The LM158 series consists of two independent, high gain, internally frequency compensated operational amplifiers which were designed specifically to operate from a single power supply over a wide range of voltages. Operation from split power supplies is also possible and the low power supply current drain is independent of the magnitude of the power supply voltage.
标签: compensated independent internally frequency
上传时间: 2014-01-09
上传用户:zwei41
In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn t kept waiting any longer than necessary for the relatively slow disks.
标签: thoroughly understand variety order
上传时间: 2014-12-07
上传用户:PresidentHuang
This software designs the student result management system m ay replace the tedious low effect the manual management, has realized the result management, the information management and the curriculum manages three big cores functions.
标签: the management software designs
上传时间: 2013-12-15
上传用户:kr770906
This directory contains an example ADSP-BF535 subroutine that demonstrates the initialization of the AC 97 communication link between SPORT0 on the ADSP-BF535 and the AD1885 stereo Codec.
标签: initialization demonstrates subroutine directory
上传时间: 2014-11-29
上传用户:colinal
This unit uses an array of bytes to represent a LARGE number. The number is binairy-stored in the array, with the Least Significant Byte (LSB) first and the Most Significant Byte (MSB) last, like all Intel-integer types.
标签: number binairy-stored represent LARGE
上传时间: 2015-10-08
上传用户:xieguodong1234
Text processing often involves matching text against a pattern. Although Java s character and assorted string classes offerlow- levelpattern- matching support, that support commonly leads to complex code. To help you write simplerpattern- matching code, Java provides regular expressions. After introducing you to terminology and thejava.util. regex package, Jeff Friesen explores many regular expression constructs supported by that package s Pattern class. Then he examines Pattern s methods and the additionaljava.util. regex classes. In conclusion, he presents a practical application of regular expressions.
标签: processing character Although involves
上传时间: 2014-01-19
上传用户:爱死爱死
This source file may be used and distributed without restriction provided that this copyright statement is not removed from the file and that any derivative work contains the original copyright notice and the associated disclaimer.
标签: distributed restriction copyright provided
上传时间: 2013-12-08
上传用户:luopoguixiong
%CHECKBOUNDS Move the initial point within the (valid) bounds. % [X,LB,UB,X,FLAG] = CHECKBOUNDS(X0,LB,UB,nvars) % checks that the upper and lower % bounds are valid (LB <= UB) and the same length as X (pad with -inf/inf % if necessary) warn if too long. Also make LB and UB vectors if not % already. % Finally, inf in LB or -inf in UB throws an error.
标签: CHECKBOUNDS the initial bounds
上传时间: 2015-10-26
上传用户:caiiicc
Input The first line of the input contains a single integer T (1 <= T <= 20), the number of test cases. Then T cases follow. The first line of each case contains N, and the second line contains N integers giving the time for each people to cross the river. Each case is preceded by a blank line. There won t be more than 1000 people and nobody takes more than 100 seconds to cross. Output For each test case, print a line containing the total number of seconds required for all the N people to cross the river. Sample Input 1 4 1 2 5 10 Sample Output 17
标签: the contains integer number
上传时间: 2015-10-27
上传用户:plsee
In this paper, we provide an overview of the security concerns introduced by wireless LANs, current approaches to wireless LAN security, their limitations, and the weaknesses of various “band aid” security solutions. We conclude by describing how the ReefEdge Connect System provides a comprehensive solution to wireless LAN security.
标签: introduced overview concerns security
上传时间: 2015-11-02
上传用户:凌云御清风