In this first part of the book the Vienna Link Level (LL) Simulators are described. The first chapter provides basics of LL simulations, introduces the most common variables and parameters as well as the transceiver structures that are applied in Long-Term Evolution (LTE) and Long-Term Evolution-Advanced (LTEA). We focus here mostly on the Downlink (DL) of LTE as most results reported in later chapters are related to DL transmissions.
标签: LTE-Advanced Simulators Vienna
上传时间: 2020-06-01
上传用户:shancjb
Second-generation telecommunication systems, such as the Global System for Mobile Communications (GSM), enabled voice traffic to go wireless: the number of mobile phones exceeds the number of landline phones and the mobile phone penetration is approaching 100% in several markets. The data-handling capabilities of second-generation systems are limited, however, and third-generation systems are needed to provide the high bit-rate services that enable high-quality images and video to be transmitted and received, and to provide access to the Web with higher data rates.
标签: Evolution WCDMA UMTS HSPA LTE for and
上传时间: 2020-06-01
上传用户:shancjb
Describing the relevant detection and estimation theory, this detailed guide provides the background knowledge needed to tackle the design of practical WLAN positioning systems. It sets out key system-level challenges and design considerations in increasing positioningaccuracyandreducingcomputationalcomplexity,examinesdesigntradeoffs, and presents experimental results.
标签: Positioning Systems WLAN
上传时间: 2020-06-01
上传用户:shancjb
The challenges associated with the design and implementation of Electro- static Discharge (ESD) protection circuits become increasingly complex as technology is scaled well into nano-metric regime. One must understand the behavior of semiconductor devices under very high current densities, high temperature transients in order to surmount the nano-meter ESD challenge. As a consequence, the quest for suitable ESD solution in a given technology must start from the device level. Traditional approaches of ESD design may not be adequate as the ESD damages occur at successively lower voltages in nano-metric dimensions.
标签: Protection Circuit Device Design ESD and
上传时间: 2020-06-05
上传用户:shancjb
The planarization technology of Chemical-Mechanical-Polishing (CMP), used for the manufacturing of multi- level metal interconnects for high-density Integrated Circuits (IC), is also readily adaptable as an enabling technology in MicroElectroMechanical Systems (MEMS) fabrication, particularly polysilicon surface micromachining. CMP not only eases the design and manufacturability of MEMS devices by eliminating several photolithographic and film issues generated by severe topography, but also enables far greater flexibility with process complexity and associated designs. T
标签: mechanical polishing Chemical
上传时间: 2020-06-06
上传用户:shancjb
Over many years, RF-MEMS have been a hot topic in research at the technology and device level. In particular, various kinds of mechanical Si-MEMS resonators and piezoelectric BAW (bulk acoustic wave) resonators have been developed. The BAW technology has made its way to commercial products for passive RF filters, in particular for duplexers in RF transceiver front ends for cellular communica- tions. Beyond their use in filters, micromachined resonators can also be used in conjunction with active devices in innovative circuits and architectures.
标签: MEMS-based Circuits Systems and
上传时间: 2020-06-06
上传用户:shancjb
It has been said that the move from narrowband to broadband access is the second revolution for the Internet — ‘broadband is more bandwidth than you can use’. Once users have experienced broadband access there is no turning back. A whole new world of applications and services becomes possible. No longer is it the ‘world- wide wait’. The speed of response and visual quality enabled by broadband finally allows the Internet to reach its true potential.
上传时间: 2020-06-06
上传用户:shancjb
The “bottom-line” metrics of cash flow, demand, price, and return on investment are driven by a second set of financial metrics represented by value to the customer, cost, and the pace of innovation. Get them right relative to competition and impressive bottom-line results should follow. Because of their importance, we call value to the customer, variable cost, and the pace of innovation the “fundamental metrics.”
标签: Planning Product Systems Driven Value and
上传时间: 2020-06-06
上传用户:shancjb
HIS IS THE THIRD —and most likely the last—book in the series on information technology for energy managers and web based energy infor- mation and control systems. This book concentrates on web based enterprise energy and building automation systems, and serves as a capstone volume in this series. The thrust here is that the highest level functions of a building and facility automation system are provided by a web based EIS/ECS system that provides energy management, maintenance management, overall facility operational management, and ties in with the enterprise resource management system for the entire facility or the group of facilities being managed. If there were ever to be a fourth volume in this series, it would follow the logical progression of the first three volumes, and would probably be titled Web Based Enterprise Resource Management Systems.
标签: Enterprise Energy Based Web
上传时间: 2020-06-06
上传用户:shancjb
This book is written for engineers involved in the operation, control, and planning of electric power systems. In addition, the book provides information and tools for researchers working in the fields of power system security and stability. The book consists of two volumes. The first volume provides traditional techniques for the stability analysis of large scale power systems. In addition, an overview of the main drivers and requirements for modernization of the traditional methods for online applications are discussed. The second volume provides techniques for online security assessment and corrective action studies. In addition, the impact of variable generation on the security of power systems is considered in the second volume. The first volume may be considered as a background builder while the second volume is intended for the coverage of edge techniques and methods for online dynamic security studies.
上传时间: 2020-06-07
上传用户:shancjb