78,758 research outputs found
Gas chromatograph sample-transfer valve
Slide-type gate valve incorporates sampling volume and transfer passageway for guiding a metered quantity of gas from pressurized test cell to gas chromatograph. Gate is moved by pneumatic bellows-type actuator
Miniature high pressure regulator
Metal bellows, capable of suppling required spring rate and operational stability, replaced diaphragms, sliding seals, and springs in design of small gas regulator
Two-stage coaxial gas compressor
Compressor raises pressure of gases from low ambient supply during space experiments by a system of low weight, size, and power input. Dc rotary-torque motor and ball-screw drive shaft activate first and second stage of compressor, utilizing inertia forces to operate check valves
A hybrid M-algorithm/sequential decoder for convolutional and trellis codes
The Viterbi Algorithm (VA) is optimum in the sense of being maximum likelihood for decoding codes with a trellis structure. However, since the VA is in fact an exhaustive search of the code trellis, the complexity of the VA grows exponentially with the constraint length upsilon. This limits its application to codes with small values of upsilon and relatively modest coding gains. The M-Algorithm (MA) is a limited search scheme which carries forward M paths in the trellis, all of the same length. All successors of the M paths are extended at the next trellis depth, and all but the best M of these are dropped. Since a limited search convolutional decoder will flounder indefinitely if one of the paths in storage is not the correct one, the data are usually transmitted in blocks. It has been shown that the performance of the MA approaches the VA at high signal to noise ratios (SNR's) with an M which is far less than the 2 sup upsilon states in the full trellis. Thus the MA can be used with larger values of upsilon, making larger coding gains possible at high SNR's. However, it still requires a relatively large fixed computational effort to achieve good performance
Mission analysis data for inclined geosynchronous orbits, part 1
Data needed for preliminary design of inclined geosynchronous missions are provided. The inertial and Earth fixed coordinate systems are described, as well as orbit parameters and elements. The complete family of geosynchronous orbits is discussed. It is shown that circular inclined geosynchronous orbits comprise only one set in this family. The major orbit perturbation and their separate effects on the geosynchronous orbit are discussed. Detailed information on the orbit perturbation of inclined circular geosynchronous orbits is given, with emphasis on time history data of certain orbital elements. Orbit maintenance delta velocity (V) requirements to counteract the major orbit perturbations are determined in order to provide order of magnitude estimates and to show the effects of orbit inclination on delta V. Some of the considerations in mission design for a multisatellite system, such as a halo orbit constellation, are discussed
Secure Communications in Millimeter Wave Ad Hoc Networks
Wireless networks with directional antennas, like millimeter wave (mmWave)
networks, have enhanced security. For a large-scale mmWave ad hoc network in
which eavesdroppers are randomly located, however, eavesdroppers can still
intercept the confidential messages, since they may reside in the signal beam.
This paper explores the potential of physical layer security in mmWave ad hoc
networks. Specifically, we characterize the impact of mmWave channel
characteristics, random blockages, and antenna gains on the secrecy
performance. For the special case of uniform linear array (ULA), a tractable
approach is proposed to evaluate the average achievable secrecy rate. We also
characterize the impact of artificial noise in such networks. Our results
reveal that in the low transmit powerregime, the use of low mmWave frequency
achieves better secrecy performance, and when increasing transmit power, a
transition from low mmWave frequency to high mmWave frequency is demanded for
obtaining a higher secrecy rate. More antennas at the transmitting nodes are
needed to decrease the antenna gain obtained by the eavesdroppers when using
ULA. Eavesdroppers can intercept more information by using a wide beam pattern.
Furthermore, the use of artificial noise may be ineffective for enhancing the
secrecy rate.Comment: Accepted by IEEE Transactions on Wireless Communication
- …