The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new approach to analyze crosstalk of coupled interconnects in the presence of process variations. The suggested method translates correlated process variations into orthogonal random variables by principle component analysis (PCA). combined with polynomial chaos expression (PCE), the technique utilizes Stochastic Collocation Method (SCM) to analyze the system response of coupled...
Based on the special basis functions, a piecewise function with adjustable parameters is used to construct the impulse response of the interpolation filter. These parameters are then calculated when this function approximates the desired impulse response according to some optimization criterion in time domain. This polynomial-based interpolation filter can be efficiently implemented using a modified...
Correlative minimum shift keying (MSK), a second order polynomial modulation scheme known as tamed frequency modulation (TFM), is a constant envelope type of modulation with a perfect peak to average power ratio (PAPR), besides the property of low out of band power. We apply the linearized TFM to the single carrier transmission with frequency domain equalization (SC/FDE) concept. We then obtain a...
In this paper, we focus on the security issue of a chaotic digital communication scheme called chaotic-pulse- position modulation. We design a third party intrusion scheme to test to see if CPPM is as secure as is claimed. Experiments are conducted with various chaotic maps, where CPPM is used to modulate the message at the transmitter and a Kalman filter fed with a polynomial approximation is used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.