A computerized prediction method for propulsive induced forces and moments in transition and short takeoff and landing (STOL) flight has been developed for the Naval Air Development Center (NADC). The method developed was based on the Vought V/STOL aircraft propulsive effects computer program (VAPE). The VAPE program is capable of evaluating: (1) Effects of relative wind about an aircraft; (2) Effects of propulsive lift jet entrainment, vorticity, and flow blockage; (3) Effects of engine inlet...

Topics: DTIC Archive, Beatty,T D, VOUGHT CORP DALLAS TX, *MATHEMATICAL MODELS, *MOMENTS, *JET PROPULSION,...

A software package of major image processing functions is provided with illustrative computer results based on real imagery. (Author)

Topics: DTIC Archive, Yen,Chihsung, SOUTHEASTERN MASSACHUSETTS UNIV NORTH DARTMOUTH DEPT OF ELECTRICAL...

This note works through an example of switching between many coordinate systems using a modern matrix language that lends itself to describing arenas with multiple entities such as found in many Defence scenarios. To this end, it describes an example in planetary orbital theory, whose various Sun- and Earth-centred coordinate systems makes that theory a good test-bed for such an exposition of changing coordinates. In particular, we predict the look direction to Jupiter from a given place on...

Topics: DTIC Archive, Koks,Don, Defence Science and Technology Group Edinburgh, SA Australia, coordinate...

Vector sensor imaging presents a challenging problem in covariance estimation when allowing arbitrarily polarized sources. We propose a Stokes parameter representation of the source covariance matrix which is both qualitatively and computationally convenient. Using this formulation, we adapt the proximal gradient and expectation maximization (EM) algorithms and apply them in multiple variants to the maximum likelihood and least squares problems. We also show how EM can be cast as gradient...

Topics: DTIC Archive, Robey,Frank c, MIT Lincoln Laboratory Lexington United States, covariance, detectors,...

Modern phased-array radar systems increasingly require customized transmit patterns, implemented using only phase shifts, in order to illuminate or suppress interference from specific regions. Multiple custom patterns may be required at every beam position, requiring either precomputation of a large library of phase weights or real-time computation. Presented here is a weighted pattern-error formulation that offers efficient FFT-based calculation of both the objective and its gradient vector...

Topics: DTIC Archive, NAVAL RESEARCH LAB WASHINGTON DC, *PHASED ARRAYS, *RADAR EQUIPMENT, BEAM STEERING,...

Network connections have been shown to be correlated with structural or external attributes of the network vertices in a variety of cases. Given the prevalence of this phenomenon network scientists have developed metrics to quantify its extent. In particular, the assortativity coefficient is used to capture the level of correlation between a single-dimensional attribute (categorical or scalar) of the network nodes and the observed connections, i.e., the edges. Nevertheless, in many cases a...

Topics: DTIC Archive, Pelechrinis,Konstantinos, PITTSBURGH UNIV PA PITTSBURGH United States, social...

This report describes a polarization modulated link and the associated polarization dependent loss, including theory. The general system is discussed as well as the details for measuring and calculating polarization dependent loss in the system. A set of experiments are presented that looks at non-ideal alignment of the polarization modulation arc. In addition to the theory for polarization distortion and a compensation technique, the system is investigated when only partially compensated for...

Topics: DTIC Archive, NAVAL RESEARCH LAB WASHINGTON DC OPTICAL SCIENCES DIV, *DIRECT CURRENT, *FIBER...

Under this grant, we have developed state of the art scanning tunneling microscope (STM) instrumentation that is able to characterize spin information on the atomic scale. In particular, we have developed the capability to perform spin polarized STM reliably using a vector magnet STM system and have developed protocols for creating spin polarized STM tips for reliable measurements. We have used these tools to study ferromangnetism in atomic chains of Fe and demonstrated that spin-orbit coupling...

Topics: DTIC Archive, PRINCETON UNIV NJ, *COHERENCE, *SEMICONDUCTORS, *SPIN ORBIT COUPLING, ATOMS, ELECTRON...

A five-month study was performed on an energetic, dissipative beach on a climatologically Mediterranean coastline to explore the wind stress and buoyancy flux. An eddy covariance system was deployed in the intertidal zone resulting in 1088 hours of quality-controlled flux observations at elevations of 1, 3, and 6m on a sandy beach in Monterey, CA. The wind stress angle relative to the mean wind direction varied as much as 31 deg, representing one standard deviation, with a range of 151 deg. The...

Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *BEACHES, *BUOYANCY, *FLUX(RATE), *WIND...

The observation motivating this contribution was a perceived lack of expeditious deformable terrain models that can match in mobility analysis studies the level of fidelity delivered by today's vehicle models. Typically, the deformable terrain-tire interaction has been modeled using Finite Element Method (FEM), which continues to require prohibitively long analysis times owing to the complexity of soil behavior. Recent attempts to model deformable terrain have resorted to the use of the...

Topics: DTIC Archive, ARMY TANK AUTOMOTIVE RESEARCH DEVELOPMENT AND ENGINEERING CENTER WARREN MI, *FINITE...

The WOAV13 dataset comprises 3D global gridded climatological fields of absolute geostrophic velocity inverted from World Ocean Atlas-2013 (WOA13) temperature and salinity fields using the P-vector method. It provides a climatological velocity field that is dynamically compatible to the WOA13 (T, S) fields. The WOAV13 has the same spatial resolution and temporal variation (annual, monthly, seasonal) as WOA13 (T, S) fields, but does not cover the equatorial zone (5oS 5oN) due to the geostrophic...

Topics: DTIC Archive, Chu,P C, Naval Postgraduate School Monterey United States, Climatology, salinity,...

This report describes how to port Extremely Lightweight Intrusion Detection (ELIDe) from Linux to Android. A step-by-step guide is provided for engineers who want to develop ELIDe software for the Android operating system.

Topics: DTIC Archive, ARMY RESEARCH LAB ADELPHI MD COMPUTATIONAL AND INFORMATION SCIENCES DIRECTORATE,...

The major goals of this project include three components: First, we want to characterize the optimal number of measurements that are needed to identify any problematic component of a connected complex system. Second, we aim to provide constructive methods to generate those measurements. Finally, we would like to test these theoretical results by numerical simulations. All three goals have been essentially met. More concretely, for goal number 1, we have shown the lower bound of number of...

Topics: DTIC Archive, CORNELL UNIV ITHACA NY, *MATRICES(MATHEMATICS), *NETWORK ARCHITECTURE, *STATISTICAL...

In this dissertation, two nondestructive dual ridged waveguide (DRWG) material characterization systems are investigated. The single and clamped DRWG probe geometries were analyzed in previous work; however, that research only incorporated the dominant DRWG mode. Here, that restriction is removed and the existence of evanescent higher- order modes is considered. Theoretical analysis of the single and clamped DRWG probes is presented and discussed. The approach taken here is similar to that...

Topics: DTIC Archive, AIR FORCE INSTITUTE OF TECHNOLOGY WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF...

One of the High Temperature Superconductor (HTS) bi-Superconducting Quantum Interference Device (SQUID) Array Fractional Wavelength Baseline Determination and Design Study team s goal was to determine whether the raw simulated output from an array of bi-superconducting quantum interference devices (bi-SQUIDs) could perform direction-finding (DF) tasks such as the angle of arrival (AoA), elevation, and polarization. First, we applied the multiple signal classification (MUSIC) algorithm on...

Topics: DTIC Archive, SPACE AND NAVAL WARFARE SYSTEMS CENTER PACIFIC SAN DIEGO CA, *DIRECTION FINDING,...

We perform a comparison of mass conservation properties of the continuous (CG) and discontinuous (DG) Galerkin methods on non-conforming, dynamically adaptive meshes for two atmospheric test cases. The two methods are implemented in a unified way which allows for a direct comparison of the non-conforming edge treatment. We outline the implementation details of the non-conforming direct stiffness summation algorithm for the CG method and show that the mass conservation error is similar to the DG...

Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF APPLIED MATHEMATICS, *ATMOSPHERICS,...

This report presents the results of a power utilization and packet loss study for the Extremely Lightweight Intrusion Detection (ELIDe) algorithm on an Android-based mobile device. Our results show that the hashing and inner product operations performed by the core ELIDe program alone results in negligible additional power consumption. The bulk of the excess power consumption caused by the ELIDe program is attributable to the data capturing of the Libpcap library and the internal hardware of...

Topics: DTIC Archive, ARMY RESEARCH LAB ADELPHI MD COMPUTATIONAL AND INFORMATION SCIENCES DIRECTORATE,...

This document presents the results of the power-utilization and packet-loss study for the Extremely Lightweight Intrusion Detection (ELIDe) algorithm on an Android-based mobile device. Our results show that N-gram length has consistent power utilization using the range of 7-12 bits. However, if the hash length is higher than 13, it will have a drastic effect on the power utilization due to the resulting increase in computational time.

Topics: DTIC Archive, ARMY RESEARCH LAB ADELPHI MD COMPUTATIONAL AND INFORMATION SCIENCES DIRECTORATE,...

The broad term goal of this research program was to build a foundation for constructing probabilistic-dynamic systems from principles based on quantum as opposed to classical probability theory. So far we have applied these principles to both traditional, one-stage decision problems studied by decision researchers as well as dynamic Markov decision problems used in computer science and engineering. The more specific goal of the proposed research was to develop new applications of quantum...

Topics: DTIC Archive, INDIANA UNIV AT BLOOMINGTON, *DECISION MAKING, *QUANTUM THEORY, ALGORITHMS,...

This project has developed and analyzed new mathematical algorithms to substantially reduce the complexity of simulating and optimizing parametrically dependent systems and to support decision-making under uncertainty. Specifically, this research has advanced the state of the art in reduced order modeling based on projections and on the discrete empirical interpolation method (DEIM) for nonlinear systems, developed new adaptive sampling methods for optimization of systems with uncertain inputs,...

Topics: DTIC Archive, RICE UNIV HOUSTON TX DEPT OF COMPUTATIONAL AND APPLIED MATHEMATICS, *COMPUTER AIDED...

Analysis and processing of very large data sets, or big data, poses a significant challenge. Massive data sets are collected and studied in numerous domains, from engineering sciences to social networks, biomolecular research, commerce, and security. Extracting valuable information from big data requires innovative approaches that efficiently process large amounts of data and utilize their structure. This research project developed a paradigm for large-scale data analysis based on the discrete...

Topics: DTIC Archive, CARNEGIE-MELLON UNIV PITTSBURGH PA, *KNOWLEDGE MANAGEMENT, *SIGNAL PROCESSING,...

We carry out optimized spread-spectrum data embedding in a given digital image (or audio, or video sequence). First, the overall image/host medium is pre-processed into transform-domain small blocks from which host vectors are obtained via zig-zag scanning vectorization. Multiuser data embedding is performed in the generated host vectors. Under this data embedding model, we calculate an orthogonal set of embedding spread-spectrum signatures that achieves maximum sum signal-to-interference-plus...

Topics: DTIC Archive, STATE UNIV OF NEW YORK AT BUFFALO RESEARCH FOUNDATION, *DATA TRANSMISSION SECURITY,...

This project focuses on developing algorithms for optimization problems that have intrinsic limitations preventing the utilization of all available decision alternatives (problem variables) and/or the satisfaction of all constraints. Part of the optimization decision in these problems is the selection of which variables to use and/or which subset of constraints to satisfy. We refer to these problems as selective optimization (SO) problems. The combinatorial aspects of selection make these...

Topics: DTIC Archive, GEORGIA TECH RESEARCH CORP ATLANTA, *LINEAR PROGRAMMING, *OPTIMIZATION, ALGORITHMS,...

The linear least trimmed squares (LTS) estimator is a statistical technique for fitting a linear model to a set of points. It was proposed by Rousseeuw as a robust alternative to the classical least squares estimator. Given a set of n points in Rd, the objective is to minimize the sum of the smallest 50% squared residuals (or more generally any given fraction). There exist practical heuristics for computing the linear LTS estimator, but they provide no guarantees on the accuracy of the final...

Topics: DTIC Archive, MARYLAND UNIV COLLEGE PARK DEPT OF COMPUTER SCIENCE, *LEAST SQUARES METHOD, *LINEAR...

This research effort sought to develop basic mathematical models and algorithms to perform classification and pattern recognition on large, heterogeneous data sets. To handle the large amounts of data, the principal investigator employed sparse representations to a two - fold effect. First, the effective dimensionality of the data is greatly reduced, allowing the discovery of meaningful connections among disparate data which is essential for classification. Second, the data dimension reduction...

Topics: DTIC Archive, AIR FORCE RESEARCH LAB ROME NY INFORMATION DIRECTORATE, *CLASSIFICATION, *DATA...

The relationships and families of active duty (AD) service members have been tremendously strained by deployments and high operations' tempo. This study involves the first steps in developing a multilevel approach to preventing relationship problems that integrates universal, selective, and indicated prevention/intervention. Such an approach has tremendous empirical support for parenting problems, but no similar program exists for couple problems. We conducted two studies with U.S. Air Force...

Topics: DTIC Archive, SCHOOL OF AEROSPACE MEDICINE WRIGHT-PATTERSON AFB OH AEROMEDICAL RESEARCH DEPT,...

Sparse matrix computations arise in numerous computational science and engineering computations as well as in network analysis and databased simulations. On parallel computing platforms, however, sparse matrix computations represent a major impediment to realizing high performance. Our project aims at designing and implementing solvers for: (i) large sparse linear systems, and (ii) large sparse symmetric eigenvalue problems that achieve high performance on a single multicore node and clusters...

Topics: DTIC Archive, PURDUE UNIV LAFAYETTE IN, *DISTRIBUTED COMPUTING, *SPARSE MATRIX, ALGORITHMS,...

One of the challenges associated with defending against ballistic missiles is to discriminate the object of interest among multiple closely-spaced objects (CSOs) that travel on a ballistic trajectory. The discrimination process typically involves the identification and tracking of the object of interest. One approach that can improve discrimination performance is to employ multiple sensors. Multiple-sensor correlation and discrimination involves the integration of sensor measurements collected...

Topics: DTIC Archive, NAVAL ACADEMY ANNAPOLIS MD, *ANTIMISSILE DEFENSE SYSTEMS, *BALLISTIC TRAJECTORIES,...

A new approach for the formulation of boundary conditions for the counterflow configuration is presented. Upon discretization of the steady-state Navier-Stokes equations at the inflow boundaries, numerically algebraic equations are imposed as boundary conditions, while upon discretization of the unsteady Navier-Stokes equations at the outflow, differential boundaries result. It is demonstrated for symmetric potential flow that the resulting numerical differential-algebraic boundary conditions...

Topics: DTIC Archive, CALIFORNIA INST OF TECH PASADENA, *FLAMES, *LAMINAR FLOW, BOUNDARY LAYER,...

In this research program we developed novel analytical and computational methods to estimate the support of radiating sources and scatterers from knowledge of the corresponding far field radiation pattern or scattering amplitude. The focus was the development of methods to estimate the so-called minimum source region or scattering support of a far field. The support of any source that generates the given far field must contain this minimum source region. The results were derived in the...

Topics: DTIC Archive, NORTHEASTERN UNIV BOSTON MA, *FAR FIELD, *RADIATION PATTERNS, ALGORITHMS, AMPLITUDE,...

This workshop brought together leading experts in the new field of analysis and acquisition of high-dimensional data, including compressive sensing (CS). The meeting focused on new theory, algorithms and application. In addition to having talks from many of the leading researchers from academia, there were talks from the members of the US government and industry, on directions for this new technology, including future research directions and programs.

Topics: DTIC Archive, DUKE UNIV DURHAM NC, *MATHEMATICAL MODELS, *MAXIMUM LIKELIHOOD ESTIMATION,...

Mixed-Integer Programming has traditionally been restricted to deterministic models. Recent research has opened the door to stochastic optimization models, which are typically dynamic in nature. This project lays the foundation for stochastic dynamic mixed-integer and linear programming (SD-MIP). This project has produced several new ideas in connection with a) convexification of two-stage mixed-integer sets and b) multi-stage (including two-stage) stochastic linear programming. Together a) and...

Topics: DTIC Archive, UNIVERSITY OF SOUTHERN CALIFORNIA LOS ANGELES, *INTEGER PROGRAMMING, *LINEAR...

The IFHE project Investigation of Fully Homomorphic Encryption) originally set out to examine the security of FHE schemes, and the lattice hard problems on which they are based. This turned out to be relatively difficult, mainly due to the complexity of building software libraries which could support the advanced mathematics needed to perform experiments on modern multi-core processors. For example the NTL library is now (2015) able to support multi - threaded applications, but only if used...

Topics: DTIC Archive, BRISTOL UNIV (UNITED KINGDOM), *CRYPTOGRAPHY, ALGORITHMS, CIRCUITS, COMMUNICATIONS...

The human acetylcholinesterase (hAChE) gene was cloned into the pHLsec expression vector. The recombinant enzyme (rhAChEmD) was expressed on a large scale in adherent 293 (tau) cells. It was secreted as a monomeric species, purified by affinity chromatography, and deglycosylated with PNGase F. A crystallization screen, using the Mosquito crystallization robot, identified conditions for formation of diffraction-quality crystals in 0.025% dichloromethane/12% PEG 20,000/0.1M imidazole, pH 7.0. The...

Topics: DTIC Archive, WEIZMANN INST OF SCIENCE REHOVOT (ISRAEL), *ACETYLCHOLINESTERASE, *ANTIDOTES,...

The utility of static and adaptive mesh refinement (SMR and AMR, respectively) are examined for idealized tropical cyclone (TC) simulations in a spectral element f-plane shallow water model. The SMR simulations have varying sizes of the statically refined meshes (geometry-based) while the AMR simulations use a potential vorticity (PV) threshold to adaptively refine the mesh to the evolving TC. Numerical simulations are conducted for four cases: (i) TC-like vortex advecting in a uniform flow,...

Topics: DTIC Archive, NAVAL RESEARCH LAB MONTEREY CA MARINE METEOROLOGY DIV, *ATMOSPHERIC MOTION, *GALERKIN...

Current social network analytic methods analyze a static aggregate graph, which provides a limited view of the structure and behavior of real world social networks. Real world networks are dynamic: they evolve over time as new connections form between individuals, and networks themselves act as a substrate for the flow of information and influence. Ignoring dynamics can produce a distorted, and even wrong, view of who the important individuals are in a social network, what is the nature and...

Topics: DTIC Archive, UNIVERSITY OF SOUTHERN CALIFORNIA LOS ANGELES, *NETWORK TOPOLOGY, *ONLINE...

We consider the problem of sampling a node-weighted graph. The objective is to infer the values of all nodes from that of a minimum subset of nodes by exploiting correlations in node values. We first introduce the concept of information dominating set (IDS). A subset of nodes in a given graph is an IDS if the value of these nodes is sufficient to infer the information state of the entire graph. We focus on two fundamental algorithmic problems: (i) how to determine whether a given subset of...

Topics: DTIC Archive, CALIFORNIA UNIV DAVIS DEPT OF ELECTRICAL AND COMPUTER ENGINEERING, *COMPUTERIZED...

The primary focus of this research was to extend the work of Perry et al. [6] by developing a statistical framework that supports the detection of triangle motif-based clusters in complex networks. The specific works accomplis hed over the 3-month period are as follows: 1. Developed a tractable hypothesis testing framework to as sess, a priori, the need for triangle motif-based clustering. 2. Developed an algorithm for clustering undirected networks, where the triangle configuration was used as...

Topics: DTIC Archive, IMPERIAL COLL OF SCIENCE TECHNOLOGY AND MEDICINE LONDON (UNITED KINGDOM), *NETWORK...

During the funding period, a set of state-of-the-art software defined radio platforms are acquired, including 10 NI USRP-2932 (400MHz approximately 4. 4GHz + GPS Clock) Software Radio Kit, 3 NI USRP-2942R (400MHZ approximately 4.4GHz with KINTEX-7 FPGA), and 3 NI USRP-2952R (400MHZ approximately 4.4GHZ with GPS). These software defined radio platforms provide the much needed infrastructure support for cognitive radio research. In addition, a commercial grade NI spectrum analyzer and vector...

Topics: DTIC Archive, PRAIRIE VIEW A AND M UNIV TX, *WIRELESS COMPUTER NETWORKS, GLOBAL POSITIONING SYSTEM,...

Dismount detection, the detection of persons on the ground and outside of a vehicle, has applications in search and rescue, security, and surveillance. Spatial dismount detection methods lose e effectiveness at long ranges, and spectral dismount detection currently relies on detecting skin pixels. In scenarios where skin is not exposed, spectral textile detection is a more effective means of detecting dismounts. This thesis demonstrates the effectiveness of spectral textile detectors on both...

Topics: DTIC Archive, AIR FORCE INSTITUTE OF TECHNOLOGY WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF...

In general, battery-powered sensors in a sensor network are operable as long as they can communicate sensed data to a processing node. In this context, a sensor network has two competing objectives: (i) maximization of the network performance with respect to the probability of successful search for a specified upper bound on the probability of false alarms and (ii) maximization of the network's operable life. As both sensing and communication of data consume battery energy at the sensing nodes...

Topics: DTIC Archive, PENNSYLVANIA STATE UNIV STATE COLLEGE DEPT OF MECHANICAL AND NUCLEAR ENGINEERING,...

Monitoring surface currents by coastal high-frequency radars (HFRs) is a cost-effective observational technique with good prospects for further development. An important issue in improving the efficiency of HFR systems is the optimization of radar positions on the coastline. Besides being constrained by environmental and logistic factors, such optimization has to account for prior knowledge of local circulation and the target quantities (such as transports through certain key sections) with...

Topics: DTIC Archive, NAVAL RESEARCH LAB STENNIS DETACHMENT STENNIS SPACE CENTER MS, *BERING STRAIT,...

Measures of residual risk are developed as extension of measures of risk. They view a random variable of interest in concert with an auxiliary random vector that helps to manage, predict and mitigate the risk in the original variable. Residual risk can be exemplified as a quantification of the improved situation faced by a hedging investor compared to that of a single-asset investor, but the notion reaches further with deep connections emerging with forecasting and generalized regression. We...

Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF OPERATIONS RESEARCH, *OPTIMIZATION,...

A new approach for the formulation of boundary conditions for the counterflow configuration is presented. Upon discretization of the steady-state Navier-Stokes equations at the inflow boundaries, numerically algebraic equations are imposed as boundary conditions, while upon discretization of the unsteady Navier-Stokes equations at the outflow, differential boundaries result. It is demonstrated that the resulting numerical differential-algebraic boundary conditions are suitable to account for...

Topics: DTIC Archive, CALIFORNIA INST OF TECH PASADENA, *DIFFERENTIAL EQUATIONS, *FLAMES, *INCOMPRESSIBLE...

One of the core competencies required for autonomous mobile robotics is the ability to use sensors to perceive the environment. From this noisy sensor data, the robot must build a representation of the environment and localize itself within this representation. This process, known as simultaneous localization and mapping (SLAM) is a prerequisite for almost all higher-level autonomous behavior in mobile robotics. By associating the robot's sensory observations as it moves through the...

Topics: DTIC Archive, MICHIGAN UNIV ANN ARBOR DEPT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE,...

Language modelling is a fundamental building block of natural language processing. However in practice the size of the vocabulary limits the distributions applicable for this task: specifically one has to either resort to local optimization methods, such as those used in neural language models, or work with heavily constrained distributions. In this work, we take a step towards overcoming these difficulties. We present a method for global-likelihood optimization of a Markov random field...

Topics: DTIC Archive, NEW YORK UNIV NY, *COMPUTATIONAL LINGUISTICS, *LEARNING MACHINES, EFFICIENCY,...

The United States Army Corps of Engineers (USACE) conducts Security Risk Assessments (SRAs) at its most consequential dam projects. The Common Risk Model for Dams (CRM-D) provides a mathematically rigorous and easy-to-implement way to conduct SRAs. The CRM-D quantifies risk as the product of the probability of a successful attack, given it is attempted, and consequences. Referred to as conditional risk, this decision metric is the expected loss given a specified attack is attempted on a...

Topics: DTIC Archive, INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA, *DECISION MAKING, *RISK ANALYSIS,...

The general goal of this research effort was to design and develop a novel biologically inspired framework for flight envelope estimation and protection, which is conceptually integrated with the abnormal detection and accommodation processes and is general and comprehensive such that it can operate at all conditions, normal and abnormal, a priori known or unknown. Two major methodologies have been proposed and investigated: one based on a dendritic cell mechanism and one on structuring of the...

Topics: DTIC Archive, WEST VIRGINIA UNIV MORGANTOWN DEPT OF MECHANICAL AND AEROSPACE ENGINEERING, *ADAPTIVE...

The goal of AMULET (A MUlti-cLuE approach To image forensics) was the development of multi-clue forensics techniques that, starting from the indications provided by a pool of forensic tools focusing on specific artifacts, reach a global conclusion about the authenticity of an image. The techniques had to operate in highly nonstructured scenarios characterized by imprecise and incomplete information. The main output of the research activity has been the development of a non-conventional...

Topics: DTIC Archive, SIENA UNIV (ITALY), *FORENSIC ANALYSIS, *IMAGE PROCESSING, *LEARNING MACHINES,...

This research addresses the numerical distortion of features due to the presence of clouds in an image. The research aims to quantify the probability of a mismatch between two features in a single image, which will describe the likelihood that a visual navigation system incorrectly tracks a feature throughout an image sequence, leading to position miscalculations. First, an algorithm is developed for calculating transparency of clouds in images at the pixel level. The algorithm determines...

Topics: DTIC Archive, AIR FORCE INSTITUTE OF TECHNOLOGY WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF...