usually
共 66 篇文章
usually 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 66 篇文章,持续更新中。
微功率有源RFID研究与应用低频唤醒技术
<P>Tags of micro-power active RFID system are usually supllied by cells battery, the<BR>power consum
Emulating a synchronous serial interface (SSC) interface via software routines
The C500 microcontroller family usually provides only one on-chip synchronous serial<BR>channel (SSC
对8位微控制器SAB C513的异步串行接口进行仿真的例行程序
The C500 microcontroller family usually provides only one on-chip asynchronous serialcommunication c
通过片上的同步串行接口实现异步串行接口的仿真
The C500 microcontroller family provides usually only one on-chip asynchronous serial communication
10MHz多路乘法器带输出放大器,突破带宽壁垒
Beyond a 1MHz bandwidth, multiplier chips usually need<BR>external amplifiers and biasing, and many
解析单片机攻防技术与防御措施
<p>电子设备的单片机执行程序一般都是基于仿真器进行下载,储存于芯片内部。就模块级设备而言,其主要是由于单片机与DSP芯片结合设计,单片机可以衔接仿真器,以JTAG接口为辅助直接性读取,保存执行代码。此设计方式的风险性较高,尽管只是利用仿真器读取执行代码,但是随单片机破解技术的更新发展,应针对单片机自身采取有效的防御性措施。据此,本文主要对单片机攻防技术与防御措施进行了详细分析。</p><p>Th
智能数字音乐盒的设计与实现
<p>随着科技的飞速发展,人们的生活节奏越来越快,多数人长期处于压力过大的状态。音乐对于调节人的心理压力来说是一种很有效的方式,因此,各式各样的音乐盒开始普及。由于容量大、操作方便、价格便宜等优点,数字音乐盒逐渐成为人们的首选。这里以电子技术为基础,设计了一款数字音乐盒。它以单片机为核心,主要由外围控制电路、外接电路、发声电路、电源电路等组成整个系统。音乐的播放可用按键或者红外遥控器实现,同时还可
interpretable-machine-learning
Machinelearninghasgreatpotentialforimprovingproducts,processesandresearch.Butcomputers<br />
usually do not explain their predictions which is a barrier to the adoption of machine learning.<br />
This
automation-and-robotics
In this book for the optimisation of assembly conveyor lines we are dealing with series part production<br />
featured by a medium complexity degree and a medium number of individual components and as
MultivariableControlSystems
This introductory chapter is devoted to reviewing the fundamental ideas of<br />
control from a multivariable point of view. In some cases, the mathematics<br />
and operations on systems (modelling,
Introduction to Dynamical Systems_Rainer Klages
There exist two essentially different approaches to the study of dynamical systems, based on<br />
the following distinction:<br />
time-continuous nonlinear differential equations ⇋ time-discrete map
Digital+Signal+Processing+for+RFID
Identification is pervasive nowadays in daily life due to many complicated activities such as<br />
bank and library card reading, asset tracking, toll collecting, restricted access to sensitive data<
Chipless_Radio_Frequency_Identification
Introduction to Radio Frequency Identification (RFID): RFID is a<br />
wireless modulation and demodulation technique for automatic<br />
identification of objects, tracking goods, smart logistics, an
Electric Vehicles in Smart Grids
Plug in Electric Vehicles (PEVs) use energy storages usually in the form of<br />
battery banks that are designed to be recharged using utility grid power. One<br />
category of PEVs are Electric Vehi
Plug In Electric Vehicles
Plug in Electric Vehicles (PEVs) use energy storages usually in the form of battery<br />
banks that are designed to be recharged using utility grid power. One category of<br />
PEVs are Electric Vehi
Plug In Electric Vehicles in Smart Grids
Plug in Electric Vehicles (PEVs) use energy storages usually in the form of battery<br />
banks that are designed to be recharged using utility grid power. One category of<br />
PEVs are Electric Vehi
Conducted+Electromagnetic+Interference
Electricity has been chosen as the most convenient and useful form of energy, due<br />
to its ease of transportation over large distances and easy conversion to other<br />
energy forms. The biggest
Wireless Communication Technology
This is a book on wireless communication. That usually means communica-<br />
tion by radio, though ultrasound and infrared light are also used occasion-<br />
ally. The term “wireless” has come to me
Wavelength Division Multiplexing
Wavelength division multiplexing (WDM) refers to a multiplexing and transmission<br />
scheme in optical telecommunications fibers where different wavelengths, typically<br />
emitted by several laser
Spread-Spectrum+Communication+Systems+2nd
Spread-spectrum communication is a core area within the field of digital<br />
communication. Originally used in military networks as countermeasures against<br />
the threats of jamming and intercept