Exponential representation and consistency checking for M-layer
Han, Yin Yuan
MetadataShow full item record
M-layer,the tropospheric propagation effect prediction program is revised for greater accuracy, speed and stability. This is achieved through converting the extended complex number representation into the representation by complex exponent, improving the accuracy in Airy function computation, introducing a new mode locating algorithm and implementing a consistency checking procedure for determining the proper method to evaluate the height gain function. The revision has been documented and the new program source code has been delivered. It is recommended that the mode search protocol, not just the mode locating algorithm introduced in this revision, be completely revised. Unlike the current approach of blanketing the whole possible region until exhaustion, modes should be searched according to their range attenuation rates one by one along a well defined path. this should result in a faster and even more stable program. The program size can also be reduced
NPS Report NumberNPS-EC-92-005
Showing items related by title, author, creator and subject.
Smith, Douglas R. (Monterey, California. Naval Postgraduate School, 1980-02); NPS-52-80-004This paper investigates the conditions under which a discrete optimization problem can be formulated as a dynamic program. Following the terminology of (Karp and Held 1967), a discrete optimization problem is formalized ...
An application of Alloy to static analysis for secure information flow and verification of software systems Shaffer, Alan B. (Monterey, California. Naval Postgraduate School, 2008., 2008-12);Within a multilevel secure (MLS) system, flaws in design and implementation can result in overt and covert channels, both of which may be exploited by malicious software to cause unauthorized information flows. To address ...
Auguston, Mikhail; Levin, Timothy; Shaffer, Alan; Irvine, Cynthia E. (Association for Computing Machinery (ACM), 2005-06-30);Within a multilevel secure (MLS) system, trusted subjects are granted privileges to perform operations that are not possible by ordinary subjects controlled by mandatory access control (MAC) policy enforcement mechanisms. ...