Abstract:
A method for forwarding incoming cellular communications to an aircraft is provided. A request is received to divert incoming calls for a cellular telephone number to a communication system on board an aircraft. The request includes at least a temporary identification code representing a cellular telephone aboard the aircraft. A diversion instruction is associated with the cellular telephone number. The diversion instruction represents an instruction to forward an incoming call for the cellular telephone number to the communications system aboard the aircraft. A state of a cellular telephone associated with the cellular telephone number is considered as busy, regardless of an actual state of the cellular telephone. An incoming telephone call to the cellular telephone number is forwarded, consistent with said considering and in accordance with the diversion instruction, to the communications system on board the aircraft.
Abstract:
An embodiment of the invention generally pertains to a method of compensating for temperature variations in an eddy current sensor signal. The method may include the steps of receiving an initial signal from an eddy current sensor (ECS) in response to a conductive element passing the ECS and sensing an ECS temperature and an ECS board temperature. The method may also include determining a subset of correction coefficients based on the ECS temperature and the ECS board temperature and determining a temperature correction factor from the subset of correction coefficients. The method may then compute a temperature corrected signal from the initial signal and the temperature correction factor.
Abstract:
A cross-ambiguity function generator (“CAF”) uses properties of quantum mechanics for computation purposes. The CAF has advantages over standard analog or digital CAF function generators, such as improved bandwidth. The CAF may be used for traditional geolocation or RADAR applications.
Abstract:
A system and method are provided for setting a light loss through an optical fiber. A portion of the optical fiber is clamped. An unclamped portion of the optical fiber is bent. A bent region of the optical fiber is heated. The amount of light that is at least one of leaving the heated bent region or passing through the optical fiber downstream from the heated bent region is monitored. The heating is discontinued when the amount of light reaches the desired level. The resulting optical fiber has particular application in an optical coupler.
Abstract:
Novel spectroscopy techniques using entangled photons are disclosed. In one technique, entangled photons are directed to a sample of interest, while the photons with which they are entangled are resolved according to frequency. The photons transmitted by or reflected from the sample and the frequency-resolved photons are detected. Such detection may be by way of an electronic coincidence counter or a biphoton sensitive material, which absorbs entangled photons while allowing other photon pairs to pass. Detection information is used to derive spectroscopic properties of the sample. In another technique, a Fourier transform spectroscopy technique using entangled photons is disclosed. Entangled photons are directed to a sample, while the photons with which they are entangled are directed to a Michelson interferometer. The photons transmitted by or reflected from the sample and the photons leaving the Michelson interferometer are detected. Such detection may be by way of an electronic coincidence counter or a biphoton sensitive material. Detection information is used to derive spectroscopic properties of the sample.
Abstract:
A method for sharing a data set including multiple classifications of security between one or more entities and/or between one or more organizations. Public-keys for use in selectively encrypting the data set with multiple classifications of security are made available in a public-key table. A private-key corresponding to the public-key is used to decrypt the selectively encrypted data set. Public-keys available in the public-key table are re-used to selectively encrypt data sets as appropriate. Public/private-key pairs also may be generated as needed for use in encrypting a document with multiple classifications of security. A single data set may be further encrypted with additional classifications of security as needed. A data set thus may be made available to various entities and/or organizations over a common repository. Symmetric and other encryption techniques also may be used.
Abstract:
The present invention relates to a compliant leaded interposer for resiliently attaching and electrically connecting a ball grid array package to a circuit board. The interposer may include a substrate, a plurality of pads, and a plurality of pins. The plurality of pads may be positioned substantially on the top surface of the substrate and arranged in a predetermined pattern substantially corresponding to the solder ball pattern on the ball grid array package. The plurality of pins may be positioned substantially perpendicular to the substrate and may extend through the substrate and the plurality of pads. The interposer may be configured to attach the ball grid array package to the circuit board such that each of the solder balls on the ball grid array package contacts at least a portion the plurality of pins and at least a portion of the plurality of pads and such that the each of the plurality of pins also connects to a contact on the circuit board.
Abstract:
A method and apparatus for coordinating the activities of multiple computers using a common reference point such as a Global Positioning System pulse-per-second signal. A reload register transmits a reload value to a mission timer. The mission timer generates an interrupt signal based upon the reload value. A timer capture register captures the countdown value of the mission timer when a pulse-per-second signal is asserted. Software generates new reload values based upon the countdown value captured by the timer capture register. Additional timer capture registers may be used to form a consensus value of the countdown value when the pulse-per-second signal is asserted. A local pulse-per-second signal generator may be used when a Global Positioning System pulse-per-second signal is not available.
Abstract:
An embodiment of the invention generally relates to an apparatus for deploying a segmented reflector antenna. The apparatus includes a plurality of segments that can be rigid or flexible where each segment is hinged to an adjacent segment on either longitudinal side. The apparatus also includes a base, a plurality of inner deployment beams, and a plurality of outer deployment beams. Each inner deployment beam connects an inner side of a respective segment to the base and having a folded position and an extended position. Each outer deployment beam connects an outside side of a respective segment to the base and has a folded position and an extended position. The plurality of segments in a hinged folded position in response to the plurality of inner deployment beams being in the folded position and the outer deployment beams being in the folded position.
Abstract:
A method and device are provided for controlling access to data. Portions of the data are protected and rules concerning access rights to the data are determined. Access to the protected portions of the data is prevented, other than in a non-useable form; and users are provided access to the data only in accordance with the rules as enforced by a mechanism protected by tamper detection. A method is also provided for distributing data for subsequent controlled use of those data. The method includes protecting portions of the data; preventing access to the protected portions of the data other than in a non-useable form; determining rules concerning access rights to the data; protecting the rules; and providing a package including: the protected portions of the data and the protected rules. A user is provided controlled access to the distributed data only in accordance with the rules as enforced by a mechanism protected by tamper protection. A device is provided for controlling access to data having protected data portions and rules concerning access rights to the data. The device includes means for storing the rules; and means for accessing the protected data portions only in accordance with the rules, whereby user access to the protected data portions is permitted only if the rules indicate that the user is allowed to access the portions of the data.