8 results match your criteria: "Virginia Tech National Security Institute[Affiliation]"

Transfer learning (TL) techniques have proven useful in a wide variety of applications traditionally dominated by machine learning (ML), such as natural language processing, computer vision, and computer-aided design. Recent extrapolations of TL to the radio frequency (RF) domain are being used to increase the potential applicability of RFML algorithms, seeking to improve the portability of models for spectrum situational awareness and transmission source identification. Unlike most of the computer vision and natural language processing applications of TL, applications within the RF modality must contend with inherent hardware distortions and channel condition variations.

View Article and Find Full Text PDF

Programmable quantum emitter formation in silicon.

Nat Commun

May 2024

Accelerator Technology and Applied Physics Division, Lawrence Berkeley National Laboratory, Berkeley, CA, USA.

Silicon-based quantum emitters are candidates for large-scale qubit integration due to their single-photon emission properties and potential for spin-photon interfaces with long spin coherence times. Here, we demonstrate local writing and erasing of selected light-emitting defects using femtosecond laser pulses in combination with hydrogen-based defect activation and passivation at a single center level. By choosing forming gas (N/H) during thermal annealing of carbon-implanted silicon, we can select the formation of a series of hydrogen and carbon-related quantum emitters, including T and C centers while passivating the more common G-centers.

View Article and Find Full Text PDF

China's major cities show considerable subsidence from human activities.

View Article and Find Full Text PDF

The timely delivery of critical messages in real-time environments is an increasing requirement for industrial Internet of Things (IIoT) networks. Similar to wired time-sensitive networking (TSN) techniques, which bifurcate traffic flows based on priority, the proposed wireless method aims to ensure that critical traffic arrives rapidly across multiple hops to enable numerous IIoT use cases. IIoT architectures are migrating toward wirelessly connected edges, creating a desire to extend TSN-like functionality to a wireless format.

View Article and Find Full Text PDF

The sea level along the US coastlines is projected to rise by 0.25-0.3 m by 2050, increasing the probability of more destructive flooding and inundation in major cities.

View Article and Find Full Text PDF

Coastal communities are vulnerable to multihazards, which are exacerbated by land subsidence. On the US east coast, the high density of population and assets amplifies the region's exposure to coastal hazards. We utilized measurements of vertical land motion rates obtained from analysis of radar datasets to evaluate the subsidence-hazard exposure to population, assets, and infrastructure systems/facilities along the US east coast.

View Article and Find Full Text PDF

The increasingly pervasive problem of counterfeiting affects both individuals and industry. In particular, public health and medical fields face threats to device authenticity and patient privacy, especially in the post-pandemic era. Physical unclonable functions (PUFs) present a modern solution using counterfeit-proof security labels to securely authenticate and identify physical objects.

View Article and Find Full Text PDF

The vulnerability of coastal environments to sea-level rise varies spatially, particularly due to local land subsidence. However, high-resolution observations and models of coastal subsidence are scarce, hindering an accurate vulnerability assessment. We use satellite data from 2007 to 2020 to create high-resolution map of subsidence rate at mm-level accuracy for different land covers along the ~3,500 km long US Atlantic coast.

View Article and Find Full Text PDF