Over the past years, we have witnessed destructions of various kinds caused by human actions. As a university student, write a letter to our society to
标签: destructions witnessed actions various
上传时间: 2014-11-23
上传用户:一诺88
Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
标签: functions hash cryptographic Algorithm
上传时间: 2014-11-09
上传用户:1109003457
This software documentation contains proprietary information of OpenAccess Software, Inc. it is provided under a license agreement containing restrictions on use and disclosure and is also protected by copyright law. Reverse engineering of the software is prohibited. If this software/documentation is delivered to a U.S. Government Agency, then it is delivered with Restricted Rights and the following legend is applicable:
标签: documentation proprietary information OpenAccess
上传时间: 2015-09-03
上传用户:mpquest
le flows through MOS channel while Ih flows across PNP transistor Ih= a/(1-a) le, IE-le+lh=1/(1-a)' le Since IGBT has a long base PNP, a is mainly determined by ar si0 2ar= 1/cosh(1/La), La: ambipolar diff length a-0.5 (typical value)p MOSFET channel current (saturation), le=U"Cox"W(2"Lch)"(Vc-Vth)le Thus, saturated collector current Ic, sat=1/(1-a)"le=-1/(1-a)"UCox"W/(2Lch)"(Vo-Vth)2Also, transconductance gm, gm= 1/(1-a)"u' Cox W/Lch*(Vo-Vth)Turn-On1. Inversion layer is formed when Vge>Vth2. Apply positive collector bias, +Vce3. Electrons flow from N+ emitter to N-drift layer providing the base current for the PNP transistor4. Since J1 is forward blased, hole carriers are injected from the collector (acts as an emitter).5. Injected hole carriers exceed the doping level of N-drift region (conductivity modulation). Turn-Off1. Remove gate bias (discharge gate)2. Cut off electron current (base current, le, of pnp transistor)
标签: igbt
上传时间: 2022-06-20
上传用户:wangshoupeng199
用Doolittle方法求解此方程组; 1.先由U[1][i]=a[1][i] 求的U的第一行,在根据L[i][1]=a[i][1]/U[1][1] 求的L的第一列;2..然后根据公式求得U,L其他的值; 3 回带求解得到X
上传时间: 2013-12-10
上传用户:洛木卓
a-law, u-law source code, for audio compre
上传时间: 2013-12-31
上传用户:894898248
A率/u率 压缩与解压缩的IP核,。 # 由AHDL语言写成,可在MaxplusII和QuartusII中使用,源代码加密。
上传时间: 2015-06-19
上传用户:aysyzxzm
含t h r e a d x,u c o s 的b s p
标签:
上传时间: 2015-06-29
上传用户:xfbs821
“多播”亦称“多点传送”(M u l t i c a s t i n g),是一种让数据从一个成员送出,然后复制给其 他多个成员的技术
标签: 多点传送
上传时间: 2014-01-20
上传用户:磊子226
G711 u-law, A-law and linear PCM conversions Programm.
标签: conversions Programm linear A-law
上传时间: 2014-12-02
上传用户:wangdean1101