Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 36

Full-Text Articles in Physical Sciences and Mathematics

Towards A Game Theory Model Of Information Warfare, David A. Burke Dec 1999

Towards A Game Theory Model Of Information Warfare, David A. Burke

Theses and Dissertations

The repeated game of incomplete information model, a subclass of game theory models, was modified to include aspects of information warfare. The repeated game of incomplete information model was first developed to analyze nuclear weapons disarmament negotiations. The central role of information in this model suggested its applicability to IW, which focuses on the defense and acquisition of information. A randomized experimental design was utilized to determine how people behave in a laboratory IW setting and to test the IW game model's basic predictions. The impact of experience and learning on IW performance was also assessed during the experiment. IW …


Power, Performance, And Perception (P3): Integrating Usability Metrics And Technology Acceptance Determinants To Validate A New Model For Predicting System Usage, Alan P. Fiorello Dec 1999

Power, Performance, And Perception (P3): Integrating Usability Metrics And Technology Acceptance Determinants To Validate A New Model For Predicting System Usage, Alan P. Fiorello

Theses and Dissertations

Currently, there are two distinct approaches to assist information technology managers in the successful implementation of office automation software. The first approach resides within the field of usability engineering, while the second approach is derived from the discipline of management information systems (MIS). However, neither approach has successfully produced conclusive evidence that explains what characteristics facilitate system use as well as influence user acceptance of the system. This study reports on the validity of a new model, entitled the Power, Performance, Perception (P3) model, that links the constructs of usability engineering to user acceptance. Additionally, speech recognition software (SRS) was …


Information System Incidents: The Development Of A Damage Assessment Model, Mark D. Horony Dec 1999

Information System Incidents: The Development Of A Damage Assessment Model, Mark D. Horony

Theses and Dissertations

Information system (IS) incidents are on the rise. With low manning and undertrained information security specialists it is difficult for organizations to stop IS incidents from occurring. Once an incident has occurred it is the IS manager's responsibility to ensure that a full and accurate damage assessment has been accomplished. However, most IS managers lack the necessary tools to assess the damage from an incident. This exploratory thesis developed an IS incident damage assessment model (DAM) that can be part of the IS manager's tool kit. During the development of the model, it became apparent that the model was supported …


Implementation Of Speech Recognition Software For Text Processing: An Exploratory Analysis, Sean P. Abell Dec 1999

Implementation Of Speech Recognition Software For Text Processing: An Exploratory Analysis, Sean P. Abell

Theses and Dissertations

The rationale behind implementing new information technologies is often to gain productivity improvements associated with the substitution of machinery for labor. However, the literature shows little direct evidence of a positive relationship between information technology investment and subsequent productivity benefits. This thesis reports on the examination into the productivity implications of implementing speech recognition software in a text processing environment. More specifically, research was conducted to compare text processing speeds and error rates using speech recognition software versus the keyboard and mouse. Of interest was the time required to input and proofread text processing tasks as well as the number …


Network Security Versus Network Connectivity: A Framework For Addressing The Issues Facing The Air Force Medical Community, Franklin E. Cunningham Jr. Dec 1999

Network Security Versus Network Connectivity: A Framework For Addressing The Issues Facing The Air Force Medical Community, Franklin E. Cunningham Jr.

Theses and Dissertations

The Air Force has instituted Barrier Reef to protect its networks. The Air Force medical community operates network connections that are incompatible with Barrier Reef. To overcome this problem, OASD(HA) directed the Tri-Service Management Program Office (TIMPO) to develop an architecture that protects all military health systems and allows them to link with all three services and outside partners. This research studied the underlying networking issues and formed a framework based on data from network experts from the Air Force's medical centers and their base network organizations. The findings were compared TIMPO and a composite framework was developed that more …


Formal Representation And Application Of Software Design Information, Thomas M. Schorsch Sep 1999

Formal Representation And Application Of Software Design Information, Thomas M. Schorsch

Theses and Dissertations

Formal methods for developing software use mathematical frameworks to specify, develop and verify software systems, especially safety critical systems where error free software is a necessity. A transformation system is a formal method that refines a requirement specification into an implementation by successively adding design decisions in the form of precisely verified design information. Current algebraic representations of design information (specifications, morphisms, and interpretations) and methods for applying algebraic specification design information (diagram refinement) cannot correctly represent and apply design information involving higher level design information. This investigation develops innovative methods for constructing and refining structured algebraic requirement specifications, as …


Analysis Of N-Tier Architecture Applied To Distributed-Database Systems, Alexandre G. Valente Jun 1999

Analysis Of N-Tier Architecture Applied To Distributed-Database Systems, Alexandre G. Valente

Theses and Dissertations

N-tier architecture has been more commonly used as a methodology for developing large database applications. This work evaluates the use of this architecture instead of the classical Client/Server architecture in developing corporate applications based on distributed databases. The comparison between architectures is performed using applications that execute transactions similar to those defined in the Transaction Process Council Type C benchmark (TPC-C). The environment used for development and testing was the AFIT Bimodal Cluster (ABC); a heterogeneous cluster of PCs, running Microsoft Windows NT 4.0 OS. The comparative experimental analysis demonstrated that the N-tier architecture allows more efficient bandwidth utilization between …


Scan-It: A Computer Vision Model Motivated By Human Physiology And Behavior, John G. Keller Jun 1999

Scan-It: A Computer Vision Model Motivated By Human Physiology And Behavior, John G. Keller

Theses and Dissertations

This dissertation details the development of a new computational vision model motivated by physiological and behavioral aspects of the human visual system. Using this model, intensity features within an artificial visual field of view are extracted and transformed into a simulated cortical representation, and a saccadic guidance system scans this field of view over an object within an image to memorize that object. The object representation is thus stored as a sequence of feature matrices describing sub-regions of the object. A new image can then be searched for the object (possibly scaled and rotated), where evidence of its presence is …


Parallel Digital Signal Processing On A Network Of Personal Computers Case Study: Space-Time Adaptive Processing, Fernando Silva Jun 1999

Parallel Digital Signal Processing On A Network Of Personal Computers Case Study: Space-Time Adaptive Processing, Fernando Silva

Theses and Dissertations

Network based parallel computing using personal computers is currently a popular choice for concurrent scientific computing. This work evaluates the capabilities and the performance of the AFIT Bimodal Cluster (ABC); a heterogeneous cluster of PCs connected by switched fast Ethernet and using MPICH 1.1 for interprocess communication for parallel digital signal processing using Space Time Adaptive Processing (STAP) as the case study. The MITRE RT_STAP Benchmark version 1.1 is ported and executed on the ABC, as well as on a cluster of six Sun SPARC workstations connected by a Myrinet network (the AFIT NOW), and on a IBM SP for …


Multiobjective Evolutionary Algorithms: Classifications, Analyses, And New Innovations, David A. Van Veldhuizen Jun 1999

Multiobjective Evolutionary Algorithms: Classifications, Analyses, And New Innovations, David A. Van Veldhuizen

Theses and Dissertations

This research organizes, presents, and analyzes contemporary Multiobjective Evolutionary Algorithm (MOEA) research and associated Multiobjective Optimization Problems (MOPs). Using a consistent MOEA terminology and notation, each cited MOEAs' key factors are presented in tabular form for ease of MOEA identification and selection. A detailed quantitative and qualitative MOEA analysis is presented, providing a basis for conclusions about various MOEA-related issues. The traditional notion of building blocks is extended to the MOP domain in an effort to develop more effective and efficient MOEAs. Additionally, the MOEA community's limited test suites contain various functions whose origins and rationale for use are often …


Methodology For Integrating The Scenario Databases Of Simulation Systems, Emilia M. Colonese Jun 1999

Methodology For Integrating The Scenario Databases Of Simulation Systems, Emilia M. Colonese

Theses and Dissertations

The use of many different simulation systems by the United States Department of Defense has resulted in many different scenario data representations contained in heterogeneous databases. These heterogeneous databases all represent the same data concept, but have different semantics due to intrinsic variations among the data models. In this research, I describe a unified scenario database to allow interoperability and reuse of the scenario data components while avoiding the problems of data redundancy. Using the object oriented approach, the data and schema of the scenario databases, represented in an object oriented model, are integrated into a global database also represented …


Cobol Reengineering Using The Parameter Based Object Identification (Pboi) Methodology, Sonia De Jesus Rodrigues Jun 1999

Cobol Reengineering Using The Parameter Based Object Identification (Pboi) Methodology, Sonia De Jesus Rodrigues

Theses and Dissertations

This research focuses on how to reengineer Cobol legacy systems into object oriented systems using Sward's Parameter Based Object Identification (PBOI) methodology. The method is based on relating categories of imperative subprograms to classes written in object oriented language based on how parameters are handled and shared among them. The input language of PBOI is a canonical form called the generic imperative model (GIM), which is an abstract syntax tree (AST) representation of a simple imperative programming language. The output is another AST, the generic object model (GOM), a generic object oriented language. Conventional languages must be translated into the …


Image Fusion Using Autoassociative-Heteroassociative Neural Networks, Claudia V. Kropas-Hughes May 1999

Image Fusion Using Autoassociative-Heteroassociative Neural Networks, Claudia V. Kropas-Hughes

Theses and Dissertations

Images are easily recognized, classified, and segmented; in short, analyzed by humans. The human brain/nervous system; the biological computer, performs rapid and accurate image processing. In the current research the concepts of the biological neural system provide the impetus for developing a computational means of fusing image data. Accomplishing this automatic image processing requires features be extracted from each image data set, and the information content fused. Biologically inspired computational models are examined for extracting features by transformations such as Fourier, Gabor, and wavelets, and for processing and fusing the information from multiple images through evaluation of autoassociative neural networks …


An Interactive Tool For Refining Software Specifications From A Formal Domain Model, Gary L. Anderson Mar 1999

An Interactive Tool For Refining Software Specifications From A Formal Domain Model, Gary L. Anderson

Theses and Dissertations

This work examines the process for refining a software specification from a formal object-oriented domain model. This process was implemented with interactive software to demonstrate the feasibility and benefits of automating what has been a tedious and often error-prone manual task. The refinement process operates within the framework of a larger Knowledge-Based Software Engineering system. A generic object-oriented representation is used to store a domain model, which allows the specification tool to access, select, and manipulate the required objects to form a customized specification. The specification is also stored as an object-oriented model, which in turn can be accessed by …


Protein Structure Prediction Using Parallel Linkage Investigating Genetic Algorithms, Karl R. Deerman Mar 1999

Protein Structure Prediction Using Parallel Linkage Investigating Genetic Algorithms, Karl R. Deerman

Theses and Dissertations

AFIT has had a long-standing interest in solving the protein structure prediction (PSP) problem. The PSP problem is an intractable problem that if "solved" can lead to revolutionary new techniques for everything from the development of new medicines to optical computer switches. The challenge is to find a reliable and consistent method of predicting the 3-dimensional structure of a protein given its defining sequence of amino acids. PSP is primarily concerned with predicting the tertiary protein structure without regards to how the protein came to this folded state. The tertiary structure determines the protein's functionality.


Parallel Data Mining With The Message Passing Interface Standard On Clusters Of Personal Computers, Lonnie P. Hammack Mar 1999

Parallel Data Mining With The Message Passing Interface Standard On Clusters Of Personal Computers, Lonnie P. Hammack

Theses and Dissertations

Piles of personal computers (PoPCs) have begun to challenge the performance of the traditional Massively Parallel Processors (MPPs) and the less traditional networks of workstations (NOWs) as platforms for parallel computing. Large clusters of PCs have reached and at times exceeded the performance of modern MPPs at a fraction of the cost. Built with commodity components, these clusters can be constructed for about half the cost of a comparable NOW. The primary competing operating systems (OIS) in use on PoPCs are Linux and Windows NT. This thesis investigation compares the performance of an NT cluster with that of a Linux …


Transforming Aggregate Object-Oriented Formal Specifications To Code, John A. Kissack Mar 1999

Transforming Aggregate Object-Oriented Formal Specifications To Code, John A. Kissack

Theses and Dissertations

The feasibility of a transformational formal-based software engineering tool has been the focus of AFIT research for several years. Until now, the main research emphasis has been placed on the individual components that would comprise such a transformational system; therefore, this research demonstrates how a representative collection of aggregate objects would be transformed from specification to code. The research focused on critical integration issues associated with a formal-based software transformation system, such as the source specification, the problem space architecture, design architecture, design transforms, and target software transforms. Software is critical in today's Air Force, yet its specification, design, and …


Computation Of Scattering From Bodies Of Revolution Using An Entire-Domain Basis Implementation Of The Moment Method, Arthur P. Ford Iv Mar 1999

Computation Of Scattering From Bodies Of Revolution Using An Entire-Domain Basis Implementation Of The Moment Method, Arthur P. Ford Iv

Theses and Dissertations

Research into improved calibration targets for measurement of radar cross-section has created a need for the ability to accurately compute the scattering from perfectly conducting bodies of revolution. Common computational techniques use Moment Method codes that employ subdomain basis functions to expand the unknown current density. This approach has its shortcomings. Large numbers of basis functions are required, and increasing the number of basis functions to improve accuracy after an initial computation requires re-computation of previous results and lost processing time. This research involves using basis functions that have as their domain the entire length of the surface. Entire-domain basis …


Gps Signal Offset Detection And Noise Strength Estimation In A Parallel Kalman Filter Algorithm, Barry J. Vanek Mar 1999

Gps Signal Offset Detection And Noise Strength Estimation In A Parallel Kalman Filter Algorithm, Barry J. Vanek

Theses and Dissertations

Measurements from Global Positioning System (GPS) satellites are subject to corruption by signal interference and induced offsets. This thesis presents two independent algorithms to ensure the navigation system remains uncorrupted by these possible GPS failures. The first is a parameter estimation algorithm that estimates the measurement noise variance of each satellite. A redundant measurement differencing (RMD) technique provides direct observability of the differenced white measurement noise samples. The variance of the noise process is estimated and provided to the second algorithm, a parallel Kalman filter structure, which then adapts to changes in the real-world measurement noise strength. The parallel Kalman …


A Constructive Induction Approach To Computer Immunology, Kelley J. Cardinale, Hugh M. O'Donnell Mar 1999

A Constructive Induction Approach To Computer Immunology, Kelley J. Cardinale, Hugh M. O'Donnell

Theses and Dissertations

With the increasing birth rate of new viruses and the rise in interconnectivity and interoperability among computers, the burden of detecting and destroying computer viruses is severe. This research integrated four domains: computer virus detection, human immunology, computer immunology and an automated form of machine learning called constructive induction. First, a Computer Health System, based on the public health system, was defined to improve the 'global' approach to computer virus protection. Second, a computer immune model, based on the human immune system, was defined to improve the 'local' approach to virus detection. Third, the detection component of this computer immune …


Analysis Of Usaf Battlelabs' Communication Infrastructure Over Various Protocols, Rocky A. Favorito, David M. Mcillece Mar 1999

Analysis Of Usaf Battlelabs' Communication Infrastructure Over Various Protocols, Rocky A. Favorito, David M. Mcillece

Theses and Dissertations

As a result of the doctrines exposed in the Air Force's "Global Engagement: A Vision for the 21st Century Air Force," the concept of a "Battlelab" was devised to support and develop the key warfighting capabilities needed in the next century. Although geographically separated, these labs must have the capability to exchange information with each other in a "Virtual Battlelab Environment" (VBE). Although many types of data will be exchanged, only variable-bit-rate (VBR) video and distributed interactive simulation (DIS) traffic are modeled in the VBE. The research described in this thesis utilizes a systems engineering approach to investigate the performance …


A Java Based Human Computer Interface For A Uav Decision Support Tool Using Conformal Mapping, Randy A. Flood Mar 1999

A Java Based Human Computer Interface For A Uav Decision Support Tool Using Conformal Mapping, Randy A. Flood

Theses and Dissertations

This paper describes the development of the Human Computer Interface (HCI) for a Decision Support System for routing Unmanned Aerial Vehicles (UAVs). This problem is a multi-vehicle routing problem with time-windows. Because of the unique nature of UAVs, a tool is needed to support dynamic re-routing. We solve the problem in two ways. First, we create a UAV Decision Support Tool (UAV DST) that uses a set of Java software objects to display maps and convert between latitude-longitude coordinates and x-y coordinates. Secondly, this library provides the ability for the user to dynamically reoptimize large UAV routing problems through a …


Strategies For Steganalysis Of Bitmap Graphics Files, Christopher J. Fogle Mar 1999

Strategies For Steganalysis Of Bitmap Graphics Files, Christopher J. Fogle

Theses and Dissertations

Steganography is the art and science of communicating through covert channels. The goal of steganography is to hide the fact that a message is even being transmitted. In the context of today's digital world, this ancient practice is enjoying resurgence due to the plethora of hiding places made possible by modern information media. Of particular concern is the use of graphics image files to conceal both legitimate and criminal communications.


Methodology For Application Design Using Information Dissemination And Active Database Technologies, Robert H. Hartz Mar 1999

Methodology For Application Design Using Information Dissemination And Active Database Technologies, Robert H. Hartz

Theses and Dissertations

In dynamic data environments, the large volume of transactions requires flexible control structures to effectively balance the flow of information between producers and consumers. Information dissemination-based systems, using both data push and pull delivery mechanisms, provide a possible scalable solution for data-intensive applications. In this research, a methodology is proposed to capture information dissemination design features in the form of active database rules to effectively control dynamic data applications. As part of this design methodology, information distribution properties are analyzed, data dissemination mechanisms are transformed into an active rule framework, and the desired reactive behavior is achieved through rule customization. …


Target Pose Estimation From Radar Data Using Adaptive Networks, Andrew W. Learn Mar 1999

Target Pose Estimation From Radar Data Using Adaptive Networks, Andrew W. Learn

Theses and Dissertations

his research investigates and extends recent work by J.C. Principe at the University of Florida in target pose estimation using adaptive networks. First, Principe's technique is successfully extended to estimate both azimuth and elevation using SAR images. A network trained and tested using MSTAR data yields mean errors of less than six degrees in azimuth and five degrees in elevation. Second, the technique is applied to high-range resolution radar (HRR) signatures. Ground target (azimuth only) testing yields mean errors of less than 11 degrees for most classes. Air target testing for networks trained and tested on the same aircraft class …


A Modeling And Simulation Approach To Analyze The Workload Associated With The Growth Of Network Router Access Control Lists, Douglas R. Lomsdalen Mar 1999

A Modeling And Simulation Approach To Analyze The Workload Associated With The Growth Of Network Router Access Control Lists, Douglas R. Lomsdalen

Theses and Dissertations

Organizations can no longer isolate their networks from the rest of the world and still remain competitive. An organization willing to compete in the world market must take the necessary precautions to protect its network, the systems located on those networks, and its mission critical data. There are performance issues associated with the use of access control lists (ACL); however, if ACLs are implemented properly and periodically reviewed, a secure network can be attained. This research attempts to determine how the growth of an ACL affects packet flow and router CPU consumption, and also identify the specific length of an …


Extensible Multi-Agent System For Heterogeneous Database Association Rule Mining And Unification, Christopher G. Marks Mar 1999

Extensible Multi-Agent System For Heterogeneous Database Association Rule Mining And Unification, Christopher G. Marks

Theses and Dissertations

The Probabilities, Expert System, Knowledge, and Inference (PESKI) System uses the data mining of association rules to fill incompleteness in the knowledge of an expert system. The rules are mined from transactional data sources and then incorporated using an existing link to PESKI. One method of providing a system that will easily allow new data sources to be added is using an information gathering agent-based system. This research first develops a methodology for designing and creating a multi-agent system. It then applies this methodology to design a platform independent means of data mining data sources of any format. The use …


Transforming Cobol Legacy Software To A Generic Imperative Model, Dina L. Moraes Mar 1999

Transforming Cobol Legacy Software To A Generic Imperative Model, Dina L. Moraes

Theses and Dissertations

Legacy COBOL code presents challenges for organizations wishing to increase their effectiveness and improve their efficiency. The systems that utilize this code are vital to enterprise operations, yet maintenance of code is expensive. This research presents an alternative that overcomes some of the problems of legacy COBOL code through the use of software reengineering techniques. This research develops a transformation system to convert COBOL code into a generic imperative model, recapturing the initial design and deciphering the requirements implemented by the legacy code, thereby making possible the documentation of legacy systems, design restructuring, and the re-design of a new, enhanced …


A Structured Approach To Software Tool Integration, Penelope A. Noe Mar 1999

A Structured Approach To Software Tool Integration, Penelope A. Noe

Theses and Dissertations

As the trend towards commercial off-the-shelf (COTS) software continues, civilian companies and government agencies alike are battling with the challenge of making multiple software packages and applications work together. Many of these companies and agencies have attempted to integrate the software tools to form a coherent system that satisfies their goals, often without the use of a step by step approach guiding the effort. Many researchers in the field of software tool integration have determined the areas that need to be addressed when tools are integrated. Some researchers have developed and expanded upon a theoretical model for integration. This model …


Incorporating Scene Mosaics As Visual Indexes Into Uav Video Imagery Databases, Timothy I. Page Mar 1999

Incorporating Scene Mosaics As Visual Indexes Into Uav Video Imagery Databases, Timothy I. Page

Theses and Dissertations

The rise of large digital video archives has strengthened the need for more efficient ways of indexing video files an accessing the information contained in them. Reconnaissance platforms, such as the Predator UAV, are contributing thousands of hours of video footage that require analysis, storage, and retrieval. A process is proposed for converting a video stream into a series of mosaic and selected still images that provide complete coverage of the original video. The video mosaic images can be utilized as visual indexes into a video database. In addition, mosaic images contain information from an entire sequence of video frames …