An Absorptive Balanced-to-Balanced Power Divider
نویسندگان
چکیده
منابع مشابه
Balanced power diagrams for redistricting
We propose a method for redistricting, decomposing a geographical area into subareas, called districts, so that the populations of the districts are as close as possible and the districts are compact and contiguous. Each district is the intersection of a polygon with the geographical area. The polygons are convex and the average number of sides per polygon is less than six. The polygons tend to...
متن کاملPower-Balanced Orthogonal Space-Time Block Code
—In this paper, we propose two new systematic ways to construct amicable orthogonal designs (AOD), with an aim to facilitate the construction of power-balanced orthogonal space-time block codes (O-STBC) with favorable practical attributes. We also show that an AOD can be constructed from an Amicable Family (AF), and such a construction is crucial for achieving a power-balanced O-STBC. In additi...
متن کاملBalanced Chromosomal Translocations of Parents in Relation to Spontaneous Abortions
The most significant complication of pregnancy is recurrent miscarriage. Numerous factors have been described as associations with recurrent wastage such as: uterine abnormalities, immunological factors, endocrinologic imbalance and chromosomal defects. Cytogenetic evaluation of couples with recurrent pregnancy losses is performed on the basis of G-banding technique only after other possible et...
متن کاملRemarks on Distance-Balanced Graphs
Distance-balanced graphs are introduced as graphs in which every edge uv has the following property: the number of vertices closer to u than to v is equal to the number of vertices closer to v than to u. Basic properties of these graphs are obtained. In this paper, we study the conditions under which some graph operations produce a distance-balanced graph.
متن کاملBalanced Encoding to Mitigate Power Analysis: A Case Study
Most side channel countermeasures for software implementations of cryptography either rely on masking or randomize the execution order of the cryptographic implementation. This work proposes a countermeasure that has constant leakage in common linear leakage models. Constant leakage is achieved not only for internal state values, but also for their transitions. The proposed countermeasure provi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2018
ISSN: 2169-3536
DOI: 10.1109/access.2018.2815546