搜索结果
找到约 816 项符合
COmputer 的查询结果
按分类筛选
- 全部分类
- 技术资料 (284)
- 其他书籍 (84)
- 书籍 (39)
- 其他 (35)
- 单片机编程 (24)
- VC书籍 (20)
- matlab例程 (19)
- 单片机开发 (18)
- 文章/文档 (16)
- 软件设计/软件工程 (16)
- Java编程 (15)
- 电子书籍 (13)
- Linux/Unix编程 (12)
- 软件工程 (11)
- 嵌入式/单片机编程 (11)
- 通讯编程文档 (10)
- 数学计算 (9)
- 微处理器开发 (8)
- 加密解密 (7)
- VHDL/FPGA/Verilog (7)
- 游戏 (6)
- 文件格式 (6)
- 技术管理 (6)
- 汇编语言 (6)
- 数据结构 (6)
- 行业发展研究 (6)
- 源码 (5)
- 学术论文 (5)
- 网络 (5)
- Java书籍 (5)
- 电源技术 (4)
- 操作系统开发 (4)
- 模拟电子 (4)
- 编译器/解释器 (4)
- 人工智能/神经网络 (4)
- 系统设计方案 (4)
- 数值算法/人工智能 (3)
- 书籍源码 (3)
- 资料/手册 (3)
- Internet/网络编程 (3)
- 教育系统应用 (3)
- 串口编程 (3)
- Delphi控件源码 (3)
- 其他 (2)
- 仿真技术 (2)
- 通信网络 (2)
- 可编程逻辑 (2)
- 压缩解压 (2)
- Modem编程 (2)
- SCSI/ASPI (2)
- USB编程 (2)
- Windows CE (2)
- SQL Server (2)
- 精品软件 (2)
- VIP专区 (2)
- 教程 (1)
- 手册 (1)
- PCB相关 (1)
- 无线通信 (1)
- 接口技术 (1)
- DSP编程 (1)
- 通讯/手机编程 (1)
- 技术书籍 (1)
- 测试测量 (1)
- 计算机相关 (1)
- 行业应用 (1)
- 电工电气 (1)
- 传感与控制 (1)
- 嵌入式综合 (1)
- 教程资料 (1)
- autocad教程 (1)
- 手机短信编程 (1)
- 语音压缩 (1)
- 磁盘编程 (1)
- *行业应用 (1)
- 手机WAP编程 (1)
- 嵌入式Linux (1)
- STL (1)
- J2ME (1)
- 家庭/个人应用 (1)
- 其他行业 (1)
- JavaScript (1)
- 邮电通讯系统 (1)
- GPS编程 (1)
- 并行计算 (1)
- 人物传记/成功经验 (1)
- Jsp/Servlet (1)
- 认证考试资料 (1)
技术资料 点击后快速关闭屏幕显示
程序运行后点击“关屏”,则计算机屏幕显示关闭,10秒无鼠标操作,则自动关闭显示,移动鼠标恢复显示;用于实验室一个显示器接两台电脑时快速关闭不想被人看到的游戏屏幕或看小说的屏幕。-close monitor,used to close a computer‘s monitor quickly. ...
技术资料 红外遥控密码锁的设计
人们经常使用的机械锁结构设计简单,防盗性能差,钥匙携带不方便,不能满足人们的防盗需求。在20世纪后期,电子信息技术的快速发展,单片机被应用在各个领域,以单片机为核心的电子密码锁随之诞生,电子密码锁相对机械锁更加便捷、灵活和安全。People often use mechanical locks with simple structure design, poor anti-theft p ...
技术资料 基于单片机的两自由度冲压系统
为了解决两自由度冲压系统连续冲击的控制问题,采用单片机来完成系统自动的连续运行。主要描述了两自由度冲压系统的工作原理,单片机的控制思想,系统的硬件电路以及系统总体工作流程,最终实现在单片机控制下的冲压系统的控制,大大提高了气动系统的工作效率。In order to solve the problem of automatic control of a two-deg ...
其他 Addressbook using double-linked list. This example shows the use of a double-linked list by implemen
Addressbook using double-linked list. This example shows the use of a double-linked list by implementing an addressbook for the console. It has features like inserting, searching(linear), sorting(bubble sort), deleting and load/save to a file. I wrote this during my study of Applied Computer Science ...
软件工程 Software Testing, Second Edition provides practical insight into the world of software testing and q
Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software is ready for release. Updated from the previous edition in 20 ...
其他书籍 This handbook presents a thorough overview in 45 chapters from more than 100 renowned experts in the
This handbook presents a thorough overview in 45 chapters from more than 100 renowned experts in the field. It provides the tools to help overcome the problems of video storage, cataloging, and retrieval, by exploring content standardization and other content classification and analysis methods. The ...
软件工程 Software Testing, Second Edition provides practical insight into the world of software testing and q
Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software is ready for release. Updated from the previous edition in 20 ...
其他书籍 Because of the poor observability of Inertial Navigation System on stationary base, the estimation
Because of the poor observability of Inertial Navigation System on stationary base, the estimation
error of the azimuth will converge very slowly in initial alignment by means of Kalmari filtering, and making the
time initial alignment is longer. In this paper, a fast estimation method of the azimut ...
其他 If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction dis
If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your security, Internet Explorer has ...
Linux/Unix编程 在网络安全中经常会遇到rootkit
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor in ...