Publications

Refine Results

(Filters Applied) Clear All

Comment on "Reinterpreting aircraft measurement in anisotropic scaling turbulence" by Lovejoy et al. (2009)

Published in:
Atmos. Chem. Phys., Vol. 10, No. 3, 2010, pp. 1401-1402.

Summary

Recently, Lovejoy et al. (2009) argued that the steep ~k-3 atmospheric kinetic energy spectrum at synoptic scales (>~1000km) observed by aircraft is a spurious artefact of aircraft following isobars instead of isoheights. Without taking into account the earth's rotation they hypothesize that the horizontal atmospheric energy spectrum should scale as k?5/3 at all scales. We point out that the approximate k?3- spectrum at synoptic scales has been observed by a number of non-aircraft means since the 1960s and that general circulation models and other current models have successfully produced this spectrum. We also argue that the vertical movements of the aircraft are far too small to cause any strong effect on the measured spectrum at synoptic scales.
READ LESS

Summary

Recently, Lovejoy et al. (2009) argued that the steep ~k-3 atmospheric kinetic energy spectrum at synoptic scales (>~1000km) observed by aircraft is a spurious artefact of aircraft following isobars instead of isoheights. Without taking into account the earth's rotation they hypothesize that the horizontal atmospheric energy spectrum should scale as...

READ MORE

High-pitch formant estimation by exploiting temporal change of pitch

Published in:
Proc. IEEE Trans. on Audio, Speech, and Language Processing, Vol. 18, No. 1, January 2010, pp. 171-186.

Summary

This paper considers the problem of obtaining an accurate spectral representation of speech formant structure when the voicing source exhibits a high fundamental frequency. Our work is inspired by auditory perception and physiological studies implicating the use of pitch dynamics in speech by humans. We develop and assess signal processing schemes aimed at exploiting temporal change of pitch to address the high-pitch formant frequency estimation problem. Specifically, we propose a 2-D analysis framework using 2-D transformations of the time-frequency space. In one approach, we project changing spectral harmonics over time to a 1-D function of frequency. In a second approach, we draw upon previous work of Quatieri and Ezzat et al. [1], [2], with similarities to the auditory modeling efforts of Chi et al. [3], where localized 2-D Fourier transforms of the time-frequency space provide improved source-filter separation when pitch is changing. Our methods show quantitative improvements for synthesized vowels with stationary formant structure in comparison to traditional and homomorphic linear prediction. We also demonstrate the feasibility of applying our methods on stationary vowel regions of natural speech spoken by high-pitch females of the TIMIT corpus. Finally, we show improvements afforded by the proposed analysis framework in formant tracking on examples of stationary and time-varying formant structure.
READ LESS

Summary

This paper considers the problem of obtaining an accurate spectral representation of speech formant structure when the voicing source exhibits a high fundamental frequency. Our work is inspired by auditory perception and physiological studies implicating the use of pitch dynamics in speech by humans. We develop and assess signal processing...

READ MORE

3-d graph processor

Summary

Graph algorithms are used for numerous database applications such as analysis of financial transactions, social networking patterns, and internet data. While graph algorithms can work well with moderate size databases, processors often have difficulty providing sufficient throughput when the databases are large. This is because the processor architectures are poorly matched to the graph computational flow. For example, most modern processors utilize cache based memory in order to take advantage of highly localized memory access patterns. However, memory access patterns associated with graph processing are often random in nature and can result in high cache miss rates. In addition, graph algorithms require significant overhead computation for dealing with indices of vertices and edges.
READ LESS

Summary

Graph algorithms are used for numerous database applications such as analysis of financial transactions, social networking patterns, and internet data. While graph algorithms can work well with moderate size databases, processors often have difficulty providing sufficient throughput when the databases are large. This is because the processor architectures are poorly...

READ MORE

Classification of primary radar tracks using Gaussian mixture models

Published in:
IET Radar, Sonar Navig., Vol. 3, No. 6, December 2009.

Summary

Classification of primary surveillance radar tracks as either aircraft or non-aircraft is critical to a number of emerging applications, including airspace situational awareness and collision avoidance. Substantial research has focused on target classification of pre-processed radar surveillance data. Unfortunately, many non-aircraft tracks still pass through the clutter-reduction processing built into the aviation surveillance radars used by the Federal Aviation Administration. This paper demonstrates an approach to radar track classification that uses only post-processed position reports and does not require features that are typically only available during the pre-processing stage. Gaussian mixture models learned from recorded data are shown to perform well without the use of features that have been traditionally used for target classification, such as radar crosssection measurements.
READ LESS

Summary

Classification of primary surveillance radar tracks as either aircraft or non-aircraft is critical to a number of emerging applications, including airspace situational awareness and collision avoidance. Substantial research has focused on target classification of pre-processed radar surveillance data. Unfortunately, many non-aircraft tracks still pass through the clutter-reduction processing built into...

READ MORE

Query-by-example spoken term detection using phonetic posteriorgram templates

Published in:
Proc. IEEE Workshop on Automatic Speech Recognition & Understanding, ASRU, 13-17 December 2009, pp. 421-426.

Summary

This paper examines a query-by-example approach to spoken term detection in audio files. The approach is designed for low-resource situations in which limited or no in-domain training material is available and accurate word-based speech recognition capability is unavailable. Instead of using word or phone strings as search terms, the user presents the system with audio snippets of desired search terms to act as the queries. Query and test materials are represented using phonetic posteriorgrams obtained from a phonetic recognition system. Query matches in the test data are located using a modified dynamic time warping search between query templates and test utterances. Experiments using this approach are presented using data from the Fisher corpus.
READ LESS

Summary

This paper examines a query-by-example approach to spoken term detection in audio files. The approach is designed for low-resource situations in which limited or no in-domain training material is available and accurate word-based speech recognition capability is unavailable. Instead of using word or phone strings as search terms, the user...

READ MORE

ASE: authenticated statement exchange

Published in:
2010 9th IEEE Int. Symp. on Network Computing and Applications, 7 December 2009, pp. 155-161.

Summary

Applications often re-transmit the same data, such as digital certificates, during repeated communication instances. Avoiding such superfluous transmissions with caching, while complicated, may be necessary in order to operate in low-bandwidth, high-latency wireless networks or in order to reduce communication load in shared, mobile networks. This paper presents a general framework and an accompanying software library, called "Authenticated Statement Exchange" (ASE), for helping applications implement persistent caching of application specific data. ASE supports secure caching of a number of predefined data types common to secure communication protocols and allows applications to define new data types to be handled by ASE. ASE is applicable to many applications. The paper describes the use of ASE in one such application, secure group chat. In a recent real-use deployment, ASE was instrumental in allowing secure group chat to operate over low-bandwidth satellite links.
READ LESS

Summary

Applications often re-transmit the same data, such as digital certificates, during repeated communication instances. Avoiding such superfluous transmissions with caching, while complicated, may be necessary in order to operate in low-bandwidth, high-latency wireless networks or in order to reduce communication load in shared, mobile networks. This paper presents a general...

READ MORE

Modeling modern network attacks and countermeasures using attack graphs

Published in:
ACSAC 2009, Annual Computer Security Applications Conf., 7 December 2009, pp. 117-126.

Summary

By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements to the NetSPA attack graph system required to model additional present-day threats (zero-day exploits and client-side attacks) and countermeasures (intrusion prevention systems, proxy firewalls, personal firewalls, and host-based vulnerability scans). Point-to-point reachability algorithms and structures were extensively redesigned to support "reverse" reachability computations and personal firewalls. Host-based vulnerability scans are imported and analyzed. Analysis of an operational network with 85 hosts demonstrates that client-side attacks pose a serious threat. Experiments on larger simulated networks demonstrated that NetSPA's previous excellent scaling is maintained. Less than two minutes are required to completely analyze a four-enclave simulated network with more than 40,000 hosts protected by personal firewalls.
READ LESS

Summary

By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements to the NetSPA attack graph system required to model additional present-day threats (zero-day exploits and client-side attacks) and countermeasures (intrusion prevention...

READ MORE

Speaker comparison with inner product discriminant functions

Published in:
Neural Information Processing Symp., 7 December 2009.

Summary

Speaker comparison, the process of finding the speaker similarity between two speech signals, occupies a central role in a variety of applications - speaker verification, clustering, and identification. Speaker comparison can be placed in a geometric framework by casting the problem as a model comparison process. For a given speech signal, feature vectors are produced and used to adapt a Gaussian mixture model (GMM). Speaker comparison can then be viewed as the process of compensating and finding metrics on the space of adapted models. We propose a framework, inner product discriminant functions (IPDFs), which extends many common techniques for speaker comparison - support vector machines, joint factor analysis, and linear scoring. The framework uses inner products between the parameter vectors of GMM models motivated by several statistical methods. Compensation of nuisances is performed via linear transforms on GMM parameter vectors. Using the IPDF framework, we show that many current techniques are simple variations of each other. We demonstrate, on a 2006 NIST speaker recognition evaluation task, new scoring methods using IPDFs which produce excellent error rates and require significantly less computation than current techniques.
READ LESS

Summary

Speaker comparison, the process of finding the speaker similarity between two speech signals, occupies a central role in a variety of applications - speaker verification, clustering, and identification. Speaker comparison can be placed in a geometric framework by casting the problem as a model comparison process. For a given speech...

READ MORE

Effects of ionizing radiation on digital single event transients in a 180-nm fully depleted SOI process

Published in:
2009 IEEE Nuclear & Space Radiation Effects Conf., 07/20/2009 [in: IEEE Trans. Nuclear Sci., Vol. 56, No. 9, December 2009, pp. 3477-3482].

Summary

Effects of ionizing radiation on single event transients are reported for Fully Depleted SOI (FDSOI) technology using experiments and simulations. Logic circuits, i.e. CMOS inverter chains, were irradiated with cobalt-60 gamma radiation. When charge is induced in the n-channel FET with laser-probing techniques, laser-induced transients widen with increased total dose. This is because radiation causes charge to be trapped in the buried oxide, and reduces the p-channel FET drive current. When the p-channel FET drive current is reduced, the time required to restore the output of the laser-probed FET back to its original condition is increased, i.e. the upset transient width is increased. A widening of the transient pulse is also observed when a positive bias is applied to the wafer without any exposure to radiation. This is because a positive wafer bias reproduces the shifts inFET threshold voltages that occur during total dose irradiation. Results were also verified with heavy ion testing and mixed mode simulations.
READ LESS

Summary

Effects of ionizing radiation on single event transients are reported for Fully Depleted SOI (FDSOI) technology using experiments and simulations. Logic circuits, i.e. CMOS inverter chains, were irradiated with cobalt-60 gamma radiation. When charge is induced in the n-channel FET with laser-probing techniques, laser-induced transients widen with increased total dose...

READ MORE

Measurement of trace explosive residues in a surrogate operational environment: implications for tactical use of chemical sensing in C-IED operations

Published in:
26th Army Science Conf., 1 December 2008 (Anal. Bioanal. Chem., Vol. 395, pp. 357-369).

Summary

A campaign to measure the amount of trace explosive residues in an operational military environment was conducted on May 27?31, 2007, at the National Training Center at Fort Irwin, CA, USA. The objectives of this campaign were to develop the methods needed to collect and analyze samples from tactical military settings, to use the data obtained to determine what the trace explosive signatures suggest about the potential capabilities of chemical-based means to detect IEDs, and, finally, to present a framework whereby a sound understanding of the signature science can be used to guide development of new sensing technologies and sensor concepts of operation. Through our use of combined background and threat signature data, we have performed statistical analyses to estimate upper limits of notional sensor performance that is limited only by the spatial correlation of the signature chemicals to the threats of interest.
READ LESS

Summary

A campaign to measure the amount of trace explosive residues in an operational military environment was conducted on May 27?31, 2007, at the National Training Center at Fort Irwin, CA, USA. The objectives of this campaign were to develop the methods needed to collect and analyze samples from tactical military...

READ MORE