Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (14)
Intelligent home based on STM32 under the source c
no vote
Application background     smart home is a residential, home appliances and home appliances as the main control object, the use of integrated wiring technology, network communication technology, security technology, automatic control technology, audio and video
sk59698
2016-08-23
0
1
Particle system source code
4.0
Application background This is a particle system produced by the use of asphyre310, free particle editing a number, life cycle, initial velocity and direction of the rate and each particle, rotation speed and acceleration, gravity, color and so on information, thereby conveniently making explosion, fountains, snow, fireworks and so on of the amazing effect, editing can conveniently in the procedure call.
sk59698
2016-08-23
0
1
Authentication Android source
no vote
Application background Android and IIS authentication source code, in the Android mobile project development, access to the server, in order to be simple and convenient, we often use HTTP protocol to transmit data in JSON format. However, some projects need to have a certain security, such as the use of Android client login to the MIS system. Although we are through the Android mobile client landing Activity in the system, but a little understand the computer hackers are able to jump over the landing Activity, and thus directly into the system. In this way, it will cause some problems due to the system's security. It is important to establish a pattern of authentication mode which is very important to prevent hackers from forcing login. At this point, the identity of the system has become a barrier to the hacker to log in. So, how to achieve an identity verification? Let us take the IIS as the host, step by step to realize the authentication.
sk59698
2016-08-23
0
1
VC source code for the detection and tracking of v
no vote
Application background
sk59698
2016-08-23
0
1
VC source code for the detection and tracking of v
4.0
Resource description AppWizard created this MachineVision application for you. This application Not only demonstrated the use of basic knowledge of Microsoft But also the starting point for the application. This file contains a summary of what you will find in each file MachineVision application. MachineVision.dsp This file (project file) contains the project level and information Used to build a single project or sub project. Other users can share Item (.Dsp) files, but they should be in the local export makefile. MachineVision.h This is the main application header file. It includes other Projects (including Resource.h) and declare a specific header CMachineVisionApp application classes. MachineVision.cpp This is the main application source file, which contains the application Class CMachineVisionApp. MachineVision.rc This is a list of Windows Micros
sk59698
2016-08-23
0
1
VC source of the oil drilling machine
no vote
Application background With the exploration and development of oil exploration and development, the complexity of drilling engineering is the development of new equipment, new tools and new technology. It also makes the design and construction of the drilling engineering. With the special drilling technology, the special process of special processing software will be generated. On behalf of the products have a balanced well design and construction analysis software (HUBS) and the stress analysis software (GMI) and other software products, are powerful, high accuracy, stable operation, strong operability, good compatibility.
sk59698
2016-08-23
0
1
Android two-dimensional code scanning function sou
no vote
Application background Android two-dimensional code scanning function source code, the last to do a two-dimensional code scanning, two-dimensional code scanning, and now the source code to share out, for everyone to learnTest @ two-dimensional code scanning (Android), is the world's mobile phone launched an Android platform for free software, with the identification of the function of the commodity bar code and two-dimensional code, in theStorage management, the generation of two-dimensional code is also very good. Is usually used for bar code scanning, resource scanning download, train ticket, tax invoice scanning, etc..
sk59698
2016-08-23
0
1
VB source code for quality grading of dissolved we
no vote
Application background VB source code of the quality classification of the dissolved welded joints, according to the level of the input test data, automatic evaluation level. Special quality grading evaluation for weld joint.
sk59698
2016-08-23
0
1
Face recognition source code
4.5
Application background Face recognition system has a wide range of applications: face recognition access management system, face recognition access control time and attendance system, monitoring management of face recognition, face recognition and computer security guard and search photos of face recognition, face recognition visit registration, face recognition ATM machine intelligent video alarm system, face recognition prison intelligent alarm system. Face recognition RFID smart clearance system. Face recognition public security criminal pursuit of intelligent alarm system and so on.Scope of application: Park, factory, supermarket, residential square, conference center, sports venues, schools, hospitals, residential areas, commercial street, large farmers market and other public activities and gathering places of important parts, hotel (hotel), dining, entertainment, office building lobby entrance, elevator and other major channels, such as room and outside the r
sk59698
2016-08-23
1
1
Smart home system source code
4.0
Application background Smart home allows users to more convenient means to manage the home devices, such as the touch screen, handheld remote control, telephone, Internet to control home appliances, more can be implemented in a situation, so that the formation of multiple devices linkage; on the other hand, intelligent home devices can communicate with each other without the need for user command can also be based on different state interactive operation, so as to bring the greatest degree of convenient, efficient, safe and comfortable. The so-called smart home era is the era of the Internet of things into the home. It not only refers to those phones, tablet PCs, small household electrical appliances, computers, cars, should also include food and drink Lazard sleep, safety, health, friends, and furniture home almost all objects and living. The purpose is to make people's home life more comfortable, more simple, more convenient and more happy. Key Te
sk59698
2016-08-23
1
1
View More