Publications
Effects of humidity and surface on photoalignment of brilliant yellow
Summary
Summary
Controlling and optimising the alignment of liquid crystals is a crucial process for display application. Here, we investigate the effects of humidity and surface types on photoalignment of an azo-dye brilliant yellow (BY). Specifically, the effect of humidity on the photoalignment of BY was studied at the stage of substrate...
Use of Photoacoustic Excitation and Laser Vibrometry to Remotely Detect Trace Explosives
Summary
Summary
In this paper, we examine a laser-based approach to remotely initiate, measure, and differentiate acoustic and vibrational emissions from trace quantities of explosive materials against their environment. Using a pulsed ultraviolet laser (266 nm), we induce a significant (>100 Pa) photoacoustic response from small quantities of military-grade explosives. The photoacoustic signal...
Application of a resilience framework to military installations: a methodology for energy resilience business case decisions
Summary
Summary
The goal of the study was to develop and demonstrate an energy resilience framework at four DoD installations. This framework, predominantly focused on developing a business case, was established for broader application across the DoD. The methodology involves gathering data from an installation on critical energy load requirements, the energy...
Crosstalk characterization and mitigation in Geiger-mode avalanche photodiode arrays
Summary
Summary
Intra focal plane array (FPA) crosstalk is a primary development limiter of large, fine-pixel Geiger-mode avalanche photodiode (Gm-APD) arrays beyond 256×256 pixels. General analysis methods and results from MIT Lincoln Laboratory (MIT/LL) InP-based detector arrays will be presented.
Biomimetic antenna array using non-foster network to enhance directional sensitivity over broad frequency band
Summary
Summary
Biologically inspired antenna arrays that mimic the hearing mechanism of insects are called biomimetic antenna arrays (BMAAs). They are attractive for microwave applications, such as compact direction finding systems. Earlier, the BMAAs were designed for narrow frequency band phase enhancement, whereas we now propose to design them for use with...
Side channel authenticity discriminant analysis for device class identification
Summary
Summary
Counterfeit microelectronics present a significant challenge to commercial and defense supply chains. Many modern anti-counterfeit strategies rely on manufacturer cooperation to include additional identification components. We instead propose Side Channel Authenticity Discriminant Analysis (SICADA) to leverage physical phenomena manifesting from device operation to match suspect parts to a class of...
How deep neural networks can improve emotion recognition on video data
Summary
Summary
We consider the task of dimensional emotion recognition on video data using deep learning. While several previous methods have shown the benefits of training temporal neural network models such as recurrent neural networks (RNNs) on hand-crafted features, few works have considered combining convolutional neural networks (CNNs) with RNNs. In this...
The Offshore Precipitation Capability
Summary
Summary
In this work, machine learning and image processing methods are used to estimate radar-like precipitation intensity and echo top heights beyond the range of weather radar. The technology, called the Offshore Precipitation Capability (OPC), combines global lightning data with existing radar mosaics, five Geostationary Operational Environmental Satellite (GOES) channels, and...
Enhancing HPC security with a user-based firewall
Summary
Summary
High Performance Computing (HPC) systems traditionally allow their users unrestricted use of their internal network. While this network is normally controlled enough to guarantee privacy without the need for encryption, it does not provide a method to authenticate peer connections. Protocols built upon this internal network, such as those used...
High-throughput ingest of data provenance records in Accumulo
Summary
Summary
Whole-system data provenance provides deep insight into the processing of data on a system, including detecting data integrity attacks. The downside to systems that collect whole-system data provenance is the sheer volume of data that is generated under many heavy workloads. In order to make provenance metadata useful, it must...