Publications

Refine Results

(Filters Applied) Clear All

The development of phased-array radar technology

Published in:
Lincoln Laboratory Journal, Vol. 12, No. 2, 2000, pp. 321-340.

Summary

Lincoln Laboratory has been involved in the development of phased-array radar technology since the late 1950s. Radar research activities have included theoretical analysis, application studies, hardware design, device fabrication, and system testing. Early phased-array research was centered on improving the national capability in phased-array radars. The Laboratory has developed several test-bed phased arrays, which have been used to demonstrate and evaluate components, beamforming techniques, calibration, and testing methodologies. The Laboratory has also contributed significantly in the area of phased-array antenna radiating elements, phase-shifter technology, solid-state transmit-and-receive modules, and monolithic microwave integrated circuit (MMIC) technology. A number of developmental phased-array radar systems have resulted from this research, as discussed in other articles in this issue. A wide variety of processing techniques and system components have also been developed. This article provides an overview of more than forty years of this phased-array radar research activity.
READ LESS

Summary

Lincoln Laboratory has been involved in the development of phased-array radar technology since the late 1950s. Radar research activities have included theoretical analysis, application studies, hardware design, device fabrication, and system testing. Early phased-array research was centered on improving the national capability in phased-array radars. The Laboratory has developed several...

READ MORE

Information Survivability for Mobile Wireless Systems

Published in:
Lincoln Laboratory Journal, Vol. 12, No. 1, pp. 65-80.

Summary

Mobile wireless networks are more vulnerable to cyber attack and more difficult to defend than conventional wired networks. In discussing security and survivability issues in mobile wireless networks, we focus here on group communication, as applied to multimedia conferencing. The need to conserve resources in wireless networks encourages the use of multicast protocols for group communication, which introduces additional security concerns. We point out the need for rate-adaptation techniques to simultaneously support multiple receivers that each experience different network conditions. The security properties associated with a number of approaches to rate adaptation are compared. We also identify several security issues for reliable group communication, providing examples of denial-of-service attacks and describing appropriate security measures to guard against such attacks. We examine the costs of these security measures in terms of network efficiency and computational overhead. Finally, we introduce a survivability approach called dynamically deployed protocols, in which the effects of an information attack are mitigated by dynamically switching to a new protocol to evade the attack. We suggest that this dynamic protocol deployment can be achieved effectively by transmission of in-line mobile code.
READ LESS

Summary

Mobile wireless networks are more vulnerable to cyber attack and more difficult to defend than conventional wired networks. In discussing security and survivability issues in mobile wireless networks, we focus here on group communication, as applied to multimedia conferencing. The need to conserve resources in wireless networks encourages the use...

READ MORE

Approaches to speaker detection and tracking in conversational speech

Published in:
Digit. Signal Process., Vol. 10, No. 1, January/April/July, 2000, pp. 93-112. (Fifth Annual NIST Speaker Recognition Workshop, 3-4 June 1999.)

Summary

Two approaches to detecting and tracking speakers in multispeaker audio are described. Both approaches use an adapted Gaussian mixture model, universal background model (GMM-UBM) speaker detection system as the core speaker recognition engine. In one approach, the individual log-likelihood ratio scores, which are produced on a frame-by-frame basis by the GMM-UBM system, are used to first partition the speech file into speaker homogenous regions and then to create scores for these regions. We refer to this approach as internal segmentation. Another approach uses an external segmentation algorithm, based on blind clustering, to partition the speech file into speaker homogenous regions. The adapted GMM-UBM system then scores each of these regions as in the single-speaker recognition case. We show that the external segmentation system outperforms the internal segmentation system for both detection and tracking. In addition, we show how different components of the detection and tracking algorithms contribute to the overall system performance.
READ LESS

Summary

Two approaches to detecting and tracking speakers in multispeaker audio are described. Both approaches use an adapted Gaussian mixture model, universal background model (GMM-UBM) speaker detection system as the core speaker recognition engine. In one approach, the individual log-likelihood ratio scores, which are produced on a frame-by-frame basis by the...

READ MORE

Speaker verification using adapted Gaussian mixture models

Published in:
Digit. Signal Process., Vol. 10, No. 1-3, January/April/July, 2000, pp. 19-41. (Fifth Annual NIST Speaker Recognition Workshop, 3-4 June 1999.)

Summary

In this paper we describe the major elements of MIT Lincoln Laboratory's Gaussian mixture model (GMM)-based speaker verification system used successfully in several NIST Speaker Recognition Evaluations (SREs). The system is built around the likelihood ratio test for verification, using simple but effective GMMs for likelihood functions, a universal background model (UBM) for alternative speaker representation, and a form of Bayesian adaptation to derive speaker models from the UBM. The development and use of a handset detector and score normalization to greatly improve verification performance is also described and discussed. Finally, representative performance benchmarks and system behavior experiments on NIST SRE corpora are presented.
READ LESS

Summary

In this paper we describe the major elements of MIT Lincoln Laboratory's Gaussian mixture model (GMM)-based speaker verification system used successfully in several NIST Speaker Recognition Evaluations (SREs). The system is built around the likelihood ratio test for verification, using simple but effective GMMs for likelihood functions, a universal background...

READ MORE

Cluster Computing for Embedded/Real-Time Systems

Author:
Published in:
Cluster Computing White Paper

Summary

Cluster computing is not a new area of computing. It is, however, evident that there is agrowing interest in its usage in all areas where applications have traditionally used parallelor distributed computing platforms. The mounting interest has been fuelled in part by theavailability of powerful microprocessors and high-speed networks as off-the-shelf commoditycomponents as well as in part by the rapidly maturing software components available tosupport high performance and high availability applications.This rising interest in clusters led to the formation of an IEEE Computer Society Task Forceon Cluster Computing (TFCC1) in early 1999. An objective of the TFCC was to act both as amagnet and a focal point for all cluster computing related activities. As such, an earlyactivity that was deemed necessary was to produce a White Paper on cluster computing andits related technologies.Generally a White Paper is looked upon as a statement of policy on a particular subject. Theaim of this White Paper is to provide a relatively unbiased report on the existing, new andemerging technologies as well as the surrounding infrastructure deemed important to thecluster computing community. This White Paper is essentially a snapshot of cluster-relatedtechnologies and applications in year 2000.This White Paper provides an authoritative review of all the hardware and softwaretechnologies that can be used to make up a cluster now or in the near future. Thesetechnologies range from the network level, through the operating system and middlewarelevels up to the application and tools level. The White Paper also tackles the increasinglyimportant areas of High Availability and Embedded/Real Time applications, which are bothconsidered crucial areas for future clusters.The White Paper has been broken down into twelve chapters, each of which has been puttogether by academics and industrial researchers who are both experts in their fields andwhere willing to volunteer their time and effort to put together this White Paper.On a personal note, I would like to thank all the contributing authors for finding the time toput the effort into their chapters and making the overall paper an excellent state-of-the-artreview of clusters. In addition, I would like to thank the reviewers for their timely comments.
READ LESS

Summary

Cluster computing is not a new area of computing. It is, however, evident that there is agrowing interest in its usage in all areas where applications have traditionally used parallelor distributed computing platforms. The mounting interest has been fuelled in part by theavailability of powerful microprocessors and high-speed networks as...

READ MORE

Lincoln Laboratory Evaluation of TCAS II Logic Version 7 Appendices Volume II

Published in:
MIT Lincoln Laboratory Report ATC-268,II

Summary

Volume I described the analysis procedures and inputs. This volume presents tables and figures that were generated during the assessment to the TCAS Logic Performance.
READ LESS

Summary

Volume I described the analysis procedures and inputs. This volume presents tables and figures that were generated during the assessment to the TCAS Logic Performance.

READ MORE

Lincoln Laboratory Evaluation of TCAS II Logic Version 7 Volume I

Published in:
MIT Lincoln Laboratory Report ATC-268,I

Summary

This report documents the Lincoln Laboratory evaluation of the Traffic Alert and Collision Avoidance System II (TCAS II) logic version 7. TCAS II is an airborne collision avoidance system required since 30 December 1993 by the FAA on all air carrier aircraft with more than 30 passenger seats operating in the U.S. airspace. Version 7 is a major revision to the TCAS II logic consisting of more than 300 separately defined changes affecting all majot TCAS areas (surveillance, CAS logic and displays/aurals). Lincoln Laboratory Evaluated the logic by examining approximately two million simulated pairwise TCAS-TCAS encounters, derived from actual tracks recorded in U.S. airspace. The main goals of the evaluation were: (1) to study the performance of the new TCAS-TCAS coordinated reversal logic; (2) to detect and explain any areas of performance; (3) to examine the performance of the version 7 logic for the 30 Representative NMACs identified during the 6.04a logic evaluation; and (4) to understand the limitations of the logic by analyzing every version NMAC. Five Lincoln Laboratory analysis programs written for previous logic evaluation work were updated and new software was written to aid in the evaluation of TCAS-TCAS sense reversals. There were four phases of the evaluation corresponding to the above goals. For each phase the report gives an overview of the evaluation approach taken and a description of the results. An overall summary and perspective on the evolution of the TCAS II logic are given at the end of the report.
READ LESS

Summary

This report documents the Lincoln Laboratory evaluation of the Traffic Alert and Collision Avoidance System II (TCAS II) logic version 7. TCAS II is an airborne collision avoidance system required since 30 December 1993 by the FAA on all air carrier aircraft with more than 30 passenger seats operating in...

READ MORE

The Vector, Signal, and Image Processing Library (VSIPL): an Open Standard for Astronomical Data Processing

Published in:
Bulletin of the American Astronomical Society, Vol. 31, p.1497

Summary

The Vector/Signal/Image Processing Library (VSIPL) is a DARPA initiated effort made up of industry, government and academic representatives who have defined an industry standard API for vector, signal, and image processing primitives for real-time signal processing on high performance systems. VSIPL supports a wide range of data types (int, float, complex, ...) and layouts (vectors, matrices and tensors) and is ideal for astronomical data processing. The VSIPL API is intended to serve as an open, vendor-neutral, industry standard interface. The object-based VSIPL API abstracts the memory architecture of the underlying machine by using the concept of memory blocks and views. Early experiments with VSIPL code conversions have been carried out by the High Performance Computing Program team at the UCSD. Commercially, several major vendors of signal processors are actively developing implementations. VSIPL has also been explicitly required as part of a recent Rome Labs teraflop procurement. This poster presents the VSIPL API, its functionality and the status of various implementations.
READ LESS

Summary

The Vector/Signal/Image Processing Library (VSIPL) is a DARPA initiated effort made up of industry, government and academic representatives who have defined an industry standard API for vector, signal, and image processing primitives for real-time signal processing on high performance systems. VSIPL supports a wide range of data types (int, float...

READ MORE

Weather sensing and data fusion to improve safety and reduce delays at major west coast airports

Summary

The objective of this study was to analyze the weather sensing and data fusion required to improve safety and reduce delays at a number of west coast airports that are not currently scheduled to receive an Integrated Terminal Weather System (ITWS). This report considers the Los Angeles (LAX), San Francisco (SFO), Seattle (SEA) and Portland, OR (PDX) international airports. A number of visits were made to the various ATC facilities to better understand their weather decision support operational needs. Analyses were made of an incident of lightning strikes to two aircraft at SEA in February 1999, and a prototype terminal winds product was developed for LAX that uses profilers as well as plane reports to update the the National Weather Service (NWS) Rapid Update Cycle (RUC) winds estimates. We found that an augmented ITWS could potentially address safety concerns for triggered lightning strikes and vertical wind shear in winter storms at Portland and Seattle. An augmented ITWS terminal winds product (that uses wind profiler data in addition to the current ITWS sensors) could provide very large delay reductions for LAX and SFO during winter storms as a component of a wake vortex advisory system. This augmented product also could provide significant delay reduction benefits at SEA. The sensors required to obtain the projected benefits at SFO do not exist currently. Portland may warrant additional sensors to address the vertical wind shear problems, and LAX would require additional sensors for a wake vortex advisory system. We recommend near-term experimental measurements at PDX to determine the optimum sensor mix and that an operational evaluation of the prototype augmented ITWS terminal winds product be carried out at LAX to determine if the current sensor mix can meet operational needs. Lightning strike data at SEA and PDX should be analyzed to determine if a proposed triggered lightning predictant is accurate.
READ LESS

Summary

The objective of this study was to analyze the weather sensing and data fusion required to improve safety and reduce delays at a number of west coast airports that are not currently scheduled to receive an Integrated Terminal Weather System (ITWS). This report considers the Los Angeles (LAX), San Francisco...

READ MORE

Estimation of modulation based on FM-to-AM transduction: two-sinusoid case

Published in:
IEEE Trans. Signal Process., Vol. 47, No. 11, November 1999, pp. 3084-3097.

Summary

A method is described for estimating the amplitude modulation (AM) and the frequency modulation (FM) of the components of a signal that consists of two AM-FM sinusoids. The approach is based on the transduction of FM to AM that occurs whenever a signal of varying frequency passes through a filter with a nonflat frequency response. The objective is to separate the AM and FM of the sinusoids from the amplitude envelopes of the output of two transduction filters, where the AM and FM are nonlinearly combined in the amplitude envelopes. A current scheme is first refined for AM-FM estimation of a single AM-FM sinusoid by iteratively inverting the AM and FM estimates to reduce error introduced in transduction. The transduction filter pair is designed relying on both a time-and frequency-domain characterization of transduction error. The approach is then extended to the case of two AM-FM sinusoids by essentially reducing the problem to two single-component AM-FM estimation problems. By exploiting the beating in the amplitude envelope of each filter output due to the two-sinusoidal input, a closed-form solution is obtained. This solution is also improved upon by iterative refinement. The AM-FM estimation methods are evaluated through an error analysis and are illustrated for a wide range of AM-FM signals.
READ LESS

Summary

A method is described for estimating the amplitude modulation (AM) and the frequency modulation (FM) of the components of a signal that consists of two AM-FM sinusoids. The approach is based on the transduction of FM to AM that occurs whenever a signal of varying frequency passes through a filter...

READ MORE