虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

identified

  • 电力电子环流SIMULINK模型 Notice that the Thyristor blocks have an output identified by the letter m. This ou

    电力电子环流SIMULINK模型 Notice that the Thyristor blocks have an output identified by the letter m. This output returns a Simulink vectorized signal containing the thyristor current (Iak) and voltage (Vak).

    标签: m. identified Thyristor the

    上传时间: 2013-12-13

    上传用户:水中浮云

  • 基于单片机的数字化B超键盘设计

    针对目前使用的RS232接口数字化B超键盘存在PC主机启动时不能设置BIOS,提出一种PS2键盘的设计方法。基于W78E052D单片机,采用8通道串行A/D转换器设计了8个TGC电位器信息采集电路,电位器位置信息以键盘扫描码序列形式发送,正交编码器信号通过XC9536XL转换为单片机可接收的中断信号,软件接收到中断信息后等效处理成按键。结果表明,在满足开机可设置BIOS同时,又可实现超声特有功能,不需要专门设计驱动程序,接口简单,成本低。 Abstract:  Aiming at the problem of the digital ultrasonic diagnostic imaging system keyboard with RS232 interface currently used couldn?蒺t set the BIOS when the PC boot, this paper proposed a design method of PS2 keyboards. Based on W78E052D microcontroller,designed eight TGC potentiometers information acquisition circuit with 8-channel serial A/D converter, potentiometer position information sent out with keyboard scan code sequentially.The control circuit based on XC9536 CPLD is used for converting the mechanical actions of the encoders into the signals that can be identified by the MCU, software received interrupt information and equivalently treatmented as key. The results show that the BIOS can be set to meet the boot, ultrasound specific functionality can be achieved at the same time, it does not require specially designed driver,the interface is simple and low cost.    

    标签: 单片机 B超 数字化 键盘设计

    上传时间: 2013-10-10

    上传用户:asdfasdfd

  • 基于51单片机的无线识别装置系统

    介绍一种简单射频识别系统设计。该设计包括阅读器、应答器和线圈3部分。由单片机控制阅读器向应答器发射无线信号,并接收应答器回送的信号,再通过分析回送信号识别物品。阅读器和应答器之间以半双工通信方式通信。 Abstract:  A simple design of radio frequency identification system is given in this paper.The design includes reader,responder and winding.Through MCU,signals are sent to responder from reader,then corresponding signals are sent back. According to the analysis of the signals sent back,the objects can be identified.Half-duplex communication is adopted? between? reader? and? responder.

    标签: 51单片机 无线识别 装置

    上传时间: 2013-10-11

    上传用户:plsee

  • 克服了正交频分复用(OFDM)和IEEE 1901.2智能电网通信的挑战

    Abstract: While many questions still surround the creation and deployment of the smart grid, the need for a reliablecommunications infrastructure is indisputable. Developers of the IEEE 1901.2 standard identified difficult channel conditionscharacteristic of low-frequency powerline communications and implemented an orthogonal frequency division multiplexing (OFDM)architecture using advanced modulation and channel-coding techniques. This strategy helped to ensure a robust communicationsnetwork for the smart grid.

    标签: 1901.2 OFDM IEEE 正交频分复用

    上传时间: 2013-10-18

    上传用户:myworkpost

  • LVQ学习矢量化算法源程序 This directory contains code implementing the Learning vector quantization network.

    LVQ学习矢量化算法源程序 This directory contains code implementing the Learning vector quantization network. Source code may be found in LVQ.CPP. Sample training data is found in LVQ1.PAT. Sample test data is found in LVQTEST1.TST and LVQTEST2.TST. The LVQ program accepts input consisting of vectors and calculates the LVQ network weights. If a test set is specified, the winning neuron (class) for each neuron is identified and the Euclidean distance between the pattern and each neuron is reported. Output is directed to the screen.

    标签: implementing quantization directory Learning

    上传时间: 2015-05-02

    上传用户:hewenzhi

  • Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features:

    Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/

    标签: open-source encryption Features software

    上传时间: 2013-12-20

    上传用户:123啊

  • A fingerprint recognizing system is built with two principal components: the fingerprint administra

    A fingerprint recognizing system is built with two principal components: the fingerprint administrator and the fingerprint recognizer. Fingerprints are identified by their special features such as ridge endings, ridge bifurcation, short ridges, and ridge enclosures, which are collectively called the minutiae.

    标签: fingerprint recognizing administra components

    上传时间: 2013-12-10

    上传用户:czl10052678

  • The emphasis of this book is on real-time application of Synopsys tools, used to combat various pro

    The emphasis of this book is on real-time application of Synopsys tools, used to combat various problems seen at VDSM geometries. Readers will be exposed to an effective design methodology for handling complex, submicron ASIC designs. Significance is placed on HDL coding styles, synthesis and optimization, dynamic simulation, formal verification, DFT scan insertion, links to layout, physical synthesis, and static timing analysis. At each step, problems related to each phase of the design flow are identified, with solutions and work-around described in detail. In addition, crucial issues related to layout, which includes clock tree synthesis and back-end integration (links to layout) are also discussed at length. Furthermore, the book contains in-depth discussions on the basics of Synopsys technology libraries and HDL coding styles, targeted towards optimal synthesis solution.

    标签: application real-time Synopsys emphasis

    上传时间: 2017-07-05

    上传用户:waitingfy

  • Adaptive Antennas and Receivers

    Homogeneous Partitioning of the Surveillance Volume discusses the implementation of the first of three sequentially complementary approaches for increasing the probability of target detection within at least some of the cells of the surveillance volume for a spatially nonGaussian or Gaussian “noise” environment that is temporally Gaussian. This approach, identified in the Preface as Approach A, partitions the surveillance volume into homogeneous contiguous subdivisions.

    标签: Receivers Adaptive Antennas and

    上传时间: 2020-05-26

    上传用户:shancjb

  • Femtocells+Technologies+and+Deployment

    In cellular networks, it is estimated that 2 3 of calls and over 90% of data services occur indoors. However, some surveys show that many households and businesses experience a poor indoor coverage problem. It has been identified that poor coverage is the main reason for churn, which is very costly for operators in saturated markets. How to provide good indoor coverage cost effectively is thus a demanding challenge for operators.

    标签: Technologies Femtocells Deployment and

    上传时间: 2020-05-27

    上传用户:shancjb