-
用VB写的扫雷,功能虽然有些简单,但是用的数据结构更简单,用简单的控件的实现方法,想给大家分享下~...
用VB写的扫雷,功能虽然有些简单,但是用的数据结构更简单,用简单的控件的实现方法,想给大家分享下~-Using VB to write the de-mining, functional although some simple, but the data structure used in a more simple, with a simple implementation of the control method," d like to share with you the next ~
- 2023-04-20 23:05:03下载
- 积分:1
-
C++定义了组件及
C++ defines to assembly EQUs
- 2022-10-05 18:25:03下载
- 积分:1
-
利用神经网络和多元回归预测的人均国内生产总值,和…
采用神经网络和多元回归对人均GDP进行预测并建模-Using neural networks and multiple regression to predict the per capita GDP, and Modeling
- 2022-03-22 21:09:02下载
- 积分:1
-
大家看看,定有收获哦
我愿 将之与大家分享
大家看看,定有收获哦
我愿 将之与大家分享-you see, there is harvest Oh, I like to share it with you
- 2022-07-13 17:25:34下载
- 积分:1
-
1, the two products add background, background Categories 3, add background frie...
1、后台添加产品
2、后台分类
3、后台添加友情连接
4、会员管理
5、客户留言
6、在线订单
7、捆绑了《忠网广告管理系统》
8、公告发布、管理
管理员:admin 密码:admin888
-1, the two products add background, background Categories 3, add background friendship linking four, five members of management, customers six messages, online orders seven, tied up the "loyalty advertising network management system", 8 announcement, management administrator : admin password : admin888
- 2022-01-24 15:32:18下载
- 积分:1
-
一个网络对战扑克游戏的源代码,采用socket连接。JBuilder工程文件...
一个网络对战扑克游戏的源代码,采用socket连接。JBuilder工程文件-a network war poker game"s source code, using socket connection. JBuilder project documents
- 2022-05-23 15:40:50下载
- 积分:1
-
生成一个高斯水印后,对待嵌入水印的载体图像进行二维的DCT变换,然后嵌入水印...
生成一个高斯水印后,对待嵌入水印的载体图像进行二维的DCT变换,然后嵌入水印-Generates a Gaussian watermark, the watermark embedded in the carrier to treat two-dimensional image of the DCT transform, and then embedding the watermark
- 2022-03-25 18:46:23下载
- 积分:1
-
A rewrite its own landscaping off listBox control, can be brought directly to th...
一个自己重写美化过的listBox控件,可以直接拿来使用-A rewrite its own landscaping off listBox control, can be brought directly to the use of
- 2022-02-13 13:37:07下载
- 积分:1
-
某个公司采用公用电话传递数据,数据是四位的整数,在传递过程中是加密的,加密规则如下:
每位数字都加上5,然后用和除以10的余数代替该数字,再将第一位和...
某个公司采用公用电话传递数据,数据是四位的整数,在传递过程中是加密的,加密规则如下:
每位数字都加上5,然后用和除以10的余数代替该数字,再将第一位和第四位交换,第二位和第三位交换。-A company to transfer data using public telephones, the data is four integers, in the transmission process is encrypted, encryption rules are as follows: Each figures with five, and then divided by 10 instead of the more than a few numbers, and then The first and fourth exchange, the second and third exchange.
- 2022-01-26 00:00:43下载
- 积分:1
-
软件工程课件,介绍软件开发的技术,方法,原理(1
软件工程课件,介绍软件开发的技术,方法,原理(1-5)章-Software engineering courseware, introduction of software development techniques, methods, principles (1-5) s
- 2022-01-25 16:13:25下载
- 积分:1