Publications
Tagged As
COVID-19 exposure notification in simulated real-world environments
Summary
Summary
Privacy-preserving contact tracing mobile applications, such as those that use the Google-Apple Exposure Notification (GAEN) service, have the potential to limit the spread of COVID-19 in communities, but the privacy-preserving aspects of the protocol make it difficult to assess the performance of the apps in real-world populations. To address this...
The Simulation of Automated Exposure Notification (SimAEN) Model
Summary
Summary
Automated Exposure Notication (AEN) was implemented in 2020 to supplement traditional contact tracing for COVID-19 by estimating "too close for too long" proximities of people using the service. AEN uses Bluetooth messages to privately label and recall proximity events, so that persons who were likely exposed to SARS-CoV-2 can take...
Adaptive stress testing: finding likely failure events with reinforcement learning
Summary
Summary
Finding the most likely path to a set of failure states is important to the analysis of safety critical systems that operate over a sequence of time steps, such as aircraft collision avoidance systems and autonomous cars. In many applications such as autonomous driving, failures cannot be completely eliminated due...
A quantitatively derived NMAC analog for smaller unmanned aircraft systems based on unmitigated collision risk
Summary
Summary
The capability to avoid other air traffic is a fundamental component of the layered conflict management system to ensure safe and efficient operations in the National Airspace System. The evaluation of systems designed to mitigate the risk of midair collisions of manned aircraft are based on large-scale modeling and simulation...
Predicting cognitive load and operational performance in a simulated marksmanship task
Summary
Summary
Modern operational environments can place significant demands on a service member's cognitive resources, increasing the risk of errors or mishaps due to overburden. The ability to monitor cognitive burden and associated performance within operational environments is critical to improving mission readiness. As a key step toward a field-ready system, we...
Vector antenna and maximum likelihood imaging for radio astronomy
Summary
Summary
Radio astronomy using frequencies less than ~100 MHz provides a window into non-thermal processes in objects ranging from planets to galaxies. Observations in this frequency range are also used to map the very early history of star and galaxy formation in the universe. Much effort in recent years has been...
Model of turn-on characteristics of InP-based Geiger-mode avalanche photodiodes suitable for circuit simulations
Summary
Summary
A model for the turn-on characteristics of separate-absorber-multiplier InP-based Geiger-mode Avalanche Photodiodes (APDs) has been developed. Verilog-A was used to implement the model in a manner that can be incorporated into circuit simulations. Rather than using SPICE elements to mimic the voltage and current characteristics of the APD, Verilog-A can...
Advisory services for user composition tools
Summary
Summary
We have developed an ontology based framework that evaluates compatibility between processing modules within an end user development framework, using MIT Lincoln Laboratory's Composable Analytics environment as a test case. In particular, we focus on inter-module semantic compatibility as well as compatibility between data and modules. Our framework includes a...
Wideband antenna array for simultaneous transmit and receive (STAR) applications
Summary
Summary
A wideband antenna array for Simultaneous Transmit and Receive (STAR) applications is presented. The design is comprised of a ring array of TEM horns, and a monocone at the array's center. When the array is phased with the first order circular mode, it is isolated from the monocone. Thus, the...
TCAS multiple threat encounter analysis
Summary
Summary
The recent development of high-fidelity U.S. airspace encounter models at Lincoln Laboratory has motivated a simulation study of the Traffic Alert and Collision Avoidance System (TCAS) multiple threat logic. We observed from archived radar data that while rarer than single-threat encounters, multiple threat encounters occur more frequently than originally expected...