Infrared pointing type wireless controller
    1.
    发明授权
    Infrared pointing type wireless controller 失效
    红外指向型无线控制器

    公开(公告)号:US5952996A

    公开(公告)日:1999-09-14

    申请号:US678032

    申请日:1996-07-10

    摘要: An infrared pointing type wireless controller includes a system main body which is an objective of pointing, the system main body having transmitting circuit for generating a carrier frequency signal for emitting an infrared ray, and receiving and controlling circuit for receiving a reflected carrier signal and a reflected code signal, and calculating coordinates of a pointed position according to a difference of intensities of received infrared signals, for matching the pointed position to a display screen; and position indicating circuit with which pointing is performed having re-transmitting circuit for passing or blocking reflection of the carrier frequency signal transmitted from the transmitting circuit for generating a required code, and overlapping the code with the carrier frequency signal and reflecting the overlapped signal.

    摘要翻译: 红外指示型无线控制器包括作为指向的目标的系统主体,系统主体具有用于产生用于发射红外线的载波频率信号的发送电路,以及用于接收反射载波信号的接收和控制电路,以及 反射码信号,以及根据所接收的红外线信号的强度差来计算指示位置的坐标,以将所述指示位置与显示画面相匹配; 以及位置指示电路,其具有用于通过或阻挡从发送电路发送的用于产生所需码的载波频率信号的反射的再发送电路,并且将码与载波频率信号重叠并反映重叠信号。

    Aggressor classification method for analyzing crosstalk of circuit

    公开(公告)号:US07100125B2

    公开(公告)日:2006-08-29

    申请号:US10457243

    申请日:2003-06-08

    IPC分类号: G06F17/50

    CPC分类号: G06F17/5036

    摘要: Functional and temporal aggressor classification methods that provide increased efficiency and accuracy for classifying aggressor signal lines of an integrated circuit for purposes of analyzing crosstalk of the circuit. In one aspect, an aggressor classification method for analyzing crosstalk of a circuit comprises (a) obtaining CNF (conjunction normal form) clauses of signal lines from a victim to a predetermined signal line and from an aggressor to a predetermined signal line for circuit analysis using a backward search, and obtaining CNF clauses of the victim and the aggressor, and summing up the CNF clauses of the victim and the aggressor to obtain a final CNF clause, (b) obtaining CNF clauses with respect to various cases in which logic values of the victims and aggressors are varied in the final CNF clause, and (c) analyzing the CNF clauses obtained in step (b) to classify aggressors as true or false aggressors, wherein an aggressor is classified as a true aggressor if a result of a given CNF clause has a vector, and classifying an aggressor as a false aggressor if a result of a given CNF clause has no vector.