Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- #antcenter (1)
- Artificial satellites in telecommunications (1)
- Classification systems (1)
- Computer networks--Security measures (1)
- Computer security (1)
-
- Filters (1)
- Image fusion (1)
- Image processing--Digital techniques (1)
- Image registration--Statistical methods (1)
- Leaky-wave antennas (1)
- MEMS (1)
- Malware (Computer software) (1)
- Microwave antennas (1)
- Netcentric computing (1)
- Numerical analysis (1)
- PZT (1)
- Perturbation (Mathematics) (1)
- Piezoelectric (1)
- RF (1)
- Resonators (1)
- Secure communications (1)
- Signal processing--Digital techniques (1)
- Software engineering (1)
- Steganography (1)
- Wireless links (1)
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Physical Sciences and Mathematics
Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire
Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire
Theses and Dissertations
Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …
Material Perturbations To Enhance Performance Of The Theile Half-Width Leaky Mode Antenna, Jason A. Girard
Material Perturbations To Enhance Performance Of The Theile Half-Width Leaky Mode Antenna, Jason A. Girard
Theses and Dissertations
Microstrip traveling-wave antennas, often referred to as leaky-wave antennas, have been shown to radiate when the dominant or fundamental mode is suppressed and the first higher-order mode is excited. One such microstrip variation is the Thiele Half-Width (THW) antenna, which operates from 5.9 - 8.2 GHz for this research. Increasing the bandwidth over which the THW antenna radiates is desired, as is a fundamental understanding of the propagation characteristics over this region. This dissertation seeks to vary or perturb the material and physical properties of the THW antenna, including strip-width variations and modifications of the substrate layer, to achieve these …
A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko
A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko
Theses and Dissertations
With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration. The United States Department of Defense’s (DoD) Network-Centric Enterprise Services initiative, along with the notion of pushing the “power to the edge,” aims to provide end-users with maximum situational awareness, a comprehensive view of the battlespace, all within a secure networking environment. Building from previous AFIT research efforts, this research developed a novel security framework architecture to address the lack of efficient and scalable secure multicasting in the low earth orbit …
Statistical Methods For Image Registration And Denoising, Matthew D. Sambora
Statistical Methods For Image Registration And Denoising, Matthew D. Sambora
Theses and Dissertations
This dissertation describes research into image processing techniques that enhance military operational and support activities. The research extends existing work on image registration by introducing a novel method that exploits local correlations to improve the performance of projection-based image registration algorithms. The dissertation also extends the bounds on image registration performance for both projection-based and full-frame image registration algorithms and extends the Barankin bound from the one-dimensional case to the problem of two-dimensional image registration. It is demonstrated that in some instances, the Cramer-Rao lower bound is an overly-optimistic predictor of image registration performance and that under some conditions, the …
Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson
Multi-Class Classification Fusion Using Boosting For Identifying Steganography Methods, Benjamin M. Rodriguez, Gilbert L. Peterson
Faculty Publications
No abstract provided.
Digital Signal Processing Leveraged For Intrusion Detection, Theodore J. Erickson
Digital Signal Processing Leveraged For Intrusion Detection, Theodore J. Erickson
Theses and Dissertations
This thesis describes the development and evaluation of a novel system called the Network Attack Characterization Tool (NACT). The NACT employs digital signal processing to detect network intrusions, by exploiting the Lomb-Scargle periodogram method to obtain a spectrum for sampled network traffic. The Lomb-Scargle method for generating a periodogram allows for the processing of unevenly sampled network data. This method for determining a periodogram has not yet been used for intrusion detection. The spectrum is examined to determine if features exist above a significance level chosen by the user. These features are considered an attack, triggering an alarm. Two traffic …
Signal Processing Design Of Low Probability Of Intercept Waveforms, Nathaniel C. Liefer
Signal Processing Design Of Low Probability Of Intercept Waveforms, Nathaniel C. Liefer
Theses and Dissertations
This thesis investigates a modification to Differential Phase Shift Keyed (DPSK) modulation to create a Low Probability of Interception/Exploitation (LPI/LPE) communications signal. A pseudorandom timing offset is applied to each symbol in the communications stream to intentionally create intersymbol interference (ISI) that hinders accurate symbol estimation and bit sequence recovery by a non-cooperative receiver. Two cooperative receiver strategies are proposed to mitigate the ISI due to symbol timing offset: a modified minimum Mean Square Error (MMSE) equalization algorithm and a multiplexed bank of equalizer filters determined by an adaptive Least Mean Square (LMS) algorithm. Both cooperative receivers require some knowledge …
Performance Comparison Of Pb(Zr0.52Ti0.48)O3-Only And Pb(Zr0.52Ti0.48)O3-On-Silicon Resonators, Hengky Chandrahalim, Sunil A. Bhave, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey
Performance Comparison Of Pb(Zr0.52Ti0.48)O3-Only And Pb(Zr0.52Ti0.48)O3-On-Silicon Resonators, Hengky Chandrahalim, Sunil A. Bhave, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey
Faculty Publications
This paper provides a quantitative comparison and explores the design space of lead zirconium titanate (PZT)–only and PZT-on-silicon length-extensional mode resonators for incorporation into radio frequency microelectromechanical system filters and oscillators. We experimentally measured the correlation of motional impedance (RX) and quality factor (Q) with the resonators’ silicon layer thickness (tSi). For identical lateral dimensions and PZT-layer thicknesses (tPZT), the PZT-on-silicon resonator has higher resonant frequency (fC), higher Q (5100 versus 140), lower RX (51 Ω versus 205 Ω), and better linearity [third-order input intercept …