虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

variable-Frequency

  • This is IR (Infra-Red) learn module for home automation system. It can learn IR codes from different

    This is IR (Infra-Red) learn module for home automation system. It can learn IR codes from different IR remotes, and then execute any assigned actions controlled by learned IR remote. This project was developed using Keil 8051 compiler. Processor - Atmel AT89C51 Frequency - 22.1184 Mhz (described as OSC_FREQ in "timer.h") Timer 0 - system timer (used for timeouts and delays) Also, look in folder /doc for additional information about IR codes formats and codes from different manufacturers.

    标签: learn automation Infra-Red different

    上传时间: 2017-05-30

    上传用户:无聊来刷下

  • ) Compression using huffman code -with a number of bits k per code word -provide huffma

    ) Compression using huffman code -with a number of bits k per code word -provide huffman table Huffman coding is optimal for a symbol-by-symbol coding with a known input probability distribution.This technique uses a variable-length code table for encoding a source symbol. The table is derived in a particular way based on the estimated probability of occurrence for each possible value of the source symbol .Huffman coding uses a specific method for representing each symbol, resulting in a prefix code that expresses the most common characters using shorter strings of bits than those used for less common source symbols.The Huffman coding is a procedure to generate a binary code tree.

    标签: code Compression huffman provide

    上传时间: 2017-05-30

    上传用户:yuchunhai1990

  • This is a simple algorithm that downloads trading data from yahoo database. It is basically a large

    This is a simple algorithm that downloads trading data from yahoo database. It is basically a large scale application of sqq.m which was originally submitted by Michael Boldin, link at acknowledgements. Some of the functionalities of the package: - User defined ticker list. - Function for downloading most recent SP500 composition in ticker list. - Control for bad data (e.g. a certain percentage of prices missing). - Choice of frequency of data (e.g. weekly prices). - Choice of starting and ending data. - Function for saving the whole data in a pre-formatted excel file together with a full reports on missing data.

    标签: algorithm downloads basically database

    上传时间: 2017-06-03

    上传用户:啊飒飒大师的

  • The most straightforward approximation is the standard Gaussian approximation, where the MAI is appr

    The most straightforward approximation is the standard Gaussian approximation, where the MAI is approximated by a Gaussian random variable. This approximation is simple, however it is not accurate in general. In situations where the number of users is not large, the Gaussian approximation is not appropriate. In-depth analysis of must be applied. The Holtzman?s improved Gaussian approximation provides a better approximation to the MAI term. The approximation conditions the interference term on the operation condition of each user.

    标签: approximation straightforward the Gaussian

    上传时间: 2017-06-03

    上传用户:dyctj

  • SPREAD SPECTRUM MODULATION TECHNIQUES -spread spectrum - those modulation methods that are producin

    SPREAD SPECTRUM MODULATION TECHNIQUES -spread spectrum - those modulation methods that are producing a signal whose spectrum is more wider than of the data signal, the occupied frequency band being independent by the signal of data band. -The signals with spread spectrum of direct sequence type BPSK (BPSK-DS-SS) -The signals with spread spectrum of direct sequence type QPSK – DS–SS - Frequency hopping spread spectrum signals (FH-SS)

    标签: MODULATION TECHNIQUES modulation SPECTRUM

    上传时间: 2017-06-05

    上传用户:lht618

  • Spread-spectrum techniques are methods by which electromagnetic energy generated in a particular ban

    Spread-spectrum techniques are methods by which electromagnetic energy generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. These techniques are used for a variety of reasons, including the establishment of secure communications, increasing resistance to natural interference and jamming, and to prevent detec

    标签: Spread-spectrum electromagnetic techniques particular

    上传时间: 2017-06-06

    上传用户:royzhangsz

  • In engineering, compensation is planning for side effects or other unintended issues in a design. Th

    In engineering, compensation is planning for side effects or other unintended issues in a design. The design of an invention can itself also be to compensate for some other existing issue or exception. One example is in a voltage-controlled crystal oscillator (VCXO), which is normally affected not only by voltage, but to a lesser extent by temperature. A temperature-compensated version (a TCVCXO) is designed so that heat buildup within the enclosure of a transmitter or other such device will not alter the piezoelectric effect, thereby causing frequency drift. Another example is motion compensation on digital cameras and video cameras, which keep a picture steady and not blurry.

    标签: compensation engineering unintended planning

    上传时间: 2013-12-11

    上传用户:z754970244

  • This application report discusses the design of non-invasive optical plethysmography also called as

    This application report discusses the design of non-invasive optical plethysmography also called as pulsoximeter using the MSP430FG437 Microcontroller (MCU). The pulsoximeter consists of a peripheral probe combined with the MCU displaying the oxygen saturation and pulse rate on a LCD glass. The same sensor is used for both heart-rate detection and pulsoximetering in this application. The probe is placed on a peripheral point of the body such as a finger tip, ear lobe or the nose. The probe includes two light emitting diodes (LEDs), one in the visible red spectrum (660nm) and the other in the infrared spectrum (940nm). The percentage of oxygen in the body is worked by measuring the intensity from each frequency of light after it transmits through the body and then calculating the ratio between these two intensities.

    标签: plethysmography non-invasive application discusses

    上传时间: 2014-01-17

    上传用户:天诚24

  • This paper will discuss the design of an asynchronous FIFO,Asynchronous FIFOs are widely used in the

    This paper will discuss the design of an asynchronous FIFO,Asynchronous FIFOs are widely used in the computer networking industry to receive data at a particular frequency and transmit them at another frequency. An asynchronous FIFO has two different clocks: one for read and one for write.

    标签: Asynchronous asynchronous the discuss

    上传时间: 2013-12-09

    上传用户:Thuan

  • VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in li

    VHDL implementation of the twofish cipher for 128,192 and 256 bit keys. The implementation is in library-like form All needed components up to, including the round/key schedule circuits are implemented, giving the flexibility to be combined in different architectures (iterative, rolled out/pipelined etc). Manual in English is included with more details about how to use the components and/or how to optimize some of them. All testbenches are provided (tables, variable key/text, ECB/CBC monte carlo) for 128, 192 and 256 bit key sizes, along with their respective vector files.

    标签: implementation twofish cipher VHDL

    上传时间: 2017-06-25

    上传用户:王小奇