代码搜索:7846

找到约 235 项符合「7846」的源代码

代码结果 235
www.eeworm.com/read/418779/10902034

txt 7846.txt

Rule: -- Sid: 7846 -- Summary: This event is generated when activity relating to the spyware application "clogger 1.0" is detected. -- Impact: Unkown. Possible information disclosure, violation of
www.eeworm.com/read/269921/11062578

htm 7846.htm

下载地址:thunder://QUFodHRwOi8vMTkyLjE2OC4yMTIuMTEvbm1vdmllL2Rvd251cmwuYXNwP3NlcnZlcmlwPTMmcmVhbD1tcGVnNS9jaGluYS9uc25ybmcucm12YiZ1c2V0PWltYXlkYXkyZGI3Zjk0NWU2YTBmYTc0Wlo=[那山那人那狗][56
www.eeworm.com/read/418361/10950358

c ads7846.c

/* * TI ADS7846 / TSC2046 chip emulation. * * Copyright (c) 2006 Openedhand Ltd. * Written by Andrzej Zaborowski * * This code is licensed under the GNU GPL v2. */ #include
www.eeworm.com/read/350718/7149663

h ads7846.h

#ifndef __ADS7846_H__ #define __ADS7846_H__ typedef struct { int x,y; unsigned char Pressed; unsigned char Key_Off; } GUI_HID_STATE; void GUI_HID_StoreState(const GUI_HID_STAT
www.eeworm.com/read/350718/7149717

c ads7846.c

#include #include "ecrsys.h" #include "ads7846.h" #include "ftype.h" #include "data.h" #include "font.h" #include "tft_disp.h" void Insert_Byte(char,char); static GUI_HI
www.eeworm.com/read/443382/7633860

vhd ads7846.vhd

--dclk,cs,din测试正确(其中写控制字需要一个时钟周期) --未考虑触摸抖动和连击问题 LIBRARY IEEE; USE IEEE.STD_LOGIC_1164.ALL; USE IEEE.STD_LOGIC_ARITH.ALL; USE IEEE.STD_LOGIC_UNSIGNED.ALL; ENTITY ADS7846 IS PORT( penirq,d
www.eeworm.com/read/443382/7633864

vhd ads7846a.vhd

--采用延迟测量法来解决,即在接受到触摸屏笔中断时延时一段时间(30ms)后再测量,可消除抖动 --测量完后再次延迟一段时间(连击延时300ms)后打开笔中断,可避免连击现象的出现 LIBRARY IEEE; USE IEEE.STD_LOGIC_1164.ALL; USE IEEE.STD_LOGIC_ARITH.ALL; USE IEEE.STD_LOGIC_UNSIGNED.ALL
www.eeworm.com/read/443382/7633867

inc ads7846a.inc

-- WARNING: Do NOT edit the input and output ports in this file in a text -- editor if you plan to continue editing the block that represents it in -- the Block Editor! File corruption is VERY likel
www.eeworm.com/read/443382/7633868

cdf ads7846.cdf

/* Quartus II Version 7.2 Build 207 03/18/2008 Service Pack 3 SJ Full Version */ JedecChain; FileRevision(JESD32A); DefaultMfr(6E); P ActionCode(Cfg) Device PartName(EPM1270T144) Path("D:/
www.eeworm.com/read/443382/7633869

pof ads7846.pof