Publications

Refine Results

(Filters Applied) Clear All

Operational Experience with TDWR/LLWAS-NE Integration at the Dallas, TX International Airport (DFW)

Published in:
10th Conf. on Aviation, Range and Aerospace Meteorology, 13-16 May 2002, pp. 391-394.

Summary

At nine major airports, both the Terminal Doppler Weather Radar (TDWR) and Network Extension of the Low-Level Wind shear Advisory System (LLWAS-NE) data will be used to detect and warn Air Traffic Control (ATC) of dangerous wind shear conditions. The integration of wind shear alerts from the two systems is currently being carried out by the TDWR software and will be accomplished by Integrated Terminal Weather System (ITWS) software when the ITWS is installed at these airports. Previous studies of the performance of the TDWR/LLWAS-NE integrated system were carried out at Denver, CO, Dallas, and Orlando, FL. Additionally, there have been recent concerns about false alarms with the LLWAS-NE. In this study, we examine the performance of the integrated system at Dallas-Ft. Worth International Airport (DFW) over a 6-month period in 2000 with particular emphasis on integrated wind shear alerts produced during a number of cases where the TDWR had difficulty making detections due to: 1. radially aligned gust fronts over DFW, 2. radially aligned divergent features, divergence behind gust fronts and divergence embedded within gravity waves, and/or 3. TDWR radome attenuation or excessively aggressive clutter residue editing. DFW is a particularly good airport for such a study because there is an additional TDWR [for Dallas Love airport (DAL)] located in close proximity to DFW and situated in such a way that it provides a very good viewing angle for wind shear events that may not be well characterized by the DFW TDWR radial velocity data. DFW is also an ITWS demonstration system test site with trained meteorologists who review the wind shear detection performance after all convective weather events at DFW.
READ LESS

Summary

At nine major airports, both the Terminal Doppler Weather Radar (TDWR) and Network Extension of the Low-Level Wind shear Advisory System (LLWAS-NE) data will be used to detect and warn Air Traffic Control (ATC) of dangerous wind shear conditions. The integration of wind shear alerts from the two systems is...

READ MORE

The Corridor Integrated Weather System (CIWS)

Published in:
10th Conf. on Aviation, Range, and Aerospace Meteorology, 13-16 May 2002, pp. 210-215.

Summary

The FAA Operational Evolution Plan (OEP) identified en route severe weather as one of the four problems that must be addressed if the US. air transportation system is to alleviate the growing gap between the demand for air transportation and the ability of the system to meet that demand. Convective weather in highly congested airspace is of particular concern because many of the delays arise from these corridors. For example, rerouting aircraft around areas of actual or predicted weather can be very difficult when one must be concerned about controller overload in the weather free sectors. When major terminals also underlie the en route airspace, convective weather has even greater adverse impacts. The principal thrust to date in addressing this problem has been "strategic" collaborative routing as exemplified by the "Spring 2000" and "Spring 2001" initiatives. However, success of the strategic approach embodied in these initiatives depends on the ability to accurately forecast convective weather impacts two or more hours in advance. Limitations in the forecast accuracy necessitate development of a companion "tactical" convective weather capability. In this paper, we describe a major new FAA initiative, the Corridor Integrated Weather System (CIWS). The objective of this project, which is currently in the concept exploration phase, is to improve tactical convective weather decision support for congested en route airspace. A real time operational demonstration, which was begun in July 2001 in the Great Lakes corridor, will be extended to the Northeast corridor in 2002. In the sections that follow, we describe the operational needs that motivated the ClWS initiative, the technology under investigation, the concept exploration test bed and summer 2001 operational experience, and the near term plans for the CIWS concept exploration.
READ LESS

Summary

The FAA Operational Evolution Plan (OEP) identified en route severe weather as one of the four problems that must be addressed if the US. air transportation system is to alleviate the growing gap between the demand for air transportation and the ability of the system to meet that demand. Convective...

READ MORE

The 2001 demonstration of automated cloud forecast guidance products for San Francisco International Airport

Author:
Published in:
10th Conf. on Aviation, Range, and Aerospace Meteorology (13th Conf. on Applied Climatology), 13-16 May 2002, pp. J99-J102.

Summary

A system for providing cloud prediction guidance to aviation weather forecasters was demonstrated during the summer of 2001. The system was sponsored by the FAA, and developed by MIT Lincoln Laboratory in collaboration with SJSU, the University of Quebec at Montreal, Penn State University, and the Central Weather Service Unit (CWSU) at Oakland Center. Products were provided to forecasters at the CWSU, the NWS in Monterey, and the Weather Center at United Airlines. Real-time data are processed to support a display of weather graphics, and to provide input to a suite of four independent cloud forecast models developed specifically for the marine stratus application. The forecast models were run hourly each morning to provide updated forecasts during the evolution of cloud dissipation int he Bay area. As part of each update cycle, the four model forecasts were combined to provide a Consensus Forecast product. Weather observations and forecasts were provided to users on a web browser display.
READ LESS

Summary

A system for providing cloud prediction guidance to aviation weather forecasters was demonstrated during the summer of 2001. The system was sponsored by the FAA, and developed by MIT Lincoln Laboratory in collaboration with SJSU, the University of Quebec at Montreal, Penn State University, and the Central Weather Service Unit...

READ MORE

Using ORPG to enhance NEXRAD products to support FAA critical systems

Published in:
10th Conf. on Aviation, Range, and Aerospace Meteorology, 13-16 May 2002, pp. 77-80.

Summary

The initial release of a new operational open architecture is currently being phased into the national WSR-88D (NEXRAD) radar network. This new Common Operations and Development Environment (CODE) includes the Open Radar Product Generator (ORPG) that replaces the existing NEXRAD Radar Product Generator. The new ORPG includes all the algorithms of the RPG it replaces. Future algorithms designed for use within NEXRAD also will be processed by the ORPG. CODE can also be used in a research capacity to significantly enhance the process of ORPG meteorological algorithm development. When used independently of a NEXRAD installation, CODE/ORPG provides multiple playback options for accessing real-time base data streams. This allows development and testing of new algorithms under the same environment an algorithm would encounter in an operational setting. This establishes a flow relationship from algorithm development through operational implementation within the common environment of CODE/ORPG. A six-month Build cycle for future CODE/ORPG releases has been established. An algorithm developed in a research CODE/ORPG capacity has an opportunity, at six-month intervals, to garner agency approval and undergo final preparation for operational release. The NEXRAD Radar Operations Center (ROC) needs about eight months preparation time from algorithm submission until release of the next CODE/ORPG version. For instance. Build 2 is to be released September 30. 2002. Algorithms for Build 2 inclusion had to be submitted by January 31, 2002. It will take about three months after the release for the entire NEXRAD network to be updated. The deadline for Build 3 submission is in July 2002 with a release date set in March 2003. Multiple Federal Aviation Administration (FAA) critical systems rely on products from NEXRAD algorithms. These projects include ITWS (Integrated Airport Weather System), WARP (Weather and Radar Processing), and ClWS (Corridor Integrated Weather System). Some of the NEXRAD products used include severe storm information, composite reflectivity factor depictions, and velocity data. In this paper, we discuss new algorithms and modifications to existing algorithms earmarked for the first few releases of the CODE/ORPG that produce products of importance to these FAA systems. They include modifications to the existing Anomalous Propagation Edited Composite Reflectivity algorithm released during Build 1 upgrades, a new high resolution, digital VIL (Vertically Integrated Liquid) algorithm slated for Build 2, and a Data Quality Assurance algorithm anticipated for Build 3.
READ LESS

Summary

The initial release of a new operational open architecture is currently being phased into the national WSR-88D (NEXRAD) radar network. This new Common Operations and Development Environment (CODE) includes the Open Radar Product Generator (ORPG) that replaces the existing NEXRAD Radar Product Generator. The new ORPG includes all the algorithms...

READ MORE

An overview of automatic speaker recognition technology

Published in:
Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP, Vol. IV, 13-17 May 2002, pp. IV-4072 - IV-4075.

Summary

In this paper we provide a brief overview of the area of speaker recognition, describing applications, underlying techniques and some indications, of performance. Following this overview we will discuss some of the strengths and weaknesses of current speaker recognition technologies and outline some potential future trends in research, development and applications conducting other speech interactions (background verification). As speaker and speech recognition system merge and speech recognition accuracy improves, the distinction between text- independent and -dependent applications will decrease. Of the two basic tasks, text-dependent speaker verification is currently
READ LESS

Summary

In this paper we provide a brief overview of the area of speaker recognition, describing applications, underlying techniques and some indications, of performance. Following this overview we will discuss some of the strengths and weaknesses of current speaker recognition technologies and outline some potential future trends in research, development and...

READ MORE

Speaker verification using text-constrained Gaussian mixture models

Published in:
Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP, Vol. I, 13-17 May 2002, pp. I-677 - I-680.

Summary

In this paper we present an approach to close the gap between text-dependent and text-independent speaker verification performance. Text-constrained GMM-UBM systems are created using word segmentations produced by a LVCSR system on conversational speech allowing the system to focus on speaker differences over a constrained set of acoustic units. Results on the 2001 NiST extended data task show this approach can be used to produce an equal error rate of < 1%.
READ LESS

Summary

In this paper we present an approach to close the gap between text-dependent and text-independent speaker verification performance. Text-constrained GMM-UBM systems are created using word segmentations produced by a LVCSR system on conversational speech allowing the system to focus on speaker differences over a constrained set of acoustic units. Results...

READ MORE

Speaker detection and tracking for telephone transactions

Published in:
Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, ICASSP, 13-17 May 2002, pp. 129-132.

Summary

As ever greater numbers of telephone transactions are being conducted solely between a caller and an automated answering system, the need increases for software which can automatically identify and authenticate these callers without the need for an onerous speaker enrollment process. In this paper we introduce and investigate a novel speaker detection and tracking (SDT) technique, which dynamically merges the traditional enrollment and recognition phases of the static speaker recognition task. In this speaker recognition application, no prior speaker models exist and the goal is to detect and model new speakers as they call into the system while also recognizing utterances from the previously modeled callers. New speakers are added to the enrolled set of speakers and speech from speakers in the currently enrolled set is used to update models. We describe a system based on a GMM speaker identification (SID) system and develop a new measure to evaluate the performance of the system on the SDT task. Results for both static, open-set detection and the SDT task are presented using a portion of the Switchboard corpus of telephone speech communications. Static open-set detection produces an equal error rate of about 5%. As expected, performance for SDT is quite varied, depending greatly on the speaker set and ordering of the test sequence. These initial results, however, are quite promising and point to potential areas in which to improve the system performance.
READ LESS

Summary

As ever greater numbers of telephone transactions are being conducted solely between a caller and an automated answering system, the need increases for software which can automatically identify and authenticate these callers without the need for an onerous speaker enrollment process. In this paper we introduce and investigate a novel...

READ MORE

Speech enhancement based on auditory spectral change

Published in:
Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP, Vol. I, Speech Processing Neural Networks for Signal Processing, 13-17 May 2002, pp. I-257 - I-260.

Summary

In this paper, an adaptive approach to the enhancement of speech signals is developed based on auditory spectral change. The algorithm is motivated by sensitivity of aural biologic systems to signal dynamics, by evidence that noise is aurally masked by rapid changes in a signal, and by analogies to these two aural phenomena in biologic visual processing. Emphasis is on preserving nonstationarity, i.e., speech transient and time-varying components, such as plosive bursts, formant transitions, and vowel onsets, while suppressing additive noise. The essence of the enhancement technique is a Wiener filter that uses a desired signal spectrum whose estimation adapts to stationarity of the measured signal. The degree of stationarity is derived from a signal change measurement, based on an auditory spectrum that accentuates change in spectral bands. The adaptive filter is applied in an unconventional overlap-add analysis/synthesis framework, using a very short 4-ms analysis window and a 1-ms frame interval. In informal listening, the reconstructions are judged to be "crisp" corresponding to good temporal resolution of transient and rapidly-moving speech events.
READ LESS

Summary

In this paper, an adaptive approach to the enhancement of speech signals is developed based on auditory spectral change. The algorithm is motivated by sensitivity of aural biologic systems to signal dynamics, by evidence that noise is aurally masked by rapid changes in a signal, and by analogies to these...

READ MORE

Automated generation and analysis of attack graphs

Published in:
Proc. of the 2002 IEEE Symp. on Security and Privacy, 12-15 May 2002, pp. 254-265.

Summary

An integral part of modeling the global view of network security is constructing attack graphs. In practice, attack graphs are produced manually by Red Teams. Construction by hand, however, is tedious, error-prone, and impractical for attack graphs have larger than a hundred nodes. In this paper we present an automated technique for generating and analyzing attack graphs. We base our technique on symbolic model checking algorithms, letting us construct attack graphs automatically and efficiently. We also describe two analyses to help decide which attacks would be most cost-effective to guard against. We implemented our techniques in a tool suite and tested it on a small network example, which includes models of a firewall and an intrusion detection system.
READ LESS

Summary

An integral part of modeling the global view of network security is constructing attack graphs. In practice, attack graphs are produced manually by Red Teams. Construction by hand, however, is tedious, error-prone, and impractical for attack graphs have larger than a hundred nodes. In this paper we present an automated...

READ MORE

Speech-to-speech translation: technology and applications study

Published in:
MIT Lincoln Laboratory Report TR-1080

Summary

This report describes a study effort on the state-of-the-art and lessons learned in automated, two- way, speech-to-speech translation and its potential application to military problems. The study includes and comments upon an extensive set of references on prior and current work in speech translation. The study includes recommendations on future military applications and on R&D needed to successfully achieve those applications. Key findings of the study include: (1) R&D speech translation systems have been demonstrated, but only in limited domains, and their performance is inadequate for operational use; (2) as far as we have been able to determine, there are currently no operational two-way speech translation systems; (3) intensive, sustained R&D will be needed to develop usable two-way speech translation systems. Major recommendations include: (1) a substantial R&D program in speech translation is needed, especially including full end-to-end system prototyping and evaluation; (2) close cooperation among researchers and users speaking multiple languages will be needed for the development of useful application systems; (3) to get military users involved and interacting in a mode which enables them to provide useful inputs and feedback on system requirements and performance, it will be necessary to provide them at the start with a fairly robust, open-domain system which works to the degree that some two-way speech translation is operational.
READ LESS

Summary

This report describes a study effort on the state-of-the-art and lessons learned in automated, two- way, speech-to-speech translation and its potential application to military problems. The study includes and comments upon an extensive set of references on prior and current work in speech translation. The study includes recommendations on future...

READ MORE