This collection on AFIT Scholar presents scholarly works of the faculty of the Air Force Institute of Technology


The Faculty Publications collection accepts scholarly works that are developed under the auspices of AFIT, and accepted for publication in a journal, or for presentation at a conference. All submissions should be approved for public release before submitting to AFIT Scholar

Secondary materials may be submitted along with an article or conference paper, for the purpose of experimental result repeatability.

To submit your work to AFIT Scholar, please click My Account, sign up if necessary, and once logged in, click submit research. For more information, please see the Policies for Faculty Publications, FAQ and Submission Guidelines.

Follow


Submissions from 2007

PDF

Graduate Digital Forensics Education at the Air Force Institute of Technology, Gilbert L. Peterson, Richard A. Raines, and Rusty O. Baldwin

PDF

Multi-Class Classification Averaging Fusion for Detecting Steganography, Benjamin M. Rodriguez, Gilbert L. Peterson, and Sos S. Agaian

PDF

Steganalysis Feature Improvement Using Expectation Maximization, Benjamin M. Rodriguez, Gilbert L. Peterson, and Sos S. Agaian

PDF

Steganography Anomaly Detection Using Simple One Class Classification, Benjamin M. Rodriguez, Gilbert L. Peterson, and Sos S. Agaian

Link

Detecting Steganography Using Multi-class Classification, Benjamin Rodriguez and Gilbert L. Peterson

Effects of Cross-Sectional Dimensions on Active Noise Control in Rectangular and Round Ducts, Jeremy M. Slagley and Steven Guffey

Effects of Cross-Sectional Partitioning on Active Noise Control in Round Ducts, Jeremy M. Slagley and Steven Guffey

Link

An Explanation of SRS Beam Cleanup in Graded-index Fibers and the Absence of SRS Beam Cleanup in Step-index Fibers, Nathan B. Terry, Thomas G. Alley, and Timothy H. Russell

PDF

Use of a Continuous Wave Raman Fiber Laser in Graded-index Multimode Fiber for SRS Beam Combination, Nathan B. Terry, Kevin T. Engel, Thomas G. Alley, and Timothy H. Russell

Link

Analysis of Tools for Detecting Rootkits and Hidden Processes, A. Todd, J. Benson, Gilbert L. Peterson, T. Franz, M. Stevens, and Richard Raines

Link

Modifications to the Method of Modal Strain Energy for Improved Estimates of Loss Factors for Damped Structures, Peter J. Torvik and Brian Runyon

PDF

Genetic Evolution of Hierarchical Behavior Structures, Brian G. Woolley and Gilbert L. Peterson

Submissions from 2006

PDF

Multiple Masks-based Pixel Comparison Steganalysis Method for Mobile Imaging, Sos S. Agaian, Gilbert L. Peterson, and Benjamin M. Rodriguez

Link

Impact Dynamics of a Solid Sphere Falling Into A Viscoelastic Micellar Fluid, Benjamin F. Akers and Andrew Belmonte

Automatic Target Recognition System Evaluation Using Decision Analysis Techniques, Christopher B. Bassham, Kenneth W. Bauer, and John O. Miller

PDF

A Multidiscipline Approach to Mitigating the Insider Threat, Jonathan W. Butts, Robert F. Mills, and Gilbert L. Peterson

Link

Fourier Transforms of Finite Chirps, Peter G. Casazza and Matthew C. Fickus

Link

Channel-select micromechanical filters using high-κ dielectrically transduced MEMS resonators, Hengky Chandrahalim, Dana Weinstein, Lih Feng Cheow, and Sunil A. Bhave

Link

MEMS filter with voltage-tunable center frequency and bandwidth, Lih Feng Cheow, Hengky Chandrahalim, and Sunil A. Bhave

Link

Critical Assessment of Microphysical Assumptions within TRMM Radiometer Rain Profile Algorithm Using Satellite, Aircraft & Surface Datasets from KWAJEX, Steven T. Fiorino and Eric A. Smith

Link

Multi-port Beam Combination and Cleanup in Large Multimode Fiber Using Stimulated Raman Scattering, Brian M. Flusche, Thomas G. Alley, Timothy H. Russell, and Won B. Roh

PDF

Contingency Planning and an Air Force Space Command Information System, Kaylin Freedman and Michael R. Grimaila

PDF

Managing the Integration of Space and Information Operations, Daniel F. Gottrich and Michael R. Grimaila

Link

Availability of Periodically Inspected Systems with Markovian Wear and Shocks, Jeffrey P. Kharoufeh, Daniel E. Finkelstein, and Dustin G. Mixon

Link

Using PLSI-U to Detect Insider Threats from Email Traffic, James S. Okolica, Gilbert L. Peterson, and Robert F. Mills