Two‐step continuous‐time incremental sigma–delta ADC
نویسندگان
چکیده
منابع مشابه
Two-step continuous-time incremental sigma-delta ADC
A two-step continuous-time (CT) incremental sigma-delta (ΣΔ) ADC, which enhances the performance of conventional CT incremental ΣΔ ADCs, is proposed. By pipelining two second-order CT incremental ΣΔ ADCs, the proposed two-step architecture can achieve high resolution without sacrificing the conversion rate. Compared to other alternatives, the two-step CT incremental ΣΔ ADC exhibits the freedom ...
متن کاملImplementation of High Resolution and Power Efficient ∑∆ Adc Using Pipeline Configuration Technique
A high resolution analog to digital converter (ADC) is presented and it’s dedicated to neural recording systems. By employing two continuous time incremental sigmadelta(I∑∆) ADC in a pipeline configuration, without sacrificing the conversion rate the proposed ADC can obtain high resolution. This two-step architecture is furthermore power efficient, as the resolution need for the incremental ADC...
متن کاملHigh-order continuous-time incremental ΣΔ ADC for multi-channel applications
A novel high-order single-loop incremental sigmadelta ADC for multi-channel applications is proposed. Highorder continuous-time architectures are explored using a 3rd order single-bit modulator as a test-case. The performance of the proposed architecture, taking into account critical nonidealities, is analyzed and its advantages and issues are discussed. Behavioral simulations show a key advant...
متن کاملA Low-Power CT Incremental 3rd Order ΣΔ ADC for Biosensor Applications
This paper proposes a 3rd order single-loop continuous-time incremental sigma-delta analogue-to-digital converter (ADC) for time-multiplexed signals. Incremental sigmadelta modulation is used to address medium to high resolution requirements of multi-channel applications, while a 3rd order continuous-time implementation is investigated as an alternative for low-power solutions. A prototype of t...
متن کاملTwoStep: An Authentication Method Combining Text and Graphical Passwords
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based graphical password schemes alone, in order to offer sufficient security, require a number of rounds of verification, introducing usability issues. We suggest a hybrid user authentication approach combining text password...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics Letters
سال: 2013
ISSN: 0013-5194,1350-911X
DOI: 10.1049/el.2013.1096