針對傳統集成電路(ASIC)功能固定、升級困難等缺點,利用FPGA實現了擴頻通信芯片STEL-2000A的核心功能。使用ISE提供的DDS IP核實現NCO模塊,在下變頻模塊調用了硬核乘法器并引入CIC濾波器進行低通濾波,給出了DQPSK解調的原理和實現方法,推導出一種簡便的引入?仔/4固定相移的實現方法。采用模塊化的設計方法使用VHDL語言編寫出源程序,在Virtex-II Pro 開發板上成功實現了整個系統。測試結果表明該系統正確實現了STEL-2000A的核心功能。
Abstract:
To overcome drawbacks of ASIC such as fixed functionality and upgrade difficulty, FPGA was used to realize the core functions of STEL-2000A. This paper used the DDS IP core provided by ISE to realize the NCO module, called hard core multiplier and implemented CIC filter in the down converter, Described the principle and implementation detail of the demodulation of DQPSK, and derived a simple method to introduce a fixed phase shift of ?仔/4. The VHDL source code was designed by modularity method , and the complete system was successfully implemented on Virtex-II Pro development board. Test results indicate that this system successfully realize the core function of the STEL-2000A.
Abstract: How can an interface change a happy face to a sad face? Engineers have happy faces when an interface works properly.Sad faces indicate failure somewhere. Because interfaces between microprocessors and ICs are simple—even easy—they are oftenignored until interface failure causes sad faces all around. In this article, we discuss a common SPI error that can be almostimpossible to find in a large system. Links to interface tutorial information are provided for complete information. Noise as a systemissue and ICs to minimize its effects are also Described.
zlib 1.2.2 is a general purpose data compression library. All the code is thread safe. The data format used by the zlib library is Described by RFCs (Request for Comments) 1950 to 1952 in the files http://www.ietf.org/rfc/rfc1950.txt (zlib format), rfc1951.txt (deflate format) and rfc1952.txt (gzip format). These documents are also available in other formats from ftp://ftp.uu.net/graphics/png/documents/zlib/zdoc-index.html
The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you want a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.) I have attempted to provide copious comments in the code and hope that a knowledgeable C programmer can quickly map the approach as Described in the paper to what is in the program.
c語言編譯器,跨平臺,4.2版本
lcc version 3.x is Described in the book "A Retargetable C Compiler:
Design and Implementation" (Addison-Wesley, 1995, ISBN 0-8053-1670-1).
There are significant differences between 3.x and 4.x, most notably in
the intermediate code. For details, see
http://www.research.microsoft.com/~drh/pubs/interface4.pdf.
c語言編譯器,3.6版本
lcc version 3.x is Described in the book "A Retargetable C Compiler:
Design and Implementation" (Addison-Wesley, 1995, ISBN 0-8053-1670-1).
There are significant differences between 3.x and 4.x, most notably in
the intermediate code. For details, see
http://www.research.microsoft.com/~drh/pubs/interface4.pdf.
*** *** *** *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** ** RELEASE NOTES *** *** *** *** *****
*** *** *** *** *** *** *** *** *** *** *** *** ***
1) RELEASE NOTES:
--- --- ----
The release notes are now provided in PDF format in the file:
\SOFTWARE\uCOS-II\DOC\RelV251.PDF
2) FEATURES SINCE V2.00:
--- --- --- -----
All the features added since V2.00 are Described in the PDF file:
\SOFTWARE\uCOS-II\DOC\NewV251.PDF
3) EVENT FLAGS:
--------------
Event Flags are discussed in AN-1007 (see www.Micrium.com/app_notes.htm)
4) QUICK REFERENCE CHART:
------------------------
A Quick Reference Chart for all the functions in V2.51 is provided in the
following .PDF files:
\SOFTWARE\uCOS-II\DOC\QuickRefChartV251-Color.PDF
Once printed, simply FOLD the page in half and if you have a LAMINATION
machine, you can protect the chart by laminating it.
I. Introduction
This code exploits a previously undisclosed vulnerability in the bit string
decoding code in the Microsoft ASN.1 library. This vulnerability is not related
to the bit string vulnerability Described in eEye advisory AD20040210-2. Both
vulnerabilities were fixed in the MS04-007 patch.
II. Screenshots
$ ./kill-bill.pl
. kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007)
by Solar Eclipse <solareclipse@phreedom.org>
Usage: kill-bill -p <port> -s <service> host
Services:
iis IIS HTTP server (port 80)
iis-ssl IIS HTTP server with SSL (port 443)
exchange Microsoft Exchange SMTP server (port 25)
smb-nbt SMB over NetBIOS (port 139)
smb SMB (port 445)
If a service is running on its default port you don t have to
specify both the service and the port.
Examples: kill-bill -s iis 192.168.0.1
kill-bill -p 80 192.168.0.1
kill-bill -p 1234 -s smb 192.168.0.1
Decoding most of the infrared signals can be easily
handled by PIC16C5X microcontrollers. This application
note describes how this decoding may be done.
The only mandatory hardware for decoding IR signals
is an infrared receiver. The use of two types is
Described here. Both are modular types used often by
the consumer electronics industry. The first type
responds to infrared signals modulated at about
40 kHz. The second responds to non-modulated infrared
pulses and has a restricted range. The hardware
costs of each approach will be less than two dollars.