亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

identified

  • 電力電子環流SIMULINK模型 Notice that the Thyristor blocks have an output identified by the letter m. This ou

    電力電子環流SIMULINK模型 Notice that the Thyristor blocks have an output identified by the letter m. This output returns a Simulink vectorized signal containing the thyristor current (Iak) and voltage (Vak).

    標簽: m. identified Thyristor the

    上傳時間: 2013-12-13

    上傳用戶:水中浮云

  • 基于單片機的數字化B超鍵盤設計

    針對目前使用的RS232接口數字化B超鍵盤存在PC主機啟動時不能設置BIOS,提出一種PS2鍵盤的設計方法?;赪78E052D單片機,采用8通道串行A/D轉換器設計了8個TGC電位器信息采集電路,電位器位置信息以鍵盤掃描碼序列形式發送,正交編碼器信號通過XC9536XL轉換為單片機可接收的中斷信號,軟件接收到中斷信息后等效處理成按鍵。結果表明,在滿足開機可設置BIOS同時,又可實現超聲特有功能,不需要專門設計驅動程序,接口簡單,成本低。 Abstract:  Aiming at the problem of the digital ultrasonic diagnostic imaging system keyboard with RS232 interface currently used couldn?蒺t set the BIOS when the PC boot, this paper proposed a design method of PS2 keyboards. Based on W78E052D microcontroller,designed eight TGC potentiometers information acquisition circuit with 8-channel serial A/D converter, potentiometer position information sent out with keyboard scan code sequentially.The control circuit based on XC9536 CPLD is used for converting the mechanical actions of the encoders into the signals that can be identified by the MCU, software received interrupt information and equivalently treatmented as key. The results show that the BIOS can be set to meet the boot, ultrasound specific functionality can be achieved at the same time, it does not require specially designed driver,the interface is simple and low cost.    

    標簽: 單片機 B超 數字化 鍵盤設計

    上傳時間: 2013-10-10

    上傳用戶:asdfasdfd

  • 基于51單片機的無線識別裝置系統

    介紹一種簡單射頻識別系統設計。該設計包括閱讀器、應答器和線圈3部分。由單片機控制閱讀器向應答器發射無線信號,并接收應答器回送的信號,再通過分析回送信號識別物品。閱讀器和應答器之間以半雙工通信方式通信。 Abstract:  A simple design of radio frequency identification system is given in this paper.The design includes reader,responder and winding.Through MCU,signals are sent to responder from reader,then corresponding signals are sent back. According to the analysis of the signals sent back,the objects can be identified.Half-duplex communication is adopted? between? reader? and? responder.

    標簽: 51單片機 無線識別 裝置

    上傳時間: 2013-10-11

    上傳用戶:plsee

  • 克服了正交頻分復用(OFDM)和IEEE 1901.2智能電網通信的挑戰

    Abstract: While many questions still surround the creation and deployment of the smart grid, the need for a reliablecommunications infrastructure is indisputable. Developers of the IEEE 1901.2 standard identified difficult channel conditionscharacteristic of low-frequency powerline communications and implemented an orthogonal frequency division multiplexing (OFDM)architecture using advanced modulation and channel-coding techniques. This strategy helped to ensure a robust communicationsnetwork for the smart grid.

    標簽: 1901.2 OFDM IEEE 正交頻分復用

    上傳時間: 2013-10-18

    上傳用戶:myworkpost

  • LVQ學習矢量化算法源程序 This directory contains code implementing the Learning vector quantization network.

    LVQ學習矢量化算法源程序 This directory contains code implementing the Learning vector quantization network. Source code may be found in LVQ.CPP. Sample training data is found in LVQ1.PAT. Sample test data is found in LVQTEST1.TST and LVQTEST2.TST. The LVQ program accepts input consisting of vectors and calculates the LVQ network weights. If a test set is specified, the winning neuron (class) for each neuron is identified and the Euclidean distance between the pattern and each neuron is reported. Output is directed to the screen.

    標簽: implementing quantization directory Learning

    上傳時間: 2015-05-02

    上傳用戶:hewenzhi

  • Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

    Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/

    標簽: open-source encryption Features software

    上傳時間: 2013-12-20

    上傳用戶:123啊

  • A fingerprint recognizing system is built with two principal components: the fingerprint administra

    A fingerprint recognizing system is built with two principal components: the fingerprint administrator and the fingerprint recognizer. Fingerprints are identified by their special features such as ridge endings, ridge bifurcation, short ridges, and ridge enclosures, which are collectively called the minutiae.

    標簽: fingerprint recognizing administra components

    上傳時間: 2013-12-10

    上傳用戶:czl10052678

  • The emphasis of this book is on real-time application of Synopsys tools, used to combat various pro

    The emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Significance is placed on HDL coding styles, synthesis and optimization, dynamic simulation, formal verification, DFT scan insertion, links to layout, physical synthesis, and static timing analysis. At each step, problems related to each phase of the design flow are identified, with solutions and work-around described in detail. In addition, crucial issues related to layout, which includes clock tree synthesis and back-end integration (links to layout) are also discussed at length. Furthermore, the book contains in-depth discussions on the basics of Synopsys technology libraries and HDL coding styles, targeted towards optimal synthesis solution.

    標簽: application real-time Synopsys emphasis

    上傳時間: 2017-07-05

    上傳用戶:waitingfy

  • Adaptive Antennas and Receivers

    Homogeneous Partitioning of the Surveillance Volume discusses the implementation of the first of three sequentially complementary approaches for increasing the probability of target detection within at least some of the cells of the surveillance volume for a spatially nonGaussian or Gaussian “noise” environment that is temporally Gaussian. This approach, identified in the Preface as Approach A, partitions the surveillance volume into homogeneous contiguous subdivisions.

    標簽: Receivers Adaptive Antennas and

    上傳時間: 2020-05-26

    上傳用戶:shancjb

  • Femtocells+Technologies+and+Deployment

    In cellular networks, it is estimated that 2 3 of calls and over 90% of data services occur indoors. However, some surveys show that many households and businesses experience a poor indoor coverage problem. It has been identified that poor coverage is the main reason for churn, which is very costly for operators in saturated markets. How to provide good indoor coverage cost effectively is thus a demanding challenge for operators.

    標簽: Technologies Femtocells Deployment and

    上傳時間: 2020-05-27

    上傳用戶:shancjb

主站蜘蛛池模板: 抚顺县| 梁平县| 淄博市| 平安县| 阿克| 尖扎县| 通化市| 于都县| 玛纳斯县| 临邑县| 申扎县| 舒城县| 无为县| 府谷县| 墨脱县| 城固县| 盱眙县| 岢岚县| 蓬溪县| 崇仁县| 铅山县| 合川市| 万全县| 海伦市| 赤水市| 永福县| 惠东县| 马关县| 石景山区| 交城县| 霸州市| 西乌| 临江市| 石景山区| 宝清县| 建阳市| 垣曲县| 呼伦贝尔市| 河南省| 旬邑县| 伊金霍洛旗|