An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brian Woo-Shem, Kaleb Pattawi, Hannah Covington, Patrick McCurdy, Chenli Wang, Thomas Roth, Cuong Nguyen, Yuhong Liu, Hohyun Lee
Energy consumption in buildings continues to rise with increased deployment of energy-consuming equipment such as Heating, Ventilation, and Air Conditioning (HVAC) amid a growing world economy. Renewable energy is projected to comprise a majority of the
Rick Candell, Karl Montgomery, Mohamed Hany, Susruth Sudhakaran, Dave Cavalcanti
Time-sensitive networking (TSN) is emerging as a viable means to achieving deterministic quality of service (QoS) communications within mission critical industrial applications such as feedback control systems, robotics, and precision sensing and actuation
We present an exploration of the time parameters observed in measurements performed at 13 residential sites from June 2020 through September 2021. This discussion is undertaken from the perspective of application to electromagnetic immunity testing for
In recent work, we proposed sweeping the antennas of phased arrays and beamforming in postprocessing – what we coined switched beamforming – instead of sweeping beams through analog beamforming – what the arrays are designed for. Not only is it orders of
This paper presents the software-defined management system of DC-QNet, a quantum network testbed deployed across multiple distant sites. The system uses a network management system (NMS) to manage the optical network, the classical IP network, and the
Peter Vouras, Mohamed Hany, Sudantha Perera, Carnot Nogueira, Rick Candell, Kate Remley
Sparse sampling approaches have been widely studied to achieve less complex measurement systems while maintaining detection performance. In this paper, we derive a new gradient implementation of an alternating projections algorithm that determines the
Peter Vouras, Mohamed Hany, Sudantha Perera, Carnot Nogueira, Rick Candell, Kate Remley
This paper describes a spherical beamforming implementation for wideband synthetic aperture channel sounders that can be used to predict the scattering performance of an Intelligent Reflection Surface (IRS). An IRS creates controlled propagation conditions
FNU Nur Fajar Rizqi Annafianto, Jabir Marakkarakath Vadakkepurayil, Ivan Burenkov, Abdella Battou, Sergey Polyakov
We experimentally demonstrate a quantum-measurement-based receiver for a range of modulation schemes and alphabet lengths in a telecom C-band. We attain symbol error rates below the shot noise limit for all the studied modulation schemes and the alphabet
The purpose of this executive summary is to provide key stakeholders with relevant information about how PSCR spent Public Safety Trust Funds and the impacts of that funding. Furthermore, this report seeks to demonstrate the value and positive outcomes of
Beam tracking is a core issue in 5G vehicle-to-everything (V2X) networks. Specifically, higher beamforming gain is required to compensate for the path loss at higher frequencies, e.g., 5G FR2, to realize high data rate vehicle-to-infrastructure (V2I)
Sub-THz-based communication needs ultra-large antenna arrays to generate pencil-like beams under the stringent requirements of line-of-sight (LoS) to overcome the effect of the rapid attenuation of signal strength, including atmospheric attenuation. In
Mohamed Hany, Sudantha Perera, Carnot Nogueira, Rick Candell, Kate Remley, Matt Simons
Industrial wireless channels have different characteristics than home and office channels due to their reflective nature. Moreover, the millimeter-wave (mmWave) wireless bands can play a big role in improving industrial wireless systems due to their large
Zineb Maasaoui, Anfal Hathah, Hasnae Bilil, Van Sy Mai, Abdella Battou, ahmed lbath, Veton KEPUSKA
Real-time traffic management and control have become necessary in today's networks due to their complexity and cybersecurity risks. With the increase in internet use, threats are more present and require real-time detection and analysis to prevent