Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cascade amplifier

Known as: Cascade 
A cascade amplifier is any two-port network constructed from a series of amplifiers, where each amplifier sends its output to the input of the next… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Higher global bandwidth requirement for many applications and lower network cost have motivated the use of the Dragonfly network… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
The archetypical debris disk around Vega has been observed intensively over the past 25 years. It has been argued that the… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2010
2010
Ball and beam system is one of a nonlinear and unstable control system, thus providing a challenge to the control engineers and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a method for accurate aggregation of highway traffic information in vehicular ad hoc networks (VANETs). Highway… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We study stochastic submodular maximization problem with respect to a cardinality constraint. Our model can capture the effect of… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The invasion process goes through a series of stages, a cascade, such as import, release or escape, establishing a population… Expand
  • table 1
  • figure 1
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We study the suitability of common pseudorandomnessmodes associated with cryptographic hash functions and block ciphers (CBC-MAC… Expand
Is this relevant?
1998
1998
  • Eli Biham
  • Journal of Cryptology
  • 1998
  • Corpus ID: 28647050
Abstract. In recent years, several new attacks on DES were introduced. These attacks have led researchers to suggest stronger… Expand
  • figure 1
Is this relevant?
Highly Cited
1996
Highly Cited
1996
The purpose of this study was to investigate the patterns of students’ conceptual restructuring within the theoretical framework… Expand
  • figure I
  • figure 2
Is this relevant?
Highly Cited
1965
Highly Cited
1965
Two distinct kinds of transition have been identified in Couette flow between concentric rotating cylinders. The first, which… Expand
  • figure 1
  • figure 3
  • figure 6
  • figure 7
  • table 1
Is this relevant?