• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
NMEA GPS Module - main [gps.0xdc.ru]
NMEA GPS Module - main [gps.0xdc.ru]

ATGTS: Automated Trace Gas Trapping System
ATGTS: Automated Trace Gas Trapping System

... • Fan pointing into subchamber to thoroughly mix sample volumes ...
DSP - Personal Web Pages - University of North Carolina at Charlotte
DSP - Personal Web Pages - University of North Carolina at Charlotte

... Slave can transmit to Master only and only if Master is transmitting at the same time or else Slave has to wait ...
CD54HC160/3A CD54HCT160/3A Synchronous Presettable Counters Functional Diagram
CD54HC160/3A CD54HCT160/3A Synchronous Presettable Counters Functional Diagram

... The CD54HC160/3A and CD54HCT160/3A devices are presettable synchronous counters that feature look-ahead carry logic for use in high-speed counting applications. The CD54HC160/3A and CD54HCT160/3A are asynchronous reset decade counters. Counting and parallel presetting are both accomplished synchrono ...
A Four-Level Inversion Scheme for a 6n-Pole Open
A Four-Level Inversion Scheme for a 6n-Pole Open

... In this paper, a new power-circuit configuration for four-level inversion with an open-end winding induction motor is proposed. This configuration is suitable for an induction motor with 6n (n = 1, 2, . . .) Number of poles. Two isolated DC power supplies, each rated for one third of the total DC-link ...
Document
Document

... • Gather requirement specification (what is this system supposed to do?) • Analyze the specification for possible solutions (what are the ways that this system can be designed. Pick the best solution) • Design the system (decompose the problem into smaller problems and solve each problem, then bring ...
Part 2
Part 2

... Power Hub • Purpose: – Regulate input voltage into the circuit – Allows for flexible power supplies that can be used for your robot (input 7V – 36V; output 5V) – Most ICs and electronic components use 5V ...
Chip Detects Shorts and Overloads, Measures Current
Chip Detects Shorts and Overloads, Measures Current

Lab: " Ohm`s Law "
Lab: " Ohm`s Law "

... Physics Lab: Ohm's Law ...
Household Appliance Monitoring System SDMay0204
Household Appliance Monitoring System SDMay0204

... Make user more aware of their power usage ...
DPM-3232 Digital DC Power Meter with Data logging capability User Manual
DPM-3232 Digital DC Power Meter with Data logging capability User Manual

SYN-921 Single Voltage Power Supply
SYN-921 Single Voltage Power Supply

NTE65101 Integrated Circuit 256 x 4–Bit Static Random Access
NTE65101 Integrated Circuit 256 x 4–Bit Static Random Access

... 256 x 4–Bit Static Random Access Memory (SRAM) Description: The NTE65101 is a CMOS 1024–bit device organized in 256 words by 4 bits in a 22–Lead DIP type package. This device offers ultra low power and fully static operation with a single 5V supply. Separate data inputs and data outputs permit maxim ...
Interaction between Keithley 6485 pico-ammeter and the
Interaction between Keithley 6485 pico-ammeter and the

... 6485 pico-ammeter and the PC through LabView By Shahab Khan ...
microcontroller trainer kit
microcontroller trainer kit

Renesas Flash Programmer Sample Circuit for Programming Customer Notification
Renesas Flash Programmer Sample Circuit for Programming Customer Notification

... Leave unused pins open. PC with serial ports RS-232C cable (straight type) ...
1 Programming PIC Microcontrollers in PicBasic Pro
1 Programming PIC Microcontrollers in PicBasic Pro

...  Main Code: During each main code cycle: o The MCU monitors the status of the input sensors o Executes the logic programmed in the main code o Changes the state of the output devices o Input/Output Port Registers and Input/Output Pins:  In a computer, registers are a set of data storage places tha ...
Logis5cs( ELEC327:(Lecture(5( Today( Measuring(current(consump5on(
Logis5cs( ELEC327:(Lecture(5( Today( Measuring(current(consump5on(

doc - Cornerstone Robotics
doc - Cornerstone Robotics

...  Main Code: During each main code cycle: o The MCU monitors the status of the input sensors o Executes the logic programmed in the main code o Changes the state of the output devices o Input/Output Port Registers and Input/Output Pins:  In a computer, registers are a set of data storage places tha ...
TELECOMMUNICATION CLOSET REQUIREMENTS
TELECOMMUNICATION CLOSET REQUIREMENTS

... riser connectivity. Building location and ownership, existing pathways, and existing closet locations will determine coring vs. overhead pathway. -(4) 4” sleeves are required above the drop ceiling, through closet walls, for voice/data station cable entrance pathway. (12” wide cable tray to be insta ...
Tutorial 3 - Lehrstuhl für Technische Elektronik
Tutorial 3 - Lehrstuhl für Technische Elektronik

Compuscope 8500
Compuscope 8500

... With over 30 man-years of register-level programming as well as operating system related coding, these drivers are the most advanced in the industry. GageScope Software and Gage’s Software Development Kits both use these drivers to provide optimal performance. ...
The Franck-Hertz Experiment Data Studio Version
The Franck-Hertz Experiment Data Studio Version

... DC) filament power supply, a power supply to accelerate the electrons, a picoammeter to measure the very small collector current and your ThinkPad to log and plot the data in an XY plot. The tube contains a small amount of mercury, some of which vaporizes in the heat of the oven (~180°C). The oxide- ...
A Compact Wireless Modular Sensor Platform Ari Y
A Compact Wireless Modular Sensor Platform Ari Y

... This work is being tested using a prototype stack consisting currently of the master and IMU boards. Future work will be based around the ambient board and possibly other boards as well. This application exploits the completeness of each sensing modality as expressed by the stack panes. E.g., the IM ...
Software Applications Developer Job Description Inova Design
Software Applications Developer Job Description Inova Design

< 1 ... 1283 1284 1285 1286 1287 1288 1289 1290 1291 ... 1306 >

Immunity-aware programming

When writing firmware for an embedded system, immunity-aware programming refers to programming techniques which improve the tolerance of transient errors in the program counter or other modules of a program that would otherwise lead to failure. Transient errors are typically caused by single event upsets, insufficient power, or by strong electromagnetic signals transmitted by some other ""source"" device.Immunity-aware programming is an example of defensive programming and EMC-aware programming. Although most of these techniques apply to the software in the ""victim"" device to make it more reliable, a few of these techniques apply to software in the ""source"" device to make it emit less unwanted noise.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report