Publications

Refine Results

(Filters Applied) Clear All

High-resolution, high-throughput, CMOS-compatible electron beam patterning

Published in:
SPIE Advanced Lithography, 26 February - 2 March 2017.

Summary

Two scanning electron beam lithography (SEBL) patterning processes have been developed, one positive and one negative tone. The processes feature nanometer-scale resolution, chemical amplification for faster throughput, long film life under vacuum, and sufficient etch resistance to enable patterning of a variety of materials with a metal-free (CMOS/MEMS compatible) tool set. These resist processes were developed to address two limitations of conventional SEBL resist processes: (1) low areal throughput and (2) limited compatibility with the traditional microfabrication infrastructure.
READ LESS

Summary

Two scanning electron beam lithography (SEBL) patterning processes have been developed, one positive and one negative tone. The processes feature nanometer-scale resolution, chemical amplification for faster throughput, long film life under vacuum, and sufficient etch resistance to enable patterning of a variety of materials with a metal-free (CMOS/MEMS compatible) tool...

READ MORE

SIAM data mining "brings it" to annual meeting

Summary

The Data Mining Activity Group is one of SIAM's most vibrant and dynamic activity groups. To better share our enthusiasm for data mining with the broader SIAM community, our activity group organized six minisymposia at the 2016 Annual Meeting. These minisymposia included 48 talks organized by 11 SIAM members.
READ LESS

Summary

The Data Mining Activity Group is one of SIAM's most vibrant and dynamic activity groups. To better share our enthusiasm for data mining with the broader SIAM community, our activity group organized six minisymposia at the 2016 Annual Meeting. These minisymposia included 48 talks organized by 11 SIAM members.

READ MORE

Picosecond kilohertz-class cryogenically cooled multistage Yb-doped chirped pulse amplifier

Published in:
Opt. Lett., Vol. 42, No. 4, 15 February 2017, pp. 707-710.

Summary

A multistage cryogenic chirped pulse amplifier has been developed, utilizing two different Yb-doped gain materials in subsequent amplifier stages. A Yb:GSAG regenerative amplifier followed by a Yb:YAG power amplifier is able to deliver pulses with a broader bandwidth than a system using only one of these two gain media throughout. We demonstrate 90 mJ of pulse energy (113 W of average power) uncompressed and 67 mJ (84 W of average power) compressed at 1.25 kHz pulse repetition frequency, 3.0 ps FWHM Gaussian pulse width, and near-diffraction-limited (M^2 < 1.3) beam quality.
READ LESS

Summary

A multistage cryogenic chirped pulse amplifier has been developed, utilizing two different Yb-doped gain materials in subsequent amplifier stages. A Yb:GSAG regenerative amplifier followed by a Yb:YAG power amplifier is able to deliver pulses with a broader bandwidth than a system using only one of these two gain media throughout...

READ MORE

Learning to tutor from expert demonstrators via apprenticeship scheduling

Published in:
AAAI-17 Workshop on Human-Machine Collaborative Learning, 4 February 2017.

Summary

We have conducted a study investigating the use of automated tutors for educating players in the context of serious gaming (i.e., game designed as a professional training tool). Historically, researchers and practitioners have developed automated tutors through a process of manually codifying domain knowledge and translating that into a human-interpretable format. This process is laborious and leaves much to be desired. Instead, we seek to apply novel machine learning techniques to, first, learn a model from domain experts' demonstrations how to solve such problems, and, second, use this model to teach novices how to think like experts. In this work, we present a study comparing the performance of an automated and a traditional, manually-constructed tutor. To our knowledge, this is the first investigation using learning from demonstration techniques to learn from experts and use that knowledge to teach novices.
READ LESS

Summary

We have conducted a study investigating the use of automated tutors for educating players in the context of serious gaming (i.e., game designed as a professional training tool). Historically, researchers and practitioners have developed automated tutors through a process of manually codifying domain knowledge and translating that into a human-interpretable...

READ MORE

WSR-88D chaff detection and characterization using an optimized hydrometeor classification algorithm

Published in:
18th Conf. on Aviation, Range, and Aerospace Meteorology, 23-26 January 2017.

Summary

Chaff presents multiple issues for aviation, air traffic controllers, and the FAA, including false weather identification and areas where flight paths may need to be altered. Chaff is a radar countermeasure commonly released from aircraft across the United States and is comprised of individual metallic strands designed to reflect certain wavelengths. Chaff returns tend to look similar to weather echoes in the reflectivity factor and radial velocity fields, and can appear as clutter, stratiform precipitation, or deep convection to the radar operator or radar algorithms. When polarimetric fields are taken into account, however, discrimination between weather and non-weather echoes has relatively high potential for success. In this work, the operational Hydrometeor Classification Algorithm (HCA) on the WSR-88D is modified to include a chaff class that can be used as input to a Chaff Detection Algorithm (CDA). This new class is designed using human-truthed chaff datasets for the collection and quantification of variable distributions, and the collected chaff cases are leveraged in the tuning of algorithm weights through the use of a metaheuristic optimization. A final CDA uses various image processing techniques to deliver a filtered output. A discussion regarding WSR-88D observations of chaff on a broad scale is provided, with particular attention given to observations of negative differential reflectivity during different stages of chaff fallout. Numerous cases are presented for analysis and characterization, both as an HCA class and as output from the filtered CDA.
READ LESS

Summary

Chaff presents multiple issues for aviation, air traffic controllers, and the FAA, including false weather identification and areas where flight paths may need to be altered. Chaff is a radar countermeasure commonly released from aircraft across the United States and is comprised of individual metallic strands designed to reflect certain...

READ MORE

Learning by doing, High Performance Computing education in the MOOC era

Published in:
J. Parallel Distrib. Comput., Vol. 105, July 2017, pp. 105-15.

Summary

The High Performance Computing (HPC) community has spent decades developing tools that teach practitioners to harness the power of parallel and distributed computing. To create scalable and flexible educational experiences for practitioners in all phases of a career, we turn to Massively Open Online Courses (MOOCs). We detail the design of a unique self-paced online course that incorporates a focus on parallel solutions, personalization, and hands-on practice to familiarize student-users with their target system. Course material is presented through the lens of common HPC use cases and the strategies for parallelizing them. Using personalized paths, we teach researchers how to recognize the alignment between scientific applications and traditional HPC use cases, so they can focus on learning the parallelization strategies key to their workplace success. At the conclusion of their learning path, students should be capable of achieving performance gains on their HPC system.
READ LESS

Summary

The High Performance Computing (HPC) community has spent decades developing tools that teach practitioners to harness the power of parallel and distributed computing. To create scalable and flexible educational experiences for practitioners in all phases of a career, we turn to Massively Open Online Courses (MOOCs). We detail the design...

READ MORE

Four-tap RF canceller evaluation for indoor in-band full-duplex wireless operation

Published in:
IEEE Radio and Wireless Symp., RWS 2017, 15-18 January 2017.

Summary

Analog self-interference mitigation techniques are currently being investigated in a variety of operational settings for In-Band Full-Duplex (IBFD) systems. The significant multipath effects of realistic environments, such as inside buildings, can severely limit performance. The influence of different transceiver parameters on the effectiveness of a four-tap RF canceller using a tapped delay line architecture was characterized with a set of indoor measurements. The prototype canceller yielded up to 30 dB of cancellation over bandwidths ranging from 10 to 120 MHz centered at 2.45 GHz, and produced a combined analog system isolation that reached above 85 dB.
READ LESS

Summary

Analog self-interference mitigation techniques are currently being investigated in a variety of operational settings for In-Band Full-Duplex (IBFD) systems. The significant multipath effects of realistic environments, such as inside buildings, can severely limit performance. The influence of different transceiver parameters on the effectiveness of a four-tap RF canceller using a...

READ MORE

Spatially-resolved individual particle spectroscopy using photothermal modulation of Mie scattering

Summary

We report a photothermal modulation of Mie scattering (PMMS) method that enables concurrent spatial and spectral discrimination of individual micron-sized particles. This approach provides a direct measurement of the "fingerprint" infrared absorption spectrum with the spatial resolution of visible light. Trace quantities (tens of picograms) of material were deposited onto an infrared transparent substrate and simultaneously illuminated by a wavelength-tunable intensity-modulated quantum cascade pump laser and a continuous-wave 532 nm probe laser. Absorption of the pump laser by the particles results in direct modulation of the scatter field of the probe laser. The probe light scattered from the interrogated region is imaged onto a visible camera, enabling simultaneous probing of spatially-separated individual particles. By tuning the wavelength of the pump laser, the IR absorption spectrum is obtained. Using this approach, we measured the infrared absorption spectra of individual 3 um PMMA and silica spheres. Experimental PMMS signal amplitudes agree with modeling using an extended version of the Mie scattering theory for particles on substrates, enabling the prediction of the PMMS signal magnitude based on the material and substrate properties.
READ LESS

Summary

We report a photothermal modulation of Mie scattering (PMMS) method that enables concurrent spatial and spectral discrimination of individual micron-sized particles. This approach provides a direct measurement of the "fingerprint" infrared absorption spectrum with the spatial resolution of visible light. Trace quantities (tens of picograms) of material were deposited onto...

READ MORE

Interactive synthesis of code-level security rules

Author:
Published in:
Thesis (M.S.)--Northeastern University, 2017.

Summary

Software engineers inadvertently introduce bugs into software during the development process and these bugs can potentially be exploited once the software is deployed. As the size and complexity of software systems increase, it is important that we are able to verify and validate not only that the software behaves as it is expected to, but also that it does not violate any security policies or properties. One of the approaches to reduce software vulnerabilities is to use a bug detection tool during the development process. Many bug detection techniques are limited by the burdensome and error prone process of manually writing a bug specification. Other techniques are able to learn specifications from examples, but are limited in the types of bugs that they are able to discover. This work presents a novel, general approach for synthesizing security rules for C code. The approach combines human knowledge with an interactive logic programming synthesis system to learn Datalog rules for various security properties. The approach has been successfully used to synthesize rules for three intraprocedural security properties: (1) out of bounds array accesses, (2) return value validation, and (3) double freed pointers. These rules have been evaluated on randomly generated C code and yield a 0% false positive rate and a 0%, 20%, and 0% false negative rate, respectively for each rule.
READ LESS

Summary

Software engineers inadvertently introduce bugs into software during the development process and these bugs can potentially be exploited once the software is deployed. As the size and complexity of software systems increase, it is important that we are able to verify and validate not only that the software behaves as...

READ MORE

Causal inference under network interference: a framework for experiments on social networks

Author:
Published in:
Thesis (Ph.D.)--Harvard University, 2017.

Summary

No man is an island, as individuals interact and influence one another daily in our society. When social influence takes place in experiments on a population of interconnected individuals, the treatment on a unit may affect the outcomes of other units, a phenomenon known as interference. This thesis develops a causal framework and inference methodology for experiments where interference takes place on a network of influence (i.e. network interference). In this framework, the network potential outcomes serve as the key quantity and flexible building blocks for causal estimands that represent a variety of primary, peer, and total treatment effects. These causal estimands are estimated via principled Bayesian imputation of missing outcomes. The theory on the unconfoundedness assumptions leading to simplified imputation highlights the importance of including relevant network covariates in the potential outcome model. Additionally, experimental designs that result in balanced covariates and sizes across treatment exposure groups further improve the causal estimate, especially by mitigating potential outcome model mis-specification. The true potential outcome model is not typically known in real-world experiments, so the best practice is to account for interference and confounding network covariates through both balanced designs and model-based imputation. A full factorial simulated experiment is formulated to demonstrate this principle by comparing performance across different randomization schemes during the design phase and estimators during the analysis phase, under varying network topology and true potential outcome models. Overall, this thesis asserts that interference is not just a nuisance for analysis but rather an opportunity for quantifying and leveraging peer effects in real-world experiments.
READ LESS

Summary

No man is an island, as individuals interact and influence one another daily in our society. When social influence takes place in experiments on a population of interconnected individuals, the treatment on a unit may affect the outcomes of other units, a phenomenon known as interference. This thesis develops a...

READ MORE