Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Databases (4)
- Specifications (4)
- COBOL (2)
- Computer networks--Security measures (2)
- Computer programs (2)
-
- Data processing (2)
- Graphical user interface (2)
- Obect-oriented programming (2)
- Object-oriented programming (2)
- Software engineering (2)
- United States. Air Force (2)
- ADA programming language (1)
- Aerial cameras (1)
- Algorithms (1)
- Artificial satellites (1)
- Bodies of revolution (1)
- Climatology (1)
- Communication in medicine (1)
- Communication networks (1)
- Compton scattering (1)
- Computer communications (1)
- Computer program verification (1)
- Computer security (1)
- Computer viruses (1)
- Computerized tomography (1)
- Conformal mapping (1)
- Cryptography (1)
- Data fusion (1)
- Data management (1)
- Data protection (1)
Articles 1 - 30 of 36
Full-Text Articles in Physical Sciences and Mathematics
Towards A Game Theory Model Of Information Warfare, David A. Burke
Towards A Game Theory Model Of Information Warfare, David A. Burke
Theses and Dissertations
The repeated game of incomplete information model, a subclass of game theory models, was modified to include aspects of information warfare. The repeated game of incomplete information model was first developed to analyze nuclear weapons disarmament negotiations. The central role of information in this model suggested its applicability to IW, which focuses on the defense and acquisition of information. A randomized experimental design was utilized to determine how people behave in a laboratory IW setting and to test the IW game model's basic predictions. The impact of experience and learning on IW performance was also assessed during the experiment. IW …
Power, Performance, And Perception (P3): Integrating Usability Metrics And Technology Acceptance Determinants To Validate A New Model For Predicting System Usage, Alan P. Fiorello
Power, Performance, And Perception (P3): Integrating Usability Metrics And Technology Acceptance Determinants To Validate A New Model For Predicting System Usage, Alan P. Fiorello
Theses and Dissertations
Currently, there are two distinct approaches to assist information technology managers in the successful implementation of office automation software. The first approach resides within the field of usability engineering, while the second approach is derived from the discipline of management information systems (MIS). However, neither approach has successfully produced conclusive evidence that explains what characteristics facilitate system use as well as influence user acceptance of the system. This study reports on the validity of a new model, entitled the Power, Performance, Perception (P3) model, that links the constructs of usability engineering to user acceptance. Additionally, speech recognition software (SRS) was …
Information System Incidents: The Development Of A Damage Assessment Model, Mark D. Horony
Information System Incidents: The Development Of A Damage Assessment Model, Mark D. Horony
Theses and Dissertations
Information system (IS) incidents are on the rise. With low manning and undertrained information security specialists it is difficult for organizations to stop IS incidents from occurring. Once an incident has occurred it is the IS manager's responsibility to ensure that a full and accurate damage assessment has been accomplished. However, most IS managers lack the necessary tools to assess the damage from an incident. This exploratory thesis developed an IS incident damage assessment model (DAM) that can be part of the IS manager's tool kit. During the development of the model, it became apparent that the model was supported …
Implementation Of Speech Recognition Software For Text Processing: An Exploratory Analysis, Sean P. Abell
Implementation Of Speech Recognition Software For Text Processing: An Exploratory Analysis, Sean P. Abell
Theses and Dissertations
The rationale behind implementing new information technologies is often to gain productivity improvements associated with the substitution of machinery for labor. However, the literature shows little direct evidence of a positive relationship between information technology investment and subsequent productivity benefits. This thesis reports on the examination into the productivity implications of implementing speech recognition software in a text processing environment. More specifically, research was conducted to compare text processing speeds and error rates using speech recognition software versus the keyboard and mouse. Of interest was the time required to input and proofread text processing tasks as well as the number …
Network Security Versus Network Connectivity: A Framework For Addressing The Issues Facing The Air Force Medical Community, Franklin E. Cunningham Jr.
Network Security Versus Network Connectivity: A Framework For Addressing The Issues Facing The Air Force Medical Community, Franklin E. Cunningham Jr.
Theses and Dissertations
The Air Force has instituted Barrier Reef to protect its networks. The Air Force medical community operates network connections that are incompatible with Barrier Reef. To overcome this problem, OASD(HA) directed the Tri-Service Management Program Office (TIMPO) to develop an architecture that protects all military health systems and allows them to link with all three services and outside partners. This research studied the underlying networking issues and formed a framework based on data from network experts from the Air Force's medical centers and their base network organizations. The findings were compared TIMPO and a composite framework was developed that more …
Formal Representation And Application Of Software Design Information, Thomas M. Schorsch
Formal Representation And Application Of Software Design Information, Thomas M. Schorsch
Theses and Dissertations
Formal methods for developing software use mathematical frameworks to specify, develop and verify software systems, especially safety critical systems where error free software is a necessity. A transformation system is a formal method that refines a requirement specification into an implementation by successively adding design decisions in the form of precisely verified design information. Current algebraic representations of design information (specifications, morphisms, and interpretations) and methods for applying algebraic specification design information (diagram refinement) cannot correctly represent and apply design information involving higher level design information. This investigation develops innovative methods for constructing and refining structured algebraic requirement specifications, as …
Analysis Of N-Tier Architecture Applied To Distributed-Database Systems, Alexandre G. Valente
Analysis Of N-Tier Architecture Applied To Distributed-Database Systems, Alexandre G. Valente
Theses and Dissertations
N-tier architecture has been more commonly used as a methodology for developing large database applications. This work evaluates the use of this architecture instead of the classical Client/Server architecture in developing corporate applications based on distributed databases. The comparison between architectures is performed using applications that execute transactions similar to those defined in the Transaction Process Council Type C benchmark (TPC-C). The environment used for development and testing was the AFIT Bimodal Cluster (ABC); a heterogeneous cluster of PCs, running Microsoft Windows NT 4.0 OS. The comparative experimental analysis demonstrated that the N-tier architecture allows more efficient bandwidth utilization between …
Scan-It: A Computer Vision Model Motivated By Human Physiology And Behavior, John G. Keller
Scan-It: A Computer Vision Model Motivated By Human Physiology And Behavior, John G. Keller
Theses and Dissertations
This dissertation details the development of a new computational vision model motivated by physiological and behavioral aspects of the human visual system. Using this model, intensity features within an artificial visual field of view are extracted and transformed into a simulated cortical representation, and a saccadic guidance system scans this field of view over an object within an image to memorize that object. The object representation is thus stored as a sequence of feature matrices describing sub-regions of the object. A new image can then be searched for the object (possibly scaled and rotated), where evidence of its presence is …
Parallel Digital Signal Processing On A Network Of Personal Computers Case Study: Space-Time Adaptive Processing, Fernando Silva
Parallel Digital Signal Processing On A Network Of Personal Computers Case Study: Space-Time Adaptive Processing, Fernando Silva
Theses and Dissertations
Network based parallel computing using personal computers is currently a popular choice for concurrent scientific computing. This work evaluates the capabilities and the performance of the AFIT Bimodal Cluster (ABC); a heterogeneous cluster of PCs connected by switched fast Ethernet and using MPICH 1.1 for interprocess communication for parallel digital signal processing using Space Time Adaptive Processing (STAP) as the case study. The MITRE RT_STAP Benchmark version 1.1 is ported and executed on the ABC, as well as on a cluster of six Sun SPARC workstations connected by a Myrinet network (the AFIT NOW), and on a IBM SP for …
Multiobjective Evolutionary Algorithms: Classifications, Analyses, And New Innovations, David A. Van Veldhuizen
Multiobjective Evolutionary Algorithms: Classifications, Analyses, And New Innovations, David A. Van Veldhuizen
Theses and Dissertations
This research organizes, presents, and analyzes contemporary Multiobjective Evolutionary Algorithm (MOEA) research and associated Multiobjective Optimization Problems (MOPs). Using a consistent MOEA terminology and notation, each cited MOEAs' key factors are presented in tabular form for ease of MOEA identification and selection. A detailed quantitative and qualitative MOEA analysis is presented, providing a basis for conclusions about various MOEA-related issues. The traditional notion of building blocks is extended to the MOP domain in an effort to develop more effective and efficient MOEAs. Additionally, the MOEA community's limited test suites contain various functions whose origins and rationale for use are often …
Methodology For Integrating The Scenario Databases Of Simulation Systems, Emilia M. Colonese
Methodology For Integrating The Scenario Databases Of Simulation Systems, Emilia M. Colonese
Theses and Dissertations
The use of many different simulation systems by the United States Department of Defense has resulted in many different scenario data representations contained in heterogeneous databases. These heterogeneous databases all represent the same data concept, but have different semantics due to intrinsic variations among the data models. In this research, I describe a unified scenario database to allow interoperability and reuse of the scenario data components while avoiding the problems of data redundancy. Using the object oriented approach, the data and schema of the scenario databases, represented in an object oriented model, are integrated into a global database also represented …
Cobol Reengineering Using The Parameter Based Object Identification (Pboi) Methodology, Sonia De Jesus Rodrigues
Cobol Reengineering Using The Parameter Based Object Identification (Pboi) Methodology, Sonia De Jesus Rodrigues
Theses and Dissertations
This research focuses on how to reengineer Cobol legacy systems into object oriented systems using Sward's Parameter Based Object Identification (PBOI) methodology. The method is based on relating categories of imperative subprograms to classes written in object oriented language based on how parameters are handled and shared among them. The input language of PBOI is a canonical form called the generic imperative model (GIM), which is an abstract syntax tree (AST) representation of a simple imperative programming language. The output is another AST, the generic object model (GOM), a generic object oriented language. Conventional languages must be translated into the …
Image Fusion Using Autoassociative-Heteroassociative Neural Networks, Claudia V. Kropas-Hughes
Image Fusion Using Autoassociative-Heteroassociative Neural Networks, Claudia V. Kropas-Hughes
Theses and Dissertations
Images are easily recognized, classified, and segmented; in short, analyzed by humans. The human brain/nervous system; the biological computer, performs rapid and accurate image processing. In the current research the concepts of the biological neural system provide the impetus for developing a computational means of fusing image data. Accomplishing this automatic image processing requires features be extracted from each image data set, and the information content fused. Biologically inspired computational models are examined for extracting features by transformations such as Fourier, Gabor, and wavelets, and for processing and fusing the information from multiple images through evaluation of autoassociative neural networks …
An Interactive Tool For Refining Software Specifications From A Formal Domain Model, Gary L. Anderson
An Interactive Tool For Refining Software Specifications From A Formal Domain Model, Gary L. Anderson
Theses and Dissertations
This work examines the process for refining a software specification from a formal object-oriented domain model. This process was implemented with interactive software to demonstrate the feasibility and benefits of automating what has been a tedious and often error-prone manual task. The refinement process operates within the framework of a larger Knowledge-Based Software Engineering system. A generic object-oriented representation is used to store a domain model, which allows the specification tool to access, select, and manipulate the required objects to form a customized specification. The specification is also stored as an object-oriented model, which in turn can be accessed by …
Protein Structure Prediction Using Parallel Linkage Investigating Genetic Algorithms, Karl R. Deerman
Protein Structure Prediction Using Parallel Linkage Investigating Genetic Algorithms, Karl R. Deerman
Theses and Dissertations
AFIT has had a long-standing interest in solving the protein structure prediction (PSP) problem. The PSP problem is an intractable problem that if "solved" can lead to revolutionary new techniques for everything from the development of new medicines to optical computer switches. The challenge is to find a reliable and consistent method of predicting the 3-dimensional structure of a protein given its defining sequence of amino acids. PSP is primarily concerned with predicting the tertiary protein structure without regards to how the protein came to this folded state. The tertiary structure determines the protein's functionality.
Parallel Data Mining With The Message Passing Interface Standard On Clusters Of Personal Computers, Lonnie P. Hammack
Parallel Data Mining With The Message Passing Interface Standard On Clusters Of Personal Computers, Lonnie P. Hammack
Theses and Dissertations
Piles of personal computers (PoPCs) have begun to challenge the performance of the traditional Massively Parallel Processors (MPPs) and the less traditional networks of workstations (NOWs) as platforms for parallel computing. Large clusters of PCs have reached and at times exceeded the performance of modern MPPs at a fraction of the cost. Built with commodity components, these clusters can be constructed for about half the cost of a comparable NOW. The primary competing operating systems (OIS) in use on PoPCs are Linux and Windows NT. This thesis investigation compares the performance of an NT cluster with that of a Linux …
Transforming Aggregate Object-Oriented Formal Specifications To Code, John A. Kissack
Transforming Aggregate Object-Oriented Formal Specifications To Code, John A. Kissack
Theses and Dissertations
The feasibility of a transformational formal-based software engineering tool has been the focus of AFIT research for several years. Until now, the main research emphasis has been placed on the individual components that would comprise such a transformational system; therefore, this research demonstrates how a representative collection of aggregate objects would be transformed from specification to code. The research focused on critical integration issues associated with a formal-based software transformation system, such as the source specification, the problem space architecture, design architecture, design transforms, and target software transforms. Software is critical in today's Air Force, yet its specification, design, and …
Computation Of Scattering From Bodies Of Revolution Using An Entire-Domain Basis Implementation Of The Moment Method, Arthur P. Ford Iv
Computation Of Scattering From Bodies Of Revolution Using An Entire-Domain Basis Implementation Of The Moment Method, Arthur P. Ford Iv
Theses and Dissertations
Research into improved calibration targets for measurement of radar cross-section has created a need for the ability to accurately compute the scattering from perfectly conducting bodies of revolution. Common computational techniques use Moment Method codes that employ subdomain basis functions to expand the unknown current density. This approach has its shortcomings. Large numbers of basis functions are required, and increasing the number of basis functions to improve accuracy after an initial computation requires re-computation of previous results and lost processing time. This research involves using basis functions that have as their domain the entire length of the surface. Entire-domain basis …
Gps Signal Offset Detection And Noise Strength Estimation In A Parallel Kalman Filter Algorithm, Barry J. Vanek
Gps Signal Offset Detection And Noise Strength Estimation In A Parallel Kalman Filter Algorithm, Barry J. Vanek
Theses and Dissertations
Measurements from Global Positioning System (GPS) satellites are subject to corruption by signal interference and induced offsets. This thesis presents two independent algorithms to ensure the navigation system remains uncorrupted by these possible GPS failures. The first is a parameter estimation algorithm that estimates the measurement noise variance of each satellite. A redundant measurement differencing (RMD) technique provides direct observability of the differenced white measurement noise samples. The variance of the noise process is estimated and provided to the second algorithm, a parallel Kalman filter structure, which then adapts to changes in the real-world measurement noise strength. The parallel Kalman …
A Constructive Induction Approach To Computer Immunology, Kelley J. Cardinale, Hugh M. O'Donnell
A Constructive Induction Approach To Computer Immunology, Kelley J. Cardinale, Hugh M. O'Donnell
Theses and Dissertations
With the increasing birth rate of new viruses and the rise in interconnectivity and interoperability among computers, the burden of detecting and destroying computer viruses is severe. This research integrated four domains: computer virus detection, human immunology, computer immunology and an automated form of machine learning called constructive induction. First, a Computer Health System, based on the public health system, was defined to improve the 'global' approach to computer virus protection. Second, a computer immune model, based on the human immune system, was defined to improve the 'local' approach to virus detection. Third, the detection component of this computer immune …
Analysis Of Usaf Battlelabs' Communication Infrastructure Over Various Protocols, Rocky A. Favorito, David M. Mcillece
Analysis Of Usaf Battlelabs' Communication Infrastructure Over Various Protocols, Rocky A. Favorito, David M. Mcillece
Theses and Dissertations
As a result of the doctrines exposed in the Air Force's "Global Engagement: A Vision for the 21st Century Air Force," the concept of a "Battlelab" was devised to support and develop the key warfighting capabilities needed in the next century. Although geographically separated, these labs must have the capability to exchange information with each other in a "Virtual Battlelab Environment" (VBE). Although many types of data will be exchanged, only variable-bit-rate (VBR) video and distributed interactive simulation (DIS) traffic are modeled in the VBE. The research described in this thesis utilizes a systems engineering approach to investigate the performance …
A Java Based Human Computer Interface For A Uav Decision Support Tool Using Conformal Mapping, Randy A. Flood
A Java Based Human Computer Interface For A Uav Decision Support Tool Using Conformal Mapping, Randy A. Flood
Theses and Dissertations
This paper describes the development of the Human Computer Interface (HCI) for a Decision Support System for routing Unmanned Aerial Vehicles (UAVs). This problem is a multi-vehicle routing problem with time-windows. Because of the unique nature of UAVs, a tool is needed to support dynamic re-routing. We solve the problem in two ways. First, we create a UAV Decision Support Tool (UAV DST) that uses a set of Java software objects to display maps and convert between latitude-longitude coordinates and x-y coordinates. Secondly, this library provides the ability for the user to dynamically reoptimize large UAV routing problems through a …
Strategies For Steganalysis Of Bitmap Graphics Files, Christopher J. Fogle
Strategies For Steganalysis Of Bitmap Graphics Files, Christopher J. Fogle
Theses and Dissertations
Steganography is the art and science of communicating through covert channels. The goal of steganography is to hide the fact that a message is even being transmitted. In the context of today's digital world, this ancient practice is enjoying resurgence due to the plethora of hiding places made possible by modern information media. Of particular concern is the use of graphics image files to conceal both legitimate and criminal communications.
Methodology For Application Design Using Information Dissemination And Active Database Technologies, Robert H. Hartz
Methodology For Application Design Using Information Dissemination And Active Database Technologies, Robert H. Hartz
Theses and Dissertations
In dynamic data environments, the large volume of transactions requires flexible control structures to effectively balance the flow of information between producers and consumers. Information dissemination-based systems, using both data push and pull delivery mechanisms, provide a possible scalable solution for data-intensive applications. In this research, a methodology is proposed to capture information dissemination design features in the form of active database rules to effectively control dynamic data applications. As part of this design methodology, information distribution properties are analyzed, data dissemination mechanisms are transformed into an active rule framework, and the desired reactive behavior is achieved through rule customization. …
Target Pose Estimation From Radar Data Using Adaptive Networks, Andrew W. Learn
Target Pose Estimation From Radar Data Using Adaptive Networks, Andrew W. Learn
Theses and Dissertations
his research investigates and extends recent work by J.C. Principe at the University of Florida in target pose estimation using adaptive networks. First, Principe's technique is successfully extended to estimate both azimuth and elevation using SAR images. A network trained and tested using MSTAR data yields mean errors of less than six degrees in azimuth and five degrees in elevation. Second, the technique is applied to high-range resolution radar (HRR) signatures. Ground target (azimuth only) testing yields mean errors of less than 11 degrees for most classes. Air target testing for networks trained and tested on the same aircraft class …
A Modeling And Simulation Approach To Analyze The Workload Associated With The Growth Of Network Router Access Control Lists, Douglas R. Lomsdalen
A Modeling And Simulation Approach To Analyze The Workload Associated With The Growth Of Network Router Access Control Lists, Douglas R. Lomsdalen
Theses and Dissertations
Organizations can no longer isolate their networks from the rest of the world and still remain competitive. An organization willing to compete in the world market must take the necessary precautions to protect its network, the systems located on those networks, and its mission critical data. There are performance issues associated with the use of access control lists (ACL); however, if ACLs are implemented properly and periodically reviewed, a secure network can be attained. This research attempts to determine how the growth of an ACL affects packet flow and router CPU consumption, and also identify the specific length of an …
Extensible Multi-Agent System For Heterogeneous Database Association Rule Mining And Unification, Christopher G. Marks
Extensible Multi-Agent System For Heterogeneous Database Association Rule Mining And Unification, Christopher G. Marks
Theses and Dissertations
The Probabilities, Expert System, Knowledge, and Inference (PESKI) System uses the data mining of association rules to fill incompleteness in the knowledge of an expert system. The rules are mined from transactional data sources and then incorporated using an existing link to PESKI. One method of providing a system that will easily allow new data sources to be added is using an information gathering agent-based system. This research first develops a methodology for designing and creating a multi-agent system. It then applies this methodology to design a platform independent means of data mining data sources of any format. The use …
Transforming Cobol Legacy Software To A Generic Imperative Model, Dina L. Moraes
Transforming Cobol Legacy Software To A Generic Imperative Model, Dina L. Moraes
Theses and Dissertations
Legacy COBOL code presents challenges for organizations wishing to increase their effectiveness and improve their efficiency. The systems that utilize this code are vital to enterprise operations, yet maintenance of code is expensive. This research presents an alternative that overcomes some of the problems of legacy COBOL code through the use of software reengineering techniques. This research develops a transformation system to convert COBOL code into a generic imperative model, recapturing the initial design and deciphering the requirements implemented by the legacy code, thereby making possible the documentation of legacy systems, design restructuring, and the re-design of a new, enhanced …
A Structured Approach To Software Tool Integration, Penelope A. Noe
A Structured Approach To Software Tool Integration, Penelope A. Noe
Theses and Dissertations
As the trend towards commercial off-the-shelf (COTS) software continues, civilian companies and government agencies alike are battling with the challenge of making multiple software packages and applications work together. Many of these companies and agencies have attempted to integrate the software tools to form a coherent system that satisfies their goals, often without the use of a step by step approach guiding the effort. Many researchers in the field of software tool integration have determined the areas that need to be addressed when tools are integrated. Some researchers have developed and expanded upon a theoretical model for integration. This model …
Incorporating Scene Mosaics As Visual Indexes Into Uav Video Imagery Databases, Timothy I. Page
Incorporating Scene Mosaics As Visual Indexes Into Uav Video Imagery Databases, Timothy I. Page
Theses and Dissertations
The rise of large digital video archives has strengthened the need for more efficient ways of indexing video files an accessing the information contained in them. Reconnaissance platforms, such as the Predator UAV, are contributing thousands of hours of video footage that require analysis, storage, and retrieval. A process is proposed for converting a video stream into a series of mosaic and selected still images that provide complete coverage of the original video. The video mosaic images can be utilized as visual indexes into a video database. In addition, mosaic images contain information from an entire sequence of video frames …