-
shuangxiangDC-DCbianhuanqi
以双向DC-DC变换器为例,通过双向控制模型的分析,采用PID 补偿环节的单电压闭环实现了BDC系统闭环稳定。(Bi-directional DC-DC converter, for example, through the analysis of the two-way control model, the single-voltage closed-loop PID compensation link to achieve a the BDC system closed-loop stable.)
- 2013-03-09 22:41:48下载
- 积分:1
-
61EDA_B95
开发板原理图 自己可以设计开发板为什么一定要买呢(Development board schematic can design their own development board why they must buy it)
- 2008-12-09 15:58:55下载
- 积分:1
-
sap_apo
SAP Advanced Planning and Optimization
- 2010-11-10 03:35:16下载
- 积分:1
-
11radar-dianji
雷达点迹预处理技术,非常有用,硕士论文,介绍了点迹凝聚,野值剔除等(Radar trace points pretreatment technology is very useful, master' s thesis, introduces trace points cohesion, excluding outliers, etc.)
- 2021-03-02 23:59:33下载
- 积分:1
-
ASP_NETAJAX
ASP_NETAJAX在Web开发中的应用
- 2009-02-24 10:40:59下载
- 积分:1
-
D_algorithm_2
组合电路测试中的D算法论文2,便于大家习D算法相关的内容!(Combination of circuit testing algorithm D thesis 2, easy to learn U.S. D algorithm relevant content!)
- 2009-04-05 16:20:53下载
- 积分:1
-
no-person-drive-car
中设计的无人驾驶电动汽车(图1)是集无人驾驶技术、
四轮独立电驱动技术和底盘电子控制技术于一体的智能电动
汽车
(In the design of unmanned electric vehicles (Figure 1) is a driverless technology, four-wheel independent electric drive technology and chassis electronic control technology in one of the smart electric vehicles)
- 2011-11-26 13:35:10下载
- 积分:1
-
Mach3中文手册
cnc windows 中文翻译, 工程案例(cnc windows cnc windows)
- 2018-06-12 08:31:27下载
- 积分:1
-
huffman_impl_1839
还有一篇关于音频动态范围压缩的相关珍贵论文,这是一个很实用但是又很少有人关注的领域,希望对大家有帮助!(Have an audio dynamic range compression on the relevance of valuable papers, it is a very pragmatic but also very few areas of concern, and they hope to have everyone help!)
- 2009-03-30 10:03:25下载
- 积分:1
-
vm
说明: Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technology,
an audio watermarking algorithm is proposed where
the low-frequency wavelet coefficients are chosen for
cepstrum transforming. Then, the obtained cepstrum
data shows stable for watermark hiding by the
methods of edging data cutting and statistical mean
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for the mobile
audio in secure broadcast and management in the
- 2010-02-05 01:56:27下载
- 积分:1