CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
list
Sort by :
«
1
2
...
.16
.17
.18
.19
.20
30021
.22
.23
.24
.25
.26
...
267454
»
lohman1
Downloaded:0
Binary image coding LohmanIII detour phase hologram, have been tested to normal operation. Containing the results of image, hologram, and reproduce the three parts of Fig.
Date
: 2008-10-13
Size
: 1.85kb
User
:
ke
migong
Downloaded:0
This procedure is a type of maze. Use category to define and to solve a maze problem.
Date
: 2008-10-13
Size
: 10.17kb
User
:
yangyaxi
Kinoform
Downloaded:0
Kinoform matlab code, containing the results of image, Kinoform, reproduction map of three parts.
Date
: 2008-10-13
Size
: 9.95kb
User
:
ke
wave_generater
Downloaded:0
This procedure is to use C8051F330 MCU 10 DAC make a SIN signal generator
Date
: 2008-10-13
Size
: 4.75kb
User
:
王家鼎
VHDL
Downloaded:0
1, the normal timing functions: that is, with 24 hours timer function 2, the normal display 3, the normal transfer function 4 hours, alarm clock timer 5, the whole point timekeeping function
Date
: 2008-10-13
Size
: 494.75kb
User
:
杨雄
LPC214X_ucosii
Downloaded:0
LPC214X series of uc/os ii transplantation of KEIL code
Date
: 2008-10-13
Size
: 201.65kb
User
:
chensummerday
guess
Downloaded:0
This procedure is used C++ Procedures to verify the validity of Goldbach Conjecture.
Date
: 2008-10-13
Size
: 8.21kb
User
:
yangyaxi
source
Downloaded:0
The Verilog HDL program design tutorial source code
Date
: 2008-10-13
Size
: 155.76kb
User
:
JI LIU
Burch
Downloaded:0
Burch-type hologram, by testing the normal operation, the result with image, hologram, reproduce Figure
Date
: 2008-10-13
Size
: 12.41kb
User
:
ke
mimasuo
Downloaded:0
1. After the system is connected to the power source, the set key will be put into operation first. The indicator lights and alarm lights and the bell are not working. The system is locked. 2. The open lock code is the t
Date
: 2008-10-13
Size
: 30.07kb
User
:
杨雄
wan_shu
Downloaded:0
This procedure is used to verify a number is not the End of the number of output data within the scope of a certain number of END.
Date
: 2008-10-13
Size
: 4.63kb
User
:
yangyaxi
PCA_program
Downloaded:0
Principal components analysis code. Attached to one title: the height, weight, and gender example classical principal component analysis, together with a detailed description of the program. In addition, the covariance m
Date
: 2008-10-13
Size
: 974byte
User
:
worthwhile
«
1
2
...
.16
.17
.18
.19
.20
30021
.22
.23
.24
.25
.26
...
267454
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.