Essays about: "Bit Error Generation"
Showing result 1 - 5 of 28 essays containing the words Bit Error Generation.
-
1. Digital Front End Algorithms for Sub-Band Full Duplex
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Sub-band full duplex is a new communication scheme technology, where a single frequency band is partitioned into sub-bands for downlink (DL) and up-link(UL) transmissions, and both can take place simultaneously. The idea behind the sub-band full duplex development is to improve the throughput, and coverage and reduce the latency of the UL communication by allowing the UL reception during the DL transmission. READ MORE
-
2. Quantum Reinforcement Learning for Sensor-Assisted Robot Navigation Tasks
University essay from Lunds universitet/Fysiska institutionenAbstract : Quantum computing has advanced rapidly throughout the past decade, both from a hardware and software point of view. A variety of algorithms have been developed that are suitable for the current generation of quantum devices, which are referred to as noisy intermediate-scale quantum devices. READ MORE
-
3. Design and optimization of Bandwidth Part selection for massive beamforming
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In the last 30 years, a new mobile communications generation has been developed every 7 to 10 years. The last one that is currently under development is the Fifth Generation. This generation aims to fulfill a wide range of requirements for different use cases. To that end, a new radio access technology called New Radio (NR) has been developed. READ MORE
-
4. Characterization of FPGA-based Arbiter Physical Unclonable Functions
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The security of service, confidential data, and intellectual property are threatened by physical attacks, which usually include reading and tampering the data. In many cases, attackers can have access to the tools and equipment that can be used to read the memory or corrupt it, either by invasive or non-invasive means. READ MORE
-
5. IOT CONNECTIVITY WITH EDGE COMPUTING
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Billions of Internet of Things (IoT) devices will be connected in the next decades. Most devices are for Massive Machine Type Communication (MMTC) applications. This requires the IoT infrastructure to be extremely efficient and scalable (like today’s Internet) to support more and more devices connected to the network over time. READ MORE