亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁(yè)| 資源下載| 資源專輯| 精品軟件
登錄| 注冊(cè)

WE

  • Many CAD users dismiss schematic capture as a necessary evil in the process of creating PCB layout

    Many CAD users dismiss schematic capture as a necessary evil in the process of creating PCB layout but WE have always disputed this point of view. With PCB layout now offering automation of both component placement and track routing, getting the design into the computer can often be the most time consuming element of the exercise. And if you use circuit simulation to develop your ideas, you are going to spend even more time working on the schematic.

    標(biāo)簽: schematic necessary creating dismiss

    上傳時(shí)間: 2014-01-25

    上傳用戶:WMC_geophy

  • The Bit Array structure provides a compacted arrays of Booleans, with one bit for each Boolean value

    The Bit Array structure provides a compacted arrays of Booleans, with one bit for each Boolean value. A 0 [1] bit corresponds to the Boolean value false [true], respectively. WE can look at a stream of bytes as a stream of bits each byte contains 8 bits, so any n bytes hold n*8 bits. And the operation to manipulate this stream or bits array is so easy, jut read or change the bits state or make any Boolean operation on the whole bits array, like 鈥楢ND鈥? 鈥極R鈥? or 鈥榅OR鈥?

    標(biāo)簽: structure compacted Booleans provides

    上傳時(shí)間: 2014-01-15

    上傳用戶:壞天使kk

  • Serial UART open source core. The design is engineered for use as a stand alone chip or for use with

    Serial UART open source core. The design is engineered for use as a stand alone chip or for use with other of our cores. The reason for developing the Serial UART core is the fact, that asynchronous serial communication is very common that almost every machine understands it.Also, for OCRP-1, WE needed a way of communication with a host computer, to make it available over the net.

    標(biāo)簽: engineered for use Serial

    上傳時(shí)間: 2017-03-11

    上傳用戶:aa17807091

  • This is the Low Energy Adaptive Clustering Hierarchy routing protocol [LEACH] source code for wirele

    This is the Low Energy Adaptive Clustering Hierarchy routing protocol [LEACH] source code for wireless sensor network WE have used.It is developed with MatLab7

    標(biāo)簽: Clustering Hierarchy Adaptive protocol

    上傳時(shí)間: 2013-12-09

    上傳用戶:362279997

  • Fast Fourier Transform poWEr point The rectangular window introduces broadening of any frequency co

    Fast Fourier Transform poWEr point The rectangular window introduces broadening of any frequency components [`smearing鈥? and sidelobesthat may overlap with other frequency components [`leakage鈥?. 鈥he effect improves as Nincreases 鈥oWEver, the rectangle window has poor properties and better choices of wncan lead to better spectral properties [less leakage, in particular] 鈥搃.e. instead of just truncating the summation, WE can pre-multiply by a suitable window function wnthat has better frequency domain properties. 鈥ore on window design in the filter design section of the course

    標(biāo)簽: rectangular introduces broadening Transform

    上傳時(shí)間: 2017-03-25

    上傳用戶:change0329

  • It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom

    It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon. 1, p. 224) have hoWEver simplified material parameters in order to facilitate easier realization as WEll as to avoid infinities in optical constants. Here WE show that the cylindrical cloaks with simplified material parameters inherently allow the zeroth-order cylindrical wave to pass through the cloak as if the cloak is made of a homogeneous isotropic medium, and thus visible. To all high-order cylindrical waves, our numerical simulation suggests that the simplified cloak inherits some properties of the ideal cloak, but finite scatterings exist.

    標(biāo)簽: invisibility constructed proposed electrom

    上傳時(shí)間: 2013-12-18

    上傳用戶:13215175592

  • A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-di

    A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundary of the cloak shell. WE confirm that a cloak with the ideal material parameters is a perfect invisibility cloak by systematically studying the change of the scattering coefficients from the near-ideal case to the ideal one. HoWEver, due to the slow convergence of the zeroth order scattering coefficients, a tiny perturbation on the cloak would induce a noticeable field scattering and penetration.

    標(biāo)簽: cylindrical scattering expansion developed

    上傳時(shí)間: 2017-03-30

    上傳用戶:lhc9102

  • In an electromagnetic cloak based on a transformation approach, reduced sets of material properties

    In an electromagnetic cloak based on a transformation approach, reduced sets of material properties are generally favored due to their easier implementation in reality, although a seemingly inevitable drawback of undesired reflection exists in such cloaks. Here WE suggest using high-order transformations to create smooth moduli at the outer boundary of the cloak, therefore completely eliminating the detrimental scattering within the limit of geometric optics. WE apply this scheme to a non-magnetic cylindrical cloak and demonstrate that the scattered field is reduced substantially in a cloak with optimal quadratic transformation as compared to its linear counterpart.

    標(biāo)簽: electromagnetic transformation properties approach

    上傳時(shí)間: 2017-03-30

    上傳用戶:pkkkkp

  • LM3S系列ARM用GPIO模擬并行總線擴(kuò)展32KB SRAM PF0~PF7 D0~D7(數(shù)據(jù)總線) PA0~PA7 A0~A7(地址總線低8位) PB0~PB

    LM3S系列ARM用GPIO模擬并行總線擴(kuò)展32KB SRAM PF0~PF7 D0~D7(數(shù)據(jù)總線) PA0~PA7 A0~A7(地址總線低8位) PB0~PB7 A8~A15(地址總線高8位) PB7 /CE(片選) PC4 /WE(寫使能) PC5 /OE(讀使能) 32KB SRAM 映射在地址0x0000~0x4FFF之間 為了加快訪問速度,軟件上將采用寄存器方式進(jìn)行操作 PB7原為/TRST功能,現(xiàn)在也解放出來作為地址線A15

    標(biāo)簽: LM3S GPIO SRAM ARM

    上傳時(shí)間: 2014-01-01

    上傳用戶:wlcaption

  • 為 了提高用戶身份認(rèn)證和授權(quán)管理的靈活性

    為 了提高用戶身份認(rèn)證和授權(quán)管理的靈活性,從WE b 應(yīng)用系統(tǒng)的安全性角度出發(fā),討論了 一 種在. N E T F r a me w o r k下保證應(yīng)用程序安全性的身份驗(yàn)證和授權(quán)模型,并給出了模型的具體實(shí)現(xiàn)方法。 該模型利用 F o r ms身份驗(yàn)證方法對(duì)用戶的身份進(jìn)行鑒別。在授權(quán)處理上,模型結(jié)合統(tǒng)一資源定位( u . J f o r m R e s o u r c e L o c a t o r , U R L ) 授權(quán)模式和用戶所具有的系統(tǒng)角色,分別從頁(yè)面級(jí)和頁(yè)面操作級(jí)對(duì)用戶的訪問進(jìn)行 控制。該模型在企業(yè)局域網(wǎng)環(huán)境內(nèi)能夠提供比較靈活的身份認(rèn)證和基于角色的授權(quán)服務(wù)。實(shí)際應(yīng)用表明, 基于該模型的WE b應(yīng)用系統(tǒng)能夠?qū)τ脩舻脑L問進(jìn)行有效的控制,從而保證了系統(tǒng)的安全性

    標(biāo)簽: 用戶 授權(quán) 身份認(rèn)證

    上傳時(shí)間: 2013-12-31

    上傳用戶:VRMMO

主站蜘蛛池模板: 蚌埠市| 宁晋县| 任丘市| 永仁县| 遂昌县| 翁源县| 炎陵县| 南京市| 平乡县| 鱼台县| 潞城市| 治县。| 宝山区| 任丘市| 宁海县| 镇江市| 兴城市| 西吉县| 灵璧县| 泗水县| 棋牌| 太白县| 宜春市| 兴义市| 莱西市| 巴塘县| 固阳县| 含山县| 泰安市| 木兰县| 余干县| 铜山县| 尤溪县| 乐亭县| 来凤县| 论坛| 英德市| 松溪县| 中江县| 静乐县| 上杭县|