Search results

Filter

Filetype

Your search for "Cheap fc 26 coins Buyfc26coins.com is EA Sports official for FC 26 coins The process was smooth and quick..QXyW" yielded 89016 hits

Linearity Enhancements of Receiver Front-end Circuits for Wireless Communication

Technology scaling in advanced CMOS nodes has been very successful in reducing the cost and increasing the operating frequency, however, it has also resulted in reduced transistor intrinsic gain and increased thermal noise coefficient, and most importantly, deteriorated linearity performance. At the same time, advanced wireless communication standards offer ever increasing data rates and pose more

Understanding the WiFi usage of university students

In this work, we analyze the use of a WiFi network deployed in a large-scale technical university. To this extent, we leverage three weeks of WiFi traffic data logs and characterize the spatio-temporal correlation of the traffic at different granularities (each individual access point, groups of access points, entire network). The spatial correlation of traffic across nearby access points is also

A 2.2ps 2-D Gated-Vernier Time-to-Digital Converter with Digital Calibration

This paper presents a 2-dimension (2-D) Vernier time-to-digital converter (TDC) which uses two 3-stage gated-ring-oscillators (GROs) in the X/Y Vernier branches. The already small Vernier quantization noise (~10.6ps) is improved by the 1st-order noise shaping of the GRO. Moreover, since all delay differences between X phases and Y phases can be used (rather than only the diagonal line of the 1-dim

A Two Phase Case Study on Implementation of Open Source Development Practices within a Company Setting

Implementation of open source development practices within commercial settings can bring benefits such as improved source code quality, lower maintenance costs, and increased innovation. However, a widespread in-house implementation of the practices has not been observed. The goal of this research is to understand factors which hinder the implementation. For the purpose, development practices of a

DoKnowMe: Towards a Domain Knowledgedriven Methodology for Performance Evaluation

Software engineering considers performance evaluation to be one of the key portions of software quality assurance. Unfortunately, there seems to be a lack of standard methodologies for performance evaluation even in the scope of experimental computer science. Inspired by the concept of “instantiation” in object-oriented programming, we distinguish the generic performance evaluation logic from the

Using a Predator-Prey Model to Explain Variations of Cloud Spot Price

The spot pricing scheme has been considered to be resource-efficient for providers and cost-effective for consumers in the Cloud market. Nevertheless, unlike the static and straightforward strategies of trading on-demand and reserved Cloud services, the market-driven mechanism for trading spot service would be complicated for both implementation and understanding. The largely invisible market acti

Tracking of multipath delays for UWB based positioning

Outdoor positioning systems are commonly available and typically rely on satellite navigation. The same is not true for indoor positioning systems. Severe multipath, non line-of sight to satellites and moving objects are some of the aspects that make the task of indoor positioning tricky. In this paper, we analyse different tracking methods to estimate and track the delay evolution of a radio chan

A dual input-channel software defined receiver platform for GSM WCDMA and Wi-Fi

In this paper a synchronized dual input-channel multi-mode Software Defined Radio receiver platform that we built originally is presented. The receiver platform compatible with the GSM, WCDMA, and Wi-Fi standards can detect and identify the surrounding base stations and access points. It features wide frequency range, high adaptive sampling rate and especially dual phase coherent receiving channel

RiskUse - Guidelines, version 1.0

The purpose of the risk management process, RiskUse is to provide practitioners, mainly risk managers with a software risk management process that has a well-defined user perspective. The aim is to present a risk management process that allows the development organisation to perform adequate risk management activities that can ensure that the developed software is safe from a user perspective.

Measuring and using the RSSI of IEEE 802.11p

Abstract in UndeterminedThe scalability of intelligent transport systems (ITS) applications is difficult to test in a field operational test (FOT) due to the high number of ITS equipped vehicles required. Therefore, computer simulations for evaluating different wireless communication technologies for ITS different applications can serve as a complement. In this paper we present results from lab me

Exploring wireless mesh networks for collaborative augmented reality environments

Augmented Reality (AR) has emerged as a technology able to greatly support the interaction between people and digital information by merging virtual objects with the real environment. So far, research in this field has been mainly focused on single-user scenarios with pre-stored digital data whose visualization needs to be appropriately and promptly aligned with physical objects. Instead, latest d

Failure disjoint paths

Given a set of commodities and a network where some arcs can fail while others are reliable, we first consider the problem of computing a minimum-cost pair of paths not sharing failing links. If a reliable link belongs to both paths then its cost is counted only once. We show that this problem can be solved in strongly polynomial time. Second, we consider a routing problem where each commodity can

Evaluation of Some Algorithms for Hardware-Oriented Message Authentication

In this technical report, we consider ultra light-weight constructions of message authentication in hardware applications. We examine several known constructions and evaluate details around their hardware implementations. These constructions are all based on the framework of universal hash functions.

Localization of an RF source inside the Human body for Wireless Capsule Endoscopy

This paper presents a method based on the phase dierence of arrival and the non-linear least square estimation to lo- calize a radio-frequency (RF) source, e.g a wireless capsule endoscope, inside the human body. The phase dierence of arrival at multiple frequencies of a signal is used to estimate the distance of the source to a receiver. The linear least square estimation is used to estimate the

Mixed Integer Programming Model of MCCA-aware Acknowledging in Wireless Mesh Networks

The paper investigates advantages of using an MCCA-aware acknowledging system in IEEE 802.11s Wireless Mesh Networks (WMN). The MCCA (MCF controlled channel access) protocol allows for reserving time slots for a point-topoint transmission over a wireless link. The protocol assures that the transmission will not be hindered by any other 802.11 device that uses MCCA, by preventing all neighbors of b