搜索结果
找到约 3,860 项符合
System 的查询结果
按分类筛选
- 全部分类
- 技术资料 (1214)
- 其他书籍 (178)
- 其他 (150)
- 单片机编程 (139)
- 书籍 (113)
- Java编程 (111)
- matlab例程 (109)
- Linux/Unix编程 (96)
- 系统设计方案 (76)
- 单片机开发 (62)
- 电子书籍 (59)
- 通讯/手机编程 (56)
- 嵌入式/单片机编程 (55)
- 软件设计/软件工程 (54)
- 通讯编程文档 (49)
- 文章/文档 (48)
- 学术论文 (45)
- 其他嵌入式/单片机内容 (43)
- 软件工程 (39)
- 书籍源码 (35)
- 可编程逻辑 (35)
- VHDL/FPGA/Verilog (33)
- 操作系统开发 (31)
- 教程资料 (30)
- 微处理器开发 (29)
- 行业发展研究 (29)
- 其他数据库 (26)
- 驱动编程 (25)
- 网络 (25)
- 人工智能/神经网络 (25)
- VC书籍 (25)
- 嵌入式Linux (24)
- SQL Server (24)
- VIP专区 (24)
- 文件格式 (23)
- Delphi控件源码 (23)
- 模拟电子 (21)
- Internet/网络编程 (21)
- 汇编语言 (21)
- 技术管理 (20)
- 无线通信 (19)
- 加密解密 (19)
- 电源技术 (18)
- 数据库系统 (18)
- 企业管理 (18)
- Jsp/Servlet (18)
- *行业应用 (17)
- 其他行业 (17)
- 数学计算 (16)
- VxWorks (16)
- 压缩解压 (15)
- 编译器/解释器 (15)
- 源码 (14)
- 数值算法/人工智能 (14)
- 嵌入式综合 (14)
- JavaScript (14)
- DSP编程 (12)
- Java书籍 (12)
- 教育系统应用 (10)
- USB编程 (10)
- uCOS (10)
- Windows CE (9)
- 医药行业 (9)
- 工控技术 (8)
- 游戏 (8)
- Applet (8)
- 金融证券系统 (8)
- MySQL数据库 (8)
- 软件 (7)
- ARM (7)
- 串口编程 (7)
- 多国语言处理 (7)
- 酒店行业 (7)
- 中间件编程 (7)
- GPS编程 (7)
- 3G开发 (7)
- 接口技术 (6)
- 技术书籍 (6)
- 通信网络 (6)
- 开发工具 (5)
- 数据结构 (5)
- J2ME (5)
- 百货/超市行业 (5)
- Symbian (5)
- Windows Mobile (5)
- Oracle数据库 (5)
- 邮电通讯系统 (5)
- RFID编程 (5)
- Ajax (5)
- 资料/手册 (4)
- Modem编程 (4)
- 磁盘编程 (4)
- 家庭/个人应用 (4)
- 交通/航空行业 (4)
- 教程 (3)
- 手册 (3)
- 测试测量 (3)
- 传感与控制 (3)
- 电机控制 (3)
- 手机短信编程 (3)
技术资料 基于IP核复用的SoC设计技术探讨
以 IP(Intellectual Property )核复用为基础的SoC(System on a Chip,简称SoC)设计是以软硬件协同设计为主要设计方法的芯片设计技术。本文从IP 核复用技术、
技术资料 STM32_电子相框
基于STM32平台的数码相框程序,sd卡驱动SD_driver和FAT32文件系统FatFs - FAT file system module R0.07a工作正常。
教程资料 xilinx Zynq-7000 EPP产品简介
The Xilinx Zynq-7000 Extensible Processing Platform (EPP) redefines the possibilities for embedded systems, giving system and software architects and developers a flexible platform to launch their new solutions and traditional ASIC and ASSP users an alternative that aligns with today’s progr ...
可编程逻辑 xilinx Zynq-7000 EPP产品简介
The Xilinx Zynq-7000 Extensible Processing Platform (EPP) redefines the possibilities for embedded systems, giving system and software architects and developers a flexible platform to launch their new solutions and traditional ASIC and ASSP users an alternative that aligns with today’s progr ...
书籍源码 In this paper we describe a control methodology for catching a fast moving object with a robot mani
In this paper we describe a control methodology for
catching a fast moving object with a robot manipulator,
where visual information is employed to track the
trajectory of the target. Sensing, planning and control
are performed in real-time to cope with possible
unpredictable trajectory changes of t ...
Java编程 In the bank all the activities are being done manually .As the bank widens its services & it finds d
In the bank all the activities are being done manually .As the bank widens its services & it finds difficult to manage its operations manually and hence this leads to the automation of some of its operations.
Banking Information system is a windows based applications. This project mainly deal ...
书籍 Visible Light Communication
Visible light communications (VLC) is the name given to an optical wireless
communication system that carries information by modulating light in the visible spectrum
(400–700 nm) that is principally used for illumination [1–3]. The communications signal
is encoded on top of the illumination light. ...
书籍 Optimal+Long-Term+Operation
This  book  deals with a very important problem in power system planning
for countries in which hydrogeneration accounts for the greatest  part  of  the
system power production. During the past thirty years many techniques
have been developed to cope with the long-term opera ...
Linux/Unix编程 Unix 第 6 版的 sh 手册和源码
Unix 第 6 版的 sh 手册和源码,感兴趣请参考`The UNIX Time-Sharing System , CACM, July, 1974,它给出 Shell 操作的理论。 chdir (I), login (I), wait (I), shift (I)
其他书籍 In this paper, we provide an overview of the security concerns introduced by wireless LANs, current
In this paper, we provide an overview of the security concerns introduced by wireless LANs, current approaches to wireless LAN security, their limitations, and the weaknesses of various “band aid” security solutions. We conclude by describing how the ReefEdge Connect System provides a comprehensiv ...