Publications
Comment on "Reinterpreting aircraft measurement in anisotropic scaling turbulence" by Lovejoy et al. (2009)
Summary
Summary
Recently, Lovejoy et al. (2009) argued that the steep ~k-3 atmospheric kinetic energy spectrum at synoptic scales (>~1000km) observed by aircraft is a spurious artefact of aircraft following isobars instead of isoheights. Without taking into account the earth's rotation they hypothesize that the horizontal atmospheric energy spectrum should scale as...
High-pitch formant estimation by exploiting temporal change of pitch
Summary
Summary
This paper considers the problem of obtaining an accurate spectral representation of speech formant structure when the voicing source exhibits a high fundamental frequency. Our work is inspired by auditory perception and physiological studies implicating the use of pitch dynamics in speech by humans. We develop and assess signal processing...
3-d graph processor
Summary
Summary
Graph algorithms are used for numerous database applications such as analysis of financial transactions, social networking patterns, and internet data. While graph algorithms can work well with moderate size databases, processors often have difficulty providing sufficient throughput when the databases are large. This is because the processor architectures are poorly...
Classification of primary radar tracks using Gaussian mixture models
Summary
Summary
Classification of primary surveillance radar tracks as either aircraft or non-aircraft is critical to a number of emerging applications, including airspace situational awareness and collision avoidance. Substantial research has focused on target classification of pre-processed radar surveillance data. Unfortunately, many non-aircraft tracks still pass through the clutter-reduction processing built into...
Query-by-example spoken term detection using phonetic posteriorgram templates
Summary
Summary
This paper examines a query-by-example approach to spoken term detection in audio files. The approach is designed for low-resource situations in which limited or no in-domain training material is available and accurate word-based speech recognition capability is unavailable. Instead of using word or phone strings as search terms, the user...
ASE: authenticated statement exchange
Summary
Summary
Applications often re-transmit the same data, such as digital certificates, during repeated communication instances. Avoiding such superfluous transmissions with caching, while complicated, may be necessary in order to operate in low-bandwidth, high-latency wireless networks or in order to reduce communication load in shared, mobile networks. This paper presents a general...
Modeling modern network attacks and countermeasures using attack graphs
Summary
Summary
By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements to the NetSPA attack graph system required to model additional present-day threats (zero-day exploits and client-side attacks) and countermeasures (intrusion prevention...
Speaker comparison with inner product discriminant functions
Summary
Summary
Speaker comparison, the process of finding the speaker similarity between two speech signals, occupies a central role in a variety of applications - speaker verification, clustering, and identification. Speaker comparison can be placed in a geometric framework by casting the problem as a model comparison process. For a given speech...
Effects of ionizing radiation on digital single event transients in a 180-nm fully depleted SOI process
Summary
Summary
Effects of ionizing radiation on single event transients are reported for Fully Depleted SOI (FDSOI) technology using experiments and simulations. Logic circuits, i.e. CMOS inverter chains, were irradiated with cobalt-60 gamma radiation. When charge is induced in the n-channel FET with laser-probing techniques, laser-induced transients widen with increased total dose...
Measurement of trace explosive residues in a surrogate operational environment: implications for tactical use of chemical sensing in C-IED operations
Summary
Summary
A campaign to measure the amount of trace explosive residues in an operational military environment was conducted on May 27?31, 2007, at the National Training Center at Fort Irwin, CA, USA. The objectives of this campaign were to develop the methods needed to collect and analyze samples from tactical military...