نتایج جستجو برای: msbs

تعداد نتایج: 93  

2017
Hyeon-June Kim Sun-Il Hwang Seung-Tak Ryu

This paper introduces a power-efficient readout scheme for CMOS image sensors utilizing SAR ADCs. Inspired by the strong correlation between neighboring pixels, each SAR ADC assigned to readout multiple columns of pixels reads each pixel by first copying several MSBs from the previous pixel and, desirably, converts only LSBs to save conversion cycles and power consumption. The readout concept w...

In this paper, a Peak to Average Power Ratio (PAPR) reduction technique in Orthogonal Frequency Division Multiplexing (OFDM) systems is proposed. This technique uses error correction capability of channel coding to reduce the PAPR.The coded bits at the input of OFDM modulator are separated into two groups of the Most Significant Bits (MSB) and the LeastSignificant Bits (LSB). The bits are mappe...

Journal: :Adv. in Math. of Comm. 2009
Santanu Sarkar Subhamoy Maitra

In PKC 2009, May and Ritzenhofen presented interesting problems related to factoring large integers with some implicit hints. One of the problems is as follows. Consider N1 = p1q1 and N2 = p2q2, where p1, p2, q1, q2 are large primes. The primes p1, p2 are of same bit-size with the constraint that certain amount of Least Significant Bits (LSBs) of p1, p2 are same. Further the primes q1, q2 are o...

2013
Jinling Wang Ali Almagbile Youlong Wu Toshiaki Tsujii

Global Satellite Navigation Systems (GNSS) have been widely used for positioning, navigation and timing (PNT). Therefore, the integrity of the satellite based navigation systems has been a major concern for many liability critical applications, such as civil aviation, and location-based services (LBS). Over the past two decades, GNSS Receiver Autonomous Integrity Monitoring (RAIM) procedures ha...

2014
Pradeep Kumar Sharma Hari Mohan Singh

Broadly speaking a term Cryptography used to secure & hide the original information of a message from the unauthorised users. First time used to encrypt a plaintext into cipher text where a key was associated at the time of encryption to change original content into some other form i.e. decrypted message. And same key was used to decrypt that message into original form. In the modern communicat...

2017
J. A. Segovia F. Medeiro A. González A. Villegas A. Rodríguez-Vázquez

This paper reports a CIS readout channel conceived for half-electron noise by combining semi-empirical pixel noise model fitting, S&H-free two-stage ADC with over-sampling, optimized pixel control and Correlated Multiple Sampling (CMS). The ADC architecture consists of a first-order  modulator that generate the MSBs followed by a ramp converter. Closed loop self correction is employed for low...

1998

In most developing countries capital markets are relatively undeveloped and banks are often unable or unwilling to undertake term lending. Also, banks prefer to lend to larger established businesses with well-developed balance sheets and credit histories. While operations of microenterprises and small businesses (MSBs) are cash-flow oriented they rarely have organized historical and financial r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید