Products & Services

See also: Categories | Featured Products | Technical Articles | More Information
Page: 1

Conduct Research Top

  • Code Design for Dependable Systems - Preface
    expressed and studied using generator polynomials. In this book,. the former codes are called matrix codes and the latter polynomial codes. So far,. traditional coding theory has been studied mainly using code generator polynomials. We. emphasize that the linear codes expressed in polynomials can always
  • Cyclic Redundancy Code (CRC)
    obtained when M is divided by G. INTRODUCTION CRC is one of the most versatile error checking EQUATION 1: algorithm used in various digital communication M = G * Q + R systems. CRC stands for Cyclic Redundancy Code Check or simply Cyclic Redundancy Check. M + R = GQ = M - R Since addition
  • Morse Code Signalling Simulation on 2030/40 Series Avionics Signal Generators (.pdf)
    The ILS Localizer and VOR beacons have super-imposed on the transmitted signal a three letter Morse code signal to identify the transmission source. For instance, a beacon located at London Heathrow uses the code LHR. En-route VOR beacons use codes that identify their locations as detailed
  • Using KEELOQ (R) to generate Hopping Passwords
    The purpose of this application note is to demonstrate how KEELOQ (R) code hopping technology can be conveniently employed to implement an automatic code hopping password generator/keypad. Using a PIC12C508, the hopping code produced by an HCS300 is converted to a string of 16 hex digits
  • Lockheed Martin Puts Pilots in the Picture With AC&E Linux Cluster
    to AC&E was to develop a Linux cluster for Lockheed Martin's Warhead and CAMEO-SIM development teams. The Warhead team uses a shockwave physics computer code, CTH, to simulate high-speed impact and penetration. CAMEO-SIM is computationally intensive synthetic scene generator developed by Lockheed
  • Rotary encoders for motors
    Constant-speed ac-induction motors don't really hold a constant speed. In an optical encoder, an LED typically shines light through a code disk and mask to illuminate a photodetector assembly. The slots in the disk and mask form a shutter that passes or blocks the light beam as the code disk
  • Data Encryption Routines for PIC24 and dsPIC Devices
    that they were able to crack a DES code within days. FIGURE 1: ORIGINAL DES ALGORITHM Plaintext Key IP Permutation Left Half E PermutationRight Half Subkey Generator -1 IP Permutation

More Information Top

Lock Indicates content that may require registration and/or purchase. Powered by IHS Goldfire