Publications
Recommender systems for the Department of Defense and intelligence community
Summary
Summary
Recommender systems, which selectively filter information for users, can hasten analysts' responses to complex events such as cyber attacks. Lincoln Laboratory's research on recommender systems may bring the capabilities of these systems to analysts in both the Department of Defense and intelligence community.
Airspace flow rate forecast algorithms, validation, and implementation
Summary
Summary
This report summarizes work performed by MIT Lincoln Laboratory during the period 1 February 2015 - 30 November 2015 focused on developing and improving algorithms to estimate the impact of convective weather on air traffic flows. The core motivation for the work is the need to improve strategic traffic flow...
Photothermal speckle modulation for noncontact materials characterization
Summary
Summary
We have developed a noncontact, photothermal materials characterization method based on visible-light speckle imaging. This technique is applied to remotely measure the infrared absorption spectra of materials and to discriminate materials based on their thermal conductivities. A wavelength-tunable (7.5-8.7 um), intensity-modulated, quantum cascade pump laser and a continuous-wave 532 nm...
NetProf iOS pronunciation feedback demonstration
Summary
Summary
One of the greatest challenges for an adult learning a new language is gaining the ability to distinguish and produce foreign sounds. The US Government trains 3,600 enlisted soldiers a year at the Defense Language Institute Foreign Language Center (DLIFLC) in languages critical to national security, most of which are...
Analysis of factors affecting system performance in the ASpIRE challenge
Summary
Summary
This paper presents an analysis of factors affecting system performance in the ASpIRE (Automatic Speech recognition In Reverberant Environments) challenge. In particular, overall word error rate (WER) of the solver systems is analyzed as a function of room, distance between talker and microphone, and microphone type. We also analyze speech...
Assessing functional neural connectivity as an indicator of cognitive performance
Summary
Summary
Studies in recent years have demonstrated that neural organization and structure impact an individual's ability to perform a given task. Specifically, individuals with greater neural efficiency have been shown to outperform those with less organized functional structure. In this work, we compare the predictive ability of properties of neural connectivity...
Multimodal sparse coding for event detection
Summary
Summary
Unsupervised feature learning methods have proven effective for classification tasks based on a single modality. We present multimodal sparse coding for learning feature representations shared across multiple modalities. The shared representations are applied to multimedia event detection (MED) and evaluated in comparison to unimodal counterparts, as well as other feature...
Fast online learning of antijamming and jamming strategies
Summary
Summary
Competing Cognitive Radio Network (CCRN) coalesces communicator (comm) nodes and jammers to achieve maximal networking efficiency in the presence of adversarial threats. We have previously developed two contrasting approaches for CCRN based on multi-armed bandit (MAB) and Qlearning. Despite their differences, both approaches have shown to achieve optimal throughput performance...
The MITLL-AFRL IWSLT 2015 Systems
Summary
Summary
This report summarizes the MITLL-AFRL MT, ASR and SLT systems and the experiments run using them during the 2015 IWSLT evaluation campaign. We build on the progress made last year, and additionally experimented with neural MT, unknown word processing, and system combination. We applied these techniques to translating Chinese to...
Improved hidden clique detection by optimal linear fusion of multiple adjacency matrices
Summary
Summary
Graph fusion has emerged as a promising research area for addressing challenges associated with noisy, uncertain, multi-source data. While many ad-hoc graph fusion techniques exist in the current literature, an analytical approach for analyzing the fundamentals of the graph fusion problem is lacking. We consider the setting where we are...