Publications
Unmanned aircraft sense and avoid radar: surrogate flight testing performance evaluation
Summary
Summary
Unmanned aircraft systems (UAS) have proven to have distinct advantages compared to manned aircraft for a variety of tasks. Current airspace regulations require a capability to sense and avoid other aircraft to replace the ability of a pilot to see and avoid other traffic. A prototype phased-array radar was developed...
Development and use of a comprehensive humanitarian assessment tool in post-earthquake Haiti
Summary
Summary
This paper describes a comprehensive humanitarian assessment tool designed and used following the January 2010 Haiti earthquake. The tool was developed under Joint Task Force -- Haiti coordination using indicators of humanitarian needs to support decision making by the United States Government, agencies of the United Nations, and various non-governmental...
Robust keys from physical unclonable functions
Summary
Summary
Weak physical unclonable functions (PUFs) can instantiate read-proof hardware tokens (Tuyls et al. 2006, CHES) where benign variation, such as changing temperature, yields a consistent key, but invasive attempts to learn the key destroy it. Previous approaches evaluate security by measuring how much an invasive attack changes the derived key...
Digital pixel CMOS focal plane array with on-chip multiply accumulate units for low-latency image processing
Summary
Summary
A digital pixel CMOS focal plane array has been developed to enable low latency implementations of image processing systems such as centroid trackers, Shack-Hartman wavefront sensors, and Fitts correlation trackers through the use of in-pixel digital signal processing (DSP) and generic parallel pipelined multiply accumulate (MAC) units. Light intensity digitization...
Spectral subgraph detection with corrupt observations
Summary
Summary
Recent work on signal detection in graph-based data focuses on classical detection when the signal and noise are both in the form of discrete entities and their relationships. In practice, the relationships of interest may not be directly observable, or may be observed through a noisy mechanism. The effects of...
Wind Information Requirements for NextGen Applications - Phase 2 Final Report(7.63 MB)
Summary
Summary
Accurate wind information is of fundamental importance to some of the critical future air traffic concepts envisioned under the FAA’s Next Generation Air Transportation System (NextGen) initiative. In the first phase of this work, a Wind Information Analysis Framework was developed to help explore the relationship of wind information to...
Adaptive attacker strategy development against moving target cyber defenses
Summary
Summary
A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the...
Impact ionization in AlxGa1-xASySb1-y avalanche photodiodes
Summary
Summary
Avalanche photodiodes (APDs) have been fabricated in order to determine the impact ionization coefficients of electrons (alpha) and holes (beta) in AlxGa1-xAsySb1-y lattice matched to GaSb for three alloy compositions: (x=0.40, y=0.035), (x=0.55, y=0.045), and (x=0.65, y=0.054). The impact ionization coefficients were calculated from photomultiplication measurements made on specially designed...
LuminoCity: a 3D printed, illuminated city generated from LADAR data
Summary
Summary
In this work, we describe LuminoCity, a novel three-dimensional data display. A 3D printed model of Cambridge, MA was generated from LADAR data. A translucent plastic model was then cast from a mold of the 3D printed model. We developed a display system to project data onto the translucent model...
Strategic evolution of adversaries against temporal platform diversity active cyber defenses
Summary
Summary
Adversarial dynamics are a critical facet within the cyber security domain, in which there exists a co-evolution between attackers and defenders in any given threat scenario. While defenders leverage capabilities to minimize the potential impact of an attack, the adversary is simultaneously developing countermeasures to the observed defenses. In this...