Three-input majority Voter -- The entity declaration is followed by three alternative architectures which achieve the same functionality in different ways.
标签: architectures Three-input declaration alternative
上传时间: 2013-12-27
上传用户:liansi
In this edition, the majority of the book is dedicated to covering the Winsock API. Chapter 1 starts with an introduction to Winsock and is specifically geared for the beginning Winsock programmer. This chapter covers all the basics and introduces Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) through simple samples, as well as providing a roadmap to advanced Winsock topics covered in other chapters. For the sake of simplicity, Chapter 1 covers the IPv4 protocol.
标签: the dedicated covering majority
上传时间: 2015-09-08
上传用户:ommshaggar
For a variety of reasons, it is desirable to charge batteriesas rapidly as possible. At the same time, overchargingmust be limited to prolong battery life. Such limitation ofovercharging depends on factors such as the choice ofcharge termination technique and the use of multi-rate/multi-stage charging schemes. The majority of batterycharger ICs available today lock the user into one fixedcharging regimen, with at best a limited number ofcustomization options to suit a variety of application needsor battery types. The LTC®1325 addresses these shortcomingsby providing the user with all the functionalblocks needed to implement a simple but highly flexiblebattery charger (see Figure 1) which not only addressesthe issue of charging batteries but also those of batteryconditioning and capacity monitoring.
上传时间: 2013-10-19
上传用户:royzhangsz
FeaturesThe following standard features are provided.• Choice of RTOS scheduling policy1. Pre-emptive:Always runs the highest available task. Tasks of identical priorityshare CPU time (fully pre-emptive with round robin time slicing).2. Cooperative:Context switches only occur if a task blocks, or explicitly callstaskYIELD().• Co-routines (light weight tasks that utilise very little RAM).• Message queues• Semaphores [via macros]• Trace visualisation ability (requires more RAM)• majority of source code common to all supported development tools• Wide range of ports and examples
上传时间: 2013-10-13
上传用户:13162218709
This application note describes how to decode standard DTMF tones using the minimum number of external discrete components and a PIC. The two examples use a PIC which has an 8 bit timer and either a comparator or an ADC, although it can be modified for use on a PIC which has only digital I/O. The Appendices have example code for the 16C662 (with comparator) and 16F877 (using the ADC). As the majority of the Digital Signal Processing is done in software, little is required in the way of external signal conditioning. Software techniques are used to model the individual elements of a DTMF Decoder IC.
上传时间: 2013-11-21
上传用户:zhaoke2005
摘要:本水位监测报警器使用5V低压直流电源(也可以用3节5号电池代替)就可以对5~15厘米的水位进行监测,用LED显示和数码管显示水位,并可以对不再此范围内的水位发出报警。主要采用CD4066、74LS86、74LS32、CD4511芯片,再加上数码管、蜂鸣器、发光二极管、电阻这些器件组成一个简单而灵敏的监测报警电路,操作简单,接通电源即可工作。因为大部分电路采用数字电路,所以本水位监测报警器还具有耗能低、准确性高的特点。关键字:译码电路 报警电路 监测电路 Abstract: The water level alarm monitoring the use of 5 V low-voltage DC power (can also use three batteries replaced on the 5th) will be able to 5 to 15 centimeters of water level monitoring, with LED display and digital display of water level, and this can no longer Within the scope of a water level alarm. Mainly CD4066, 74LS86, 74LS32, CD4511 chips, coupled with digital control, buzzer, light-emitting diode, the resistance of these devices composed of a simple and sensitive monitoring alarm circuits. Because the majority of circuits using digital circuitry, so the water level monitored alarm system also has low energy consumption, high accuracy of the characteristics. Keyword: Decoding circuit alarm circuit monitoring circuit
上传时间: 2013-11-05
上传用户:王庆才
machine learning, accuracy estimation, cross-validation, bootstrap, ID3, decision trees, decision graphs, naive-bayes, decision tables, majority, induction algorithms, classifiers, categorizers, general logic diagrams, instance-based algorithms, discretization, lazy learning, bagging, MineSet.
标签: decision cross-validation estimation bootstrap
上传时间: 2015-07-26
上传用户:赵云兴
Core JSP In recent years, a large amount of software development activity has migrated from the client to the server. The client-centric model, in which a client executes complex programs to visualize and manipulate data, is no longer considered appropriate for the majority of enterprise applications. The principal reason is deployment—it is a significant hassle to deploy client programs onto a large number of desktops, and to redeploy them whenever the application changes. Instead, applications are redesigned to use a web browser as a "terminal". The application itself resides on the server, formatting data for the user as web pages and processing the responses that the user fills into web forms.
标签: development activity migrated software
上传时间: 2014-01-13
上传用户:duoshen1989
A major goal of this book is to show to make devices that are inherently reliable by design. While a lot of attention has been given to “quality improvement,” the majority of the emphasis has been placed on the processes that occur after the design of a product is complete. Design deficiencies are a significant problem, and can be exceedingly difficult to identify in the field. These types of quality problems can be addressed in the design phase with relatively little effort, and with far less expense than will be incurred later in the process. Unfortunately, there are many hardware designers and organizations that, for various reasons, do not understand the significance and expense of an unreliable design. The design methodology presented in this text is intended to address this problem.
标签: inherently reliable devices design
上传时间: 2016-07-30
上传用户:xiaodu1124
The code on this diskette has been organized by chapter. Each subdirectory containing listing has a readme.txt describing program usage and any relevent file formats. The readme will also describe how to compile the target programs under IBM OS/2 (TM) using the using C Set++ compiler (TM). All programs on this diskette have been compiled and tested in this environment. The majority of programs on this diskette should port to other environments with only minor adjustments. The exception to this are those programs which utilize presentation manager for graphical display of program data. In particular, the grid1 programs in \chapt4\backprop\ and \chapt3\ fall into this latter category.
标签: subdirectory containing has organized
上传时间: 2016-10-28
上传用户:冇尾飞铊