Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Air Force Institute of Technology

Theses and Dissertations

Theses/Dissertations

2012

Discipline
Keyword

Articles 1 - 30 of 69

Full-Text Articles in Physical Sciences and Mathematics

Passive Ranging Using A Dispersive Spectrometer And Optical Filters, Jacob A. Martin Dec 2012

Passive Ranging Using A Dispersive Spectrometer And Optical Filters, Jacob A. Martin

Theses and Dissertations

Monocular passive ranging using atmospheric oxygen absorption has been demonstrated in the past using an FTS. These instruments are very sensitive to vibration making them di cult to use on an airborne platform. This work focuses on whether passive ranging can be done with instruments that are easier to deploy. Two potential instruments are tested and compared: a diffraction grating spectrometer and optical filters. A grating spectrometer was able to estimate range to within 5% for a static solid rocket motor ring at a distance of 910 m using the NIR absorption band of oxygen. Testing at shorter ranges produced …


Epr And Endor Studies Of Point Defects In Lithium Tetraborate Crystals, Douglas A. Buchanan Dec 2012

Epr And Endor Studies Of Point Defects In Lithium Tetraborate Crystals, Douglas A. Buchanan

Theses and Dissertations

Lithium tetraborate (Li2B4O7 or LTB) is a promising material for both radiation dosimetry and neutron detection applications. LTB crystals can be grown pure or doped with different impurities including transition-metal and rare-earth ions. Research in this dissertation focuses on undoped LTB crystals and LTB crystals doped with copper and silver. Electron paramagnetic resonance (EPR) and electron-nuclear double resonance (ENDOR) are used to characterize point defects in the lithium tetraborate crystals. Thermoluminescence (TL), photoluminescence (PL), photoluminescence excitation (PLE), and optical absorption (OA) are also used. An intrinsic hole trap associated with lithium vacancies is characterized with EPR and ENDOR and its …


Parametrizing Finite Frames And Optimal Frame Completions, Miriam J. Poteet Dec 2012

Parametrizing Finite Frames And Optimal Frame Completions, Miriam J. Poteet

Theses and Dissertations

Frames are used in many signal processing applications. We consider the problem of constructing every frame whose frame operator has a given spectrum and whose vectors have prescribed lengths. For a given spectrum and set of lengths, we know when such a frame exists by the Schur-Horn Theorem; it exists if and only if its spectrum majorizes its squared lengths. We provide a more constructive proof of Horn's original result. This proof is based on a new method for constructing any and all frames whose frame operator has a prescribed spectrum and whose vectors have prescribed lengths. Constructing all such …


Quantifying Performance Bias In Label Fusion, Alexander M. Venzin Sep 2012

Quantifying Performance Bias In Label Fusion, Alexander M. Venzin

Theses and Dissertations

Classification systems are employed to remotely assess whether an element of interest falls into a target class or non-target class. These systems have uses in fields as far ranging as biostatistics to search engine keyword analysis. The performance of the system is often summarized as a trade-off between the proportions of elements correctly labeled as target plotted against the number of elements incorrectly labeled as target. These are empirical estimates of the true positive and false positive rates. These rates are often plotted to create a receiver operating characteristic (ROC) curve that acts as a visual tool to assess classification …


Effects Of Architecture On Information Leakage Of A Hardware Advanced Encryption Standard Implementation, Eric A. Koziel Sep 2012

Effects Of Architecture On Information Leakage Of A Hardware Advanced Encryption Standard Implementation, Eric A. Koziel

Theses and Dissertations

Side-channel analysis (SCA) is a threat to many modern cryptosystems. Many countermeasures exist, but are costly to implement and still do not provide complete protection against SCA. A plausible alternative is to design the cryptosystem using architectures that are known to leak little information about the cryptosystem's operations. This research uses several common primitive architectures for the Advanced Encryption Standard (AES) and assesses the susceptibility of the full AES system to side-channel attack for various primitive configurations. A combined encryption/decryption core is also evaluated to determine if variation of high-level architectures affects leakage characteristics. These different configurations are evaluated under …


Creating Network Attack Priority Lists By Analyzing Email Traffic Using Predefined Profiles, Eric J. Merrit Sep 2012

Creating Network Attack Priority Lists By Analyzing Email Traffic Using Predefined Profiles, Eric J. Merrit

Theses and Dissertations

Networks can be vast and complicated entities consisting of both servers and workstations that contain information sought by attackers. Searching for specific data in a large network can be a time consuming process. Vast amounts of data either passes through or is stored by various servers on the network. However, intermediate work products are often kept solely on workstations. Potential high value targets can be passively identified by comparing user email traffic against predefined profiles. This method provides a potentially smaller footprint on target systems, less human interaction, and increased efficiency of attackers. Collecting user email traffic and comparing each …


Utilizing Graphics Processing Units For Network Anomaly Detection, Jonathan D. Hersack Sep 2012

Utilizing Graphics Processing Units For Network Anomaly Detection, Jonathan D. Hersack

Theses and Dissertations

This research explores the benefits of using commonly-available graphics processing units (GPUs) to perform classification of network traffic using supervised machine learning algorithms. Two full factorial experiments are conducted using a NVIDIA GeForce GTX 280 graphics card. The goal of the first experiment is to create a baseline for the relative performance of the CPU and GPU implementations of artificial neural network (ANN) and support vector machine (SVM) detection methods under varying loads. The goal of the second experiment is to determine the optimal ensemble configuration for classifying processed packet payloads using the GPU anomaly detector. The GPU ANN achieves …


Mapping Nuclear Fallout Using The Weather Research & Forecasting (Wrf) Model, Joseph C. Schofield Sep 2012

Mapping Nuclear Fallout Using The Weather Research & Forecasting (Wrf) Model, Joseph C. Schofield

Theses and Dissertations

There are many models that attempt to predict transport & dispersion (T&D) of particulate matter in the sensible atmosphere. The majority of these existing models are unable to incorporate atmospheric processes such wet deposition through scavenging and cloud condensation nuclei (CCN) formation. To this end, the numerical weather prediction (NWP) model known as the Weather Research & Forecasting with Chemistry (WRF/Chem) Model is studied to determine its suitability as a potential tool for predicting particulate T&D following an atmospheric nuclear detonation. This is done by modifying relevant modules, originally designed to predict the settling of volcanic ash, such that a …


Calibration Of A Silver Detector Using A Pube Source, Melanie E. Mace Jun 2012

Calibration Of A Silver Detector Using A Pube Source, Melanie E. Mace

Theses and Dissertations

During the initial design of the Field Reversed Compression and Heating Experiment (FRCHX), magnetohydrodynamic simulations performed by Los Alamos National Laboratory using MACH2 predicted a neutron yield on the order of 1012 neutrons. However, Air Force Research Laboratory (AFRL) measurements indicate a total of 107-108 neutrons are generated from the FRCHX. A PuBe source was used to create a burst of neutrons to calibrate an AFRL silver detector based on distance to determine if the four order of magnitude discrepancy was cause by an improperly calibrated detector. It was determined that the calibration equation in use …


The White-Hat Bot: A Novel Botnet Defense Strategy, Tyrone C. Gubler Jun 2012

The White-Hat Bot: A Novel Botnet Defense Strategy, Tyrone C. Gubler

Theses and Dissertations

Botnets are a threat to computer systems and users around the world. Botmasters can range from annoying spam email propagators to nefarious criminals. These criminals attempt to take down networks or web servers through distributed denial-of-service attacks, to steal corporate secrets, or to launder money from individuals or corporations. As the number and severity of successful botnet attacks rise, computer security experts need to develop better early-detection and removal techniques to protect computer networks and individual computer users from these very real threats. I will define botnets and describe some of their common purposes and current uses. Next, I will …


Cross Hallway Detection And Indoor Localization Using Flash Laser Detection And Ranging, Istvan M. Prileszky Jun 2012

Cross Hallway Detection And Indoor Localization Using Flash Laser Detection And Ranging, Istvan M. Prileszky

Theses and Dissertations

A flash LADAR is investigated as a source of navigation information to support cross-hallway detection and relative localization. To accomplish this, a dynamic, flexible simulation was developed that simulated the LADAR and the noise of a LADAR system. Using simulated LADAR data, algorithms were developed that were shown to be effective at detecting cross hallways in simulated ideal environments and in simulated environments with noise. Relative position was determined in the same situations. A SwissRanger SR4000 flash LADAR was then used to collect real data and to verify algorithm performance in real environments. Hallway detection was shown to be possible …


Implementation Of Branch-Point-Tolerant Wavefront Reconstructor For Strong Turbulence Compensation, Michael J. Steinbock Jun 2012

Implementation Of Branch-Point-Tolerant Wavefront Reconstructor For Strong Turbulence Compensation, Michael J. Steinbock

Theses and Dissertations

Branch points arise in optical transmissions due to strong atmospheric turbulence, long propagation paths, or a combination of both. Unfortunately, these conditions are very often present in desired operational scenarios for laser weapon systems, optical communication, and covert imaging, which suffer greatly when traditional adaptive optics systems either cannot sense branch points or implement non-optimal methods for sensing and correcting branch points. Previous research by Pellizzari presented a thorough analysis of various novel branch point tolerant reconstructors in the absence of noise. In this research a realistic model of the Air Force Institute of Technology's adaptive optics system is developed …


Application Of An Imaging Fourier-Transform Spectrometer For The Means Of Combustion Diagnostics, Michael R. Rhoby Jun 2012

Application Of An Imaging Fourier-Transform Spectrometer For The Means Of Combustion Diagnostics, Michael R. Rhoby

Theses and Dissertations

A passive remote sensing technique for accurately monitoring the combustion efficiency of petrochemical flares is greatly desired. A Phase II DOE-funded SBIR lead by Spectral Sciences, Inc. is underway to develop such a method. This paper presents an overview of the progress of AFIT's contribution. A Telops Hyper-Cam Mid-wave infrared imaging Fourier-transform spectrometer is used to examine a flame produced by a Hencken burner. Ethylene fuel was burned at four different equivalency ratios φ = 0:80; 0:91; 1:0 and 1:25. Presented is qualitative spectrally-resolved visualization of a Hencken burner flame and the spatial distribution of combustion by-products. The flame spectra …


Resource Provisioning In Large-Scale Self-Organizing Distributed Systems, M. Brent Reynolds Jun 2012

Resource Provisioning In Large-Scale Self-Organizing Distributed Systems, M. Brent Reynolds

Theses and Dissertations

This dissertation researches the mathematical translation of resource provisioning policy into mathematical terms and parameters to solve the on-line service placement problem. A norm called the Provisioning Norm is introduced. Theorems presented in the work show the Provisioning Norm utility function and greedy, random, local search effectively and efficiently solve the on-line problem. Caching of placements is shown to reduce the cost of change but does not improve response time performance. The use of feedback control theory is shown to be effective at significantly improving performance but increases the cost of change. The theoretical results are verified using a decentralized, …


Decentralized Riemannian Particle Filtering With Applications To Multi-Agent Localization, Martin J. Eilders Jun 2012

Decentralized Riemannian Particle Filtering With Applications To Multi-Agent Localization, Martin J. Eilders

Theses and Dissertations

The primary focus of this research is to develop consistent nonlinear decentralized particle filtering approaches to the problem of multiple agent localization. A key aspect in our development is the use of Riemannian geometry to exploit the inherently non-Euclidean characteristics that are typical when considering multiple agent localization scenarios. A decentralized formulation is considered due to the practical advantages it provides over centralized fusion architectures. Inspiration is taken from the relatively new field of information geometry and the more established research field of computer vision. Differential geometric tools such as manifolds, geodesics, tangent spaces, exponential, and logarithmic mappings are used …


Forensic Memory Analysis For Apple Os X, Andrew F. Hay Jun 2012

Forensic Memory Analysis For Apple Os X, Andrew F. Hay

Theses and Dissertations

Analysis of raw memory dumps has become a critical capability in digital forensics because it gives insight into the state of a system that cannot be fully represented through traditional disk analysis. Interest in memory forensics has grown steadily in recent years, with a focus on the Microsoft Windows operating systems. However, similar capabilities for Linux and Apple OS X have lagged by comparison. The volafox open source project has begun work on structured memory analysis for OS X. The tool currently supports a limited set of kernel structures to parse hardware information, system build number, process listing, loaded kernel …


Enhancing Trust In The Smart Grid By Applying A Modified Exponentially Weighted Averages Algorithm, Andrew T. Kasperek Jun 2012

Enhancing Trust In The Smart Grid By Applying A Modified Exponentially Weighted Averages Algorithm, Andrew T. Kasperek

Theses and Dissertations

The main contribution of this thesis is the development and application of a modified Exponentially Weighted Moving Algorithm (EWMA) algorithm, and its ability to robustly function in the face varying numbers of bad (malicious or malfunctioning) Special Protection System (SPS) nodes. Simulation results support the use of the proposed modified EWMA reputation based trust module in SPSs within a smart grid environment. This modification results in the ability to easily maintain the system above the minimum acceptable frequency of 58.8 Hz at the 95% confidence interval, when challenged with test cases containing 5, 10 and 15 bad node test cases …


Process Flow Features As A Host-Based Event Knowledge Representation, Benhur E. Pacer Jun 2012

Process Flow Features As A Host-Based Event Knowledge Representation, Benhur E. Pacer

Theses and Dissertations

The detection of malware is of great importance but even non-malicious software can be used for malicious purposes. Monitoring processes and their associated information can characterize normal behavior and help identify malicious processes or malicious use of normal process by measuring deviations from the learned baseline. This exploratory research describes a novel host feature generation process that calculates statistics of an executing process during a window of time called a process flow. Process flows are calculated from key process data structures extracted from computer memory using virtual machine introspection. Each flow cluster generated using k-means of the flow features represents …


Vulnerability Analysis Of The Player Command And Control Protocol, John T. Hagen Jun 2012

Vulnerability Analysis Of The Player Command And Control Protocol, John T. Hagen

Theses and Dissertations

The Player project is an open-source effort providing a control interface specification and software framework for abstracting robot hardware. This research presents five exploits that compromise vulnerabilities in Player's command and control protocol. The attacks exploit weaknesses in the ARP, IP, TCP and Player protocols to compromise the confidentially, integrity, and availability of communication between a Player client and server. The attacks assume a laptop is connected in promiscuous mode to the same Ethernet hub as the client and server in order to sniff all network traffic between them. This work also demonstrates that Internet Protocol Security (IPsec) is capable …


Short Message Service (Sms) Command And Control (C2) Awareness In Android-Based Smartphones Using Kernel-Level Auditing, Robert J. Olipane Jun 2012

Short Message Service (Sms) Command And Control (C2) Awareness In Android-Based Smartphones Using Kernel-Level Auditing, Robert J. Olipane

Theses and Dissertations

This thesis addresses the emerging threat of botnets in the smartphone domain and focuses on the Android platform and botnets using short message service (SMS) as the command and control (C2) channel. With any botnet, C2 is the most important component contributing to its overall resilience, stealthiness, and effectiveness. This thesis develops a passive host-based approach for identifying covert SMS traffic and providing awareness to the user. Modifying the kernel and implementing this awareness mechanism is achieved by developing and inserting a loadable kernel module that logs all inbound SMS messages as they are sent from the baseband radio to …


Using Predictive Analytics To Detect Major Problems In Department Of Defense Acquisition Programs, Austin W. Dowling Mar 2012

Using Predictive Analytics To Detect Major Problems In Department Of Defense Acquisition Programs, Austin W. Dowling

Theses and Dissertations

This research provides program analysts and Department of Defense (DoD) leadership with an approach to identify problems in real-time for acquisition contracts. Specifically, we develop optimization algorithms to detect unusual changes in acquisition programs’ Earned Value data streams. The research is focused on three questions. First, can we predict the contractor provided estimate at complete (EAC)? Second, can we use those predictions to develop an algorithm to determine if a problem will occur in an acquisition program or subprogram? Lastly, can we provide the probability of a problem occurring within a given timeframe? We find three of our models establish …


Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits, Henry W. Bushey Mar 2012

Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits, Henry W. Bushey

Theses and Dissertations

Supervisory Control and Data Acquisition (SCADA) systems control and monitor services for the nation's critical infrastructure. Recent cyber induced events (e.g., Stuxnet) provide an example of a targeted, covert cyber attack against a SCADA system that resulted in physical effects. Of particular note is how Stuxnet exploited the trust relationship between the human machine interface (HMI) and programmable logic controllers (PLCs). Current methods for validating system operating parameters rely on message exchange and network communications protocols, generally observed at the HMI. Although sufficient at the macro level, this method does not provide detection of malware that exhibits physical effects via …


A Women-Only Comparision Of The U.S. Air Force Fitness Test And The Marine Combat Fitness Test, Tarah D. Mitchell Mar 2012

A Women-Only Comparision Of The U.S. Air Force Fitness Test And The Marine Combat Fitness Test, Tarah D. Mitchell

Theses and Dissertations

In 2009, Captain Thomas Worden determined the Air Force Physical Fitness Test (AFPFT) poorly predicted combat capability for his 86 study participants. With only 5 of these 86 volunteers being women, this limited Worden's findings to primarily men. This follow-on research investigated whether these results carried over to women. We recruited 61 female volunteers and compared their performance on the AFPFT to the Marine Combat Fitness Test, the proxy for combat capability. Like Worden's research, we discovered little association between the two (R2 of 0.161). However, this association significantly increased (adj R2 of 0.572) when utilizing the raw …


Context Aware Routing Management Architecture For Airborne Networks, Joan A. Betances Mar 2012

Context Aware Routing Management Architecture For Airborne Networks, Joan A. Betances

Theses and Dissertations

This thesis advocates the use of Kalman filters in conjunction with network topology information derived from the Air Tasking Order (ATO) during the planning phase for military missions. This approach is the basis for an algorithm that implements network controls that optimize network performance for Mobile Ad hoc Networks (MANET). The trajectories of relevant nodes (airborne platforms) participating in the MANET can be forecasted by parsing key information contained in the ATO. This information is used to develop optimum network routes that can significantly improve MANET performance. Improved MANET performance in the battlefield enables decision makers to access information from …


Collisional Dynamics, Lasing And Stimulated Raman Scattering In Optically Pumped Cesium And Potassium Vapors, Kirk C. Brown Mar 2012

Collisional Dynamics, Lasing And Stimulated Raman Scattering In Optically Pumped Cesium And Potassium Vapors, Kirk C. Brown

Theses and Dissertations

This dissertation explores collisional dynamics, lasing and stimulated Raman scattering in cesium and potassium vapors. The spin orbit mixing and quenching cross sections of several buffer gas species are measured. The ne-structure mixing cross sections for He, CH4 and C2H6 are 14±3, 35±6 and 73±10 °A2, respectively. The 2P3/2 state is quenched more rapidly than the 2P1/2 state. A pulsed blue laser operating via direct excitation of the cesium 72P3/2 state is demonstrated. A theoretical model is extended and compared with experimental results. The maximum output …


Matrix Determination Of Reflectivity Of Hidden Object Via Indirect Photography, Simon S. Ferrel Mar 2012

Matrix Determination Of Reflectivity Of Hidden Object Via Indirect Photography, Simon S. Ferrel

Theses and Dissertations

Indirect photography is a recently demonstrated technique which expands on the principles of dual photography and allows for the imaging of hidden objects. A camera and light source are collocated with neither having line-of-sight access to the hidden object. Light from the source, a laser, is reflected off a visible non-specular surface onto the hidden object, where it is reflected back to the initial non-specular surface and collected by the camera. This process may be repeated numerous times for various laser spot positions to yield slightly different camera images due to a variation in the illumination of the object. These …


Design And Characterization Of A Three-Dimensional Positron Annihilation Spectroscopy System Using A Low-Energy Positron Beam, Stephen M. Jimenez Mar 2012

Design And Characterization Of A Three-Dimensional Positron Annihilation Spectroscopy System Using A Low-Energy Positron Beam, Stephen M. Jimenez

Theses and Dissertations

Previous forays by AFIT into positron research have resulted in the development of a new positron annihilation spectroscopy (PAS) technique and the procurement of a low-energy positron beam system. The primary purpose of this research was to design and build a state-of-the-art PAS laboratory at AFIT capable to address a myriad of DoD solid-state and surface physics questions. The main objectives were to acquire and assemble utilities to operate a positron beam, assemble and configure an ultra-high vacuum (UHV) system for samples, design and build an interface with a magnetic field to propagate positrons onto samples, and create a new …


Comparative Statistical Analysis Of Auroral Models, Cory T. Lane Mar 2012

Comparative Statistical Analysis Of Auroral Models, Cory T. Lane

Theses and Dissertations

The location of the equatorward boundary of the auroral oval provides an appropriate means to measure the accuracy of auroral models. In this study, the equatorward boundary is represented by the location at which the energy flux data measured by DMSP satellites exceeds 0.4 erg/cm2/s. The MLAT coordinates obtained from more than 4,000 orbits through the polar region of the Northern Hemisphere comprise the data set used to compare to the outputs of five auroral models. These models are: the original Hardy auroral model of 1985 (OH), the OVATION Prime model (OP), the 2008 adaptation to the Hardy …


Neutron Detection Using Amorphous Boron-Carbide Hetero-Junction Diodes, Thomas P. Mcquary Mar 2012

Neutron Detection Using Amorphous Boron-Carbide Hetero-Junction Diodes, Thomas P. Mcquary

Theses and Dissertations

The high energy products of the 10B(n,α)7Li neutron capture reaction were explored as a means of thermal neutron detection in thin film amorphous boron carbide (a--B5C:Hx) on n-type silicon hetero-junction diodes. Pulse height spectroscopy was conducted on the diodes while they were subjected to a moderated plutonium-beryllium (PuBe) source. Neutron capture could not be confirmed experimentally in any of the devices tested. Device modeling was performed to investigate the cause for the diode detector's negative response. A 1.47 MeV α particle produced transient current of 10-7 A and the induced was 4.7 …


Evaluation Of Traditional Security Solutions In The Scada Environment, Robert D. Larkin Mar 2012

Evaluation Of Traditional Security Solutions In The Scada Environment, Robert D. Larkin

Theses and Dissertations

Supervisory Control and Data Acquisition (SCADA) systems control and monitor the electric power grid, water treatment facilities, oil and gas pipelines, railways, and other Critical Infrastructure (CI). In recent years, organizations that own and operate these systems have increasingly interconnected them with their enterprise network to take advantage of cost savings and operational benefits. This trend, however, has introduced myriad vulnerabilities associated with the networking environment. As a result, the once isolated systems are now susceptible to a wide range of threats that previously did not exist. To help address the associated risks, security professionals seek to incorporate mitigation solutions …