登录
首页 » 文档处理 » sql源码 可以练习使用sql2000以及入门的使用

sql源码 可以练习使用sql2000以及入门的使用

于 2023-07-17 发布 文件大小:1.27 kB
0 76
下载积分: 2 下载次数: 1

代码说明:

sql源码 可以练习使用sql2000以及入门的使用-sql language

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 支柱开发实例。
    Struts开发实例.-Struts development examples.
    2022-05-22 04:40:21下载
    积分:1
  • 8019驱动
    8019驱动-It is the driver code about network card using in 8051 embedded system.
    2022-02-05 13:12:45下载
    积分:1
  • 用C语言读取BMP位图的程序
    用C语言读取BMP位图的程序-C language read from Bitmap procedures
    2022-02-06 10:04:16下载
    积分:1
  • 自己用汇编语言编写的自动控制程序,已测试成功
    自己用汇编语言编写的自动控制程序,已测试成功 -own assembly language prepared by the automatic control procedures, has been tested successfully
    2022-01-30 11:31:07下载
    积分:1
  • 一本不错的好书值得看
    一本不错的好书值得看-a good look at the books worth
    2023-08-02 13:25:04下载
    积分:1
  • 这篇详细的介绍了flash驱动的开发,有需要的朋友可以参考下!
    这篇文档详细的介绍了flash驱动的开发,有需要的朋友可以参考下!-Introduction This document details the flash-driven development, there is a need to refer to the following friends can!
    2022-07-12 16:03:16下载
    积分:1
  • 企业短信网关API必须实现CMPP3.0中业务提供商(SP)的…
    企业短信网关API必须实现CMPP3.0中业务提供商(SP)与互联网短信网关(ISMG)间的消息定义所规定的七个操作。-Enterprise SMS Gateway API must achieve CMPP3.0 which business providers (SP) and Internet messaging Gateway (ISMG) of the definition of news of seven operations.
    2022-03-11 23:23:59下载
    积分:1
  • 提出了一种基于小波域的图像数字水印算法・该算法将相互正交的两种水印(鲁棒水印和参考 水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添...
    提出了一种基于小波域的图像数字水印算法・该算法将相互正交的两种水印(鲁棒水印和参考 水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像・用提取出 的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此 可以估计出原始的鲁棒水印・通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试 验,均能正确检测出水印,表明该算法具有很好的感知效果和鲁棒性 -A wavelet-based image digital watermarking algorithm that the algorithm will be mutually orthogonal two watermarks (watermark robust watermarking and reference) at the same time added to the carrier after image after DWT wavelet coefficients, and then using wavelet transform has been Add a watermark image to use to extract a reference to estimate the watermark image by the attacks, as a result of the robust watermark extracted suffered attacks and the reference watermark by the same attack, it can be estimated through the original Robust Watermarking of the embedded watermark image by adding noise, filtering, compression and cutting, such as a large number of image processing such as testing, can correctly detect the watermark, show that the algorithm has good
    2023-07-21 02:35:04下载
    积分:1
  • 一种可以穿透还原卡和还原软件的代码
    一种可以穿透还原卡和还原软件的代码-A card can penetrate to restore and restore software code
    2022-05-22 18:20:54下载
    积分:1
  • this document is about how to use kinds of computer skills .thank you for your s...
    这个文档是关于如何巧用各种计算机技巧,使你使用起来更加方便。操作起来更加便捷。呵呵。谢谢大家支持啊-this document is about how to use kinds of computer skills .thank you for your support
    2022-05-16 23:54:52下载
    积分:1
  • 696518资源总数
  • 105720会员总数
  • 3今日下载