The MEASURE program uses the analog inputs of the P89LPC935 to implement a datalogger. This example shows how you can use signal functions in uVision to simulate a signal coming into one of the analog inputs of the P89LPC935 controller.
标签: datalogger implement the MEASURE
上传时间: 2016-12-03
上传用户:songrui
The VGA example generates a 320x240 diffusion-limited-aggregation (DLA) on Altera DE2 board. A DLA is a clump formed by sticky particles adhering to an existing structure. In this design, we start with one pixel at the center of the screen and allow a random walker to bounce around the screen until it hits the pixel at the center. It then sticks and a new walker is started randomly at one of the 4 corners of the screen. The random number generators for x and y steps are XOR feedback shift registers (see also Hamblen, Appendix A). The VGA driver, PLL, and reset controller from the DE2 CDROM are necessary to compile this example. Note that you must push KEY0 to start the state machine.
标签: diffusion-limited-aggregation DLA generates 320x240
上传时间: 2014-01-16
上传用户:225588
I often need a simple function generator. Just to generate a certain frequency. After all the years I ve worked with electronics, I still haven t got me one. Even though I need it now and then, I just couldn t seem to justify the cost of one. So, standard solution - build one yourself. I designed a simple sinewave generator based on a Analog Devices AD9832 chip. It will generate a sinewave from 0.005 to 12 MHz in 0.005 Hz steps. That s pretty good, and definitely good enough for me ! But while waiting for the AD9832 chip to arrive, I came up with a very simple version of the DDS synth, using just the 2313 and a resistor network.
标签: frequency generator function generate
上传时间: 2013-12-17
上传用户:thesk123
Design patterns are elegant, adaptable, and reusable solutions to everyday software development problems. Programmers use design patterns to organize objects in programs, making them easier to write and modify. C# Design Patterns: A Tutorial is a practical guide to writing C# programs using the most common patterns. This tutorial begins with clear and concise introductions to C#, object-oriented programming and inheritance, and UML diagrams. Each chapter that follows describes one of twenty-three design patterns, recommends when to use it, and explains the impact that it will have on the larger design. The use of every pattern is demonstrated with simple example programs. These programs are illustrated with screen shots and UML diagrams displaying how the classes interact. Each of these programs is available on the companion CD-ROM and can be run, examined, edited, and applied.
标签: development adaptable solutions patterns
上传时间: 2014-09-07
上传用户:wangchong
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
标签: cryptography literature has Secrecy
上传时间: 2016-12-08
上传用户:fxf126@126.com
ST uPSD32XX I2C This example demo code is provided as is and has no warranty, implied or otherwise. You are free to use/modify any of the provided code at your own risk in your applications with the expressed limitation of liability (see below) so long as your product using the code contains at least one uPSD products (device)
标签: otherwise provided warranty example
上传时间: 2013-12-07
上传用户:标点符号
MS Access is commonly thought of as the little brother of Database engines, and not a lot of material has been published about methods used for exploiting it during a penetration test. The aim of this paper is to bring a lot of disparate information together into one guide.
标签: Database commonly of brother
上传时间: 2014-01-04
上传用户:dreamboy36
ResOrg 图形化管理Vc项目的资源ID的工具的源代码。 ResOrg - Manage and Renumber Resource Symbol IDs Introduction The Resource ID Organiser (ResOrg for short) is an Add-in for Visual C++ designed to help overcome one of the most annoying (and unnecessary) chores of developing/maintaining Windows applications - maintaining resource symbol ID values.
标签: ResOrg Introduction Renumber Resource
上传时间: 2013-12-25
上传用户:dsgkjgkjg
Quaternions are hypercomplex numbers (that is generalizations of the complex numbers to higher dimensions than two). For an introduction, refer to the Wikipedia article on Quaternions. Quaternion toolbox for Matlab® extends Matlab® to allow calculation with matrices of quaternions in almost the same way that one calculates with matrices of complex numbers. This is achieved by defining a private type to represent quaternion matrices and overloadings of many standard Matlab® functions. The toolbox supports real and complex quaternions (that is quaternions with four real or complex components).
标签: numbers generalizations hypercomplex Quaternions
上传时间: 2014-11-27
上传用户:jhksyghr
软件简介:HI-TECH PICC 是一款高效的C编译器,支持Microchip PICmicro 10/12/14/16/17系列控制器。是一款强劲的标准C编译器,完全遵守ISO/ANSI C,支持所有的数据类型包括24 and 32 bit IEEE 标准浮点类型。智能优化产生高质量的代码。属于第三方开发工具。能和MPLAB整合,内嵌开发环境(HI-TIDE)。 Hi-tech PICC Compiler v8.注册码 Serial: HCPIC-88888 First Name: ONE Last Name: TWO Company Name:ONE TWO Registration: 任意填,但一定要填 Activation: NPCBACMJKLPCADKLOEDBFPIOCIBAEIDI
上传时间: 2016-12-16
上传用户:Andy123456