Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Theses/Dissertations

1999

Discipline
Keyword

Articles 1 - 30 of 74

Full-Text Articles in Physical Sciences and Mathematics

Towards A Game Theory Model Of Information Warfare, David A. Burke Dec 1999

Towards A Game Theory Model Of Information Warfare, David A. Burke

Theses and Dissertations

The repeated game of incomplete information model, a subclass of game theory models, was modified to include aspects of information warfare. The repeated game of incomplete information model was first developed to analyze nuclear weapons disarmament negotiations. The central role of information in this model suggested its applicability to IW, which focuses on the defense and acquisition of information. A randomized experimental design was utilized to determine how people behave in a laboratory IW setting and to test the IW game model's basic predictions. The impact of experience and learning on IW performance was also assessed during the experiment. IW …


Implementation Of Speech Recognition Software For Text Processing: An Exploratory Analysis, Sean P. Abell Dec 1999

Implementation Of Speech Recognition Software For Text Processing: An Exploratory Analysis, Sean P. Abell

Theses and Dissertations

The rationale behind implementing new information technologies is often to gain productivity improvements associated with the substitution of machinery for labor. However, the literature shows little direct evidence of a positive relationship between information technology investment and subsequent productivity benefits. This thesis reports on the examination into the productivity implications of implementing speech recognition software in a text processing environment. More specifically, research was conducted to compare text processing speeds and error rates using speech recognition software versus the keyboard and mouse. Of interest was the time required to input and proofread text processing tasks as well as the number …


A Numerical Simulation Of A Carbon Black Suspension Cell Via A Time-Reversed, Double Layer Compute Algorithm, Gregg T. Anderson Dec 1999

A Numerical Simulation Of A Carbon Black Suspension Cell Via A Time-Reversed, Double Layer Compute Algorithm, Gregg T. Anderson

Theses and Dissertations

A numerical simulation of a carbon black suspension cell is explored which models a laser-induced plasma within a liquid ethanol medium of approximately 1 mm thickness. The simulation model assumes a laser pulse with a pulse width of approximately 9 nsecs propagating in the left-to-right direction striking the front surface of the medium and focusing to a spot within the liquid volume. When the energy density within a given irradiated volume is sufficiently high, it ignites the carbon particles and generates a large number of free electrons, i.e., a plasma. The plasma couples with the in-coming laser energy on a …


Network Security Versus Network Connectivity: A Framework For Addressing The Issues Facing The Air Force Medical Community, Franklin E. Cunningham Jr. Dec 1999

Network Security Versus Network Connectivity: A Framework For Addressing The Issues Facing The Air Force Medical Community, Franklin E. Cunningham Jr.

Theses and Dissertations

The Air Force has instituted Barrier Reef to protect its networks. The Air Force medical community operates network connections that are incompatible with Barrier Reef. To overcome this problem, OASD(HA) directed the Tri-Service Management Program Office (TIMPO) to develop an architecture that protects all military health systems and allows them to link with all three services and outside partners. This research studied the underlying networking issues and formed a framework based on data from network experts from the Air Force's medical centers and their base network organizations. The findings were compared TIMPO and a composite framework was developed that more …


Power, Performance, And Perception (P3): Integrating Usability Metrics And Technology Acceptance Determinants To Validate A New Model For Predicting System Usage, Alan P. Fiorello Dec 1999

Power, Performance, And Perception (P3): Integrating Usability Metrics And Technology Acceptance Determinants To Validate A New Model For Predicting System Usage, Alan P. Fiorello

Theses and Dissertations

Currently, there are two distinct approaches to assist information technology managers in the successful implementation of office automation software. The first approach resides within the field of usability engineering, while the second approach is derived from the discipline of management information systems (MIS). However, neither approach has successfully produced conclusive evidence that explains what characteristics facilitate system use as well as influence user acceptance of the system. This study reports on the validity of a new model, entitled the Power, Performance, Perception (P3) model, that links the constructs of usability engineering to user acceptance. Additionally, speech recognition software (SRS) was …


Evaporation Of Jet Fuels, Charles Eric Hack Dec 1999

Evaporation Of Jet Fuels, Charles Eric Hack

Theses and Dissertations

Determining the fate and transport of JP-8 jet fuel is a complex and important problem. As part of the startup procedures for jet engines, fuel is passed through aircraft engines before combustion is initiated. Because of the extremely low temperatures at northern tier Air Force bases, the unburned fuel does not evaporate readily and may come into contact with ground crew. To determine the amount and duration of contaminant contact, the evaporation of the emitted fuel must be modeled. The amount and composition of the fuel upon reaching the ground crew may be determined by droplet evaporation models that have …


Information System Incidents: The Development Of A Damage Assessment Model, Mark D. Horony Dec 1999

Information System Incidents: The Development Of A Damage Assessment Model, Mark D. Horony

Theses and Dissertations

Information system (IS) incidents are on the rise. With low manning and undertrained information security specialists it is difficult for organizations to stop IS incidents from occurring. Once an incident has occurred it is the IS manager's responsibility to ensure that a full and accurate damage assessment has been accomplished. However, most IS managers lack the necessary tools to assess the damage from an incident. This exploratory thesis developed an IS incident damage assessment model (DAM) that can be part of the IS manager's tool kit. During the development of the model, it became apparent that the model was supported …


Application Of The Interaction Picture To Reactive Scattering In One Dimension, Michael J. Maclachlan Dec 1999

Application Of The Interaction Picture To Reactive Scattering In One Dimension, Michael J. Maclachlan

Theses and Dissertations

The interaction picture is used together with the channel-packet method in a new time-dependent approach to compute reactive scattering matrix elements. The channelpacket method enables the use of the interaction picture for computing reactive S-matrix elements by splitting the computational effort into two parts. First, asymptotic reactant and product wavepackets are individually propagated into the interaction region of the potential to form Moller states. The interaction picture, in contrast to the usual Schrödinger picture of quantum mechanics, is so constructed that a wavefunction that experiences no change in potential (that is, a free-particle wavefunction) remains always fixed, with no translation …


Efficient Simulation Via Validation And Application Of An External Analytical Model, Thomas H. Irish Sep 1999

Efficient Simulation Via Validation And Application Of An External Analytical Model, Thomas H. Irish

Theses and Dissertations

This research makes significant contributions towards improving the efficiency of simulation studies using an external analytical model. The foundation for this research is the analytical control variate (ACV) method. The ACV method can produce significant variance reduction, but the resulting point estimate may exhibit bias. A Monte Carlo sampling method for resolving the bias problem is developed and demonstrated through a queueing network example. The method requires knowledge of the parameters and approximate distributions of the random variables used to produce the ACV. Often, some of these parameters or distributions are not known. Both parametric and non-parametric alternatives to the …


Formal Representation And Application Of Software Design Information, Thomas M. Schorsch Sep 1999

Formal Representation And Application Of Software Design Information, Thomas M. Schorsch

Theses and Dissertations

Formal methods for developing software use mathematical frameworks to specify, develop and verify software systems, especially safety critical systems where error free software is a necessity. A transformation system is a formal method that refines a requirement specification into an implementation by successively adding design decisions in the form of precisely verified design information. Current algebraic representations of design information (specifications, morphisms, and interpretations) and methods for applying algebraic specification design information (diagram refinement) cannot correctly represent and apply design information involving higher level design information. This investigation develops innovative methods for constructing and refining structured algebraic requirement specifications, as …


Multiple Comparison Pruning Of Neural Networks., Donald E. Duckro Sep 1999

Multiple Comparison Pruning Of Neural Networks., Donald E. Duckro

Theses and Dissertations

Reducing a neural network's complexity improves the ability of the network to be applied to future examples. Like an overfitted regression function, neural networks may miss their target because of the excessive degrees of freedom stored up in unnecessary parameters. Over the past decade, the subject of pruning networks has produced non-statistical algorithms like Skeletonization, Optimal Brain Damage, and Optimal Brain Surgery as methods to remove connections with the least salience. There are conflicting views as to whether more than one parameter can be removed at a time. The methods proposed in this research use statistical multiple comparison procedures to …


Analysis Of N-Tier Architecture Applied To Distributed-Database Systems, Alexandre G. Valente Jun 1999

Analysis Of N-Tier Architecture Applied To Distributed-Database Systems, Alexandre G. Valente

Theses and Dissertations

N-tier architecture has been more commonly used as a methodology for developing large database applications. This work evaluates the use of this architecture instead of the classical Client/Server architecture in developing corporate applications based on distributed databases. The comparison between architectures is performed using applications that execute transactions similar to those defined in the Transaction Process Council Type C benchmark (TPC-C). The environment used for development and testing was the AFIT Bimodal Cluster (ABC); a heterogeneous cluster of PCs, running Microsoft Windows NT 4.0 OS. The comparative experimental analysis demonstrated that the N-tier architecture allows more efficient bandwidth utilization between …


Scan-It: A Computer Vision Model Motivated By Human Physiology And Behavior, John G. Keller Jun 1999

Scan-It: A Computer Vision Model Motivated By Human Physiology And Behavior, John G. Keller

Theses and Dissertations

This dissertation details the development of a new computational vision model motivated by physiological and behavioral aspects of the human visual system. Using this model, intensity features within an artificial visual field of view are extracted and transformed into a simulated cortical representation, and a saccadic guidance system scans this field of view over an object within an image to memorize that object. The object representation is thus stored as a sequence of feature matrices describing sub-regions of the object. A new image can then be searched for the object (possibly scaled and rotated), where evidence of its presence is …


Implementation Of A Two-Dimensional Hydrodynamic Shock Code Based Upon The Weighted Average Flux Method, Mark P. Wittig Jun 1999

Implementation Of A Two-Dimensional Hydrodynamic Shock Code Based Upon The Weighted Average Flux Method, Mark P. Wittig

Theses and Dissertations

Numerical modeling of shock propagation and reflection is of interest to the Department of Defense (DoD). Propriety state-of-the-art codes based upon E. F. Toro's weighted average flux (WAF) method are being used to investigate complex shock reflection phenomena. Here we develop, test, and validate a one-dimensional hydrodynamic shock code. We apply WAF to Gudonov's first-order upwind method to achieve second-order accuracy. Oscillations, typical of second-order methods, are then removed using adaptive weight limiter functions based upon total variation diminishing (TVD) flux limiters. An adaptive Riemann solver routine is also implemented to improve computational efficiency. This one-dimensional code is then extended …


Parallel Digital Signal Processing On A Network Of Personal Computers Case Study: Space-Time Adaptive Processing, Fernando Silva Jun 1999

Parallel Digital Signal Processing On A Network Of Personal Computers Case Study: Space-Time Adaptive Processing, Fernando Silva

Theses and Dissertations

Network based parallel computing using personal computers is currently a popular choice for concurrent scientific computing. This work evaluates the capabilities and the performance of the AFIT Bimodal Cluster (ABC); a heterogeneous cluster of PCs connected by switched fast Ethernet and using MPICH 1.1 for interprocess communication for parallel digital signal processing using Space Time Adaptive Processing (STAP) as the case study. The MITRE RT_STAP Benchmark version 1.1 is ported and executed on the ABC, as well as on a cluster of six Sun SPARC workstations connected by a Myrinet network (the AFIT NOW), and on a IBM SP for …


Evolving Compact Decision Rule Sets, Robert E. Marmelstein Jun 1999

Evolving Compact Decision Rule Sets, Robert E. Marmelstein

Theses and Dissertations

While data mining technology holds the promise of automatically extracting useful patterns (such as decision rules) from data, this potential has yet to be realized. One of the major technical impediments is that the current generation of data mining tools produce decision rule sets that are very accurate, but extremely complex and difficult to interpret. As a result, there is a clear need for methods that yield decision rule sets that are both accurate and compact. The development of the Genetic Rule and Classifier Construction Environment (GRaCCE) is proposed as an alternative to existing decision rule induction (DRI) algorithms. GRaCCE …


Estimation And Goodness-Of-Fit In The Case Of Randomly Censored Lifetime Data, David M. Reineke Jun 1999

Estimation And Goodness-Of-Fit In The Case Of Randomly Censored Lifetime Data, David M. Reineke

Theses and Dissertations

A new continuous distribution function estimator for randomly censored data is developed, discussed, and compared to existing estimators. Minimum distance estimation is shown to be effective in estimating Weibull location parameters when random censoring is present. A method of estimating all 3 parameters of the 3-parameter Weibull distribution using a combination of minimum distance and maximum likelihood is also given. Cramer-von Mises and Anderson-Darling goodness-of-fit test statistics are modified to measure the discrepancy between the maximum likelihood estimate and the Kaplan-Meier product-limit estimate of the distribution function of the random variable of interest. These modified test statistics are used to …


Multiobjective Evolutionary Algorithms: Classifications, Analyses, And New Innovations, David A. Van Veldhuizen Jun 1999

Multiobjective Evolutionary Algorithms: Classifications, Analyses, And New Innovations, David A. Van Veldhuizen

Theses and Dissertations

This research organizes, presents, and analyzes contemporary Multiobjective Evolutionary Algorithm (MOEA) research and associated Multiobjective Optimization Problems (MOPs). Using a consistent MOEA terminology and notation, each cited MOEAs' key factors are presented in tabular form for ease of MOEA identification and selection. A detailed quantitative and qualitative MOEA analysis is presented, providing a basis for conclusions about various MOEA-related issues. The traditional notion of building blocks is extended to the MOP domain in an effort to develop more effective and efficient MOEAs. Additionally, the MOEA community's limited test suites contain various functions whose origins and rationale for use are often …


Methodology For Integrating The Scenario Databases Of Simulation Systems, Emilia M. Colonese Jun 1999

Methodology For Integrating The Scenario Databases Of Simulation Systems, Emilia M. Colonese

Theses and Dissertations

The use of many different simulation systems by the United States Department of Defense has resulted in many different scenario data representations contained in heterogeneous databases. These heterogeneous databases all represent the same data concept, but have different semantics due to intrinsic variations among the data models. In this research, I describe a unified scenario database to allow interoperability and reuse of the scenario data components while avoiding the problems of data redundancy. Using the object oriented approach, the data and schema of the scenario databases, represented in an object oriented model, are integrated into a global database also represented …


Cobol Reengineering Using The Parameter Based Object Identification (Pboi) Methodology, Sonia De Jesus Rodrigues Jun 1999

Cobol Reengineering Using The Parameter Based Object Identification (Pboi) Methodology, Sonia De Jesus Rodrigues

Theses and Dissertations

This research focuses on how to reengineer Cobol legacy systems into object oriented systems using Sward's Parameter Based Object Identification (PBOI) methodology. The method is based on relating categories of imperative subprograms to classes written in object oriented language based on how parameters are handled and shared among them. The input language of PBOI is a canonical form called the generic imperative model (GIM), which is an abstract syntax tree (AST) representation of a simple imperative programming language. The output is another AST, the generic object model (GOM), a generic object oriented language. Conventional languages must be translated into the …


Image Fusion Using Autoassociative-Heteroassociative Neural Networks, Claudia V. Kropas-Hughes May 1999

Image Fusion Using Autoassociative-Heteroassociative Neural Networks, Claudia V. Kropas-Hughes

Theses and Dissertations

Images are easily recognized, classified, and segmented; in short, analyzed by humans. The human brain/nervous system; the biological computer, performs rapid and accurate image processing. In the current research the concepts of the biological neural system provide the impetus for developing a computational means of fusing image data. Accomplishing this automatic image processing requires features be extracted from each image data set, and the information content fused. Biologically inspired computational models are examined for extracting features by transformations such as Fourier, Gabor, and wavelets, and for processing and fusing the information from multiple images through evaluation of autoassociative neural networks …


Fan-Beam Multiplexed Compton Scatter Tomography For Single-Sided Noninvasive Inspection, Brian L. Evans Apr 1999

Fan-Beam Multiplexed Compton Scatter Tomography For Single-Sided Noninvasive Inspection, Brian L. Evans

Theses and Dissertations

Multiplexed Compton Scatter Tomography (MCST) is explored as a method of nondestructively generating cross-sectional images of a sample's electron density. MCST is viable when access is available to only one side of the sample because it registers scattered gamma radiation. Multiplexing in scattered photon energy and in detector position allows simultaneous interrogation of many voxels with comparatively wide collimation. Primary components include a radioisotope source, fan beam collimators, and energy-discriminating detectors. The application of MCST to inspecting aluminum airframes for corrosion is considered. This application requires source gammas near 100 keV where the scattered gamma energy is severely broadened by …


Analysis Of Usaf Battlelabs' Communication Infrastructure Over Various Protocols, Rocky A. Favorito, David M. Mcillece Mar 1999

Analysis Of Usaf Battlelabs' Communication Infrastructure Over Various Protocols, Rocky A. Favorito, David M. Mcillece

Theses and Dissertations

As a result of the doctrines exposed in the Air Force's "Global Engagement: A Vision for the 21st Century Air Force," the concept of a "Battlelab" was devised to support and develop the key warfighting capabilities needed in the next century. Although geographically separated, these labs must have the capability to exchange information with each other in a "Virtual Battlelab Environment" (VBE). Although many types of data will be exchanged, only variable-bit-rate (VBR) video and distributed interactive simulation (DIS) traffic are modeled in the VBE. The research described in this thesis utilizes a systems engineering approach to investigate the performance …


Forecasting Downdraft Wind Speeds Associated With Airmass Thunderstorms For Peterson Air Force Base, Colorado, Using The Wsr-88d, Travis A. Steen Mar 1999

Forecasting Downdraft Wind Speeds Associated With Airmass Thunderstorms For Peterson Air Force Base, Colorado, Using The Wsr-88d, Travis A. Steen

Theses and Dissertations

During the period Jun-Aug 96, four Air Force installations suffered over $4.8 million in damage from convective winds. During the same summer, Air Force Space Command units issued nearly 65% of their weather warnings for convective winds, making the forecasting of convective winds the most frequent challenge to forecasters. This thesis seeks to assist Air Force forecasters at Peterson Air Force Base (PAFB), Colorado, in forecasting airmass thunderstorm downdraft wind speeds using the Weather Surveillance Radar-1988 Doppler (WSR-88D). To accomplish this purpose, several existing potential downdraft wind speed prediction techniques were evaluated against the observed wind speeds of nineteen airmass …


Graphical User Interface And Microprocessor Control Enhancement Of A Pseudorandom Code Generator, John M. Kos Mar 1999

Graphical User Interface And Microprocessor Control Enhancement Of A Pseudorandom Code Generator, John M. Kos

Theses and Dissertations

Modern digital communication techniques often require the generation of pseudorandom numbers or sequences. The ability to quickly and easily produce various codes such as maximal length codes, Gold codes, Jet Propulsion Laboratory ranging codes, syncopated codes, and non-linear codes in a laboratory environment is essential. This thesis addresses the issue of providing automated computer control to previously built, manually controlled hardware incorporating the Stanford Telecom STEL-1032 Pseudo-Random Number (PRN) Coder. By incorporating a microcontroller into existing hardware, the STEL-1032 can now be conveniently controlled from a MATLAB Graphical User Interface (GUI). The user can quickly create, save, and recall various …


Kinetic Model Of A Space-Based, Br (4 2P1/2 → 4 2P3/2) Laser Pumped By Solar Photolysis Of Ibr, Barry N. Behnken Mar 1999

Kinetic Model Of A Space-Based, Br (4 2P1/2 → 4 2P3/2) Laser Pumped By Solar Photolysis Of Ibr, Barry N. Behnken

Theses and Dissertations

A kinetic model of the directly solar-pumped, atomic bromine laser-operating on the Br (4 2P1/2 → 4 2P3/2) transition under IBr photolysis-was developed, executed, and interpreted. In recognition of an evolving national interest in space-based laser development, the model presumed operation on a space station platform. Results indicate that a well-engineered IBr laser is capable of generating 1.2 kilowatts of continuous-wave (CW) power under a pumping concentration of 20,000 solar units. Such performance translates to an efficiency of roughly 0.29%, appreciably better than the 0.1% ascribed to the heretofore leading solar-pumped competitor. An extensive analysis …


Validation Of The Gallagher Protonospheric Model, Kelly M. Law Mar 1999

Validation Of The Gallagher Protonospheric Model, Kelly M. Law

Theses and Dissertations

Ionospheric models are used in many systems throughout the Department of Defense: for example, they are useful in correcting range errors in radio signals. However, correction models don't incorporate the protonosphere, the torus-shaped plasma volume above the ionosphere. The Gallagher Protonospheric Model, recently incorporated into the Parameterized Ionospheric Model 1.7 (PIM 1.7), was validated against protonospheric total electron content (PTEC) measurements made by the GPS system. Gallagher model calculations of slant PTEC for Pittsburgh ground station looking south with a raypath at an elevation of 26 degrees were compared against GPS PTEC measurements for the same configuration derived from the …


Electrical Characterization Of Ion-Implanted 4h-Silicon Carbide, Christian P. Morath Mar 1999

Electrical Characterization Of Ion-Implanted 4h-Silicon Carbide, Christian P. Morath

Theses and Dissertations

Electrical characterization has been performed on ion-implanted p-type 4H-SiC to assess the activation efficiency and implantation-related damage recrystallization with the intention of developing an implantation/annealing scheme. Low doped (Na - Nd = 5x10(exp 15)/cu cm) epitaxial p-type layers grown by MOCVD were implanted with Al or B at doses ranging from 1x10(exp 13) to 1x10(exp 14)/sq cm at room temperature or 500 deg. C. The electrical technique of Temperature Dependent Hall Effect (TDHE) indicated that Al and B act as shallow acceptors 4H-SiC with ionization energies of ^252 and ^285 meV, respectively. The highest activation efficiency for Al and B …


Optimization Of A Multilayer Photothermal Sensor For Infrared Spectroscopy, Janine O.J. Wiggins Mar 1999

Optimization Of A Multilayer Photothermal Sensor For Infrared Spectroscopy, Janine O.J. Wiggins

Theses and Dissertations

Tri-layer thermal diffusion modeling was applied to the optimization of a multi-layer reed sensor for use in a photothermal infrared detector. The multi-layer reed sensor deflects in response to increased temperature. Deflection, of angstroms or larger, is measured using an atomic force microscope. A newly developed thermal diffusion model for three layer reeds was combined with an existing two-layer cantilever model, in order to explore the effects of length, operating frequency, and layer thickness on signal to noise ratio. Model behavior is presented, and compared to laboratory results.


Methodology For Application Design Using Information Dissemination And Active Database Technologies, Robert H. Hartz Mar 1999

Methodology For Application Design Using Information Dissemination And Active Database Technologies, Robert H. Hartz

Theses and Dissertations

In dynamic data environments, the large volume of transactions requires flexible control structures to effectively balance the flow of information between producers and consumers. Information dissemination-based systems, using both data push and pull delivery mechanisms, provide a possible scalable solution for data-intensive applications. In this research, a methodology is proposed to capture information dissemination design features in the form of active database rules to effectively control dynamic data applications. As part of this design methodology, information distribution properties are analyzed, data dissemination mechanisms are transformed into an active rule framework, and the desired reactive behavior is achieved through rule customization. …