资源列表

排序选择:

« 1 2 ... .26 .27 .28 .29 .30 217531.32 .33 .34 .35 .36 ... 267452 »

[其他小程序project

说明:IT IS COTROL ROBAT AND MODELLING IT I S COTROL ROBAT AND MODELLING IT IS COTROL ROBAT AND MODELLING-IT IS COTROL ROBAT AND MODELLING IT IS COTROL ROBAT AND MODELLING IT IS COTROL ROBAT AND MODELLING IT IS COTROL ROBAT AND MODELLING
<aaaa> 在 2025-07-29 上传 | 大小:2.94mb | 下载:0

[C#编程CSharp_Demo

说明:led led控制卡二次开发包源代码,有示例程序 C#版本 CSharp C#编程.
<张三> 在 2025-07-29 上传 | 大小:1.37mb | 下载:0

[matlab例程gENETIC_opf

说明:MODIFIED GENETIC ALGORITHM BASED OPF
<SureshVelamuri> 在 2025-07-29 上传 | 大小:45kb | 下载:0

[微处理器(ARM/PowerPC等)BM77_authorize_deviceV5.0_release

说明:BM77蓝牙驱动 BM77蓝牙驱动-BM77 Bluetooth driver
<huangjz> 在 2025-07-29 上传 | 大小:27kb | 下载:0

[界面编程PCA_fusio

说明:used for image fusion application
<kavitha> 在 2025-07-29 上传 | 大小:22kb | 下载:0

[Audioandroid-recorder

说明:android用speex将pcm转aac-Android with the Speex PCM AAC will turn
<jinagkai> 在 2025-07-29 上传 | 大小:354kb | 下载:0

[技术管理7.0

说明:AIT raider trading system 7
<宇宙浪子> 在 2025-07-29 上传 | 大小:15.06mb | 下载:0

[Linux驱动V4l2Camera

说明:基于linux的V4L2编程demo,通过交叉编译之后可以在开发板上正常运行-The V4L2 based linux programming demo, after the adoption of cross-compiler can run in normal development board
<lyq> 在 2025-07-29 上传 | 大小:5kb | 下载:0

[弱点检测代码upload-m

说明:substitution cipher is the method of encoding in which unit of plain text are replaced by cipher text. Monoalphabetic cipher uses a fixed message over entire message.A monoalphabetic cipher uses fixed substitution over the entire message.The monoalph
<mathi> 在 2025-07-29 上传 | 大小:9kb | 下载:0

[弱点检测代码uplod-1

说明:Constant k filters, also k-type filters, are a type of electronic filter designed using the image method. They are the original and simplest filters produced by this methodology and consist of a ladder network of identical sections of passive compone
<mathi> 在 2025-07-29 上传 | 大小:9kb | 下载:0

[软件工程multikey_x64

说明:Multykey 20 x64 for W8.1x x64 for HASP
<Ilya> 在 2025-07-29 上传 | 大小:839kb | 下载:0

[弱点检测代码poly

说明:A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case.Polyalphabetic substitution
<mathi> 在 2025-07-29 上传 | 大小:9kb | 下载:0
« 1 2 ... .26 .27 .28 .29 .30 217531.32 .33 .34 .35 .36 ... 267452 »

源码中国 www.ymcn.org