搜索结果

找到约 769 项符合 cn-study 的查询结果

VHDL/FPGA/Verilog quartusii8.0正式版破解器,正式版可到官网去下载。http://www.altera.com.cn/

quartusii8.0正式版破解器,正式版可到官网去下载。http://www.altera.com.cn/
https://www.eeworm.com/dl/663/408450.html
下载: 206
查看: 5016

单片机开发 毕业设计 QQ 64134703 13720363121 基于51单片机的电子万年历 ,带数字钟功能.proteus 仿真+程序+完整论文. 更多免费毕业设计 www.rmlcd.cn

毕业设计 QQ 64134703 13720363121 基于51单片机的电子万年历 ,带数字钟功能.proteus 仿真+程序+完整论文. 更多免费毕业设计 www.rmlcd.cn
https://www.eeworm.com/dl/648/413599.html
下载: 23
查看: 1123

单片机开发 无损音频压缩源码. 毕业设计 qq 64134703 更多毕业设计 www.rmlcd.cn

无损音频压缩源码. 毕业设计 qq 64134703 更多毕业设计 www.rmlcd.cn
https://www.eeworm.com/dl/648/413604.html
下载: 83
查看: 1032

汇编语言 MemoryToolz 0.1 example written in assembly use NtSystemDebugControl, veery good to study

MemoryToolz 0.1 example written in assembly use NtSystemDebugControl, veery good to study
https://www.eeworm.com/dl/644/414978.html
下载: 193
查看: 1071

汇编语言 Self Delete Lib and Exemple written in pure Assembly verry good to study

Self Delete Lib and Exemple written in pure Assembly verry good to study
https://www.eeworm.com/dl/644/414979.html
下载: 101
查看: 1033

汇编语言 GetLatenProc example using GetModuleFileNameEx to detect hiden processs, easy to study

GetLatenProc example using GetModuleFileNameEx to detect hiden processs, easy to study
https://www.eeworm.com/dl/644/414980.html
下载: 22
查看: 1021

其他书籍 This is the NC programming manual. You can study the G-Code programming.

This is the NC programming manual. You can study the G-Code programming.
https://www.eeworm.com/dl/542/416013.html
下载: 141
查看: 1089

其他嵌入式/单片机内容 This is a futaba PCM decode source. You can study futaba pcm code.

This is a futaba PCM decode source. You can study futaba pcm code.
https://www.eeworm.com/dl/687/416018.html
下载: 109
查看: 1069

数值算法/人工智能 Measuring Frequency Content in Signals I this section we will study some non parametric methods fo

Measuring Frequency Content in Signals I this section we will study some non parametric methods for spectrum estimation of a stochastic process. These methods are described in the literature. All methods are based on the Periodogram which is defined for a sequence x[n] with length N according to ...
https://www.eeworm.com/dl/518/417304.html
下载: 35
查看: 1038

文章/文档 this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp

this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.
https://www.eeworm.com/dl/652/417795.html
下载: 43
查看: 1051