-
-
-
wavelet.rar
... substantial storage and transmission resources, thus image compression is advantageous to reduce these requirements. The report covers some background of wavelet analysis, data compression and how wavelets have been and can be used for image compression. ...
-
OReilly-Learning-OpenCV.zip
This book provides a working guide to the Open Source Computer Vision Library (OpenCV) and also provides a general background to the field of computer vision suf- ficient to use OpenCV effectively.
-
PMDIBackground.rar
SAMPLE OF VISUAL BASIC MDI BACKGROUND EXAMPLE
PROJECT NAME :PMDIBackground.vbp
-
OPNET-Modeler-and-Ns-2-Comparing-the-Accuracy-Of-
... its simplicity of
modeling. A custom analysis tool was employed to examine the behavior of the network in different background
traffic scenarios. The same scenarios were then recreated in the simulators in order to ascertain their realism. The
results ...
-
A-Pong-Gam218776292001.zip
A pong game in java.It s got random bricks that make things interesting. When the skill level changes,the background changes.You can make the applet any size, just remember to make the size of the backgrounds the same size as the applet. The game has more ...
-
_ComPortUniv.zip
An app that sends/receives bytes through PC serial port. Not interrupt driven, but polling based. Background thread implemented to handle communications. Easy to build your own specific app on top of this.
-
imagescn.rar
... are visible, were higher layers have the value NaN. This is helpful e.g. to show measurement (=foreground) results "above" a map (=background), to separate NaN values within a 2D matrix from the lowest value (standard image shows the same color at NaN as ...
-
BufferDC_src.zip
Flicker free redrawing and background buffering of drawing with two simple classes
-
1682_952_final-thesis.rar
... power consumption and energy consumption of all
candidates because those metrics are the crucial
constraint of IMD. Also the background information
of all candidates will be introduced and all relevant
metrics such as security level, encryption rates ...
-