-
Design Patterns of Visitor, the Visitor Design Pattern
设计模式之Visitor,设计模式之Visitor-Design Patterns of Visitor, the Visitor Design Pattern
- 2022-12-03 21:20:03下载
- 积分:1
-
TFT LCD液晶显示器的驱动原理_01.pdf
TFT LCD液晶显示器的驱动原理_01.pdf-TFT LCD
- 2022-02-26 18:40:01下载
- 积分:1
-
Smart Car s12dg128 entry, demonstration experiment
智能车s12dg128b学习入门,演示实验16例-Smart Car s12dg128 entry, demonstration experiment
- 2022-06-18 13:16:07下载
- 积分:1
-
本书结合作者丰富的实践经验和深厚的理论基础,总结出一系列行之有效的高质量Java编程的规则和建议,指导读者提高Java程序开发的水平。...
本书结合作者丰富的实践经验和深厚的理论基础,总结出一系列行之有效的高质量Java编程的规则和建议,指导读者提高Java程序开发的水平。-author of the book combines rich practical experience and solid theoretical foundation, summed up a series of effective, high-quality Java programming rules and recommendations to guide readers to improve Java programming level.
- 2022-05-20 11:11:14下载
- 积分:1
-
这本书里面有许多基础的知识,有关JAVA方面的,对于一个JAVA新手来说,无疑是一个好书
这本书里面有许多基础的知识,有关JAVA方面的,对于一个JAVA新手来说,无疑是一个好书-this book there are many fundamental knowledge of the Java, a Java novice, is a good book
- 2023-06-17 18:30:04下载
- 积分:1
-
Undocumented Windows NT 中文版,作者花费了大量心血。
Undocumented Windows NT 中文版,作者花费了大量心血。-Undocumented Windows NT Chinese version, the author spent a great deal of painstaking efforts.
- 2022-03-14 23:42:01下载
- 积分:1
-
用单片机制作的红外遥控器,可以遥控电视等,采用NEC编码方式...
用单片机制作的红外遥控器,可以遥控电视等,采用NEC编码方式-Produced with infrared remote control MCU
- 2023-01-25 02:55:04下载
- 积分:1
-
c语言陷阱与缺陷pdf文档,c语言编程规范以及风格等的文档
c语言陷阱与缺陷pdf文档,c语言编程规范以及风格等的文档-c language traps and defects in pdf documents, c language programming, such as norms and style of the document
- 2022-05-17 23:42:09下载
- 积分:1
-
Text mining tries to solve the crisis of information overload by combining techn...
Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced pre-processing techniques, knowledge representation considerations, and visualization approaches. Finally, it explores current real-world, mission-critical applications of text mining and link detection in such varied fields as M&A business intelligence, genomics research and counter-terrorism activities.
- 2022-07-03 08:33:27下载
- 积分:1
-
放大器解说,方便查阅大家如果觉得好久支持一下
放大器解说,方便查阅大家如果觉得好久支持一下-Commentary amplifier for easy access If Members feel that a long time to support you
- 2022-01-25 15:29:55下载
- 积分:1