Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

Air Force Institute of Technology

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 95

Full-Text Articles in Physical Sciences and Mathematics

Cyber Power In The 21st Century, Joseph M. Elbaum Dec 2008

Cyber Power In The 21st Century, Joseph M. Elbaum

Theses and Dissertations

Historically, the United States Congress has acknowledged that a separate branch of military service is required to exert supremacy over each of the recognized Domains of Operation. Throughout the evolution of modern warfare, leading minds in military theory have come to the conclusion that due to fundamental differences inherent in the theory and tactics that must be employed in order to successfully wage war within a domain’s associated environment, a specialized force was needed - until now. With the recent inclusion of Cyberspace as an operational domain by the Department of Defense, the case should be made that it, too, …


Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire Dec 2008

Sub-Circuit Selection And Replacement Algorithms Modeled As Term Rewriting Systems, Eric D. Simonaire

Theses and Dissertations

Intent protection is a model of software obfuscation which, among other criteria, prevents an adversary from understanding the program’s function for use with contextual information. Relating this framework for obfuscation to malware detection, if a malware detector can perfectly normalize a program P and any obfuscation (variant) of the program O(P), the program is not intent protected. The problem of intent protection on programs can also be modeled as intent protection on combinational logic circuits. If a malware detector can perfectly normalize a circuit C and any obfuscation (variant) O(C) of the circuit, the circuit is not intent protected. In …


Secureqemu: Emulation-Based Software Protection Providing Encrypted Code Execution And Page Granularity Code Signing, William B. Kimball Dec 2008

Secureqemu: Emulation-Based Software Protection Providing Encrypted Code Execution And Page Granularity Code Signing, William B. Kimball

Theses and Dissertations

This research presents an original emulation-based software protection scheme providing protection from reverse code engineering (RCE) and software exploitation using encrypted code execution and page-granularity code signing, respectively. Protection mechanisms execute in trusted emulators while remaining out-of-band of untrusted systems being emulated. This protection scheme is called SecureQEMU and is based on a modified version of Quick Emulator (QEMU) [5]. RCE is a process that uncovers the internal workings of a program. It is used during vulnerability and intellectual property (IP) discovery. To protect from RCE program code may have anti-disassembly, anti-debugging, and obfuscation techniques incorporated. These techniques slow the …


Nondestructive Evaluation Of Aircraft Composites Using Terahertz Time Domain Spectroscopy, Christopher D. Stoik Dec 2008

Nondestructive Evaluation Of Aircraft Composites Using Terahertz Time Domain Spectroscopy, Christopher D. Stoik

Theses and Dissertations

Terahertz (THz) time domain spectroscopy (TDS) was assessed as a nondestructive evaluation technique for aircraft composites. Material properties of glass fiber composite were measured using both transmission and reflection configuration. The interaction of THz with a glass fiber composite was then analyzed, including the effects of scattering, absorption, and the index of refraction, as well as effective medium approximations. THz TDS, in both transmission and reflection configuration, was used to study composite damage, including voids, delaminations, mechanical damage, and heat damage. Measurement of the material properties on samples with localized heat damage showed that burning did not change the refractive …


Controlling The Transmitted Field Into A Cylindrical Cloak's Hidden Region, Jeffrey S. Mcguirk, Peter J. Collins Oct 2008

Controlling The Transmitted Field Into A Cylindrical Cloak's Hidden Region, Jeffrey S. Mcguirk, Peter J. Collins

Faculty Publications

Constitutive parameters for simplified cylindrical cloaks have been developed such that εzµθ and εzµr match those of the ideal cylindrical cloak. Although they are not perfect, simplified cylindrical cloaks have been shown to inherit many of the power-bending properties of the ideal cloak. However, energy is transmitted into simplified cloaks' hidden regions. Here, we develop a constraint equation that can be used to determine how closely field behavior within the simplified cylindrical cloak matches that of the ideal cloak. The deviation from this controlling equation can be reduced by controlling the cloak's parameter value, …


Application Of Optimization Techniques To Spectrally Modulated, Spectrally Encoded Waveform Design, Todd W. Beard Sep 2008

Application Of Optimization Techniques To Spectrally Modulated, Spectrally Encoded Waveform Design, Todd W. Beard

Theses and Dissertations

A design process is demonstrated for a coexistent scenario containing Spectrally Modulated, Spectrally Encoded (SMSE) and Direct Sequence Spread Spectrum (DSSS) signals. Coexistent SMSE-DSSS designs are addressed under both perfect and imperfect DSSS code tracking conditions using a non-coherent delay-lock loop (DLL). Under both conditions, the number of SMSE subcarriers and subcarrier spacing are the optimization variables of interest. For perfect DLL code tracking conditions, the GA and RSM optimization processes are considered independently with the objective function being end-to-end DSSS bit error rate. A hybrid GA-RSM optimization process is used under more realistic imperfect DLL code tracking conditions. In …


Closed-Loop Adaptive Optics Control In Strong Atmospheric Turbulence, Todd M. Venema Sep 2008

Closed-Loop Adaptive Optics Control In Strong Atmospheric Turbulence, Todd M. Venema

Theses and Dissertations

A self-referencing interferometer based closed-loop adaptive optics controller is developed which is designed to operate effectively under strong turbulence conditions. The aberrated optical field is modeled stochastically and then estimates of the state of the system are developed using a steady-state, fixed-gain Kalman filter. The phase of the optical field is considered the state of the system which is wrapped in a limited range of (-π, π]. This phase is unwrapped through the use of a least-squares reconstructor which has been modified to work effectively in the presence of branch points associated with strong turbulence. The conjugate of the optical …


Electronic State Distributions Of Y Ba2Cu3O7-X Laser Ablated Plumes, Patrick D. Kee Sep 2008

Electronic State Distributions Of Y Ba2Cu3O7-X Laser Ablated Plumes, Patrick D. Kee

Theses and Dissertations

The application of spectral and imagery diagnostics to YBa2Cu3O7 (YBCO) laser-ablated plumes was systematically studied to determine their effectiveness for process control. Emission signatures were collected for plumes created by ablating bulk YBCO with a pulsed laser source. A KrF (λ=248 nm) laser source operating at 4-10 J/cm2 at a 4-10 Hz pulse repetition frequency was used to ablate a bulk YBCO target at O2 background pressures ranging from 50 to 400 mTorr. Emission spectra were collected over the 500 to 860 nm bandpass at distances from the target ranging from 31.4 to …


A Study Of The Irradiance-And-Temperature-Dependence Of Mid-Wave-Infrared (Mwir)Absorption In Indium Antimonide (Insb), John M. Callahan Sep 2008

A Study Of The Irradiance-And-Temperature-Dependence Of Mid-Wave-Infrared (Mwir)Absorption In Indium Antimonide (Insb), John M. Callahan

Theses and Dissertations

This work entails further investigation of the absorption of photons in indium antimonide (InSb). Previously work at the Air Force Institute of Technology (AFIT) attributed laser blooming effects in InSb focal plane arrays (FPA’s) to the Burstein-Moss effect. The contributing effect is from a decrease in the absorption of the InSb material, such that the transmitted optical energy scatters off the integrated circuitry beneath the InSb thin film back into the optical system. To evaluate this, irradiance-dependent laser-absorption experiments were performed on thinned, InSb wafers prior to their FPA fabrication. The samples were illuminated with a focused CO2 laser at …


The Roc Curves Of Fused Independent Classification Systems, Michael B. Walsh Sep 2008

The Roc Curves Of Fused Independent Classification Systems, Michael B. Walsh

Theses and Dissertations

The need for optimal target detection arises in many different fields. Due to the complexity of many targets, it is thought that the combination of multiple classification systems, which can be tuned to several individual target attributes or features, might lead to more optimal target detection performance. The ROC curves of fused independent two-label classification systems may be generated by the mathematical combination of their ROC curves to achieve optimal classifier performance without the need to test every Boolean combination. The monotonic combination of two-label independent classification systems which assign labels to the same target types results in a lattice …


A Confidence Paradigm For Classification Systems, Nathan J. Leap Sep 2008

A Confidence Paradigm For Classification Systems, Nathan J. Leap

Theses and Dissertations

There is no universally accepted methodology to determine how much confidence one should have in a classifier output. This research proposes a framework to determine the level of confidence in an indication from a classifier system where the output is or can be transformed into a posterior probability estimate. This is a theoretical framework that attempts to unite the viewpoints of the classification system developer (or engineer) and the classification system user (or war-fighter). The paradigm is based on the assumptions that the system confidence acts like, or can be modeled as a value and that indication confidence can be …


A Secure Group Communication Architecture For Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips, Barry E. Mullins, Richard Raines, Rusty O. Baldwin Aug 2008

A Secure Group Communication Architecture For Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips, Barry E. Mullins, Richard Raines, Rusty O. Baldwin

Faculty Publications

This paper investigates the application of a secure group communication architecture to a swarm of autonomous unmanned aerial vehicles (UAVs). A multicast secure group communication architecture for the low earth orbit (LEO) satellite environment is evaluated to determine if it can be effectively adapted to a swarm of UAVs and provide secure, scalable, and efficient communications. The performance of the proposed security architecture is evaluated with two other commonly used architectures using a discrete event computer simulation developed using MATLAB. Performance is evaluated in terms of the scalability and efficiency of the group key distribution and management scheme when the …


Stimulated Brillouin Scattering Phase Conjugation In Fiber Optic Waveguides, Steven M. Massey Aug 2008

Stimulated Brillouin Scattering Phase Conjugation In Fiber Optic Waveguides, Steven M. Massey

Theses and Dissertations

The objective of this research effort was to demonstrate the path to continuous wave, coherent beam combination through stimulated Brillouin scattering phase conjugation in optical fiber. This work experimentally determined the fiber parameters necessary for phase conjugation in step-index optical fiber. Continuous wave phase conjugation using stimulated Brillouin scattering in step-index fibers was achieved for the first time with a fidelity of 0.8 and a threshold power of 16 W in a 15-m fiber with 0.13 NA. A fidelity of 0.8 was also achieved using 40 m of fiber with 0.06-NA and a threshold power of 15 W. The fidelity …


On Graph Isomorphism And The Pagerank Algorithm, Christopher J. Augeri Aug 2008

On Graph Isomorphism And The Pagerank Algorithm, Christopher J. Augeri

Theses and Dissertations

A graph is a key construct for expressing relationships among objects, such as the radio connectivity between nodes contained in an unmanned vehicle swarm. The study of such networks may include ranking nodes based on importance, for example, by applying the PageRank algorithm used in some search engines to order their query responses. The PageRank values correspond to a unique eigenvector typically computed by applying the power method, an iterative technique based on matrix multiplication. The first new result described herein is a lower bound on the execution time of the PageRank algorithm that is derived by applying standard assumptions …


Multi-Class Classification For Identifying Jpeg Steganography Embedding Methods, Benjamin M. Rodriguez Ii Aug 2008

Multi-Class Classification For Identifying Jpeg Steganography Embedding Methods, Benjamin M. Rodriguez Ii

Theses and Dissertations

Over 725 steganography tools are available over the Internet, each providing a method for covert transmission of secret messages. This research presents four steganalysis advancements that result in an algorithm that identifies the steganalysis tool used to embed a secret message in a JPEG image file. The algorithm includes feature generation, feature preprocessing, multi-class classification and classifier fusion. The first contribution is a new feature generation method which is based on the decomposition of discrete cosine transform (DCT) coefficients used in the JPEG image encoder. The generated features are better suited to identifying discrepancies in each area of the decomposed …


Stimulated Brillouin Scattering Continuous Wave Phase Conjugation In Step-Index Fiber Optics, Steven M. Massey, Justin B. Spring, Timothy H. Russell Jul 2008

Stimulated Brillouin Scattering Continuous Wave Phase Conjugation In Step-Index Fiber Optics, Steven M. Massey, Justin B. Spring, Timothy H. Russell

Faculty Publications

Continuous wave (CW) stimulated Brillouin scattering (SBS) phase conjugation in step-index optical fibers was studied experimentally and modeled as a function of fiber length. A phase conjugate fidelity over 80% was measured from SBS in a 40 m fiber using a pinhole technique. Fidelity decreases with fiber length, and a fiber with a numerical aperture (NA) of 0.06 was found to generate good phase conjugation fidelity over longer lengths than a fiber with 0.13 NA. Modeling and experiment support previous work showing the maximum interaction length which yields a high fidelity phase conjugate beam is inversely proportional to the fiber …


Scaling Ant Colony Optimization With Hierarchical Reinforcement Learning Partitioning, Erik J. Dries, Gilbert L. Peterson Jul 2008

Scaling Ant Colony Optimization With Hierarchical Reinforcement Learning Partitioning, Erik J. Dries, Gilbert L. Peterson

Faculty Publications

This paper merges hierarchical reinforcement learning (HRL) with ant colony optimization (ACO) to produce a HRL ACO algorithm capable of generating solutions for large domains. This paper describes two specific implementations of the new algorithm: the first a modification to Dietterich’s MAXQ-Q HRL algorithm, the second a hierarchical ant colony system algorithm. These implementations generate faster results, with little to no significant change in the quality of solutions for the tested problem domains. The application of ACO to the MAXQ-Q algorithm replaces the reinforcement learning, Q-learning, with the modified ant colony optimization method, Ant-Q. This algorithm, MAXQ-AntQ, converges to solutions …


Material Perturbations To Enhance Performance Of The Theile Half-Width Leaky Mode Antenna, Jason A. Girard Jun 2008

Material Perturbations To Enhance Performance Of The Theile Half-Width Leaky Mode Antenna, Jason A. Girard

Theses and Dissertations

Microstrip traveling-wave antennas, often referred to as leaky-wave antennas, have been shown to radiate when the dominant or fundamental mode is suppressed and the first higher-order mode is excited. One such microstrip variation is the Thiele Half-Width (THW) antenna, which operates from 5.9 - 8.2 GHz for this research. Increasing the bandwidth over which the THW antenna radiates is desired, as is a fundamental understanding of the propagation characteristics over this region. This dissertation seeks to vary or perturb the material and physical properties of the THW antenna, including strip-width variations and modifications of the substrate layer, to achieve these …


Characterizing Effects And Benefits Of Beam Defocus On High Energy Laser Performance Under Thermal Blooming And Turbulence Conditions For Air-To-Ground Engagements, Scott N. Long Jun 2008

Characterizing Effects And Benefits Of Beam Defocus On High Energy Laser Performance Under Thermal Blooming And Turbulence Conditions For Air-To-Ground Engagements, Scott N. Long

Theses and Dissertations

This dissertation makes contributions towards knowledge of optimizing of laser weapon performance when operating in the air-to-ground (ATG) regime in thermal blooming conditions. Wave optics modeling techniques were used to represent laser weapon performance in a high fidelity sense to allow progress to be made toward improving lower-fidelity scaling laws that can be used in systems level analysis which has need for better representations of thermal blooming. Chemical-oxygen iodine laser (COIL) based weapon systems that operate near the ground will experience thermal blooming due to atmospheric absorption if output power is sufficiently high. The thermal lens in the ATG case …


Hardware, Software And Data Analysis Techniques For Sram-Based Field Programmable Gate Array Circuits, Eugene B. Hockenberry Jun 2008

Hardware, Software And Data Analysis Techniques For Sram-Based Field Programmable Gate Array Circuits, Eugene B. Hockenberry

Theses and Dissertations

This work presents a built, tested, and demonstrated test structure that is low-cost, flexible, and re-usable for robust radiation experimentation, primarily to investigate memory, in this case SRAMs and SRAM-based FPGAs. The space environment can induce many kinds of failures due to radiation effects. These failures result in a loss of money, time, intelligence, and information. In order to evaluate technologies for potential failures, a detailed test methodology and associated structure are required. In this solution, an FPGA board was used as the controller platform, with multiple VHDL circuit controllers, data collection and reporting modules. The structure was demonstrated by …


Developing Network Situational Awareness Through Visualization Of Fused Intrusion Detection System Alerts, Serafin A. Avitia V Jun 2008

Developing Network Situational Awareness Through Visualization Of Fused Intrusion Detection System Alerts, Serafin A. Avitia V

Theses and Dissertations

With networks increasing in physical size, bandwidth, traffic volume, and malicious activity, network analysts are experiencing greater difficulty in developing network situational awareness. Traditionally, network analysts have used Intrusion Detection Systems to gain awareness but this method is outdated when analysts are unable to process the alerts at the rate they are being generated. Analysts are unwittingly placing the computer assets they are charged to protect at risk when they are unable to detect these network attacks. This research effort examines the theory, application, and results of using visualizations of fused alert data to develop network situational awareness. The fused …


A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko Jun 2008

A Secure And Efficient Communications Architecture For Global Information Grid Users Via Cooperating Space Assets, Victor P. Hubenko

Theses and Dissertations

With the Information Age in full and rapid development, users expect to have global, seamless, ubiquitous, secure, and efficient communications capable of providing access to real-time applications and collaboration. The United States Department of Defense’s (DoD) Network-Centric Enterprise Services initiative, along with the notion of pushing the “power to the edge,” aims to provide end-users with maximum situational awareness, a comprehensive view of the battlespace, all within a secure networking environment. Building from previous AFIT research efforts, this research developed a novel security framework architecture to address the lack of efficient and scalable secure multicasting in the low earth orbit …


Statistical Methods For Image Registration And Denoising, Matthew D. Sambora Jun 2008

Statistical Methods For Image Registration And Denoising, Matthew D. Sambora

Theses and Dissertations

This dissertation describes research into image processing techniques that enhance military operational and support activities. The research extends existing work on image registration by introducing a novel method that exploits local correlations to improve the performance of projection-based image registration algorithms. The dissertation also extends the bounds on image registration performance for both projection-based and full-frame image registration algorithms and extends the Barankin bound from the one-dimensional case to the problem of two-dimensional image registration. It is demonstrated that in some instances, the Cramer-Rao lower bound is an overly-optimistic predictor of image registration performance and that under some conditions, the …


An Analysis Of Botnet Vulnerabilities, Sean W. Hudson Jun 2008

An Analysis Of Botnet Vulnerabilities, Sean W. Hudson

Theses and Dissertations

Botnets are a significant threat to computer networks and data stored on networked computers. The ability to inhibit communication between servers controlling the botnet and individual hosts would be an effective countermeasure. The objective of this research was to find vulnerabilities in Unreal IRCd that could be used to shut down the server. Analysis revealed that Unreal IRCd is a very mature and stable IRC server and no significant vulnerabilities were found. While this research does not eliminate the possibility that a critical vulnerability is present in the Unreal IRCd software, none were identified during this effort.


Time-Frequency Analysis Of Terahertz Radar Signals For Rapit Heart And Breath Rate Detection, Melody L. Massar Jun 2008

Time-Frequency Analysis Of Terahertz Radar Signals For Rapit Heart And Breath Rate Detection, Melody L. Massar

Theses and Dissertations

We develop new time-frequency analytic techniques which facilitate the rapid detection of a person's heart and breath rates from the Doppler shift the movement of their body induces in a terahertz radar signal. In particular, the Doppler shift in the continuous radar return is proportional to the velocity of the person's body. Thus, a time-frequency analysis of the radar return will yield a velocity signal. This signal, in turn, may undergo a second time-frequency analysis to yield any periodic components of the velocity signal, which are often related to the heart and breath rates of the individual. One straightforward means …


Mitigating Reversing Vulnerabilities In .Net Applications Using Virtualized Software Protection, Matthew A. Zimmerman Jun 2008

Mitigating Reversing Vulnerabilities In .Net Applications Using Virtualized Software Protection, Matthew A. Zimmerman

Theses and Dissertations

Protecting intellectual property contained in application source code and preventing tampering with application binaries are both major concerns for software developers. Simply by possessing an application binary, any user is able to attempt to reverse engineer valuable information or produce unanticipated execution results through tampering. As reverse engineering tools become more prevalent, and as the knowledge required to effectively use those tools decreases, applications come under increased attack from malicious users. Emerging development tools such as Microsoft's .NET Application Framework allow diverse source code composed of multiple programming languages to be integrated into a single application binary, but the potential …


Development Of A Night Vision Goggle Heads Up Display For Paratrooper Guidance, Fernando Ontiveros Jun 2008

Development Of A Night Vision Goggle Heads Up Display For Paratrooper Guidance, Fernando Ontiveros

Theses and Dissertations

This thesis provides the proof of concept for the development and implementation of a Global Positioning System (GPS) display via Night Vision Goggles (NVG) Heads-Up Display (HUD) for paratroopers. The system has been designed for soldiers who will be able to utilize the technology in the form of a processing system worn in an ammo pouch and displayed via NVG HUD as a tunnel in the sky. The tunnel in the sky display design is essentially a series of boxes displayed within the goggle's HUD leading the paratrooper to the desired Landing Zone (LZ). The algorithm developed receives GPS and …


Integrating Trust Into The Cybercraft Initiative Via The Trust Vectors Model, Michael Stevens, Paul D. Williams, Gilbert L. Peterson, Stuart H. Kurkowski May 2008

Integrating Trust Into The Cybercraft Initiative Via The Trust Vectors Model, Michael Stevens, Paul D. Williams, Gilbert L. Peterson, Stuart H. Kurkowski

Faculty Publications

This research supports the hypothesis that the Trust Vector model can be modified to fit the CyberCraft Initiative, and that there are limits to the utility of historical data. This research proposed some modifications and expansions to the Trust Model Vector, and identified areas for future research.


Optical Phase Unwrapping In The Presence Of Branch Points, Todd M. Venema [*], Jason D. Schmidt May 2008

Optical Phase Unwrapping In The Presence Of Branch Points, Todd M. Venema [*], Jason D. Schmidt

Faculty Publications

Strong turbulence causes phase discontinuities known as branch points in an optical field. These discontinuities complicate the phase unwrapping necessary to apply phase corrections onto a deformable mirror in an adaptive optics (AO) system. This paper proposes a non-optimal but effective and implementable phase unwrapping method for optical fields containing branch points. This method first applies a least-squares (LS) unwrapper to the field which isolates and unwraps the LS component of the field. Four modulo-2π-equivalent non-LS components are created by subtracting the LS component from the original field and then restricting the result to differing ranges. 2π phase jumps known …


Analysis Of Non-Uniform Gain For Control Of A Deformable Mirror In An Adaptive-Optics System, Kevin P. Vitayaudom Mar 2008

Analysis Of Non-Uniform Gain For Control Of A Deformable Mirror In An Adaptive-Optics System, Kevin P. Vitayaudom

Theses and Dissertations

The Air Force Research Laboratory’s Sodium Guidestar Adaptive Optics for Space Situational Awareness program (NGAS) has sponsored research on spatially non-uniform gain for the servo-loop controller of an adaptive optics (AO) system. The edge subapertures of a Shack-Hartmann wavefront sensor have lower signal-to-noise ratios and are more susceptible to measurement errors than fully illuminated center subapertures. These measurement errors produce errant commands over the corresponding edge actuators and can induce instabilities over these regions in strong turbulence conditions. The objective of this research was to develop and experimentally verify the use of spatially varying gain maps on the servo-loop controller …