scispace - formally typeset
Search or ask a question

Showing papers by "Mitre Corporation published in 2013"


Journal ArticleDOI
TL;DR: It is shown that Synchrosqueezing is robust to bounded perturbations of the signal and to Gaussian white noise, which justifies its applicability to noisy or nonuniformly sampled data that is ubiquitous in engineering and the natural sciences.

444 citations


Journal ArticleDOI
TL;DR: In this article, an unsupervised outlier detection approach for wireless sensor networks is proposed, which is flexible with respect to the outlier definition and uses only single-hop communication, thus permitting very simple node failure detection and message reliability assurance mechanisms.
Abstract: To address the problem of unsupervised outlier detection in wireless sensor networks, we develop an approach that (1) is flexible with respect to the outlier definition, (2) computes the result in-network to reduce both bandwidth and energy consumption, (3) uses only single-hop communication, thus permitting very simple node failure detection and message reliability assurance mechanisms (e.g., carrier-sense), and (4) seamlessly accommodates dynamic updates to data. We examine performance by simulation, using real sensor data streams. Our results demonstrate that our approach is accurate and imposes reasonable communication and power consumption demands.

217 citations


Journal ArticleDOI
TL;DR: Analyzing millisecond-scale data for the world's largest and most powerful techno-social system, the global financial market, it is uncovered an abrupt transition to a new all-machine phase characterized by large numbers of subsecond extreme events.
Abstract: Society's techno-social systems are becoming ever faster and more computer-orientated. However, far from simply generating faster versions of existing behaviour, we show that this speed-up can generate a new behavioural regime as humans lose the ability to intervene in real time. Analyzing millisecond-scale data for the world's largest and most powerful techno-social system, the global financial market, we uncover an abrupt transition to a new all-machine phase characterized by large numbers of subsecond extreme events. The proliferation of these subsecond events shows an intriguing correlation with the onset of the system-wide financial collapse in 2008. Our findings are consistent with an emerging ecology of competitive machines featuring ‘crowds' of predatory algorithms, and highlight the need for a new scientific theory of subsecond financial phenomena.

132 citations


Proceedings ArticleDOI
TL;DR: A multi-modal (hyperspectral, multispectral and LIDAR) imaging data collection campaign was conducted just south of Rochester New York in Avon, NY on September 20, 2012 by the Rochester Institute of Technology (RIT) in conjunction with SpecTIR, LLC, the Air Force Research Lab (AFRL), the Naval Research Lab(NRL), United Technologies Aerospace Systems (UTAS) and MITRE as discussed by the authors.
Abstract: A multi-modal (hyperspectral, multispectral, and LIDAR) imaging data collection campaign was conducted just south of Rochester New York in Avon, NY on September 20, 2012 by the Rochester Institute of Technology (RIT) in conjunction with SpecTIR, LLC, the Air Force Research Lab (AFRL), the Naval Research Lab (NRL), United Technologies Aerospace Systems (UTAS) and MITRE. The campaign was a follow on from the SpecTIR Hyperspectral Airborne Rochester Experiment (SHARE) from 2010. Data was collected in support of the eleven simultaneous experiments described here. The airborne imagery was collected over four different sites with hyperspectral, multispectral, and LIDAR sensors. The sites for data collection included Avon, NY, Conesus Lake, Hemlock Lake and forest, and a nearby quarry. Experiments included topics such as target unmixing, subpixel detection, material identification, impacts of illumination on materials, forest health, and in-water target detection. An extensive ground truthing effort was conducted in addition to collection of the airborne imagery. The ultimate goal of the data collection campaign is to provide the remote sensing community with a shareable resource to support future research. This paper details the experiments conducted and the data that was collected during this campaign.

111 citations


Journal ArticleDOI
TL;DR: A queuing network model is introduced that can comprehensively represent traffic flow dynamics and flow management capabilities in the U.S. National Airspace System and is expected to serve as a critical piece of a strategic flow contingency management solution for the Next Generation Air Traffic System (NextGen).
Abstract: We introduce a queuing network model that can comprehensively represent traffic flow dynamics and flow management capabilities in the U.S. National Airspace System (NAS). We envision this model as a framework for tractably evaluating and designing coordinated flow management capabilities at a multi-Center or even NAS-wide spatial scale and at a strategic (2-15 h) temporal horizon. As such, the queuing network model is expected to serve as a critical piece of a strategic flow contingency management solution for the Next Generation Air Traffic System (NextGen). Based on this perspective, we outline, in some detail, the evaluation and design tasks that can be performed using the model, as well as the construction of the flow network underlying the model. Finally, some examples are presented, including one example that replicates traffic in Atlanta Center on an actual bad-weather day, to illustrate simulation of the model and interpretation/use of model outputs.

55 citations


Journal ArticleDOI
TL;DR: Experimental results suggest approximately 90% of residual identifiers can be effectively concealed by the HIPS approach in text containing average and high densities of personal identifying information, which suggests HIPS is feasible, but requires further evaluation.

54 citations


Journal ArticleDOI
TL;DR: In this paper, the theoretical underpinnings and preliminary experimental support for option awareness (OA) were described, which is the perception and comprehension of the relative desirability of available optio...
Abstract: This article describes the theoretical underpinnings and preliminary experimental support for option awareness (OA): the perception and comprehension of the relative desirability of available optio...

48 citations


Proceedings ArticleDOI
04 Nov 2013
TL;DR: To fix the untrustworthy CRTM, an open source "TPM-timing-based attestation" implementation was ported from running in the Windows kernel, to running in an OEM's BIOS and SMRAM, which created a new, stronger CRTM that detects tick, flea, and other malware embedded in the BIOS.
Abstract: In this paper we look at the implementation of the Core Root of Trust for Measurement (CRTM) from a Dell Latitude E6400 laptop. We describe how the implementation of the CRTM on this system doesn't meet the requirements set forth by either the Trusted Platform Module(TPM)PC client specification or NIST 800-155 guidance. We show how novel tick malware, a 51 byte patch to the CRTM, can replay a forged measurement to the TPM, falsely indicating that the BIOS is pristine. This attack is broadly applicable, because all CRTMs we have seen to date are rooted in mutable firmware. We also show how flea malware can survive attempts to reflash infected firmware with a clean image. To fix the untrustworthy CRTM we ported an open source "TPM-timing-based attestation" implementation from running in the Windows kernel, to running in an OEM's BIOS and SMRAM. This created a new, stronger CRTM that detects tick, flea, and other malware embedded in the BIOS. We call our system "BIOS Chronomancy", and we show that it works in a real vendor BIOS, with all the associated complexity, rather than in a simplified research environment.

46 citations


Journal ArticleDOI
TL;DR: In this paper, the authors employ a new modeling approach for bat migration, network modeling, to simulate migratory routes between winter habitat in southern Mexico and summer breeding habitat in northern Mexico and the southwestern United States.
Abstract: The migration of animals across long distances and between multiple habitats presents a major challenge for conservation. For the migratory Mexican free-tailed bat (Tadarida brasiliensis mexicana), these challenges include identifying and protecting migratory routes and critical roosts in two countries, the United States and Mexico. Knowledge and conservation of bat migratory routes is critical in the face of increasing threats from climate change and wind turbines that might decrease migratory survival. We employ a new modeling approach for bat migration, network modeling, to simulate migratory routes between winter habitat in southern Mexico and summer breeding habitat in northern Mexico and the southwestern United States. We use the model to identify key migratory routes and the roosts of greatest conservation value to the overall population. We measure roost importance by the degree to which the overall bat population declined when the roost was removed from the model. The major migratory routes—those with the greatest number of migrants—were between winter habitat in southern Mexico and summer breeding roosts in Texas and the northern Mexican states of Sonora and Nuevo Leon. The summer breeding roosts in Texas, Sonora, and Nuevo Leon were the most important for maintaining population numbers and network structure - these are also the largest roosts. This modeling approach contributes to conservation efforts by identifying the most influential areas for bat populations, and can be used to as a tool to improve our understanding of bat migration for other species. We anticipate this approach will help direct coordination of habitat protection across borders.

43 citations


Journal ArticleDOI
TL;DR: A diverse bacterial background present on aircraft is revealed, including bacteria closely related to pathogens of public health concern and this aircraft background is different from outdoor air, suggesting different probes may be needed to detect airborne contaminants to achieve minimal false alarm rates.
Abstract: Air travel can rapidly transport infectious diseases globally. To facilitate the design of biosensors for infectious organisms in commercial aircraft, we characterized bacterial diversity in aircraft air. Samples from 61 aircraft high-efficiency particulate air (HEPA) filters were analyzed with a custom microarray of 16S rRNA gene sequences (PhyloChip), representing bacterial lineages. A total of 606 subfamilies from 41 phyla were detected. The most abundant bacterial subfamilies included bacteria associated with humans, especially skin, gastrointestinal and respiratory tracts, and with water and soil habitats. Operational taxonomic units that contain important human pathogens as well as their close, more benign relatives were detected. When compared to 43 samples of urban outdoor air, aircraft samples differed in composition, with higher relative abundance of Firmicutes and Gammaproteobacteria lineages in aircraft samples, and higher relative abundance of Actinobacteria and Betaproteobacteria lineages in outdoor air samples. In addition, aircraft and outdoor air samples differed in the incidence of taxa containing human pathogens. Overall, these results demonstrate that HEPA filter samples can be used to deeply characterize bacterial diversity in aircraft air and suggest that the presence of close relatives of certain pathogens must be taken into account in probe design for aircraft biosensors. Practical Implications A biosensor that could be deployed in commercial aircraft would be required to function at an extremely low false alarm rate, making an understanding of microbial background important. This study reveals a diverse bacterial background present on aircraft, including bacteria closely related to pathogens of public health concern. Furthermore, this aircraft background is different from outdoor air, suggesting different probes may be needed to detect airborne contaminants to achieve minimal false alarm rates. This study also indicates that aircraft HEPA filters could be used with other molecular techniques to further characterize background bacteria and in investigations in the wake of a disease outbreak.

41 citations


Journal ArticleDOI
TL;DR: The cyber-wargame was designed to test a dynamic network defense cyber-security platform being researched in The MITRE Corporation's Innovation Program called Blackjack, and to investigate the utility of using denial and deception to enhance the defense of information in command and control systems.

Journal ArticleDOI
TL;DR: The changes in gene expression observed in the worms following exposure to dichlorvos point towards two potential mechanisms of toxicity: inhibition of AChE and mitochondrial disruption.
Abstract: The principal toxicity of acute organophosphate (OP) pesticide poisoning is the disruption of neurotransmission through inhibition of acetylcholinesterase (AChE). However, other mechanisms leading to persistent effects and neurodegeneration remain controversial and difficult to detect. Because Caenorhabditis elegans is relatively resistant to OP lethality—particularly through the inhibition of AChE—studies in this nematode provide an opportunity to observe alterations in global gene expression following OP exposure that cannot be readily observed in less resistant organisms. We exposed cultures of worms in axenic, defined medium to dichlorvos under three exposure protocols. In the first, worms were exposed continuously throughout the experiment. In the second and third, the worms were exposed for either 2 or 8 h, the dichlorvos was washed out of the culture, and the worms were allowed to recover. We then analyzed gene expression using whole genome microarrays from RNA obtained from worms sampled at multiple time points throughout the exposure. The worms showed a time-dependent increase in the expression of genes involved in stress responses. Early in the exposure, the predominant effect was on metabolic processes, while at later times, an immune-like response and cellular repair mechanisms dominated the expression pattern. Following removal of dichlorvos, the gene expression in the worms appeared to relatively rapidly return to steady-state levels. The changes in gene expression observed in the worms following exposure to dichlorvos point towards two potential mechanisms of toxicity: inhibition of AChE and mitochondrial disruption.

Proceedings ArticleDOI
03 Jun 2013
TL;DR: Remora, a smartphone-based Body Sensor Network activity recognition system which shares sensing resources among neighboring BSNs, provides both increased accuracy and significant energy savings and provides a lightweight and collaborative classification approach.
Abstract: In many body sensor network (BSN) applications, such as activity recognition for assisted living residents or physical fitness assessment of a sports team, users spend a significant amount of time with one another while performing many of the same activities. We exploit this physical proximity with Remora, a smartphone-based Body Sensor Network activity recognition system which shares sensing resources among neighboring BSNs. Compared to other resource sharing approaches, Remora provides both increased accuracy and significant energy savings. To increase classification accuracy, Remora BSNs share sensors by overhearing neighbors' sensor data transmissions. When sharing, fewer on-body sensors are needed to achieve high accuracy, resulting in energy savings by turning off unneeded sensors. To save phone energy, neighboring BSNs share classifiers: only one classifier is active at a time classifying activities for all neighbors. Remora addresses three major challenges of sharing with physical neighbors: 1) Sharing only when the energy benefit outweighs the cost, 2) Finding and utilizing the shared sensors and classifiers which produce the best combination of accuracy improvement and energy savings, and 3) Providing a lightweight and collaborative classification approach, without the use of a backend server, which adapts to the dynamics of available neighbors. In a two week evaluation with 6 subjects, we show that Remora provides up to a 30% accuracy increase while extending phone battery lifetime by over 65%.

Journal ArticleDOI
TL;DR: Traditional digital forensic techniques are applied to remotely monitor and audit Android smartphones and the results are promising that the developed detection techniques identify changes to important system partitions; recognize file system changes; and find persistence and triggering mechanisms in newly installed applications.

Journal ArticleDOI
TL;DR: In this article, the authors draw on empirical data to develop a conceptual framework characterizing dimensions of interorganizational complexity and domains of response coordination through which emergency managers articulate large-scale response efforts.
Abstract: Large-scale emergency response requires management of collaborative networks that stretch across government agencies and levels, and that include nonprofit and private organizations. Management of such collaborative networks has been recognized as a research area in need of further study. Inter-organizational complexities associated with these collaborative networks give rise to unanticipated contingencies that compound issues directly associated with an emergency itself. Planning for such response is therefore intrinsically limited, and emergency managers must bridge the gaps via articulation practices in real-time. In this paper, the authors draw on empirical data to develop a conceptual framework characterizing dimensions of inter-organizational complexity and domains of response coordination through which emergency managers articulate large-scale response efforts. The framework is illustrated with examples of state-level emergency managers articulating threads of networked response efforts concurrentl...

Journal ArticleDOI
11 Nov 2013
TL;DR: In this Commentary, the features of this episode of gun violence that has sparked strong reactions and energized discourse that may ultimately lead toward constructive solutions to diminish high rates of firearm deaths and injuries in the United States are examined.
Abstract: Among rampage shooting massacres, the Sandy Hook Elementary School shooting on December 14, 2012 galvanized public attention. In this Commentary we examine the features of this episode of gun violence that has sparked strong reactions and energized discourse that may ultimately lead toward constructive solutions to diminish high rates of firearm deaths and injuries in the United States.

Journal ArticleDOI
TL;DR: The human annotation effort needed to produce a system that de-identifies at high accuracy using the MIST framework is quantified, suggesting that the wider variety and contexts for protected health information in social work notes is more difficult to model.

Patent
27 Jun 2013
TL;DR: In this paper, the authors present system, method, and computer program product embodiment for adapting to malware activity on a compromised computer system, and a plurality of response mechanisms are provided.
Abstract: Disclosed herein are system, method, and computer program product embodiments for adapting to malware activity on a compromised computer system. An embodiment operates by detecting an adversary operating malware on a compromised system. A stream of network communications associated with adversary is intercepted. The stream of network communications includes a command and control channel of the adversary. The stream of network communications is accessed. An emulation of the command and control channel is provided. An analysis of the accessed stream of traffic is executed. A plurality of response mechanisms is provided. The plurality of response mechanisms is based in part on the analysis of the stream of network communications and a custom policy language tailored for the malware.

Proceedings ArticleDOI
07 Jan 2013
TL;DR: This paper concludes with descriptions of each of the best practices derived from the model program, meant to be a standalone section that readers can detach and incorporate into their insider threat mitigation program guidance.
Abstract: Based on experiences with different organizations having insider threat programs, the components needed for an insider threat auditing and mitigation program and methods of program validation that agencies can use when both initiating a program and reviewing an existing program has been described. This paper concludes with descriptions of each of the best practices derived from the model program. This final section is meant to be a standalone section that readers can detach and incorporate into their insider threat mitigation program guidance.

Journal ArticleDOI
S.R. Best1
TL;DR: In this paper, the authors presented a formula for the realized noise figure of the general receiving antenna expressed as a function of the antenna's radiation efficiency and impedance mismatch loss, for the situations where the antenna is connected to a receiving system at a noise temperature of T 0 as well as a general noise temperature Tr.
Abstract: In discussions of antenna noise figure, the effect of antenna impedance mismatch is often neglected or not correctly accounted for. Antenna impedance mismatch can degrade signal-to-noise ratio, even with a lossless antenna, particularly when the received signal and/or the received external noise powers approach the receiver's noise floor. This letter presents a formula for the realized noise figure of the general receiving antenna expressed as a function of the antenna's radiation efficiency and impedance mismatch loss. This realized noise figure is defined for the situations where the antenna is connected to a receiving system at a noise temperature of T0 as well as a general noise temperature Tr. This formula for realized antenna noise figure allows the antenna engineer to understand how the antenna design, particularly the tradeoffs between impedance matching and radiation efficiency, affect the signal-to-noise ratio performance in the general receiving system.

Journal ArticleDOI
TL;DR: In this paper, a simplified, closed-form string stability analysis for a time-history speed control law, which has been proposed for interval management, is presented, and simulation results are used to evaluate string behavior and system performance for an approach-spacing operation.
Abstract: Interval Management (IM) is a concept being developed as a part of the Next Generation Air Transportation System (NextGen) and Single European Sky ATM Research (SESAR). The objective of Interval Management is to achieve a more precise spacing interval between an IM aircraft and an assigned target aircraft. Speed commands, calculated by avionics onboard the IM aircraft using state information from the target aircraft received by ADS-B, are implemented by the IM aircraft in order to achieve a desired spacing interval relative to its target aircraft. In some IM operations, it is expected that a string of IM aircraft will be formed, where each aircraft is spacing relative to its immediately preceding aircraft. In the design of a speed control law that calculates speed commands for the IM aircraft, one must not only examine the performance and stability of one aircraft relative to another, but also the performance and stability of the entire string. String behavior fundamentally affects the potential operational practicality of successfully implementing Interval Management in certain environments. This paper presents a simplified, closed-form string stability analysis for a time-history speed control law, which has been proposed for Interval Management. Simulation results are shown to validate the closed-form analysis and are used to evaluate string behavior and system performance for an approach-spacing operation.

Proceedings ArticleDOI
15 Apr 2013
TL;DR: This paper presents the results of an exploratory investigation of SSE as an integral element of SoS SE, and observations and challenges are discussed, including whether and how guidelines and practices for SSE at the individual or constituent system level can be extended to the ensemble of systems that collectively create an SoS capability.
Abstract: Systems engineering (SE) of defense systems and critical infrastructure must incorporate consideration of threats and vulnerabilities to malicious subversion into the engineering requirements, architecture, and design processes. Recognizing this need, the United States Department of Defense recently revitalized its system security engineering (SSE) efforts by extending its program protection processes to apply SSE principles and body of knowledge to defense acquisition programs [1]. At the same time, a growing number of military capabilities are being fielded through system of systems (SoS) approaches which are not necessarily managed under formal acquisition processes. This trend is expected to continue. Recognizing this trend, several years ago the DoD undertook an initiative to develop initial guidance on the system engineering of SoS [3]. In the ensuing years, a companion body of knowledge has been developed [4]. More recently, the importance and the challenges of applying SSE beyond individual systems to SoS has been recognized [4]. The question arises, “what does or should SSE look like in an SoS environment?” This paper presents the results of an exploratory investigation of SSE as an integral element of SoS SE. Defense-based approaches to SoS SE are reviewed and logical extensions to address SSE for SoS and program protection are described within an SoS SE framework. The results of case studies exploring how SoS currently address security at the SoS level are presented. Finally, observations and challenges are discussed, including whether and how guidelines and practices for SSE at the individual or constituent system level can be extended to the ensemble of systems that collectively create an SoS capability.

Patent
25 Oct 2013
TL;DR: In this article, the authors compare behavior between multiple users of social media services to determine coordinated activity, and use an index to extract uncommon features from social media messages to detect collisions between users when their messages have the same uncommon feature.
Abstract: The described systems and methods compare behavior between multiple users of social media services to determine coordinated activity. An index is created and used to extract uncommon features from social media messages. A collision between users is detected when their messages have the same uncommon feature. A number and/or frequency of collisions may indicate a probability that users are engaged in coordinated activity. A comparison of user accounts with multiple collisions may be executed to identify similar content as coordinated activity. A visualization tool constructs a network graph that shows relationships between users in social networks, and can be used to discover coordinated users engaged in misuse of social media.

Proceedings ArticleDOI
Hunter Kopald1, Ari Chanen1, Shuo Chen1, Elida C. Smith1, Robert M. Tarakan1 
01 Oct 2013
TL;DR: This paper describes how automatic speech recognition can be used in the ATC domain, the characteristics of the automatic Speech Recognition process and the A TC domain that make the problem unique, and the engineering process for effectively applying automaticspeech recognition to ATC systems.
Abstract: Controller-pilot voice communications are a critical component of the Air Traffic Control (ATC) system, but outside of the human listening and responding that occurs with each transmission, they are an underutilized source of information for automation systems in the ATC domain. Automatic speech recognition is a continuously improving technology that can be used to tap into this information source for potential system benefits in a variety of ATC applications, such as monitoring live operations for safety benefit, conducting analysis on large quantities of recorded controller-pilot speech, or enabling automated simulation pilots to facilitate training and Human-in-the-Loop (HITL) simulation experiments. This paper describes how automatic speech recognition can be used in the ATC domain, the characteristics of the automatic speech recognition process and the ATC domain that make the problem unique, and the engineering process for effectively applying automatic speech recognition to ATC systems.

Patent
25 Jan 2013
TL;DR: In this article, a method for quantitatively identifying and forecasting shifts in a mood of social media users is described. But the method is not suitable for the analysis of large-scale data sets.
Abstract: Quantitatively identifying and forecasting shifts in a mood of social media users is described. An example method includes categorizing the textual messages generated from the social media users over a selected period of time into a plurality of word categories, with each word category containing a set of words associated with the mood of social media users. A score indicating an intensity of the mood of the social media users is calculated for each word category, wherein a value of the score and its corresponding time point define a data point for the word category. Subsequently, breakpoints in the mood of social media users are determined so that the breakpoints minimize a sum of square errors representing a measurement of a consistency of all data points from inferred values of the scores of the data points derived using the breakpoints over the selected period of time. Further, space of all possible breakpoints for the word categories are searched to identify a defined number and locations of the breakpoints. Finally the breakpoints over the selected period of time are interpreted to identify the shifts in the mood of social media users and trends between breakpoints.

Journal ArticleDOI
TL;DR: In this paper, the authors used functional principal component analysis (fPCA) and Synchrosqueezing to detect key historic periods of instability in non-stationary time series.

Proceedings ArticleDOI
08 Dec 2013
TL;DR: This panel addresses the challenge of how the authors gain knowledge from modeling and simulation by illuminating various facets from philosophical, mathematical, computational, and application viewpoints.
Abstract: While ontology deals with the question of being or existence, epistemology deals with the question of gaining knowledge. This panel addresses the challenge of how we gain knowledge from modeling and simulation. What is the underlying philosophy of science of M&S? What are our canons of research for M&S? Is it sufficient to apply the foundational methods of the application domains, or do we need to address these questions from the standpoint of M&S as a discipline? The invited experts illuminate various facets from philosophical, mathematical, computational, and application viewpoints.

Journal ArticleDOI
TL;DR: The database, which lists pathogen and biotoxin lectins and their carbohydrate ligands in a searchable format, has served as a resource for research on the glycobiology of infectious disease and will be enhanced and linked to related resources as part of the wider UniCarbKB initiative.
Abstract: SugarBindDB lists pathogen and biotoxin lectins and their carbohydrate ligands in a searchable format. Information is collected from articles published in peer-reviewed scientific journals. Help files guide the user through the search process and provide a review of structures and names of sugars that appear in human oligosaccharides. Glycans are written in the condensed form of the carbohydrate nomenclature system developed by the International Union of Pure and Applied Chemistry (IUPAC). Since its online publication by The MITRE Corporation in 2005, the database has served as a resource for research on the glycobiology of infectious disease. SugarBindDB is currently hosted by the Swiss Institute of Bioinformatics on the ExPASy server and will be enhanced and linked to related resources as part of the wider UniCarbKB initiative. Enhancements will include the option to display glycans in a variety of formats, including modified 2D condensed IUPAC and symbolic nomenclature. Copyright © 2013 John Wiley & Sons, Ltd.

Proceedings ArticleDOI
TL;DR: 3D printing is not yet entirely field-ready, but many of its advantages can already be realized, and it is asked if it is feasible to expand the printers’ capacity to produce aerial platforms.
Abstract: This paper reports on a feasibility study to explore the impact of advanced manufacturing on the production and maintenance of a 3D printed, unmanned aerial vehicle (UAV) in theatre. Specifically, this report focuses on fused deposition modeling (FDM), the selective deposition of a molten thermoplastic. FDM is already a forward deployed technology, primarily used for printing custom tools and replacement parts. The authors ask if it is feasible to expand the printers’ capacity to produce aerial platforms; the reduction in logistics and labor could significantly decrease costs per unit and enable far more platform customization and specialized deployment scenarios than are available in existing aircraft. The University of Virginia and The MITRE Corporation designed and built a prototype, 3D printed UAV for use as an aerial sensor platform. This report • Discusses the printed aerial platform, summarizes the design process, and compares printing methods • Describes the benefits and limitations to selecting FDM printers as the technology both for deployment as well as UAV design • Concludes with the current state and future expectations for FDM printing technologies relevant to UAV production. Our findings suggest that although 3D printing is not yet entirely field-ready, many of its advantages can already be realized.

Posted Content
TL;DR: In this paper, the authors used functional principal component analysis (fPCA) and Synchrosqueezing to detect key historic periods of instability in financial time series and reveal distinctions between periods of longterm gradual change in addition to structural breaks.
Abstract: Novel data-driven analyses, appropriate for detecting economic instability in non-stationary time series, are developed using functional principal component analysis (fPCA) and Synchrosqueezing. fPCA is applied in a new way, aggregating multiple financial time series to identify periods of macroeconomic instability. Synchrosqueezing, a technique which generates a time-series’ time-dependent spectral decomposition, is modified to develop a new quantitative measure of local dynamic changes and structural breaks. The merit of this integrated technique is demonstrated by analyzing financial data from 1986 to 2012 that includes equity indices, securities and commodities, and foreign exchange. Both procedures successfully detect key historic periods of instability. Moreover, the results reveal distinctions between periods of longterm gradual change in addition to structural breaks. These tools offer new insights in the analysis of financial instability.