Automobiles, aircraft, marine vehicles, uninterruptiblepower supplies and telecom hardware represent areasutilizing series connected battery stacks. These stacksof individual cells may contain many units, reaching potentialsof hundreds of volts. In such systems it is oftendesirable to accurately determine each individual cell’svoltage. Obtaining this information in the presence of thehigh “common mode” voltage generated by the batterystack is more diffi cult than might be supposed.
上传时间: 2013-10-24
上传用户:kang1923
国外游戏开发者杂志2003年第二期配套代码,包含了Jon Blow的交互工具的版本更新,使用了一个Kohonen Self-Organizing Feature Map来区分系统的行为
上传时间: 2014-01-19
上传用户:拔丝土豆
This firmware translates a PS/2 mouse to a USB mouse. The translator firmware is entirely interrupt driven (with the exception of sending the data via USB to the host.) An interrupt is generated when the PS/2 start bit is received, at which time the firmware will begin its receive routine. In addition to this interrupt, every 168ms a timer overflow interrupts the main program and implements one state of the mouse state machine. This state machine handles sending bytes to and translating bytes received from the PS/2 mouse automatically. All of this is done in the background while the main program runs in the foreground. The only operation that the main program implements is sending mouse data to the PC via USB.
标签: firmware mouse translates translator
上传时间: 2015-04-26
上传用户:cuiyashuo
Abbrevia is a compression toolkit for Borland Delphi, C++Builder, & Kylix. It supports PKZIP 4, Microsoft CAB, TAR, & gzip formats & the creation of self-extracting archives. It includes visual components that simplify the manipulation of ZIP files.
标签: compression Abbrevia supports Borland
上传时间: 2014-01-13
上传用户:来茴
This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end of program execution it will display in the debug window if there were any memory leaks and how the memory looks so you can identify where your memory leak occurred. It will display in the debug window a message saying no memory leaks detected if there are no memory leaks. Similar to what crtdbg.h does in VC++. The code detects memory leaks generated with calls to new and delete operators in C++. The code doesn t detect memory leaks generated with C functions: malloc, calloc, free, but that can be done in the future. Let me know and I will program it.
标签: the embedded detects almost
上传时间: 2015-05-07
上传用户:comua
This m-file displays the time waveform for the Gaussian pulse function and the first and second derivatives of the Gaussian pulse function for a 0.5 nanosecond pulse width. Other values of pulse widths may be used by changing fs,t,t1. The program uses the actual first and second derivative equations for the Gaussian pulse waveforms. The first derivative is considered to be the monocycle or monopulse as discussed in most papers. The second derivative is the waveform generated from a dipole antenna used in a UWB system. Other information is contained in the file.
上传时间: 2015-05-08
上传用户:leixinzhuo
The EM algorithm is short for Expectation-Maximization algorithm. It is based on an iterative optimization of the centers and widths of the kernels. The aim is to optimize the likelihood that the given data points are generated by a mixture of Gaussians. The numbers next to the Gaussians give the relative importance (amplitude) of each component.
标签: algorithm Expectation-Maximization iterative optimi
上传时间: 2015-06-17
上传用户:独孤求源
摘 : 通过使用 peer-to-peer(P2P)计算模式在 Internet 物理拓扑基础上建立一个称为 P2P 覆盖网络(P overlay network)的虚拟拓扑结构,有效地建立起一个基于 Internet 的完全分布式自组织网络路由模型 集中式自组织网络路由模型(hierarchical aggregation self-organizing network,简称 HASN).分别描述了 HASN 由模型的构建目标和体系结构,并详细分析了 HASN 采用的基于 P2P 计算模式的分布式命名 路由发现和更 算法 HASN_Scale,并在仿真实验的基础上,对 HASN 路由模型的性能进行了验证.
标签: peer-to-peer P2P Internet overlay
上传时间: 2014-01-21
上传用户:zhenyushaw
CMCRC.ASM is a simple program just to demonstrate how to compute the CRC-16 and CRC-32 using the crc16_table and crc32_table that were generated by CRCTABLE.
标签: demonstrate CRC the compute
上传时间: 2014-01-24
上传用户:agent
% This program calculates radar ranges in a jamming environment. It works % with both Stand-off jamming and self-screening jamming for steady and Swerling type % targets with frequency agility, coherent integration and standard atmosphere/rain % attenuation
标签: environment calculates Stand-off program
上传时间: 2013-12-24
上传用户:sammi