亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

WE

  • Many CAD users dismiss schematic capture as a necessary evil in the process of creating PCB layout

    Many CAD users dismiss schematic capture as a necessary evil in the process of creating PCB layout but WE have always disputed this point of view. With PCB layout now offering automation of both component placement and track routing, getting the design into the computer can often be the most time consuming element of the exercise. And if you use circuit simulation to develop your ideas, you are going to spend even more time working on the schematic.

    標簽: schematic necessary creating dismiss

    上傳時間: 2014-01-25

    上傳用戶:WMC_geophy

  • The Bit Array structure provides a compacted arrays of Booleans, with one bit for each Boolean value

    The Bit Array structure provides a compacted arrays of Booleans, with one bit for each Boolean value. A 0 [1] bit corresponds to the Boolean value false [true], respectively. WE can look at a stream of bytes as a stream of bits each byte contains 8 bits, so any n bytes hold n*8 bits. And the operation to manipulate this stream or bits array is so easy, jut read or change the bits state or make any Boolean operation on the whole bits array, like 鈥楢ND鈥? 鈥極R鈥? or 鈥榅OR鈥?

    標簽: structure compacted Booleans provides

    上傳時間: 2014-01-15

    上傳用戶:壞天使kk

  • Serial UART open source core. The design is engineered for use as a stand alone chip or for use with

    Serial UART open source core. The design is engineered for use as a stand alone chip or for use with other of our cores. The reason for developing the Serial UART core is the fact, that asynchronous serial communication is very common that almost every machine understands it.Also, for OCRP-1, WE needed a way of communication with a host computer, to make it available over the net.

    標簽: engineered for use Serial

    上傳時間: 2017-03-11

    上傳用戶:aa17807091

  • This is the Low Energy Adaptive Clustering Hierarchy routing protocol [LEACH] source code for wirele

    This is the Low Energy Adaptive Clustering Hierarchy routing protocol [LEACH] source code for wireless sensor network WE have used.It is developed with MatLab7

    標簽: Clustering Hierarchy Adaptive protocol

    上傳時間: 2013-12-09

    上傳用戶:362279997

  • Fast Fourier Transform poWEr point The rectangular window introduces broadening of any frequency co

    Fast Fourier Transform poWEr point The rectangular window introduces broadening of any frequency components [`smearing鈥? and sidelobesthat may overlap with other frequency components [`leakage鈥?. 鈥he effect improves as Nincreases 鈥oWEver, the rectangle window has poor properties and better choices of wncan lead to better spectral properties [less leakage, in particular] 鈥搃.e. instead of just truncating the summation, WE can pre-multiply by a suitable window function wnthat has better frequency domain properties. 鈥ore on window design in the filter design section of the course

    標簽: rectangular introduces broadening Transform

    上傳時間: 2017-03-25

    上傳用戶:change0329

  • It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom

    It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon. 1, p. 224) have hoWEver simplified material parameters in order to facilitate easier realization as WEll as to avoid infinities in optical constants. Here WE show that the cylindrical cloaks with simplified material parameters inherently allow the zeroth-order cylindrical wave to pass through the cloak as if the cloak is made of a homogeneous isotropic medium, and thus visible. To all high-order cylindrical waves, our numerical simulation suggests that the simplified cloak inherits some properties of the ideal cloak, but finite scatterings exist.

    標簽: invisibility constructed proposed electrom

    上傳時間: 2013-12-18

    上傳用戶:13215175592

  • A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di

    A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. WE confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. HoWEver, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.

    標簽: cylindrical scattering expansion developed

    上傳時間: 2017-03-30

    上傳用戶:lhc9102

  • In an electromagnetic cloak based on a transformation approach, reduced sets of material properties

    In an electromagnetic cloak based on a transformation approach, reduced sets of material properties are generally favored due to their easier implementation in reality, although a seemingly inevitable drawback of undesired reflection exists in such cloaks. Here WE suggest using high-order transformations to create smooth moduli at the outer boundary of the cloak, therefore completely eliminating the detrimental scattering within the limit of geometric optics. WE apply this scheme to a non-magnetic cylindrical cloak and demonstrate that the scattered field is reduced substantially in a cloak with optimal quadratic transformation as compared to its linear counterpart.

    標簽: electromagnetic transformation properties approach

    上傳時間: 2017-03-30

    上傳用戶:pkkkkp

  • LM3S系列ARM用GPIO模擬并行總線擴展32KB SRAM PF0~PF7 D0~D7(數據總線) PA0~PA7 A0~A7(地址總線低8位) PB0~PB

    LM3S系列ARM用GPIO模擬并行總線擴展32KB SRAM PF0~PF7 D0~D7(數據總線) PA0~PA7 A0~A7(地址總線低8位) PB0~PB7 A8~A15(地址總線高8位) PB7 /CE(片選) PC4 /WE(寫使能) PC5 /OE(讀使能) 32KB SRAM 映射在地址0x0000~0x4FFF之間 為了加快訪問速度,軟件上將采用寄存器方式進行操作 PB7原為/TRST功能,現在也解放出來作為地址線A15

    標簽: LM3S GPIO SRAM ARM

    上傳時間: 2014-01-01

    上傳用戶:wlcaption

  • 為 了提高用戶身份認證和授權管理的靈活性

    為 了提高用戶身份認證和授權管理的靈活性,從WE b 應用系統的安全性角度出發,討論了 一 種在. N E T F r a me w o r k下保證應用程序安全性的身份驗證和授權模型,并給出了模型的具體實現方法。 該模型利用 F o r ms身份驗證方法對用戶的身份進行鑒別。在授權處理上,模型結合統一資源定位( u . J f o r m R e s o u r c e L o c a t o r , U R L ) 授權模式和用戶所具有的系統角色,分別從頁面級和頁面操作級對用戶的訪問進行 控制。該模型在企業局域網環境內能夠提供比較靈活的身份認證和基于角色的授權服務。實際應用表明, 基于該模型的WE b應用系統能夠對用戶的訪問進行有效的控制,從而保證了系統的安全性

    標簽: 用戶 授權 身份認證

    上傳時間: 2013-12-31

    上傳用戶:VRMMO

主站蜘蛛池模板: 汉沽区| 河北区| 刚察县| 华池县| 措勤县| 云和县| 额济纳旗| 东阳市| 阳东县| 清远市| 常州市| 连南| 石泉县| 申扎县| 阳朔县| 郴州市| 泰来县| 三亚市| 嘉祥县| 万盛区| 河北省| 武邑县| 永城市| 新竹市| 晋宁县| 黎城县| 屏山县| 雷山县| 达尔| 黎平县| 虹口区| 邹平县| 横山县| 洪洞县| 蕲春县| 汨罗市| 余江县| 东乌珠穆沁旗| 鄂尔多斯市| 余姚市| 辽中县|