eikieeep

积分:270
上传文件:14
下载次数:519
注册日期:2014-10-27 15:54:43

上传列表
BC546-BC547-BC548.rar - It is NPN General Purpose Transistors which can be used in circuit designing. All the specifications are mentioned in it.,2015-03-22 01:09:36,下载1次
28BYJ-48.rar - IT is four step stepper motor data sheet. It contains all the required data of this motor. ,2015-03-22 01:07:50,下载2次
ZU212409413.rar - Smart home is a house that uses technology to monitor the environment with the help of various sensors, control the electrical appliances and communicate the outer world. Now-a-days the demand for home automation systems in homes and offices are invariably increasing. The home automation system is a key for energy conservation that can be equipped in normal buildings. As there are many benefits of wireless technology over wired, most of the home automation systems are based on the WSN technology. In this paper we present the design and implementation of a smart home based on LabVIEW using wireless sensor network system. The system can monitor the temperature, light, fire & burglar alarm of the house and have infrared sensor to guarantees the family security. The monitored data is automatically stored into an excel file. The system can be connected to internet to monitor the security of home anywhere in the world.,2015-03-22 01:05:55,下载1次
ATmega16A.rar - High-performance, Low-power Atmel AVR 8-bit Microcontroller 􀁺 Advanced RISC Architecture ̶ 131 Powerful Instructions – Most Single-clock Cycle Execution ̶ 32 x 8 General Purpose Working Registers ̶ Fully Static Operation ̶ Up to 16MIPS Throughput at 16MHz ̶ On-chip 2-cycle Multiplier 􀁺 High Endurance Non-volatile Memory segments ̶ 16KBytes of In-System Self-programmable Flash program memory ̶ 512Bytes EEPROM ̶ 1KByte Internal SRAM ̶ Write/Erase Cycles: 10,000 Flash/100,000 EEPROM ̶ Data retention: 20 years at 85°C/100 years at 25°C(1) ̶ Optional Boot Code Section with Independent Lock Bits 􀁺 In-System Programming by On-chip Boot Program 􀁺 True Read-While-Write Operation ̶ Programming Lock for Software Security,2015-03-22 01:03:56,下载2次
Sound-Voice-Activated-Relay-Switch.rar - This mini-VOX - voice operated relay - is based on a circuit published in Silicon Chip, 9/1994, p31. We have improved it by putting an on-board Koa potentiometer in order to adjust the sensitivity. The idea behind a VOX is that instead of the user pressing a switch to activate a relay, the sound of the users voice itself activates the relay. This gives hands-free control over devices like lights and tape recorders. Relay stays on for 1 or 5 seconds (depending on components used) then shuts off. Different time values can be realized by using different value components (read k126.pdf for more information).,2015-03-22 00:56:57,下载1次
Quad-Copter.rar - The military use of unmanned aerial vehicles (UAVs) has grown because of their ability to operate in dangerous locations while keeping their human operators at a safe distance. The larger UAVs also provide a reliable long duration, cost effective, platform for reconnaissance as well as weapons. They have grown to become an indispensable tool for the military. The question we posed for our project was whether small UAVs also had utility in military and commercial/industrial applications. We postulated that smaller UAVs can serve more tactical operations such as searching a village or a building for enemy positions. Smaller UAVs, on the order of a couple feet to a meter in size, should be able to handle military tactical operations as well as the emerging commercial and industrial applications and our project is attempting to validate this assumption.,2015-03-22 00:44:47,下载1次
LM35-Temperature-Sensor-in-Proteus.rar - The LM35 series are precision integrated-circuit temperature devices with an output voltage linearly-proportional to the Centigrade temperature. The LM35 device has an advantage over linear temperature sensors calibrated in Kelvin, as the user is not required to subtract a large constant voltage the output to obtain convenient Centigrade scaling. The LM35 device does not require any external calibration or trimming to provide typical accuracies of ±¼ °C at room ,2015-03-22 00:40:34,下载3次
ZIGBEE-WIRELESS-METER.rar - An electric meters are used everywhere to calculate the consumption of power. Wireless meter reading technology can save human resources and another feature of this kind of meter is, it improve the accuracy since it works on real time application, enabling management sector to access to data messages within a short period of time and accurately. Due to its wireless communication network, it just not save human and material resources but this property leads to most economical meter in terms of investment. In this paper, power consumed by the consumer is monitored by base stations through wireless network. It aims to reduce the man power for billing since the meter reading is transmitted through ZigBee and at base stations we calculate bill, save records of consumers. The most important part of this project is that we can monitor any fault in meter as well as any tempering which is used to steal the electricity.,2014-10-27 16:20:53,下载3次
Monitoring-And-Controlling-Unit-for-Substation.ra - Power theft problem now days causes huge loss to electricity board , it is necessary to prevent so that a lot of power can be saved. This paper determines the greatest opportunity for energy savings by continuously monitoring and controlling power theft the electric meter by taking readings it . The normal practice for power theft is to short the input and output terminals or to place magnet on the wheel in case of old meters.By wireless power theft monitoring it is possible to sense the current flow through the line & energy feedback using a circuit breaker.,2014-10-27 16:18:39,下载1次
amratheftdetection.rar - Power theft problem now days causes huge loss to electricity board , it is necessary to prevent so that a lot of power can be saved. This paper determines the greatest opportunity for energy savings by continuously monitoring and controlling power theft the electric meter by taking readings it . The normal practice for power theft is to short the input and output terminals or to place magnet on the wheel in case of old meters.By wireless power theft monitoring it is possible to sense the current flow through the line & energy feedback using a circuit breaker. This system prevents the illegal usage of electricity, which can be solved automatically without,2014-10-27 16:16:17,下载1次
CAMSAM_05_TUI.rar - If SDMA is used on the downlink of a multi-user MIMO system, either long-term or short-term channel state information has to be available at the base station (BS) to faciliate the joint precoding of the signals intended for the different users. Precoding is used to efficiently eliminate or suppressmulti-user interference (MUI) via beamforming or by using ”dirty-paper” codes. It also allows us to performmost of the complex processing at the BS which leads to a simplification of the mobile terminals. In this paper, we provide an overview of efficient linear and non-linear precoding techniques formulti-userMIMO systems. The performance of these techniques is assessed via simulations on statistical channelmodels, and on channels generated by the IlmProp, a geometry-based channel model that generates realistic correlations in space, time, and frequency.,2014-10-27 16:14:21,下载5次
Aprox_MU_MIMO_Q_model.rar - The model is built upon the assumption that the probabil- ity distribution of available destinations among the bu ered frames at the Base Station (BS) is approximately the same as the probability distribution of the trac arriving to the BS, this is, the amount of trac directed to each MN with respect to the total trac load. This assumption leads to a simple, but accurate, queueing model for Multi- user MIMO systems that accounts for the impact of a nite number of active MNs in non-saturated conditions. The model is easily applicable to any Multi-user MIMO scenario given that the probability density function of the post-processing SINR (Signal to Interference and Noise Ratio) for each MN is known.,2014-10-27 16:13:10,下载1次
024_pp--827-832.rar - The MU-MIMO channel put forward by SAMURAI is based on the well established WINNER II GSCM [5]. We present an analysis of this model wrt its ability to model MU-MIMO channels correctly and propose some improvements to the original model. The model has also been implemented in C and will be used for further system level simulations.,2014-10-27 16:07:06,下载6次
0c960529d0bbee8482000000.rar - This deliverable is the final deliverable of workpackage 3 “MU-MIMO in practice”. It builds on the previous deliverables D3.1 and D3.2 and includes results tasks 3.2 on channel modelling for MU-MIMO (Note that this task has been extended to month 24) and task 3.3 on the implementation of the selected MU-MIMO algorithms on the OpenAirInterface development platform.,2014-10-27 16:04:46,下载4次

近期下载

收藏