針對飛行模擬器座艙數據采集的復雜性,設計了一種基于以太網分布式的數據采集控制系統,該系統是RCM5700微處理器模塊上的以太網應用。在系統的基礎上具體討論了PoE技術的應用,在傳輸數據的網線上同時提供電流,提出并實現了一種包括輔助電源在內的完整可靠的PoE供電方案。設計采用美國國家半導體的LM5073和LM5576并根據不同的負載情況,進行穩定可靠的電壓轉換,以滿足數據采集電路的要求。實驗結果表明:該設計穩定可靠,滿足低于13 W的采集節點供電要求,提高了模擬器信號采集系統的通用性和標準化程度,避免了以往數據采集節點單獨繁瑣的電源設計。 Abstract: Aiming at the complexity of large avion simulation and controlling,the simulator cabin distribute data collecting and control system was designed. This system is the application of RCM5700 on Ethernet. Based on this system,PoE technique that makes Ethernet can also provide power were expounded with emphasis and included FAUX design the PoE resolution was realized. To achieve the requirement of this system,LM5073 and LM5576 were used to DC-DC switch. From the data of experiment,the design filled the requirement of power-need of node whose power was lower than 13W. The application of the technique can advance the degree of simulation data collections currency and standardization and avoid designing additional power system.
上傳時間: 2013-11-09
上傳用戶:xyipie
MP3 portable players are the trend in music-listening technology. These players do not includeany mechanical movements, thereby making them ideal for listening to music during any type ofactivity. MP3 is a digital compression technique based on MPEG Layer 3 which stores music ina lot less space than current CD technology. Software is readily available to create MP3 filesfrom an existing CD, and the user can then download these files into a portable MP3 player tobe enjoyed in almost any environment.
上傳時間: 2013-11-23
上傳用戶:nanxia
This simple SDI Notepad-like application demonstrates how, taking advantage of the MFC support for Unicode, to Turkmenize labels of the specified menu items. Actually, Turkmen is not supported by Windows 2000, therefore, to create such resources as menu so that strings in Turkmen could be displayed I had to invent an additional technique 這是一個與記事本類似的簡單的SDI應用程序,演示了怎樣使用MFC來支持 Unicode,對指定的菜單條目進行Turkmenize標簽化。實際上,Windwos 2000并不支持Turknen,因此,創建了那些菜單資源以便那些字符串可以在Turknen中顯示,為此我必須開發其它的技術。 來源: http://www.codeguru.com/advancedui/SDI_Note.html
標簽: Notepad-like demonstrates application advantage
上傳時間: 2013-11-26
上傳用戶:txfyddz
Displaying a large bitmap file on a dialog box, in its original size, is quite difficult in the VC++ environment. However, it is possible to display a large bitmap to a predefined area of the dialog by using the StretchBlt( ) function.The major disadvantage of this is that the clarity of the image will be lost. Check out this article for displaying large bitmaps into the desired area of your dialog box in its original size with a scrolling technique used to show the entire bitmap. 滾動顯示位圖 在VC++環境下,在一個對話框中顯示一個原始尺寸的大小的位圖文件相當是困難的。然而,通過使用 StretchBlt()函數一個給定的區域顯示一個大的位圖是可能的。主要的缺點是圖像將會失真??戳诉@篇通過卷動技術顯示整個位圖技術的文章,你將能夠以它的原始尺寸在給定對話框的區域內顯示一個大位圖。 來源: http://www.codeguru.com/bitmap/ScrollBitmap.html
標簽: Displaying difficult original bitmap
上傳時間: 2014-01-05
上傳用戶:yiwen213
關于FPGA流水線設計的論文 This work investigates the use of very deep pipelines for implementing circuits in FPGAs, where each pipeline stage is limited to a single FPGA logic element (LE). The architecture and VHDL design of a parameterized integer array multiplier is presented and also an IEEE 754 compliant 32-bit floating-point multiplier. We show how to write VHDL cells that implement such approach, and how the array multiplier architecture was adapted. Synthesis and simulation were performed for Altera Apex20KE devices, although the VHDL code should be portable to other devices. For this family, a 16 bit integer multiplier achieves a frequency of 266MHz, while the floating point unit reaches 235MHz, performing 235 MFLOPS in an FPGA. Additional cells are inserted to synchronize data, what imposes significant area penalties. This and other considerations to apply the technique in real designs are also addressed.
標簽: investigates implementing pipelines circuits
上傳時間: 2015-07-26
上傳用戶:CHINA526
The goal of this project is to explore the idea of point-based radiosity, which is a shooting radiosity technique suggested by Mark Harris at UNC. The primary idea is that features available in graphics hardware can be utilized to perform radiosity calculations. Facilities such as flat shading, diffuse lighting, projective textures, and mipmapping can be used to replace traditional numerical solutions for radiosity.
標簽: point-based radiosity shooting explore
上傳時間: 2015-08-24
上傳用戶:change0329
This paper deals with the problem of speech enhancement when a corrupted speech signal with an additive colored noise is the only information available for processing. Kalman filtering is known as an effective speech enhancement technique, in which speech signal is usually modeled as autoregressive (AR) process and represented in the state-space domain.
標簽: speech with enhancement corrupted
上傳時間: 2015-09-07
上傳用戶:zhangyi99104144
This paper deals with the problem of speech enhancement when only a corrupted speech signal is available for processing. Kalman filtering is known as an effective speech enhancement technique, in which speech signal is usually modeled as autoregressive (AR) model and represented in the state-space domain.
標簽: speech enhancement corrupted problem
上傳時間: 2013-12-20
上傳用戶:569342831
3D reconstruction, medical image processing from colons, using intel image processing for based class. This source code. Some code missing but I think you can understand it. Development version. This source code is very interesting for learning segmentation and registration from dataset. This code also has some technique about GPU image processing for ray tracing. Also learn many filter apply for transform from spatial domain to frequency domain.
標簽: processing image reconstruction medical
上傳時間: 2013-12-19
上傳用戶:q123321
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
標簽: Sometimes the contents desire
上傳時間: 2013-12-25
上傳用戶:playboys0