The role and use of unmanned aerial systems (UASs) by the Department of Defense has been on the rise over the past decade. The majority of these systems are being utilized in environments where the UAS's acoustic stealth is frequently of greater importance than radio frequency or visual stealth. Additionally, missions involving these types of systems tend to involve dynamic mission planning requirements rather than preplanned routing. Therefore, an acoustic model capable of providing real-time probability of detection information is desired. However, with present-day technology and existing...
The role and use of unmanned aerial systems (UASs) by the Department of Defense has been on the rise over the past decade. The majority of these syste...
Air Force Institute of Technology Penny Hill Press Inc
Terrorism in Africa has increased more than six-fold since 1997, with an increase in lethality as well. The U.S. government has spent billions of dollars to counter this increase in terrorism; however, terrorism in Africa has increased seemingly unabated. Furthermore, these methods used to counter-terrorism have been reactionary as opposed to preventative. To address the terrorism threat to a country, we must first understand which characteristics make a country vulnerable to such a threat. A confirmatory analysis bridges the inter-discipline gap between quantitative and qualitative fields...
Terrorism in Africa has increased more than six-fold since 1997, with an increase in lethality as well. The U.S. government has spent billions of doll...
Air Force Institute of Technology Penny Hill Press Inc
The Global Positioning System (GPS) has become an important asset in the lives of civilians and defense organizations. GPS uses include positioning, navigation, timing, as well as many other daily applications. With such dependence, protection against attacks on the system is paramount to continue its effectiveness. Attacks on its signal is the easiest way for enemies to degrade and harm not only everyday functioning for civilians, but a nations defense as well. Jamming interference and spoofing are the two most frequent attacks on GPS signals. Could these two attacks cause significant effect...
The Global Positioning System (GPS) has become an important asset in the lives of civilians and defense organizations. GPS uses include positioning, n...
Air Force Institute of Technology Penny Hill Press Inc
Compressed sensing is an important eld with continuing advances in theory and applications. This book provides contributions to both theory and application. Much of the theory behind compressed sensing is based on uncertainty principles, which state that a signal cannot be concentrated in both time and frequency. We develop a new discrete uncertainty principle and use it to demonstrate a fundamental limitation of the demixing problem, and to provide a fast method of detecting sparse signals. The second half of this book focuses on a speci c application of compressed sensing: hyperspectral...
Compressed sensing is an important eld with continuing advances in theory and applications. This book provides contributions to both theory and applic...
Air Force Institute of Technology Penny Hill Press Inc
In satellite constellation design, performance and cost of the system drive the design process. The Global Positioning System (GPS) constellation is currently used to provide positioning and timing worldwide. As satellite technology has improved over the years, the cost to develop and maintain the satellites has increased. Using a constellation design tool, it is possible to analyze the tradeoffs of new navigation constellation designs (Pareto fronts) that illustrate the tradeoffs between position dilution of precision (PDOP) and system cost. This book utilized Satellite Tool Kit (STK) to...
In satellite constellation design, performance and cost of the system drive the design process. The Global Positioning System (GPS) constellation is c...
Air Force Institute of Technology Penny Hill Press Inc
Intelligent agents provide simulations a means to add lifelike behavior in place of manned entities. Generally when developed, a single intelligent agent model is chosen, such as rule based, behavior trees, etc. This choice introduces restrictions into what behaviors agents can manifest, and can require significant testing in edge cases. This book presents the use of the UBF in the AFSIM environment. The UBF provides the flexibility to implement any and all intelligent agent models, allowing the developer to choose the model he/she feels best it's the experiment at hand. Furthermore, the UBF...
Intelligent agents provide simulations a means to add lifelike behavior in place of manned entities. Generally when developed, a single intelligent ag...