Search results

Filter

Filetype

Your search for "Cheap fc 26 coins Buyfc26coins.com is EA Sports official for FC 26 coins The process was smooth and quick..QXyW" yielded 89926 hits

Highly linear direct conversion receiver using customized on-chip balun

This paper presents a highly linear radio frequency receiver front-end with on-chip balun for cellular application at 2GHz in 65nm CMOS technology. Based on direct conversion architecture, the implemented front-end comprises a customized on-chip balun for single-ended to differential signal conversion, a differential common-gate low noise amplifier and voltage mode quadrature passive mixer. The si

On Road Network Utility Based on Risk-Aware Link Choice

We have previously shown how it is possible to lower accident risk levels while at the same time increasing traffic flows with the aid of vehicular ad-hoc networks. In this paper, we extend the online traffic accident risk mitigation sys- tem to include link choice. We develop an algorithm that allows vehicles to choose road links that provide the current maximal utility, based on information rece

Alignment Practices Affect Distances in Software Development: A Theory and a Model

Coordinating a software project across distances is challenging. Even without geographical and time zone distances, other distances within a project can cause communication gaps. For example, organisational and cognitive distances between product owners and development-near roles such as developers and testers can lead to weak alignment of the software and the business requirements. Applying good

Handling of layout-sensitive semantics in a visual control language

We have implemented a prototype editor for a visual language where the semantics depends on layout. A high-level abstract syntax is defined, where these semantics can be captured without the need for storing concrete graphical coordinates. The model implementation is done in JastAdd, a metacompilation tool based on reference attribute grammars. This gives a modular architecture where the core comp

Characterization of 60 GHz Shadowing by Human Bodies and Simple Phantoms

Abstract in Undetermined The 60 GHz band is very prominsing for high data rate (>1 Gb/s) wireless systems operating at short ranges. However, due to the short wavelengths in this frequency band, the shadowing effects cuased by human bodies and furniture are severe and needs to be modeled properly. In this paper, we present an experimental, measurement-based characterization of the reflection and s

Case studies synthesis: brief experience and challenges for the future

Synthesis of case studies is different from synthesis of purely quantitative studies, for example, in that sampling and analysis in primary studies have been carried out differently, and that primary results are of a different nature. The objective of this research is to identify what challenges should be considered when choosing and using a method for synthesis of case studies. We collected exper

Geometrical Cluster-Based Scatterer Detection Method with the Movement of Mobile Terminal

When a mobile station moves along a trajectory, it will see different parts of the same scatterers or scatterer groups during its movement. In this paper, we present a new method to identify such physical clusters of scatterers, and the corresponding groups of multipath components (MPCs) interacting with those clusters, from measurements of channel impulse responses. The method is based on identif

A new version of McEliece PKC based on convolutional codes

This paper presents new versions of the McEliece PKC that use time-varying convolutional codes. In opposite to the choice of Goppa codes, the proposed construction uses large parts of randomly generated parity-checks, presumably making structured attacks more difficult. The drawback is that we have a small but nonzero probability of not being successful in decoding, in which case we need to ask fo

Teaching programming to young learners using Scala and Kojo

This paper presents an approach to teaching programming and abstract thinking to young learners using Scala and Kojo. Kojo is an open source IDE for the Scala programming language. The approach is based on Scala APIs for turtle graphics and functional pictures, a process of interactive exploration and discovery, and structured learning material that guides learners. The approach encourages playful

Design Space Exploration for Streaming Applications on Multiprocessors with Guaranteed Service NoC

This paper addresses design space exploration for streaming applications (such as MPEG) running on multi-processor platforms with guaranteed service interconnects. In particular, we solve mapping, path selection and router configuration problems. Given the complexity of these problems, state of the art approaches in this area largely rely on greedy heuristics, which do not guarantee optimality. Ou

Wideband Reconfigurable Capacitive shunt-feedback LNA in 65nm CMOS

A differential LNA using capacitive shunt feedback is demonstrated in 65nm CMOS. The capacitive shunt feedback structure gives a wideband input matching, S11 <;-17 dB from 500MHz - 1 GHz for low band and S11 <;-20 dB from 1.1 GHz - 2.3GHz for high band. The NF for the complete receiver chain in low band and high band was measured to 3.3 dB and 3.9 dB, respectively. The 1-dB compression point with

A distributed scheme for resolution of the single-path routing problem

The goal of the paper is to present a distributed scheme to resolving a single path routing problem in multidomain networks. The global problem is formulated as a mixed-integer program (MIP) and approached by means of branch-and-price (B&P). Problems associated with a B&P tree nodes are decomposed using the Dantzig-Wolfe method to a set of domain subproblems coordinated by a single master

Using TPM Secure Storage in Trusted High Availability Systems

We consider the problem of providing trusted computing functionality in high availability systems. We consider the case where data is required to be encrypted with a TPM protected key. For redundancy, and to facilitate high availability, the same TPM key is stored in multiple computational units, each one ready to take over if the main unit breaks down. This requires the TPM key to be migratable.

Mathematical modelling of metric-driven routing and resource allocation in wireless mesh networks

The traditional routing protocols used in wireless mesh networks like AODV are not very efficient since the number of hops to a destination is mainly considered as the routing metric. This may lead to shorter paths; however, the throughput can decrease when traffic is routed through those paths. Various contributions have proposed different metrics or completely different routing algorithms. Never

Spatially-Coupled Nearly-Regular LDPC Code Ensembles for Rate-Flexible Code Design

Spatially coupled regular LDPC code ensembles have outstanding performance with belief propagation decoding and can perform close to the Shannon limit. In this paper we investigate the suitability of coupled regular LDPC code ensembles with respect to rate-flexibility. Regular ensembles with good performance and low complexity exist for a variety of specific code rates. On the other hand it can be

Coded IDMA system performance with parallel interleavers

In this paper we evaluate the use of parallel interleavers for user separation in coded IDMA systems. The parallel interleavers have previously been evaluated for uncoded systems, and we here present extended results for the coded case. The new results are important for real systems, as they will most likely use performance enhancing channel coding. The parallel interleavers are designed to remove