Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire Dec 2008

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire

Theses and Dissertations

Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …


Material Perturbations To Enhance Performance Of The Theile Half-Width Leaky Mode Antenna, Jason A. Girard Jun 2008

Material Perturbations To Enhance Performance Of The Theile Half-Width Leaky Mode Antenna, Jason A. Girard

Theses and Dissertations

Microstrip traveling-wave antennas, often referred to as leaky-wave antennas, have been shown to radiate when the dominant or fundamental mode is suppressed and the first higher-order mode is excited. One such microstrip variation is the Thiele Half-Width (THW) antenna, which operates from 5.9 - 8.2 GHz for this research. Increasing the bandwidth over which the THW antenna radiates is desired, as is a fundamental understanding of the propagation characteristics over this region. This dissertation seeks to vary or perturb the material and physical properties of the THW antenna, including strip-width variations and modifications of the substrate layer, to achieve these …


A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko Jun 2008

A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko

Theses and Dissertations

With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration. The United States Department of Defense’s (DoD) Network-Centric Enterprise Services initiative, along with the notion of pushing the “power to the edge,” aims to provide end-users with maximum situational awareness, a comprehensive view of the battlespace, all within a secure networking environment. Building from previous AFIT research efforts, this research developed a novel security framework architecture to address the lack of efficient and scalable secure multicasting in the low earth orbit …


Statistical Methods For Image Registration And Denoising, Matthew D. Sambora Jun 2008

Statistical Methods For Image Registration And Denoising, Matthew D. Sambora

Theses and Dissertations

This dissertation describes research into image processing techniques that enhance military operational and support activities. The research extends existing work on image registration by introducing a novel method that exploits local correlations to improve the performance of projection-based image registration algorithms. The dissertation also extends the bounds on image registration performance for both projection-based and full-frame image registration algorithms and extends the Barankin bound from the one-dimensional case to the problem of two-dimensional image registration. It is demonstrated that in some instances, the Cramer-Rao lower bound is an overly-optimistic predictor of image registration performance and that under some conditions, the …


Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson Mar 2008

Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson

Faculty Publications

No abstract provided.


Digital Signal Processing Leveraged For Intrusion Detection, Theodore J. Erickson Mar 2008

Digital Signal Processing Leveraged For Intrusion Detection, Theodore J. Erickson

Theses and Dissertations

This thesis describes the development and evaluation of a novel system called the Network Attack Characterization Tool (NACT). The NACT employs digital signal processing to detect network intrusions, by exploiting the Lomb-Scargle periodogram method to obtain a spectrum for sampled network traffic. The Lomb-Scargle method for generating a periodogram allows for the processing of unevenly sampled network data. This method for determining a periodogram has not yet been used for intrusion detection. The spectrum is examined to determine if features exist above a significance level chosen by the user. These features are considered an attack, triggering an alarm. Two traffic …


Signal Processing Design Of Low Probability Of Intercept Waveforms, Nathaniel C. Liefer Mar 2008

Signal Processing Design Of Low Probability Of Intercept Waveforms, Nathaniel C. Liefer

Theses and Dissertations

This thesis investigates a modification to Differential Phase Shift Keyed (DPSK) modulation to create a Low Probability of Interception/Exploitation (LPI/LPE) communications signal. A pseudorandom timing offset is applied to each symbol in the communications stream to intentionally create intersymbol interference (ISI) that hinders accurate symbol estimation and bit sequence recovery by a non-cooperative receiver. Two cooperative receiver strategies are proposed to mitigate the ISI due to symbol timing offset: a modified minimum Mean Square Error (MMSE) equalization algorithm and a multiplexed bank of equalizer filters determined by an adaptive Least Mean Square (LMS) algorithm. Both cooperative receivers require some knowledge …


Performance Comparison Of Pb(Zr0.52Ti0.48)O3-Only And Pb(Zr0.52Ti0.48)O3-On-Silicon Resonators, Hengky Chandrahalim, Sunil A. Bhave, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey Jan 2008

Performance Comparison Of Pb(Zr0.52Ti0.48)O3-Only And Pb(Zr0.52Ti0.48)O3-On-Silicon Resonators, Hengky Chandrahalim, Sunil A. Bhave, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey

Faculty Publications

This paper provides a quantitative comparison and explores the design space of lead zirconium titanate (PZT)–only and PZT-on-silicon length-extensional mode resonators for incorporation into radio frequency microelectromechanical system filters and oscillators. We experimentally measured the correlation of motional impedance (RX) and quality factor (Q) with the resonators’ silicon layer thickness (tSi). For identical lateral dimensions and PZT-layer thicknesses (tPZT), the PZT-on-silicon resonator has higher resonant frequency (fC), higher Q (5100 versus 140), lower RX (51 Ω versus 205 Ω), and better linearity [third-order input intercept …