Many CAD users dismiss schematic capture as a necessary evil in the process of creating PCB layout but we have always disputed this point of view. With PCB layout now offering automation of both component placement and track routing, getting the design into the computer can often be the most time consuming element of the exercise. And if you use circuit simulation to develop your ideas, you are going to spend even more time working on the schematic.
标签: schematic necessary creating dismiss
上传时间: 2014-01-25
上传用户:WMC_geophy
The Bit Array structure provides a compacted arrays of Booleans, with one bit for each Boolean value. A 0 [1] bit corresponds to the Boolean value false [true], respectively. we can look at a stream of bytes as a stream of bits each byte contains 8 bits, so any n bytes hold n*8 bits. And the operation to manipulate this stream or bits array is so easy, jut read or change the bits state or make any Boolean operation on the whole bits array, like 鈥楢ND鈥? 鈥極R鈥? or 鈥榅OR鈥?
标签: structure compacted Booleans provides
上传时间: 2014-01-15
上传用户:坏天使kk
Serial UART open source core. The design is engineered for use as a stand alone chip or for use with other of our cores. The reason for developing the Serial UART core is the fact, that asynchronous serial communication is very common that almost every machine understands it.Also, for OCRP-1, we needed a way of communication with a host computer, to make it available over the net.
标签: engineered for use Serial
上传时间: 2017-03-11
上传用户:aa17807091
This is the Low Energy Adaptive Clustering Hierarchy routing protocol [LEACH] source code for wireless sensor network we have used.It is developed with MatLab7
标签: Clustering Hierarchy Adaptive protocol
上传时间: 2013-12-09
上传用户:362279997
Fast Fourier Transform power point The rectangular window introduces broadening of any frequency components [`smearing鈥? and sidelobesthat may overlap with other frequency components [`leakage鈥?. 鈥he effect improves as Nincreases 鈥owever, the rectangle window has poor properties and better choices of wncan lead to better spectral properties [less leakage, in particular] 鈥搃.e. instead of just truncating the summation, we can pre-multiply by a suitable window function wnthat has better frequency domain properties. 鈥ore on window design in the filter design section of the course
标签: rectangular introduces broadening Transform
上传时间: 2017-03-25
上传用户:change0329
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon. 1, p. 224) have however simplified material parameters in order to facilitate easier realization as well as to avoid infinities in optical constants. Here we show that the cylindrical cloaks with simplified material parameters inherently allow the zeroth-order cylindrical wave to pass through the cloak as if the cloak is made of a homogeneous isotropic medium, and thus visible. To all high-order cylindrical waves, our numerical simulation suggests that the simplified cloak inherits some properties of the ideal cloak, but finite scatterings exist.
标签: invisibility constructed proposed electrom
上传时间: 2013-12-18
上传用户:13215175592
A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. we confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. However, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.
标签: cylindrical scattering expansion developed
上传时间: 2017-03-30
上传用户:lhc9102
In an electromagnetic cloak based on a transformation approach, reduced sets of material properties are generally favored due to their easier implementation in reality, although a seemingly inevitable drawback of undesired reflection exists in such cloaks. Here we suggest using high-order transformations to create smooth moduli at the outer boundary of the cloak, therefore completely eliminating the detrimental scattering within the limit of geometric optics. we apply this scheme to a non-magnetic cylindrical cloak and demonstrate that the scattered field is reduced substantially in a cloak with optimal quadratic transformation as compared to its linear counterpart.
标签: electromagnetic transformation properties approach
上传时间: 2017-03-30
上传用户:pkkkkp
LM3S系列ARM用GPIO模拟并行总线扩展32KB SRAM PF0~PF7 D0~D7(数据总线) PA0~PA7 A0~A7(地址总线低8位) PB0~PB7 A8~A15(地址总线高8位) PB7 /CE(片选) PC4 /we(写使能) PC5 /OE(读使能) 32KB SRAM 映射在地址0x0000~0x4FFF之间 为了加快访问速度,软件上将采用寄存器方式进行操作 PB7原为/TRST功能,现在也解放出来作为地址线A15
上传时间: 2014-01-01
上传用户:wlcaption
为 了提高用户身份认证和授权管理的灵活性,从we b 应用系统的安全性角度出发,讨论了 一 种在. N E T F r a me w o r k下保证应用程序安全性的身份验证和授权模型,并给出了模型的具体实现方法。 该模型利用 F o r ms身份验证方法对用户的身份进行鉴别。在授权处理上,模型结合统一资源定位( u . J f o r m R e s o u r c e L o c a t o r , U R L ) 授权模式和用户所具有的系统角色,分别从页面级和页面操作级对用户的访问进行 控制。该模型在企业局域网环境内能够提供比较灵活的身份认证和基于角色的授权服务。实际应用表明, 基于该模型的we b应用系统能够对用户的访问进行有效的控制,从而保证了系统的安全性
上传时间: 2013-12-31
上传用户:VRMMO