scispace - formally typeset
Search or ask a question

Showing papers by "Motorola published in 1999"


Patent
David Ladd1, Gregory Johnson1
23 Jul 1999
TL;DR: In this article, a parser unit is communicatively coupled to the network fetcher to parse the retrieved information based on predetermined syntax and an interpreter unit and a state machine are also used.
Abstract: A voice browser to process a markup language document. A voice browser includes a network fetcher unit to retrieve information from a destination of an information source. A parser unit is communicatively coupled to the network fetcher to parse the retrieved information based on predetermined syntax. The parser unit generates a tree structure representing the hierarchy of the retrieved information. An interpreter unit and a state machine are also used. The method includes the steps of retrieving and parsing a markup language document to determine at least one user input, determining whether the user input corresponds to a predetermined grammar, and using the predetermined grammar when the user input corresponds to the predetermined grammar. The method of determining a grammar is based upon phonetic rules and pronunciation. The grammar is sent to a speech recognition engine and compared to a user input.

539 citations


10 May 1999
TL;DR: This paper presents actual results from monitoring smartcard power signals and introduces techniques that help maximize side-channel information and provides guidance for designing smartcard solutions that are secure against power analysis attacks.
Abstract: This paper presents actual results from monitoring smartcard power signals and introduces techniques that help maximize such side-channel information. Adversaries will obviously choose attacks that maximize side-channel information, so it is very important that the strongest attacks be considered when designing defensive strategies. In this paper, power analysis techniques used to attack DES are reviewed and analyzed. The noise characteristics of the power signals are examined and an approach to model the signal to noise ratio is proposed. Test results from monitoring power signals are provided. Next, approaches to maximize the information content of the power signals are developed and tested. These results provide guidance for designing smartcard solutions that are secure against power analysis attacks.

459 citations


Patent
12 Aug 1999
TL;DR: In this article, an Internet Protocol telephone system and method uses a telephone (26) to place and receive voice over Internet Protocol (VoIP)-based telephone calls and public switched telephone network (PSTN) based telephone calls.
Abstract: An Internet Protocol telephone system and method uses a telephone (26) to place and receive voice over Internet Protocol (VoIP)-based telephone calls and public switched telephone network (PSTN)-based telephone calls. An off-hook condition with the telephone (26) is detected and a sequence of signals generated by the telephone (26) is received. At least a first signal generated by the telephone (26) is buffered while the system attempts to detect a predetermined signal that signifies a VoIP-based call. Upon detection of the predetermined signal, the system intercepts subsequent signals in the sequence, absent the at least first signal that was buffered, and places the VoIP-based call via an internet (12). Otherwise, the system places the PSTN-based call via a PSTN (16).

457 citations


Patent
08 Jun 1999
TL;DR: In this article, a radio frequency identification tag circuit chip assembly is secured to the article and is electrically coupled to the antenna (22) formed on the article, and a conductive pattern printed on an article using conductive ink forms a preferred antenna.
Abstract: A radio frequency identification tag (14) utilizes an antenna (22) formed in association with, and thus integral to, an article, package, package container, label and/or identification badge (10). In a preferred embodiment, a radio frequency identification tag circuit chip assembly (12) is secured to the article (10) and is electrically coupled to the antenna (22) formed on the article (10). Printing a conductive pattern on the article using conductive ink forms a preferred antenna.

438 citations


Journal ArticleDOI
18 May 1999
TL;DR: Progress on improving the material structures, memory bits, thermal stability of the bits, and competitive architectures for GMR and MTJ based MRAM memories as well as the potential of these memories in the commercial memory market are discussed.
Abstract: We summarize the features of existing semiconductor memories and compare them to Magnetoresistive Random Access Memory (MRAM),a semiconductor memory with magnetic bits for nonvolatile storage. MRAM architectures based on Giant Magnetoresistance (GMR) and Magnetic Tunnel Junction (MTJ) cells are described. This paper will discuss our progress on improving the material structures, memory bits, thermal stability of the bits, and competitive architectures for GMR and MTJ based MRAM memories as well as the potential of these memories in the commercial memory market.

435 citations


Book ChapterDOI
12 Aug 1999
TL;DR: Three new types of power analysis attacks against smartcard implementations of modular exponentiation algorithms are described, each of which requires an adversary to exponentiate many random messages with a known and a secret exponent.
Abstract: Three new types of power analysis attacks against smartcard implementations of modular exponentiation algorithms are described. The first attack requires an adversary to exponentiate many random messages with a known and a secret exponent. The second attack assumes that the adversary can make the smartcard exponentiate using exponents of his own choosing. The last attack assumes the adversary knows the modulus and the exponentiation algorithm being used in the hardware. Experiments show that these attacks are successful. Potential countermeasures are suggested.

412 citations


Patent
03 Sep 1999
TL;DR: In this article, an interposer is used to attach an integrated circuit (116) to the antenna elements (112, 114), which reduces the precision required to successfully couple the integrated circuit to the antennas elements.
Abstract: A radio frequency identification tag (100) includes a substrate member (110) having an inner surface and an outer surface. Disposed on the inner surface are first (112) and second (114) antenna elements. The antenna elements are electrically isolated from each other and coupled to two separate pads on an integrated circuit (116). Adhesive (118) is applied on the inner surface of the substrate, the antenna elements and the integrated circuit for securing the tag. The tag may employ an interposer (600) to attach integrated circuit (116) to the antenna elements (112, 114). The interposer (600) has a substrate (602) and first and second connecting pads (602, 604) electrically isolated from each other and electrically connected to the connecting pads on the integrated circuit (116). Interposer (600) reduces the amount of the precision required to successfully couple integrated circuit (116) to the antenna elements (112, 114).

376 citations


Journal ArticleDOI
TL;DR: In this article, the authors investigated the thermal stability of prismatic Li-ion cells and their components and concluded that the heat generation from the decomposition of PE material and reaction of that with electrolyte initiates thermal runaway in a Li−ion cell, under thermally or abusive conditions.
Abstract: Thermal stability of fully charged 550 mAh prismatic Li‐ion cells (Sn‐doped carbon) and their components are investigated. Accelerating rate calorimetry (ARC) is used to determine the onset temperature of exothermic chemical reactions that force the cell into thermal runaway. Differential scanning calorimetry (DSC) and thermogravimetry analysis are used to determine the thermal stability of the cell's positive electrode (PE) and negative electrode (NE) materials from 35 to 400°C. The cell self‐heating exothermic reactions start at 123°C, and thermal runaway occurs near 167°C. The total exothermic heat generation of the NE and PE materials are 697 and 407 J/g, respectively. Heat generations of the NE and PE materials, washed in diethyl carbonate (DEC) and dried at ≈65°C under vacuum, are significantly lower than unwashed samples. Lithium plating increases the heat generation of the NE material at temperatures near the lithium melting point. Comparison of the heat generation profiles from DSC and ARC tests indicates that thermal runaway of this cell is close to the decomposition temperature range of the unwashed PE material. We conclude that the heat generation from the decomposition of PE material and reaction of that with electrolyte initiates thermal runaway in a Li‐ion cell, under thermally or abusive conditions. © 1999 The Electrochemical Society. All rights reserved.

374 citations


Journal ArticleDOI
TL;DR: In this paper, the authors present results of characterization studies carried out on some commercially available lithium-ion battery separators, and the relevance of these results to battery performance and safety are also discussed.

370 citations


Journal ArticleDOI
TL;DR: In this paper, the potential impact of high/spl kappa/ gate dielectrics on device short-channel performance is studied over a wide range of dielectric permittivities using a two-dimensional (2D) simulator implemented with quantum mechanical models.
Abstract: The potential impact of high-/spl kappa/ gate dielectrics on device short-channel performance is studied over a wide range of dielectric permittivities using a two-dimensional (2-D) simulator implemented with quantum mechanical models. It is found that the short-channel performance degradation is caused by the fringing fields from the gate to the source/drain regions. These fringing fields in the source/drain regions further induce electric fields from the source/drain to channel which weakens the gate control. The gate dielectric thickness-to-length aspect ratio is a proper parameter to quantify the percentage of the fringing field and thus the short channel performance degradation. In addition, the gate stack architecture plays an important role in the determination of the device short-channel performance degradation. Using double-layer gate stack structures and low-/spl kappa/ dielectric as spacer materials can well confine the electric fields within the channel thereby minimizing short-channel performance degradation. The introduction of a metal gate not only eliminates the poly gate depletion effect, but also improves short-channel performance. Several approaches have been proposed to adjust the proper threshold voltage when midgap materials or metal gates are used.

335 citations


Patent
11 Jun 1999
TL;DR: In this paper, the location information is generated for a mobile device using a global positioning system (GPS) receiver or by other means, and a request for receipt of location information over a wireless communications channel from a requesting entity is sent to the requesting entity, over the wireless communication channel.
Abstract: Location information is generated for a mobile device using a global positioning system (GPS) receiver ( 17 ) or by other means. A request for receipt of location information is received at the mobile device, over a wireless communications channel from a requesting entity ( 25 ), and a confirmation of permission to receive location information is sent to the requesting entity, over the wireless communication channel. The confirmation includes a digital signature for the requesting entity to use as verifiable proof of confirmation of permission. The requesting entity can use the digital signature to obtain the location information from a location server ( 21 ). The requesting entity and/or the location server are optionally located in the mobile communications device.

Journal ArticleDOI
TL;DR: V-Elph as mentioned in this paper is a simulation and modeling package developed at Texas A&M University that facilitates in-depth studies of electric vehicle (EV) and hybrid EV (HEV) configurations through visual programming by creating components as hierarchical subsystems.
Abstract: This paper discusses a simulation and modeling package developed at Texas A&M University, V-Elph 2.01. V-Elph facilitates in-depth studies of electric vehicle (EV) and hybrid EV (HEV) configurations or energy management strategies through visual programming by creating components as hierarchical subsystems that can be used interchangeably as embedded systems. V-Elph is composed of detailed models of four major types of components: electric motors, internal combustion engines, batteries, and support components that can be integrated to model and simulate drive trains having all electric, series hybrid, and parallel hybrid configurations. V-Elph was written in the Matlab/Simulink graphical simulation language and is portable to most computer platforms. This paper also discusses the methodology for designing vehicle drive trains using the V-Elph package. An EV, a series HEV, a parallel HEV, and a conventional internal combustion engine (ICE) driven drive train have been designed using the simulation package. Simulation results such as fuel consumption, vehicle emissions, and complexity are compared and discussed for each vehicle.

Journal ArticleDOI
TL;DR: Reasonably good agreement has been seen between current-voltage measurements and a 1D quantum transport model and the presence of a low-resistivity interfacial layer that TEM and electrical measurements have shown to be SiO2.
Abstract: Titanium dioxide has been deposited on silicon for use as a high-permittivity gate insulator in an effort to produce low-leakage films with oxide equivalent thicknesses below 2.0 nm. Excellent electrical characteristics can be achieved, but TEM and electrical measurements have shown the presence of a low-resistivity interfacial layer that we take to be SiO2. The leakage current follows several mechanisms depending on the bias voltage. Reasonably good agreement has been seen between current-voltage measurements and a 1D quantum transport model.

Patent
Brian Joseph Budnik1
07 Jan 1999
TL;DR: In this paper, a variable-class linear amplifier (600, 800, 900) applies a supply type of envelope modulation to an RF power amplifier operating in or near compression at highest envelope amplitudes, and transitions gradually to an envelope tracking type of operation at intermediate amplifier amplitudes.
Abstract: A variable-class linear amplifier (600, 800, 900) applies a supply type of envelope modulation to an RF power amplifier operating in or near compression at highest envelope amplitudes, and transitions gradually to an envelope tracking type of operation at intermediate envelope amplitudes. The amplifier further transitions gradually to a linear class of operation with a constant supply voltage (508) at lowest envelope amplitudes.

Journal ArticleDOI
TL;DR: In this paper, the authors analyzed the solder reaction-assisted crystallization of electroless Ni-P under bump metallization in the Si/SiO2/Al/Ni-P/63Sn-37Pb multilayer structure using transmission electron microscopy.
Abstract: Solder reaction-assisted crystallization of electroless Ni–P under bump metallization in the Si/SiO2/Al/Ni–P/63Sn–37Pb multilayer structure was analyzed using transmission electron microscopy, scanning electron microscopy, energy dispersive x-ray, and electron probe microanalyzer. The electroless Ni–P had an amorphous structure and a composition of Ni85P15 in the as-plated condition. Upon reflow, the electroless Ni–P transformed to Ni3Sn4 and Ni3P. The crystallization of electroless Ni–P to Ni3P was induced by the depletion of Ni from electroless Ni–P to form Ni3Sn4. The interface between electroless Ni–P and Ni3P layer was planar. From the Ni3P thickness-time relationship, the kinetics of crystallization was found to be diffusion controlled. Conservation of P occurs between electroless Ni–P and Ni3P, meaning that little or no P diffuses into the molten solder. Combining the growth rates of Ni3Sn4 and Ni3P, the consumption rate of electroless Ni–P was determined. Based upon microstructural and diffusion r...

Patent
Noel H. Eberhardt1
18 Jun 1999
TL;DR: In this paper, a radio frequency identification tag (RFID) circuit chip is coupled to an antenna and a conductive pattern is printed onto a substrate, which is then arranged for coupling to the RFID tag circuit chip.
Abstract: A radio frequency identification tag (14) includes a radio frequency identification tag circuit chip (12) coupled to an antenna (10) including a conductive pattern (22) printed onto a substrate (16). The substrate may form a portion of an article, a package, a package container, a ticket, a waybill, a label and/or an identification badge. The conductive pattern includes a first coupling region (28) and a second coupling region (30) arranged for coupling to the radio frequency identification tag circuit chip. The first coupling region and the second coupling region are precisely located and isolated from one another via an aperture (31) formed in the substrate.

Proceedings ArticleDOI
12 Apr 1999
TL;DR: A collection of eleven heuristics from the literature has been selected, implemented, and analyzed under one set of common assumptions and provides one even basis for comparison and insights into circumstances where one technique will outperform another.
Abstract: Heterogeneous computing (HC) environments are well suited to meet the computational demands of large, diverse groups of tasks (i.e., a meta-task). The problem of mapping (defined as matching and scheduling) these tasks onto the machines of an HC environment has been shown, in general, to be NP-complete, requiring the development of heuristic techniques. Selecting the best heuristic to use in a given environment, however, remains a difficult problem, because comparisons are often clouded by different underlying assumptions in the original studies of each heuristic. Therefore, a collection of eleven heuristics from the literature has been selected, implemented, and analyzed under one set of common assumptions. The eleven heuristics examined are opportunistic load balancing, user-directed assignment, fast greedy, min-min, max-min, greedy, genetic algorithm, simulated annealing, genetic simulated annealing, tabu, and A*. This study provides one even basis for comparison and insights into circumstances where one technique will outperform another. The evaluation procedure is specified, the heuristics are defined, and then selected results are compared.

Journal ArticleDOI
TL;DR: In this article, the effect of horizontal and vertical displacements of the LS and HS potential wells has been discussed on the basis of the nonadiabatic multiphonon theory.

Patent
06 Oct 1999
TL;DR: An improved wrist-carried radiotelephone includes a first housing including a microphone, a display and a radio transceiver, and a second housing includes a latch, a user interface, a speaker and a removable battery as discussed by the authors.
Abstract: An improved wrist-carried radiotelephone includes a first housing including a microphone, a display and a radio transceiver. A second housing includes a latch, a user interface, a speaker, and a removable battery. A flexible wristband has a first portion including an antenna extending downwardly and a latch clip at one end thereof operable to be received in the latch of the second housing. A second portion of the wristband includes electrical connections to connect the circuits of the first and second housing. The wristband includes support members to maintain the wrist-carrier radiotelephone in a predetermined configuration when the first portion of the wristband is unlatched from the second housing such that the speaker and microphone of the radiotelephone are at an optimum orientation in relation to a user's ear and mouth.

Patent
18 May 1999
TL;DR: In this article, a plurality of reconfigurable resource units (13) can each be dynamically altered to perform any of a multitude of processing tasks, and a controller can decide whether or not one of the tasks should be supported by the plurality.
Abstract: A communicator (10) includes a plurality of reconfigurable resource units (13) that can each be dynamically altered to perform any of a multitude of processing tasks. A controller (16) determines a plurality of processing tasks to be supported by the communicator (10) and configures the plurality of reconfigurable resource units (13) accordingly. A memory (18) stores a library of configuration files for use by the controller (16) in configuring the plurality of reconfigurable resource units (13). In one embodiment, the controller (16) continuously adapts the plurality of reconfigurable resource units (13) according to present system requirements.

Patent
24 Aug 1999
TL;DR: In this article, a wireless communication system (200) comprises a connectionless packet network (201) coupled to a plurality of sites (203-208) that are in wireless communication with the plurality of subscriber units (210-217) having corresponding talk group identifications.
Abstract: A wireless communication system (200) comprises a connectionless packet network (201) coupled to a plurality of sites (203-208) that are in wireless communication with a plurality of subscriber units (210-217) logically arranged into a plurality of talk groups having corresponding talk group identifications. In one embodiment, each site maintains mappings (220-225) of at least one multicast address to at least one talk group identification. In another embodiment, individual subscriber units maintain such mappings (320). When a subscriber unit affiliates with a given site and talk group (501, 601), the site identifies a multicast address corresponding to the talk group. Based on the multicast address, the site can participate in traffic targeted for the multicast address and, consequently, for the talk group. In this manner, mobility processing is decentralized, system scalability is improved and call setup delays are minimized.

Patent
28 Apr 1999
TL;DR: In this article, a character hypothesis is generated, which is a data set of a character, a start vector and an end vector, where the score represents a likelihood of the character being present in the handwritten input at a position starting at the start vector, and ending at the end vector.
Abstract: In a method of recognition of handwritten input, a preprocessing module (200) of a recognizer (203) having a recognition module (202), segments handwritten input into strokes, to provide stroke vectors. A search module (204) generates hypothetical character strings for scoring by the recognition module (202). A character hypothesis is generated which is a data set of a character, a start vector and an end vector. The recognizer (203) provides a non-cumulative score for the character hypothesis, where the score represents a likelihood of the character being present in the handwritten input at a position starting at the start vector and ending at the end vector. The recognizer (203) delivers to the search module a result that is either the score for the selected first character hypothesis or a result that allows the search module to temporarily ignore the hypothesis or to kill it altogether. The search module maintains or disregards the first hypothetical character string dependent on the result. The process is repeated for other character hypotheses and other hypothetical character strings.

Proceedings ArticleDOI
17 Aug 1999
TL;DR: This paper proposes using a small instruction buffer, also called a loop cache, to save power in caches, which has no address tag store and knows precisely whether the next instruction request will hit in the loop cache well ahead of time.
Abstract: A fair amount of work has been done in recent years on reducing power consumption in caches by using a small instruction buffer placed between the execution pipe and a larger main cache. These techniques, however, often degrade the overall system performance. In this paper, we propose using a small instruction buffer, also called a loop cache, to save power. A loop cache has no address tag store. It consists of a direct-mapped data array and a loop cache controller. The loop cache controller knows precisely whether the next instruction request will hit in the loop cache, well ahead of time. As a result, there is no performance degradation.


Patent
03 Feb 1999
TL;DR: In this paper, a portable communication device (100 ) that has a processing section ( 208 ) to control operation of the portable communication devices ( 100 ) in response to an input signal (TS_INPUT) and a user interface having a touch sensitive input device ( 128 ) for generating the input signal, also has a sensor ( 134 ).
Abstract: A portable communication device ( 100 ) that has a processing section ( 208 ) to control operation of the portable communication device ( 100 ) in response to an input signal (TS_INPUT) and a user interface having a touch sensitive input device ( 128 ) for generating the input signal (TS_INPUT), also has a sensor ( 134 ). The sensor ( 134 ) disables the touch sensitive input device ( 128 ) from generating the input signal (TS_INPUT) when the portable communication device ( 100 ) is positioned in close proximity to a user and, thereby, preventing inadvertent actuations while the user holds the portable communication device ( 100 ) against his or her head to facilitate communication.

Journal ArticleDOI
TL;DR: In this article, the authors investigated boron diffusion as a function of the Fermi-level position in crystalline silicon using ab initio calculations and proposed a new mechanism for B diffusion mediated by Si self-interstitials.
Abstract: In this Letter we investigate boron diffusion as a function of the Fermi-level position in crystalline silicon using ab initio calculations. Based on our results, a new mechanism for B diffusion mediated by Si self-interstitials is proposed. Rather than kick out of B into a mobile channel, we find a direct diffusion mechanism for the boron-interstitial pair for all Fermi-level positions. Our activation energy of $3.5--3.8$ eV, migration barrier of $0.4--0.7$ eV, and diffusion-length exponent of $\ensuremath{-}0.6$ to $\ensuremath{-}0.2$ eV are in excellent agreement with experiment.

Patent
07 Sep 1999
TL;DR: In this paper, the number of active elements that are active during normal operation is selected to achieve a desired level of antenna performance without the consumption of excess power by spare elements in the antenna.
Abstract: An array antenna (10) having a plurality of antenna elements (12) keeps only a subset of elements active during normal antenna operation. When a failure of one of the active elements in the array (10) is detected, one of the previously inactive elements (46) is activated to operate as a replacement for the failed element (50). The number of elements that are active during normal operation is selected to achieve a level of antenna performance required by an underlying antenna application. Thus, a desired level of antenna performance is maintained during the life of the array antenna (10) without the consumption of excess power by spare elements in the antenna. Redistributions of inactive element locations are periodically performed during the life of the array antenna (10) to enhance antenna performance in light of failed element locations.

Patent
05 Jan 1999
TL;DR: In this paper, a wireless electrostatic charging and communicating system includes an electrostatic reader, a charger, and an energy storage device for being charged or communicated with in the electrostatic system.
Abstract: The wireless electrostatic charging and communicating system includes an electrostatic reader, an electrostatic charger and an electrostatic rechargeable device or electrostatic transceiver such as such as a smart card or radio frequency identification (RFID) card without requiring physical contact to electrodes. The electrostatic system is capacitance based and the charging and communicating occurs over capacitively coupled electrostatic electrodes or electrostatic electrodes. The electrostatic rechargeable device or transceiver includes a charge receiver and an energy storage means, for being charged or communicated with in the electrostatic system. The energy storage means may be any energy storage device including a rechargeable battery or capacitor. In a second embodiment, the electrostatic rechargeable device or transceiver includes an electrostatic charge receiver and an electromagnetic charge receiver with the energy storage means so that it may be alternatively charged or communicated with in an electrostatic system or an electromagnetic system for compatibility in either system.

Patent
28 Jul 1999
TL;DR: In this article, a vehicle locating system (200) includes a beacon (108) carried by a vehicle, a tracking control station (106) for generating a beacon activation signal (110), and one or more mobile communication devices (116, 118) which include a first receiver (516) utilized to receive a location signal (122) identifying a geographic location of a mobile communication device, and a transceiver (406) utilizing to provide communication between said mobile device and a communication system controller.
Abstract: A vehicle locating system (200) includes a beacon (108) carried by a vehicle, a tracking control station (106) for generating a beacon activation signal (110) which enables the beacon (108) to broadcast a vehicle identification signal (112), and one or more mobile communication devices (116, 118) which include a first receiver (516) utilized to receive a location signal (122) identifying a geographic location of a mobile communication device, and a transceiver (406) utilized to provide communication between said mobile communication device and a communication system controller. The one or more mobile communication devices (116, 118) further include a second receiver (502) utilized to receive the vehicle identification signal (112) broadcast by the beacon (108), and a vehicle tracking controller (520), responsive to the vehicle identification signal (112) which is received, for controlling a transmission of the vehicle identification signal (112) and the location signal (122).

Journal ArticleDOI
D.G. Leeper1
TL;DR: In this article, the authors describe a class of massively thinned linear and planar arrays that show well-behaved sidelobes in spite of the thinning, which is called isophoric arrays.
Abstract: Traditional filled phased arrays have an element placed in every location of a uniform lattice with half-wavelength spacing between the lattice points. Massively thinned arrays have fewer than half the elements of their filled counterparts. Such drastic thinning is normally accompanied by loss of sidelobe control. This paper describes a class of massively thinned linear and planar arrays that show well-behaved sidelobes in spite of the thinning. The term isophoric is derived from Greek roots to denote uniform weight. In isophoric arrays, element placement based on difference sets forces uniformly weighted spatial coverage. This constraint forces the array power pattern to pass through V uniformly spaced, equal, and constant values that are less than 1/K times the main beam peak, where V is the aperture size in half-wavelengths and K is the number of elements in the array. The net result is reduced peak sidelobes, especially when compared to cut-and-try random-placement approaches. An isophoric array will exhibit this sidelobe control even when the array has been thinned to the extent that K is approximately the square root of V. Where more than one beam must be generated at a time, isophoric array designs may be used to advantage even within a traditional filled array. By "interweaving" two isophoric subarrays within a filled array and by appropriate cyclic shifting of the element assignments over time, two independent antenna power patterns can be generated, each with a sidelobe region that is approximately a constant value of 1/(2K) relative to the main beam, where K is the number of elements in the subarray.