Automobiles, aircraft, marine vehicles, uninterruptiblepower supplies and telecom hardware represent areasutilizing series connected battery stacks. These stacksof individual cells may contain many units, reaching potentialsof hundreds of volts. In such systems it is oftendesirable to accurately determine each individual cell’svoltage. Obtaining this information in the presence of thehigh “common mode” voltage generated by the batterystack is more diffi cult than might be supposed.
上傳時間: 2013-10-24
上傳用戶:kang1923
國外游戲開發者雜志2003年第二期配套代碼,包含了Jon Blow的交互工具的版本更新,使用了一個Kohonen Self-Organizing Feature Map來區分系統的行為
上傳時間: 2014-01-19
上傳用戶:拔絲土豆
This firmware translates a PS/2 mouse to a USB mouse. The translator firmware is entirely interrupt driven (with the exception of sending the data via USB to the host.) An interrupt is generated when the PS/2 start bit is received, at which time the firmware will begin its receive routine. In addition to this interrupt, every 168ms a timer overflow interrupts the main program and implements one state of the mouse state machine. This state machine handles sending bytes to and translating bytes received from the PS/2 mouse automatically. All of this is done in the background while the main program runs in the foreground. The only operation that the main program implements is sending mouse data to the PC via USB.
標簽: firmware mouse translates translator
上傳時間: 2015-04-26
上傳用戶:cuiyashuo
Abbrevia is a compression toolkit for Borland Delphi, C++Builder, & Kylix. It supports PKZIP 4, Microsoft CAB, TAR, & gzip formats & the creation of self-extracting archives. It includes visual components that simplify the manipulation of ZIP files.
標簽: compression Abbrevia supports Borland
上傳時間: 2014-01-13
上傳用戶:來茴
This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end of program execution it will display in the debug window if there were any memory leaks and how the memory looks so you can identify where your memory leak occurred. It will display in the debug window a message saying no memory leaks detected if there are no memory leaks. Similar to what crtdbg.h does in VC++. The code detects memory leaks generated with calls to new and delete operators in C++. The code doesn t detect memory leaks generated with C functions: malloc, calloc, free, but that can be done in the future. Let me know and I will program it.
標簽: the embedded detects almost
上傳時間: 2015-05-07
上傳用戶:comua
This m-file displays the time waveform for the Gaussian pulse function and the first and second derivatives of the Gaussian pulse function for a 0.5 nanosecond pulse width. Other values of pulse widths may be used by changing fs,t,t1. The program uses the actual first and second derivative equations for the Gaussian pulse waveforms. The first derivative is considered to be the monocycle or monopulse as discussed in most papers. The second derivative is the waveform generated from a dipole antenna used in a UWB system. Other information is contained in the file.
上傳時間: 2015-05-08
上傳用戶:leixinzhuo
The EM algorithm is short for Expectation-Maximization algorithm. It is based on an iterative optimization of the centers and widths of the kernels. The aim is to optimize the likelihood that the given data points are generated by a mixture of Gaussians. The numbers next to the Gaussians give the relative importance (amplitude) of each component.
標簽: algorithm Expectation-Maximization iterative optimi
上傳時間: 2015-06-17
上傳用戶:獨孤求源
摘 : 通過使用 peer-to-peer(P2P)計算模式在 Internet 物理拓撲基礎上建立一個稱為 P2P 覆蓋網絡(P overlay network)的虛擬拓撲結構,有效地建立起一個基于 Internet 的完全分布式自組織網絡路由模型 集中式自組織網絡路由模型(hierarchical aggregation self-organizing network,簡稱 HASN).分別描述了 HASN 由模型的構建目標和體系結構,并詳細分析了 HASN 采用的基于 P2P 計算模式的分布式命名 路由發現和更 算法 HASN_Scale,并在仿真實驗的基礎上,對 HASN 路由模型的性能進行了驗證.
標簽: peer-to-peer P2P Internet overlay
上傳時間: 2014-01-21
上傳用戶:zhenyushaw
CMCRC.ASM is a simple program just to demonstrate how to compute the CRC-16 and CRC-32 using the crc16_table and crc32_table that were generated by CRCTABLE.
標簽: demonstrate CRC the compute
上傳時間: 2014-01-24
上傳用戶:agent
% This program calculates radar ranges in a jamming environment. It works % with both Stand-off jamming and self-screening jamming for steady and Swerling type % targets with frequency agility, coherent integration and standard atmosphere/rain % attenuation
標簽: environment calculates Stand-off program
上傳時間: 2013-12-24
上傳用戶:sammi