Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2022

Air Force Institute of Technology

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 123

Full-Text Articles in Physical Sciences and Mathematics

Global Sporadic-E Occurrence Rate Climatology Using Gps Radio Occultation And Ionosonde Data, Travis J. Hodos, Omar A. Nava, Eugene V. Dao, Daniel J. Emmons Dec 2022

Global Sporadic-E Occurrence Rate Climatology Using Gps Radio Occultation And Ionosonde Data, Travis J. Hodos, Omar A. Nava, Eugene V. Dao, Daniel J. Emmons

Faculty Publications

An updated global climatology of blanketing sporadic E (Es) is developed from a combined data set of Global Positioning System (GPS) radio occultation (RO) and ground-based ionosonde soundings over the period of September 2006–January 2019. A total of 46 sites and 3.2 million total soundings from the Global Ionosphere Radio Observatory network in combination with 3.0 million occultations from the Constellation Observing System for Meteorology, Ionosphere, and Climate constellation are used to calculate global occurrence rates (ORs) for two blanketing frequency thresholds: all blanketing sporadic-E with no limit on intensity (all-Es) and moderate-Es with fbEs …


A Statistical Analysis Of Sporadic-E Characteristics Associated With Gnss Radio Occultation Phase And Amplitude Scintillations, Daniel J. Emmons, Dong L. Wu, Nimalan Swarnalingam Dec 2022

A Statistical Analysis Of Sporadic-E Characteristics Associated With Gnss Radio Occultation Phase And Amplitude Scintillations, Daniel J. Emmons, Dong L. Wu, Nimalan Swarnalingam

Faculty Publications

Statistical GNSS-RO measurements of phase and amplitude scintillation are analyzed at the mid-latitudes in the local summer for a 100 km altitude. These conditions are known to contain frequent sporadic-E, and the S4-σϕ trends provide insight into the statistical distributions of the sporadic-E parameters. Joint two-dimensional S4-σϕ histograms are presented, showing roughly linear trends until the S4 saturates near 0.8. To interpret the measurements and understand the sporadic-E contributions, 10,000 simulations of RO signals perturbed by sporadic-E layers are performed using length, intensity, and vertical thickness distributions from previous studies, with the assumption that the sporadic-E layer acts …


Transition-Metal Ions In Β-Ga2O3 Crystals: Identification Of Ni Acceptors, Timothy D. Gustafson, Nancy C. Giles, Brian C. Holloway, J. Jesenovec, B. L. Dutton, M. D. Mccluskey, Larry E. Halliburton Nov 2022

Transition-Metal Ions In Β-Ga2O3 Crystals: Identification Of Ni Acceptors, Timothy D. Gustafson, Nancy C. Giles, Brian C. Holloway, J. Jesenovec, B. L. Dutton, M. D. Mccluskey, Larry E. Halliburton

Faculty Publications

Excerpt: Transition-metal ions (Ni, Cu, and Zn) in β-Ga2O3 crystals form deep acceptor levels in the lower half of the bandgap. In the present study, we characterize the Ni acceptors in a Czochralski-grown crystal and find that their (0/−) level is approximately 1.40 eV above the maximum of the valence band.


Long-Distance Propagation Of 162 Mhz Shipping Information Links Associated With Sporadic E, Alex T. Chartier, Thomas R. Hanley, Daniel J. Emmons Nov 2022

Long-Distance Propagation Of 162 Mhz Shipping Information Links Associated With Sporadic E, Alex T. Chartier, Thomas R. Hanley, Daniel J. Emmons

Faculty Publications

This is a study of anomalous long-distance (>1000 km) radio propagation that was identified in United States Coast Guard monitors of automatic identification system (AIS) shipping transmissions at 162 MHz. Our results indicate this long-distance propagation is caused by dense sporadic E layers in the daytime ionosphere, which were observed by nearby ionosondes at the same time. This finding is surprising because it indicates these sporadic E layers may be far more dense than previously thought.


Optimizing Switching Of Non-Linear Properties With Hyperbolic Metamaterials, James A. Ethridge, John G. Jones, Manuel R. Ferdinandus, Michael J. Havrilla, Michael A. Marciniak Nov 2022

Optimizing Switching Of Non-Linear Properties With Hyperbolic Metamaterials, James A. Ethridge, John G. Jones, Manuel R. Ferdinandus, Michael J. Havrilla, Michael A. Marciniak

Faculty Publications

Hyperbolic metamaterials have been demonstrated to have special potential in their linear response, but the extent of their non-linear response has not been extensively modeled or measured. In this work, novel non-linear behavior of an ITO/SiO2 layered hyperbolic metamaterial is modeled and experimentally confirmed, specifically a change in the sign of the non-linear absorption with intensity. This behavior is tunable and can be achieved with a simple one-dimensional layered design. Fabrication was performed with physical vapor deposition, and measurements were conducted using the Z-scan technique. Potential applications include tunable optical switches, optical limiters, and tunable components of laser sources.


Interband Transitions And Critical Points Of Single-Crystal Thoria Compared With Urania, Christina Dugan, Lu Wang, Kai Zhang, James M. Mann, Martin M. Kimani, Wai-Ning Mei, Peter A. Dowben, James C. Petrosky Nov 2022

Interband Transitions And Critical Points Of Single-Crystal Thoria Compared With Urania, Christina Dugan, Lu Wang, Kai Zhang, James M. Mann, Martin M. Kimani, Wai-Ning Mei, Peter A. Dowben, James C. Petrosky

Faculty Publications

The interband transitions of UO2 are validated independently through cathode luminescence. A picture emerges consistent with density functional theory. While theory is generally consistent with experiment, it is evident from the comparison of UO2 and ThO2 that the choice of functional can significantly alter the bandgap and some details of the band structure, in particular at the conduction band minimum. Strictly ab initio predictions of the optical properties of the actinide compounds, based on density functional theory alone, continue to be somewhat elusive.


Generating Realistic Cyber Data For Training And Evaluating Machine Learning Classifiers For Network Intrusion Detection Systems, Marc W. Chalé, Nathaniel D. Bastian Nov 2022

Generating Realistic Cyber Data For Training And Evaluating Machine Learning Classifiers For Network Intrusion Detection Systems, Marc W. Chalé, Nathaniel D. Bastian

Faculty Publications

No abstract provided.


Oxygen Vacancies In Lib3O5 Crystals And Their Role In Nonlinear Absorption, Brian C. Holloway, Christopher A. Lenyk, Timothy D. Gustafson, Nancy C. Giles Oct 2022

Oxygen Vacancies In Lib3O5 Crystals And Their Role In Nonlinear Absorption, Brian C. Holloway, Christopher A. Lenyk, Timothy D. Gustafson, Nancy C. Giles

Faculty Publications

LiB3O5 (LBO) crystals are used to generate the second, third, and fourth harmonics of near-infrared solid-state lasers. At high power levels, the material’s performance is adversely affected by nonlinear absorption. We show that as-grown crystals contain oxygen and lithium vacancies. Transient absorption bands are formed when these intrinsic defects serve as traps for “free” electrons and holes created by x rays or by three- and four-photon absorption processes. Trapped electrons introduce a band near 300 nm and trapped holes produce bands in the 500-600 nm region. Electron paramagnetic resonance (EPR) is used to identify and characterize the …


Deep-Turbulence Phase Compensation Using Tiled Arrays, Mark F. Spencer, Terry J. Brennan Sep 2022

Deep-Turbulence Phase Compensation Using Tiled Arrays, Mark F. Spencer, Terry J. Brennan

Faculty Publications

Tiled arrays use modulo-2π phase compensation and coherent beam combination to correct for the effects of deep turbulence. As such, this paper uses wave-optics simulations to compare the closed-loop performance of tiled arrays to a branch-point-tolerant phase reconstructor known as LSPV+7 [Appl. Opt. 53, 3821 (2014) [CrossRef] ]. The wave-optics simulations make use of a point-source beacon and are setup with weak-to-strong scintillation conditions. This setup enables a trade-space exploration in support of a power-in-the-bucket comparison with LSPV+7. In turn, the results show that tiled arrays outperform LSPV+7 when transitioning from weak-to-strong scintillation conditions. These results are both …


Quantifying Dds-Cerberus Network Control Overhead, Andrew T. Park, Nathaniel R. Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry Sep 2022

Quantifying Dds-Cerberus Network Control Overhead, Andrew T. Park, Nathaniel R. Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry

Faculty Publications

Securing distributed device communication is critical because the private industry and the military depend on these resources. One area that adversaries target is the middleware, which is the medium that connects different systems. This paper evaluates a novel security layer, DDS-Cerberus (DDS-C), that protects in-transit data and improves communication efficiency on data-first distribution systems. This research contributes a distributed robotics operating system testbed and designs a multifactorial performance-based experiment to evaluate DDS-C efficiency and security by assessing total packet traffic generated in a robotics network. The performance experiment follows a 2:1 publisher to subscriber node ratio, varying the number of …


Distribution Of Dds-Cerberus Authenticated Facial Recognition Streams, Andrew T. Park, Nathaniel Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry Sep 2022

Distribution Of Dds-Cerberus Authenticated Facial Recognition Streams, Andrew T. Park, Nathaniel Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry

Faculty Publications

Successful missions in the field often rely upon communication technologies for tactics and coordination. One middleware used in securing these communication channels is Data Distribution Service (DDS) which employs a publish-subscribe model. However, researchers have found several security vulnerabilities in DDS implementations. DDS-Cerberus (DDS-C) is a security layer implemented into DDS to mitigate impersonation attacks using Kerberos authentication and ticketing. Even with the addition of DDS-C, the real-time message sending of DDS also needs to be upheld. This paper extends our previous work to analyze DDS-C’s impact on performance in a use case implementation. The use case covers an artificial …


Learning Robust Radio Frequency Fingerprints Using Deep Convolutional Neural Networks, Jose A. Gutierrez Del Arroyo Sep 2022

Learning Robust Radio Frequency Fingerprints Using Deep Convolutional Neural Networks, Jose A. Gutierrez Del Arroyo

Theses and Dissertations

Radio Frequency Fingerprinting (RFF) techniques, which attribute uniquely identifiable signal distortions to emitters via Machine Learning (ML) classifiers, are limited by fingerprint variability under different operational conditions. First, this work studied the effect of frequency channel for typical RFF techniques. Performance characterization using the multi-class Matthews Correlation Coefficient (MCC) revealed that using frequency channels other than those used to train the models leads to deterioration in MCC to under 0.05 (random guess), indicating that single-channel models are inadequate for realistic operation. Second, this work presented a novel way of studying fingerprint variability through Fingerprint Extraction through Distortion Reconstruction (FEDR), a …


Modern Approaches And Theoretical Extensions To The Multivariate Kolmogorov Smirnov Test, Gonzalo Hernando Sep 2022

Modern Approaches And Theoretical Extensions To The Multivariate Kolmogorov Smirnov Test, Gonzalo Hernando

Theses and Dissertations

Most statistical tests are fully developed for univariate data, but when inference is required for multivariate data, univariate tests risk information loss and interpretability. This research 1) derives and extends the multivariate Komolgorov Smirnov test for 2 and into m-dimensions, 2) derives small sample critical values for the KS test that are not reliant on sample size simulations or correlation between variables, 3) extends large sample estimations and current KS implementations, and 4) provides sample size and power calculations in order to enable experimental design with respect to testing for differences in distributions. Through extensive simulation, we demonstrate that our …


Orthogonal Arrays And Legendre Pairs, Kristopher N. Kilpatrick Sep 2022

Orthogonal Arrays And Legendre Pairs, Kristopher N. Kilpatrick

Theses and Dissertations

Well-designed experiments greatly improve test and evaluation. Efficient experiments reduce the cost and time of running tests while improving the quality of the information obtained. Orthogonal Arrays (OAs) and Hadamard matrices are used as designed experiments to glean as much information as possible about a process with limited resources. However, constructing OAs and Hadamard matrices in general is a very difficult problem. Finding Legendre pairs (LPs) results in the construction of Hadamard matrices. This research studies the classification problem of OAs and the existence problem of LPs. In doing so, it makes two contributions to the discipline. First, it improves …


Quantum Error Detection Without Using Ancilla Qubits, Nicolas Guerrero Sep 2022

Quantum Error Detection Without Using Ancilla Qubits, Nicolas Guerrero

Theses and Dissertations

Quantum computers are beset by errors from a variety of sources. Although quantum error correction and detection codes have been developed since the 1990s, these codes require mid-circuit measurements in order to operate. In order to avoid these measurements we have developed a new error detection code that only requires state collapses at the end of the circuit, which we call no ancilla error detection (NAED). We investigate some of the mathematics behind NAED such as which codes can detect which errors. We then run NAED on three separate types of circuits: Greenberger–Horne–Zeilinger circuits, phase dependent circuits, and a quantum …


Improving Country Conflict And Peace Modeling: Datasets, Imputations, And Hierarchical Clustering, Benjamin D. Leiby Sep 2022

Improving Country Conflict And Peace Modeling: Datasets, Imputations, And Hierarchical Clustering, Benjamin D. Leiby

Theses and Dissertations

Many disparate datasets exist that provide country attributes covering political, economic, and social aspects. Unfortunately, this data often does not include all countries nor is the data complete for those countries included, as measured by the dataset’s missingness. This research addresses these dataset shortfalls in predicting country instability by considering country attributes in all aspects as well as in greater thresholds of missingness. First, a structured summary of past research is presented framed by a developed casual taxonomy and functional ontology. Additionally, a novel imputation technique for very large datasets is presented to account for moderate missingness in the expanded …


Analysis Of Graph Layout Algorithms For Use In Command And Control Network Graphs, Matthew R. Stone Sep 2022

Analysis Of Graph Layout Algorithms For Use In Command And Control Network Graphs, Matthew R. Stone

Theses and Dissertations

This research is intended to determine which styles of layout algorithm are well suited to Command and Control (C2) network graphs to replace current manual layout methods. Manual methods are time intensive and an automated layout algorithm should decrease the time spent creating network graphs. Simulations on realistic synthetically generated graphs provide information to help infer which algorithms perform better than others on this problem. Data is generated using statistics drawn from multiple real world C2 network graphs. The three algorithms tested against this data are the Spectral algorithm, the Dot algorithm, and the Fruchterman-Reingold algorithm. The results include a …


Statistical Inference On Desirability Function Optimal Points To Evaluate Multi-Objective Response Surfaces, Peter A. Calhoun Sep 2022

Statistical Inference On Desirability Function Optimal Points To Evaluate Multi-Objective Response Surfaces, Peter A. Calhoun

Theses and Dissertations

A shortfall of the Derringer and Suich (1980) desirability function is lack of inferential methods to quantify uncertainty. Most articles for addressing uncertainty usually involve robust methods, providing a point estimate that is less affected by variation. Few articles address confidence intervals or bands but not specifically for the Derringer and Suich method. This research provides two valuable contributions to the field of response surface methodology. The first contribution is evaluating the effect of correlation and plane angles on Derringer and Suich optimal solutions. The second contribution proposes and compares 8 inferential methods--both univariate and multivariate--for creating confidence intervals on …


Optimizing Optical Switching Of Non-Linear Optimizing Optical Switching Of Non-Linear Hyperbolic Metamaterials, James A. Ethridge Sep 2022

Optimizing Optical Switching Of Non-Linear Optimizing Optical Switching Of Non-Linear Hyperbolic Metamaterials, James A. Ethridge

Theses and Dissertations

Modern optical materials are engineered to be used as optical devices in specific applications, such as optical computing. For optical computing, efficient forms of a particular device, the optical switch, still have not been successfully demonstrated. This problem is addressed in this research through the use of designed optical metamaterials, specifically, hyperbolic metamaterials, which offer the possibility of large non-linear properties with a low switching intensity. One-dimensional layered hyperbolic metamaterials composed of alternating layers of metal and dielectric were used here, with ITO as the metal and SiO2 as the dielectric. The non-linear behavior of the ITO/SiO2 layered …


Enabling Rapid Chemical Analysis Of Plutonium Alloys Via Machine Learning-Enhanced Atomic Spectroscopy Techniques, Ashwin P. Rao Sep 2022

Enabling Rapid Chemical Analysis Of Plutonium Alloys Via Machine Learning-Enhanced Atomic Spectroscopy Techniques, Ashwin P. Rao

Theses and Dissertations

Analytical atomic spectroscopy methods have the potential to provide solutions for rapid, high fidelity chemical analysis of plutonium alloys. Implementing these methods with advanced analytical techniques can help reduce the chemical analysis time needed for plutonium pit production, directly enabling the 80 pit-per-year by 2030 manufacturing goal outlined in the 2018 Nuclear Posture Review. Two commercial, handheld elemental analyzers were validated for potential in situ analysis of Pu. A handheld XRF device was able to detect gallium in a Pu surrogate matrix with a detection limit of 0.002 wt% and a mean error of 8%. A handheld LIBS device was …


Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon Sep 2022

Development Of A Security-Focused Multi-Channel Communication Protocol And Associated Quality Of Secure Service (Qoss) Metrics, Paul M. Simon

Theses and Dissertations

The threat of eavesdropping, and the challenge of recognizing and correcting for corrupted or suppressed information in communication systems is a consistent challenge. Effectively managing protection mechanisms requires an ability to accurately gauge the likelihood or severity of a threat, and adapt the security features available in a system to mitigate the threat. This research focuses on the design and development of a security-focused communication protocol at the session-layer based on a re-prioritized communication architecture model and associated metrics. From a probabilistic model that considers data leakage and data corruption as surrogates for breaches of confidentiality and integrity, a set …


Efficiency Quantification For Pulsed-Source Digital Holographic Wavefront Sensing, Steven A. Owens Sep 2022

Efficiency Quantification For Pulsed-Source Digital Holographic Wavefront Sensing, Steven A. Owens

Theses and Dissertations

The efficiencies of a digital holography (DH) system in the pulsed configuration and the off-axis image plane recording geometry are analyzed. First, the system efficiencies of an infrared-wavelength DH system in a homodyne-pulsed configuration are measured and compared to those of a visible-wavelength DH system in a homodyne-continuous-wave (CW) configuration. The total-system, excess-reference-noise, shot-noise-limit, and mixing efficiencies of the pulsed-source system were found to be consistent with those of the CW-source system. This indicated no new efficiencies were necessary to characterize pulsed-source systems when no temporal delay exists between the pulses. The consistency of efficiencies also showed infrared DH systems …


Analytic Case Study Using Unsupervised Event Detection In Multivariate Time Series Data, Jeremy M. Wightman Sep 2022

Analytic Case Study Using Unsupervised Event Detection In Multivariate Time Series Data, Jeremy M. Wightman

Theses and Dissertations

Analysis of cyber-physical systems (CPS) has emerged as a critical domain for providing US Air Force and Space Force leadership decision advantage in air, space, and cyberspace. Legacy methods have been outpaced by evolving battlespaces and global peer-level challengers. Automation provides one way to decrease the time that analysis currently takes. This thesis presents an event detection automation system (EDAS) which utilizes deep learning models, distance metrics, and static thresholding to detect events. The EDAS automation is evaluated with case study of CPS domain experts in two parts. Part 1 uses the current methods for CPS analysis with a qualitative …


Generative Methods, Meta-Learning, And Meta-Heuristics For Robust Cyber Defense, Marc W. Chale Sep 2022

Generative Methods, Meta-Learning, And Meta-Heuristics For Robust Cyber Defense, Marc W. Chale

Theses and Dissertations

Cyberspace is the digital communications network that supports the internet of battlefield things (IoBT), the model by which defense-centric sensors, computers, actuators and humans are digitally connected. A secure IoBT infrastructure facilitates real time implementation of the observe, orient, decide, act (OODA) loop across distributed subsystems. Successful hacking efforts by cyber criminals and strategic adversaries suggest that cyber systems such as the IoBT are not secure. Three lines of effort demonstrate a path towards a more robust IoBT. First, a baseline data set of enterprise cyber network traffic was collected and modelled with generative methods allowing the generation of realistic, …


Leveraging Subject Matter Expertise To Optimize Machine Learning Techniques For Air And Space Applications, Philip Y. Cho Sep 2022

Leveraging Subject Matter Expertise To Optimize Machine Learning Techniques For Air And Space Applications, Philip Y. Cho

Theses and Dissertations

We develop new machine learning and statistical methods that are tailored for Air and Space applications through the incorporation of subject matter expertise. In particular, we focus on three separate research thrusts that each represents a different type of subject matter knowledge, modeling approach, and application. In our first thrust, we incorporate knowledge of natural phenomena to design a neural network algorithm for localizing point defects in transmission electron microscopy (TEM) images of crystalline materials. In our second research thrust, we use Bayesian feature selection and regression to analyze the relationship between fighter pilot attributes and flight mishap rates. We …


Improving Data-Driven Infrastructure Degradation Forecast Skill With Stepwise Asset Condition Prediction Models, Kurt R. Lamm, Justin D. Delorit, Michael N. Grussing, Steven J. Schuldt Aug 2022

Improving Data-Driven Infrastructure Degradation Forecast Skill With Stepwise Asset Condition Prediction Models, Kurt R. Lamm, Justin D. Delorit, Michael N. Grussing, Steven J. Schuldt

Faculty Publications

Organizations with large facility and infrastructure portfolios have used asset management databases for over ten years to collect and standardize asset condition data. Decision makers use these data to predict asset degradation and expected service life, enabling prioritized maintenance, repair, and renovation actions that reduce asset life-cycle costs and achieve organizational objectives. However, these asset condition forecasts are calculated using standardized, self-correcting distribution models that rely on poorly-fit, continuous functions. This research presents four stepwise asset condition forecast models that utilize historical asset inspection data to improve prediction accuracy: (1) Slope, (2) Weighted Slope, (3) Condition-Intelligent Weighted Slope, and (4) …


Artificial Neural Networks And Gradient Boosted Machines Used For Regression To Evaluate Gasification Processes: A Review, Owen Sedej, Eric Mbonimpa, Trevor Sleight, Jeremy M. Slagley Aug 2022

Artificial Neural Networks And Gradient Boosted Machines Used For Regression To Evaluate Gasification Processes: A Review, Owen Sedej, Eric Mbonimpa, Trevor Sleight, Jeremy M. Slagley

Faculty Publications

Waste-to-Energy technologies have the potential to dramatically improve both the natural and human environment. One type of waste-to-energy technology that has been successful is gasification. There are numerous types of gasification processes and in order to drive understanding and the optimization of these systems, traditional approaches like computational fluid dynamics software have been utilized to model these systems. The modern advent of machine learning models has allowed for accurate and computationally efficient predictions for gasification systems that are informed by numerous experimental and numerical solutions. Two types of machine learning models that have been widely used to solve for quantitative …


Active 2d-Dna Fingerprinting Of Wirelesshart Adapters To Ensure Operational Integrity In Industrial Systems, Willie H. Mims, Michael A. Temple, Robert F. Mills Jun 2022

Active 2d-Dna Fingerprinting Of Wirelesshart Adapters To Ensure Operational Integrity In Industrial Systems, Willie H. Mims, Michael A. Temple, Robert F. Mills

Faculty Publications

The need for reliable communications in industrial systems becomes more evident as industries strive to increase reliance on automation. This trend has sustained the adoption of WirelessHART communications as a key enabling technology and its operational integrity must be ensured. This paper focuses on demonstrating pre-deployment counterfeit detection using active 2D Distinct Native Attribute (2D-DNA) fingerprinting. Counterfeit detection is demonstrated using experimentally collected signals from eight commercial WirelessHART adapters. Adapter fingerprints are used to train 56 Multiple Discriminant Analysis (MDA) models with each representing five authentic network devices. The three non-modeled devices are introduced as counterfeits and a total of …


Forecasting Country Conflict Using Statistical Learning Methods, Sarah Neumann, Darryl K. Ahner, Raymond R. Hill Jun 2022

Forecasting Country Conflict Using Statistical Learning Methods, Sarah Neumann, Darryl K. Ahner, Raymond R. Hill

Faculty Publications

Purpose — This paper aims to examine whether changing the clustering of countries within a United States Combatant Command (COCOM) area of responsibility promotes improved forecasting of conflict. Design/methodology/approach — In this paper statistical learning methods are used to create new country clusters that are then used in a comparative analysis of model-based conflict prediction. Findings — In this study a reorganization of the countries assigned to specific areas of responsibility are shown to provide improvements in the ability of models to predict conflict. Research limitations/implications — The study is based on actual historical data and is purely data driven. …


Pilot Development: An Empirical Mixed-Method Analysis, Jonathan Slottje, Jason Anderson, John M. Dickens, Adam D. Reiman Jun 2022

Pilot Development: An Empirical Mixed-Method Analysis, Jonathan Slottje, Jason Anderson, John M. Dickens, Adam D. Reiman

Faculty Publications

Purpose — Pilot upgrade training is critical to aircraft and passenger safety. This study aims to identify variances in the US Air Force C-130J pilot upgrade training based on geographic location and provide a model to enhance policy that will impact future pilot training efforts that lower cost and increase operator quality and proficiency.
Design/methodology/approach This research employed a mixed-method approach. First, the authors collected data and analyzed 90 C-130J pilots' aviation records and then contextualized this analysis with interviews of experts. Finally, the authors present a modified version of Six Sigma's define–measure–analyze–improve–control (DMAIC) that identifies and reduces the …