Publications
Feature forwarding for efficient single image dehazing
Summary
Summary
Haze degrades content and obscures information of images, which can negatively impact vision-based decision-making in real-time systems. In this paper, we propose an efficient fully convolutional neural network (CNN) image dehazing method designed to run on edge graphical processing units (GPUs). We utilize three variants of our architecture to explore...
Collaborative and passive channel gain estimation in fading environments
Summary
Summary
Dynamic spectrum access techniques are typically aided by knowledge of the wireless channel gains among participating radios, as this knowledge allows the potential interference impact of any radio's transmissions on its neighbors to be quantified. We present a technique for collaborative inference of the channel gains which relies solely on...
Discriminative PLDA for speaker verification with X-vectors
Summary
Summary
This paper proposes a novel approach to discriminative training ofprobabilistic linear discriminant analysis (PLDA) for speaker veri-fication with x-vectors. The Newton Method is used to discrimi-natively train the PLDA model by minimizing the log loss of ver-ification trials. By diagonalizing the across-class and within-classcovariance matrices as a pre-processing step, the...
AI enabling technologies: a survey
Summary
Summary
Artificial Intelligence (AI) has the opportunity to revolutionize the way the United States Department of Defense (DoD) and Intelligence Community (IC) address the challenges of evolving threats, data deluge, and rapid courses of action. Developing an end-to-end artificial intelligence system involves parallel development of different pieces that must work together...
Banshee distribution network benchmark and prototyping platform for hardware-in-the-loop integration of microgrid and device controllers
Summary
Summary
This article provides a unique benchmark to integrate and systematically evaluate advanced functionalities of microgrid and downstream device controllers. The article describes Banshee, a real-life power distribution network. It also details a real-time controller hardware-in-the-loop (HIL) prototyping platform to test the responses of the controllers and verify decision-making algorithms. The...
A neural network approach for waveform generation and selection with multi-mission radar
Summary
Summary
Nonlinear frequency modulated (NLFM) pulse compression waveforms have become a mainstream methodology for radars across multiple sectors and missions, including weather observation, target tracking, and target detection. NLFM affords the ability to generate a low-sidelobe autocorrelation function and matched filter while avoiding aggressive amplitude modulation, resulting in more power incident...
Modular Aid and Power Pallet (MAPP): FY18 Energy Technical Investment Program
Summary
Summary
Electric power is a critical element of rapid response disaster relief efforts. Generators currently used have high failure rates and require fuel supply chains, and standardized renewable power systems are not yet available. In addition, none of these systems are designed for easy adaptation or repairs in the field to...
Security considerations for next-generation operating systems for cyber-physical systems
Summary
Summary
Cyber-physical systems (CPSs) are increasingly targeted in high-profile cyber attacks. Examples of such attacks include Stuxnet, which targeted nuclear centrifuges; Crashoverride, and Triton, which targeted power grids; and the Mirai botnet, which targeted internet-of-things (IoT) devices such as cameras to carry out a large-scale distributed denial-of-service (DDoS) attack. Such attacks...
CW radar operation in the focused near-field
Summary
Summary
In this paper we will show by computer simulation and by measurements that the horn antennas of a bi-static radar operating in the near-field have a distinct maximum at a non-zero range. By focusing the antennas on this hot spot a low-powered, continuous-wave Ku-band radar could detect flying mosquitoes at...
Design and analysis framework for trusted and assured microelectronics
Summary
Summary
An in-depth understanding of microelectronics assurance in Department of Defense (DoD) missions is increasingly important as the DoD continues to address supply chain challenges. Many studies take a "bottom-up" approach, in which vulnerabilities are assessed in terms of general-purpose usage. This is beneficial in developing a general knowledge foundation. However...