Embedded Systems and Computer Vision Blog
Tuesday, 17 March 2015
Operating Systems Programming (Advanced) Bit Field Manipulation: A poker game in C
›
Problem Statement and Description: 1 Structure of the bit fields 1.1 The card bit field As explained above only six bits are reall...
1 comment:
Saturday, 28 June 2014
A dynamic password based security system
›
The basic block diagram of setup is as below: So this contains two parts, one is authentication and second is security. Here ...
1 comment:
Friday, 1 November 2013
Call a User Space Application from Kernel Space Module
›
Hello, Calling a user space application from kernel space is called Upcalling, and the application which is being called is termed...
Timer Interrupt in Linux Kernel
›
Hello, So, all the stuff starts with this function, Now, all the setup is to be done in this function. First in this func...
A C program in Linux to send an SMS using SIM900 GSM Modem
›
Hello, This is a tutorial which will show you, how you can send a Text SMS to a mobile number using a GSM Modem. Here I used GSM Mod...
1 comment:
Generate True and Unique Random Number in a C Program
›
Hello, Have you ever tried to generate a random number in C Program? And face the problem that it gives sa...
1 comment:
Friday, 27 September 2013
Motion Detection and Speed Estimation using OpenCV
›
Hello Reader, Action Detection and Speed Estimation, this is what I wanted to do. I started making this bit in my Underg...
6 comments:
Home
View web version