Publications

Refine Results

(Filters Applied) Clear All

A low-loss double-tuned transformer

Published in:
IEEE Microw. Wirel. Compon. Lett., Vol. 17, No. 11, November 2007, pp. 772-774.

Summary

In this letter, we present a state-of-the-art, planar double-tuned transformer using high- , micromachined spiral inductors and integrated capacitors. This circuit provides a 4:1 impedance transformation over a 30% bandwidth centered at 4.06 GHz, with a minimum insertion loss of 1.50 dB. The fabricated circuit occupies a total area of 440 500 m2 and finds application in power amplifier and other matching applications. An accurate lumped-element circuit model and design tradeoffs are presented. We believe this is the first implementation of a planar microwave double-tuned transformer.
READ LESS

Summary

In this letter, we present a state-of-the-art, planar double-tuned transformer using high- , micromachined spiral inductors and integrated capacitors. This circuit provides a 4:1 impedance transformation over a 30% bandwidth centered at 4.06 GHz, with a minimum insertion loss of 1.50 dB. The fabricated circuit occupies a total area of...

READ MORE

Advanced trigger development

Published in:
Lincoln Laboratory Journal, Vol. 17, No. 1, November 2007, pp. 29-62.

Summary

The deadliest form of a biological attack is aerosolized agents dispersed into the atmosphere. Early detection of aerosolized biological agents is important for defense against these agents. Because of the wide range of possible attack scenarios and attack responses, there is also a wide range of detector requirements. This article focuses on real-time, single-particle, optically based bio-agent trigger detectors--the first responder to an aerosol attack--and how to engineer these detectors to achieve optimal detection performance.
READ LESS

Summary

The deadliest form of a biological attack is aerosolized agents dispersed into the atmosphere. Early detection of aerosolized biological agents is important for defense against these agents. Because of the wide range of possible attack scenarios and attack responses, there is also a wide range of detector requirements. This article...

READ MORE

The next-generation multimission U.S. surveillance radar network

Published in:
Bull. American Meteorological Society, Vol. 88, No. 11, November 2007, pp. 1739-1751.

Summary

Current U.S. weather and aircraft surveillance radar networks vary in age from 10 to more than 40 years. Ongoing sustainment and upgrade programs can keep these operating in the near to mid-term, but the responsible agencies National Weather Service (NWS), Federal Aviation Administration (FAA), and the Departments of Defense (DoD) and Homeland Security (DHS) recognize that large-scale replacement activities must begin during the next decade. The National Weather Radar Testbed (NWRT) in Norman, Oklahoma, is a multiagency project demonstrating operational weather measurements capability enhancements that could be realized using electronically steered phased-array radars as a replacement for the current Weather Surveillance Radar-1988 Doppler (WSR-88D). FAA support for the NWRT and related efforts address air traffic control (ATC) and homeland defense surveillance missions that could be simultaneously accomplished using the agile-beam capability of a phased array weather radar network. In this paper, we discuss technology issues, operational considerations, and cost trades associated with the concept of replacing current national surveillance radars with a single network of multimission phased array radars (MPAR). We begin by describing the current U.S. national weather and aircraft surveillance radar networks and their technical parameters. The airspace coverage and surveillance capabilities of these existing radars provide a starting point for defining requirements for the next-generation airspace surveillance system. We next describe a conceptual MPAR high-level system design and our initial development and testing of critical subsystems. This work, in turn, has provided a solid basis for estimating MPAR costs for comparison with existing, mechanically scanned operational surveillance radars. To assess the numbers of MPARs that would need to be procured, we present a conceptual MPAR network configuration that duplicates airspace coverage provided by current operational radars. Finally, we discuss how the improved surveillance capabilities of MPAR could be utilized to more effectively meet the weather and aircraft surveillance needs of U.S. civil and military agencies.
READ LESS

Summary

Current U.S. weather and aircraft surveillance radar networks vary in age from 10 to more than 40 years. Ongoing sustainment and upgrade programs can keep these operating in the near to mid-term, but the responsible agencies National Weather Service (NWS), Federal Aviation Administration (FAA), and the Departments of Defense (DoD)...

READ MORE

An interactive attack graph cascade and reachability display

Published in:
VizSEC 2007, Proc. of the Workshop on Visualization for Computer Security, 29 October 2007, pp. 221-236.

Summary

Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current attack graph displays are complex and difficult to relate to the underlying physical networks. We have developed a new interactive tool intended to provide a simplified and more intuitive understanding of key weaknesses discovered by attack graph analysis. Separate treemaps are used to display host groups in each subnet and hosts within each treemap are grouped based on reachability, attacker privilege level, and prerequisites. Users position subnets themselves to reflect their own intuitive grasp of network topology. Users can also single-step the attack graph to successively add edges that cascade to show how attackers progress through a network and learn what vulnerabilities or trust relationships allow critical steps. Finally, an integrated reachability display demonstrates how filtering devices affect host-to-host network reachability and influence attacker actions. This display scales to networks with thousands of hosts and many subnets. Rapid interactivity has been achieved because of an efficient C++ computation engine (a program named NetSPA) that performs attack graph and reachability computations, while a Java application manages the display and user interface.
READ LESS

Summary

Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current attack graph displays are complex and difficult to relate to the underlying physical networks. We have developed a new interactive tool intended to provide a simplified and...

READ MORE

Tuning intrusion detection to work with a two encryption key version of IPsec

Published in:
IEEE MILCOM 2007, 29-31 October 2007, pp. 3977-3983.

Summary

Network-based intrusion detection systems (NIDSs) are one component of a comprehensive network security solution. The use of IPsec, which encrypts network traffic, renders network intrusion detection virtually useless unless traffic is decrypted at network gateways. Host-based intrusion detection systems (HIDSs) can provide some of the functionality of NIDSs but with limitations. HIDSs cannot perform a network-wide analysis and can be subverted if a host is compromised. We propose an approach to intrusion detection that combines HIDS, NIDS, and a version of IPsec that encrypts the header and the body of IP packets separately ("Two-Zone IPsec"). We show that all of the network events currently detectable by the Snort NIDS on unencrypted network traffic are also detectable on encrypted network traffic using this approach. The NIDS detects network-level events that HIDSs have trouble detecting and HIDSs detect application-level events that can't be detected by the NIDS.
READ LESS

Summary

Network-based intrusion detection systems (NIDSs) are one component of a comprehensive network security solution. The use of IPsec, which encrypts network traffic, renders network intrusion detection virtually useless unless traffic is decrypted at network gateways. Host-based intrusion detection systems (HIDSs) can provide some of the functionality of NIDSs but with...

READ MORE

Sinewave analysis/synthesis based on the fan-chirp transform

Published in:
Proc. IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, WASPA, 21-24 October 2007, pp. 247-250.

Summary

There have been numerous recent strides at making sinewave analysis consistent with time-varying sinewave models. This is particularly important in high-frequency speech regions where harmonic frequency modulation (FM) can be significant. One notable approach is through the Fan Chirp transform that provides a set of FM-sinewave basis functions consistent with harmonic FM. In this paper, we develop a complete sinewave analysis/synthesis system using the Fan Chirp transform. With this system we are able to obtain more accurate sinewave frequencies and phases, thus creating more accurate frequency tracks, in contrast to a system derived from the short-time Fourier transform, particularly for high-frequency regions of large-bandwidth analysis. With synthesis, we show an improvement in segmental signal-to-noise ratio with respect to waveform matching with the largest gains during rapid pitch dynamics.
READ LESS

Summary

There have been numerous recent strides at making sinewave analysis consistent with time-varying sinewave models. This is particularly important in high-frequency speech regions where harmonic frequency modulation (FM) can be significant. One notable approach is through the Fan Chirp transform that provides a set of FM-sinewave basis functions consistent with...

READ MORE

The MIT-LL/AFRL IWSLT-2007 MT System

Published in:
Int. Workshop on Spoken Language Translation, IWSLT, 15-16 October 2007.

Summary

The MIT-LL/AFRL MT system implements a standard phrase-based, statistical translation model. It incorporates a number of extensions that improve performance for speech-based translation. During this evaluation our efforts focused on the rapid porting of our SMT system to a new language (Arabic) and novel approaches to translation from speech input. This paper discusses the architecture of the MIT-LL/AFRL MT system, improvements over our 2007 system, and experiments we ran during the IWSLT-2007 evaluation. Specifically, we focus on 1) experiments comparing the performance of confusion network decoding and direct lattice decoding techniques for speech machine translation, 2) the application of lightweight morphology for Arabic MT pre-processing and 3) improved confusion network decoding.
READ LESS

Summary

The MIT-LL/AFRL MT system implements a standard phrase-based, statistical translation model. It incorporates a number of extensions that improve performance for speech-based translation. During this evaluation our efforts focused on the rapid porting of our SMT system to a new language (Arabic) and novel approaches to translation from speech input...

READ MORE

Design of an optical photon counting array receiver system for deep-space communications

Summary

Demand for increased capacity in deep-space to Earth communications systems continues to rise as sensor data rates climb and mission requirements expand. Optical freespace laser communications systems offer the potential for operating at data rates 10 to 1000 times that of current radiofrequency systems. A key element in an optical communications system is the Earth receiver. This paper reviews the design of a distributed photon-counting receiver array composed of four meter-class telescopes, developed as a part of the Mars Laser Communications Demonstration (MLCD) project. This design offers a cost-effective and adaptable alternative approach to traditional large, single-aperture receive elements while preserving the expected improvement in data rates enabled by free-space laser communications systems. Key challenges in developing distributed receivers and details of the MLCD design are discussed.
READ LESS

Summary

Demand for increased capacity in deep-space to Earth communications systems continues to rise as sensor data rates climb and mission requirements expand. Optical freespace laser communications systems offer the potential for operating at data rates 10 to 1000 times that of current radiofrequency systems. A key element in an optical...

READ MORE

Scaling three-dimensional SOI integrated-circuit technology

Published in:
2007 IEEE Int. SOI Conf. Proc., 1-4 October 2007, pp. 87-88.

Summary

Introduction At Lincoln Laboratory, we have established a three dimensional (3D) integrated circuit (IC) technology that has been developed and demonstrated over seven designs, bonding two or three active circuit layers or tiers to form monolithically integrated 3D circuits. Key features of our 3DIC technology include fully depleted SOI (FDSOI) circuit fabrication, low-temperature wafer-scale oxide-to-oxide bonding, precision wafer-to-wafer alignment, and dense unrestricted 3D vias interconnecting stacked circuit layers, successfully demonstrated in a large area 8 x 8 mm2 high-3D-via-count 1024 x 1024 visible imager. In this paper, we describe details of our bonding protocol for 150-mm diameter wafers, leading to a 50% increase in oxide-oxide bond strength and demonstration of +--0.5 am wafer-to-wafer alignment accuracy. We have established design rules for our 3DIC technology, have quantified process factors limiting our design-rule 3D via pitch, and have demonstrated next generation 3D vias with a 2x size reduction, stacked 3D vias, a backmetal interconnect process to reduce 2D circuit exclusion zones, and buried oxide (BOX) vias to allow both electrical and thermal substrate connections. All of these improvements will allow us to continue to reduce minimum 3D via pitch and reduce 2D layout limitations, making our 3DIC technology more attractive to a broader range of applications.
READ LESS

Summary

Introduction At Lincoln Laboratory, we have established a three dimensional (3D) integrated circuit (IC) technology that has been developed and demonstrated over seven designs, bonding two or three active circuit layers or tiers to form monolithically integrated 3D circuits. Key features of our 3DIC technology include fully depleted SOI (FDSOI)...

READ MORE

An approach to verify a model for translating convective weather information to air traffic management impact

Published in:
7th AIAA Aviation Technology, Integration, and Operations (ATIO) Conf., 18-20 September 2007.

Summary

This paper describes a method to determine the accuracy of the Convective Weather Avoidance Model which predicts the likelihood that pilots will deviate away from specific areas of convective activity. Visual inspection with a reduced data set helped refine the algorithms used in the verification and offered some preliminary results of the model's accuracy in today's airspace. This model has some explanatory power in predicting regions of airspace where pilots are willing to deviate or fly through. In some instances, pilots appeared not to make an early decision to deviate around convective weather and continued on course as the region appeared more passable when they reached it. In other instances, pilots skirted the edges of regions where the model expected pilots avoid. This behavior suggests edge areas of those model regions were more passable and the convection in that region was not uniform in intensity.
READ LESS

Summary

This paper describes a method to determine the accuracy of the Convective Weather Avoidance Model which predicts the likelihood that pilots will deviate away from specific areas of convective activity. Visual inspection with a reduced data set helped refine the algorithms used in the verification and offered some preliminary results...

READ MORE