Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Air Force Institute of Technology

Discipline
Keyword
Publication Year

Articles 1 - 30 of 1959

Full-Text Articles in Physical Sciences and Mathematics

Leveraging Subject Matter Expertise To Optimize Machine Learning Techniques For Air And Space Applications, Philip Y. Cho Sep 2022

Leveraging Subject Matter Expertise To Optimize Machine Learning Techniques For Air And Space Applications, Philip Y. Cho

Theses and Dissertations

We develop new machine learning and statistical methods that are tailored for Air and Space applications through the incorporation of subject matter expertise. In particular, we focus on three separate research thrusts that each represents a different type of subject matter knowledge, modeling approach, and application. In our first thrust, we incorporate knowledge of natural phenomena to design a neural network algorithm for localizing point defects in transmission electron microscopy (TEM) images of crystalline materials. In our second research thrust, we use Bayesian feature selection and regression to analyze the relationship between fighter pilot attributes and flight mishap rates. We …


Learning Robust Radio Frequency Fingerprints Using Deep Convolutional Neural Networks, Jose A. Gutierrez Del Arroyo Sep 2022

Learning Robust Radio Frequency Fingerprints Using Deep Convolutional Neural Networks, Jose A. Gutierrez Del Arroyo

Theses and Dissertations

Radio Frequency Fingerprinting (RFF) techniques, which attribute uniquely identifiable signal distortions to emitters via Machine Learning (ML) classifiers, are limited by fingerprint variability under different operational conditions. First, this work studied the effect of frequency channel for typical RFF techniques. Performance characterization using the multi-class Matthews Correlation Coefficient (MCC) revealed that using frequency channels other than those used to train the models leads to deterioration in MCC to under 0.05 (random guess), indicating that single-channel models are inadequate for realistic operation. Second, this work presented a novel way of studying fingerprint variability through Fingerprint Extraction through Distortion Reconstruction (FEDR), a …


Modern Approaches And Theoretical Extensions To The Multivariate Kolmogorov Smirnov Test, Gonzalo Hernando Sep 2022

Modern Approaches And Theoretical Extensions To The Multivariate Kolmogorov Smirnov Test, Gonzalo Hernando

Theses and Dissertations

Most statistical tests are fully developed for univariate data, but when inference is required for multivariate data, univariate tests risk information loss and interpretability. This research 1) derives and extends the multivariate Komolgorov Smirnov test for 2 and into m-dimensions, 2) derives small sample critical values for the KS test that are not reliant on sample size simulations or correlation between variables, 3) extends large sample estimations and current KS implementations, and 4) provides sample size and power calculations in order to enable experimental design with respect to testing for differences in distributions. Through extensive simulation, we demonstrate that our …


Orthogonal Arrays And Legendre Pairs, Kristopher N. Kilpatrick Sep 2022

Orthogonal Arrays And Legendre Pairs, Kristopher N. Kilpatrick

Theses and Dissertations

Well-designed experiments greatly improve test and evaluation. Efficient experiments reduce the cost and time of running tests while improving the quality of the information obtained. Orthogonal Arrays (OAs) and Hadamard matrices are used as designed experiments to glean as much information as possible about a process with limited resources. However, constructing OAs and Hadamard matrices in general is a very difficult problem. Finding Legendre pairs (LPs) results in the construction of Hadamard matrices. This research studies the classification problem of OAs and the existence problem of LPs. In doing so, it makes two contributions to the discipline. First, it improves …


Quantum Error Detection Without Using Ancilla Qubits, Nicolas Guerrero Sep 2022

Quantum Error Detection Without Using Ancilla Qubits, Nicolas Guerrero

Theses and Dissertations

Quantum computers are beset by errors from a variety of sources. Although quantum error correction and detection codes have been developed since the 1990s, these codes require mid-circuit measurements in order to operate. In order to avoid these measurements we have developed a new error detection code that only requires state collapses at the end of the circuit, which we call no ancilla error detection (NAED). We investigate some of the mathematics behind NAED such as which codes can detect which errors. We then run NAED on three separate types of circuits: Greenberger–Horne–Zeilinger circuits, phase dependent circuits, and a quantum …


Improving Country Conflict And Peace Modeling: Datasets, Imputations, And Hierarchical Clustering, Benjamin D. Leiby Sep 2022

Improving Country Conflict And Peace Modeling: Datasets, Imputations, And Hierarchical Clustering, Benjamin D. Leiby

Theses and Dissertations

Many disparate datasets exist that provide country attributes covering political, economic, and social aspects. Unfortunately, this data often does not include all countries nor is the data complete for those countries included, as measured by the dataset’s missingness. This research addresses these dataset shortfalls in predicting country instability by considering country attributes in all aspects as well as in greater thresholds of missingness. First, a structured summary of past research is presented framed by a developed casual taxonomy and functional ontology. Additionally, a novel imputation technique for very large datasets is presented to account for moderate missingness in the expanded …


Analysis Of Graph Layout Algorithms For Use In Command And Control Network Graphs, Matthew R. Stone Sep 2022

Analysis Of Graph Layout Algorithms For Use In Command And Control Network Graphs, Matthew R. Stone

Theses and Dissertations

This research is intended to determine which styles of layout algorithm are well suited to Command and Control (C2) network graphs to replace current manual layout methods. Manual methods are time intensive and an automated layout algorithm should decrease the time spent creating network graphs. Simulations on realistic synthetically generated graphs provide information to help infer which algorithms perform better than others on this problem. Data is generated using statistics drawn from multiple real world C2 network graphs. The three algorithms tested against this data are the Spectral algorithm, the Dot algorithm, and the Fruchterman-Reingold algorithm. The results include a …


Statistical Inference On Desirability Function Optimal Points To Evaluate Multi-Objective Response Surfaces, Peter A. Calhoun Sep 2022

Statistical Inference On Desirability Function Optimal Points To Evaluate Multi-Objective Response Surfaces, Peter A. Calhoun

Theses and Dissertations

A shortfall of the Derringer and Suich (1980) desirability function is lack of inferential methods to quantify uncertainty. Most articles for addressing uncertainty usually involve robust methods, providing a point estimate that is less affected by variation. Few articles address confidence intervals or bands but not specifically for the Derringer and Suich method. This research provides two valuable contributions to the field of response surface methodology. The first contribution is evaluating the effect of correlation and plane angles on Derringer and Suich optimal solutions. The second contribution proposes and compares 8 inferential methods--both univariate and multivariate--for creating confidence intervals on …


Optimizing Optical Switching Of Non-Linear Optimizing Optical Switching Of Non-Linear Hyperbolic Metamaterials, James A. Ethridge Sep 2022

Optimizing Optical Switching Of Non-Linear Optimizing Optical Switching Of Non-Linear Hyperbolic Metamaterials, James A. Ethridge

Theses and Dissertations

Modern optical materials are engineered to be used as optical devices in specific applications, such as optical computing. For optical computing, efficient forms of a particular device, the optical switch, still have not been successfully demonstrated. This problem is addressed in this research through the use of designed optical metamaterials, specifically, hyperbolic metamaterials, which offer the possibility of large non-linear properties with a low switching intensity. One-dimensional layered hyperbolic metamaterials composed of alternating layers of metal and dielectric were used here, with ITO as the metal and SiO2 as the dielectric. The non-linear behavior of the ITO/SiO2 layered …


Enabling Rapid Chemical Analysis Of Plutonium Alloys Via Machine Learning-Enhanced Atomic Spectroscopy Techniques, Ashwin P. Rao Sep 2022

Enabling Rapid Chemical Analysis Of Plutonium Alloys Via Machine Learning-Enhanced Atomic Spectroscopy Techniques, Ashwin P. Rao

Theses and Dissertations

Analytical atomic spectroscopy methods have the potential to provide solutions for rapid, high fidelity chemical analysis of plutonium alloys. Implementing these methods with advanced analytical techniques can help reduce the chemical analysis time needed for plutonium pit production, directly enabling the 80 pit-per-year by 2030 manufacturing goal outlined in the 2018 Nuclear Posture Review. Two commercial, handheld elemental analyzers were validated for potential in situ analysis of Pu. A handheld XRF device was able to detect gallium in a Pu surrogate matrix with a detection limit of 0.002 wt% and a mean error of 8%. A handheld LIBS device was …


Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon Sep 2022

Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon

Theses and Dissertations

The threat of eavesdropping, and the challenge of recognizing and correcting for corrupted or suppressed information in communication systems is a consistent challenge. Effectively managing protection mechanisms requires an ability to accurately gauge the likelihood or severity of a threat, and adapt the security features available in a system to mitigate the threat. This research focuses on the design and development of a security-focused communication protocol at the session-layer based on a re-prioritized communication architecture model and associated metrics. From a probabilistic model that considers data leakage and data corruption as surrogates for breaches of confidentiality and integrity, a set …


Efficiency Quantification For Pulsed-Source Digital Holographic Wavefront Sensing, Steven A. Owens Sep 2022

Efficiency Quantification For Pulsed-Source Digital Holographic Wavefront Sensing, Steven A. Owens

Theses and Dissertations

The efficiencies of a digital holography (DH) system in the pulsed configuration and the off-axis image plane recording geometry are analyzed. First, the system efficiencies of an infrared-wavelength DH system in a homodyne-pulsed configuration are measured and compared to those of a visible-wavelength DH system in a homodyne-continuous-wave (CW) configuration. The total-system, excess-reference-noise, shot-noise-limit, and mixing efficiencies of the pulsed-source system were found to be consistent with those of the CW-source system. This indicated no new efficiencies were necessary to characterize pulsed-source systems when no temporal delay exists between the pulses. The consistency of efficiencies also showed infrared DH systems …


Analytic Case Study Using Unsupervised Event Detection In Multivariate Time Series Data, Jeremy M. Wightman Sep 2022

Analytic Case Study Using Unsupervised Event Detection In Multivariate Time Series Data, Jeremy M. Wightman

Theses and Dissertations

Analysis of cyber-physical systems (CPS) has emerged as a critical domain for providing US Air Force and Space Force leadership decision advantage in air, space, and cyberspace. Legacy methods have been outpaced by evolving battlespaces and global peer-level challengers. Automation provides one way to decrease the time that analysis currently takes. This thesis presents an event detection automation system (EDAS) which utilizes deep learning models, distance metrics, and static thresholding to detect events. The EDAS automation is evaluated with case study of CPS domain experts in two parts. Part 1 uses the current methods for CPS analysis with a qualitative …


Generative Methods, Meta-Learning, And Meta-Heuristics For Robust Cyber Defense, Marc W. Chale Sep 2022

Generative Methods, Meta-Learning, And Meta-Heuristics For Robust Cyber Defense, Marc W. Chale

Theses and Dissertations

Cyberspace is the digital communications network that supports the internet of battlefield things (IoBT), the model by which defense-centric sensors, computers, actuators and humans are digitally connected. A secure IoBT infrastructure facilitates real time implementation of the observe, orient, decide, act (OODA) loop across distributed subsystems. Successful hacking efforts by cyber criminals and strategic adversaries suggest that cyber systems such as the IoBT are not secure. Three lines of effort demonstrate a path towards a more robust IoBT. First, a baseline data set of enterprise cyber network traffic was collected and modelled with generative methods allowing the generation of realistic, …


Scheduling For Space Tracking And Heterogeneous Sensor Environments, Gabriel H. Greve Jun 2022

Scheduling For Space Tracking And Heterogeneous Sensor Environments, Gabriel H. Greve

Theses and Dissertations

This dissertation draws on the fields of heuristic and meta-heuristic algorithm development, resource allocation problems, and scheduling to address key Air Force problems. The world runs on many schedules. People depend upon them and expect these schedules to be accurate. A process is needed where schedules can be dynamically adjusted to allow tasks to be completed efficiently. For example, the Space Surveillance Network relies on a schedule to track objects in space. The schedule must use sensor resources to track as many high-priority satellites as possible to obtain orbit paths and to warn of collision paths. Any collisions that occurred …


Full Pattern Analysis And Comparison Of The Center Fed And Offset Fed Cassegrain Antennas With Large Focal Length To Diameter Ratios For High Power Microwave Transmission, Derek W. Mantzke Jun 2022

Full Pattern Analysis And Comparison Of The Center Fed And Offset Fed Cassegrain Antennas With Large Focal Length To Diameter Ratios For High Power Microwave Transmission, Derek W. Mantzke

Theses and Dissertations

High power microwaves (HPM) have been a topic of research since the Cold War era. This paper will present a comparison between two Cassegrain-type antennas: the axially, or center fed, and the offset fed. Specifically, the 10 GHz operating frequency will be investigated with large focal length to diameter () ratios. Beam patterns which encompass the entire radiation pattern will be included for data validation and optimization. The simulations will follow a design of experiments factorial model to ensure all possible combinations of prescribed parameters are included, including an analysis of variance (ANOVA) study to find parameter influence on the …


Evaluating A Statistical-Based Assessment Tool For Stratifying Risk Among U.S. Air Force Organizations, Tiffany A. Low Jun 2022

Evaluating A Statistical-Based Assessment Tool For Stratifying Risk Among U.S. Air Force Organizations, Tiffany A. Low

Theses and Dissertations

The Air Force Inspection System is a proponent of utilizing a risk-based sampling strategy (RBSS) for conducting inspections from major command levels down to the unit level. The strategy identifies areas deemed most important or risky by commanders and prioritizes them accordingly for an independent assessment by the Inspector General. While Air Force regulation specifies the need to use a RBSS for inspection, the implementation process is delegated to individual commands and, subsequently, wings. The 23rd Wing, the sponsor for this research, directed us to analyze a RBSS tool highlighted as an example from which to adopt for those units …


Innovative Heuristics To Improve The Latent Dirichlet Allocation Methodology For Textual Analysis And A New Modernized Topic Modeling Approach, Jamie T. Zimmerman Jun 2022

Innovative Heuristics To Improve The Latent Dirichlet Allocation Methodology For Textual Analysis And A New Modernized Topic Modeling Approach, Jamie T. Zimmerman

Theses and Dissertations

Natural Language Processing is a complex method of data mining the vast trove of documents created and made available every day. Topic modeling seeks to identify the topics within textual corpora with limited human input into the process to speed analysis. Current topic modeling techniques used in Natural Language Processing have limitations in the pre-processing steps. This dissertation studies topic modeling techniques, those limitations in the pre-processing, and introduces new algorithms to gain improvements from existing topic modeling techniques while being competitive with computational complexity. This research introduces four contributions to the field of Natural Language Processing and topic modeling. …


Methods For Focal Plane Array Resolution Estimation Using Random Laser Speckle In Non-Paraxial Geometries, Phillip J. Plummer Jun 2022

Methods For Focal Plane Array Resolution Estimation Using Random Laser Speckle In Non-Paraxial Geometries, Phillip J. Plummer

Theses and Dissertations

The infrared (IR) imaging community has a need for direct IR detector evaluation due to the continued demand for small pixel pitch detectors, the emergence of strained-layer-super-lattice devices, and the associated lateral carrier diffusion issues. Conventional laser speckle-based modulation transfer function (MTF) estimation is dependent on Fresnel propagation and a wide-sense-stationary input random process, limiting the use of this approach for lambda (wavelength)-scale IR devices. This dissertation develops two alternative methodologies for speckle-based resolution evaluation of IR focal plane arrays (FPAs). Both techniques are formulated using Rayleigh-Sommerfield electric field propagation, making them valid in the non-paraxial geometries dictated for resolution …


Securing Infiniband Networks With End-Point Encryption, Noah B. Diamond Mar 2022

Securing Infiniband Networks With End-Point Encryption, Noah B. Diamond

Theses and Dissertations

The NVIDIA-Mellanox Bluefield-2 is a 100 Gbps high-performance network interface which offers hardware offload and acceleration features that can operate directly on network traffic without routine involvement from the ARM CPU. This allows the ARM multi-core CPU to orchestrate the hardware to perform operations on both Ethernet and RDMA traffic at high rates rather than processing all the traffic directly. A testbed called TNAP was created for performance testing and a MiTM verification process called MiTMVMP is used to ensure proper network configuration. The hardware accelerators of the Bluefield-2 support a throughput of nearly 86 Gbps when using IPsec to …


A Post-Disaster Construction Portfolio Optimization Framework For Tyndall Afb Rebuild Post Hurricane Michael, Andre J. May Mar 2022

A Post-Disaster Construction Portfolio Optimization Framework For Tyndall Afb Rebuild Post Hurricane Michael, Andre J. May

Theses and Dissertations

Natural disasters such as hurricanes, earthquakes, tsunamis, and extreme flooding cause severe social and economic disruptions. Restoration of social and revenue-generating services often requires extensive reconstruction, from the facility to the campus scale. For multi-facility portfolios, decision-makers must prioritize post-disaster reconstruction activities appropriately to ensure facilities and infrastructure are restored. In addition, any expansion or new construction initiatives are ideally completed in order of decision-maker and community preference. Most post-disaster optimization and decision framework research consider a single stakeholder as guiding decisions related to a project portfolio. However, these portfolio prioritization frameworks ignore the effect of multiple stakeholders and competing …


Burn Probability And Climate Change: A Quantitative Evaluation Of The Temporal Alterations Of Wildfire, David N. Robinson Mar 2022

Burn Probability And Climate Change: A Quantitative Evaluation Of The Temporal Alterations Of Wildfire, David N. Robinson

Theses and Dissertations

The intensity of extreme weather events, specifically wildfires, along the West Coast has slowly grown overtime due to atmospheric changes caused by climate change. The Air Force, though aware of the threat that is wildfire, does not currently have a quantitative way to assess the hazard to base locations. In this paper, burn probability is quantitatively calculated through the geospatial analysis programs to provide a means of assessing wildfire vulnerability. The FlamMap fire simulator generated burn probabilities for Vandenberg Air Force Base using climate data generated by the remote automated weather station on the base to highlight how the burn …


Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris Mar 2022

Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris

Theses and Dissertations

Information leaks are a top concern to industry and government leaders. The IoT is a technology capable of sensing real-world events. A method for exfiltrating data from these devices is by covert channel. This research designs a novel IoT CTC without the need for inter-packet delays to encode data. Instead, it encodes data within preexisting network information, namely ports or addresses. Additionally, the CTC can be implemented in two different modes: Stealth and Bandwidth. Performance is measured using throughput and detectability. The Stealth methods mimic legitimate traffic captures while the Bandwidth methods forgo this approach for maximum throughput. Detection results …


Feasibility Of Fireball Trail Detection Using Ground-Based Gps Receivers, Ian R. Moffett Mar 2022

Feasibility Of Fireball Trail Detection Using Ground-Based Gps Receivers, Ian R. Moffett

Theses and Dissertations

The feasibility of using GPS data to detect fireballs is analyzed by first modeling the fireball’s trail diffusion and plasma chemistry to get a resulting ion density profile of the trail over time. The signal perturbation caused by the fireball trail is simulated for a ground receiver using an analytic solution for diffraction from a Gaussian lens. Five cases were modeled with varying initial peak ion densities and altitudes taken from fireball and reentry vehicle data. This paper shows that it is feasible to detect a fireball trail using GPS if the fireball has a sufficiently high initial ion density, …


Formulation And Characterization Of Fast-Curing Plastic Scintillators With High-Z Loading, Theodore W. Stephens Mar 2022

Formulation And Characterization Of Fast-Curing Plastic Scintillators With High-Z Loading, Theodore W. Stephens

Theses and Dissertations

Development of novel fast-curing plastic scintillators is highly advantageous due to their potential to be manufactured via 3D printing. Several formulations were developed that exhibit enhanced photon sensitivity, producing modest but discernible photopeaks at an incident gamma energy of 122 keV. The photon sensitivity is achieved via bismuth high-Z loading; however, this practice typically results in diminished light yields. Subsequent formulations, which varied the photoinitiator concentration and curing time, demonstrated successful curing with sufficient plastic hardness, reduced purple discoloration, reduced heat buildup during curing, and resulted in less cracking during the curing process, all of which were correlated with lower …


Efficiency Mapping And Determination Of Reliability, Resiliency And Vulnerability Of Atmospheric Water Generators In The United States, Erica F. Sadowski Mar 2022

Efficiency Mapping And Determination Of Reliability, Resiliency And Vulnerability Of Atmospheric Water Generators In The United States, Erica F. Sadowski

Theses and Dissertations

Atmospheric Water Generators (AWG) extract water from the air using one of three available technologies: refrigeration, sorption, and fog harvesting. A refrigeration device works like a dehumidifier and works best in conditions above 60% relative humidity. A sorption device utilizes a desiccant to extract the water vapor from the air and works in very low humidity levels. A fog harvesting device utilizes a mesh to capture the water vapor from the air and requires 100% relative humidity. In this research, I analyze two refrigeration-based devices and one sorption-based device and their efficacy in providing supplemental water supply. Due to climatological …


Identifying Characteristics For Success Of Robotic Process Automations, Charles M. Unkrich Mar 2022

Identifying Characteristics For Success Of Robotic Process Automations, Charles M. Unkrich

Theses and Dissertations

In the pursuit of digital transformation, the Air Force creates digital airmen. Digital airmen are robotic process automations designed to eliminate the repetitive high-volume low-cognitive tasks that absorb so much of our Airmen's time. The automation product results in more time to focus on tasks that machines cannot sufficiently perform data analytics and improving the Air Force's informed decision-making. This research investigates the assessment of potential automation cases to ensure that we choose viable tasks for automation and applies multivariate analysis to determine which factors indicate successful projects. The data is insufficient to provide significant insights.


Experimental Design On High-Speed Sliding Wear, Irene D. Liew Mar 2022

Experimental Design On High-Speed Sliding Wear, Irene D. Liew

Theses and Dissertations

The purpose of this research is to develop, conduct, and analyze an experimental design that characterizes wear rates of various materials sliding at high speeds along AISI 4340 steel. This work is in support of Holloman Air Force Base, which is invested in engineering a more wear-resistant rocket slipper for its high-speed test track. This research uses a design of experiments approach to systematically identify and evaluate potential slipper attributes that mitigate wear according to a heat transfer model. Final findings include recommendations of slipper materials that theoretically perform similar to or better than the baseline Vascomax®C300 maraging steel material. …


An Investigation Of Data Storage In Entity-Component Systems, Bailey V. Compton Mar 2022

An Investigation Of Data Storage In Entity-Component Systems, Bailey V. Compton

Theses and Dissertations

Entity-Component Systems (ECS) have grown vastly in application since their introduction more than 20 years ago. Providing the ability to efficiently manage data and optimize program execution, ECSs, as well as the wider field of data-oriented design, have attained popularity in the realms of modeling, simulation, and gaming. This manuscript aims to elucidate and document the storage frameworks commonly found in ECSs, as well as suggesting conceptual connections between ECSs and relational databases. This formal documentation of the in-memory storage formats of entity-component systems affords the United States Air Force, the Department of Defense, and the software engineering community a …


An Entity-Component System Based, Ieee Dis Interoperability Interface, Noah W. Scott Mar 2022

An Entity-Component System Based, Ieee Dis Interoperability Interface, Noah W. Scott

Theses and Dissertations

In practice, there are several different methods of organizing data within a given software to fulfil its function. The method known as the Entity-Component System (ECS) is a software architecture where data components define entities. These components are stored as organized lists which are operated upon by systems to inject the system's desired behavior. Data is sent across the networks to communicate between simulation nodes as Protocol Data Units (PDUs). When sending PDUs across a network protocol, each simulation represents a common understanding of the world at the desired level of detail. DIS-compliant simulations are commonly written using an Object-Oriented …