0%

Archive for the ‘blog’ Category

Beacon acts as a tiny radio transmitter for Bluetooth. This hardware component is either driven by batteries or Is USB powered. The device incessantly transmits Bluetooth Low Energy (BLE) signals which are visible to the other smart devices. This device falls under the category of Bluetooth Low Energy (LE) device which is capable of broadcasting […]

Nov 14, 2019

Sateesh

blog

0

[This article is part 2 of two-part series of articles on URLLC. This part covers ultra-low latency technologies in 5G , top IP players and important patents in  URLLC. Please read part 1 which covers ultra-reliability here] Recap from the previous article: URLLC is one of the different types of technologies that are supported by […]

Nov 13, 2019

tapas.choudhury

blog

0

Safety is of critical importance in automotive IC design in the automotive industry, and that makes safety verification very crucial in SoC designs for critical automotive applications. Regulation of safety practices and importance of safety for automotive industry led to adoption of ISO 26262 which was derived from IEC 61508, safety standard for electrical and […]

Nov 04, 2019

Sateesh

blog

0

[This article is part 1 of two-part series of articles on URLLC focusses on 5G technologies related to Ultra reliability. Part 2 covers Low latency will be the next article coming up] To meet the requirements of a high data rate with very quick and errorless response 5G has come with new and improved technologies […]

Nov 04, 2019

tapas.choudhury

blog

0

The automotive industry is going through a major change with more than 270 ambitious startups revving up the electric vehicle industry. There were more than 43 confirmed model launches in 2019 – 25 battery EVs (BEVs) and 18 plug-in hybrid EVs (PHEVs). Electric mobility options are becoming more prominent in ride-sharing and micro-mobility solutions. In […]

Nov 04, 2019

avneesh.mishra

blog

0

This is the era of databases involving a lot of transactions. Often a database administrator is involved in routine management tasks, security, backups, updates, database tuning, managing ETL tools, monitoring disk utilization, troubleshooting errors, creating schemas and managing, scheduling and applying patches, etc. These tasks are automated using the decades of database automation, automating database [...]

Non Orthogonal Multiple Access (NOMA) is proposed technology for future wireless communication. In the evaluation of telecommunication technologies there were different multiple access techniques implemented. In previous generation of wireless technologies time, frequency and coding scheme is used as source of multiple access technique. Time division multiple access (TDMA) implemented in second generation of communication […]

color
https://www.dolcera.com/web/wp-content/themes/yunik-installable/
https://www.dolcera.com/web/
#EDB44D
style1
scrollauto
Loading posts...
#ffffff
on
none
loading
#ffffff
Sort Gallery
https://www.dolcera.com/web/wp-content/themes/yunik-installable
on
yes
yes
off
off
Newsletter Input text
on
off