Publications
Wind turbine interference mitigation using a waveform diversity radar
Summary
Summary
Interference from the proliferation of wind turbines is becoming a problem for ground-based medium-to-high pulse repetition frequency (PRF) pulsed–Doppler air surveillance radars. This paper demonstrates that randomizing some parameters of the transmit waveform from pulse to pulse, a filter can be designed to suppress both the wind turbine interference and...
Seismic barrier protection of critical infrastructure
Summary
Summary
Each year, on average a major magnitude-8 earthquake strikes somewhere in the world. In addition, 10,000 earthquake related deaths occur annually, where collapsing buildings claim by far most lives. Moreover, in recent events, industry activity of oil extraction and wastewater reinjection are suspected to cause earthquake swarms that threaten high-value...
Effect of surface roughness and H-termination chemistry on diamond's semiconducting surface conductance
Summary
Summary
The H-terminated surface of diamond when activated with NO2 produces a surface conduction layer that has been used to make FETs. Variations in processing can significantly affect this conduction layer. This article discusses the effect of diamond surface preparation and H termination procedures on surface conduction. Surface preparations that generate...
Twitter language identification of similar languages and dialects without ground truth
Summary
Summary
We present a new method to bootstrap filter Twitter language ID labels in our dataset for automatic language identification (LID). Our method combines geolocation, original Twitter LID labels, and Amazon Mechanical Turk to resolve missing and unreliable labels. We are the first to compare LID classification performance using the MIRA...
Bounded-collusion attribute-based encryption from minimal assumptions
Summary
Summary
Attribute-based encryption (ABE) enables encryption of messages under access policies so that only users with attributes satisfying the policy can decrypt the ciphertext. In standard ABE, an arbitrary number of colluding users, each without an authorized attribute set, cannot decrypt the ciphertext. However, all existing ABE schemes rely on concrete...
Predicting exploitation of disclosed software vulnerabilities using open-source data
Summary
Summary
Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and users quickly install those patches as soon as they are available. However, most vulnerabilities are...
High-efficiency large-angle Pancharatnam phase deflector based on dual-twist design
Summary
Summary
We have previously shown through simulation that an optical beam deflector based on the Pancharatnam (geometric) phase can provide high efficiency with up to 80° deflection using a dual-twist structure for polarization-state control [Appl. Opt. 54, 10035 (2015)]. In this report, we demonstrate that its optical performance is as predicted...
Wind information requirements for NextGen applications phase 4 final report
Summary
Summary
The success of many NextGen applications with time-based control elements, such as Required Time of Arrival (RTA) at a meter fix under 4D-Trajectory Based Operations (4D-TBO/Time of Arrival Control (TOAC) procedures or compliance to an Assigned Spacing Goal (ASG) between aircraft under Interval Management (IM) procedures, are subject to the...
Detecting virus exposure during the pre-symptomatic incubation period using physiological data
Summary
Summary
Early pathogen exposure detection allows better patient care and faster implementation of public health measures (patient isolation, contact tracing). Existing exposure detection most frequently relies on overt clinical symptoms, namely fever, during the infectious prodromal period. We have developed a robust machine learning method to better detect asymptomatic states during...
Characterization of nitrated sugar alcohols by atmospheric-pressure chemical-ionization mass spectrometry
Summary
Summary
RATIONALE: The nitrated sugar alcohols mannitol hexanitrate (MHN), sorbitol hexanitrate (SHN) and xylitol pentanitrate (XPN) are in the same class of compounds as the powerful military-grade explosive pentaerythritol tetranitrate (PETN) and the homemade explosive erythritol tetranitrate (ETN) but, unlike for PETN and ETN, ways to detect MHN, SHN and XPN...