Systems and methods for simulation of shearographic imaging

    公开(公告)号:US10931899B1

    公开(公告)日:2021-02-23

    申请号:US16717010

    申请日:2019-12-17

    Abstract: Systems and methods for computationally simulating and optimizing shearography systems are provided. The systems and methods for simulation and optimization avoid ray tracing, and, instead, implement a phase screen approach to image computation. The systems and methods include physics-based surface texture and surface motion simulations, the application of phase screens to computer-generated simulations of shearographic remote sensing, and the inclusion of de-polarization due to multiple scattering and birefringence at a surface being imaged. The systems and methods include further greatly optimize diffraction computations by treating an optical transfer function (OTF) of an arbitrary aperture as a sum of separable OTFs.

    Transistor amplifier
    125.
    发明授权

    公开(公告)号:US10911005B2

    公开(公告)日:2021-02-02

    申请号:US16427596

    申请日:2019-05-31

    Abstract: A transistor amplifier includes at least one differential pair of transistors and a plurality of transformers having a primary winding and a tapped secondary winding. The secondary winding is connected across emitters or sources of each transistor pair. The tap of each secondary has a current source. The primary windings of the plurality of transformers are connected in series. The transistor bases or gates are alternating current (AC) grounded. The collector or drain terminal pairs are connected in parallel. The transistor amplifier exhibits improved input impedance and improved linearity.

    Sound reputation
    127.
    发明授权

    公开(公告)号:US10887334B2

    公开(公告)日:2021-01-05

    申请号:US16123099

    申请日:2018-09-06

    Abstract: A cybersecurity system and method utilizing SOUND reputation, where a set of reputations are associated with each actor on a network. The actors on a network may be users, hosts, applications, and the like. The associated reputations are aggregated and updated as new information about an actor's activity is reported according to a defined and modifiable protocol, or policy. The actor's activity may be reported by one or more threat sensors. The effect of a particular misbehavior can be tuned to match the needs of the specific network. When a bad actor's reputation sinks too low, the system can take whatever action is appropriate: reports can be sent, an operator can be notified, the offender can be cut off from the network, or the like.

    Multi-hop security amplification
    128.
    发明授权

    公开(公告)号:US10887091B2

    公开(公告)日:2021-01-05

    申请号:US16200984

    申请日:2018-11-27

    Abstract: Techniques are disclosed for multi-hop security amplification. The techniques disclosed provide multi-hop security amplification by applying a secret sharing scheme to data as the data is routed within a network to an intended recipient device. In an embodiment, a sending device divides the data into shares based on a secret sharing scheme, and sends the shares to respective network nodes in a network. These network nodes then divide their respective shares into lower-level shares based on the secret sharing scheme, and route the lower-level shares to downstream network nodes for further routing to the intended recipient device. The intended recipient device receives some or all of the lower-level shares and reconstructs the data from the received lower-level shares. In an embodiment, the secret sharing scheme is a threshold-based secret sharing scheme, such as Shamir's secret sharing scheme.

    Geolocation using time difference of arrival and long baseline interferometry

    公开(公告)号:US10884095B2

    公开(公告)日:2021-01-05

    申请号:US16352404

    申请日:2019-03-13

    Abstract: Techniques are provided for geolocation of a radar emitting source. A methodology implementing the techniques according to an embodiment includes calculating time difference of arrival (TDOAs) of ground emitter radar pulses, within a dwell period, between two long baseline interferometer (LBI) antennas. The TDOA calculations are based on a precision estimate of the time of arrival of the radar pulses. The method further includes calculating an LBI phase wrap disambiguation factor based on (1) the TDOAs, (2) an average of frequencies of the radar pulses within the dwell period, and (3) an average of phase shifts of the radar pulses between the LBI antennas within the dwell period. The method further includes mapping a curve of points onto the surface of the earth based on an LBI cone angle calculation employing the LBI phase wrap disambiguation factor. The curve of points is associated with a geolocation of the ground emitter.

Patent Agency Ranking