LEADER 03054nam 2200565 450 001 9910785446303321 005 20230908170412.0 010 $a1-59693-231-7 035 $a(CKB)2670000000060737 035 $a(EBL)624053 035 $a(OCoLC)694729136 035 $a(SSID)ssj0000469342 035 $a(PQKBManifestationID)11288356 035 $a(PQKBTitleCode)TC0000469342 035 $a(PQKBWorkID)10511134 035 $a(PQKB)11323166 035 $a(Au-PeEL)EBL624053 035 $a(CaPaEBR)ebr10436229 035 $a(CaBNVSL)mat09106625 035 $a(IEEE)9106625 035 $a(MiAaPQ)EBC624053 035 $a(EXLCZ)992670000000060737 100 $a20200729d2010 uy 101 0 $aeng 135 $aurcn#nnn||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFrequency synthesizers $econcept to product /$fAlexander Chenakin 210 1$aBoston :$cArtech House,$dİ2011. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2010] 215 $a1 online resource (xv, 214 pages) $cillustrations 225 1 $aArtech House microwave library 311 $a1-59693-230-9 320 $aIncludes bibliographical references and index. 327 $aParameters and architectures -- Building blocks -- Synthesizer construction -- Design process -- Improving performance -- Advanced functions. 330 3 $aA frequency synthesizer is an electronic system for generating any of a range of frequencies from a single fixed oscillator. They are found in modern devices like radio receivers, mobile phones, and GPS systems. This comprehensive resource offers RF and microwave engineers a thorough overview of both well-established and recently developed frequency synthesizer design techniques. Professionals find expert guidance on all design aspects, including main architectures, key building blocks, and practical circuit implementation. Engineers learn the development process and gain a solid understanding of how to build a synthesizer from a basic diagram to the final product. Starting with a simple single-loop PLL example, the book progressively examines various alternatives -- fractional-N, DDS, frequency offset, multiloop and more - to achieve required performance objectives. This unique volume gathers a collection of block diagrams, clever circuits, design recipes, and other hard-to-find information that is usually treated as "design secrets". Written in a simple yet rigorous style with numerous illustrations, the book is an all-in-one reference for both beginner and experienced designers.$cPublisher abstract. 410 0$aArtech House microwave library. 606 $aFrequency synthesizers 606 $aFrequency changers 615 0$aFrequency synthesizers. 615 0$aFrequency changers. 700 $aChenakin$b Alexander$01525578 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910785446303321 996 $aFrequency synthesizers$93767072 997 $aUNINA LEADER 05658nam 22006975 450 001 9910488705003321 005 20251225173614.0 010 $a3-030-78086-4 024 7 $a10.1007/978-3-030-78086-9 035 $a(CKB)5470000000736331 035 $a(MiAaPQ)EBC6676198 035 $a(Au-PeEL)EBL6676198 035 $a(OCoLC)1259363420 035 $a(PPN)257358412 035 $a(BIP)80794395 035 $a(BIP)80147684 035 $a(DE-He213)978-3-030-78086-9 035 $a(EXLCZ)995470000000736331 100 $a20210618d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security Cryptography and Machine Learning $e5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8?9, 2021, Proceedings /$fedited by Shlomi Dolev, Oded Margalit, Benny Pinkas, Alexander Schwarzmann 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (520 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12716 311 08$a3-030-78085-6 320 $aIncludes bibliographical references and index. 327 $aProgrammable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks -- Adversaries Strike Hard: Adversarial Attacks against Malware Classifiers using Dynamic API Calls as Features -- Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent -- Principal Component Analysis using CKKS Homomorphic Encryption Scheme -- DepthStAr: Deep Strange Arguments Detection -- Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems -- Privacy Preserving Password Strength Meters with FHE -- Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning -- Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies -- Game of Drones - Detecting Spying Drones Using Time Domain Analysis -- Privacy Vulnerability of NeNDS Collaborative Filtering -- Lawful Interception in WebRTC Peer-To-Peer Communication -- Hierarchical Ring Signatures Immune to Randomness Injection Attacks -- Theoretical aspects of a priori on-line assessment of data predictability in applied tasks -- Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement -- Warped Input Gaussian Processes for Time Series Forecasting -- History Binding Signature -- Effective enumeration of infinitely many programs that evade Formal Malware Analysis -- DNS-Morph: UDP-Based Bootstrapping Protocol For Tor -- Polynomial Time k-Shortest Multi-Criteria Prioritized and All-Criteria-Disjoint Paths -- Binding BIKE errors to a key pair -- Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform -- Efficient Secure Ridge Regression from Randomized Gaussian Elimination -- PolyDNN Polynomial Representation of NN for Communication-less SMPC Inference -- Use of Blockchain for ensuring Data Integrity in Cloud Databases -- The Coming AI Hackers -- Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for ScalableMPC -- Fully Dynamic Password Protected Secret Sharing: simplifying PPSS operation and maintenance -- Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features -- Software Integrity and Validation using Cryptographic Composability and Computer Vision -- Efficient Generic Arithmetic for KKW: Practical Linear MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup -- Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method -- Using a Neural Network to Detect Anomalies given an N-gram Profile -- Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations -- Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM -- Implementing GDPR in Social Networks using Trust and Context. 330 $aThis book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021, held in Be'er Sheva, Israel, in July 2021. The 22 full and 13 short papers presented together with a keynote paper in this volume were carefully reviewed and selected from 48 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12716 606 $aData protection 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aCryptology 606 $aMobile and Network Security 615 0$aData protection. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks$xSecurity measures. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aMobile and Network Security. 676 $a005.82 702 $aDolev$b Shlomi 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910488705003321 996 $aCyber Security Cryptography and Machine Learning$92200042 997 $aUNINA