• Study Resource
  • Explore Categories
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Solutions - University of California, Berkeley
Solutions - University of California, Berkeley

underground cable fault distance locator
underground cable fault distance locator

F re esca le S em ic onduc to r, I nc
F re esca le S em ic onduc to r, I nc

`gold tone` ga-15rv
`gold tone` ga-15rv

Solenoids - Johnson Electric
Solenoids - Johnson Electric

... the voltage generated is not useful in a typical solenoid circuit. In most cases, voltages of that great a magnitude would be damaging if not correctly suppressed. Damage can appear as a transfer of material, to welding of hard contacts, to destruction of the switching transistors junction, to even ...
8mD2884 Data Sheet
8mD2884 Data Sheet

... The 8mD series of inverters is designed to power one cold cathode fluorescent tube with four watts. An external analog control interfaces with an onboard pulse width modulator to provide dimming control. The 8mD inverter can reliably dim to less than 5% duty cycle. External shutdown of the inverter ...
FSB50250UTD Motion SPM 5 Series ®
FSB50250UTD Motion SPM 5 Series ®

ECE 6332: VLSI Design Project Review 1 Chunhu Zhang and Yu
ECE 6332: VLSI Design Project Review 1 Chunhu Zhang and Yu

... Three common RNGs are discussed: 1. Direct Amplification; 2. Oscillator Sampling; 3. DiscreteTime Chaos. A new RNG is proposed which combine the advantages of these methods. The direct amplification method (1) has some intrinsic drawbacks in that it is more vulnerable to the nonrandom influences cou ...
Lab 2: Circuit Simulation
Lab 2: Circuit Simulation

... an ideal diode, which turns on (allows current to pass through it) at 0 V, and exhibits no voltage drop when current passes through it. The diode only allows positive current to flow, so negative current will be zero. Thus, if we plot the circuit output across R2, we get the result in Figure 3. The ...
Resume Descriptors - SWC
Resume Descriptors - SWC

... diodes and the screws which fasten the panel to the base. To view a Flickr album of photographs and a circuit schematic, please visit www.swcelectronics.com > projects > winker-blinker. Constructing the Tree electronic and woodwork project, including an original Baltic birch plywood clock or box des ...
Objective : Equipments Needed : Theory
Objective : Equipments Needed : Theory

... Note : 1. Regulated output voltage might be slightly higher than the expected voltage due to tolerance of Zener diode. ...
Wireless Timing Network WTN-WS - ALGE
Wireless Timing Network WTN-WS - ALGE

User manual CaveMap v0
User manual CaveMap v0

... NB! If you choose Change. And then select a new log file or stay at current log file. The index will always reset to 0. BUT NOR THE OLD OR THE NEW FILE ARE DELETED. No data is lost, data is just appended if the file already contains data. #7 Change the index (measure nr.) Undo index 003? Undo will s ...
Gates and Circuits - SIUE Computer Science
Gates and Circuits - SIUE Computer Science

... Notice that the sum bit always yields the same result as the XOR operation, and the carry bit always yields the same result as the AND operation! By combining the right circuitry, then, multiple-bit addition can be implemented, as well as the other arithmetic operations. ...
Simple Structure Balanced Differential Element
Simple Structure Balanced Differential Element

... Need control schemes (direct or indirect) – adds significant amount of control overhead ...
ADS8515 数据资料 dataSheet 下载
ADS8515 数据资料 dataSheet 下载

... Digital supply input. Nominally +5 V. Connect directly to pin 27. Must be ≤ VANA. ...
EXPERIMENT #2: DC Circuits EXPERIMENT #2: DC Circuits and
EXPERIMENT #2: DC Circuits EXPERIMENT #2: DC Circuits and

... We will discuss specific equipment found in the ECE 110 Lab. Keep in mind that while each piece of equipment can come in different shapes and forms based on the manufacturer and the model number, the basic principle of operation remains the same. The next few lab meetings will continue to build your ...
7. Signal Conditioning in Oscilloscopes and the
7. Signal Conditioning in Oscilloscopes and the

... shows one way in which these and the many additional requirements of Figure 7-1 can be met (Rush 1986). A silicon field effect transistor (FET) acting as a source follower is the only type of commercially available device suitable for implementing the impedance converter. For 500MHz instruments, we ...
Evaluates: MAX187 MAX187 Evaluation System/Evaluation Kit _______________General Description ___________________________Features
Evaluates: MAX187 MAX187 Evaluation System/Evaluation Kit _______________General Description ___________________________Features

... 1) Copy the files from the distribution disk to your hard drive or to blank floppy disks. Store the MAX187 EV kit software in its own directory to prevent conflicts with other Maxim EV kit files. The necessary files are in the root directory of the distribution disk, and ancillary files are located ...
Using the Pololu 5V, 9A Step-Down Voltage
Using the Pololu 5V, 9A Step-Down Voltage

Decreasing the output voltage
Decreasing the output voltage

Template Tips
Template Tips

... 1200ZE device (Digi-Key Part number 220-1298-ND), it has been replaced by a 7000HE device (DigiKey Part number 220-2625-ND). This design will work with either device. The Newhaven chip on glass display (Digi-Key Part number NHD-C12864LZ-FSW-FBW-3V3-ND) is interfaced through a custom board with a cap ...
Physiological Monitor for the Prevention of Heat-Related Injuries
Physiological Monitor for the Prevention of Heat-Related Injuries

... community. As a starting point we will use the information that sweat contains between 2.253.4 grams of sodium [8]. Hypernatremia is a condition in which the level of sodium in the body is too low and this can result to a range of problems from headaches and nausea to serious health problems such as ...
What is a Logical Node?
What is a Logical Node?

Dual Compressor / Limiter
Dual Compressor / Limiter

< 1 ... 878 879 880 881 882 883 884 885 886 ... 1306 >

Immunity-aware programming

When writing firmware for an embedded system, immunity-aware programming refers to programming techniques which improve the tolerance of transient errors in the program counter or other modules of a program that would otherwise lead to failure. Transient errors are typically caused by single event upsets, insufficient power, or by strong electromagnetic signals transmitted by some other ""source"" device.Immunity-aware programming is an example of defensive programming and EMC-aware programming. Although most of these techniques apply to the software in the ""victim"" device to make it more reliable, a few of these techniques apply to software in the ""source"" device to make it emit less unwanted noise.
  • studyres.com © 2026
  • DMCA
  • Privacy
  • Terms
  • Report