Publications
The directivity of a Yagi-Uda antenna from an effective propagation constant
Summary
Summary
A technique is presented for determining the directivity of a long, uniform Yagi-Uda antenna. It is shown that the maximum directivity is limited by the propagation constant of the particular antenna structure. The propagation constant can be determined by means of a two-part antenna test fixture with M and M...
Leading the charge - microgrids for domestic military installations
Summary
Summary
In today's interconnected battlefield, our war fighters are increasingly reliant on capabilities at domestic military installations to support critical missions, often in near real time. Many of the domestic installations of the U.S. Department of Defense (DoD) also support everything from sensitive research and development facilities such as microelectronics and...
A tunable AC atom interferometer magnetometer
Summary
Summary
We demonstrate an atom interferometer designed to measure magnetic fields and field gradients. Here, we study various pulse sequences and show how they can be manipulated to filter unwanted frequencies and to enhance desired frequencies.
Estimation of Causal Peer Influence Effects
Summary
Summary
The broad adoption of social media has generated interest in leveraging peer influence for inducing desired user behavior. Quantifying the causal effect of peer influence presents technical challenges, however, including how to deal with social interference, complex response functions and network uncertainty. In this paper, we extend potential outcomes to...
Wind-shear detection performance study for multifunction phased array radar (MPAR) risk reduction
Summary
Summary
Multifunction phased array radars (MPARs) of the future that may replace the current terminal wind-shear detection systems will need to meet the Federal Aviation Administration's (FAA) detection requirements. Detection performance issues related to on-airport siting of MPAR, its broader antenna beamwidth relative to the TDWR, and the change in operational...
Sector workload model for benefits analysis and convective weather capacity prediction
Summary
Summary
En route sector capacity is determined mainly by controller workload. The operational capacity model used by the Federal Aviation Administration (FAA) provides traffic alert thresholds based entirely on hand-off workload. Its estimates are accurate for most sectors. However, it tends to over-estimate capacity in both small and large sectors because...
Efficient anomaly detection in dynamic, attributed graphs: emerging phenomena and big data
Summary
Summary
When working with large-scale network data, the interconnected entities often have additional descriptive information. This additional metadata may provide insight that can be exploited for detection of anomalous events. In this paper, we use a generalized linear model for random attributed graphs to model connection probabilities using vertex metadata. For...
Single event transients in digital CMOS - a review
Summary
Summary
The creation of soft errors due to the propagation of single event transients (SETs) is a significant reliability challenge in modern CMOS logic. SET concerns continue to be exacerbated by Moore's Law technology scaling. This paper presents a review of digital single event transient research, including: a brief historical overview...
An assessment of the operational utility of a GOES lightning mapping sensor
Summary
Summary
This report evaluates the incremental operational benefits of a proposed Lightning Mapping Sensor (LMS) for NOAA's Geostationary Operational Environmental Satellites (GOES). If deployed, LMS would provide continuous, real-time surveillance of total lightning activity over large portions of the North and South American continents and surrounding oceans. In contrast to the...
Probabilistic threat propagation for malicious activity detection
Summary
Summary
In this paper, we present a method for detecting malicious activity within networks of interest. We leverage prior community detection work by propagating threat probabilities across graph nodes, given an initial set of known malicious nodes. We enhance prior work by employing constraints which remove the adverse effect of cyclic...