Sort by
  1. Language:All
  2. Category:All
  3. Time:ALL
  4. View:100—300 times
Remove all
Language More Hide
Category More Hide
Time
View
More

Vehicle detection based on VC++

Vehicle Detection: a recognition of the vehicle contour, and that the vehicle contour 2 shows the relative speed of the vehicle, after testing, the actual available....

Five

Five-star international online lottery betting system, source code, absolutely free, there is thought to be altered, used in...

Digital Identification System

Instructions for use: The first step: training network. Using the training samples for training. (This program may not training because I have to save up the trained network parameters, when the reader can be used in direct recognition) Step Two: Identify.   First, open the image...

NC machining simulation

Dimensional NC simulation VC source code, hope useful for learning control machining simulation programming friends. VC6.0 source code is compiled, it has been re-compiled with VS2008. Welcome everyone to download....

One-dimensional bar code identification system

One-dimensional bar code identification system based on VC6.0,  pre-processing the input barcode image, further identification,  is critical for good scanning identification based on barcode. Containing identification pictures....

Image fusion procedure Guinness

Image fusion procedure, including IHS PCA Laplace PCNN Wavelet tries to guarantee of a lot of it is your own debug logging to work, is carefully for my senior thesis....

基于视察的三维重建

能够打开双相机进行三维重建,重建速度不错,  Ÿ   Windows 7 64位旗舰版 Ÿ   OpenCV SVN (v2.4.9) Ÿ   x64 应用...

Reversible Watermarking based on difference program

The program uses matlab2008a Development, mainly because of matlab In terms of image processing advantages, simpler operation, also in order to become familiar with matlab To use. The program uses the classic lena Image as a target and achieve embedding the watermark, and restore the image....

STEGANOGRAPHY APPLICATION FOR IMAGES WITH BITMAP FORMAT WITH END OF FILE METHOD

  Advancement of data communication making security and confidentiality of the information to be very important. Confidential information is vulnerable to be stolen by unauthorized person. Data security can be done by applying cryptography and steganography techniques. Cryptography is the s...

prev 1 2 3 4 5 6 7 8 9 10 ... 21348 next

LOGIN

Don't have an account? Register now
Need any help?
Mail to: support@codeforge.com

切换到中文版?

CodeForge Chinese Version
CodeForge English Version

Where are you going?

^_^"Oops ...

Sorry!This guy is mysterious, its blog hasn't been opened, try another, please!
OK

Warm tip!

CodeForge to FavoriteFavorite by Ctrl+D