Publications

Refine Results

(Filters Applied) Clear All

Cluster detection in databases : the adaptive matched filter algorithm and implementation

Published in:
Data Mining and Knowledge Discovery, Vol. 7, No. 1, January 2003, pp. 57-79.

Summary

Matched filter techniques are a staple of modern signal and image processing. They provide a firm foundation (both theoretical and empirical) for detecting and classifying patterns in statistically described backgrounds. Application of these methods to databases has become increasingly common in certain fields (e.g. astronomy). This paper describes an algorithm (based on statistical signal processing methods), a software architecture (based on a hybrid layered approach) and a parallelization scheme (based on a client/server model) for finding clusters in large astronomical databases. The method has proved successful in identifying clusters in real and simulated data. The implementation is flexible and readily executed in parallel on a network of workstations.
READ LESS

Summary

Matched filter techniques are a staple of modern signal and image processing. They provide a firm foundation (both theoretical and empirical) for detecting and classifying patterns in statistically described backgrounds. Application of these methods to databases has become increasingly common in certain fields (e.g. astronomy). This paper describes an algorithm...

READ MORE

A constrained joint optimization approach to dynamic sensor configuration

Author:
Published in:
36th Asilomar Conf. on Signals, Systems, and Computers, Vol. 2, 3-6 November 2002, pp. 1179-1183.

Summary

Through intelligent integration of sensing and processing functions, the sensing technology of the future is evolving towards networks of configurable sensors acting in concert. Realizing the potential of collaborative real-time configurable sensor systems presents a number of challenges including the need to address a number of challenges including the need to address the massive global optimization problem resulting from incorporating a large array of control parameters. This paper proposes a systematic approach to addressing complex global optimization problems by constraining the problem to a set of key control parameters and recasting a mission-oriented goal into a tractable joint optimization formula. Using idealized but realistic physical models, a systematic methodology to approach complex multi-dimensional joint optimization problems is used to compute system performance bounds for dynamic sensor configurations.
READ LESS

Summary

Through intelligent integration of sensing and processing functions, the sensing technology of the future is evolving towards networks of configurable sensors acting in concert. Realizing the potential of collaborative real-time configurable sensor systems presents a number of challenges including the need to address a number of challenges including the need...

READ MORE

ADS-B Airborne Measurements in Frankfurt

Published in:
21st AIAA/IEEE Digital Avionics Systems Conf., 27-31 October 2002, pp. 3.A.3-1 - 3.A.3-11.

Summary

Automatic Dependent Surveillance-Broadcast (ADS-B) was the subject of airborne testing in Frankfurt, Germany in May 2000. ADS-B is a system in which latitude-longitude information is broadcast regularly by aircraft, so that receivers on the ground and in other aircraft can determine the presence and accurate locations of the transmitting aircraft. In addition to the latitude and longitude, ADS-B transmissions include altitude, velocity, aircraft address, and a number of other items of optional information. The tests in Germany were aimed at assessing the performance of Mode S Extended Squitter, which is one of several possible implementations of ADS-B. Extended Squitter uses a conventional Mode S signal format, specifically the 112-bit reply format at 1090 MHz, currently being used operationally for air-to-ground communications and air-to-air coordination in TCAS (Traffic Alert and Collision Avoidance System).
READ LESS

Summary

Automatic Dependent Surveillance-Broadcast (ADS-B) was the subject of airborne testing in Frankfurt, Germany in May 2000. ADS-B is a system in which latitude-longitude information is broadcast regularly by aircraft, so that receivers on the ground and in other aircraft can determine the presence and accurate locations of the transmitting aircraft...

READ MORE

Validation techniques for ADS-B surveillance data

Published in:
21st DASC: Proc. of the Digital Avionics Systems Conf., Vol. 1, 27-31 October 2002, pp. 3.E.2-1 - 3.E.2-9.

Summary

Surveillance information forms the basis for providing traffic separation services by Air Traffic Control. The consequences of failures in the integrity and availability of surveillance data have been highlighted in near misses and more tragically, by midair collisions. Recognizing the importance and criticality of surveillance information, the U.S. Federal Aviation Administration (FAA) in common with most other Civil Aviation Authorities (CAAs) worldwide has implemented a surveillance architecture that emphasizes the independence of surveillance sources and the availability of crosschecks on all flight critical data. Automatic Dependent Surveillance Broadcast (ADS-B) changes this approach by combining the navigation and surveillance information into a single system element. ADS-B is a system within which individual aircraft distribute position estimates from onboard navigation equipment via a common communications channel. Any ADS-B receiver may then assemble a complete surveillance picture of nearby aircraft by listening to the common channel and combining the received surveillance reports with an onboard estimate of ownership position. This approach makes use of the increasing sophistication and affordability of navigation equipment (e.g. GPS-based avionics) to improve the accuracy and update rate of surveillance information. However, collapsing the surveillance and navigation systems into a common element increases the vulnerability of the system to erroneous information, both due to intentional and unintentional causes.
READ LESS

Summary

Surveillance information forms the basis for providing traffic separation services by Air Traffic Control. The consequences of failures in the integrity and availability of surveillance data have been highlighted in near misses and more tragically, by midair collisions. Recognizing the importance and criticality of surveillance information, the U.S. Federal Aviation...

READ MORE

Analysis and comparison of separation measurement errors in single sensor and multiple radar mosiac display terminal environments

Published in:
MIT Lincoln Laboratory Report ATC-306

Summary

This paper presents an analyis to estimate and characterize the errors in the measured separation distance between aircraft that are displayed on a radar screen to a controller in a single sensor terminal environment compared to a multiple radar mosiac terminal environment. The error in measured or displayed separation is the difference between the true separation or distance between aircraft in the air and the separation displayed to a controller on a radar screen. In order to eliminate as many variables as possible and to concentrate specifically on the differences between displayed separation errors in the two environments, for the purposes of this analysis, only full operation Mode S secondary beacon surveillance characteristics are considered. A summary of the Mode S secondary radar error sources and characteristics used to model the resultant errors in measured separation between aircraft in single and multi-radar terminal environments is presented. The analysis for average separation errors show that the performance of radars in providing separation services degrades with range. The analysis also shows that when using independent radars in a mosiac display, separation errors will increase, on average, compared to the performance when providing separation with a single radar. The data presented in the section on average separation errors is summarized by plotting the standard deviation of the separation error as a function of range for the single radar case and for the independent mosiac display case. The sections on typical and specific errors in separation measurements illustrate that the separation measurement errors are highly dependent on the geometry of the aircraft and radars. Applying average results to specific geometries can lead to counter intuitive results is illustrated in an example case presented in analysis.
READ LESS

Summary

This paper presents an analyis to estimate and characterize the errors in the measured separation distance between aircraft that are displayed on a radar screen to a controller in a single sensor terminal environment compared to a multiple radar mosiac terminal environment. The error in measured or displayed separation is...

READ MORE

The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection

Published in:
Proc. 5th Int. Symp. on Recent Advances in Intrusion Detection, RAID 2002, 16-18 October 2002, pp. 307-326.

Summary

Vulnerability scanning and installing software patches for known vulnerabilities greatly affects the utility of network-based intrusion detection systems that use signatures to detect system compromises. A detailed timeline analysis of important remote-to-local vulnerabilities demonstrates (1) vulnerabilities in widely-used server software are discovered infrequently (at most 6 times a year) and (2) Software patches to prevent vulnerabilities from being exploited are available before or simultaneously with signatures. Signature-based intrusion detection systems will thus never detect successful system compromises on small secure sites when patches are installed as soon as they are available. Network intrusion detection systems may detect successful system compromises on large sites where it is impractical to eliminate all known vulnerabilities. On such sites, information from vulnerability scanning can be used to prioritize the large numbers of extraneous alerts caused by failed attacks and normal background MIC. On one class B network with roughly 10 web servers, this approach successfully filtered out 95% of all remote-to-local alerts.
READ LESS

Summary

Vulnerability scanning and installing software patches for known vulnerabilities greatly affects the utility of network-based intrusion detection systems that use signatures to detect system compromises. A detailed timeline analysis of important remote-to-local vulnerabilities demonstrates (1) vulnerabilities in widely-used server software are discovered infrequently (at most 6 times a year) and...

READ MORE

Investigation of the physical and practical limits of dense-only phase shift lithography for circuit feature definition

Published in:
J. Microlith., Microfab., Microsyst., Vol. 1, No. 3, October 2002, pp. 243-252.

Summary

The rise of low- k1 optical lithography in integrated circuit manufacturing has introduced new questions concerning the physical and practical limits of particular subwavelength resolution-enhanced imaging approaches. For a given application, trade-offs between mask complexity, design cycle time, process latitude and process throughput must be well understood. It has recently been shown that a dense-only phase shifting mask (PSM) approach can be applied to technology nodes approaching the physical limits of strong PSM with no proximity effects. Such an approach offers the benefits of reduced mask complexity and design cycle time, at the expense of decreased process throughput and limited design flexibility. In particular, dense-only methods offer k1,0.3, thus enabling 90 nm node lithography with high-numerical aperture 248 nm exposure systems. We present the results of experiments, simulations, and analysis designed to explore the trade-offs inherent in dense-only phase shift lithography. Gate and contact patterns corresponding to various fully scaled circuits are presented, and the relationship between process complexity and design latitude is discussed. Particular attention is given to approaches for obtaining gate features in both the horizontal and vertical orientation. Since semiconductor investment is dependent on cost amortization, the applicability of these methods is also considered in terms of production volume.
READ LESS

Summary

The rise of low- k1 optical lithography in integrated circuit manufacturing has introduced new questions concerning the physical and practical limits of particular subwavelength resolution-enhanced imaging approaches. For a given application, trade-offs between mask complexity, design cycle time, process latitude and process throughput must be well understood. It has recently...

READ MORE

An analysis of the impacts of wake vortex restrictions at LGA

Published in:
Project Report ATC-305, MIT Lincoln Laboratory

Summary

Wake vortex restrictions at New York's La Guardia airport cause a significant reduction in capacity when aircraft land on runway 22 and depart on runway 31. This report presents an analysis of the annual delay cost at LGA associated with the wake vortex restrictions. We find that the delay due to these restrictions exceeds 4000 hours annually, and that these restrictions cause a significant workload increase to controllers at both La Guardia and the New York TRACON. If traffic levels were to increase 10% from their February 2001 levels, the corresponding increase in delay due to the wake vortex restrictions would rise from 30 hours a day to over 400 hours a day in this runway configuration. It is also found that for a meaningful increase in passenger capacity in this runway configuration to be as demand grows, restrictions must be reduced from their current levels. If the percentage of heavy/757's doubled at LGA, there would be no increase in passenger capacity while daily delays in this runway configuration due to current wake vortex separation standards would increase by 250 hours.
READ LESS

Summary

Wake vortex restrictions at New York's La Guardia airport cause a significant reduction in capacity when aircraft land on runway 22 and depart on runway 31. This report presents an analysis of the annual delay cost at LGA associated with the wake vortex restrictions. We find that the delay due...

READ MORE

2-D processing of speech with application to pitch estimation

Published in:
7th Int. Conf. on Spoken Language Processing, ICSLP 2002, 16-20 September 2002.

Summary

In this paper, we introduce a new approach to two-dimensional (2-D) processing of the one-dimensional (1-D) speech signal in the time-frequency plane. Specifically, we obtain the shortspace 2-D Fourier transform magnitude of a narrowband spectrogram of the signal and show that this 2-D transformation maps harmonically-related signal components to a concentrated entity in the new 2-D plane. We refer to this series of operations as the "grating compression transform" (GCT), consistent with sine-wave grating patterns in the spectrogram reduced to smeared impulses. The GCT forms the basis of a speech pitch estimator that uses the radial distance to the largest peak in the GCT plane. Using an average magnitude difference between pitch-contour estimates, the GCT-based pitch estimator is shown to compare favorably to a sine-wave-based pitch estimator for all-voiced speech in additive white noise. An extension to a basis for two-speaker pitch estimation is also proposed.
READ LESS

Summary

In this paper, we introduce a new approach to two-dimensional (2-D) processing of the one-dimensional (1-D) speech signal in the time-frequency plane. Specifically, we obtain the shortspace 2-D Fourier transform magnitude of a narrowband spectrogram of the signal and show that this 2-D transformation maps harmonically-related signal components to a...

READ MORE

Approaches to language identification using Gaussian mixture models and shifted delta cepstral features

Published in:
Proc. Int. Conf. on Spoken Language Processing, INTERSPEECH, 16-20 September 2002, pp. 33-36, 82-92.

Summary

Published results indicate that automatic language identification (LID) systems that rely on multiple-language phone recognition and n-gram language modeling produce the best performance in formal LID evaluations. By contrast, Gaussian mixture model (GMM) systems, which measure acoustic characteristics, are far more efficient computationally but have tended to provide inferior levels of performance. This paper describes two GMM-based approaches to language identification that use shifted delta cepstra (SDC) feature vectors to achieve LID performance comparable to that of the best phone-based systems. The approaches include both acoustic scoring and a recently developed GMM tokenization system that is based on a variation of phonetic recognition and language modeling. System performance is evaluated on both the CallFriend and OGI corpora.
READ LESS

Summary

Published results indicate that automatic language identification (LID) systems that rely on multiple-language phone recognition and n-gram language modeling produce the best performance in formal LID evaluations. By contrast, Gaussian mixture model (GMM) systems, which measure acoustic characteristics, are far more efficient computationally but have tended to provide inferior levels...

READ MORE