16,670 research outputs found
In situ reduction of charge noise in GaAs/AlGaAs Schottky-gated devices
We show that an insulated electrostatic gate can be used to strongly suppress
ubiquitous background charge noise in Schottky-gated GaAs/AlGaAs devices. Via a
2-D self-consistent simulation of the conduction band profile we show that this
observation can be explained by reduced leakage of electrons from the Schottky
gates into the semiconductor through the Schottky barrier, consistent with the
effect of "bias cooling". Upon noise reduction, the noise power spectrum
generally changes from Lorentzian to type. By comparing wafers with
different Al content, we exclude that DX centers play a dominant role in the
charge noise.Comment: 4 pages, 3 figure
Shuttle S-band communications technical concepts
Using the S-band communications system, shuttle orbiter can communicate directly with the Earth via the Ground Spaceflight Tracking and Data Network (GSTDN) or via the Tracking and Data Relay Satellite System (TDRSS). The S-band frequencies provide the primary links for direct Earth and TDRSS communications during all launch and entry/landing phases of shuttle missions. On orbit, S-band links are used when TDRSS Ku-band is not available, when conditions require orbiter attitudes unfavorable to Ku-band communications, or when the payload bay doors are closed. the S-band communications functional requirements, the orbiter hardware configuration, and the NASA S-band communications network are described. The requirements and implementation concepts which resulted in techniques for shuttle S-band hardware development discussed include: (1) digital voice delta modulation; (2) convolutional coding/Viterbi decoding; (3) critical modulation index for phase modulation using a Costas loop (phase-shift keying) receiver; (4) optimum digital data modulation parameters for continuous-wave frequency modulation; (5) intermodulation effects of subcarrier ranging and time-division multiplexing data channels; (6) radiofrequency coverage; and (7) despreading techniques under poor signal-to-noise conditions. Channel performance is reviewed
Universal Behavior in Large-scale Aggregation of Independent Noisy Observations
Aggregation of noisy observations involves a difficult tradeoff between
observation quality, which can be increased by increasing the number of
observations, and aggregation quality which decreases if the number of
observations is too large. We clarify this behavior for a protypical system in
which arbitrarily large numbers of observations exceeding the system capacity
can be aggregated using lossy data compression. We show the existence of a
scaling relation between the collective error and the system capacity, and show
that large scale lossy aggregation can outperform lossless aggregation above a
critical level of observation noise. Further, we show that universal results
for scaling and critical value of noise which are independent of system
capacity can be obtained by considering asymptotic behavior when the system
capacity increases toward infinity.Comment: 10 pages, 3 figure
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations
Ideas from Fourier analysis have been used in cryptography for the last three
decades. Akavia, Goldwasser and Safra unified some of these ideas to give a
complete algorithm that finds significant Fourier coefficients of functions on
any finite abelian group. Their algorithm stimulated a lot of interest in the
cryptography community, especially in the context of `bit security'. This
manuscript attempts to be a friendly and comprehensive guide to the tools and
results in this field. The intended readership is cryptographers who have heard
about these tools and seek an understanding of their mechanics and their
usefulness and limitations. A compact overview of the algorithm is presented
with emphasis on the ideas behind it. We show how these ideas can be extended
to a `modulus-switching' variant of the algorithm. We survey some applications
of this algorithm, and explain that several results should be taken in the
right context. In particular, we point out that some of the most important bit
security problems are still open. Our original contributions include: a
discussion of the limitations on the usefulness of these tools; an answer to an
open question about the modular inversion hidden number problem
Technology requirements for communication satellites in the 1980's
The key technology requirements are defined for meeting the forecasted demands for communication satellite services in the 1985 to 1995 time frame. Evaluation is made of needs for services and technical and functional requirements for providing services. The future growth capabilities of the terrestrial telephone network, cable television, and satellite networks are forecasted. The impact of spacecraft technology and booster performance and costs upon communication satellite costs are analyzed. Systems analysis techniques are used to determine functional requirements and the sensitivities of technology improvements for reducing the costs of meeting requirements. Recommended development plans and funding levels are presented, as well as the possible cost saving for communications satellites in the post 1985 era
Self-force with (3+1) codes: a primer for numerical relativists
Prescriptions for numerical self-force calculations have traditionally been
designed for frequency-domain or (1+1) time-domain codes which employ a mode
decomposition to facilitate in carrying out a delicate regularization scheme.
This has prevented self-force analyses from benefiting from the powerful suite
of tools developed and used by numerical relativists for simulations of the
evolution of comparable-mass black hole binaries. In this work, we revisit a
previously-introduced (3+1) method for self-force calculations, and demonstrate
its viability by applying it to the test case of a scalar charge moving in a
circular orbit around a Schwarzschild black hole. Two (3+1) codes originally
developed for numerical relativity applications were independently employed,
and in each we were able to compute the two independent components of the
self-force and the energy flux correctly to within . We also demonstrate
consistency between -component of the self-force and the scalar energy flux.
Our results constitute the first successful calculation of a self-force in a
(3+1) framework, and thus open opportunities for the numerical relativity
community in self-force analyses and the perturbative modeling of
extreme-mass-ratio inspirals.Comment: 23 pages, 13 figure
Coarse-grained dynamics of an activity bump in a neural field model
We study a stochastic nonlocal PDE, arising in the context of modelling
spatially distributed neural activity, which is capable of sustaining
stationary and moving spatially-localized ``activity bumps''. This system is
known to undergo a pitchfork bifurcation in bump speed as a parameter (the
strength of adaptation) is changed; yet increasing the noise intensity
effectively slowed the motion of the bump. Here we revisit the system from the
point of view of describing the high-dimensional stochastic dynamics in terms
of the effective dynamics of a single scalar "coarse" variable. We show that
such a reduced description in the form of an effective Langevin equation
characterized by a double-well potential is quantitatively successful. The
effective potential can be extracted using short, appropriately-initialized
bursts of direct simulation. We demonstrate this approach in terms of (a) an
experience-based "intelligent" choice of the coarse observable and (b) an
observable obtained through data-mining direct simulation results, using a
diffusion map approach.Comment: Corrected aknowledgement
Untainted Puncturing for Irregular Low-Density Parity-Check Codes
Puncturing is a well-known coding technique widely used for constructing
rate-compatible codes. In this paper, we consider the problem of puncturing
low-density parity-check codes and propose a new algorithm for intentional
puncturing. The algorithm is based on the puncturing of untainted symbols, i.e.
nodes with no punctured symbols within their neighboring set. It is shown that
the algorithm proposed here performs better than previous proposals for a range
of coding rates and short proportions of punctured symbols.Comment: 4 pages, 3 figure
Space Station communications and tracking systems modeling and RF link simulation
In this final report, the effort spent on Space Station Communications and Tracking System Modeling and RF Link Simulation is described in detail. The effort is mainly divided into three parts: frequency division multiple access (FDMA) system simulation modeling and software implementation; a study on design and evaluation of a functional computerized RF link simulation/analysis system for Space Station; and a study on design and evaluation of simulation system architecture. This report documents the results of these studies. In addition, a separate User's Manual on Space Communications Simulation System (SCSS) (Version 1) documents the software developed for the Space Station FDMA communications system simulation. The final report, SCSS user's manual, and the software located in the NASA JSC system analysis division's VAX 750 computer together serve as the deliverables from LinCom for this project effort
- …