An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Qiang Sun, Evert Klaseboer, Alex Yuffa, Derek Y. Chan
A field-only boundary integral formulation of electromagnetics is derived without the use of surface currents that appear in the Stratton--Chu formulation. For scattering by a perfect electrical conductor (PEC), the components of the electric field are
This paper presents a novel reference governor scheme for overshoot mitigation in a tracking control system. Our proposed scheme, referred to as the Reference Governor with DynamicConstraint (RG-DC), recasts the overshoot mitigation problem as a constraint
Farzad Ahmadi, Michael J. Donahue, Yilmaz Sozer, Igor Tsukerman
In this paper, micromagnetic analysis of an array of long magnetic nanowires (NWs) embedded in a nonmagnetic matrix is performed. It is found that for NWs with diameters on the order of a hundred nanometers, the anisotropy and exchange energies are
Somayeh Mosleh, Yao Ma, Jason B. Coder, Erik Perrins, Lingjia Liu
To meet the ever growing wireless network demands, in terms of subscribers and data throughput, operating long term evolution (LTE) in unlicensed bands, also known as license assisted access (LAA), is introduced as a promising solution. However, the LAA
Carrier sense multiple access with collision avoidance (CSMA/CA) procedures have been specified for medium access control (MAC) in several incumbent and emerging wireless systems, such as wireless local area network (WLAN) and long-term evolution (LTE)
Sanjay Jain, Anantha Narayanan Narayanan, Yung-Tsun Lee
Multi-resolution simulation models of manufacturing system, such as the virtual factory, coupled with analytics offer exciting opportunities to manufacturers to exploit the increasing availability of data from their corresponding real factory at different
Thomas D. Hedberg Jr., Allison Barnard Feeney, Vijay Srinivasan
This paper synthesizes a theory from industrial best practices codified in recent standards. Recent editions of ASME and ISO standards codify the evolving industrial best practices in defining and modeling the information about products made from fibrous
For a degree sequence, its set of forced edges are the edges that appear in every realization of that sequence, while its forbidden edges appear in no realization. We examine sequences with forced or forbidden edges, showing relationships between these
Walid Keyrouz, Preston Hamlin, W. J. Thrasher, Michael V. Mascagni
One method of computing the electrostatic energy of a biomolecule in a solution combines the Walk-On-Spheres and Walk-On-Subdomains Monte Carlo algorithms. In the course of examining an implementation of this method, a performance issue was discovered in
Khalid Halba, Edward Griffor, Thomas Roth, Patrick Kamongi
With the increasing interest in studying Automated Driving System (ADS)-equipped vehicles through simulation, there is a growing need for comprehensive and agile middleware to provide novel Virtual Analysis (VA) functions of ADS-equipped vehicles towards
Daniel M. Anderson, James Benson, Anthony J. Kearsley
In the previous two manuscripts we outlined the general theory of heat and mass transport in a cell-liquid-ice system with general boundaries and nonideal and nondilute assumptions. Here we simplify the models considerably by presenting a reduction to a
Jeffrey T. Fong, N. Alan Heckert, James Filliben, Pedro V. Marcal, Samuel Berweger, Thomas Mitchell (Mitch) Wallis, Pavel Kabos
To calibrate near-field scanning microwave microscopes (NSMM) for defect detection and characterization in semiconductors, it is common to develop a parametric finite element analysis (FEA) code to guide the microscope user on how to optimize the settings