搜索结果
找到约 9 项符合
CHA 的查询结果
串口编程 可以接收HEX CHA. 比较容易理解.RS232 DEMO
可以接收HEX CHA. 比较容易理解.RS232 DEMO
Applet geng ju nide xu yao ,ke yi suibian cha zhao ni xiang yao zhao de shu zi dang meiyou chazhoadao shi ,
geng ju nide xu yao ,ke yi suibian cha zhao ni xiang yao zhao de shu zi dang meiyou chazhoadao shi ,ye hui gei ti shi
文章/文档 书 名:Programming Windows程式开发设计指南 出版日期:2000/6/2 书 号:957-8239-73-4 I S B N:957-8239-73-4 原 作 者:Cha
书 名:Programming Windows程式开发设计指南
出版日期:2000/6/2
书 号:957-8239-73-4
I S B N:957-8239-73-4
原 作 者:Charles Petzold
译 者:余孟学
Linux/Unix编程 Ever wanted to just type tail -f error_log on Windows?Envious of your Unix friends who can track cha
Ever wanted to just type tail -f error_log on Windows?Envious of your Unix friends who can track changes to a file, in real time, as they happen?
Well, now with the Objektiv Tail for Win32, you ll be happily monitoring your log files like you ve never done before.
What s even better, you can track s ...
驱动编程 YSS915 (KP2V2) is an LSI for processing Karaoke voice signals. This LSI has an A/D converter (1 cha
YSS915 (KP2V2) is an LSI for processing Karaoke voice signals.
This LSI has an A/D converter (1 channel) for the microphone echo, and a memory for the microphone echo and
key control. These features allow achieving the functions needed for the Karaoke system by using only one LSI
chip. As for the mi ...
matlab例程 空间后方交汇求解相机外方位元素
空间后方交汇求解相机外方位元素,变量如下
% x,y 控制点像点坐标
% X,Y,Z 控制点空间坐标
%f焦距
%X0,Y0,Z0,a,b,c六个外方位元素
%x0,y0,-f内方位元素:光心坐标
%cha,chb,chc:外方位角元素改正数
%count 记录迭代次数
%R 旋转矩阵
%A 线性化的偏导系数矩阵
%L 常数项矩阵
%M0 外方位元素矩阵
%M ...
单片机开发 用c8051做的usb鼠标(HID类)Firmware works with the Silicon Labs IDE v1.71 or later and the Keil C51 tool cha
用c8051做的usb鼠标(HID类)Firmware works with the Silicon Labs IDE v1.71 or later and the Keil C51 tool chain. Project and code modifications will be necessary for use with different tool chains.
其他书籍 Please read them carefully before you write the package to their specific functions (at least 20 cha
Please read them carefully before you write the package to their specific functions (at least 20 characters). As far as possible not to let the station for the time you have spent on that amendment. Have to extract the password to the password
matlab例程 this is decision tree ID3 algorithm, this algorithm is one of decision tree algorithm like cart, cha
this is decision tree ID3 algorithm, this algorithm is one of decision tree algorithm like cart, chaid, c4.5, etc