18 Questions 99 Answers 0 Followers
Questions related from AR Reddy
The AES algorithm uses the irreducible polynomial x^8+x^4+x^3+x+1 for multiplying with MDS and inverse MDS matrix for encryption and decryption, respectively. Can we change this polynomial with...
01 October 2015 7,100 6 View
Can someone tell, the details of the processors used in 4G mobile phones ?
19 August 2015 1,722 3 View
In VLSI IC fabrication, a metal such as aluminium is used for the final metalization. Since conductivity of gold is better than aluminium, why gold is not being used ? What is the advantage of...
02 August 2015 7,599 5 View
GPS is used to indicate the location. What is the minimum resolution possible ? Where is the limitation ? GPS satellites or GPS receiver. Is there any way to improve the resolution ?
18 July 2015 864 9 View
Why processors are implemented with 5 to 10 stages of instruction pipeline ? Is it possible to design the pipeline with more than 1000 stages ? What are the problems of very large pipeline ?
16 July 2015 4,906 8 View
Since fabrication and miniaturization is easy, will it be beneficial to realize large number of array of spiral antennas ?
03 July 2015 8,461 9 View
We know that hash function generates a unique hash value for a given data. This is similar to finger print. But there is a possibility that two data sets may generate same hash value. This is...
03 July 2015 4,374 1 View
Will the 5G mobile users have to pay less tariff compared to 4G ? We know that 5G offers 100 times higher data rates. Spectrum will be cheaper since it is moving to higher frequency range...
02 July 2015 8,497 12 View
For a given key length, block ciphers provide certain level security. But now with the implementation of key stream generator using block cipher in various modes such as counter mode, OFB mode,...
01 July 2015 9,030 8 View
There should be a minimum limit on the cell size if a mobile user is allowed to move at a speed ranging from 40 KM/Hour to 100 KM/Hour. Handover delay should be a major constraint apart from other...
01 July 2015 4,861 4 View
As the handset travels from one edge of a cell to another edge at a speed , the receiver carrier frequency shift occurs. This degrades BER compared to fixed handset (non-moving handset). The...
30 June 2015 8,068 7 View
How interference signal is estimated at the cell edge? Since mobile phones are continuously moving, the interference signal level also keep changes with time. What should be the periodicity of...
30 June 2015 9,357 4 View
We know that LFSR are used in the design of stream ciphers. Block ciphers with modes of operation such as counter are also used in the design of stream ciphers. What other things are available to...
24 June 2015 3,058 4 View
Efficient and low latency handover algorithms are required to exploit the massive MIMO. Algorithm should account the availability of antennas, beams, various types of cells (femto, pico, etc.),...
17 June 2015 7,049 9 View
Since massive MIMO uses large number of antennas, what will be the rain effect on capacity. As we know, the change in signal amplitude and phase is severe in millimeter wave signals. Do we have to...
16 June 2015 5,276 3 View
Bent functions are used in the design of (1) block cipher cast 128/256, (2) Stream cipher Grain, and (3) Hash function HAVAL. Bent functions allows to have near-perfect diffusion but suffers from...
16 June 2015 5,516 3 View
Equalizers are used for broadband channel. Can any one tell the details of equalizers used in LTE ?
09 June 2015 9,215 6 View
We would like implement a fast adder in xilinx spartan 3 board. I'm looking for a solution to implement high speed adder.
01 June 2015 8,350 5 View