Search results
Filter
Filetype
Your search for "Cheap fc 26 coins Buyfc26coins.com is EA Sports official for FC 26 coins The process was smooth and quick..QXyW" yielded 89022 hits
Evaluation of Some Algorithms for Hardware-Oriented Message Authentication
In this technical report, we consider ultra light-weight constructions of message authentication in hardware applications. We examine several known constructions and evaluate details around their hardware implementations. These constructions are all based on the framework of universal hash functions.
Localization of an RF source inside the Human body for Wireless Capsule Endoscopy
This paper presents a method based on the phase dierence of arrival and the non-linear least square estimation to lo- calize a radio-frequency (RF) source, e.g a wireless capsule endoscope, inside the human body. The phase dierence of arrival at multiple frequencies of a signal is used to estimate the distance of the source to a receiver. The linear least square estimation is used to estimate the
Mixed Integer Programming Model of MCCA-aware Acknowledging in Wireless Mesh Networks
The paper investigates advantages of using an MCCA-aware acknowledging system in IEEE 802.11s Wireless Mesh Networks (WMN). The MCCA (MCF controlled channel access) protocol allows for reserving time slots for a point-topoint transmission over a wireless link. The protocol assures that the transmission will not be hindered by any other 802.11 device that uses MCCA, by preventing all neighbors of b
An Efficient Heuristic for Flow Optimization in Wireless Mesh Networks
Tunable Duplex Filter for Adaptive Duplexers of Advanced LTE Handsets
K-band receiver front-ends in 0.13um CMOS using carrier technology
Holocene changes in pollen-based vegetation composition in N-NW Europe: why does quantitative reconstruction matters?
Integer programming models for maximizing parallel transmissions in wireless networks
On Multilink Shadowing Effects in Measured V2V Channels on Highway
Shadowing from vehicles can degrade the performance of vehicle-to-vehicle (V2V) communication systems significantly. It is thus important to characterize and model the influence of common shadowing objects like cars properly. For multilink systems it is essential to model the joint effects on the different links. However, the multilink shadowing effects in V2V channels are not yet well understood.
A sign-bit auto-correlation architecture for fractional frequency offset estimation in OFDM
This paper presents an architecture of an auto-correlator for Orthogonal Frequency Division Multiplexing systems. The received signal is quantized to only the sign-bit, which dramatically simplifies the frequency offset estimation. Hardware cost is reduced under the assumption that synchronization during acquisition does not have to be very accurate, but sufficient for coarse estimation. The archi
Transformation of Black Carbon Aerosol in the Atmosphere – Observations from Smog Chamber Studies and Ambient Air
Pathloss Estimation Techniques for Incomplete Channel Measurement Data
The pathloss exponent and the variance of the large-scale fading are two parameters that are of great importance when modeling or characterizing wireless propagation channels. The pathloss is typically modeled using a single-slope log-distance power law model, whereas the large-scale fading is modeled using a log-normal distribution. In practice, the received signal is affected by noise and it mig
Impact of MOS threshold-voltage mismatch in current-steering DACs for CT delta-sigma modulators
A 13dBm 60GHz-band injection locked PA with 36% PAE in 65nm CMOS
A 2.7GHz divider-less all digital phase-locked loop with 625Hz frequency resolution in 90nm CMOS
Using Coding Techniques to Analyze Weak Feedback Polynomials
We consider a class of weak feedback polynomials for LFSRs in the nonlinear combiner. When feedback taps are located in small groups, a distinguishing attack can sometimes be improved considerably, compared to the common attack that uses low weight multiples. This class of weak polynomials was introduced in 2004 and the main property of the attack is that the noise variables are represented as vec
A Simulation Package for Energy Consumption of Content Delivery Networks (CDNs)
Improving Risk Analysis Practices in Governmental Organizations
At the same time as our dependence on IT systems increases, the number of reports of problems caused by failures of critical IT systems has also increased. Today almost every system or service, e.g., water, power supply, transportation, is dependent on IT systems, and failure of these systems has serious and negative effects on society. In general, governmental organizations are responsible for de
