Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RF Microelectronics (2nd Edition)

Buy

The Acclaimed RF Microelectronics Best-Seller, Expanded and Updated for the Newest Architectures, Circuits, and Devices

 

Wireless communication has become almost as ubiquitous as electricity, but RF design continues to challenge engineers and researchers. In the 15 years since the first edition of this classic text, the demand for higher performance has led to an explosive growth of RF design techniques. In RF Microelectronics, Second Edition, Behzad Razavi systematically teaches the fundamentals as well as the state-of-the-art developments in the analysis and design of RF circuits and transceivers.

 

Razavi has written the second edition to reflect today’s RF microelectronics, covering key topics in far greater detail. At nearly three times the length of the first edition, the second edition is an indispensable tome for both students and practicing engineers. With his lucid prose, Razavi now

  • Offers a stronger tutorial focus along with hundreds of examples and problems
  • Teaches design as well as analysis with the aid of step-by-step design procedures and a chapter dedicated to the design of a dual-band WiFi transceiver
  • Describes new design paradigms and analysis techniques for circuits such as low-noise amplifiers, mixers, oscillators, and frequency dividers 

This edition’s extensive coverage includes brand new chapters on mixers, passive devices, integer-N synthesizers, and fractional-N synthesizers. Razavi’s teachings culminate in a new chapter that begins with WiFi’s radio specifications and, step by step, designs the transceiver at the transistor level.

 

Coverage includes

  • Core RF principles, including noise and nonlinearity, with ties to analog design, microwave theory, and communication systems
  • An intuitive treatment of modulation theory and wireless standards from the standpoint of the RF IC designer
  • Transceiver architectures such as heterodyne, sliding-IF, directconversion, image-reject, and low-IF topologies.
  • Low-noise amplifiers, including cascode common-gate and commonsource topologies, noise-cancelling schemes, and reactance-cancelling configurations
  • Passive and active mixers, including their gain and noise analysis and new mixer topologies
  • Voltage-controlled oscillators, phase noise mechanisms, and various VCO topologies dealing with noisepower-tuning trade-offs
  • All-new coverage of passive devices, such as integrated inductors, MOS varactors, and transformers
  • A chapter on the analysis and design of phase-locked loops with emphasis on low phase noise and low spur levels
  • Two chapters on integer-N and fractional-N synthesizers, including the design of frequency dividers
  • Power amplifier principles and circuit topologies along with transmitter architectures, such as polar modulation and outphasing
(HTML tags aren't allowed.)

CCIE Security Practice Labs (CCIE Self-Study)
CCIE Security Practice Labs (CCIE Self-Study)

The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under big pressure to satisfy ever-increasing demands from customers, suppliers,...

Developing Extensions for Macromedia® Flash® 8
Developing Extensions for Macromedia® Flash® 8

Developing Extensions for Macromedia Flash 8

describes how to build Flash JavaScript extensions to enhance the developer's experience while working in the Flash authoring environment. This book explains how each type of extension works and describes the JavaScript...

Laptops For Dummies (Computer/Tech)
Laptops For Dummies (Computer/Tech)
Choose the right laptop, set it up, and hit the road!

Decide what you want your laptop to do,use all its features, and solve problems

Here's the best advice ever to fall into your lap. From how to unpack the box (yes, it DOES matter!) to being selective about software, managing your power, and protecting your connection, this...


Artificial Intelligence: Methodology, Systems, and Applications: 11th International Conference, AIMSA 2004, Varna, Bulgaria, September 2-4, 2004
Artificial Intelligence: Methodology, Systems, and Applications: 11th International Conference, AIMSA 2004, Varna, Bulgaria, September 2-4, 2004
The 11th Conference “Artificial Intelligence: Methodology, Systems, Applications – Semantic Web Challenges” (AIMSA 2004) continued successfully pursuing the main aim of the AIMSA series of conferences – to foster the multidisciplinary community of artificial intelligence researchers, embracing both the theoretic...
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
SystemVerilog for Verification, Second Edition: A Guide to Learning the Testbench Language Features
SystemVerilog for Verification, Second Edition: A Guide to Learning the Testbench Language Features
SystemVerilog for Verification, Second Edition provides practical information for hardware and software engineers using the SystemVerilog language to verify electronic designs. The author explains methodology concepts for constructing testbenches that are modular and reusable. The book includes extensive coverage of the SystemVerilog 3.1a...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy