The AZ1117 is a series of low dropout three-terminal regulators with a dropout of 1.15V at 1A output current.
The AZ1117 series provides current limiting and thermal shutdown. Its circuit includes a trimmed bandgap reference to assure output voltage accuracy to be within 1% for 1.5V, 1.8V, 2.5V, 2.85V, 3.3V, 5.0V and adjustable versions or 2% for 1.2V version. Current limit is trimmed to ensure specified output current and controlled short-circuit current. On-chip thermal shutdown provides protection against any combination of overload and ambient temperature that would create excessive junction temperature.
The AZ1117 has an adjustable version, that can provide the output voltage from 1.25V to 12V with only 2 external resistors.
The rapid growth of the Web in the past two decades has made it the larg-
est publicly accessible data source in the world. Web mining aims to dis-
cover useful information or knowledge from Web hyperlinks, page con-
tents, and usage logs. Based on the primary kinds of data used in the
mining process, Web mining tasks can be categorized into three main
types: Web structure mining, Web content mining and Web usage mining.
Homogeneous Partitioning of the Surveillance Volume discusses the
implementation of the first of three sequentially complementary approaches for
increasing the probability of target detection within at least some of the cells of
the surveillance volume for a spatially nonGaussian or Gaussian “noise”
environment that is temporally Gaussian. This approach, identified in the Preface
as Approach A, partitions the surveillance volume into homogeneous contiguous
subdivisions.
Relaying techniques, in which a source node communicates to a destination node
with the help of a relay, have been proposed as a cost-effective solution to address
the increasing demand for high data rates and reliable services over the air. As
such, it is crucial to design relay systems that are able to not only provide high
spectral efficiency, but also fully exploit the diversity of the relay channel.
Wireless penetration has witnessed explosive growth over the last two decades.
Accordingly, wireless devices have become much denser per unit area, resulting
in an overcrowded usage of wireless resources. To avoid radio interferences and
packet collisions, wireless stations have to exchange control messages to coordinate
well. The existing wisdoms of conveying control messages could be classified into
three categories: explicit, implicit, or hybrid.
The idea of the book was born during the time when the second generation cellular system was looming on the horizon.At that time ,the world was divided into three distinct camps as far as looking for a standard: Europe North America and Japan.
At the time of writing, and to an extent never seen before, there is an expectation that
almost any information or service that is available through communication systems in
the office or home will be available wherever the user happens to be. This is placing
incredible demands on wireless communications and has been the driver for the gen-
esis and deployment of three generations of cellular systems in the space of 20 years.
This book addresses two aspects of network operation quality; namely, resource
management and fault management.
Network operation quality is among the functions to be fulfilled in order to offer
quality of service, QoS, to the end user. It is characterized by four parameters:
– packet loss;
– delay;
– jitter, or the variation of delay over time;
– availability.
Resource management employs mechanisms that enable the first three parameters
to be guaranteed or optimized. Fault management aims to ensure continuity of service.
The growth of mobile technologies is remarkable. At a recent Mobile World Congress Conference, Eric
Schmidt, CEO of Google predicted that within three years, smart phones will surpass Personal Com-
puter sales. The number of mobile phones used worldwide has exceeded 4.6 billion with continued
growth expected in the future. In fact, in the United States alone, the numbers of mobile phone users
comprise over 80% of the population.
In general there are three different techniques for performance evaluation of
systems and networks: mathematical analysis, measurements, and computer
simulation. All these techniques have their strength and weaknesses. In the
literature there are plenty of discussions about when to use which technique,
how to apply it, and which pitfalls are related to which evaluation technique.