電力電子環流SIMULINK模型 Notice that the Thyristor blocks have an output identified by the letter m. This output returns a Simulink vectorized signal containing the thyristor current (Iak) and voltage (Vak).
標簽: m. identified Thyristor the
上傳時間: 2013-12-13
上傳用戶:水中浮云
針對目前使用的RS232接口數字化B超鍵盤存在PC主機啟動時不能設置BIOS,提出一種PS2鍵盤的設計方法。基于W78E052D單片機,采用8通道串行A/D轉換器設計了8個TGC電位器信息采集電路,電位器位置信息以鍵盤掃描碼序列形式發送,正交編碼器信號通過XC9536XL轉換為單片機可接收的中斷信號,軟件接收到中斷信息后等效處理成按鍵。結果表明,在滿足開機可設置BIOS同時,又可實現超聲特有功能,不需要專門設計驅動程序,接口簡單,成本低。 Abstract: Aiming at the problem of the digital ultrasonic diagnostic imaging system keyboard with RS232 interface currently used couldn?蒺t set the BIOS when the PC boot, this paper proposed a design method of PS2 keyboards. Based on W78E052D microcontroller,designed eight TGC potentiometers information acquisition circuit with 8-channel serial A/D converter, potentiometer position information sent out with keyboard scan code sequentially.The control circuit based on XC9536 CPLD is used for converting the mechanical actions of the encoders into the signals that can be identified by the MCU, software received interrupt information and equivalently treatmented as key. The results show that the BIOS can be set to meet the boot, ultrasound specific functionality can be achieved at the same time, it does not require specially designed driver,the interface is simple and low cost.
上傳時間: 2013-10-10
上傳用戶:asdfasdfd
介紹一種簡單射頻識別系統設計。該設計包括閱讀器、應答器和線圈3部分。由單片機控制閱讀器向應答器發射無線信號,并接收應答器回送的信號,再通過分析回送信號識別物品。閱讀器和應答器之間以半雙工通信方式通信。 Abstract: A simple design of radio frequency identification system is given in this paper.The design includes reader,responder and winding.Through MCU,signals are sent to responder from reader,then corresponding signals are sent back. According to the analysis of the signals sent back,the objects can be identified.Half-duplex communication is adopted? between? reader? and? responder.
上傳時間: 2013-10-11
上傳用戶:plsee
Abstract: While many questions still surround the creation and deployment of the smart grid, the need for a reliablecommunications infrastructure is indisputable. Developers of the IEEE 1901.2 standard identified difficult channel conditionscharacteristic of low-frequency powerline communications and implemented an orthogonal frequency division multiplexing (OFDM)architecture using advanced modulation and channel-coding techniques. This strategy helped to ensure a robust communicationsnetwork for the smart grid.
上傳時間: 2013-10-18
上傳用戶:myworkpost
LVQ學習矢量化算法源程序 This directory contains code implementing the Learning vector quantization network. Source code may be found in LVQ.CPP. Sample training data is found in LVQ1.PAT. Sample test data is found in LVQTEST1.TST and LVQTEST2.TST. The LVQ program accepts input consisting of vectors and calculates the LVQ network weights. If a test set is specified, the winning neuron (class) for each neuron is identified and the Euclidean distance between the pattern and each neuron is reported. Output is directed to the screen.
標簽: implementing quantization directory Learning
上傳時間: 2015-05-02
上傳用戶:hewenzhi
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/
標簽: open-source encryption Features software
上傳時間: 2013-12-20
上傳用戶:123啊
A fingerprint recognizing system is built with two principal components: the fingerprint administrator and the fingerprint recognizer. Fingerprints are identified by their special features such as ridge endings, ridge bifurcation, short ridges, and ridge enclosures, which are collectively called the minutiae.
標簽: fingerprint recognizing administra components
上傳時間: 2013-12-10
上傳用戶:czl10052678
The emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Significance is placed on HDL coding styles, synthesis and optimization, dynamic simulation, formal verification, DFT scan insertion, links to layout, physical synthesis, and static timing analysis. At each step, problems related to each phase of the design flow are identified, with solutions and work-around described in detail. In addition, crucial issues related to layout, which includes clock tree synthesis and back-end integration (links to layout) are also discussed at length. Furthermore, the book contains in-depth discussions on the basics of Synopsys technology libraries and HDL coding styles, targeted towards optimal synthesis solution.
標簽: application real-time Synopsys emphasis
上傳時間: 2017-07-05
上傳用戶:waitingfy
Homogeneous Partitioning of the Surveillance Volume discusses the implementation of the first of three sequentially complementary approaches for increasing the probability of target detection within at least some of the cells of the surveillance volume for a spatially nonGaussian or Gaussian “noise” environment that is temporally Gaussian. This approach, identified in the Preface as Approach A, partitions the surveillance volume into homogeneous contiguous subdivisions.
標簽: Receivers Adaptive Antennas and
上傳時間: 2020-05-26
上傳用戶:shancjb
In cellular networks, it is estimated that 2 3 of calls and over 90% of data services occur indoors. However, some surveys show that many households and businesses experience a poor indoor coverage problem. It has been identified that poor coverage is the main reason for churn, which is very costly for operators in saturated markets. How to provide good indoor coverage cost effectively is thus a demanding challenge for operators.
標簽: Technologies Femtocells Deployment and
上傳時間: 2020-05-27
上傳用戶:shancjb