Source Code Online Home Categories Top Code New Code Submit Code
Search
Code Directory
 ASP
 ASP.NET
 C/C++
 CFML
 CGI/PERL
 Delphi
 Development
 Flash
 HTML
 Java
 JavaScript
 Pascal
 PHP
 Python
 SQL
 Tools
 Visual Basic & VB.NET
 XML
New Code
XpoLog Center 5.0
Faxmind Server 5.1.1.0730
SourceAnywhere 6.0
Calculate Relative Time Ago 0.0.1
VISCOM Video Edit Gold SDK ActiveX 10.5
Ready Made MLM Script 1.0.4
Hotel Management - Full Board Version 5.26
dbForge Studio for MySQL 6.2
EditCNC 3.0.2.9b
VISCOM Video Chat SDK 3.17
VISCOM Motion Detection SDK ActiveX 6.58
Fax Server Pro 8.9.0724
How to Generate Multiple Barcodes on a Single Image inside .NET Apps 2.1
VISCOM Video Capture Mobile ActiveX 5.15
VISCOM VideoCap Live ActiveX OCX SDK 5.14
Top Code
OpenWire Studio Beta2
SignalLab VC++ 5.0.3
PlotLab VC++ 5.0.3
IntelligenceLab VC++ 5.0.3
InstrumentLab VC++ 5.0.3
BasicVideo VC++ 5.0.3
AudioLab VC++ 5.0.3
VisionLab .NET 6.0
VideoLab .NET 6.0
SignalLab .NET 6.0
PlotLab .NET 6.0
IntelligenceLab .NET 6.0
InstrumentLab .NET 6.0
BasicVideo.NET 6.0
LogicLab VCL 7.0
Top Search
Source Code Of Add Comment In Php
Get Ip Address From Url
Flash Guestbook
Photo Add Comment Php
Add Comment Script
Social Networking Site On Php
Video Embed Script
Php Flatfile Gallery
Comments And Ratings
Carpooling Website Php
Ajax Comment Box
Zesium Mobile Pdf Reader Activation Code
Mobile Dialer Operator Code
Dirty Word
Khandbahale Activate Code
Related Search
Btree Algorithm
Btree Php
Cpu Algorithm
Diff Algorithm
Digital Diary Program Algorithm
Enhance Second Chance Algorithm
Floyds All Pairs Shortest Path Algorithm
Huffman Algorithm Implemented In Java
Huffman Algorithm In Core Java
Huffman Algorithm Python
Huffman Compression Algorithm
Idea Algorithm
Lsb Steganography Algorithm
Lsb Steganography Algorithm Using Matlab Project
Opacity Algorithm
 Btree Algorithm 

Code 41-60 of 60   Pages: Go to  << Prior  1  2  3  page  



This code implements Bresenham Line Algorithm with slight modification of error term in respect of computation efficiency that it does not require any division process. Hence it is more efficient. Also it has been generalized to draw lines of any slope. Point input order is thus insignificant. I hope this code would be helpful.



Kruskal's algorithm is used to find the branches of a ''tree'' having the minimum weight in a system of branches. The application of this algorithm is wide. One example is in finding the shortest (and cheapest) path of interconnecting several...



Compute the distance map to a set of points using the fast marching algorithm.
Solves the 2-D eikonal PDE.



This new algorithm automatically obtains the true colocalization in a pair of fluorescence confocal images.
The algorithm was integrated in a graphical users interface (GUI_COLOC).
The rationale of the algorithm has been submitted for...



The algorithm computes the optimal route from a fixed predetermined starting point to all other cities without returning to the starting point.



Encryption Algorithm Simulation Script is an useful javascript and is a handy tool for webmasters to protect their source and other content pages. This module uses two parameters with encryption algorithm that uses an array to produce an effective...



Porter Stemming Algorithm is a very simple utility that works on a algorithm which can reduce english words to their word stems - without the "ing", "ings";"s" etc., This scrpt is very useful for Search engine...



General hash function algorithm implementations for series of commonly used additive and rotative string hashing in the object pascal programming language.For more information please visit:http://www.partow.net/programming/hashfunctions/index.html



Unique image comparison algorithm implemented as standalone dll file. It has only one exported function with two bitmap pointers in and similarity percentage out.



Encryption is the process of transforming information or data using an algorithm to make it unreadable to anyone except those who implements it, usually referred to as a key. In our case in order to add more security we add with a constant number....



This algorithm converts a base c number into a base b number. Parameters c and b are arbitrary are not constrained by any bounds. The input n is a list and the output is a list.



Draws a random Bezier Curve using De Casteljau algorithm.



The algorithm is based on the idea
that the next larger prime after one prime is the sum of the two smaller previous minus three prime numbers back.
For the first five prime numbers 2,3,5,7,11 this pattern is not true also it is not...



sieve-of-eratosthenes algorithm with efficient scaling for big numbers.



Algorithm for solving search and optimization problems.



Finds the nth prime without using a sieve algorithm.



The recipe illustrates a Python implementation of the bitsort algorithm. This algorithm is illustrated in the book "Programming Pearls" by Jon Bentley. The bitsort algorithm provides a very efficient way to sort large numbers in disk files.



An implementation of the token bucket algorithm in Python.



A classic algorithm which can produce entertaining output, given a sufficiently large input



An algorithm to numerically invert functions in the Laplace field is presented.
It is based on the Fast Fourier Transform (FFT) technique and yields a
numerical solution for t=a ("a" is a real number) for a Laplace function