Sort by
  1. Language:All
  2. Category:TCP/IP
  3. Time:ALL
  4. View:100—300 times
Remove all
Language More Hide
Category More Hide

TCP-based hospital Queuing procedure

Based on asynchronous TCP, in which multiple threads, compressed within both client-and server-side source code, can be used for simple examples reference...

EEG monitoring

Achieve EEG acquisition and real-time display of the waveform, waveform display speed can be adjusted in size, values you can set in, and the ability to save data, easy data analysis and processing...

Smart home PC control program

Free Ads smart home indoor control PC program that uses TCP / IP to connect, you can perform a variety of lighting appliances indoor wireless remote control. Pay renderings. Using a TCP / IP connection, two-way data feedback, can clearly understand the current state of the lamp, and through the inte...

Serial debugging assistant VC program

Is serial debugging assistant more programs ... Has a lot of features, easy to add new functionality, you are welcome to download. Don't know to everyone whether it is useful....


1.install ns-allinone-2.31 orginal software in your linux pc. 2.then remove or rename the aodv protocol from ns-allinone-2.31/ns-2.31. 3.then paste this files aodv,tclfiles,input.tcl inside ns-allinone-2.31/ns-2.31. goto terminal and type cd ns-allinone-2.31 and then cd ns-2.31 and type mak...

water meter collector testing demo

 water meter collector used for verify water metet protocal ,tcp/ip transmiting producing and data exchang. it is good for you project as reference and be quickly promote it to market, good luck for you. Concentrators for meter testing had been completed in the background verify is now in volum...

secure and reliable data transmission in Wireless Sensor Network

Message Authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs).Propose a scalable authentication scheme based on EllipticCurve Cryptography (ECC).While enabling intermediate nodes authentication, proposed...

An Intrusion-Detection Model Based IN php

As the Internet services spread all over the world,many kinds and a large number of security threats are increasing. Therefore, intrusion detection systems, which can effectively detect intrusion accesses, have attracted attention. This paper describes a novel fuzzy class-associationrule mining...


10m/100m/1000m source full version, and achieved under the three models of the Mac,Verilog code, and reference documentation!...

Socket file transfer

File transmission can chatLearn how to enhance your socket transfer speed, as well as how to strengthen the stability of...

prev 1 2 3 4 5 6 7 8 9 10 next


Don't have an account? Register now
Need any help?
Mail to:


CodeForge Chinese Version
CodeForge English Version

Where are you going?

^_^"Oops ...

Sorry!This guy is mysterious, its blog hasn't been opened, try another, please!

Warm tip!

CodeForge to FavoriteFavorite by Ctrl+D