共查询到10条相似文献,搜索用时 109 毫秒
1.
TTL JK边沿触发器在CP脉冲边沿会出现输出状态异变现象.本文分析了异变的原因,提出了对CP脉冲上升时间和下降时间的要求条件. 相似文献
2.
确定非正常触发主从JK触发器次态的一种简单方法 总被引:1,自引:0,他引:1
通过对非正常触发时主从JK触发器可能出现的工作波形的详细分析,归纳出了非正常触发时确定主从JK触发器次态的简单方法。 相似文献
3.
4.
Modern mobile networks, such as GPRS and UMTS, support wireless data applications. One successful example is the ever popular i-Mode in Japan. Wireless data services (wireless Internet) become more important as more and more customers of handheld devices enjoy the convenience of the ubiquitous computing. To improve the effective wireless data access, the time-to-live (TTL) management for data entries becomes important due to its use in effective caching design. In this paper, we study three TTL prediction schemes and investigate the effects of the inter-update time distribution on the wireless data access. Performance analysis is carried out via simulations as well as analytical modeling. We expect our results will be useful for the future wireless data access systems, in which transmission power for mobile devices is more limited. 相似文献
5.
With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.,has also introduced new security problems especially the data security and privacy issues.Firstly,the background and challenges of data security and privacy-preserving in edge computing were described,and then the research architecture of data security and privacy-preserving was presented.Secondly,the key technologies of data security,access control,identity authentication and privacy-preserving were summarized.Thirdly,the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.Finally,some potential research points of edge computing data security and privacy-preserving were given,and the direction of future research work was pointed out. 相似文献
6.
本文研究了高处坠落事故的原因、规律以及伤害的特点。利用AHP法建立了高处坠落防控层次结构模型,确定了加大安全资源投入是避免高处坠落事故发生的最优先方案。通过分析得出,作业前召开班前会识别风险、开展高处作业专项培训和属地负责人组织安全检查是相对优良的具体防控措施。 相似文献
7.
在高校的《数字电路》课程教学中,通常要对分立NPN晶体管和TTL门电路的低电平输出近饱和、饱和以及退饱和状态进行讲解,其中出现了貌似矛盾的现象。本文给出了两种情况下的比较分析,力图廓清对它们模棱两可的理解,并尝试给出了“被动饱和”与“主动饱和”两个新概念,建议了更为合理的饱和深度的定量表达式,以期对相关的教学以及教材编写起到积极的作用。 相似文献
8.
9.
给出了一种边缘粗糙度(LER)三维参数评估的方法。采用原子力显微镜(AFM)测量了刻线单侧边缘形貌,根据AFM的工作机理和测量特点重构边缘表面,采用回归分析方法确定了边缘表面的评价基准面。结合集成电路中光刻工艺的具体需求,提出了能够反映边缘表面形貌特征的三维LER表征参数。结合实例,计算了所提出的部分LER参数,分析了LER标准差参数的测量精度。 相似文献