Over the past years, we have witnessed destructions of various kinds caused by human actions. As a university student, write a letter to our society to
標簽: destructions witnessed actions various
上傳時間: 2014-11-23
上傳用戶:一諾88
Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
標簽: functions hash cryptographic Algorithm
上傳時間: 2014-11-09
上傳用戶:1109003457
This software documentation contains proprietary information of OpenAccess Software, Inc. it is provided under a license agreement containing restrictions on use and disclosure and is also protected by copyright law. Reverse engineering of the software is prohibited. If this software/documentation is delivered to a U.S. Government Agency, then it is delivered with Restricted Rights and the following legend is applicable:
標簽: documentation proprietary information OpenAccess
上傳時間: 2015-09-03
上傳用戶:mpquest
le flows through MOS channel while Ih flows across PNP transistor Ih= a/(1-a) le, IE-le+lh=1/(1-a)' le Since IGBT has a long base PNP, a is mainly determined by ar si0 2ar= 1/cosh(1/La), La: ambipolar diff length a-0.5 (typical value)p MOSFET channel current (saturation), le=U"Cox"W(2"Lch)"(Vc-Vth)le Thus, saturated collector current Ic, sat=1/(1-a)"le=-1/(1-a)"UCox"W/(2Lch)"(Vo-Vth)2Also, transconductance gm, gm= 1/(1-a)"u' Cox W/Lch*(Vo-Vth)Turn-On1. Inversion layer is formed when Vge>Vth2. Apply positive collector bias, +Vce3. Electrons flow from N+ emitter to N-drift layer providing the base current for the PNP transistor4. Since J1 is forward blased, hole carriers are injected from the collector (acts as an emitter).5. Injected hole carriers exceed the doping level of N-drift region (conductivity modulation). Turn-Off1. Remove gate bias (discharge gate)2. Cut off electron current (base current, le, of pnp transistor)
標簽: igbt
上傳時間: 2022-06-20
上傳用戶:wangshoupeng199
用Doolittle方法求解此方程組; 1.先由U[1][i]=a[1][i] 求的U的第一行,在根據L[i][1]=a[i][1]/U[1][1] 求的L的第一列;2..然后根據公式求得U,L其他的值; 3 回帶求解得到X
上傳時間: 2013-12-10
上傳用戶:洛木卓
a-law, u-law source code, for audio compre
上傳時間: 2013-12-31
上傳用戶:894898248
A率/u率 壓縮與解壓縮的IP核,。 # 由AHDL語言寫成,可在MaxplusII和QuartusII中使用,源代碼加密。
上傳時間: 2015-06-19
上傳用戶:aysyzxzm
含t h r e a d x,u c o s 的b s p
標簽:
上傳時間: 2015-06-29
上傳用戶:xfbs821
“多播”亦稱“多點傳送”(M u l t i c a s t i n g),是一種讓數據從一個成員送出,然后復制給其 他多個成員的技術
標簽: 多點傳送
上傳時間: 2014-01-20
上傳用戶:磊子226
G711 u-law, A-law and linear PCM conversions Programm.
標簽: conversions Programm linear A-law
上傳時間: 2014-12-02
上傳用戶:wangdean1101