Erik Blasch - Profile on Academia.edu (original) (raw)

Papers by Erik Blasch

Research paper thumbnail of DSmT Applied to Seismic and Acoustic Sensor Fusion

Zenodo (CERN European Organization for Nuclear Research), Jul 1, 2015

In this paper, we explore the use of DSMT for seismic and acoustic sensor fusion. The seismic/aco... more In this paper, we explore the use of DSMT for seismic and acoustic sensor fusion. The seismic/acoustic data is noisy which leads to classification errors and conflicts in declarations. DSmT affords the redistribution of masses when there is a conflict. The goal of this paper is to present an application and comparison on DSMT with other classifier methods to include the support vector machine(SVM) and Dempster-Shafer methods. The work is based on two key references (1) Marco Duarte with the initial SVM classifier application of the seismic and acoustic sensor data and (2) Arnaud Martin in Vol. 3 with the Proportional Conflict Redistribution Rule 5/6 (PCR5/PCR6) developments. By using the developments of Duarte and Martin, we were able to explore the various aspects of DSMT in an unattended ground sensor scenario. Using the receiver operator curve (ROC), we compare the methods for individual classification as well as a measure of overall classification using the area under the curve(AUC). Conclusions of the work show that the DSMT affords a lower false alarm rate because the conflict information is redistributed over the set masses and is comparable to other classifier results when using a maximum decision forced choice.

Research paper thumbnail of A Comparative Analysis of QADA-KF with JPDAF for Multitarget Tracking in Clutter

Zenodo (CERN European Organization for Nuclear Research), Jul 13, 2017

This paper presents a comparative analysis of performances of two types of multi-target tracking ... more This paper presents a comparative analysis of performances of two types of multi-target tracking algorithms: 1) the Joint Probabilistic Data Association Filter (JPDAF), and 2) classical Kalman Filter based algorithms for multi-target tracking improved with Quality Assessment of Data Association (QADA) method using optimal data association. The evaluation is based on Monte Carlo simulations for difficult maneuvering multiple-target tracking (MTT) problems in clutter.

Research paper thumbnail of Information Overload in Tactical Aircraft

Information Overload in Tactical Aircraft

The purpose of this paper is to examine the issues of information overload in the data-rich envir... more The purpose of this paper is to examine the issues of information overload in the data-rich environment of a 4th, 4.5thand 5th generation fighter aircraft's cockpit. The causes and inherent risks of this issue are reviewed. Different evolutionary solutions to this issue are reviewed, taking the SAAB JAS-39C Gripen, the Lockheed Martin F-35 and other aircraft as examples of how information overload is addressed in different aircraft generations. Concepts such as sensor control, data correlation and information fusion are explored. The qualitative shift in information dominance in 5th generation aircraft over legacy fighters is also explained.

Research paper thumbnail of Target broker compression for multi-level fusion

Target broker compression for multi-level fusion

Information Fusion consists of low-level information fusion (LLIF) of object-level assessment whi... more Information Fusion consists of low-level information fusion (LLIF) of object-level assessment which is subject to many operating conditions of the sensor type, environment conditions, and the targets. Likewise, high-level information fusion (HLIF) requires proactive management of sensor parameters. One example of a parameter that affects downstream information fusion tasks of target tracking and identification is that of upstream image compression. In this paper, we present a technique for analyzing the effects of image compression on the information fusion result. The compression selections are based on user needs, target type, and information fusion function, which is a subject of the operating conditions. Results are presented that modify the Video National Imagery Interpretability Ratio (VNIIRS) equations to include compression requirements for object recognition, fusion of results, and user selections. The target broker compression method would support image fusion system providing an exemplar of LLIF-HLIF interactions.

Research paper thumbnail of Targeted adversarial discriminative domain adaptation

Domain adaptation is a technology enabling aided target recognition and other algorithms for envi... more Domain adaptation is a technology enabling aided target recognition and other algorithms for environments and targets with data or labeled data that is scarce. Recent advances in unsupervised domain adaptation have demonstrated excellent performance but only when the domain shift is relatively small. We proposed targeted adversarial discriminative domain adaptation (T-ADDA), a semi-supervised domain adaptation method that extends the ADDA framework. By providing at least one labeled target image per class, used as a cue to guide the adaption, T-ADDA significantly boosts the performance of ADDA and is applicable to the challenging scenario in which the sets of targets in the source and target domains are not the same. The efficacy of T-ADDA is demonstrated by cross-domain, cross-sensor, and cross-target experiments using the common digits datasets and several aerial image datasets. Results demonstrate an average increase of 15% improvement with T-ADDA over ADDA using just a few labeled images when adapting to a small domain shift and afforded a 60% improvement when adapting to large domain shifts.

Research paper thumbnail of On the Development of a Classification Based Automated Motion Imagery Interpretability Prediction

On the Development of a Classification Based Automated Motion Imagery Interpretability Prediction

Lecture Notes in Computer Science, 2021

Research paper thumbnail of A hidden chamber detector based on a MIMO SAR

A hidden chamber detector based on a MIMO SAR

This paper presents a hidden chamber detector (HCD) using radio frequency (RF) signals’ penetrati... more This paper presents a hidden chamber detector (HCD) using radio frequency (RF) signals’ penetration and reflection characteristics. The sensor of the chamber detector is a linear frequency modulated continuous wave (LFMCW) time division multiple access (TDMA) multiple input multiple output (MIMO) synthetic aperture radar (SAR). The basic idea of the sensor system is to scan the target wall and form a 2-D image of the wall with a high depth resolution and a proper angular resolution (cross range resolution). When there is no hidden chamber behind the wall, the radar will receive reflected signals from the room wall. While if there is a hidden chamber behind the room wall, there will be reflected signals from the room wall and the hidden chamber walls. Thus, the hidden chamber can be detected using the reflected singles from the chamber walls. The gated LFMCW TDMA MIMO SAR is configured with multiple transmitting antennas and multiple receiving antennas. Each transmitting and receiving antenna pair constructs an equivalent virtual array element. All virtual array elements construct the virtual antenna array (or synthetic aperture). The virtual array oversees the angular resolution along the array direction (vertical direction), and the narrow antenna beam is in charge of the angular resolution in the cross-array direction (horizontal direction). The high depth resolution is obtained using the gated LFMCW TDMA radar. Simulations show that the hidden chamber detector can detect chambers larger than 20cm by 20cm by 20cm at a distance of 0.3m away from the room wall.

Research paper thumbnail of Space Object Classification Using Fused Features of Time Series Data

In this paper, a fused feature vector consisting of raw time series and texture feature informati... more In this paper, a fused feature vector consisting of raw time series and texture feature information is proposed for space object classification. The time series data includes historical orbit trajectories and asteroid light curves. The texture feature is derived from recurrence plots using Gabor filters for both unsupervised learning and supervised learning algorithms. The simulation results show that the classification algorithms using the fused feature vector achieve better performance than those using raw time series or texture features only.

Research paper thumbnail of Cognitive radio testbed for Digital Beamforming of satellite communication

Cognitive radio testbed for Digital Beamforming of satellite communication

Digital Beamforming (DB) in satellite communication (SATCOM) has drawn significant attention in r... more Digital Beamforming (DB) in satellite communication (SATCOM) has drawn significant attention in recent years. DB design is flexible and adaptive among frequencies, bandwidths, and interferences. In this work, we design a cognitive radio testbed for SATCOM for digital beamforming design and implementation. The testbed is capable of simultaneously capturing signals from multiple antennas. Considering the conditions of jamming or interference, the design implements spectrum detection and compressive sensing for channel condition monitoring in a real time. Using the analyzed jammer and interference information, the incoming signal can be moved into a different frequency where the channel is vacant or at least meets acceptable conditions. The beamforming design is also adaptive to the frequency where each beam is weighted differently for a given channel condition. In addition, the satellite antenna array is used to determine the signal direction of arrival (DoA), The DB is capable of forming the beam in the direction that avoids interference and jamming. Moreover, the detection of the jamming signal direction can help localize the jammer. In the testbed design, a Universal Software Radio Peripheral (USRP) is used as a radio frequency (RF) front end component and GNU radio connecting to computer as signal processing back end. The system architecture includes the transponder receiver. And a USRP ×310 with twinRx receiver is capable of obtaining multiple copies of the signal captured by multiple receiving antennas.

Research paper thumbnail of High-throughput, cyber-secure multiuser superposition covert avionics system

IEEE Aerospace and Electronic Systems Magazine, Feb 1, 2018

Research paper thumbnail of Space object tracking and maneuver detection via interacting multiple model cubature Kalman filters

2015 IEEE Aerospace Conference, 2015

Space object tracking and maneuver detection play an essential role in space situation awareness ... more Space object tracking and maneuver detection play an essential role in space situation awareness (SSA). The ordinary Kalman filter and its variants may give large error due to the maneuver of the space object. In this paper, to consistently track a maneuvering space object, the interacting multiple model (IMM) filter is utilized. Multiple Models with different process noise levels are used to distinguish the maneuvering effects. The IMM cubature Kalman filter (IMM-CKF) is used to track the maneuvering space object which considers of the geometric relations between the space object, space based optical (SBO) sensor, and the sun. The geometric relation highly affects the quality of the observation. A scenario which contains a target spacecraft and four SBO sensors is used to test performance of the IMM-CKF. We also compare the IMM-CKF and the ordinary cubature Kalman filter (CKF). The results indicate that IMM-CKF is more robust than the CKF when the space object undergoes a maneuver. In addition, the detection of a maneuver can be obtained by using the IMM-CKF. Hence, IMM-CKF could facilitate future SBO based SSA mission awareness.

Research paper thumbnail of On Situational Aware En-Route Filtering against Injected False Data in Cyber Physical Systems

Cyber-physical systems (CPS) are systems with a tight coupling of the cyber aspects of computing ... more Cyber-physical systems (CPS) are systems with a tight coupling of the cyber aspects of computing and communications with the physical aspects of dynamics and engineering that abide by the laws of physics. The real-time monitoring provided by wireless sensor networks (WSNs) is essential for CPS, as it provides rich and pertinent information on the condition of physical systems. In WSNs, the attackers could inject false measurements to the controller through compromised sensor nodes, which not only threaten the security of the system, but also consume significant network resources and pose serious threats to the lifetime of sensor networks. To mitigate false data injection (FDI) measurement attacks, a number of situation aware en-route filtering schemes to filter false data inside the networks have been developed. In this book chapter, the authors first review those existing situation aware en-route filter mechanisms such as: Statistical En-route Filtering (SEF), Location-Based Resilient Secrecy (LBRS), Location-ware End-to-end Data Security (LEDS), and Dynamic En-route Filtering Scheme (DEFS). The authors then compare the performance of those schemes via both the theoretical analysis and simulation study. These extensive simulations validate findings that most of the schemes can filter out false data within few hops, and the filtering efficiency increases as the number of hops increases and the filtering efficiency of most schemes decreases rapidly as the number of compromised nodes increases.

Research paper thumbnail of A Survey of Multimodal Sensor Fusion for Passive RF and EO Information Integration

IEEE Aerospace and Electronics Systems Magazine, 2021

Research paper thumbnail of Mitigation of weather on channel propagation for satellite communications

Proceedings of SPIE, May 13, 2016

This paper investigates weather effects on a satellite communication (SATCOM) link communication ... more This paper investigates weather effects on a satellite communication (SATCOM) link communication channel model. Specifically, rain attenuation in the Ka band and X band of the SATCOM link for both uplink and downlink scenarios are presented. The weather model for the SATCOM link uses a Markov chain model with an average probability and transition probability for different states of weather, to investigate the impact of dynamic weather on the SATCOM link channel propagation model. Also, a power control method is proposed to achieve the required carrier to noise ratio in a SATCOM scenario using a Bayesian Network in Netica. The Bayesian Network models the space-ground link geometry and transmit power control to adapt to the dynamic weather. Simulations are implemented for the weather states during relatively long and short periods, path loss variations, and transmit power distributions over different scenarios. The simulation results demonstrate the effectiveness of the proposed weather model, Markov chain model, and the power control method for SATCOM.

Research paper thumbnail of Predicting Interpretability Loss in Thermal IR Imagery due to Compression

Analysis of thermal Infrared (IR) imagery is critical to many law enforcement and military missio... more Analysis of thermal Infrared (IR) imagery is critical to many law enforcement and military missions, particularly for operations at night or in low-light conditions. Transmitting the imagery data from the sensor to the operator often relies on limited bandwidth channels, leading to information loss. This paper develops a method, known as the Compression Degradation Image Function Index (CoDIFI) framework, that predicts the degradation in interpretability associated with the specific image compression method and level of compression. Quantification of the image interpretability relies on the National Imagery Interpretability Ratings Scale (NIIRS). Building on previously reported development and validation of CoDIFI operating on electro-optical (EO) imagery collected in the visible region, this paper extends CoDIFI to imagery collected in the mid-wave infrared (MWIR) region, approximately 3 to 5 microns. For the infrared imagery application, the IR NIIRS is the standard for quantifying image interpretability and the prediction model rests on the general image quality equation (GIQE). A prediction model using the CoDIFI for IR imagery is established with empirical validation. By leveraging the CoDIFI in operational settings, mission success ensures that the compression selection is achievable in terms of the NIIRS level of imagery data delivered to users, while optimizing the use of scarce data transmission capacity.

Research paper thumbnail of Tailoring image compression to mission needs: Predicting NIIRS loss due to image compression

Tailoring image compression to mission needs: Predicting NIIRS loss due to image compression

Transmission and analysis of imagery for law enforcement and military missions is often constrain... more Transmission and analysis of imagery for law enforcement and military missions is often constrained by the capacity of available communications channels. Nevertheless, achieving success in operational missions requires acquisition and analysis of imagery that satisfies specific interpretability requirements. By expressing these requirements in terms of the National Imagery Interpretability Ratings Scale (NIIRS), we have developed a method for predicting the NIIRS loss associated with various methods and levels of imagery compression. Our method, known as the Compression Degradation Image Function Index (CoDIFI) framework automatically predicts the NIIRS degradation associated with the specific image compression method and level of compression. In this paper, we first review NIIRS and methods for predicting it followed by the presentation of the CoDIFI framework and we put our emphasis on the results of the empirical validation experiments. By leveraging CoDIFI in operational settings, our goal is to ensure mission success in terms of the NIIRS level of imagery data delivered to users, while optimizing the use of scarce data transmission capacity.

Research paper thumbnail of Deep Learning Based Domain Adaptation with Data Fusion for Aerial Image Data Analysis

Deep Learning Based Domain Adaptation with Data Fusion for Aerial Image Data Analysis

Lecture Notes in Computer Science, 2021

Research paper thumbnail of Anomaly detection of unstructured big data via semantic analysis and dynamic knowledge graph construction

Anomaly detection of unstructured big data via semantic analysis and dynamic knowledge graph construction

There is an increasing need for both governments and businesses to discover latent anomalous acti... more There is an increasing need for both governments and businesses to discover latent anomalous activities in unstructured publicly-available data, produced by professional agencies and the general public. Over the past two decades, consumers have begun to use smart devices to both take in and generate a large volume of open-source text-based data, providing the opportunity for latent anomaly analysis. However, real-time data acquisition, and the processing and interpretation of various types of unstructured data, remains a great challenge. Recent efforts have focused on artificial intelligence / machine learning (AI/ML) solutions to accelerate the labor-intensive linear collection, exploitation, and dissemination analysis cycle and enhance it with a data-driven rapid integration and correlation process of open-source data. This paper describes an Activity Based Intelligence framework for anomaly detection of open-source big data using AI/ML to perform semantic analysis. The proposed Anomaly Detection using Semantic Analysis Knowledge (ADUSAK) framework includes four layers: input layer, knowledge layer, reasoning layer, and graphical user interface (GUI)/output layer. The corresponding main technologies include: Information Extraction, Knowledge Graph (KG) construction, Semantic Reasoning, and Pattern Discovery. Finally, ADUSAK was verified by performing Emerging Events Detection, Fake News Detection, and Suspicious Network Analysis. The generalized ADUSAK framework can be easily extended to a wide range of applications by adjusting the data collection, modeling construction, and event alerting.

Research paper thumbnail of Special Section Guest Editorial: Sensors and Systems for Space Applications

Optical Engineering, Mar 12, 2019

Research paper thumbnail of Multisource AI scorecard table analysis of AMIGO

Multisource AI scorecard table analysis of AMIGO

Various techniques, applications, and tools for space situational awareness (SSA) have been devel... more Various techniques, applications, and tools for space situational awareness (SSA) have been developed for specific functions that can provide decision support tools. The generality of tools to enable a user-defined operating picture (UDOP) enables analysis across a wide variety of applications. This paper explores the Multisource AI Scorecard Table (MAST) for artificial intelligence/machine learning methods. Using the MAST categories, the Adaptive Markov Inference Game Optimization (AMIGO) SSA tool is presented as an example. The analysis reveals the importance of human interaction in the task, user, and technology operations. Recent advances in artificial intelligence (AI) have led to an explosion of multimedia applications (e.g., computer vision (CV) and natural language processing (NLP)) for different domains such as commercial, industrial, and intelligence. In particular, the use of AI applications is often problematic because the opaque nature of most systems leads to an inability for a human to understand how the results came about. A reliance on “black boxes” to generate predictions and inform decisions but requires explainability. This paper explores how MAST can support human-machine interactions to support the design and development of SSA tools. After describing the elements of MAST, the use case for AMIGO explains the general rating concept for the community to consider and modify for the interpretability of advanced data analytics that support various elements of data awareness.