期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
An analog front end with a 12-bit 3.2-MS/s SAR ADC for a power line communication system
1
作者 陈华斌 向济璇 +4 位作者 薛香艳 陈迟晓 叶凡 许俊 任俊彦 《Journal of Semiconductors》 EI CAS CSCD 2014年第11期141-148,共8页
This paper presents an analog front end for a power line communication system, including a 12-bit 3.2-MS/s energy-efficient successive approximation register analog-to-digital converter, a positive feedback programmab... This paper presents an analog front end for a power line communication system, including a 12-bit 3.2-MS/s energy-efficient successive approximation register analog-to-digital converter, a positive feedback programmable gain amplifier, a 9.8 ppm/℃ bandgap reference and on-chip low-output voltage regulators. A two segment capacitive array structure (6 MSB 5 LSB) composed by split capacitors is designed for the SAR core to save area cost and release reference voltage accuracy requirements. Implemented in the GSMC 0.13 #m 1.5 V/12 V dual-gate 4P6M e-flash process, the analog front end occupies an area of 0.457 mm2 and consumes power of 18.8 mW, in which 1.1 mW cost by the SAR ADC. Measured at 500 kHz input, the spurious-free dynamic range and signal-to-noise plus distortion ratio of the ADC are 71.57 dB and 60.60 dB respectively, achieving a figure of merit of 350 U/conversion-step. 展开更多
关键词 analog front end successive approximation register A/D power line communication
原文传递
一种CLF芯片与SIM卡芯片连接的方法 被引量:3
2
作者 王琪 王东辉 李云岗 《微计算机应用》 2010年第4期73-76,共4页
在NFC技术中,CLF芯片与SIM卡的连接是一个重要问题,本文提出了一种具有自主知识产权的CLF与SIM卡的通信方法,采用新的调制解调方式,使得S2信号在S1信号高低电平时都能传输,实现单线连接NFC与SIM卡,以及它们之间的全双工通信。通过对该... 在NFC技术中,CLF芯片与SIM卡的连接是一个重要问题,本文提出了一种具有自主知识产权的CLF与SIM卡的通信方法,采用新的调制解调方式,使得S2信号在S1信号高低电平时都能传输,实现单线连接NFC与SIM卡,以及它们之间的全双工通信。通过对该方法进行电路级的设计和仿真,验证了该方法的正确性和稳定性。 展开更多
关键词 NFC ( Near Field communication ) SIM ( subscriber IDENTITY Module) SWP( single wire protocol) CLF ( Contact-Less FRONT - end)
下载PDF
For the love and respect of the service: Applied aesthetics and palliative care
3
作者 Marcia Brennan 《Journal of Biomedical Science and Engineering》 2013年第10期1-7,共7页
In this article, the author discusses her experiences as an artist in residence in the Department of Palliative Care and Rehabilitation Medicine at the University of Texas M. D. Anderson Cancer Center. Emphasis is pla... In this article, the author discusses her experiences as an artist in residence in the Department of Palliative Care and Rehabilitation Medicine at the University of Texas M. D. Anderson Cancer Center. Emphasis is placed on applied aesthetics in palliative care and their implications for addressing communication, spiritual, and health care issues for military service members. Drawing on six vivid case studies, the author examines the various ways in which end of life narratives can shed valuable light on key issues concerning individuals’ life experiences in the Navy, the Army, and the Air Force. These cherished images strengthened people’s spirits at the end of life, and each of the men told their stories with pride. 展开更多
关键词 PALLIATIVE Medicine end of Life PSYCHOSOCIAL ONCOLOGY AESTHETICS communication SPIRITUALITY
下载PDF
Efficient Routing Protocol Based on Security for Wireless Sensor Networks
4
作者 S. Nandhakumar Dr. N. Malmurugan 《Circuits and Systems》 2016年第8期1943-1953,共11页
Nowadays, the major part and most standard networks usually used in several applications are Wireless Sensor Networks (WSNs). It consists of different nodes which communicate each other for data transmission. There is... Nowadays, the major part and most standard networks usually used in several applications are Wireless Sensor Networks (WSNs). It consists of different nodes which communicate each other for data transmission. There is no access point to control the nodes in the network. This makes the network to undergo severe attacks from both passive and active devices. Due to this attack, the network undergoes downgrade performance. To overcome these attacks, security based routing protocol is proposed with the security based wormhole detection scheme. This scheme comprises of two phases. In this approach, the detection of wormhole attacks is deployed for having correct balance between safe route and stability. Also, to ensure packets integrity cryptographic scheme is used as well as authenticity while travelling from source to destination nodes. By extensive simulation, the proposed scheme achieves enhanced performance of packet delivery ratio, end to end delay, throughput and overhead than the existing schemes. 展开更多
关键词 WSNS THROUGHPUT Integrated Cryptography Scheme Delivery Ratio Packet Loss AUTHENTICATION Data Integrity communication Overhead and end to end Delay
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部