Very low cost, low component count charger/adapter – replaces linear transformer based solutions • Extremely simple circuit configuration designed for high volume, low cost manufacturing
标签: transformer low component solutions
上传时间: 2017-03-27
上传用户:2404
Very low cost, low component count charger/adapter – replaces linear transformer based solutions • Extremely simple circuit configuration designed for high volume, low cost manufacturing
标签: transformer low component solutions
上传时间: 2017-03-27
上传用户:lps11188
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. We confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.
标签: cylindrical scattering expansion developed
上传时间: 2017-03-30
上传用户:lhc9102
This contains the following topics and more ADA versus C and Cplus plus Ada_training ADA 2005 for High Integrity Systems ada_language_notes Sample programs
标签: Ada_training ADA and following
上传时间: 2013-12-28
上传用户:zhuoying119
The second edition of WiMax Operator鈥檚 Manual includes most of the material from the first edition, plus new discussions of 鈥?The ultra-high-speed mobile telephone standard, HSDPA 鈥?Ultrawideband (UWB) 鈥?Changes to DSL technologies 鈥?Mobile voice 鈥?Mobile entertainment 鈥?New backup systems The new edition also reflects the changes that have occurred in the industry over the last year and half, including the emergence of restandards wireless broadband equipment with fully developed mobile capabilities, ignificant alterations in the competitive landscape, and he opening of valuable new spectrum for roadband wireless operators.
标签: edition the Operator includes
上传时间: 2014-01-02
上传用户:xiaodu1124
In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessary in order to be able to compare or integrate the data obtained from different measurements. Image registration is the process of transforming the different sets of data into one coordinate system. To be precise it involves finding transformations that relate spatial information conveyed in one image to that in another or in physical space. Image registration is performed on a series of at least two images, where one of these images is the reference image to which all the others will be registered. The other images are referred to as target images.
标签: different computer acquired sampling
上传时间: 2013-12-28
上传用户:来茴
SA Encryption and Decryption using Matlab The program set contains thirteen files listed below. errormeg.fig errormsg.m helpmsg.fig helpmsg.m inputmsg.fig inputmsg.m mesgcut.m pro2.fig pro2.m rsacore.m readme.txt screenshot.gif In order to run the program please call pro2.m under Matlab 6.0 Environment. System Requirement Matlab version 6.0 and if necessary, Maple version 6.0 on any platform PentiumII 300 MHz or equivalent.
标签: Encryption Decryption contains thirteen
上传时间: 2017-04-06
上传用户:dreamboy36
1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password. 2. Click OK when finished configuring users. Don t forget to disable some features in order to see what happens with GUI elements - menus, and buttons.
标签: SecurityBuilderDemo directory password located
上传时间: 2014-01-23
上传用户:chongcongying
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given a directed graph as input, write a program that uses depth-first search to determine all such paths. Note that, these paths are not vertex-disjoint i.e., the vertices may repeat but they are all edge-disjoint i.e., no two paths have the same edges. The input is the adjacency matrix of a directed acyclic graph and a pair(s) of source and destination vertices and the output should be the number of such disjoint paths and the paths themselves on separate lines. In case of multiple paths the output should be in order of paths with minimum vertices first. In case of tie the vertex number should be taken in consideration for ordering.
标签: fault-tolerant algorithms redundant underlyin
上传时间: 2013-12-18
上传用户:jkhjkh1982
R1EX24xxx series are two-wire serial interface EEPROM (Electrically Erasable and Programmable ROM). They realize high speed, low power consumption and a high level of reliability by employing advanced MNOS memory technology and CMOS process and low voltage circuitry technology. They also have a 128-byte page programming function to make their write operation faster. Note: Renesas Technology鈥檚 serial EEPROM are authorized for using consumer applications such as cellular phone, camcorders, audio equipment. Therefore, please contact Renesas Technology鈥檚 sales office before using industrial applications such as automotive systems, embedded controllers, and meters
标签: Electrically Programmable interface Erasable
上传时间: 2014-01-07
上传用户:xiaohuanhuan