Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Add to Favorite Get Latest Update


Lin Kaiyun(Changchun Univ,of earth Sciences, Changchun 130026)  
Recently,when studying the single Chip computer 8098 controlled floopydiskette driver,the author studies IBM PC/XT floopy diskette controller(FDC)interfacecard carefully.The two main parts,the write pre compensation and the data separationcircuits,re complicate and difficuIt to transplant.So the author researches two newcircuits to replace them. The thory for the new circuits is concise,The data separationcircuits is easy to transplant and its designing idea is practical.It can be applied to othercircuits,The article analyses the two new circuits thoroughly and gives a complete timingdiagram about data separation circuits.
【CateGory Index】: TP368.1
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 10 Hits
1 MA Xiao yan 1) HUANG De jin 2) YANG Dao yuan 1) ( 1)Department of Computer, Beijing University of Chemical Technology, Beijing 100029, China; 2)Haojiang middle of school, Macao, China);Method of making and discriminating fingerprint[J];JOURNAL OF BEIJING UNIVERSITY OF CHEMICAL TECHNOLOGY;2000-01
2 Qin Peixia(Management College,DMU);The program for disk file encryption[J];Journal of Dalian Maritime University;1994-03
3 Gao Yan, Meng Guiying (Dept. of Auto., Dalian Inst. of Light Ind., Dalian, China, 116034);Executable File with Password[J];JOURNAL OF DALIAN INSTITUTE OF LIGHT INOUSTRY;1998-03
4 Chen Yaliang;Secondary Development of Software Package for ML 3200 Floppy A Simple Method of Setup Command for Disk[J];COMPUTER DEVELOPMENT & APPLICATIONS;1998-03
5 Yan Dongmei Gao Jingyang An Lixin (Liaoning Technical University,Fuxin,China);A New Idea about How to Encrypt a Disk File to Circumvent Deerypt-Tools[J];Journal of Liaoning Technical University;1998-02
6 Ban Shibing (Dept. of physics. Guangxi University for Nationalities, Nanning. 530006);A Practical Way of Modify commands can secret a file[J];Journal of Guangxi University For Nationalities(Natural Science Edition);1997-01
7 Dong Yongqiang (North Automatic Control Technology Institute,Tai Yuan 030006);A Software Encryption Method for Fire Control Systems[J];FIRE CONTROL & COMMAND CONTROL;1999-03
8 Zhang Jianqiang(Computer Center, Huaqiao Univ., 362011,Quanzhou);Automation of Customer information Control System for theUse of Computer Centers in Universitites and Colleges[J];JOURNAL OF HUAQIAO UNIVERSITY(NATURAL SCIENCE);1996-03
9 Liao Jinming(of fice of Ji' an Teachers Colege, Ji' an 343009)Wei Simin(Dept. of Computer Science, Ji' an Teachers' College, Ji' an 343009 );On the Diskette Using as the Date Memory of the Chip Microprocessor[J];Journal of Jinggangshan Normal College;1996-06
10 QING Xiao bin 1, LUO De wa 2 (1.Hunan Normal University Department of Computer Education,Chang sha 410081,China; 2.The Zhuhai TeleCom Office,Zhuhai 519000,china);A Method for Maximize the Effectiveness of Maintaining the Software System of Local Hard Drive within Computer Network Lab[J];COMPUTER AND MODERNIZATION;2000-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved