代码搜索:7846
找到约 235 项符合「7846」的源代码
代码结果 235
www.eeworm.com/read/418779/10902034
txt 7846.txt
Rule:
--
Sid:
7846
--
Summary:
This event is generated when activity relating to the spyware application "clogger 1.0" is detected.
--
Impact:
Unkown. Possible information disclosure, violation of
www.eeworm.com/read/269921/11062578
htm 7846.htm
下载地址:thunder://QUFodHRwOi8vMTkyLjE2OC4yMTIuMTEvbm1vdmllL2Rvd251cmwuYXNwP3NlcnZlcmlwPTMmcmVhbD1tcGVnNS9jaGluYS9uc25ybmcucm12YiZ1c2V0PWltYXlkYXkyZGI3Zjk0NWU2YTBmYTc0Wlo=[那山那人那狗][56
www.eeworm.com/read/418361/10950358
c ads7846.c
/*
* TI ADS7846 / TSC2046 chip emulation.
*
* Copyright (c) 2006 Openedhand Ltd.
* Written by Andrzej Zaborowski
*
* This code is licensed under the GNU GPL v2.
*/
#include
www.eeworm.com/read/350718/7149663
h ads7846.h
#ifndef __ADS7846_H__
#define __ADS7846_H__
typedef struct
{
int x,y;
unsigned char Pressed;
unsigned char Key_Off;
} GUI_HID_STATE;
void GUI_HID_StoreState(const GUI_HID_STAT
www.eeworm.com/read/350718/7149717
c ads7846.c
#include
#include "ecrsys.h"
#include "ads7846.h"
#include "ftype.h"
#include "data.h"
#include "font.h"
#include "tft_disp.h"
void Insert_Byte(char,char);
static GUI_HI
www.eeworm.com/read/443382/7633860
vhd ads7846.vhd
--dclk,cs,din测试正确(其中写控制字需要一个时钟周期)
--未考虑触摸抖动和连击问题
LIBRARY IEEE;
USE IEEE.STD_LOGIC_1164.ALL;
USE IEEE.STD_LOGIC_ARITH.ALL;
USE IEEE.STD_LOGIC_UNSIGNED.ALL;
ENTITY ADS7846 IS
PORT(
penirq,d
www.eeworm.com/read/443382/7633864
vhd ads7846a.vhd
--采用延迟测量法来解决,即在接受到触摸屏笔中断时延时一段时间(30ms)后再测量,可消除抖动
--测量完后再次延迟一段时间(连击延时300ms)后打开笔中断,可避免连击现象的出现
LIBRARY IEEE;
USE IEEE.STD_LOGIC_1164.ALL;
USE IEEE.STD_LOGIC_ARITH.ALL;
USE IEEE.STD_LOGIC_UNSIGNED.ALL
www.eeworm.com/read/443382/7633867
inc ads7846a.inc
-- WARNING: Do NOT edit the input and output ports in this file in a text
-- editor if you plan to continue editing the block that represents it in
-- the Block Editor! File corruption is VERY likel
www.eeworm.com/read/443382/7633868
cdf ads7846.cdf
/* Quartus II Version 7.2 Build 207 03/18/2008 Service Pack 3 SJ Full Version */
JedecChain;
FileRevision(JESD32A);
DefaultMfr(6E);
P ActionCode(Cfg)
Device PartName(EPM1270T144) Path("D:/
www.eeworm.com/read/443382/7633869