The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces a quadrature fractional-N cascaded frequency synthesizer and its phase noise analysis, optimization, and design for future 5G wireless transceivers. The performance improvement of the cascaded phase-locked loop (PLL) over single-stage PLL in terms of jitter and power consumption is theoretically presented and verified with measured results. The cascaded PLL is implemented using...
This paper presents a low power clocking solution for multi-standard SerDes applications based on frac-N digital LC PLL for central clock generation and fractional-N ring PLL for local clock generation. The fractional-N LC PLL operates at 7–10 GHz consuming only 8 mW power and occupying 0.15 mm2 of silicon area with integrated jitter of 264 fs. Ring PLL covers from 800 MHz to 4 GHz to support the...
Heap management is responsible for the allocation of heap segments to a running application. When the logic of the heap management is left to the application programmer, as it is the case with programming languages like C and C++, a number of problems may arise. One kind of problems related to imperfect heap management is that of memory fragmentation. Hence compaction of data is required to increase...
This paper explains the different timing attacks on AES and possible approaches/ precautions which can be taken to avoid or minimize the danger of these attacks. The nature and cause of possibilities of attack on AES are mentioned along with the basic model of the attack which was performed to show the weakness of the cipher even after large claims of its non-existence from Authorities and its creators.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.