نتایج جستجو برای: loopback

تعداد نتایج: 168  

2004

Figure 3(a) shows a temperature dependence ofthe fiber output and monitor current for one of the fabricated 50 samples of the plastic module. The fiber output was 0.2 mW in the full operating temperature range from -40-85°C. The monitor current was >lo0 (*.A at 0.2 mW fiber output and the trackingwidth of < + -20% was obtained in the full temperature range. The rise and fall time ofthe transmit...

2011
Zoe Szajnfarber Annalisa L. Weigel

R&D management practices typically conceptualize complex product innovation as a Stage-Gate process whereby novel concepts are matured through a succession of development stages and progressively winnowed down at each sequential gate. This view implicitly assumes that maturity is a monotonically increasing function of the technology, and that partially matured technologies can be restored from ...

2009
I. Bouras S. Bouras T. Georgantas N. Haralabidis G. Kamoulakos Y. Kokolakis P. Merakos J. Rudell I. Vassiliou K. Vavelidis A. Yamanaka

Although attractive as a highly integrated solution, direct conversion architecture suffers from problems such as DC offsets, flicker noise and poor quadrature matching, that are further aggravated by using CMOS technology [1]. Furthermore, the 802.11a standard high bit-rate modes require closely matched I/Q frequency response. To alleviate those limitations, a transceiver topology allowing the...

1983
David Neuffer

E l e c t r o n p o s i t r o n (e§ ) c o l i i d e r s have been es s e n t i a l t o o l s in ga in ing an unders tanding of p a r t i c l e physics. However, their future use at higher energies i s s e v e r e l y l i m i t e d by r a d i a t i o n processes . Synchrot ron r a d i a t i o n in s torage r i n g s causes e l e c t r o n s to lose energy a t a r a te p r o p o r t i o n a l to ...

2004
K. Huber

Introduction: Iilformation theory research has show1 that multiple transmit multiple receivc (MTMR) arrays can achieve enormous capacity gains over single-antenna systems by exploiting multipaths in the rich scattcring wircless channel [I , 21. Practical signalling schemes have been proposed which achieve a large fraction of the Shannon capacity, and one such scheme is the Bell Labs Layered Spa...

Journal: :CoRR 2011
David Levary Jean-Pierre Eckmann Elisha Moses Tsvi Tlusty

Dictionaries are inherently circular in nature. A given word is linked to a set of alternative words (the definition) which in turn point to further descendants. Iterating through definitions in this way, one typically finds that definitions loop back upon themselves. The graph formed by such definitional relations is our object of study. By eliminating those links which are not in loops, we ar...

2008
Rabin Banerjee Bibhas Ranjan Majhi

Hawking radiation as tunneling by Hamilton-Jacobi method beyond semiclassical approximation is analysed. We compute all quantum corrections in the single particle action revealing that these are proportional to the usual semiclassical contribution. We show that a simple choice of the proportionality constants reproduces the one loop back reaction effect in the spacetime, found by conformal fiel...

Journal: :IEEE Access 2021

Traditional IP multicast (IPMC) maintains state per IPMC group in core devices to distribute one-to-many traffic along tree-like structures through the network. This limits its scalability because whenever subscribers of groups change, forwarding network needs be updated. Bit Index Explicit Replication (BIER) has been proposed by IETF for efficient transport without need IPMC-group-dependent de...

1995
Dhabaleswar K. Panda Rajeev Sivaram

This paper presents a new approach to implement fast broadcast and multicast operations in bidirectional wormhole Multistage Interconnection Networks (MIN) with loopback, as used in IBM SP1/SP2 network. The novelty lies in using multidestination message passing mechanism instead of single destination (unicast) messages. For broadcast/multicast operation, it is shown that a single worm with mult...

Journal: :CoRR 2018
Anselme Tueno Florian Kerschbaum

Order-preserving encryption allows encrypting data, while still enabling efficient range queries on the encrypted data. Moreover, it does not require any change to the database management system, because comparison operates on ciphertexts as on plaintexts. This makes order-preserving encryption schemes very suitable for data outsourcing in cloud computing scenarios. However, all order-preservin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید