Let other applications in their Form run ... this comes From shrimp off FOSS
标签: applications shrimp other comes
上传时间: 2013-12-06
上传用户:1051290259
3D reconstruction, medical image processing From colons, using intel image processing for based class. This source code. Some code missing but I think you can understand it. Development version. This source code is very interesting for learning segmentation and registration From dataset. This code also has some technique about GPU image processing for ray tracing. Also learn many filter apply for transform From spatial domain to frequency domain.
标签: processing image reconstruction medical
上传时间: 2013-12-19
上传用户:q123321
useful api,you can get reference From it
上传时间: 2013-12-05
上传用户:kristycreasy
Flash 图像显示 - 滑动图片 - scroll image From right to left or left to right… click on the image and drage (left or right)
上传时间: 2014-01-24
上传用户:ryb
remove background noise From speech signal
标签: background remove speech signal
上传时间: 2015-11-28
上传用户:zukfu
Make and answer phone calls Detect tone and pulse digit From the phone line Capture Caller ID Support blind transfer, single-step transfer/conference, consultation transfer/conference, hold, unhold. Control of the local phone handset, microphone and speaker of the modem Send and receive faxes Play and record on the phone line or sound card Play music in background mode Silence detection VU Meter Wave sound editor that allows your end-users to edit their own sound files. Voice recognition and voice synthesis. Full control over the serial port device ZModem file transfer utility File compression and encryption utility
上传时间: 2013-11-30
上传用户:水中浮云
Contents * Introduction * Installation * SmartPool 1.5 * Features From earlier releases * Features expected in future releases * System Requirements * User Documentation * Source * Java Doc
标签: Introduction Installation SmartPool Contents
上传时间: 2015-12-02
上传用户:开怀常笑
What Does the code DO? Sometimes we may desire to hide our file contents From others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read From the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
标签: Sometimes the contents desire
上传时间: 2013-12-25
上传用户:playboys0
This C++ code example provides a method for transferring objects or chunks of data From one device to another via the Bluetooth OBEX protocol. These chunks are typically files or other blocks of binary data. This example demonstrates how to run OBEX on top of the Bluetooth RFCOMM protocol, but OBEX can also be used with other transport media, such as IrDA and USB.
标签: transferring provides example objects
上传时间: 2015-12-02
上传用户:13160677563
this come From alter ,you can look and find it on line.
上传时间: 2013-12-15
上传用户:baitouyu