Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Physical Sciences and Mathematics

Active Processor Scheduling Using Evolution Algorithms, David J. Caswell Dec 2002

Active Processor Scheduling Using Evolution Algorithms, David J. Caswell

Theses and Dissertations

The allocation of processes to processors has long been of interest to engineers. The processor allocation problem considered here assigns multiple applications onto a computing system. With this algorithm researchers could more efficiently examine real-time sensor data like that used by United States Air Force digital signal processing efforts or real-time aerosol hazard detection as examined by the Department of Homeland Security. Different choices for the design of a load balancing algorithm are examined in both the problem and algorithm domains. Evolutionary algorithms are used to find near-optimal solutions. These algorithms incorporate multiobjective coevolutionary and parallel principles to create an …


Analysis For Cooperative Behavior Effectiveness Of Autonomous Wide Area Search Munitions, Sang M. Park Aug 2002

Analysis For Cooperative Behavior Effectiveness Of Autonomous Wide Area Search Munitions, Sang M. Park

Theses and Dissertations

The purpose of this study is to investigate how a simulation model can accurately represent the performance of the autonomous wide area search munitions, and to find the effectiveness of the cooperative behavior on the autonomous munitions. Though it does not provide a practical solution for the development of the autonomous wide area search munitions, this research will show some meaningful allocations of the munitions tasks that are applicable to the development of the autonomous munitions. For the first phase, this thesis presents how accurately a simplified simulation model can represent a proposed weapon system by comparing the simulation results …


Visual Execution Analysis For Multiagent Systems, Chong Kil Aug 2002

Visual Execution Analysis For Multiagent Systems, Chong Kil

Theses and Dissertations

Multiagent systems have become increasingly important in developing complex software systems. Multiagent systems introduce collective intelligence and provide benefits such as flexibility, scalability, decentralization, and increased reliability. A software agent is a high-level software abstraction that is capable of performing given tasks in an environment without human intervention. Although multiagent systems provide a convenient and powerful way to organize complex software systems, developing such system is very complicated. To help manage this complexity this research develops a methodology and technique for analyzing, monitoring and troubleshooting multiagent systems execution. This is accomplished by visualizing a multiagent system at multiple levels of …


Performance Analysis Of A Secure Ieee 802.11b Wireless Network Incorporating Personal Digital Assistants, John L. Camp Jun 2002

Performance Analysis Of A Secure Ieee 802.11b Wireless Network Incorporating Personal Digital Assistants, John L. Camp

Theses and Dissertations

Research results of this thesis indicate very poor performance of a Wireless Local Area Network (WLAN) utilizing PDAs. Network throughput is adversely effected most by VPN implementation and slightly by increased file size. The client distance factor has virtually no effect on the throughput. The impact of each of these factor levels is small when compared to the magnitude of the overall mean throughput (<6%). The average network throughput with the PDA client is much lower than expected (=11,500 bps). This is attributed to several factors with degradation primarily resulting from limitations of the PDA hardware and O/S. Because of the low throughput values achieved (regardless if VPN is on or off), an operational WLAN with PDAs (as tested) is not feasible. Operational use of the network tested would require an in-depth analysis of the type of network traffic and performance required to maintain functionality. To deploy such a system, custom designed Winsock controls would need to be implemented to minimize limitations imposed by the PDA. As PDA technology continues to develop, future hardware and O/S functionality may provide a more robust platform for network communications. The battery life of the PDA and packet battery combination is observed to be about 164 minutes with additional jackets adding about 90 minutes each.


Suitability Of Unidata Metapps For Incorporation In Platform-Independent User-Customized Aviation Weather Products Generation Software, Harmen P. Visser Mar 2002

Suitability Of Unidata Metapps For Incorporation In Platform-Independent User-Customized Aviation Weather Products Generation Software, Harmen P. Visser

Theses and Dissertations

The Air Force Combat Climatology Center (AFCCC) is tasked to provide long-range seasonal forecasts for worldwide locations. Currently, the best long-range temperature forecasts the weather community has are the climatological standard normals. This study creates a stepping-stone into the solution of long-range forecasting by finding a process to predict temperatures better than those using climatological standard normals or simple frequency distributions of occurrences. Northern Hemispheric teleconnection indices and the standardized Southern Oscillation index are statistically compared to three-month summed Heating Degree Days (HDDs) and Cooling Degree Days (CDDs) at 14 U.S. locations. First, linear regression was accomplished. The results showed …


Using An Inductive Learning Algorithm To Improve Antibody Generation In A Single Packet Computer Defense Immune System, Russell J. Aycock Mar 2002

Using An Inductive Learning Algorithm To Improve Antibody Generation In A Single Packet Computer Defense Immune System, Russell J. Aycock

Theses and Dissertations

Coherent optical sources in the mid-infrared region (mid-IR) are important fundamental tools for infrared countermeasures and battlefield remote sensing. Nonlinear optical effects can be applied to convert existing near-IR laser sources to radiate in the mid-IR. This research focused on achieving such a conversion with a quasi-phase matched optical parametric oscillators using orientation-patterned gallium arsenide (OPGaAs), a material that can be quasi-phased matched by periodically reversing the crystal structure during the epitaxial growth process. Although non-linear optical conversion was not ultimately achieved during this research, many valuable lessons were learned from working with this material. This thesis reviews the theory …


Investigation Of Cooperative Behavior In Autonomous Wide Search Munitions, Robert E. Dunkel Iii Mar 2002

Investigation Of Cooperative Behavior In Autonomous Wide Search Munitions, Robert E. Dunkel Iii

Theses and Dissertations

The purpose of this research is to investigate the effectiveness of wide-area search munitions in various scenarios using different cooperative behavior algorithms. The general scenario involves multiple autonomous munitions searching for an unknown number of targets of different priority in unknown locations. Three cooperative behavior algorithms are used in each scenario: no cooperation, cooperative attack only, and cooperative classification and attack. In the cooperative cases, the munitions allocate tasks on-line as a group, using linear programming techniques to determine the optimum allocation. Each munition provides inputs to the task allocation routine in the form of probabilities of successfully being able …


Using Relational Schemata In A Computer Immune System To Detect Multiple-Packet Network Intrusions, John L. Bebo Mar 2002

Using Relational Schemata In A Computer Immune System To Detect Multiple-Packet Network Intrusions, John L. Bebo

Theses and Dissertations

Given the increasingly prominent cyber-based threat, there are substantial research and development efforts underway in network and host-based intrusion detection using single-packet traffic analysis. However, there is a noticeable lack of research and development in the intrusion detection realm with regard to attacks that span multiple packets. This leaves a conspicuous gap in intrusion detection capability because not all attacks can be found by examining single packets alone. Some attacks may only be detected by examining multiple network packets collectively, considering how they relate to the "big picture," not how they are represented as individual packets. This research demonstrates a …


Application Of Information Retrieval Techniques To Heterogeneous Databases In The Virtual Distributed Laboratory, Rodney D. Lykins Mar 2002

Application Of Information Retrieval Techniques To Heterogeneous Databases In The Virtual Distributed Laboratory, Rodney D. Lykins

Theses and Dissertations

The Department of Defense (DoD) maintains thousands of Synthetic Aperture Radar (SAR), Infrared (IR), Hyper-Spectral intelligence imagery and Electro-Optical (EO) target signature data. These images are essential to evaluating and testing individual algorithm methodologies and development techniques within the Automatic Target Recognition (ATR) community. The Air Force Research Laboratory Sensors Directorate (AFRL/SN) has proposed the Virtual Distributed Laboratory (VDL) to maintain a central collection of the associated imagery metadata and a query mechanism to retrieve the desired imagery. All imagery metadata is stored in relational database format for access from agencies throughout the federal government and large civilian universities. Each …


An Integrated Architecture And Feature Selection Algorithm For Radial Basis Neural Networks, Timothy D. Flietstra Mar 2002

An Integrated Architecture And Feature Selection Algorithm For Radial Basis Neural Networks, Timothy D. Flietstra

Theses and Dissertations

There are two basic ways to control an Unmanned Combat Aerial Vehicle (UCAV) as it searches for targets: allow the UCAV to act autonomously or employ man-in-the-loop control. There are also two target sets of interest: fixed or mobile targets. This research focuses on UCAV-based targeting of mobile targets using man-in-the-loop control. In particular, the interest is in how levels of satellite signal latency or signal degradation affect the ability to accurately track, target, and attack mobile targets. This research establishes a weapon effectiveness model assessing targeting inaccuracies as a function of signal latency and/or signal degradation. The research involved …


An Interactive Decision Support System For Scheduling Fighter Pilot Training, Cuong T. Nguyen Mar 2002

An Interactive Decision Support System For Scheduling Fighter Pilot Training, Cuong T. Nguyen

Theses and Dissertations

The U.S. Air Force is developing Modular Aircraft Support System (MASS) program to replace the current Aerospace Ground Equipment (AGE). AGE supplies electricity, nitrogen, hydraulics and other support equipment to maintenance activities at the flight line. Current AGE makes up one-third of the deployment footprint. AGE is also mostly aircraft specific, and has reliability problems. The MASS alternative focuses on modularity based on a plug-and-play approach. The technological improvements and possible reduction in the footprint make MASS a good alternative. The AF has to determine now, whether MASS can supply similar functionality and decrease the deployment footprint to theater, while …


Multi-Objective Mission Route Planning Using Particle Swarm Optimization, Kursat Yavuz Mar 2002

Multi-Objective Mission Route Planning Using Particle Swarm Optimization, Kursat Yavuz

Theses and Dissertations

The Mission Routing Problem (MRP) is the selection of a vehicle path starting at a point, going through enemy terrain defended by radar sites to get to the target(s) and returning to a safe destination (usually the starting point). The MRP is a three-dimensional, multi-objective path search with constraints such as fuel expenditure, time limits, multi-targets, and radar sites with different levels of risks. It can severely task all the resources (people, hardware, software) of the system trying to compute the possible routes. The nature of the problem can cause operational planning systems to take longer to generate a solution …


Portable High-Performance Indexing For Vector Product Format Spatial Databases, Engin Colak Mar 2002

Portable High-Performance Indexing For Vector Product Format Spatial Databases, Engin Colak

Theses and Dissertations

Geo-spatial databases have an overall performance problem because of their complexity and large size. For this reason, many researchers seek new ways to improve the overall performance of geo-spatial databases. Typically, these research efforts are focused on complex indexing structures and query processing methods to capture the relationships between the individual features of fully-functional geo-spatial databases. Visualization applications, such as combat simulators and mission planning tools, suffer from the general performance problems associated with geo-spatial databases. This research focuses on building a high-performance geo-spatial database for visualization applications. The main approach is to simplify the complex data model and to …


Data Mining Feature Subset Weighting And Selection Using Genetic Algorithms, Okan Yilmaz Mar 2002

Data Mining Feature Subset Weighting And Selection Using Genetic Algorithms, Okan Yilmaz

Theses and Dissertations

We present a simple genetic algorithm (sGA), which is developed under Genetic Rule and Classifier Construction Environment (GRaCCE) to solve feature subset selection and weighting problem to have better classification accuracy on k-nearest neighborhood (KNN) algorithm. Our hypotheses are that weighting the features will affect the performance of the KNN algorithm and will cause better classification accuracy rate than that of binary classification. The weighted-sGA algorithm uses real-value chromosomes to find the weights for features and binary-sGA uses integer-value chromosomes to select the subset of features from original feature set. A Repair algorithm is developed for weighted-sGA algorithm to guarantee …


Ontological Engineering And Mapping In Multiagent Systems Development, Jonathan M. Dileo Mar 2002

Ontological Engineering And Mapping In Multiagent Systems Development, Jonathan M. Dileo

Theses and Dissertations

Multiagent systems have received much attention in recent years due to their advantages in complex, distributed environments. Previous work at the Air Force Institute of Technology has developed a methodology for analyzing, designing, and developing multiagent systems, called Multiagent Systems Engineering (MaSE). MaSE currently does not address the information domain of the system, which is an integral part of designing proper system execution. This research extends the MaSE methodology to include the use of ontologies for information domain specification. The extensions allow the designer to specify information flow by using objects from the ontology as parameters in agent conversations. The …


A Collaborative Visualization Framework Using Jini™ Technology, Chad M. Harris Mar 2002

A Collaborative Visualization Framework Using Jini™ Technology, Chad M. Harris

Theses and Dissertations

It is difficult to achieve mutual understanding of complex information between individuals that are separated geographically. Two well-known techniques commonly used to deal with this difficultly are collaboration and information visualization. This thesis develops a generic flexible framework that supports both collaboration and information visualization. It introduces the Collaborative Visualization Environment (COVE) framework, which simplifies the development of real-time synchronous multi-user applications by decoupling the elements of collaboration from the application. This allows developers to focus on building applications and leave the difficulties of collaboration (i.e., concurrency controls, user awareness, session management, etc.) to the framework. The framework uses an …


Bubble World - A Novel Visual Information Retrieval Technique, Christopher L. Van Berendonck Mar 2002

Bubble World - A Novel Visual Information Retrieval Technique, Christopher L. Van Berendonck

Theses and Dissertations

With the tremendous growth of published electronic information sources in the last decade and the unprecedented reliance on this information to succeed in day-to-day operations, comes the expectation of finding the right information at the right time. Sentential interfaces are currently the only viable solution for searching through large infospheres of unstructured information, however, the simplistic nature of their interaction model and lack of cognitive amplification they can provide severely limit the performance of the interface. Visual information retrieval systems are emerging as possible candidate replacements for the more traditional interfaces, but many lack the cognitive framework to support the …


Translation And Rotation Invariant Multiscale Image Registration, Jennifer L. Manfra Mar 2002

Translation And Rotation Invariant Multiscale Image Registration, Jennifer L. Manfra

Theses and Dissertations

The most recent research involved registering images in the presence of translations and rotations using one iteration of the redundant discrete wavelet transform. We extend this work by creating a new multiscale transform to register two images with translation or rotation differences, independent of scale differences between the images. Our two-dimensional multiscale transform uses an innovative combination of lowpass filtering and the continuous wavelet transform to mimic the two-dimensional redundant discrete wavelet transform. This allows us to obtain multiple subbands at various scales while maintaining the desirable properties of the redundant discrete wavelet transform. Whereas the discrete wavelet transform produces …


Categorizing Network Attacks Using Pattern Classification Algorithms, George E. Noel Iii Mar 2002

Categorizing Network Attacks Using Pattern Classification Algorithms, George E. Noel Iii

Theses and Dissertations

The United States Air Force relies heavily on computer networks for many day-to-day activities. Many of these networks are affected by various types of attacks that can be launched from anywhere on the globe. The rising prominence of organizations such as the AFCERT and the MAJCOM NOSCs is evidence of an increasing realization among the Air Force leadership that protecting our computer networks is vitally important. A critical requirement for protecting our networks is the ability to detect attacks and intrusion attempts. This research is an effort to refine a portion of an AFIT-developed intrusion detection system known as the …


A Visual Meta-Language For Generic Modeling, Hakan Canli Mar 2002

A Visual Meta-Language For Generic Modeling, Hakan Canli

Theses and Dissertations

This research examines the usefulness of a visual meta-language (VLGM Visual Language for Generic Modeling) developed for the specification of components and relations in a modeling domain. The language is designed to allow software tools to interpret specifications and automatically provide modeling environments. VLGM makes use of the object-orientated software engineering methodology. It defines four types of special classes and three types of relations between them. Data types and primitive types are allocated with several attributes to provide restrictions and enable consistency checks over models. As part of this research a software tool was designed. The tool provides a workspace …