Publications

Refine Results

(Filters Applied) Clear All

Towards the detection of aircraft icing conditions using operational dual-polarimetric radar

Published in:
7th European Conf. on Radar in Meteorology and Hydrology, ERAD, 25-29 June 2012.

Summary

In anticipation of the dual-polarimetric upgrade to the National Weather Service operational radar network (WSR-88D) research is being conducted to utilize this extensive new data source for remote aircraft icing detection. The first challenge is to accurately locate the melting layer. A new image-processing-based algorithm is proposed and demonstrated. The next challenge is to use the dual-polarimetric data above the melting level to distinguish regions containing super-cooled liquid water, which constitutes an aviation icing hazard, from regions of pure ice and snow. It has been well documented that the S-band dual-polarimetric radar signatures at individual range gates of super-cooled liquid water and ice crystals overlap significantly, complicating the identification of icing conditions using individual radar measurements. Recently several investigators have found that the aggregate characteristics of dual-polarimetric radar measurements over regions on the order of several kilometers show distinguishing features between regions containing super-cooled liquid and those with ice only. In this study, the features found in the literature are evaluated, extended and combined using a fuzzy-logic framework to provide an icing threat likelihood. The results of this new algorithm are computed using data collected in Colorado from the Colorado State University CHILL radar and the National Center for Atmospheric Research S-Pol radar (collectively called FRONT – The Front Range Observational Testbed) collected in the winter of 2010/2011 in coordination with the NASA Icing Remote Sensing System (NIRSS) and compared to pilot reports on approach or departure from nearby airports. The preliminary results look encouraging and will be presented. The ultimate goal is to produce an end-to-end algorithm to produce a reliable icing threat product that can then be combined with existing icing detection systems to improve their performance.
READ LESS

Summary

In anticipation of the dual-polarimetric upgrade to the National Weather Service operational radar network (WSR-88D) research is being conducted to utilize this extensive new data source for remote aircraft icing detection. The first challenge is to accurately locate the melting layer. A new image-processing-based algorithm is proposed and demonstrated. The...

READ MORE

Linear prediction modulation filtering for speaker recognition of reverberant speech

Published in:
Odyssey 2012, The Speaker and Language Recognition Workshop, 25-28 June 2012.

Summary

This paper proposes a framework for spectral enhancement of reverberant speech based on inversion of the modulation transfer function. All-pole modeling of modulation spectra of clean and degraded speech are utilized to derive the linear prediction inverse modulation transfer function (LP-IMTF) solution as a low-order IIR filter in the modulation envelope domain. By considering spectral estimation under speech presence uncertainty, speech presence probabilities are derived for the case of reverberation. Aside from enhancement, the LP-IMTF framework allows for blind estimation of reverberation time by extracting a minimum phase approximation of the short-time spectral channel impulse response. The proposed speech enhancement method is used as a front-end processing step for speaker recognition. When applied to the microphone condition of the NISTSRE 2010 with artificially added reverberation, the proposed spectral enhancement method yields significant improvements across a variety of performance metrics.
READ LESS

Summary

This paper proposes a framework for spectral enhancement of reverberant speech based on inversion of the modulation transfer function. All-pole modeling of modulation spectra of clean and degraded speech are utilized to derive the linear prediction inverse modulation transfer function (LP-IMTF) solution as a low-order IIR filter in the modulation...

READ MORE

The MITLL NIST LRE 2011 language recognition system

Summary

This paper presents a description of the MIT Lincoln Laboratory (MITLL) language recognition system developed for the NIST 2011 Language Recognition Evaluation (LRE). The submitted system consisted of a fusion of four core classifiers, three based on spectral similarity and one based on tokenization. Additional system improvements were achieved following the submission deadline. In a major departure from previous evaluations, the 2011 LRE task focused on closed-set pairwise performance so as to emphasize a system's ability to distinguish confusable language pairs. Results are presented for the 24-language confusable pair task at test utterance durations of 30, 10, and 3 seconds. Results are also shown using the standard detection metrics (DET, minDCF) and it is demonstrated the previous metrics adequately cover difficult pair performance. On the 30 s 24-language confusable pair task, the submitted and post-evaluation systems achieved average costs of 0.079 and 0.070 and standard detection costs of 0.038 and 0.033.
READ LESS

Summary

This paper presents a description of the MIT Lincoln Laboratory (MITLL) language recognition system developed for the NIST 2011 Language Recognition Evaluation (LRE). The submitted system consisted of a fusion of four core classifiers, three based on spectral similarity and one based on tokenization. Additional system improvements were achieved following...

READ MORE

A safety driven approach to the development of an airborne sense and avoid system

Published in:
AIAA Infotech at Aerospace Conf. and Exhibit, 19-21 June 2012.

Summary

Sense and avoid is the primary technical barrier to increased unmanned aircraft system airspace access. A safety assessment driven approach to sense and avoid system design and requirements validation is being employed to ensure safety and operational suitability. The foundation of this approach is a fast-time modeling and simulation architecture originally used to support the certification of the Traffic Alert and Collision Avoidance System. This paper describes the safety assessment methodology, including the architecture and evaluation metrics, and presents preliminary results for key system architecture and design tradeoffs.
READ LESS

Summary

Sense and avoid is the primary technical barrier to increased unmanned aircraft system airspace access. A safety assessment driven approach to sense and avoid system design and requirements validation is being employed to ensure safety and operational suitability. The foundation of this approach is a fast-time modeling and simulation architecture...

READ MORE

Microgrid study: energy security for DoD installations

Summary

Growing concerns about the vulnerability of the electric grid, uncertainty about the cost of oil, and an increase in the deployment of renewable generation on domestic military installations have all led the Department of Defense (DoD) to reconsider its strategy for providing energy security for critical domestic operations. Existing solutions typically use dedicated backup generators to service each critical load. For large installations, this can result in over 50 small generators, each servicing a low voltage feeder to an individual building. The system as a whole is typically not well integrated either internally, with nearby renewable assets, or to the larger external grid. As a result, system performance is not optimized for efficient, reactive, and sustainable operations across the installation in the event of a power outage or in response to periods of high stress on the grid. Recent advances in energy management systems and power electronics provide an opportunity to interconnect multiple sources and loads into an integrated system that can then be optimized for reliability, efficiency, and/or cost. These integrated energy systems, or microgrids, are the focus of this study. The study was performed with the goals of (1) achieving a better understanding of the current microgrid efforts across DoD installations, specifically those that were in place or underway by the end of FY11, (2) categorizing the efforts with a consistent typology based on common, measurable parameters, and (3) performing cost-benefit trades for different microgrid architectures. This report summarizes the results of several months of analysis and provides insight into opportunities for increased energy security, efficiency, and the incorporation of renewable and distributed energy resources into microgrids, as well as the factors that might facilitate or impede implementation.
READ LESS

Summary

Growing concerns about the vulnerability of the electric grid, uncertainty about the cost of oil, and an increase in the deployment of renewable generation on domestic military installations have all led the Department of Defense (DoD) to reconsider its strategy for providing energy security for critical domestic operations. Existing solutions...

READ MORE

Waveguide engineering for hybrid Si/III-V lasers and amplifiers

Published in:
CLEO: Conf. on Lasers and Electro-Optics, 6-11 June 2012.

Summary

Using adiabatic tapers, hybrid silicon / III-V lasers and amplifiers are integrated with conventional thin (t = 0.25 um) silicon waveguides. Amplifiers have ~12 dB intrachip gain, and similar lasers have thresholds of 35 mA.
READ LESS

Summary

Using adiabatic tapers, hybrid silicon / III-V lasers and amplifiers are integrated with conventional thin (t = 0.25 um) silicon waveguides. Amplifiers have ~12 dB intrachip gain, and similar lasers have thresholds of 35 mA.

READ MORE

Dynamical decoupling and dephasing in interacting two-level systems

Published in:
Phys. Rev. Lett., Vol. 109, No. 1, 6 June 2012, 010502.

Summary

We implement dynamical decoupling techniques to mitigate noise and enhance the lifetime of an entangled state that is formed in a superconducting flux qubit coupled to a microscopic two-level system. By rapidly changing the qubit's transition frequency relative to the two-level system, we realize a refocusing pulse that reduces dephasing due to fluctuations in the transition frequencies, thereby improving the coherence time of the entangled state. The coupling coherence is further enhanced when applying multiple refocusing pulses, in agreement with our 1/f noise model. The results are applicable to any two-qubit system with transverse coupling and they highlight the potential of decoupling techniques for improving two-qubit gate fidelities, an essential prerequisite for implementing fault-tolerant quantum computing.
READ LESS

Summary

We implement dynamical decoupling techniques to mitigate noise and enhance the lifetime of an entangled state that is formed in a superconducting flux qubit coupled to a microscopic two-level system. By rapidly changing the qubit's transition frequency relative to the two-level system, we realize a refocusing pulse that reduces dephasing...

READ MORE

Impact of semiconductor optical amplifiers in coherent down-conversion microwave photonic links

Published in:
CLEO: Conf. on Lasers and Electro-Optics, 6-11 June 2012.

Summary

We compare the impact of conventional semiconductor optical amplifiers (SOAs) and high linearity slab-coupled optical waveguide amplifiers (SCOWAs) on the SFDR of carrier-suppressed coherent down-conversion microwave photonic links.
READ LESS

Summary

We compare the impact of conventional semiconductor optical amplifiers (SOAs) and high linearity slab-coupled optical waveguide amplifiers (SCOWAs) on the SFDR of carrier-suppressed coherent down-conversion microwave photonic links.

READ MORE

A stochastic system for large network growth

Published in:
IEEE Signal Process. Lett., Vol. 19, No. 6, June 2012, pp. 356-359.

Summary

This letter proposes a new model for preferential attachment in dynamic directed networks. This model consists of a linear time-invariant system that uses past observations to predict future attachment rates, and an innovation noise process that induces growth on vertices that previously had no attachments. Analyzing a large citation network in this context, we show that the proposed model fits the data better than existing preferential attachment models. An analysis of the noise in the dataset reveals power-law degree distributions often seen in large networks, and polynomial decay with respect to age in the probability of citing yet-uncited documents.
READ LESS

Summary

This letter proposes a new model for preferential attachment in dynamic directed networks. This model consists of a linear time-invariant system that uses past observations to predict future attachment rates, and an innovation noise process that induces growth on vertices that previously had no attachments. Analyzing a large citation network...

READ MORE

Continuous security metrics for prevalent network threats - introduction and first four metrics

Summary

The goal of this work is to introduce meaningful security metrics that motivate effective improvements in network security. We present a methodology for directly deriving security metrics from realistic mathematical models of adversarial behaviors and systems and also a maturity model to guide the adoption and use of these metrics. Four security metrics are described that assess the risk from prevalent network threats. These can be computed automatically and continuously on a network to assess the effectiveness of controls. Each new metric directly assesses the effect of controls that mitigate vulnerabilities, continuously estimates the risk from one adversary, and provides direct insight into what changes must be made to improve security. Details of an explicit maturity model are provided for each metric that guide security practitioners through three stages where they (1) Develop foundational understanding, tools and procedures, (2) Make accurate and timely measurements that cover all relevant network components and specify security conditions to test, and (3) Perform continuous risk assessments and network improvements. Metrics are designed to address specific threats, maintain practicality and simplicity, and motivate risk reduction. These initial four metrics and additional ones we are developing should be added incrementally to a network to gradually improve overall security as scores drop to acceptable levels and the risks from associated cyber threats are mitigated.
READ LESS

Summary

The goal of this work is to introduce meaningful security metrics that motivate effective improvements in network security. We present a methodology for directly deriving security metrics from realistic mathematical models of adversarial behaviors and systems and also a maturity model to guide the adoption and use of these metrics...

READ MORE