10 Questions 181 Answers 0 Followers
Questions related from Mark Sitkowski
The way SPICE handles transformers has had a lot of bad press. This has had the effect of too many researchers giving up at the first hurdle, and producing models which contain no inductors, work...
16 July 2021 4,875 3 View
We have an application which converts a netlist into a schematic drawing. It works fine, except the result is extremely ugly. We would like to know if anyone can write a place-and-route algorithm...
05 March 2021 3,146 10 View
We have updated the preprint shown below Laplace Transfer Function Simulation in SPICE We have added a section on the simulation of control systems, with specific reference to PID...
04 April 2020 6,709 0 View
We would appreciate someone installing our authentication system, and giving us feedback on various aspects like ease of installation, user experience, bugs (hopefully, none...). We will give you...
15 January 2020 1,028 6 View
Laplace Transfer Function Simulation in SPICE I've rewritten the original paper, by adding all the backgroumd theory, together with worked examples and netlists, but questions remain. Perhaps...
16 February 2019 5,977 2 View
I've just got my electricity bill, and seen the breakdown of what we used and what our solar installation fed back into the grid. Frankly, it made the self-congratulatory effusions of the power...
02 February 2019 4,777 3 View
The Fourier Transform is a useful tool, which can perform many useful functions. This paper attempts to define the parameters which must be set correctly to enable it to produce satisfactory...
07 December 2018 1,576 0 View
People in the cybersecurity business keep saying that a password is dreadfully insecure, that someone can look over your shoulder and steal it, or they can listen to your communication with the...
26 October 2018 3,993 3 View
Encrypting sensitive data in a database is as secure as the Security by Obscurity applied to the hiding of the encryption keys. Whatever scheme is used, at the end of the chain of obscurity the...
05 September 2018 5,826 1 View
Almost every properly configured commercial system will have only one TCP/IP port open to the Internet: Port 80. Since this is the only way into the system, hackers will try many different ways to...
04 September 2018 3,048 7 View