鎖相回路可視為一個輸出相位和輸入相位的回授系統用以同步輸入參考訊號和回授后輸出信號。并讓其操作同樣的頻率。如(圖一)所示,簡單鎖相回路[3,4]是由三個電路構成,分別為相位偵測器(Phase Detector)、回路濾波器(Loop Filter)、壓控蕩器(VCO)
上傳時間: 2015-08-16
上傳用戶:franktu
dspic的匯編例程,Write LCD with text using PSV feature and flash LED1 with a Timer1 loop
上傳時間: 2013-12-30
上傳用戶:bruce5996
This paper addresses the issues relating to the enforcement of robust stability when implementing the Adaptive Inverse Control (AIC) scheme. In this scheme, an adaptive FIR filter is added to a closed-loop system in order to reduce the output error caused by external disturbances, enhancing the performance achieved by linear time-invariant controllers alone.
標簽: implementing enforcement addresses the
上傳時間: 2013-12-23
上傳用戶:佳期如夢
This lab exercise will cover the use of AccelDSP’s design exploration capabilities that include mapping variables to memory and unrolling loop and vector operations. You will learn how to create different hardware architectures without modifying the MATLAB source to explore different area/performance tradeoffs.
標簽: capabilities exploration AccelDSP exercise
上傳時間: 2014-12-22
上傳用戶:eclipse
These files are for testing the ADC (AD9240) and DAC THS8133 (DAC1). The ADC and DAC are tested in loop back.
上傳時間: 2014-08-15
上傳用戶:lnnn30
hese files are for testing the Video ADC (TLV5734) and DAC THS8133 (DAC0). The ADC and DAC are tested in loop back.
上傳時間: 2015-09-28
上傳用戶:youlongjian0
Easily editable files to simulate three MIMO predictive control algorithms. These files are intended as a support to this book to enable students to investigate predictive control algorithms from the formulation of the prediction equations right through to the closed-loop simulation.
標簽: files algorithms predictive editable
上傳時間: 2015-11-09
上傳用戶:sevenbestfei
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
標簽: Sometimes the contents desire
上傳時間: 2013-12-25
上傳用戶:playboys0
//*** *** *** *** *** *** *** *** *** *** *** *** *** // MSP430x1xx Demo - Software Toggle P1.0 // // Description Toggle P1.0 by xor ing P1.0 inside of a software loop. // ACLK = n/a, MCLK = SMCLK = default DCO // // MSP430x1xx // ----------------- // /|\| XIN|- // | | | // --|RST XOUT|- // | | // | P1.0|-->LED // // A. Dannenberg // Texas Instruments, Inc // January 2006 // Built with IAR Embedded Workbench Version: 3.40A
上傳時間: 2015-12-10
上傳用戶:從此走出陰霾
DATA:BEGIN OF HEADDATA. INCLUDE STRUCTURE BAPIMATHEAD. DATA:END OF HEADDATA. DATA:BEGIN OF PLANTDATA. INCLUDE STRUCTURE BAPI_MARC. DATA:END OF PLANTDATA. DATA:BEGIN OF PLANTDATAX. INCLUDE STRUCTURE BAPI_MARCX. DATA:END OF PLANTDATAX. READ TABLE XMKPF INDEX 1. IF XMKPF-TCODE2 = MIGO_GR . LOOP AT XMSEG.
標簽: DATA HEADDATA BEGIN BAPIMATHEAD
上傳時間: 2015-12-17
上傳用戶:古谷仁美