虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

we

  • Many CAD users dismiss schematic capture as a necessary evil in the process of creating PCB layout

    Many CAD users dismiss schematic capture as a necessary evil in the process of creating PCB layout but we have always disputed this point of view. With PCB layout now offering automation of both component placement and track routing, getting the design into the computer can often be the most time consuming element of the exercise. And if you use circuit simulation to develop your ideas, you are going to spend even more time working on the schematic.

    标签: schematic necessary creating dismiss

    上传时间: 2014-01-25

    上传用户:WMC_geophy

  • The Bit Array structure provides a compacted arrays of Booleans, with one bit for each Boolean value

    The Bit Array structure provides a compacted arrays of Booleans, with one bit for each Boolean value. A 0 [1] bit corresponds to the Boolean value false [true], respectively. we can look at a stream of bytes as a stream of bits each byte contains 8 bits, so any n bytes hold n*8 bits. And the operation to manipulate this stream or bits array is so easy, jut read or change the bits state or make any Boolean operation on the whole bits array, like 鈥楢ND鈥? 鈥極R鈥? or 鈥榅OR鈥?

    标签: structure compacted Booleans provides

    上传时间: 2014-01-15

    上传用户:坏天使kk

  • Serial UART open source core. The design is engineered for use as a stand alone chip or for use with

    Serial UART open source core. The design is engineered for use as a stand alone chip or for use with other of our cores. The reason for developing the Serial UART core is the fact, that asynchronous serial communication is very common that almost every machine understands it.Also, for OCRP-1, we needed a way of communication with a host computer, to make it available over the net.

    标签: engineered for use Serial

    上传时间: 2017-03-11

    上传用户:aa17807091

  • This is the Low Energy Adaptive Clustering Hierarchy routing protocol [LEACH] source code for wirele

    This is the Low Energy Adaptive Clustering Hierarchy routing protocol [LEACH] source code for wireless sensor network we have used.It is developed with MatLab7

    标签: Clustering Hierarchy Adaptive protocol

    上传时间: 2013-12-09

    上传用户:362279997

  • Fast Fourier Transform power point The rectangular window introduces broadening of any frequency co

    Fast Fourier Transform power point The rectangular window introduces broadening of any frequency components [`smearing鈥? and sidelobesthat may overlap with other frequency components [`leakage鈥?. 鈥he effect improves as Nincreases 鈥owever, the rectangle window has poor properties and better choices of wncan lead to better spectral properties [less leakage, in particular] 鈥搃.e. instead of just truncating the summation, we can pre-multiply by a suitable window function wnthat has better frequency domain properties. 鈥ore on window design in the filter design section of the course

    标签: rectangular introduces broadening Transform

    上传时间: 2017-03-25

    上传用户:change0329

  • It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom

    It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon. 1, p. 224) have however simplified material parameters in order to facilitate easier realization as well as to avoid infinities in optical constants. Here we show that the cylindrical cloaks with simplified material parameters inherently allow the zeroth-order cylindrical wave to pass through the cloak as if the cloak is made of a homogeneous isotropic medium, and thus visible. To all high-order cylindrical waves, our numerical simulation suggests that the simplified cloak inherits some properties of the ideal cloak, but finite scatterings exist.

    标签: invisibility constructed proposed electrom

    上传时间: 2013-12-18

    上传用户:13215175592

  • A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di

    A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. we confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.

    标签: cylindrical scattering expansion developed

    上传时间: 2017-03-30

    上传用户:lhc9102

  • In an electromagnetic cloak based on a transformation approach, reduced sets of material properties

    In an electromagnetic cloak based on a transformation approach, reduced sets of material properties are generally favored due to their easier implementation in reality, although a seemingly inevitable drawback of undesired reflection exists in such cloaks. Here we suggest using high-order transformations to create smooth moduli at the outer boundary of the cloak, therefore completely eliminating the detrimental scattering within the limit of geometric optics. we apply this scheme to a non-magnetic cylindrical cloak and demonstrate that the scattered field is reduced substantially in a cloak with optimal quadratic transformation as compared to its linear counterpart.

    标签: electromagnetic transformation properties approach

    上传时间: 2017-03-30

    上传用户:pkkkkp

  • LM3S系列ARM用GPIO模拟并行总线扩展32KB SRAM PF0~PF7 D0~D7(数据总线) PA0~PA7 A0~A7(地址总线低8位) PB0~PB

    LM3S系列ARM用GPIO模拟并行总线扩展32KB SRAM PF0~PF7 D0~D7(数据总线) PA0~PA7 A0~A7(地址总线低8位) PB0~PB7 A8~A15(地址总线高8位) PB7 /CE(片选) PC4 /we(写使能) PC5 /OE(读使能) 32KB SRAM 映射在地址0x0000~0x4FFF之间 为了加快访问速度,软件上将采用寄存器方式进行操作 PB7原为/TRST功能,现在也解放出来作为地址线A15

    标签: LM3S GPIO SRAM ARM

    上传时间: 2014-01-01

    上传用户:wlcaption

  • 为 了提高用户身份认证和授权管理的灵活性

    为 了提高用户身份认证和授权管理的灵活性,从we b 应用系统的安全性角度出发,讨论了 一 种在. N E T F r a me w o r k下保证应用程序安全性的身份验证和授权模型,并给出了模型的具体实现方法。 该模型利用 F o r ms身份验证方法对用户的身份进行鉴别。在授权处理上,模型结合统一资源定位( u . J f o r m R e s o u r c e L o c a t o r , U R L ) 授权模式和用户所具有的系统角色,分别从页面级和页面操作级对用户的访问进行 控制。该模型在企业局域网环境内能够提供比较灵活的身份认证和基于角色的授权服务。实际应用表明, 基于该模型的we b应用系统能够对用户的访问进行有效的控制,从而保证了系统的安全性

    标签: 用户 授权 身份认证

    上传时间: 2013-12-31

    上传用户:VRMMO