The continuous progress in modern power device technology is increasingly supported by power-specific modeling methodologies and dedicated simulation tools. These enable the detailed analysis of operational principles on the the device and on the system level; in particular, they allow the designer to perform trade- off studies by investigating the operation of competing design variants in a very early stage of the development process. Furthermore, using predictive computer simulation makes it possible to analyze the device and system behavior not only under regularoperatingconditions, but also at the rim of the safe-operatingarea and beyond of it, where destructive processes occur that limit the lifetime of a power system.
标签: POWERHVMOS_Devices_Compact_Modeli ng
上传时间: 2020-06-07
上传用户:shancjb
The field of cyber security, or information security, or information assurance, depending on your preference, is an interdisciplinary one. It is part computer science, part statistics, part psychology, part law, and a part of many other fields. Moreover, any cyber security practi- tioner needs to know what he or she is protecting and where to pri- oritize. Just as someone should not spend $100 to protect something worth $10, one cannot be blind to the other disciplines.
上传时间: 2020-06-07
上传用户:shancjb
Thepredecessorvolumeofthisbookwaspublishedin1996.Intheyears since then, some things have changed and some have not. Two of the things that have not changed are the desire for better models and faster simulations. I performed the original simulations on my “hyperfast” 133-MHz computer! At the time, I thought if I could just getafastercomputer,allofourSPICEproblemswouldbehistory,right? TodayIamsimulatingonacomputerthathasa2.6-GHzprocessorwith 512 MB of RAM, and I would still say that simulations run too slow. The computer technology has evolved, but so have the models. In 1996 wewereperformingsimulationson100-kHzpowerconverters,whereas today I routinely see 1- and 2-MHz power converters.
标签: Switch-Mode Simulation Supply Power
上传时间: 2020-06-07
上传用户:shancjb
RFID Applied is just that. It’s about the application of RFID. If you want a book about electrical and computer engineering you need another source. Let’s say that you have been asked to lead an effort at your company to use RFID in your supply chain. You have heard about RFID because so much has been written on the topic since Wal-Mart and the US DoD made their proclamations that shippers attach RFID tags to their deliveries. This book is for you!
标签: RFID_Applied
上传时间: 2020-06-08
上传用户:shancjb
Internet of Things (IoT) [26] is a new networking paradigm for cyber-physical systems that allow physical objects to collect and exchange data. In the IoT, physical objects and cyber-agents can be sensed and controlled remotely across existing network infrastructure, which enables the integration between the physical world and computer-based systems and therefore extends the Internet into the real world. IoT can find numerous applications in smart housing, environmental monitoring, medical and health care systems, agriculture, transportation, etc. Because of its significant application potential, IoT has attracted a lot of attention from both academic research and industrial development.
标签: Technologies Internet Things RFID for of
上传时间: 2020-06-08
上传用户:shancjb
Since its release, Arduino has become more than just a development platform; it has become a culture built around the idea of open source and open hardware, and one that is reimagining computer science and education. Arduino has opened hardware development by making the starting skills easy to obtain, but retaining the complexities of real-world application. This combination makes Arduino a perfect environment for school students, seasoned developers, and designers. This is the first Arduino book to hold the title of “Pro,” and demonstrates skills and concepts that are used by developers in a more advanced setting. Going beyond projects, this book provides examples that demonstrate concepts that can be easily integrated into many different projects and provide inspiration for future ones. The focus of this book is as a transition from the intermediate to the professional.
上传时间: 2020-06-09
上传用户:shancjb
The countless technological advances of the twentieth century require that futureengineering educationemphasizebridging thegapbetweentheoryand the real world.Thisedition hasbeenprepared withparticular attentiontothe needs of undergraduates, especially those who seek a solid foundation in control theory aswellas an ability tobridgethe gapbetween control theory and itsreal- world applications.To help the reader achieve this goal, computer-aided design accuracy checks (CADAC) are used throughout the text to encourage good habits of computerliteracy.Each CADAC uses fundamentalconcepts to ensure the viability of a computer solution.
标签: Analysis Control Linear Design System Fifth and
上传时间: 2020-06-10
上传用户:shancjb
The main aim of this book is to present a unified, systematic description of basic and advanced problems, methods and algorithms of the modern con- trol theory considered as a foundation for the design of computer control and management systems. The scope of the book differs considerably from the topics of classical traditional control theory mainly oriented to the needs of automatic control of technical devices and technological proc- esses. Taking into account a variety of new applications, the book presents a compact and uniform description containing traditional analysis and op- timization problems for control systems as well as control problems with non-probabilistic models of uncertainty, problems of learning, intelligent, knowledge-based and operation systems – important for applications in the control of manufacturing processes, in the project management and in the control of computer systems.
上传时间: 2020-06-10
上传用户:shancjb
This book will discuss the topic of Control Systems, which is an interdisciplinary engineering topic. Methods considered here will consist of both "Classical" control methods, and "Modern" control methods. Also, discretely sampled systems (digital/computer systems) will be considered in parallel with the more common analog methods. This book will not focus on any single engineering discipline (electrical, mechanical, chemical, etc.), although readers should have a solid foundation in the fundamentals of at least one discipline.
上传时间: 2020-06-10
上传用户:shancjb
Pattern recognition has its origins in engineering, whereas machine learning grew out of computer science. However, these activities can be viewed as two facets of the same field, and together they have undergone substantial development over the past ten years. In particular, Bayesian methods have grown from a specialist niche to become mainstream, while graphical models have emerged as a general framework for describing and applying probabilistic models. Also, the practical applicability of Bayesian methods has been greatly enhanced through the development of a range of approximate inference algorithms such as variational Bayes and expectation propa- gation. Similarly, new models based on kernels have had significant impact on both algorithms and applications.
标签: Bishop-Pattern-Recognition-and-Ma chine-Learning
上传时间: 2020-06-10
上传用户:shancjb