نتایج جستجو برای: implementation considerations
تعداد نتایج: 433970 فیلتر نتایج به سال:
This paper presents a monolithic implementation of a cryptosystem based on the Corron and Hahs scheme [ I ] . The baseband chaotic encryptioddecryption system has been designed at the transistor level and fabricated using the AMI 1.2pm CMOS technology available through the MOSIS foundry. While the mathematical model of the Lorenz system is straightforward, its silicon implementation is not. Typ...
This paper develops a first systematic approach to argument linking in LTAG, building on typologically oriented work in Van Valin (2005). While Van Valin's argument linking mechanism is procedurally defined, we propose a constraint-based implementation. The advantage is that we can separate between the linguistic generalizations to be captured and algorith-mic considerations. The implementation...
This paper describes a platform-independent application for the monitoring of distributed applications. The tool is intended for system administrators to properly distribute the components of a distributed application onto particular machines. An essential part of this tool is based on intelligent mobile agent technology used to access the target systems. Although a full implementation turned o...
This paper presents a new dynamic-range scaling for the implementation of filters/controllers in state-space form. Specific fixed-point considerations allow us to relax the classical L2-scaling constraints while still preserving the implementation from overflows. It gives more degrees of freedom for the optimal L2-parametric sensitivity problem. The underlying constrained problem is converted i...
In this paper, we show through a simple secure symmetric key based protocol design and its implementation the feasibility of secure data collection in a vehicular sensor networks. We demonstrate that the protocol works in a realistic setting by collecting the real trace data through real implementation. Some of the key considerations are efficiency, deployability and security. The protocol does...
An isolated network is critical to the successful analysis of vulnerabilities and attack tools. Maintaining such a network introduces issues of policy and implementation which conflict with the need to transport data from the Internet to the network. This paper describes the goals of one isolated network, the policy and implementation that satisfies those goals, and other considerations to prot...
This manuscript deals with the implementation of active noise and vibration control systems on very high-speed computational architectures, more specifically on Field Programmable Gate Arrays (FPGA). Starting from a particular application, namely the vibration control of a turbomolecular vacuum pump, general design considerations are devised. A feedforward controller is designed based on multip...
This paper describes a step by step approach for implementing a scalable and run-time adaptable multi-standard packet detector for orthogonal frequency divisional multiplexing (OFDM) based communication standards. The paper briefly describes considerations and design choices in making a modular system block with generic control supporting rapid prototyping and implementation of preamble-based p...
—This paper presents a new dynamic-range scaling for the implementation of filters/controllers in state-space form. Relaxing the classical L2-scaling constraints by specific fixed-point considerations allows for a higher degree of freedom for the optimal L2-parametric sensitivity problem. However, overflows in the implementation are still prevented. The underlying constrained problem is convert...
After publication of certain vaccine recommendations made by the Advisory Committee on Immunization Practices, several unexpected events have occurred during implementation of these recommendations. These have included changes in recommendations following adverse events involved with a particular vaccine and the conferral of community protection as an offshoot of vaccination of a specific popul...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید