The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a wide intermediate-frequency (IF) bandwidth down-conversion double-balanced Gilbert-cell mixer design in a 0.13-μm CMOS process. The load stage of the mixer is implemented by an LC tank with switched capacitors to complete three selectable sub-bands to cover the desired wide IF band. Both the RF and LO ports are integrated with Marchand baluns for single-phase input consideration...
There are some problems in rescue scheduling for major hazards with resource scheduling algorithm, in which time and resource are limited. In this paper, on the basis of the situation above, we present a new fire resource scheduling model on the ground of major hazards, where time limitation of major hazards and actual situation of fire resource can be taken into account on all sides. Thus, in line...
The main bottleneck to achieve energy autonomy in body area networks (BAN) is the design of an ultra low power yet reliable wireless system. In this paper, we first demonstrate the feasibility of an ultra low power receiver by presenting our implemented receiver chip that could operate on a total power of 479.5 uW, which is more than one order of magnitude lower than commercially available low power...
Secret sharing scheme is a way to distribute a secret among a set of participants such that the collection of all the shares that the participants hold in the authorized set will reconstruct the secret. In a perfect secret sharing scheme, collaboration between unauthorized participants cannot reduce their uncertainty about the secret. In 1992, Chaudhry, Ghodosi and Seberry promote a perfect secret...
This paper puts forward the possibility that librarians collaborate with teachers to promote the development of distance education to build a "Teacher - Librarian" collaborative distance education model, and discusses the "Teacher - Librarian" collaborative distance education strategy.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.