algorithm For Received Signal Strength-Based Geolocation, Amanda S. King

Theses and Dissertations

Location-Based Services (LBS), also called geolocation, have become increasingly popular in the past decades. They have several uses ranging from assisting emergency personnel, military reconnaissance and applications in social media. In geolocation a group of sensors estimate the location of transmitters using position and Radio Frequency (RF) information. A review of the literature revealed that a majority of the Received Signal Strength (RSS) techniques used made erroneous assumptions about the distribution or ignored effects of multiple transmitters, noise and multiple antennas. Further, the corresponding algorithms are often mathematically complex and computationally expensive. To address the issues this dissertation focused on …


Evaluation Of Cyber Sensors For Enhancing Situational Awareness In The Ics Environment, Jeremy R. Otis Jun 2013

Evaluation Of Cyber Sensors For Enhancing Situational Awareness In The Ics Environment, Jeremy R. Otis

Theses and Dissertations

Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that …