The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Serpentine lines have been widely used in digital circuits to provide the required timing delays. Based on a full-wave simulation tool, some critical parameters that affect the delay characteristic of a serpentine line are carefully studied and analyzed. With the comprehensive study and analysis, a set of practical and useful design guides are concluded for designing a serpentine line to meet the...
Motivated by the goal of obtaining more-anthropomorphic walking in bipedal robots, this paper considers a hybrid model of a 3D hipped biped with feet and locking knees. The main observation of this paper is that functional Routhian Reduction can be used to extend two-dimensional walking to three dimensions-even in the presence of periods of underactuation-by decoupling the sagittal and coronal dynamics...
This paper argues that the speed-accuracy trade-off arises as a consequence of Shannon's fundamental theorem for a channel with noise, when coupled with two additional postulates: that people are imperfect information processors, and that motivation is a necessary condition of the speed-accuracy tradeoff.
The Army Technical Reference Model (TRM) is a fundamental component of the Army Enterprise Architecture suite of reference models. This paper describes the TRM, how it facilitates enterprise architecture integration and system interoperability, how it maps to other key DoD architecture models, and its value to the acquisition community. It describes how it supports Program Managers for efficiently...
Current U.S. military pursuits, such as the Joint Tactical Radio System (JTRS), are based on a software-defined radio (SDR) system. These kinds of systems use the flexibility of software to make old and new radio technology interoperable. Co-existence of different radio technologies has the potential to be a force enabler, but it still falls short, particularly for military operations in which failure...
Exact three-dimensional solutions for secondary sources using the unique mathematical properties of the dyadic Green's function are presented. Applying the radiation condition, this analysis additionally focuses on cases where the lateral distance between source and field point is much greater than the wavelength.
This paper examines the role of facial expressions in dyadic interactions between a banking service provider and customer. We conduct experiments in which service providers manipulate their facial expressions while interacting with customers in one of three conditions: In the neutral condition the banker tried to maintain a neutral facial expression; in the smiling condition the banker tried to smile...
Medical imaging is becoming a key technique to visualize the internal structure of the body. Magnetic resonance imaging (MRI) is currently used to take different spatial images of organs, such as the heart. The output of such an analysis is a set of images representing different views of the body or of an organ. There exist many algorithms to pre-process and analyze medical images such as the well...
In this paper, we extend the notion of generalized Hamming weight for classical linear block code to linear network codes by introducing the network generalized Hamming weight (NGHW) of a linear block code with respect to a given linear network code. The basic properties of NGHW are studied. We further show that NGHW can be used as a tool to characterize the security performance of a linear network...
In this paper, low complexity linear network coordinated beamforming (N-CBF) algorithms under a zero inter-user interference constraint are proposed for the multi-cell downlink channel. We consider a downlink scenario with three base stations (BSs) equipped with one transmit antenna each and three mobile users, each of which has more than one receive antenna and is located on the cell-boundary. A...
The design of a Ka-band coplanar waveguide slot-coupled patch antenna ESA with integrated MEMS phase shifters has been described above. The incorporation of MEMS phase shifters into the ESA design results in a compact, efficient uplink mechanism for a future Army satellite communication system. A control board for biasing the phase shifters and initiating beam steering will be incorporated into the...
An electromagnetic invisibility cloak featuring an elliptic inner and a circular outer boundary was presented. Explicit design equations were given. The performance of the designed cloaks for different angles of incidence and shielded object dimensions were verified by full-wave EM simulations. The proposed configuration leads to more flexible geometries for invisibility cloaks.
In this paper, a very electrically small canopy antenna is introduced. The canopy antenna radiates at ap 297Mhz with a Qratio ap 1.75. An active internal matching network is applied to this canopy antenna; over a 10% fractional bandwidth is obtained for this ESA (a ~ lambda/137).
We have developed a dual-frequency electromagnetic cloak based on LC circuits. The limitations imposed by the extremely small values of the permittivity / permeability required for cloaking applications are relaxed by the proposed LC-circuit with multiple resonances. Full-wave simulations are then carried out to verify the design concept, where a cylindrical cloak working at 3 and 5 GHz is designed...
We investigate transmission of information in a network in the presence of an adversary that can eavesdrop k channels and inject d errors into the network at the same time. We propose a deterministic construction of a secure error-correcting (SEC) network codes which can transmit information at rate m - 2d - k to all the sink nodes which protecting the information from eavesdropping and contamination...
After a review of different sets of equations covering mitosis we give a MATLAB realization of a basic set and from that we design some transistor circuits for their implementation. These can serve for a model reference for control of mitosis.
Cumulants are gaining in popularity for use in stochastic control and game theory. They also have been effective in application to building and vibration control problems. Much of the work has been done for the finite time horizon case. In this paper, cost cumulants will be used on a discounted cost function. The control will be concerned with the first two cumulants, the mean and variance. The approach...
An iterative algorithm is proposed to achieve the optimal rate region in a two-way relay channel, where two nodes want to exchange data with each other using multiple relays, and each relay employs an amplify and forward strategy. The iterative algorithm solves a power minimization problem at every step, subject to minimum signal-to-interference-and-noise ratio constraints, which is non-convex, however,...
The ID3 algorithm forms the basis for many decision trees' algorithms and programs. Trees produced by this algorithm are known to be very sensitive to small changes in attribute values. Fuzzy ID3 is an extension of ID3; it integrates fuzzy set theory and fuzzy logic with ID3. This integration reduces the sensitivity of the produced decision trees to small changes in attribute values, and helps in...
The subspace channel was introduced by Koetter and Kschischang as an adequate model for the communication channel from the source node to a sink node of a multicast network that performs random linear network coding. So far, attention has been given to one-shot subspace codes, that is, codes that use the subspace channel only once. In contrast, this paper explores the idea of using the subspace channel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.