51单片连tcs230的源程序,绝对原创,可以记忆颜色。 #define uchar unsigned char #include <reg52.h> #include<math.h> sbit S0=P1^7 sbit S1=P1^0 //端口定义 sbit S2=P1^1 sbit S3=P1^2 sbit OE=P1^3 sbit OUT=P3^4 //频率从TO口输入 sbit key0=P1^5 sbit LED=P1^6 sbit a=P3^0 sbit b=P3^1 uchar color //1:blue 2:green 3:red uchar T[4] //color timer uchar TH[4] uchar TL[4] uchar bizhi[4] void time1() interrupt 3 { TH[color]=TH0 TL[color]=TL0 T[color]=(TH[color]*0xff+TL[color]) TR0=0 //关定时器 TR1=0 TH1=0xB1 TL1=0xE0 //归0 TH0=0x00 TL0=0x00 //归0 }
上传时间: 2016-11-26
上传用户:秦莞尔w
This book is designed to teach you the best practices in developing Windows DNA applications. We have avoided making this book a primer on every technology associated with Windows DNA. If we had followed this course, this would be an encyclopedia set. Everyone has their favorite authors and books on the various technical subject areas. The market is full of books to teach you the basics, the how, this book tries to be different in that we pull out the important points to teach you about the why. If you need training in a particular technology covered in this book, Sams has a number of 24-hour and 21-day books that cover a wide range of topics.
标签: applications developing practices designed
上传时间: 2016-11-27
上传用户:yyq123456789
Inside the C++ Object Model Inside the C++ Object Model focuses on the underlying mechanisms that support object-oriented programming within C++: constructor semantics, temporary generation, support for encapsulation, inheritance, and "the virtuals"-virtual functions and virtual inheritance. This book shows how your understanding the underlying implementation models can help you code more efficiently and with greater confidence. Lippman dispells the misinformation and myths about the overhead and complexity associated with C++, while pointing out areas in which costs and trade offs, sometimes hidden, do exist. He then explains how the various implementation models arose, points out areas in which they are likely to evolve, and why they are what they are. He covers the semantic implications of the C++ object model and how that model affects your programs.
上传时间: 2013-12-24
上传用户:zhouli
This MATLAB M-file implements the finite-difference time-domain solution of Maxwell s curl equations over a one-dimensional space lattice comprised of uniform grid cells.
标签: finite-difference time-domain implements equations
上传时间: 2014-01-11
上传用户:270189020
The MEASURE program uses the analog inputs of the P89LPC935 to implement a datalogger. This example shows how you can use signal functions in uVision to simulate a signal coming into one of the analog inputs of the P89LPC935 controller.
标签: datalogger implement the MEASURE
上传时间: 2016-12-03
上传用户:songrui
The VGA example generates a 320x240 diffusion-limited-aggregation (DLA) on Altera DE2 board. A DLA is a clump formed by sticky particles adhering to an existing structure. In this design, we start with one pixel at the center of the screen and allow a random walker to bounce around the screen until it hits the pixel at the center. It then sticks and a new walker is started randomly at one of the 4 corners of the screen. The random number generators for x and y steps are XOR feedback shift registers (see also Hamblen, Appendix A). The VGA driver, PLL, and reset controller from the DE2 CDROM are necessary to compile this example. Note that you must push KEY0 to start the state machine.
标签: diffusion-limited-aggregation DLA generates 320x240
上传时间: 2014-01-16
上传用户:225588
I often need a simple function generator. Just to generate a certain frequency. After all the years I ve worked with electronics, I still haven t got me one. Even though I need it now and then, I just couldn t seem to justify the cost of one. So, standard solution - build one yourself. I designed a simple sinewave generator based on a Analog Devices AD9832 chip. It will generate a sinewave from 0.005 to 12 MHz in 0.005 Hz steps. That s pretty good, and definitely good enough for me ! But while waiting for the AD9832 chip to arrive, I came up with a very simple version of the DDS synth, using just the 2313 and a resistor network.
标签: frequency generator function generate
上传时间: 2013-12-17
上传用户:thesk123
BlackBerry Hacks will enhance your mobile computing with great tips and tricks. You ll learn that the BlackBerry is capable of things you never thought possible, and you ll learn how to make it an even better email and web workhorse: Get the most out of the built-in applications Take control of email with filters, searches, and more Rev up your mobile gaming--whether you re an arcade addict or poker pro Browse the web, chat over IM, and keep up with news and weblogs Work with office documents, spell check your messages, and send faxes Become more secure, lock down your BlackBerry and stash secure information somewhere safe Manage and monitor the BlackBerry Enterprise Server (BES) and Mobile Data System (MDS) Create web sites that look great on a BlackBerry Develop and deploy BlackBerry applications
标签: BlackBerry computing enhance mobile
上传时间: 2016-12-07
上传用户:GavinNeko
Design patterns are elegant, adaptable, and reusable solutions to everyday software development problems. Programmers use design patterns to organize objects in programs, making them easier to write and modify. C# Design Patterns: A Tutorial is a practical guide to writing C# programs using the most common patterns. This tutorial begins with clear and concise introductions to C#, object-oriented programming and inheritance, and UML diagrams. Each chapter that follows describes one of twenty-three design patterns, recommends when to use it, and explains the impact that it will have on the larger design. The use of every pattern is demonstrated with simple example programs. These programs are illustrated with screen shots and UML diagrams displaying how the classes interact. Each of these programs is available on the companion CD-ROM and can be run, examined, edited, and applied.
标签: development adaptable solutions patterns
上传时间: 2014-09-07
上传用户:wangchong
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
标签: cryptography literature has Secrecy
上传时间: 2016-12-08
上传用户:fxf126@126.com