Home > CL6 > CL680-T128
CL680-T128 Datasheet |
Part No. : CL680-T128
Description : 一)\CL2 (两只脚的 90V 20mA LED Driver): 特点: u5V to 90V 的工作电压 (Va-b) u20mA 的恒流源±10% uTO-243AA (SOT-89) 的封装 u可供选用的 TO-252 (D-PAK)封装 u无需外部元件 应用范围:工业指示灯,护栏灯,杯灯,灯串,恒流源 CL6和CL7:(100mA恒流源) CL6和CL7是CL2的高电流版本,主要用在汽车灯,杯灯。 二)\LR8 / LR12 特点: u宽输入电压:13.2V - 450V DC u不需要磁性元件u低成本 , 外围元件极少u串联 LED 驱动的理想选择 u辅助电源,LED灯串 LR8 & LR12的区别: LR8: 13.2- 450V, <10mA 三)\三只脚的HV9921/22/23恒流源 HV9921/22/23特点: 仅5个外围元件 全球通用的输入电压:85~265VAC HV9921: 20mA HV9922: 50mA HV9923: 30mA 效率高达80% 适用于:射灯,小功率的装饰灯. 四)\HV9925(可调光的恒流源) 特点: 1.90~264VAC输入 2.输出电流50mA MAX 3.输出电流可调,可设定 4.具有过温保护 应用: 装饰灯,小功率灯具 五)\SR08x控制器:(不要高压电容和磁性元件) SR086 & SR087双输出电源管理 ,特性: • 输入:90-270V AC • 不要高压电容和磁性元件• 简洁,低成本,外围元件少 • 高效率,输出电压可调• VREG 输出3.3 / 5v能提供给MCU用。 • VOUT输出能驱动LED or 做电池充电用• 具有软启动。 我司专业代理美国Supertex产品:白光LED照明驱动IC. LED交通灯, 背光源驱IC.超声波医疗设备. 议器议表专用IC 及MOSFET管等及CREE(美国独家专利碳化硅芯片) 高压肖特基(600V/1200V以上)产品和阿诺(ARNOLD) 铁硅铝磁粉环(芯),如果没有特殊说明supertexc产品均为今年以上环保产品.随时可以提供样品.欢迎来电咨询! 谢! www.jarwey.com 13316866350王先生
Download : CL680-T128 Click to Download
Page Number : 4
Manufacturer :
File Size : 273 Kb

CL680-T128 Article About

Some of the most annoying spyware software: automatic dialing software, home page hijacking and other malicious software, the software will install themselves as ActiveX controls. Spyware Blaster can protect the PC from them, and to prevent malicious software and other types of spyware ActiveX controls through form to install and remove tracking nature of the cookie, so as to avoid disclosure of privacy. The program can be used with Firefox, Opera or IE and other browsers work, and to prevent the browser jump to the dangerous sites. A special feature is the practical utility System Snapshot, which snapshot was taken for PC, so if the computer was infected, so are able to return to a clean version.
Interconnection to ensure application data is exchanged to reach the network isolation since, must be thorough to prevent attacks based on network protocols, that can not let the attack packets reach the network layer to protect the network, so they must be protocol analysis, complete the application layer data extraction, and data exchange, which took as TearDrop, Land, Smurf and SYN Flood attacks and other network packets, completely blocked in the trusted network, thereby significantly enhancing the security of the trusted network sex. Access to the interconnection to strict control and inspection as a set for high security network security devices, to ensure that each exchange of data are credible and can be controlled strictly to prevent the emergence of illegal channels to ensure security and access information data auditability. Therefore, we must impose a certain technology to ensure that every data exchange process is credible, and content is controlled, can be session-based authentication technology and content analysis and control of the engine and other technologies.

All rights reserved:iceach.com © 2000-2010 Certificate No.:Guangdong ICP No.08108781