Publications

Refine Results

(Filters Applied) Clear All

Robust network protocols for large swarms of small UAVs

Summary

In this work, we detail a synchronized channel hopping network for autonomous swarms of small unmanned aerial vehicles (UAVs) conducting intelligence, surveillance, and reconnaissance (ISR) missions in the presence of interference and jamming. The core component of our design is Queue Length Informed Maximal Matching (QLIMM), a distributed transmission scheduling protocol that exchanges queue state information between nodes to assign subdivisions of the swarm to orthogonal hopping patterns in response to the network’s throughput demands. QLIMM efficiently allocates channel resources across large networks without relying on any centralized control or pre-planned traffic patterns, which is in the spirit of a swarming capability. However, given that the control messaging must scale up with the swarm’s size and the challenging interference environments we consider, fragility could be a concern. To observe under what conditions control fails, we test our protocol against both simulated partial-band noise jamming and background interference. For the latter, we use data collected from a small unmanned aircraft system to characterize the interference seen by a UAV in the 2.4 and 5 GHz bands in both urban and rural settings. These measurements show that the interference can be 15 dB higher at a 50-meter flight altitude when compared to observations on the ground. Using this data, we conduct extensive network simulations of QLIMM in Riverbed Modeler to show that, under moderate jamming and interference, it outperforms traditional channel access methods as well as other scheduling protocols that do not pass queue state information.
READ LESS

Summary

In this work, we detail a synchronized channel hopping network for autonomous swarms of small unmanned aerial vehicles (UAVs) conducting intelligence, surveillance, and reconnaissance (ISR) missions in the presence of interference and jamming. The core component of our design is Queue Length Informed Maximal Matching (QLIMM), a distributed transmission scheduling...

READ MORE

A hands-on middle-school robotics software program at MIT

Summary

Robotics competitions at the high school level attract a large number of students across the world. However, there is little emphasis on leveraging robotics to get middle school students excited about pursuing STEM education. In this paper, we describe a new program that targets middle school students in a local, four-week setting at the Massachusetts Institute of Technology (MIT). It aims to excite students by teaching the very basics of computer vision and robotics. The students program mini car-like robots, equipped with state-of-the-art computers, to navigate autonomously in a mock race track. We describe the hardware and software infrastructure that enables the program, the details of our curriculum, and the results of a short assessment. In addition, we describe four short programs, as well as a session where we teach high school teachers how to teach similar courses at their schools to their own students. The self-assessment indicates that the students feel more confident in programming and robotics after leaving the program, which we hope will enable them to pursue STEM education and robotics initiatives at school.
READ LESS

Summary

Robotics competitions at the high school level attract a large number of students across the world. However, there is little emphasis on leveraging robotics to get middle school students excited about pursuing STEM education. In this paper, we describe a new program that targets middle school students in a local...

READ MORE

Prototype and analytics for discovery and exploitation of threat networks on social media

Published in:
2019 European Intelligence and Security Informatics Conference, EISIC, 26-27 November 2019.

Summary

Identifying and profiling threat actors are high priority tasks for a number of governmental organizations. These threat actors may operate actively, using the Internet to promote propaganda, recruit new members, or exert command and control over their networks. Alternatively, threat actors may operate passively, demonstrating operational security awareness online while using their Internet presence to gather information they need to pose an offline physical threat. This paper presents a flexible new prototype system that allows analysts to automatically detect, monitor and characterize threat actors and their networks using publicly available information. The proposed prototype system fills a need in the intelligence community for a capability to automate manual construction and analysis of online threat networks. Leveraging graph sampling approaches, we perform targeted data collection of extremist social media accounts and their networks. We design and incorporate new algorithms for role classification and radicalization detection using insights from social science literature of extremism. Additionally, we develop and implement analytics to facilitate monitoring the dynamic social networks over time. The prototype also incorporates several novel machine learning algorithms for threat actor discovery and characterization, such as classification of user posts into discourse categories, user post summaries and gender prediction.
READ LESS

Summary

Identifying and profiling threat actors are high priority tasks for a number of governmental organizations. These threat actors may operate actively, using the Internet to promote propaganda, recruit new members, or exert command and control over their networks. Alternatively, threat actors may operate passively, demonstrating operational security awareness online while...

READ MORE

Design, simulation, and fabrication of three-dimensional microsystem components using grayscale photolithography

Summary

Grayscale lithography is a widely known but underutilized microfabrication technique for creating three-dimensional (3-D) microstructures in photoresist. One of the hurdles for its widespread use is that developing the grayscale photolithography masks can be time-consuming and costly since it often requires an iterative process, especially for complex geometries. We discuss the use of PROLITH, a lithography simulation tool, to predict 3-D photoresist profiles from grayscale mask designs. Several examples of optical microsystems and microelectromechanical systems where PROLITH was used to validate the mask design prior to implementation in the microfabrication process are presented. In all examples, PROLITH was able to accurately and quantitatively predict resist profiles, which reduced both design time and the number of trial photomasks, effectively reducing the cost of component fabrication.
READ LESS

Summary

Grayscale lithography is a widely known but underutilized microfabrication technique for creating three-dimensional (3-D) microstructures in photoresist. One of the hurdles for its widespread use is that developing the grayscale photolithography masks can be time-consuming and costly since it often requires an iterative process, especially for complex geometries. We discuss...

READ MORE

Showing Results

1-4 of 4