Essays about: "trådlös kommunikation"
Showing result 11 - 15 of 84 essays containing the words trådlös kommunikation.
-
11. Design Guidelines of A Low Power Communication Protocol for Zero Energy Devices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Lågströmskommunikationsprotokoll såsom 6LoWPAN har använts i stor utsträckning för applikationer som kräver mindre energiförbrukning för trådlös kommunikation på korta avstånd, exempelvis IoT-enheter. Eftersom antalet sådana enheter ökar blir det allt viktigare att överväga ambient energy harvesting som en energikälla för att driva sådana enheter. READ MORE
-
12. Algorithmic Multi-Ported Memories Enabled Power-Efficient Pre-Distorter Design in ASIC
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The transition from the 5G to the 6G era is a pivotal juncture in contemporary wireless communication. Under such a circumstance, Digital Pre-Distortion (DPD) technology has established its significance as an effective method to linearize Power Amplifiers. READ MORE
-
13. Improving Co-existence of URLLC and Distributed AI using RL
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In 5G, Ultra-reliable and low-Latency communications (URLLC) service is envisioned to enable use cases with strict reliability and latency requirements on wireless communication. For the upcoming 6G network, machine learning (ML) also stands an important role that introduces intelligence and further enhances the system performance. READ MORE
-
14. Compact Ku-band Microwave Filters Realised using Suspended Integrated Stripline Technology
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As the fifth generation of telecommunications is deployed, and the number of devices transmitting in the microwave bands grows, effective filtering technologies are becoming ever more important. When a filter is designed, some performance trade-offs have to be made, and one of them is the trade-off between filter size and electrical performance. READ MORE
-
15. Authentication Techniques Based on Physical Layer Attributes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE