Welcome![Sign In][Sign Up]
Location:
Other resource

Other resource List Page 10092

« 1 2 ... .87 .88 .89 .90 .91 10092.93 .94 .95 .96 .97 ... 11383 »

[Other resourceMULTGAS_Graycoded

Description: GA source, run-off, can definitely learning GA can refer to the trial
Platform: | Size: 2857 | Author: 张立 | Hits:

[Other resourcemy51_test

Description: 2051 MCU small application can be completed tftp communications functions
Platform: | Size: 5168 | Author: 张乙 | Hits:

[Other resourcegamecodezai

Description: good blend of witty renju artificial intelligence source. Rar good blend of witty renju artificial intelligence source. Rar
Platform: | Size: 148818 | Author: zaisheng | Hits:

[Other resourcefft_iccavr

Description: ICCAVR the Environment in the fft,.
Platform: | Size: 217101 | Author: 清封剑 | Hits:

[Other resourceFAT16-32Driver

Description: based on the m128 and ATA Acronis File System
Platform: | Size: 145402 | Author: sinbad | Hits:

[Other resourcesht

Description: temperature and humidity sensors SHT the AVR ICC source code
Platform: | Size: 1911 | Author: zwj | Hits:

[Other resourcetruetime-1.3

Description: a terrific network control system simulation software, truetime Toolbox including Computer and TrueTime Truetime Ne allow two interface modules. The computer module with flexible real-time kernel, A/D and D/A converters,
Platform: | Size: 977818 | Author: 张茸擎 | Hits:

[Other resourcewatermark-MATLAB

Description: digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
Platform: | Size: 563820 | Author: 魏凯 | Hits:

[Other resourceSBWXST

Description: equipment maintenance records management system (VFP) curriculum design, the procedures under VFP6.0 debugging, for my junior curriculum design, the interface is doing quite well.
Platform: | Size: 1053605 | Author: | Hits:

[Other resourceMarkovAnalysis

Description: prepared by the genetic algorithm, Markov is the application Intrusion Detection of the data used is http :// ~ www.cs.unm.edu/ immsec/data/Jr.-sm.h the 27-31
Platform: | Size: 11229 | Author: 唐宇 | Hits:

[Other resourcelibtomcrypt-0.96

Description: 64 commonly used cryptographic algorithm, a detailed notes, for example, documentation and examples.
Platform: | Size: 984603 | Author: 冯荣俊 | Hits:

[Other resourceAprioriAlgorithm

Description: when used, the post "Control Panel/management tools/ODBC data source," the source of configuration data, known as "TRANSACTION", the database Apriori folder.
Platform: | Size: 105295 | Author: 唐宇 | Hits:
« 1 2 ... .87 .88 .89 .90 .91 10092.93 .94 .95 .96 .97 ... 11383 »

CodeBus www.codebus.net