Publications
A low-loss double-tuned transformer
Summary
Summary
In this letter, we present a state-of-the-art, planar double-tuned transformer using high- , micromachined spiral inductors and integrated capacitors. This circuit provides a 4:1 impedance transformation over a 30% bandwidth centered at 4.06 GHz, with a minimum insertion loss of 1.50 dB. The fabricated circuit occupies a total area of...
Advanced trigger development
Summary
Summary
The deadliest form of a biological attack is aerosolized agents dispersed into the atmosphere. Early detection of aerosolized biological agents is important for defense against these agents. Because of the wide range of possible attack scenarios and attack responses, there is also a wide range of detector requirements. This article...
The next-generation multimission U.S. surveillance radar network
Summary
Summary
Current U.S. weather and aircraft surveillance radar networks vary in age from 10 to more than 40 years. Ongoing sustainment and upgrade programs can keep these operating in the near to mid-term, but the responsible agencies National Weather Service (NWS), Federal Aviation Administration (FAA), and the Departments of Defense (DoD)...
An interactive attack graph cascade and reachability display
Summary
Summary
Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current attack graph displays are complex and difficult to relate to the underlying physical networks. We have developed a new interactive tool intended to provide a simplified and...
Tuning intrusion detection to work with a two encryption key version of IPsec
Summary
Summary
Network-based intrusion detection systems (NIDSs) are one component of a comprehensive network security solution. The use of IPsec, which encrypts network traffic, renders network intrusion detection virtually useless unless traffic is decrypted at network gateways. Host-based intrusion detection systems (HIDSs) can provide some of the functionality of NIDSs but with...
Sinewave analysis/synthesis based on the fan-chirp transform
Summary
Summary
There have been numerous recent strides at making sinewave analysis consistent with time-varying sinewave models. This is particularly important in high-frequency speech regions where harmonic frequency modulation (FM) can be significant. One notable approach is through the Fan Chirp transform that provides a set of FM-sinewave basis functions consistent with...
The MIT-LL/AFRL IWSLT-2007 MT System
Summary
Summary
The MIT-LL/AFRL MT system implements a standard phrase-based, statistical translation model. It incorporates a number of extensions that improve performance for speech-based translation. During this evaluation our efforts focused on the rapid porting of our SMT system to a new language (Arabic) and novel approaches to translation from speech input...
Design of an optical photon counting array receiver system for deep-space communications
Summary
Summary
Demand for increased capacity in deep-space to Earth communications systems continues to rise as sensor data rates climb and mission requirements expand. Optical freespace laser communications systems offer the potential for operating at data rates 10 to 1000 times that of current radiofrequency systems. A key element in an optical...
Scaling three-dimensional SOI integrated-circuit technology
Summary
Summary
Introduction At Lincoln Laboratory, we have established a three dimensional (3D) integrated circuit (IC) technology that has been developed and demonstrated over seven designs, bonding two or three active circuit layers or tiers to form monolithically integrated 3D circuits. Key features of our 3DIC technology include fully depleted SOI (FDSOI)...
An approach to verify a model for translating convective weather information to air traffic management impact
Summary
Summary
This paper describes a method to determine the accuracy of the Convective Weather Avoidance Model which predicts the likelihood that pilots will deviate away from specific areas of convective activity. Visual inspection with a reduced data set helped refine the algorithms used in the verification and offered some preliminary results...