Publications
Machine-assisted language translation for U.S./RoK Combined Forces Command
Summary
Summary
The U.S. military must operate worldwide in a variety of international environments where many different languages are used. There is a critical need for translation, and there is a shortage of translators who can interpret military terminology specifically. One coalition environment where the need is particularly strong is in the...
Total global lightning inferred from Schumann resonance measurements
Summary
Summary
Radiation with frequencies of 5-30 Hz is ducted between Earth's surface and ionosphere with little attenuation; at the lowest frequencies, waves travel several times around the Earth before losing most of their energy. Much of this radiation is produced by lightning. Here we assume that all of this radiation is...
En route ATM decision support tool computer-human interface requirements development
Summary
Summary
MIT Lincoln Laboratory (MIT/LL) is supporting the FAA-sponsored effort to specify Computer Human Interface (CHI) requirements for the En Route Air Traffic Management Decision Support Tools (ERATMDST) program. The ERATMDST CHI specification is the FAA's vehicle to ensure an operationally suitable user interface is provided for the DSTs (such as...
Blind clustering of speech utterances based on speaker and language characteristics
Summary
Summary
Classical speaker and language recognition techniques can be applied to the classification of unknown utterances by computing the likelihoods of the utterances given a set of well trained target models. This paper addresses the problem of grouping unknown utterances when no information is available regarding the speaker or language classes...
Improving accent identification through knowledge of English syllable structure
Summary
Summary
This paper studies the structure of foreign-accented read English speech. A system for accent identification is constructed by combining linguistic theory with statistical analysis. Results demonstrate that the linguistic theory is reflected in real speech data and its application improves accent identification. The work discussed here combines and applies previous...
Airbus 320 performance during ATC-directed breakouts on final approach
Summary
Summary
An evaluation of Airbus 320 (A320) performance during ATC-directed breakouts was conducted in a two-part study during 1995. Phase 1 tested the combined effect of proposed ATC phraseology, pilot situational awareness training, and an A320-specific breakout procedure on performance. Pilot training included a briefing and viewing a videotape, but no...
Sheep, goats, lambs and wolves: a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation
Summary
Summary
Performance variability in speech and speaker recognition systems can be attributed to many factors. One major factor, which is often acknowledged but seldom analyzed, is inherent differences in the recognizability of different speakers. In speaker recognition systems such differences are characterized by the use of animal names for different types...
A dual-band circularly polarized aperture-coupled stacked microstrip antenna for global positioning satellite
Summary
Summary
This paper describes the design and testing of an aperture-coupled circularly polarized antenna for global positioning satellite (GPS) applications. The antenna operates at both the L1 and L2 frequencies of 1575 and 1227 MHz, which is required for differential GPS systems in order to provide maximum positioning accuracy. Electrical performance...
Techniques for improved reception of 1090 MHz ADS-B signals
Summary
Summary
The recent development of ADS-B (Automatic Dependent Surveillance-Broadcast) is based on the use of the Mode S transponders now carried by all air carrier and commuter aircraft. ADS-B aircraft broadcast aircraft positions, identity, and other information via semi-random Mode S transponder squitters. Other aircraft or ground facilities receive the squitters...
Vulnerabilities of reliable multicast protocols
Summary
Summary
We examine vulnerabilities of several reliable multicast protocols. The various mechanisms employed by these protocols to provide reliability can present vulnerabilities. We show how some of these vulnerabilities can be exploited in denial-of-service attacks, and discuss potential mechanisms for withstanding such attacks.