Embedded Systems and Computer Vision Blog

Tuesday, 17 March 2015

Operating Systems Programming (Advanced) Bit Field Manipulation: A poker game in C

›
Problem Statement and Description: 1 Structure of the bit fields 1.1 The card bit field As explained above only six bits are reall...
1 comment:
Saturday, 28 June 2014

A dynamic password based security system

›
The basic block diagram of setup is as below: So this contains two parts, one is authentication and second is security. Here ...
1 comment:
Friday, 1 November 2013

Call a User Space Application from Kernel Space Module

›
Hello, Calling a user space application from kernel space is called Upcalling, and the application which is being called is termed...

Timer Interrupt in Linux Kernel

›
Hello, So, all the stuff starts with this function, Now, all the setup is to be done in this function. First in this func...

A C program in Linux to send an SMS using SIM900 GSM Modem

›
Hello, This is a tutorial which will show you, how you can send a Text SMS to a mobile number using a GSM Modem. Here I used GSM Mod...
1 comment:

Generate True and Unique Random Number in a C Program

›
Hello,             Have you ever tried to generate a random number in C Program?             And face the problem that it gives sa...
1 comment:
Friday, 27 September 2013

Motion Detection and Speed Estimation using OpenCV

›
Hello Reader,                 Action Detection and Speed Estimation, this is what I wanted to do. I started making this bit in my Underg...
6 comments:
Home
View web version

About Me

Harry
View my complete profile
Powered by Blogger.