Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 351 - 375 of 611

Software-defined Radio Based Measurement Platform for Wireless Networks

October 15, 2015
Author(s)
I-Chun Chao, Kang B. Lee, Rick Candell, Frederick M. Proctor, Chien-Chung Shen
There has been a dramatic push to adopting wireless networking technologies and protocols (such as 802.11, ZigBee, WirelessHART, Bluetooth, ISA100.11a, etc.) into time-critical networks. End-to-end latency is critical to many distributed applications and

Antenna Measurement Implementations and Dynamic Positional Validation Using a Six Axis Robot

October 11, 2015
Author(s)
David R. Novotny, Josh Gordon, Michael H. Francis, Ronald C. Wittmann, Alexandra Curtin, Jeffrey R. Guerrieri
We have performed spherical and extrapolation scans of two antennas at 118 GHz using a commercial 6-axis robot. Unlike spherical scanning, linear extrapolations do not precisely conform to the native circular movement of the individual robot axes. To

Peer-to-Peer Urban Channel Characteristics for Two Public-Safety Frequency Bands

October 1, 2015
Author(s)
Catherine A. Remley, David W. Matolak, Camillo A. Gentile, Christopher L. Holloway, Qiong Wu, Qian Zhang
We report on ground-based wireless channel characteristics for an urban environment in two public safety bands. Results are based upon measurements taken in Denver in June 2009. The public safety bands we investigated are the 700 MHz and 4.9 GHz bands

Real-Time Centralized Spectrum Monitoring: Feasibility, Architecture, and Latency

September 29, 2015
Author(s)
Michael R. Souryal, Mudumbai Ranganathan, John Mink, Naceur A. El Ouni
This paper describes the implementation and evaluation of a real-time, centralized spectrum monitoring and alert system. Such a system can be used to support emerging spectrum sharing solutions that use a centralized controller to mediate tiered access to

Using the Amplitude Variation of a Reverberation Chamber Channel to Predict the Synchronization of a Wireless Digital Communication Test System

August 16, 2015
Author(s)
Ray R. Tanuhardja, Luis A. Gonzalez, Chih-Ming Wang, William F. Young, Kate Remley
This contribution discusses the use of a metric based on the amplitude variation of a channel in the signal bandwidth to predict whether or not a digital wireless communication test system receiver will be able to demodulate a test signal. This metric is

Uncoordinated Scheduling Strategies for BAN-to-BAN Interference Mitigation

August 13, 2015
Author(s)
Kamran Sayrafian, Martina Barbi, Mehdi Alasti
A Body Area Network (BAN) is a radio standard for wireless connectivity of wearable and implantable sensors located inside or in close proximity to the human body. Medical and some other applications impose stringent constraints on battery powered BAN

Interference and Coexistence of Wireless Systems in Critical Infrastructure

July 7, 2015
Author(s)
Galen H. Koepke, William F. Young, John M. Ladbury, Jason B. Coder
We examine interference and coexistence testing issues, test methods, and the need to update and develop new test methodologies related to the use of wireless devices in critical infrastructure systems. A case study on interference is presented along with

PASSING THE BATON: Message FROM THE INCOMING EDITOR-IN-CHIEF

June 1, 2015
Author(s)
Hamid Gharavi
This incoming Editor In Chief's (EIC) message is expected to appear in the next issue of the IEEE wireless communications. The editorial team will be under the leadership of the new EIC for a period of three years.

Area Coverage in a Fixed-Obstacle Environment using Mobile Sensor Networks

May 17, 2015
Author(s)
Kamran Sayrafian, Hamid Mahboubi, Amir Aghdam
In this chapter, efficient deployment strategies for mobile sensor networks are proposed to improve the coverage area in target fields containing obstacles. The developed algorithms iteratively calcu- late and update the position of the sensors in order to

Authentication Considerations for Public Safety Mobile Networks

May 14, 2015
Author(s)
Nelson Hastings, Joshua M. Franklin, Larry Feldman, Greg Witte
This bulletin summarizes the information presented in NISTIR 8014, Considerations for Identity Management in Public Safety Mobile Networks, written by Nelson Hastings and Joshua Franklin. The publication analyzes approaches to identity management for

Millimeter-Wave Modulated-Signal and Error-Vector-Magnitude Measurement With Uncertainty

May 1, 2015
Author(s)
Catherine A. Remley, Dylan F. Williams, Paul D. Hale, Chih-Ming Wang, Jeffrey A. Jargon, Youngcheol Park
We provide techniques to generate and characterize precision wideband millimeter-wave modulated signals. We use predistortion to obtain a significant improvement in signal quality and an associated reduction in the error vector magnitude (EVM) of the

A Compact Millimeter-wave Multisine Generator for Calibrating Broadband Vector Receivers

April 30, 2015
Author(s)
Paul D. Hale, Kate Remley, Dylan Williams, Jeffrey Jargon, Chih-Ming Wang
We propose a compact and low cost waveform source that can be used to calibrate the magnitude and phase response of vector receivers over a bandwidth as large as a few gigahertz. The generator consists of a broadband comb generator followed by a filter and

Calibration of Millimeter-wave Channel Sounders for Super-resolution Multipath Component Extraction

April 9, 2015
Author(s)
Peter B. Papazian, Jae-Kark Choi, Jelena Senic, Peter J. Jeavons, Camillo Gentile, Nada T. Golmie, Roy Sun, David R. Novotny, Kate Remley
Millimeter-wave communication systems will rely on highly directional antennas to compensate for the greater pathloss expected in their frequency bands of operation. Electronic beamforming, hence, will form a cornerstone for the technology. For the

Considerations for Identity Management in Public Safety Networks

March 30, 2015
Author(s)
Nelson Hastings, Joshua M. Franklin
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. These considerations are scoped into the context of their

Guidance for Secure Authorization of Mobile Applications in the Corporate Environment

March 19, 2015
Author(s)
Athanasios T. Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implementation

A Review of Wireless Coexistence Test Methodologies

March 15, 2015
Author(s)
William F. Young, Jason B. Coder, Luis A. Gonzalez
This paper discusses several wireless coexistence test methods in-practice and proposed for industry standards such as ANSI C63.27 The test methods include conducted and radiated setups, and utilize a range of technologies at various levels of
Displaying 351 - 375 of 611