• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
In nstitu ution nen f
In nstitu ution nen f

... In recent years, oscillators are considered as inevitable blocks in many electronic systems. They are commonly used in digital circuits to provide clocking and in analog/RF circuits of communication transceivers to support frequency conversion. Nowadays, CMOS technology is the most applicable soluti ...
First Principles of a Gas Discharge Tube (GDT) Primary
First Principles of a Gas Discharge Tube (GDT) Primary

Users manual Vision 8.8
Users manual Vision 8.8

... Users manual Vision 8.8 ...
5 Derating
5 Derating

CTP 5.0 Hardware, Installation, and Software Configuration Guide
CTP 5.0 Hardware, Installation, and Software Configuration Guide

... This CTP products have been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipmen ...
The Axon Guide - Ala
The Axon Guide - Ala

... may authorize in writing. Software that may be described in this document is furnished under a license agreement. It is against the law to copy, modify, or distribute the software on any medium, except as specifically allowed in the license agreement. Furthermore, the license agreement may prohibit ...
Rail-to-Rail Op Amp Design ( cont`d )
Rail-to-Rail Op Amp Design ( cont`d )

... – ACL(s) changes if AOL(s) varies with the input voltage, although to a less extent, which will introduce some nonlinear distortion at the output, especially at higher frequencies when AOL(s) is low. ...
UNIVERSITY OF ÇUKUROVA INSTITUTE OF NATURAL AND
UNIVERSITY OF ÇUKUROVA INSTITUTE OF NATURAL AND

Cisco 7200 Series Routers
Cisco 7200 Series Routers

... The Cisco 7200 Series Routers deliver exceptional performance/price, modularity, and scalability in a compact form factor with a wide range of deployment options. With processing speeds up to 1 million packets per second, port adapters ranging from NxDS0 to OC-12, and an unparalleled number of high- ...
Word - Center for Sustainable Energy
Word - Center for Sustainable Energy

... 6. All roofs have an access point that does not place ground ladders over openings such as windows or doors, are located at strong points of building construction, and in locations where the access point does not conflict with overhead obstructions such as tree limbs, wires or signs. (CFC 605.11.3.1 ...
Circuit Analysis Demystified
Circuit Analysis Demystified

... components. This means that each component has two connection points or terminals that can be used to connect it with other components in the circuit. Each type of component will have its own symbol. This is illustrated in Fig. 1-1, where we indicate the terminals with two rounded ends or dots and u ...
HOBO Energy Logger User`s Guide
HOBO Energy Logger User`s Guide

Boe-Bot Line Following with QTIs
Boe-Bot Line Following with QTIs

Circuit Analysis Demystified - one step easy a wonderful site
Circuit Analysis Demystified - one step easy a wonderful site

... components. This means that each component has two connection points or terminals that can be used to connect it with other components in the circuit. Each type of component will have its own symbol. This is illustrated in Fig. 1-1, where we indicate the terminals with two rounded ends or dots and u ...
Stakeholder Comment and Rationale Form  AESO AUTHORITATIVE DOCUMENT PROCESS Stakeholder Consultation Draft
Stakeholder Comment and Rationale Form AESO AUTHORITATIVE DOCUMENT PROCESS Stakeholder Consultation Draft

... interval, a pool participant submission to sell: (i) electric energy or dispatch down service and includes all of the operating blocks the pool participant uses for that submission; or (ii) operating reserves to ...
the zero-pole transformation noise reduction technique for
the zero-pole transformation noise reduction technique for

VLT® 6000 HVAC
VLT® 6000 HVAC

docx - IBIS Open Forum
docx - IBIS Open Forum

... 9. The I-V data tables should use enough data points around sharply curved areas of the I-V curves to describe the curvature accurately. In linear regions there is no need to define unnecessary data points. 10. The use of tab characters is legal, but they should be avoided as much as possible. This ...
Protection against lightning effects
Protection against lightning effects

Robot Driver RD Series User`s Manual English
Robot Driver RD Series User`s Manual English

... carefully to understand RD series functions and comply with its safety information, precautions, and operating and handling instructions. Always use the RD series within the operation range specified in this manual. Perform correct inspection and maintenance to prevent possible problems. When using ...
UPS Solutions
UPS Solutions

... designed for continuous power protection of critical equipment against all nine power problems: power failure, power sag, power surge, undervoltage, overvoltage, switching transient, line noise, frequency variation and harmonic distortion. It ensures a consistent quality of power supply regardless o ...
BDTIC www.BDTIC.com/infineon  Power Management and Multimarket
BDTIC www.BDTIC.com/infineon Power Management and Multimarket

... 5 V/µs. This condition is met during an ESD event, but might also occur if the LED driver gets hotplugged into a power supply and the VS blocking capacitor has a too small capacitance. ESD protection will remain triggered as long as the slewrate condition is met. If the ESD protection gets triggered ...
ver6_0-wip2_diff_working2
ver6_0-wip2_diff_working2

... 9. The I-V data tables should use enough data points around sharply curved areas of the I-V curves to describe the curvature accurately. In linear regions there is no need to define unnecessary data points. 10. The use of tab characters is legal, but they should be avoided as much as possible. This ...
Intrinsically safe input circuit
Intrinsically safe input circuit

Stakeholder Comment and Rationale Form  AESO AUTHORITATIVE DOCUMENT PROCESS Stakeholder Consultation Draft
Stakeholder Comment and Rationale Form AESO AUTHORITATIVE DOCUMENT PROCESS Stakeholder Consultation Draft

... market participant or a pool participant, as the case may be, duly appointed and authorized to act on behalf of and bind that person with regard to other ISO activities, procedures and ...
< 1 ... 13 14 15 16 17 18 19 20 21 ... 1306 >

Immunity-aware programming

When writing firmware for an embedded system, immunity-aware programming refers to programming techniques which improve the tolerance of transient errors in the program counter or other modules of a program that would otherwise lead to failure. Transient errors are typically caused by single event upsets, insufficient power, or by strong electromagnetic signals transmitted by some other ""source"" device.Immunity-aware programming is an example of defensive programming and EMC-aware programming. Although most of these techniques apply to the software in the ""victim"" device to make it more reliable, a few of these techniques apply to software in the ""source"" device to make it emit less unwanted noise.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report