intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Modulation techniques

Xem 1-20 trên 34 kết quả Modulation techniques
  • In this article, we establish a Digital Radio over Fiber (DRoF) information system with two wireless channels utilizing two advanced phase modulation techniques, namely Differential Phase Shift Keying (DPSK), for the CRAN connection and investigate parameters related to nonlinearity such as refractive index n2.

    pdf6p viengfa 28-10-2024 1 1   Download

  • We aimed to assess acute and late toxicity in patients with head and neck squamous cell carcinoma (HNSCC) managed with concurrent chemoradiation therapy using intensity modulated radiation therapy (IMRT) technique.

    pdf7p vinatisu 29-08-2024 1 1   Download

  • Studying purposes: Creating measures to develop professionalism for learners and applying in teaching Digital-Pulse Technique module in the training program of Industrial Electronics.

    pdf27p thebadguys 10-06-2021 16 4   Download

  • This paper will present and discuss heat treatment of EVA and the extent to which EVA is cured (gel content) using heat treatment, and its correlation to solubility and differential scanning calorimeter (DSC) curves. Based on the correlation between the DSC and solubility techniques performed on a given EVA, the treatment needed to obtain sufficient curing can be deduced.

    pdf8p tamynhan5 10-12-2020 7 1   Download

  • The research objective of the dissertation completes the technological process of modulating super oxidation solution, thereby manufacturing equipment to suit Vietnamese conditions and applying this solution to disinfect hospital wastewater.

    pdf25p xacxuoc4321 11-07-2019 26 4   Download

  • This paper presents new carrier-based PWM modulations to control this dual topology for optimum operation. In terms of power sources, this cascaded inverter is operated either from isolated dc sources (series power cells) or from a single dc source. Computational simulation and experimental validation are given to verify the proposed techniques.

    pdf11p binhminhmuatrenngondoithonggio 09-06-2017 44 2   Download

  • Bài giảng Kịch bản HDH: Module 10 - Automating Windows Server® 2008 R2 Administration presented list the modules included with Windows Server 2008 R2, add and remove Windows features from the command-line, manage Group Policy objects from the command-line, use Troubleshooting Packs from the command-line.

    ppt34p connhangheo91 03-07-2014 52 4   Download

  • The high-pressure stopped-flow technique is applied to study the CO binding in cytochrome P450cam (P450cam) bound with homologous substrates (1R-camphor, camphane, norcamphor and norbornane) and in the substrate-free protein. The activation volume DV # of the CO on-rate is positive for P450cam bound with substrates that do not contain methyl groups. The kon rate constant for these substrate complexes is in the order of 3 · 106 M)1Æs)1. In contrast, P450cam complexed with substrates carrying methyl groups show a negative activation volume and a low kon rate constant of % 3 · 104 M)1Æs)1. ...

    pdf8p system191 01-06-2013 38 4   Download

  • Prolyl endopeptidase (PEP) is a proline-specific oligopepti-dase with a reported effect on learning and memory in dif-ferent rat model systems. Using the astroglioma cell line U343,PEP expression was reduced by an antisense technique. Measuring different second-messenger concen-trations revealed an inverse correlation between inositol 1,4,5-triphosphate [Ins(1,4,5)P3] concentration and PEP expression in the generated antisense cell lines. However,no effect on cAMP generation was observed.

    pdf8p tumor12 22-04-2013 41 3   Download

  • A wide range of approaches has been applied to examine the quaternary structure of G protein-coupled receptors, the basis of such protein–protein interactions and how such interactions might modulate the pharmacology and function of these receptors. These include coimmunoprecipitation, var-ious adaptations of resonance energy transfer techniques, functional com-plementation studies and the analysis of ligand-binding data.

    pdf12p fptmusic 11-04-2013 49 3   Download

  • Bioremediation strategies use microorganisms to remove hazardous sub-stances, such as aromatic molecules, from polluted sites. The applicability of these techniques would greatly benefit from the expansion of the cata-bolic ability of these bacteria in transforming a variety of aromatic com-pounds.

    pdf14p inspiron33 25-03-2013 35 3   Download

  • Another class of linear codes, known as Convolutional codes. We study the structure of the encoder. We study different ways for representing the encoder.Convolutional codes offer an approach to error control coding substantially different from that of block codes. A convolutional encoder: encodes the entire data stream, into a single codeword. does not need to segment the data stream into blocks of fixed size (Convolutional codes are often forced to block structure by periodic truncation). is a machine with memory.

    ppt20p doanhung_dtvtk10 24-03-2013 49 5   Download

  • Another source of error due to filtering effect of the system: Intersymbol. interference (ISI) The techniques to reduce ISI. Pulse shaping to achieve zero ISI at the sampling time. Equalization to combat the filtering effect of the channel.Some bandpass modulation schemes used in DCS for transmitting information oer channel. MPAM, MPSK, MFSK, MQAM How to detect the transmitted information at the receiver. Coherent detection. Noncoherent detection.

    ppt27p doanhung_dtvtk10 24-03-2013 58 7   Download

  • The Data-over-Cable Service Interface Specification (DOCSIS)is an international standard developed by CableLabs, a non-profit research and development consortium for cable-related technologies. • DOCSIS specifies the OSI Layer 1 and Layer 2 requirements: Physical layer-For data signals that the cable operator can use, DOCSIS specifies the channel widths (bandwidths of each channel) as 200 kHz, 400 kHz, 800 kHz, 1.6 MHz, 3.2 MHz, and 6.4 MHz. DOCSIS also specifies modulation techniques (the way to use the RF signal to convey digital data).

    pdf47p mrdvad11 12-03-2013 136 54   Download

  • One of the important peptide hormones that control reproduction in crus-taceans is gonad-inhibiting hormone (GIH). GIH is known to modulate gonad maturation by inhibiting synthesis of vitellogenin (Vg), the precursor of yolk proteins. In this study, a cDNA encoding a GIH (Pem-GIH) from the eyestalk of Penaeus monodonwas cloned using RT-PCR and RACE techniques.

    pdf11p media19 06-03-2013 22 4   Download

  • Security-Enhanced Linux (SELinux) is an implementation of mandatory access control using Linux Security Modules (LSM) in the Linux kernel, based on the principle of least privilege. It is not a Linux distribution, but rather a set of modifications that can be applied to Unix-like operating systems, such as Linux and BSD.

    ppt15p muathu_102 28-01-2013 94 11   Download

  • Cryptography (or cryptology; from Greek κρυπτός, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively)[1] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).[2] More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries

    pdf0p doilan 25-01-2013 57 4   Download

  • SQL injection is a technique often used to attack data driven applications [1]. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g., dump the database contents to the attacker). SQL injection is a code injection technique that exploits a security vulnerability in an application's software. The vulnerability happens

    pdf0p doilan 25-01-2013 73 8   Download

  • In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Another common approach is to say that you have "forgotten" the password and then change it.

    pdf0p doilan 25-01-2013 56 5   Download

  • In this paper, we are dealing with a L-band power combiner method using the Wilkinson bridge. This is a modern power combination technique in the microwave technology. The design and simulink of the basic power moduls and Wilkinson bridge were performed using the ADS soflware. We have researched, designed and fabricated the power combination from the basic 200W moduls. The experimental results showed that power combination method using the Wilkinson bridge may be applicable in the L-band transmission....

    pdf5p tuanlocmuido 19-12-2012 74 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2