虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

MosFet Power Loss

  • These routines model tropospheric radiowave propagation over variable terrain and calculates propaga

    These routines model tropospheric radiowave propagation over variable terrain and calculates propagation loss vs. height and range. Propagation loss is displayed in dB contours on a height vs. range plot. TPEM is based on the split-step Fourier PE method and was originally developed from an early PE model called PEPC, written by Fred Tappert. Propagation loss over variable terrain is modeled by shifting the field an appropriate number of bin widths correspondc ing to the height of the ground. The field is determined using the smooth earth PE method.

    标签: tropospheric propagation calculates radiowave

    上传时间: 2017-01-01

    上传用户:225588

  • 学生信息管理系统

    学生信息管理系统,Power builder

    标签: 信息管理系统

    上传时间: 2014-01-23

    上传用户:来茴

  • Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provi

    Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers need to design powerful and portable Web-based applications. Featuring step-by-step examples, this book focuses on harnessing the power of Java(TM) and XML together to streamline the development process. XML and Java(TM), Second Edition provides new coverage of emerging areas such as document management, databases, messaging, servlets, JDBC, data binding, security, and more. It begins with an overview of XML programming techniques, standard APIs, and tools. Building upon this foundation, the book goes on to cover the latest technologies, including DOM Level 2, SAX2, XSLT, SOAP, WSDL, and UDDI. It explores the role of these major middleware technologies in XML and Java-based Web application development, as well as the limitations and potential pitfalls.

    标签: technologies and standards Edition

    上传时间: 2014-01-05

    上传用户:hj_18

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • The Cyclone® III PCI development board provides a hardware platform for developing and prototypi

    The Cyclone® III PCI development board provides a hardware platform for developing and prototyping low-power, high-performance, logic-intensive PCI-based designs. The board provides a high-density of the memory to facilitate the design and development of FPGA designs which need huge memory storage, and also includes Low-Voltage Differential Signaling (LVDS) interface of the High-Speed Terasic Connectors (HSTCs) for extra high-speed interface application.

    标签: development developing prototypi provides

    上传时间: 2017-01-29

    上传用户:jjj0202

  • A MATLAB GUI platform for realizing the radiation pattern of narrowband beamformer with random array

    A MATLAB GUI platform for realizing the radiation pattern of narrowband beamformer with random array geometry. User can specify the array geometry, directions of incoming signals, noise power, and the type of beamformer. Useful for gaining insight about collaborative beamforming in sensor networks and random arrays. You need both randomarray.fig and randomarray.m to work.

    标签: beamformer narrowband realizing radiation

    上传时间: 2014-01-06

    上传用户:qb1993225

  • The Red Hat Linux and Fedora distributions have become one of the major Linux distributions, bringi

    The Red Hat Linux and Fedora distributions have become one of the major Linux distributions, bringing to the PC all the power and flexibility of a Unix workstation as well as a complete set of Internet applications and a fully functional desktop interface. This book is designed not only to be a complete reference on Linux, but also to provide clear and detailed explanations of Linux features. No prior knowledge of Unix is assumed Linux is an operating system anyone can use

    标签: distributions Linux Fedora become

    上传时间: 2017-02-11

    上传用户:moshushi0009

  • To review what a metaball is, and how to render them and to describe a new optimization I ve made

    To review what a metaball is, and how to render them and to describe a new optimization I ve made for rendering metaballs. For complex scenes, it can render hundreds of times faster, though I m certain others have discovered this trick as well. It does very slightly change the characteristic shape of the blobs, but there is no loss in image quality whatsoever. (I actually developed all this about two years ago, but just now felt like writing it all down, and had the time!)

    标签: optimization and metaball describe

    上传时间: 2013-12-27

    上传用户:彭玖华

  • This product has been manufactured to your company’s specifications a part for use in your company’

    This product has been manufactured to your company’s specifications a part for use in your company’s general electronic products. It is guaranteed to perform according to delivery specifications. For any other use apart from general electronic equipment, we cannot take responsibility if the product is used in medical devices, nuclear power control equipment, aerospace equipment, fire and security systems, or any other applications in which there is a direct risk to human life and where extremely high levels of reliability are required. If the product is to be used in any of the above applications, we will need to enter into a separate product liability agreement.

    标签: company your specifications manufactured

    上传时间: 2017-02-19

    上传用户:haohaoxuexi

  • camera driver for wince s3c2440 .SAMSUNG s S3C2440A 16/32-bit RISC microprocessor. SAMSUNG鈥檚 S3C2440

    camera driver for wince s3c2440 .SAMSUNG s S3C2440A 16/32-bit RISC microprocessor. SAMSUNG鈥檚 S3C2440A is designed to provide hand-held devices and general applications with low-power, and high-performance microcontroller solution in small die size.

    标签: SAMSUNG microprocessor S3C2440A S3C2440

    上传时间: 2013-12-26

    上传用户:Ants