代码搜索:如何学习 ADs?

找到约 10,000 项符合「如何学习 ADs?」的源代码

代码结果 10,000
www.eeworm.com/read/465831/7046992

htm board.htm


www.eeworm.com/read/257574/7152322

tra lpc214x_ucosii.tra

*** Creating Trace Output File '.\OutPut\LPC214X_uCosii.tra' Ok. ### Preparing for ADS-LD. ### Creating ADS-LD Command Line ### List of Objects: adding '".\output\os_cpu_c.o"' ### List of Objects:
www.eeworm.com/read/462162/7208166

tra lm3s_ucos2.tra

*** Creating Trace Output File '.\Object\LM3S_uCOS2.tra' Ok. ### Preparing for ADS-LD. ### Creating ADS-LD Command Line ### List of Objects: adding '".\LM3S-DriverLib\DriverLib.lib"' ### List of O
www.eeworm.com/read/462157/7208319

tra lm3s_ucos2.tra

*** Creating Trace Output File '.\Object\LM3S_uCOS2.tra' Ok. ### Preparing for ADS-LD. ### Creating ADS-LD Command Line ### List of Objects: adding '".\LM3S-DriverLib\DriverLib.lib"' ### List of O
www.eeworm.com/read/462150/7208523

tra lm3s_ucos2.tra

*** Creating Trace Output File '.\Object\LM3S_uCOS2.tra' Ok. ### Preparing for ADS-LD. ### Creating ADS-LD Command Line ### List of Objects: adding '".\LM3S-DriverLib\DriverLib.lib"' ### List of O
www.eeworm.com/read/461920/7214521

tra lpc214x_ucosii.tra

*** Creating Trace Output File '.\OutPut\LPC214X_uCosii.tra' Ok. ### Preparing for ADS-LD. ### Creating ADS-LD Command Line ### List of Objects: adding '".\output\target.o"' ### List of Objects: a
www.eeworm.com/read/461303/7229408

txt ads7844串行模数转换芯片的原理及其在嵌入式的应用.txt

12位高精度AD的使用 ADS7844串行模/数转换芯片的原理及其在嵌入式的应用 摘要:ADS7844是一种12-Bit的串行数模转换器芯片。它具有与CPU方便联接的同步串行接口,接口灵活, 功耗低等特点。文中详细介绍了ADS7844的工作原理、引脚定义、工作时序及同步串行模式下与51单片机的接口电路及部分读写程序以及需要注意的地方。 关键词:模数转换器 SPI接口 ADS7844 ...
www.eeworm.com/read/459563/7273759

tra keil_test.tra

*** Creating Trace Output File '.\output\keil_test.tra' Ok. ### Preparing for ADS-LD. ### Creating ADS-LD Command Line ### List of Objects: adding '".\output\os_core.o"' ### List of Objects: addin
www.eeworm.com/read/457217/7332283

ali protected_variables.ali

V "GNAT Lib v2007" A -gnatA P SS ZX R nnnnnnnnnnnnnnnvnnvnnnvnnnnnnnnnnnnnnnvvnnnnnvvnnnnnnnvnvnnnnnv3nv2nv1nnnnnn U protected_variables%b protected_variables.adb 6644ee7c PK W ada%s ada.ads
www.eeworm.com/read/457217/7332316

ali random.ali

V "GNAT Lib v2007" A -g A -g A -gnatA P ZX R nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnvnnnnnnnnnnnnnnnnnn U random%b random.adb 4207a1a5 NE PK U random%s random.ads 4455296