78,758 research outputs found

    Gas chromatograph sample-transfer valve

    Get PDF
    Slide-type gate valve incorporates sampling volume and transfer passageway for guiding a metered quantity of gas from pressurized test cell to gas chromatograph. Gate is moved by pneumatic bellows-type actuator

    Miniature high pressure regulator

    Get PDF
    Metal bellows, capable of suppling required spring rate and operational stability, replaced diaphragms, sliding seals, and springs in design of small gas regulator

    Two-stage coaxial gas compressor

    Get PDF
    Compressor raises pressure of gases from low ambient supply during space experiments by a system of low weight, size, and power input. Dc rotary-torque motor and ball-screw drive shaft activate first and second stage of compressor, utilizing inertia forces to operate check valves

    A hybrid M-algorithm/sequential decoder for convolutional and trellis codes

    Get PDF
    The Viterbi Algorithm (VA) is optimum in the sense of being maximum likelihood for decoding codes with a trellis structure. However, since the VA is in fact an exhaustive search of the code trellis, the complexity of the VA grows exponentially with the constraint length upsilon. This limits its application to codes with small values of upsilon and relatively modest coding gains. The M-Algorithm (MA) is a limited search scheme which carries forward M paths in the trellis, all of the same length. All successors of the M paths are extended at the next trellis depth, and all but the best M of these are dropped. Since a limited search convolutional decoder will flounder indefinitely if one of the paths in storage is not the correct one, the data are usually transmitted in blocks. It has been shown that the performance of the MA approaches the VA at high signal to noise ratios (SNR's) with an M which is far less than the 2 sup upsilon states in the full trellis. Thus the MA can be used with larger values of upsilon, making larger coding gains possible at high SNR's. However, it still requires a relatively large fixed computational effort to achieve good performance

    Mission analysis data for inclined geosynchronous orbits, part 1

    Get PDF
    Data needed for preliminary design of inclined geosynchronous missions are provided. The inertial and Earth fixed coordinate systems are described, as well as orbit parameters and elements. The complete family of geosynchronous orbits is discussed. It is shown that circular inclined geosynchronous orbits comprise only one set in this family. The major orbit perturbation and their separate effects on the geosynchronous orbit are discussed. Detailed information on the orbit perturbation of inclined circular geosynchronous orbits is given, with emphasis on time history data of certain orbital elements. Orbit maintenance delta velocity (V) requirements to counteract the major orbit perturbations are determined in order to provide order of magnitude estimates and to show the effects of orbit inclination on delta V. Some of the considerations in mission design for a multisatellite system, such as a halo orbit constellation, are discussed

    Secure Communications in Millimeter Wave Ad Hoc Networks

    Get PDF
    Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential messages, since they may reside in the signal beam. This paper explores the potential of physical layer security in mmWave ad hoc networks. Specifically, we characterize the impact of mmWave channel characteristics, random blockages, and antenna gains on the secrecy performance. For the special case of uniform linear array (ULA), a tractable approach is proposed to evaluate the average achievable secrecy rate. We also characterize the impact of artificial noise in such networks. Our results reveal that in the low transmit powerregime, the use of low mmWave frequency achieves better secrecy performance, and when increasing transmit power, a transition from low mmWave frequency to high mmWave frequency is demanded for obtaining a higher secrecy rate. More antennas at the transmitting nodes are needed to decrease the antenna gain obtained by the eavesdroppers when using ULA. Eavesdroppers can intercept more information by using a wide beam pattern. Furthermore, the use of artificial noise may be ineffective for enhancing the secrecy rate.Comment: Accepted by IEEE Transactions on Wireless Communication
    corecore