锁相回路可视为一个输出相位和输入相位的回授系统用以同步输入参考讯号和回授后输出信号。并让其操作同样的频率。如(图一)所示,简单锁相回路[3,4]是由三个电路构成,分别为相位侦测器(Phase Detector)、回路滤波器(Loop Filter)、压控荡器(VCO)
上传时间: 2015-08-16
上传用户:franktu
dspic的汇编例程,Write LCD with text using PSV feature and flash LED1 with a Timer1 loop
上传时间: 2013-12-30
上传用户:bruce5996
This paper addresses the issues relating to the enforcement of robust stability when implementing the Adaptive Inverse Control (AIC) scheme. In this scheme, an adaptive FIR filter is added to a closed-loop system in order to reduce the output error caused by external disturbances, enhancing the performance achieved by linear time-invariant controllers alone.
标签: implementing enforcement addresses the
上传时间: 2013-12-23
上传用户:佳期如梦
This lab exercise will cover the use of AccelDSP’s design exploration capabilities that include mapping variables to memory and unrolling loop and vector operations. You will learn how to create different hardware architectures without modifying the MATLAB source to explore different area/performance tradeoffs.
标签: capabilities exploration AccelDSP exercise
上传时间: 2014-12-22
上传用户:eclipse
These files are for testing the ADC (AD9240) and DAC THS8133 (DAC1). The ADC and DAC are tested in loop back.
上传时间: 2014-08-15
上传用户:lnnn30
hese files are for testing the Video ADC (TLV5734) and DAC THS8133 (DAC0). The ADC and DAC are tested in loop back.
上传时间: 2015-09-28
上传用户:youlongjian0
Easily editable files to simulate three MIMO predictive control algorithms. These files are intended as a support to this book to enable students to investigate predictive control algorithms from the formulation of the prediction equations right through to the closed-loop simulation.
标签: files algorithms predictive editable
上传时间: 2015-11-09
上传用户:sevenbestfei
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
标签: Sometimes the contents desire
上传时间: 2013-12-25
上传用户:playboys0
//*** *** *** *** *** *** *** *** *** *** *** *** *** // MSP430x1xx Demo - Software Toggle P1.0 // // Description Toggle P1.0 by xor ing P1.0 inside of a software loop. // ACLK = n/a, MCLK = SMCLK = default DCO // // MSP430x1xx // ----------------- // /|\| XIN|- // | | | // --|RST XOUT|- // | | // | P1.0|-->LED // // A. Dannenberg // Texas Instruments, Inc // January 2006 // Built with IAR Embedded Workbench Version: 3.40A
上传时间: 2015-12-10
上传用户:从此走出阴霾
DATA:BEGIN OF HEADDATA. INCLUDE STRUCTURE BAPIMATHEAD. DATA:END OF HEADDATA. DATA:BEGIN OF PLANTDATA. INCLUDE STRUCTURE BAPI_MARC. DATA:END OF PLANTDATA. DATA:BEGIN OF PLANTDATAX. INCLUDE STRUCTURE BAPI_MARCX. DATA:END OF PLANTDATAX. READ TABLE XMKPF INDEX 1. IF XMKPF-TCODE2 = MIGO_GR . LOOP AT XMSEG.
标签: DATA HEADDATA BEGIN BAPIMATHEAD
上传时间: 2015-12-17
上传用户:古谷仁美