虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

second-CLOCK

  • N-path+Filtering

    his research aims at creating broadband tunable, fully integrated filters for the application of cognitive radio and signal classification receivers. The approach under study is the N-path filter technique which is capable of translating a baseband impedance to a reference frequency creating a tunable filter. The traditional N-path filter suffers from fundamental architectural limitations, namely : a trade-off between insertion loss and out-of-band rejection, reference clock feed- through, and jammer power handling limitations. In the first approach, the fundamental trade- off of the traditional N-path filter between insertion loss and out-of-band rejection is improved by a transmission line (T-line) N-path filter technique. 

    标签: Filtering N-path

    上传时间: 2020-05-31

    上传用户:shancjb

  • Stochastic Geometry and Wireless Networks Volume I

    Part I provides a compact survey on classical stochastic geometry models. The basic models defined in this part will be used and extended throughout the whole monograph, and in particular to SINR based models. Note however that these classical stochastic models can be used in a variety of contexts which go far beyond the modeling of wireless networks. Chapter 1 reviews the definition and basic properties of Poisson point processes in Euclidean space. We review key operations on Poisson point processes (thinning, superposition, displacement) as well as key formulas like Campbell’s formula. Chapter 2 is focused on properties of the spatial shot-noise process: its continuity properties, its Laplace transform, its moments etc. Both additive and max shot-noise processes are studied. Chapter 3 bears on coverage processes, and in particular on the Boolean model. Its basic coverage characteristics are reviewed. We also give a brief account of its percolation properties. Chapter 4 studies random tessellations; the main focus is on Poisson–Voronoi tessellations and cells. We also discuss various random objects associated with bivariate point processes such as the set of points of the first point process that fall in a Voronoi cell w.r.t. the second point process.

    标签: Stochastic Geometry Networks Wireless Volume and

    上传时间: 2020-06-01

    上传用户:shancjb

  • Telecommunication+Circuit+Design+2nd

    The first edition of this book was published in 1992. Nine years later it had become clear that a second edition was required because of the rapidly changing nature of telecommunication. In 1992, the Internet was in existence but it was not the household word that it is in the year 2001. Cellular telephones were also in use but they had not yet achieved the popularity that they enjoy today. In the current edition, Chapter 1 has been revised to include a section on the Internet. Chapter 10 is new and it covers the facsimile machine; I had overlooked this important tele- communication device in the first edition. Chapter 11 is also new and it describes the pager, the cordless telephone and the cellular telephone system. These are examples of a growing trend in telecommunications to go ‘‘wireless’’.

    标签: Telecommunication Circuit Design 2nd

    上传时间: 2020-06-01

    上传用户:shancjb

  • The Mobile Multimedia Business

    The first practical examples of mobile communications were used in many countries like the USA, the UK and Germany in military services, and played a significant role in the First World War to transfer important information from the front to headquarters to take further actions. Good and secure wireless communications were an important need for all military services – army, navy and air force. In this respect, the Second World War was a big experimental battlefield for the development and evolution of mobile radio. It was in the interests of governments that after the Second World War the military investment should be paid back by civilian use, and all western European countries started their so-called first generation of mobile communication networks.

    标签: Multimedia Business Mobile The

    上传时间: 2020-06-01

    上传用户:shancjb

  • Ultra Wideband Signals and Systems

    In the two years since this book was first published, ultra wideband (UWB) has advanced and consolidated as a technology, and many more people are aware of the possibilities for this exciting technology. We too have expanded and consolidated materials in this second edition in the hope that ‘Ultra Wideband: Signals and Systems in Communication Engineering’ will continue to prove a useful tool for many students and engineers to come to an understanding of the basic technologies for UWB.

    标签: Wideband Signals Systems Ultra and

    上传时间: 2020-06-01

    上传用户:shancjb

  • UMTS+Network+Planning

    The continuing explosive growth in mobile communication is demanding more spectrally efficient radio access technologies than the prevalent second generation (2G) systems such as GSM to handle just the voice traffic. We are already witnessing high levels of mobile penetration exceeding 70% in some countries. It is anticipated that by 2010 more than half of all communications will be carried out by mobile cellular networks. On the other hand, the information revolution and changing life habits are bringing the requirement of commu- nicating on a multimedia level to the mobile environment. But the data handling capabilities and flexibility of the 2G cellular systems are limited.

    标签: Planning Network UMTS

    上传时间: 2020-06-01

    上传用户:shancjb

  • WCDMA for UMTS HSPA Evolution and LTE

    Second-generation telecommunication systems, such as the Global System for Mobile Communications (GSM), enabled voice traffic to go wireless: the number of mobile phones exceeds the number of landline phones and the mobile phone penetration is approaching 100% in several markets. The data-handling capabilities of second-generation systems are limited, however, and third-generation systems are needed to provide the high bit-rate services that enable high-quality images and video to be transmitted and received, and to provide access to the Web with higher data rates.

    标签: Evolution WCDMA UMTS HSPA LTE for and

    上传时间: 2020-06-01

    上传用户:shancjb

  • Digital+Home

    It has been said that the move from narrowband to broadband access is the second revolution for the Internet — ‘broadband is more bandwidth than you can use’. Once users have experienced broadband access there is no turning back. A whole new world of applications and services becomes possible. No longer is it the ‘world- wide wait’. The speed of response and visual quality enabled by broadband finally allows the Internet to reach its true potential.

    标签: Digital Home

    上传时间: 2020-06-06

    上传用户:shancjb

  • Value+Driven+Product+Planning+and+Systems

    The “bottom-line” metrics of cash flow, demand, price, and return on investment are driven by a second set of financial metrics represented by value to the customer, cost, and the pace of innovation. Get them right relative to competition and impressive bottom-line results should follow. Because of their importance, we call value to the customer, variable cost, and the pace of innovation the “fundamental metrics.” 

    标签: Planning Product Systems Driven Value and

    上传时间: 2020-06-06

    上传用户:shancjb

  • Dynamic Security

    This book is written for engineers involved in the operation, control, and planning of electric power systems. In addition, the book provides information and tools for researchers working in the fields of power system security and stability. The book consists of two volumes. The first volume provides traditional techniques for the stability analysis of large scale power systems. In addition, an overview of the main drivers and requirements for modernization of the traditional methods for online applications are discussed. The second volume provides techniques for online security assessment and corrective action studies. In addition, the impact of variable generation on the security of power systems is considered in the second volume. The first volume may be considered as a background builder while the second volume is intended for the coverage of edge techniques and methods for online dynamic security studies.

    标签: Security Dynamic

    上传时间: 2020-06-07

    上传用户:shancjb