13 Questions 198 Answers 0 Followers
Questions related from Mark Sitkowski
The way SPICE handles transformers has had a lot of bad press. This has had the effect of too many researchers giving up at the first hurdle, and producing models which contain no inductors, work...
16 July 2021 4,928 3 View
We have an application which converts a netlist into a schematic drawing. It works fine, except the result is extremely ugly. We would like to know if anyone can write a place-and-route algorithm...
05 March 2021 3,197 10 View
We have updated the preprint shown below Laplace Transfer Function Simulation in SPICE We have added a section on the simulation of control systems, with specific reference to PID...
04 April 2020 6,765 0 View
We would appreciate someone installing our authentication system, and giving us feedback on various aspects like ease of installation, user experience, bugs (hopefully, none...). We will give you...
15 January 2020 1,085 6 View
Laplace Transfer Function Simulation in SPICE I've rewritten the original paper, by adding all the backgroumd theory, together with worked examples and netlists, but questions remain. Perhaps...
16 February 2019 6,027 2 View
I've just got my electricity bill, and seen the breakdown of what we used and what our solar installation fed back into the grid. Frankly, it made the self-congratulatory effusions of the power...
02 February 2019 4,837 3 View
We discuss the programmatic aspects of more efficient ways to implement tasks such as database access, message queuing, dynamic memory use, hash tables, inter-process communication and we add a...
31 January 2019 8,442 3 View
The Fourier Transform is a useful tool, which can perform many useful functions. This paper attempts to define the parameters which must be set correctly to enable it to produce satisfactory...
07 December 2018 1,633 0 View
Data acquisition systems, and those which monitor the continuously changing value of a parameter, do so for a variety of applications. Among these is statistical analysis, where the objective is...
15 November 2018 9,808 3 View
People in the cybersecurity business keep saying that a password is dreadfully insecure, that someone can look over your shoulder and steal it, or they can listen to your communication with the...
26 October 2018 4,065 3 View
Encrypting sensitive data in a database is as secure as the Security by Obscurity applied to the hiding of the encryption keys. Whatever scheme is used, at the end of the chain of obscurity the...
05 September 2018 5,880 1 View
Proving who you are is becoming more and more important, now that almost every transaction is conducted over a hostile and malevolent Internet. Using your face as a password (and, also a User ID)...
05 September 2018 1,722 8 View
Almost every properly configured commercial system will have only one TCP/IP port open to the Internet: Port 80. Since this is the only way into the system, hackers will try many different ways to...
04 September 2018 3,102 7 View