Automobiles, aircraft, marine vehicles, uninterruptiblepower supplies and telecom hardware represent areasutilizing series connected battery stacks. These stacksof individual cells may contain many units, reaching potentialsof hundreds of volts. In such systems it is oftendesirable to accurately determine each individual cell’svoltage. Obtaining this information in the presence of thehigh “common mode” voltage generated by the batterystack is more diffi cult than might be supposed.
This firmware translates a PS/2 mouse to a USB mouse. The translator
firmware is entirely interrupt driven (with the exception of sending the
data via USB to the host.) An interrupt is generated when the PS/2 start
bit is received, at which time the firmware will begin its receive routine.
In addition to this interrupt, every 168ms a timer overflow interrupts the
main program and implements one state of the mouse state machine. This
state machine handles sending bytes to and translating bytes received from
the PS/2 mouse automatically. All of this is done in the background while
the main program runs in the foreground. The only operation that the main
program implements is sending mouse data to the PC via USB.
Abbrevia is a compression toolkit for Borland Delphi, C++Builder, & Kylix. It supports PKZIP 4, Microsoft CAB, TAR, & gzip formats & the creation of self-extracting archives. It includes visual components that simplify the manipulation of ZIP files.
This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end of program execution it will display in the debug window if there were any memory leaks and how the memory looks so you can identify where your memory leak occurred. It will display in the debug window a message saying no memory leaks detected if there are no memory leaks. Similar to what crtdbg.h does in VC++. The code detects memory leaks generated with calls to new and delete operators in C++. The code doesn t detect memory leaks generated with C functions: malloc, calloc, free, but that can be done in the future. Let me know and I will program it.
This m-file displays the time waveform for the Gaussian pulse function and the first and second derivatives of the Gaussian pulse function for a 0.5 nanosecond pulse width. Other values of pulse widths may be used by changing fs,t,t1. The program uses the actual first and second derivative equations for the Gaussian pulse waveforms. The first derivative is considered to be the monocycle or monopulse as discussed in most papers. The second derivative is the waveform generated from a dipole antenna used in a UWB system. Other information is contained in the file.
The EM algorithm is short for Expectation-Maximization algorithm. It is based on an iterative optimization of the centers and widths of the kernels. The aim is to optimize the likelihood that the given data points are generated by a mixture of Gaussians. The numbers next to the Gaussians give the relative importance (amplitude) of each component.
CMCRC.ASM is a simple program just to demonstrate how to compute the
CRC-16 and CRC-32 using the crc16_table and crc32_table that were
generated by CRCTABLE.
% This program calculates radar ranges in a jamming environment. It works
% with both Stand-off jamming and self-screening jamming for steady and Swerling type
% targets with frequency agility, coherent integration and standard atmosphere/rain
% attenuation