亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

identified

  • 電力電子環流SIMULINK模型 Notice that the Thyristor blocks have an output identified by the letter m. This ou

    電力電子環流SIMULINK模型 Notice that the Thyristor blocks have an output identified by the letter m. This output returns a Simulink vectorized signal containing the thyristor current (Iak) and voltage (Vak).

    標簽: m. identified Thyristor the

    上傳時間: 2013-12-13

    上傳用戶:水中浮云

  • 基于單片機的數字化B超鍵盤設計

    針對目前使用的RS232接口數字化B超鍵盤存在PC主機啟動時不能設置BIOS,提出一種PS2鍵盤的設計方法。基于W78E052D單片機,采用8通道串行A/D轉換器設計了8個TGC電位器信息采集電路,電位器位置信息以鍵盤掃描碼序列形式發送,正交編碼器信號通過XC9536XL轉換為單片機可接收的中斷信號,軟件接收到中斷信息后等效處理成按鍵。結果表明,在滿足開機可設置BIOS同時,又可實現超聲特有功能,不需要專門設計驅動程序,接口簡單,成本低。 Abstract:  Aiming at the problem of the digital ultrasonic diagnostic imaging system keyboard with RS232 interface currently used couldn?蒺t set the BIOS when the PC boot, this paper proposed a design method of PS2 keyboards. Based on W78E052D microcontroller,designed eight TGC potentiometers information acquisition circuit with 8-channel serial A/D converter, potentiometer position information sent out with keyboard scan code sequentially.The control circuit based on XC9536 CPLD is used for converting the mechanical actions of the encoders into the signals that can be identified by the MCU, software received interrupt information and equivalently treatmented as key. The results show that the BIOS can be set to meet the boot, ultrasound specific functionality can be achieved at the same time, it does not require specially designed driver,the interface is simple and low cost.    

    標簽: 單片機 B超 數字化 鍵盤設計

    上傳時間: 2013-10-10

    上傳用戶:asdfasdfd

  • 基于51單片機的無線識別裝置系統

    介紹一種簡單射頻識別系統設計。該設計包括閱讀器、應答器和線圈3部分。由單片機控制閱讀器向應答器發射無線信號,并接收應答器回送的信號,再通過分析回送信號識別物品。閱讀器和應答器之間以半雙工通信方式通信。 Abstract:  A simple design of radio frequency identification system is given in this paper.The design includes reader,responder and winding.Through MCU,signals are sent to responder from reader,then corresponding signals are sent back. According to the analysis of the signals sent back,the objects can be identified.Half-duplex communication is adopted? between? reader? and? responder.

    標簽: 51單片機 無線識別 裝置

    上傳時間: 2013-10-11

    上傳用戶:plsee

  • 克服了正交頻分復用(OFDM)和IEEE 1901.2智能電網通信的挑戰

    Abstract: While many questions still surround the creation and deployment of the smart grid, the need for a reliablecommunications infrastructure is indisputable. Developers of the IEEE 1901.2 standard identified difficult channel conditionscharacteristic of low-frequency powerline communications and implemented an orthogonal frequency division multiplexing (OFDM)architecture using advanced modulation and channel-coding techniques. This strategy helped to ensure a robust communicationsnetwork for the smart grid.

    標簽: 1901.2 OFDM IEEE 正交頻分復用

    上傳時間: 2013-10-18

    上傳用戶:myworkpost

  • LVQ學習矢量化算法源程序 This directory contains code implementing the Learning vector quantization network.

    LVQ學習矢量化算法源程序 This directory contains code implementing the Learning vector quantization network. Source code may be found in LVQ.CPP. Sample training data is found in LVQ1.PAT. Sample test data is found in LVQTEST1.TST and LVQTEST2.TST. The LVQ program accepts input consisting of vectors and calculates the LVQ network weights. If a test set is specified, the winning neuron (class) for each neuron is identified and the Euclidean distance between the pattern and each neuron is reported. Output is directed to the screen.

    標簽: implementing quantization directory Learning

    上傳時間: 2015-05-02

    上傳用戶:hewenzhi

  • Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

    Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/

    標簽: open-source encryption Features software

    上傳時間: 2013-12-20

    上傳用戶:123啊

  • A fingerprint recognizing system is built with two principal components: the fingerprint administra

    A fingerprint recognizing system is built with two principal components: the fingerprint administrator and the fingerprint recognizer. Fingerprints are identified by their special features such as ridge endings, ridge bifurcation, short ridges, and ridge enclosures, which are collectively called the minutiae.

    標簽: fingerprint recognizing administra components

    上傳時間: 2013-12-10

    上傳用戶:czl10052678

  • The emphasis of this book is on real-time application of Synopsys tools, used to combat various pro

    The emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Significance is placed on HDL coding styles, synthesis and optimization, dynamic simulation, formal verification, DFT scan insertion, links to layout, physical synthesis, and static timing analysis. At each step, problems related to each phase of the design flow are identified, with solutions and work-around described in detail. In addition, crucial issues related to layout, which includes clock tree synthesis and back-end integration (links to layout) are also discussed at length. Furthermore, the book contains in-depth discussions on the basics of Synopsys technology libraries and HDL coding styles, targeted towards optimal synthesis solution.

    標簽: application real-time Synopsys emphasis

    上傳時間: 2017-07-05

    上傳用戶:waitingfy

  • Adaptive Antennas and Receivers

    Homogeneous Partitioning of the Surveillance Volume discusses the implementation of the first of three sequentially complementary approaches for increasing the probability of target detection within at least some of the cells of the surveillance volume for a spatially nonGaussian or Gaussian “noise” environment that is temporally Gaussian. This approach, identified in the Preface as Approach A, partitions the surveillance volume into homogeneous contiguous subdivisions.

    標簽: Receivers Adaptive Antennas and

    上傳時間: 2020-05-26

    上傳用戶:shancjb

  • Femtocells+Technologies+and+Deployment

    In cellular networks, it is estimated that 2 3 of calls and over 90% of data services occur indoors. However, some surveys show that many households and businesses experience a poor indoor coverage problem. It has been identified that poor coverage is the main reason for churn, which is very costly for operators in saturated markets. How to provide good indoor coverage cost effectively is thus a demanding challenge for operators.

    標簽: Technologies Femtocells Deployment and

    上傳時間: 2020-05-27

    上傳用戶:shancjb

主站蜘蛛池模板: 阿合奇县| 慈利县| 南澳县| 蛟河市| 宁乡县| 柏乡县| 普定县| 乡城县| 即墨市| 县级市| 五台县| 泰兴市| 富顺县| 开江县| 台中市| 长宁区| 托克托县| 碌曲县| 炎陵县| 新晃| 龙江县| 铜鼓县| 乌鲁木齐县| 江达县| 石河子市| 济南市| 西宁市| 昌都县| 杭锦旗| 洛南县| 师宗县| 巴东县| 永福县| 沐川县| 陆川县| 察雅县| 宣武区| 合阳县| 普陀区| 腾冲县| 延川县|