Publications

Refine Results

(Filters Applied) Clear All

Multi-pitch estimation by a joint 2-D representation of pitch and pitch dynamics

Published in:
INTERSPEECH 2010, 11th Annual Conference of the International Speech Communication Association, 26-30 September 2010, pp. 645-648.

Summary

Multi-pitch estimation of co-channel speech is especially challenging when the underlying pitch tracks are close in pitch value (e.g., when pitch tracks cross). Building on our previous work, we demonstrate the utility of a two-dimensional (2-D) analysis method of speech for this problem by exploiting its joint representation of pitch and pitch-derivative information from distinct speakers. Specifically, we propose a novel multi-pitch estimation method consisting of 1) a data-driven classifier for pitch candidate selection, 2) local pitch and pitch-derivative estimation by k-means clustering, and 3) a Kalman filtering mechanism for pitch tracking and assignment. We evaluate our method on a database of all-voiced speech mixtures and illustrate its capability to estimate pitch tracks in cases where pitch tracks are separate and when they are close in pitch value (e.g., at crossings).
READ LESS

Summary

Multi-pitch estimation of co-channel speech is especially challenging when the underlying pitch tracks are close in pitch value (e.g., when pitch tracks cross). Building on our previous work, we demonstrate the utility of a two-dimensional (2-D) analysis method of speech for this problem by exploiting its joint representation of pitch...

READ MORE

Transcript-dependent speaker recognition using mixer 1 and 2

Published in:
INTERSPEECH 2010, 11th Annual Conference of the International Speech Communication Association, 26-30 September 2010, pp. 2102-2015.

Summary

Transcript-dependent speaker-recognition experiments are performed with the Mixer 1 and 2 read-transcription corpus using the Lincoln Laboratory speaker recognition system. Our analysis shows how widely speaker-recognition performance can vary on transcript-dependent data compared to conversational data of the same durations, given enrollment data from the same spontaneous conversational speech. A description of the techniques used to deal with the unaudited data in order to create 171 male and 198 female text-dependent experiments from the Mixer 1 and 2 read transcription corpus is given.
READ LESS

Summary

Transcript-dependent speaker-recognition experiments are performed with the Mixer 1 and 2 read-transcription corpus using the Lincoln Laboratory speaker recognition system. Our analysis shows how widely speaker-recognition performance can vary on transcript-dependent data compared to conversational data of the same durations, given enrollment data from the same spontaneous conversational speech. A...

READ MORE

A decision-theoretic approach to developing robust collision avoidance logic

Published in:
2010 13th Int. IEEE Annual Conf. on Intelligent Transportation Systems, 19-22 September 2010, pp. 1837-1842.

Summary

All large transport aircraft are required to be equipped with a collision avoidance system that instructs pilots how to maneuver to avoid collision with other aircraft. The uncertainty in the behavior of the intruding aircraft makes developing a robust collision avoidance logic challenging. This paper presents an automated approach for optimizing collision avoidance logic based on probabilistic models of aircraft behavior and a performance metric that balances the competing objectives of maximizing safety and minimizing alert rate. The approach involves framing the problem of collision avoidance as a Markov decision process that is solved using dynamic programming. Although this paper focuses on airborne collision avoidance for manned aircraft, the methods may be applied to collision avoidance for other categories of vehicles, both manned and unmanned.
READ LESS

Summary

All large transport aircraft are required to be equipped with a collision avoidance system that instructs pilots how to maneuver to avoid collision with other aircraft. The uncertainty in the behavior of the intruding aircraft makes developing a robust collision avoidance logic challenging. This paper presents an automated approach for...

READ MORE

Generating client workloads and high-fidelity network traffic for controllable, repeatable experiments in computer security

Published in:
13th Int. Symp. on Recent Advances in Intrusion Detection, 14 September 2010, pp. 218-237.

Summary

Rigorous scientific experimentation in system and network security remains an elusive goal. Recent work has outlined three basic requirements for experiments, namely that hypotheses must be falsifiable, experiments must be controllable, and experiments must be repeatable and reproducible. Despite their simplicity, these goals are difficult to achieve, especially when dealing with client-side threats and defenses, where often user input is required as part of the experiment. In this paper, we present techniques for making experiments involving security and client-side desktop applications like web browsers, PDF readers, or host-based firewalls or intrusion detection systems more controllable and more easily repeatable. First, we present techniques for using statistical models of user behavior to drive real, binary, GUI-enabled application programs in place of a human user. Second, we present techniques based on adaptive replay of application dialog that allow us to quickly and efficiently reproduce reasonable mock-ups of remotely-hosted applications to give the illusion of Internet connectedness on an isolated testbed. We demonstrate the utility of these techniques in an example experiment comparing the system resource consumption of a Windows machine running anti-virus protection versus an unprotected system.
READ LESS

Summary

Rigorous scientific experimentation in system and network security remains an elusive goal. Recent work has outlined three basic requirements for experiments, namely that hypotheses must be falsifiable, experiments must be controllable, and experiments must be repeatable and reproducible. Despite their simplicity, these goals are difficult to achieve, especially when dealing...

READ MORE

Assessment and interpretation of en route Weather Avoidance Fields from the Convective Weather Avoidance Model

Published in:
ATIO 2010: 10th AIAA Aviation Technology Integration and Operations Conf., 13-15 September 2010.

Summary

This paper presents the results of a study to quantify the performance of Weather Avoidance Fields in predicting the operational impact of convective weather on en route airspace. The Convective Weather Avoidance Model identifies regions of convective weather that pilots are likely to avoid based upon an examination of the planned and actual flight trajectories in regions of weather impact. From this model and a forecast of convective weather from the Corridor Integrated Weather System a probabilistic Weather Avoidance Field can be provided to automated decision support systems of the future impact of weather on the air traffic control system. This paper will present three alternative spatial filters for the Convective Weather Avoidance Model, quantify their performance, address deficiencies in performance, and suggest potential improvements by looking at the ATC environment and common situational awareness between the cockpit and air traffic control.
READ LESS

Summary

This paper presents the results of a study to quantify the performance of Weather Avoidance Fields in predicting the operational impact of convective weather on en route airspace. The Convective Weather Avoidance Model identifies regions of convective weather that pilots are likely to avoid based upon an examination of the...

READ MORE

An algorithm to identify robust convective weather avoidance polygons in en route airspace

Published in:
ATIO 2010: 10th AIAA Aviation Technology Integration and Operations Conf., 13-15 September 2010.

Summary

The paper describes an algorithm for constructing convective weather avoidance polygons. The algorithm combines weather avoidance fields (WAF) from the en route convective weather avoidance model (CWAM) with edges automatically detected in the echo tops field, clustering, convex hull fitting and wind data to build weather avoidance polygons. Results for 2 case days with significantly different weather patterns were classified and studied.
READ LESS

Summary

The paper describes an algorithm for constructing convective weather avoidance polygons. The algorithm combines weather avoidance fields (WAF) from the en route convective weather avoidance model (CWAM) with edges automatically detected in the echo tops field, clustering, convex hull fitting and wind data to build weather avoidance polygons. Results for...

READ MORE

Benefits assessment methodology for an air traffic control tower advanced automation system

Published in:
ATIO 2010: 10th AIAA Aviation Technology Integration and Operations Conf., 13-15 September 2010.

Summary

This paper presents a benefits assessment methodology for an air traffic control tower advanced automation system called the Tower Flight Data Manager (TFDM), which is being considered for development by the FAA to support NextGen operations. The standard FAA benefits analysis methodology is described, together with how it has been tailored to the TFDM application to help inform the development process and the business case for system deployment. Parts of the methodology are illustrated through data analysis and modeling, and insights are presented to help prioritize TFDM capability development.
READ LESS

Summary

This paper presents a benefits assessment methodology for an air traffic control tower advanced automation system called the Tower Flight Data Manager (TFDM), which is being considered for development by the FAA to support NextGen operations. The standard FAA benefits analysis methodology is described, together with how it has been...

READ MORE

On estimating mid-air collision risk

Published in:
ATIO 2010: 10th AIAA Aviation Technology Integration and Operations Conf., 13-15 September 2010.

Summary

Many aviation safety studies involve estimating near mid-air collision (NMAC) rate. In the past, it has been assumed that the probability that an NMAC leads to a mid-air collision is 0.1, but there has not yet been a comprehensive study to serve as a basis for this estimate. This paper explains how to use existing encounter models, a flight simulation framework, three-dimensional aircraft wireframe models, and surveillance data to estimate mid-air collision risk. The results show that 0.1 is an overly conservative estimate and that the true rate is likely to be an order of magnitude lower.
READ LESS

Summary

Many aviation safety studies involve estimating near mid-air collision (NMAC) rate. In the past, it has been assumed that the probability that an NMAC leads to a mid-air collision is 0.1, but there has not yet been a comprehensive study to serve as a basis for this estimate. This paper...

READ MORE

Machine learning in adversarial environments

Published in:
Mach. Learn., Vol. 81, No. 2, November 2010, pp. 115-119.

Summary

Whenever machine learning is used to prevent illegal or unsanctioned activity and there is an economic incentive, adversaries will attempt to circumvent the protection provided. Constraints on how adversaries can manipulate training and test data for classifiers used to detect suspicious behavior make problems in this area tractable and interesting. This special issue highlights papers that span many disciplines including email spam detection, computer intrusion detection, and detection of web pages deliberately designed to manipulate the priorities of pages returned by modern search engines. The four papers in this special issue provide a standard taxonomy of the types of attacks that can be expected in an adversarial framework, demonstrate how to design classifiers that are robust to deleted or corrupted features, demonstrate the ability of modern polymorphic engines to rewrite malware so it evades detection by current intrusion detection and antivirus systems, and provide approaches to detect web pages designed to manipulate web page scores returned by search engines. We hope that these papers and this special issue encourages the multidisciplinary cooperation required to address many interesting problems in this relatively new area including predicting the future of the arms races created by adversarial learning, developing effective long-term defensive strategies, and creating algorithms that can process the massive amounts of training and test data available for internet-scale problems.
READ LESS

Summary

Whenever machine learning is used to prevent illegal or unsanctioned activity and there is an economic incentive, adversaries will attempt to circumvent the protection provided. Constraints on how adversaries can manipulate training and test data for classifiers used to detect suspicious behavior make problems in this area tractable and interesting...

READ MORE

Traffic Management Advisor (TMA) weather integration

Published in:
MIT Lincoln Laboratory Report ATC-364

Summary

TCAS behavior in New England airspace is being monitored and analyzed, making use of an omni-directional 1030/1090 MHz receiver. The receiver system, located in Lexington, MA, and operated by M.I.T. Lincoln Laboratory, is used to record Resolution Advisories (RAs). Omni-directional receptions make it possible to examine the air-to-air messages exchanged between aircraft for coordination of RAs. Omni-directional reception rates are also being studied. THe results indicated the percentage of aircraft that are TCAS equipped and the percentage of received signals that originate from TCAS and other systems. A third aspect of the program evaluates the availablity of 1090 MHz Extended Squitter data for use in collision avoidance systems. Data is recorded continuously, and the busiest periods are selected for focused attention.
READ LESS

Summary

TCAS behavior in New England airspace is being monitored and analyzed, making use of an omni-directional 1030/1090 MHz receiver. The receiver system, located in Lexington, MA, and operated by M.I.T. Lincoln Laboratory, is used to record Resolution Advisories (RAs). Omni-directional receptions make it possible to examine the air-to-air messages exchanged...

READ MORE