Searched for: subject%3A%22Lock%255C-in%22
(1 - 20 of 24)

Pages

document
Aninat, R. (author), Bakker, K. (author), Jouard, L. (author), ott Cruz, M.G.S. (author), Yilmaz, P. (author), Theelen, M. (author)
The ever-increasing instalment capacity of Cu (In, Ga)(Se, S)2-based photovoltaicscalls for a better understanding and control of their reliability. In this paper, we showhow using a coring-based method, small samples can be extracted from full size com-mercial modules, and prepared for lab-scale analysis. The method is applied to a Cu(In, Ga)...
article 2022
document
Attema, T. (author), Dunning, V.A. (author), Everts, M. (author), Langenkamp, P. (author)
We present a novel compiler for transforming arbitrary, passively secure MPC protocols into efficient protocols with covert security and public verifiability in the honest majority setting. Our compiler works for protocols with any number of parties > 2 and treats the passively secure protocol in a black-box manner. In multi-party computation ...
conference paper 2022
document
van Wanum, M. (author), Lia, E. (author), de Boer, L. (author), Bronts, L.Q. (author), Marien Rodenburg, M. (author), Jacobs, B. (author), Inácio, A.I. (author), van Heijningen, M. (author), van Vliet, F.E. (author)
This paper describes a Ku-band up-converter for low cost satellite Machine to Machine (M2M) applications. The up-converter comprises a heterodyne sliding-IF architecture. This converts the baseband input signal (0 – 20 MHz) to the RF output signal (13.75 – 14.75 GHz). The necessary Local Oscillator (LO) signals are generated by an on-chip...
conference paper 2020
document
van Wanum, M. (author), de Boer, L. (author), van Vliet, F.E. (author)
This paper describes a fractional-N PLL IC with absolute phase control utilizing an on-chip loop-filter. The frequency range is 2.6 to 3.5 GHz, which covers one of the bands for future low-band 5G telecommunication systems. For phased-array operation a compact form-factor is needed as the space available for the complete front-end is limited by...
conference paper 2018
document
Theelen, M. (author), de Amorim Soares, G. (author), Beyeler, K. (author), Steijvers, H. (author), Barreau, N. (author)
Unpackaged CIGS solar cells were simultaneously exposed to illumination and either dry heat, damp heat or dry cold followed by thermal cycling. In-situ monitoring of their electrical parameters demonstrated a rapid decrease of the efficiency for the solar cells exposed to damp heat plus illumination. This decrease was mainly driven by changes in...
conference paper 2017
document
Maljaars, J. (author), Vrouwenvelder, A.C.W.M. (author)
A failure assessment method of stay cables containing fractured wires is presented through an example of an existing bridge. The wires constituting the stay cables of the bridge contained many initial defects that were formed during the rolling process of these wires. Despite moderate loading, fatigue cracks started to grow from these defects,...
article 2014
document
Velner, J. (author), Klumperink, E.A.M. (author), Nauta, B. (author), van Vliet, F.E. (author)
A type-III PLL is used to generate linear frequency ramps with 386 kHz RMS frequency error in L-band (3088 kHz in X-band) and 10% fractional bandwidth. Pulse durations can be as low as 10 μs without performance degradation. The system covers the L-, S-, C- and X-bands. A programmable output driver delivering -17.9 to +4.9 dBm differentially is...
conference paper 2013
document
Velner, J. (author), Klumperink, E.A.M. (author), Nauta, B. (author), van Vliet, F.E. (author)
This work presents a fully integrated multi-band frequency synthesizer that is capable of creating wide-band linear frequency sweeps of very short duration. The main aim is to create a flexible waveform generation system, requiring distribution of a low frequency reference rather than RF signals. By using a phase-locked loop, frequency...
conference paper 2013
document
Veugen, P.J.M. (author), Beye, M. (author)
Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an et al. have defined measures for the...
bookPart 2013
document
Beye, M. (author), Veugen, P.J.M. (author)
Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen [3] devised trees to withstand such attacks, but...
conference paper 2012
document
Soer, M.C.M. (author), Klumperink, E.A.M. (author), Nauta, B. (author), van Vliet, F.E. (author)
Phased-array receivers provide two major benefits over single-antenna receivers [1]. Their signal-to-noise ratio (SNR) doubles for each doubling in the number of elements, resulting in extended range. Secondly, interferers can be rejected in the spatial domain for increased link robustness. These arrays can be implemented by phase shifting and...
conference paper 2011
document
Stokking, H.M. (author), van Brandenburg, R. (author), van der Weerdt, C.A. (author)
For telephone services, service providers have arranged that users from different providers can communicate with each other. Also, when changing from one provider to another, it is possible to retain your telephone number. These things are possible because of `interconnection' and `number portability'. Interconnection and (number) portability...
conference paper 2011
document
Ma, K. (author), van Leuken, R. (author), Vidojkovic, M. (author), Romme, J. (author), Rampu, S. (author), Pflug, H. (author), Huang, L. (author), Dolmans, G. (author)
PLLs have become an important part of electrical systems. When designing a PLL, an efficient and reliable simulation platform for system evaluation is needed. However, the closed loop simulation of a PLL is time consuming. To address this problem, in this paper, a new PLL model containing both digital and analog parts based on the recently...
conference paper 2011
document
Beye, M. (author), Veugen, P.J.M. (author)
Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen [2] devised trees to withstand such attacks, but...
conference paper 2011
document
Nakiboglu, G. (author), Belfroid, S.P.C. (author), Willems, J.F.H. (author), Hirschberg, A. (author)
Whistling behavior of two geometrically periodic systems are investigated: corrugated pipes and a multiple side branch system. In both systems frequency (Helmholtz number) is a non-decreasing piecewise constant function of the Mach number, whose increase on average is approximately linear. The plateaus, lock-in frequencies, of this piecewise...
article 2010
document
Lentzen, S. (author)
A finite rotation shell element is presented which can be used to analyse thermopiezomechanical phenomena when dealing with thin-walled smart structures. Initially, the underlying theory is explained in order to illustrate the simplifying assumptions that are eventually made. Several locking phenomena are avoided by deploying ANS and EAS...
conference paper 2010
document
Gerrits, L. (author), Marks, P. (author), TNO Bouw en Ondergrond (author)
In this article the theoretical concepts of path-dependency and lock-in are applied to the geometry of the Zeeland delta in the Netherlands. They are used to show that even very small and unpredictable events can cause systems to remain on a path that is practically impossible to leave because the costs of leaving are too high. As a result,...
article 2008
document
Rypkema, J.A. (author), Schilder, C.M.C. (author), Kranenborg, K. (author), Groenewegen, P.L.M. (author), TNO Defensie en Veiligheid (author), DenV (author)
Binnen Rijkswaterstaat vindt een steeds verdere centralisatie plaats van de bediening van beweegbare bruggen en sluizen. Dit betekent dat bedienaren meerdere objecten tegelijk op afstand bedienen. Eenduidigheid in de Mens-Machine Interface (MMI) is een voorwaarde om snel tussen objecten te kunnen schakelen en fouten in de bediening te voorkomen....
report 2008
document
TNO Defensie en Veiligheid (author), Maas, A.P.M. (author), van Vliet, F.E. (author)
This paper describes the design and performance of a low-cost synthesized FMCW radar module, operating in S band. The bi-layer PCB contains a frequency-agile low phase-noise synthesizer and three identical coherent receive-channels. The transmit channel has an automatic power control system that reduces the output power when a large reflection...
conference paper 2008
document
Leendertse, P.M. (author), Pennings, L.J. (author), TNO Informatie- en Communicatietechnologie (author)
This paper addresses new questions around media performance as a result of the rise of centralized content portals such as iTunes or MySpace. We first describe the rise of centralized content portals in different media industries, and discuss how these portals are creating a dominant position for themselves by using lock-in strategies. Then we...
conference paper 2007
Searched for: subject%3A%22Lock%255C-in%22
(1 - 20 of 24)

Pages