Pub Date : 2000-10-10DOI: 10.1109/NAECON.2000.894940
J. C. Duncan, L. C. Feterle
The tremendous advancement in aircraft avionics and aircraft systems over the last decade has created quite a dilemma for nearly all college and university flight education programs. Historically, flight education has been accomplished largely through a combination of direct, one-on-one flight instruction in an airplane, or through laboratory and flight simulator instruction. However, much of the avionics and aircraft systems found in the aviation industry are not found in training aircraft, and their complexity and sophistication has made them far too expensive to incorporate into flight simulators or avionics laboratories. Fortunately, over the last few years, the development of avionics and aircraft systems instructional software for personal computers and the emergence of the personal computer as a powerful computational tool allows aeronautical/aviation education programs to provide realistic, economical, and effective computer-based instruction.
{"title":"How personal computer-based training is revolutionizing aviation education","authors":"J. C. Duncan, L. C. Feterle","doi":"10.1109/NAECON.2000.894940","DOIUrl":"https://doi.org/10.1109/NAECON.2000.894940","url":null,"abstract":"The tremendous advancement in aircraft avionics and aircraft systems over the last decade has created quite a dilemma for nearly all college and university flight education programs. Historically, flight education has been accomplished largely through a combination of direct, one-on-one flight instruction in an airplane, or through laboratory and flight simulator instruction. However, much of the avionics and aircraft systems found in the aviation industry are not found in training aircraft, and their complexity and sophistication has made them far too expensive to incorporate into flight simulators or avionics laboratories. Fortunately, over the last few years, the development of avionics and aircraft systems instructional software for personal computers and the emergence of the personal computer as a powerful computational tool allows aeronautical/aviation education programs to provide realistic, economical, and effective computer-based instruction.","PeriodicalId":171131,"journal":{"name":"Proceedings of the IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH37093)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116025341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-10DOI: 10.1109/NAECON.2000.894953
R. Eggleston, M. J. Young, R. Whitaker
Information superiority is a strategic goal of the US Air Force. To achieve this goal the Air Force aims to produce a battlespace infosphere that will provide an unprecedented degree of connectivity and availability of raw data and value-added information for warfighter use. The essential challenge of the infosphere is to be able to provide the right information, at the right time, in the right form to enable warfighters to take effective, coordinated action. Although the infosphere's core web and agent technologies are clearly able to provide a heterogeneous infosphere, improved interface technologies are also needed to address problems of information overload and how to provide support to specific end-users without the support tools themselves becoming an impediment to task performance. We have developed a prototype Work-Centered Support System software client as a means to address these interface issues. The WCSS approach achieves effective support in a software agent environment by blending direct manipulation work field organization, and decision, collaborative, and product development aiding in a manner that is tailored to both formal and informal characteristics of user work. In this paper we describe the philosophy behind and characteristics of the WCSS technology. We illustrate the technology with a discussion of an interactive WCSS prototype designed to improve support to military airlift mission planners at the headquarter level.
{"title":"Work-centered Support System technology: a new interface client technology for the battlespace infosphere","authors":"R. Eggleston, M. J. Young, R. Whitaker","doi":"10.1109/NAECON.2000.894953","DOIUrl":"https://doi.org/10.1109/NAECON.2000.894953","url":null,"abstract":"Information superiority is a strategic goal of the US Air Force. To achieve this goal the Air Force aims to produce a battlespace infosphere that will provide an unprecedented degree of connectivity and availability of raw data and value-added information for warfighter use. The essential challenge of the infosphere is to be able to provide the right information, at the right time, in the right form to enable warfighters to take effective, coordinated action. Although the infosphere's core web and agent technologies are clearly able to provide a heterogeneous infosphere, improved interface technologies are also needed to address problems of information overload and how to provide support to specific end-users without the support tools themselves becoming an impediment to task performance. We have developed a prototype Work-Centered Support System software client as a means to address these interface issues. The WCSS approach achieves effective support in a software agent environment by blending direct manipulation work field organization, and decision, collaborative, and product development aiding in a manner that is tailored to both formal and informal characteristics of user work. In this paper we describe the philosophy behind and characteristics of the WCSS technology. We illustrate the technology with a discussion of an interactive WCSS prototype designed to improve support to military airlift mission planners at the headquarter level.","PeriodicalId":171131,"journal":{"name":"Proceedings of the IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH37093)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115527927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-10DOI: 10.1109/NAECON.2000.894908
Z. Qiang, Luo Zhiqiang, L. Qiao, Xiong Huagang
This paper studies the problem of guaranteeing real-time message deadlines in communication networks where the LTPB protocol, Linear Token Passing Bus, is employed. According to the exact network timing property, an optimal bandwidth allocation scheme (OLA) for LTPB network and a real-time performance analysis method based on WCAU (the worst available utilization) are proposed. Formal proof that OLA has better performance than any other schemes is given. Finally examples are given to demonstrate the correctness of the conclusion.
{"title":"An optimal bandwidth allocation scheme and real-time performance analysis for LTPB network","authors":"Z. Qiang, Luo Zhiqiang, L. Qiao, Xiong Huagang","doi":"10.1109/NAECON.2000.894908","DOIUrl":"https://doi.org/10.1109/NAECON.2000.894908","url":null,"abstract":"This paper studies the problem of guaranteeing real-time message deadlines in communication networks where the LTPB protocol, Linear Token Passing Bus, is employed. According to the exact network timing property, an optimal bandwidth allocation scheme (OLA) for LTPB network and a real-time performance analysis method based on WCAU (the worst available utilization) are proposed. Formal proof that OLA has better performance than any other schemes is given. Finally examples are given to demonstrate the correctness of the conclusion.","PeriodicalId":171131,"journal":{"name":"Proceedings of the IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH37093)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115145396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-10DOI: 10.1109/NAECON.2000.894934
P. McKeehen, M. Speed
This paper discusses the use of GENeral Environment for the Simulation of Integrated Systems (GENESIS) in the modeling and 6 DOF simulation of aerospace vehicles. While the emphasis is on the modeling and simulation of the VISTA/F-16, GENESIS simulations of the innovative control effectors (ICE) tailless aircraft configuration, and a hypervelocity vehicle configuration are also discussed. The approach to the recent integration of GENESIS and the GENESIS-based non-realtime VISTA/F-16 simulation into the Air Force Research Laboratory Sensors Directorate's Integrated Demonstrations and Applications Laboratory (IDAL) man-in-the-loop/hardware-in-the-loop (MITL/HITL) simulation facility's software executive is also described.
本文讨论了通用集成系统仿真环境(GENeral Environment for Simulation of Integrated Systems,简称GENESIS)在航天飞行器建模和六自由度仿真中的应用。虽然重点是VISTA/F-16的建模和仿真,但也讨论了创新控制效应器(ICE)无尾飞机配置和超高速飞行器配置的GENESIS仿真。本文还描述了最近将GENESIS和基于GENESIS的非实时VISTA/F-16模拟集成到空军研究实验室传感器局的综合演示和应用实验室(IDAL)人在环/硬件在环(MITL/HITL)模拟设施的软件执行中的方法。
{"title":"Integration of GENESIS in a MITL/HITL simulation environment","authors":"P. McKeehen, M. Speed","doi":"10.1109/NAECON.2000.894934","DOIUrl":"https://doi.org/10.1109/NAECON.2000.894934","url":null,"abstract":"This paper discusses the use of GENeral Environment for the Simulation of Integrated Systems (GENESIS) in the modeling and 6 DOF simulation of aerospace vehicles. While the emphasis is on the modeling and simulation of the VISTA/F-16, GENESIS simulations of the innovative control effectors (ICE) tailless aircraft configuration, and a hypervelocity vehicle configuration are also discussed. The approach to the recent integration of GENESIS and the GENESIS-based non-realtime VISTA/F-16 simulation into the Air Force Research Laboratory Sensors Directorate's Integrated Demonstrations and Applications Laboratory (IDAL) man-in-the-loop/hardware-in-the-loop (MITL/HITL) simulation facility's software executive is also described.","PeriodicalId":171131,"journal":{"name":"Proceedings of the IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH37093)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-10DOI: 10.1109/NAECON.2000.894959
Chuanyang Wang, Longya Xu
Based on conventional PWM modulation techniques and low inductance characteristics of PM machines, this paper presents a novel and practical approach of rotor position estimation for a PM machine. In conventional PWM modulations such as sin-/spl Delta/ and Space Vector PWM techniques, there are three voltage vectors in action during each sampling period. For each different voltage vector, the phase current change will be different. By measuring the current changes under different voltage vectors, the back-EMF can be obtained and therefore the rotor position estimated. In this method, no prior knowledge of the machine parameters is needed. Further, at low speed, the back-EMF detection technique works well because the current ripples at very low speed are effectively utilized and no integration is needed. The proposed approach has been investigated by comprehensive computer simulation and the experimental testing results illustrate the effectiveness of the proposed approach.
{"title":"A novel approach of rotor position detection for PM machines based on conventional PWM algorithms","authors":"Chuanyang Wang, Longya Xu","doi":"10.1109/NAECON.2000.894959","DOIUrl":"https://doi.org/10.1109/NAECON.2000.894959","url":null,"abstract":"Based on conventional PWM modulation techniques and low inductance characteristics of PM machines, this paper presents a novel and practical approach of rotor position estimation for a PM machine. In conventional PWM modulations such as sin-/spl Delta/ and Space Vector PWM techniques, there are three voltage vectors in action during each sampling period. For each different voltage vector, the phase current change will be different. By measuring the current changes under different voltage vectors, the back-EMF can be obtained and therefore the rotor position estimated. In this method, no prior knowledge of the machine parameters is needed. Further, at low speed, the back-EMF detection technique works well because the current ripples at very low speed are effectively utilized and no integration is needed. The proposed approach has been investigated by comprehensive computer simulation and the experimental testing results illustrate the effectiveness of the proposed approach.","PeriodicalId":171131,"journal":{"name":"Proceedings of the IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH37093)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127536449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-10DOI: 10.1109/NAECON.2000.894967
S.M. Magrabi, R.W. Gibbens
Summary form only given, as follows. A decentralized system architecture is utilized through an Information Filter implementation of the Kalman filter to estimate states pertinent in the operation of an unmanned aerial vehicle. This paper looks at the decentralized data fusion of an Inertial Measurement Unit (IMU) with data from the Global Positioning System (GPS) and an Air Data System (ADS) in order to perform fault detection and diagnosis. For this integrated GPS/IMU/ADS system model we investigate the Fault Detection and Diagnosis (FDD) methodologies born out of observing the information filter innovations as well as the residuals from Parity Space Methods. The viability and the apparent benefits of a joint implementation of these methods is presented, The advantages of both FDD methods become apparent at various stages of operation and the usefulness of applying the methods in conjunction is demonstrated. The Parity Space Methods with their superior isolability and robustness characteristics when combined with the temporal effect properties of the filter innovations provide very promising results. The effectiveness of a decentralized system from a robustness and integrity point of view is also exposed.
{"title":"Decentralized fault detection and diagnosis using combined parity space and filter innovations based methods","authors":"S.M. Magrabi, R.W. Gibbens","doi":"10.1109/NAECON.2000.894967","DOIUrl":"https://doi.org/10.1109/NAECON.2000.894967","url":null,"abstract":"Summary form only given, as follows. A decentralized system architecture is utilized through an Information Filter implementation of the Kalman filter to estimate states pertinent in the operation of an unmanned aerial vehicle. This paper looks at the decentralized data fusion of an Inertial Measurement Unit (IMU) with data from the Global Positioning System (GPS) and an Air Data System (ADS) in order to perform fault detection and diagnosis. For this integrated GPS/IMU/ADS system model we investigate the Fault Detection and Diagnosis (FDD) methodologies born out of observing the information filter innovations as well as the residuals from Parity Space Methods. The viability and the apparent benefits of a joint implementation of these methods is presented, The advantages of both FDD methods become apparent at various stages of operation and the usefulness of applying the methods in conjunction is demonstrated. The Parity Space Methods with their superior isolability and robustness characteristics when combined with the temporal effect properties of the filter innovations provide very promising results. The effectiveness of a decentralized system from a robustness and integrity point of view is also exposed.","PeriodicalId":171131,"journal":{"name":"Proceedings of the IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH37093)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127541218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-10DOI: 10.1109/NAECON.2000.894996
M. Bole, J. Svoboda
With the release of Bombardier's redesigned vertical take-off and landing unmanned air vehicle (VTOL UAV), the company's development team was interested in exploring fresh avenues for automatically landing the craft. The focus of this redesign revolved around navigation via DGPS data. The development of three principle components were identified as being paramount to the success of the system. First was the need for an algorithm to locate an appropriate intercept point on the intended landing profile. Landing initiated the switch of navigation modes from one using GPS to one employing DGPS. This differing of sources and their respective accuracies led to position errors between expected and actual craft location, thereby necessitating the inclusion of the flight-path intercept algorithm. With the establishment of concrete target points, a corroborative effort was required between the second and third components of the autoland system to provide motion control between two arbitrary points in space. The first of the two, a trajectory generator, provides an ideal locus of points based on a time law, paying careful attention to the craft's acceleration. A controller using the ideal points generated by the trajectory generator drives the craft and was the second component of the motion control system. The controller configuration was kept simple, due in no small part to the project's scope. The initial evaluation tool for theory development was a simplified version of Bombardier's overall craft dynamics model for the CL-327. This was then followed by tests with a high-fidelity model. Currently, flight testing is in progress.
{"title":"Design of a reconfigurable automated landing system for VTOL unmanned air vehicles","authors":"M. Bole, J. Svoboda","doi":"10.1109/NAECON.2000.894996","DOIUrl":"https://doi.org/10.1109/NAECON.2000.894996","url":null,"abstract":"With the release of Bombardier's redesigned vertical take-off and landing unmanned air vehicle (VTOL UAV), the company's development team was interested in exploring fresh avenues for automatically landing the craft. The focus of this redesign revolved around navigation via DGPS data. The development of three principle components were identified as being paramount to the success of the system. First was the need for an algorithm to locate an appropriate intercept point on the intended landing profile. Landing initiated the switch of navigation modes from one using GPS to one employing DGPS. This differing of sources and their respective accuracies led to position errors between expected and actual craft location, thereby necessitating the inclusion of the flight-path intercept algorithm. With the establishment of concrete target points, a corroborative effort was required between the second and third components of the autoland system to provide motion control between two arbitrary points in space. The first of the two, a trajectory generator, provides an ideal locus of points based on a time law, paying careful attention to the craft's acceleration. A controller using the ideal points generated by the trajectory generator drives the craft and was the second component of the motion control system. The controller configuration was kept simple, due in no small part to the project's scope. The initial evaluation tool for theory development was a simplified version of Bombardier's overall craft dynamics model for the CL-327. This was then followed by tests with a high-fidelity model. Currently, flight testing is in progress.","PeriodicalId":171131,"journal":{"name":"Proceedings of the IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH37093)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127579870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-10DOI: 10.1109/NAECON.2000.894960
F. Wolff, M. Knieser, D. Weyer, Chris Papachristou
High-level design for low power is difficult to accomplish especially for FPGA designs. Presents a design technique that uses pre-computed tables that characterize the RTL and Intellectual Property (IF) components to estimate power. Actual tables were computed and the low-power design technique demonstrated. The results show that a lower power design can be achieved given this design methodology.
{"title":"High-level low power FPGA design methodology","authors":"F. Wolff, M. Knieser, D. Weyer, Chris Papachristou","doi":"10.1109/NAECON.2000.894960","DOIUrl":"https://doi.org/10.1109/NAECON.2000.894960","url":null,"abstract":"High-level design for low power is difficult to accomplish especially for FPGA designs. Presents a design technique that uses pre-computed tables that characterize the RTL and Intellectual Property (IF) components to estimate power. Actual tables were computed and the low-power design technique demonstrated. The results show that a lower power design can be achieved given this design methodology.","PeriodicalId":171131,"journal":{"name":"Proceedings of the IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH37093)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133029767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-10DOI: 10.1109/NAECON.2000.894921
C. Wilson
Attacks by cyber criminals can be potentially just as damaging to the national infrastructure as attacks by cyber terrorists. Effective security countermeasures to combat computer crime parallel those used to protect against potential threats due to cyber terrorism and information warfare. Federal data about crime indicate that the growth in prosecution of computer crime is lower than the growth of computer incidents. A survey of the attitudes and activities of college students also revealed that current policy does not provide a strong deterrent to computer crime. Current policy, as expressed in the Computer Fraud and Abuse Act, does not hold organizational management accountable when their computers are broken into by hackers. However, security organizations repeatedly state that many if not most, computer intrusions occur largely because the host operating system has not had the latest fixes applied. Sometimes notices of system vulnerabilities have been widely published for months, but because available fixes were not applied, hackers using sophisticated attack tools, were able to locate exposed hosts on the Internet and attack those vulnerabilities. Hackers share vulnerability information via informal groups linked through the Internet, while government and private industry are reluctant to share vulnerability information. This characteristic gives attackers an advantage that helps them exploit host weaknesses. A recommendation is made to hold managers in the government and private sector more accountable for keeping their computer assets updated with the latest operating system fixes, to improve computer security and protect the national infrastructure.
{"title":"Holding management accountable: a new policy for protection against computer crime","authors":"C. Wilson","doi":"10.1109/NAECON.2000.894921","DOIUrl":"https://doi.org/10.1109/NAECON.2000.894921","url":null,"abstract":"Attacks by cyber criminals can be potentially just as damaging to the national infrastructure as attacks by cyber terrorists. Effective security countermeasures to combat computer crime parallel those used to protect against potential threats due to cyber terrorism and information warfare. Federal data about crime indicate that the growth in prosecution of computer crime is lower than the growth of computer incidents. A survey of the attitudes and activities of college students also revealed that current policy does not provide a strong deterrent to computer crime. Current policy, as expressed in the Computer Fraud and Abuse Act, does not hold organizational management accountable when their computers are broken into by hackers. However, security organizations repeatedly state that many if not most, computer intrusions occur largely because the host operating system has not had the latest fixes applied. Sometimes notices of system vulnerabilities have been widely published for months, but because available fixes were not applied, hackers using sophisticated attack tools, were able to locate exposed hosts on the Internet and attack those vulnerabilities. Hackers share vulnerability information via informal groups linked through the Internet, while government and private industry are reluctant to share vulnerability information. This characteristic gives attackers an advantage that helps them exploit host weaknesses. A recommendation is made to hold managers in the government and private sector more accountable for keeping their computer assets updated with the latest operating system fixes, to improve computer security and protect the national infrastructure.","PeriodicalId":171131,"journal":{"name":"Proceedings of the IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH37093)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131622937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-10-10DOI: 10.1109/NAECON.2000.894904
A. Ferendeci
A novel vertically interconnected 3D monolithically integrated antenna module development for conformal phased array antenna applications is presented. The module is processed layer by layer. Each subsequent layer is connected to the adjacent layers by vertical posts. In the initial developmental design, the module is comprised of a power amplifier, a phase shifter and a planar antenna on the final upper layer. The power amplifier uses a chip transistor embedded in a substrate with matching and bias networks that are processed in the ensuing upper layers. The uniqueness of the phase shifter is that it uses RF MEMS switches that are embedded in multilayers over the amplifier. The final two layers constitute a wide bandwidth balun and a slotted spiral antenna. A circuit plane is sandwiched between two polyimide dielectric layers which are also sandwiched between two ground planes. A sub-circuit of a given layer is initially simulated separately using commercially available CAD software followed by circuit processing and characterization.
{"title":"Monolithically processed vertically interconnected 3D phased array antenna module","authors":"A. Ferendeci","doi":"10.1109/NAECON.2000.894904","DOIUrl":"https://doi.org/10.1109/NAECON.2000.894904","url":null,"abstract":"A novel vertically interconnected 3D monolithically integrated antenna module development for conformal phased array antenna applications is presented. The module is processed layer by layer. Each subsequent layer is connected to the adjacent layers by vertical posts. In the initial developmental design, the module is comprised of a power amplifier, a phase shifter and a planar antenna on the final upper layer. The power amplifier uses a chip transistor embedded in a substrate with matching and bias networks that are processed in the ensuing upper layers. The uniqueness of the phase shifter is that it uses RF MEMS switches that are embedded in multilayers over the amplifier. The final two layers constitute a wide bandwidth balun and a slotted spiral antenna. A circuit plane is sandwiched between two polyimide dielectric layers which are also sandwiched between two ground planes. A sub-circuit of a given layer is initially simulated separately using commercially available CAD software followed by circuit processing and characterization.","PeriodicalId":171131,"journal":{"name":"Proceedings of the IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH37093)","volume":"17 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131773246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}