搜索结果

找到约 10,000 项符合 CAN总线 的查询结果

按分类筛选

显示更多分类

Delphi控件源码 DevExpress.ExpressSideBar.v5.37.for.Delphi.BCB.Full.Source delphi和 bcb源码

DevExpress.ExpressSideBar.v5.37.for.Delphi.BCB.Full.Source delphi和 bcb源码,能轻松实现outlook风格的侧边栏,效果很好,推荐! ExpressSideBar is a VCL implementation of the MS Outlook bar. Designed to be easy to use and built with a significant feature set. Just drop it on a form, double click the ...
https://www.eeworm.com/dl/666/347758.html
下载: 70
查看: 1117

单片机开发 Quality control of production has always been a necessity in stainless steel mills. The users of st

Quality control of production has always been a necessity in stainless steel mills. The users of stainless steel set ever-increasing requirements on product quality. Many material properties can still only be measured in laboratory but more and more measurements are now made on-line during the produ ...
https://www.eeworm.com/dl/648/377163.html
下载: 183
查看: 1073

Java编程 elcome to the Java-Chess project! As you might know, we aim at creating a fully functional chess

elcome to the Java-Chess project! As you might know, we aim at creating a fully functional chess program written in Java 2. You can always get the latest results of our efforts at http://www.java-chess.de If you are interested in the topic and have any skills in the field, you should not hesitate ...
https://www.eeworm.com/dl/633/397046.html
下载: 189
查看: 1085

VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/686/413130.html
下载: 134
查看: 1101

加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption

This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash ...
https://www.eeworm.com/dl/519/413134.html
下载: 97
查看: 1093

Delphi控件源码 FastReport is reporting tool component. It consists of report engine, design

FastReport is reporting tool component. It consists of report engine, designer and preview. It written on 100 Object Pascal and can be installed in Delphi 2-7 and C++Builder 1-6. Also available cross-platform version FR CLX for Delphi ...
https://www.eeworm.com/dl/666/436094.html
下载: 88
查看: 1095

Java编程 THIS CHAPTER INTRODUCES and Java Server Pages (and then presents a simple example to display how to

THIS CHAPTER INTRODUCES and Java Server Pages (and then presents a simple example to display how to use in creating and provides excellent support for the Apache Struts framework, which I believe is the most popular Web framework around. I will delve into how you can easily create Struts-based and ...
https://www.eeworm.com/dl/633/472663.html
下载: 41
查看: 1076

文章/文档 What happens with your machine when you need to move away from the computer for 10 or more minutes?

What happens with your machine when you need to move away from the computer for 10 or more minutes? How secure is your data? Can someone sit on your chair while you are at a coworkers office and play with your data? Maybe you need a computer locking tool that is small and easy to use yet powerful ...
https://www.eeworm.com/dl/652/481813.html
下载: 64
查看: 1166

书籍 Continuous-Time+Digital+Front-Ends

The book you’re holding, physically or electronically, is the result of a very interesting, challenging but also rewarding research project. The research was carried out in different contexts and cooperations but it was centered around the following question: how can we make the RF transmitters of ...
https://www.eeworm.com/dl/521855.html
查看: 55

书籍 LTE+Self-Organising+Networks

Mobilenetworkoperatorswillmeetmanychallengesinthecomingyears.Itisexpectedthatthe numberofpeopleconnected,wirelineandwireless,willreachfivebillionby2015.Atthesame time, people use more wireless services and they expect similar user experience to what they can now get from fixed networks. Because of t ...
https://www.eeworm.com/dl/521954.html
查看: 136