资源列表
[文件格式] 1
说明:摘要:基于单片机的数控开关电源是利用单片机实现对开关电源的输出电压设定、输出电压步进调整、输出电压和输出电流显示等数字控制。本文设计的数控开关电源由两部分组成。开关电源部分采用基于PWM控制的不对称半桥功率变换器,由模拟控制芯片KA3525产生PWM信号经驱动电路实现对功率变换电路的输出电压控制,实现电压的稳定输出。数控部分采用凌阳单片机的D/A输出对KA3525的误差比较器的参考端进行数字给定,实现对输出电压的设定、步进调整和显示等功能。文中给出了系统设计框图,对各部分电路进行了分析,并给出了<徐楠> 在 2025-11-21 上传 | 大小:137kb | 下载:0
[软件工程] Contact-src
说明:一份Android通讯录的源码实例! -Android source code example of an address book! Android source code example of an address book!<Joe> 在 2025-11-21 上传 | 大小:70kb | 下载:0
[行业发展研究] AstronomicalPhysics
说明:太空物理学 本文简单介绍了太空物理学的研究内容、研究目的和意义、研究特点、发展趋势和未来研究 热点。-Of space physics, space physics paper simply introduces the study, consider the purpose and significance to study the characteristics, development trends and future research focus.<Akbarjan> 在 2025-11-21 上传 | 大小:191kb | 下载:0
[软件工程] CP210x_Drivers
说明:关于UART口转USB口方面的硬件芯片技术资料以及相关线路-UART port on the switch to USB port in the hardware chip technology data and related lines<是量> 在 2025-11-21 上传 | 大小:172kb | 下载:0
[编程文档] CloneDetection-ICDCS2008
说明:In this paper, we propose a novel scheme for detecting clone attacks in sensor networks, which computes for each sensor a social fingerprint by extracting the neighborhood characteristics, and verifies the legitimacy of the originator for eac<sireine> 在 2025-11-21 上传 | 大小:182kb | 下载:0
[行业发展研究] pranay_thesis
说明:In this thesis we have concentrated on energy consumption issue and aim to develop an energy efficient data aggregation protocol. To provide energy efficiency we have considered a cluster-based wireless sensor network.<sireine> 在 2025-11-21 上传 | 大小:507kb | 下载:0
[行业发展研究] securecomm06b
说明:In this paper, we propose an application-independent fr a mework for identifying compromised sensor nodes. The fr a mework provides an appropriate abstraction of application-specific detection mechanisms, and models the unique properties of s<sireine> 在 2025-11-21 上传 | 大小:106kb | 下载:0
[行业发展研究] sensors-09-03958
说明:We propose a trust-based decision fr a mework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad<sireine> 在 2025-11-21 上传 | 大小:713kb | 下载:0