Source Code Online Home Categories Top Code New Code Submit Code
Search
Code Directory
 ASP
 ASP.NET
 C/C++
 CFML
 CGI/PERL
 Delphi
 Development
 Flash
 HTML
 Java
 JavaScript
 Pascal
 PHP
 Python
 SQL
 Tools
 Visual Basic & VB.NET
 XML
New Code
HTMLPad 2015 13.0
WeBuilder 2015 13.0
Dynamic Web TWAIN 10.1
VISCOM DVD Author ActiveX OCX SDK 5.02
InstallAware Express MSI Installer X2
Joyfax Server 10.42.1216
Exe Guarder 4.1334
VISCOM DVD Burner ActiveX SDK 4.46
Fax Server Pro 9.2.1215
Spring Edge Send SMS API Code 1.0
VISCOM 3D Carousel SDK ActiveX 2.39
VISCOM Audio CD Burner ActiveX Ocx SDK 1.68
VISCOM Audio Capture Pro ActiveX SDK 2.22
MDB to CSV Converter 1.10
InstallAware Studio for Windows Installer X2
Top Code
PHP Digital Download Script 1.0.4
GS RichCopy 360 File Copy Software 7.1
WTK MLM Software 1.6.5
Duceplus 2.1
SoundCloud Clone 3.0
Netflix Clone 3.0
Hulu Clone 3.0
DTM Data Generator for JSON 1.00.01
OpenWire Studio Beta2
SignalLab VC++ 5.0.3
PlotLab VC++ 5.0.3
InstrumentLab VC++ 5.0.3
BasicVideo VC++ 5.0.3
Contest Software - Agriya v2.0b2
AudioLab VC++ 5.0.3
Top Search
Photo Add Comment Php
Source Code Of Add Comment In Php
Comments And Ratings
Enhance Social Networking
Mobile Dialer Operator Code
Gold On Mini Planet
Add Rss Feeds To Website
Image Info
Sample Christmas Party Program Emcee
Submit Url Insurance
Website Value
Add Comment Script
Banned Koc
Branch And Bound Algorithm
Comment Form For Website
Related Search
Ms Gsp Algorithm
Source Code For Ms Gsp Algorithm
Gsp Algorithm Source Code
Gsp Algorithm Source Code In Java
Gsp Algorithm
Gsp Algorithm Code
Implement The Ms Gsp Algorithm
Algorithm Ms Gsp Source Code
Cpu Algorithm
Diff Algorithm
Digital Diary Program Algorithm
Enhance Second Chance Algorithm
Floyds All Pairs Shortest Path Algorithm
Huffman Algorithm Implemented In Java
Huffman Algorithm In Core Java
 Gsp Algorithm 

Code 41-60 of 60   Pages: Go to  << Prior  1  2  3  page  



This code implements Bresenham Line Algorithm with slight modification of error term in respect of computation efficiency that it does not require any division process. Hence it is more efficient. Also it has been generalized to draw lines of any slope. Point input order is thus insignificant. I hope this code would be helpful.



Kruskal's algorithm is used to find the branches of a ''tree'' having the minimum weight in a system of branches. The application of this algorithm is wide. One example is in finding the shortest (and cheapest) path of interconnecting several...



Compute the distance map to a set of points using the fast marching algorithm.
Solves the 2-D eikonal PDE.



This new algorithm automatically obtains the true colocalization in a pair of fluorescence confocal images.
The algorithm was integrated in a graphical users interface (GUI_COLOC).
The rationale of the algorithm has been submitted for...



The algorithm computes the optimal route from a fixed predetermined starting point to all other cities without returning to the starting point.



Encryption Algorithm Simulation Script is an useful javascript and is a handy tool for webmasters to protect their source and other content pages. This module uses two parameters with encryption algorithm that uses an array to produce an effective...



Porter Stemming Algorithm is a very simple utility that works on a algorithm which can reduce english words to their word stems - without the "ing", "ings";"s" etc., This scrpt is very useful for Search engine...



General hash function algorithm implementations for series of commonly used additive and rotative string hashing in the object pascal programming language.For more information please visit:http://www.partow.net/programming/hashfunctions/index.html



Unique image comparison algorithm implemented as standalone dll file. It has only one exported function with two bitmap pointers in and similarity percentage out.



Encryption is the process of transforming information or data using an algorithm to make it unreadable to anyone except those who implements it, usually referred to as a key. In our case in order to add more security we add with a constant number....



This algorithm converts a base c number into a base b number. Parameters c and b are arbitrary are not constrained by any bounds. The input n is a list and the output is a list.



Draws a random Bezier Curve using De Casteljau algorithm.



The algorithm is based on the idea
that the next larger prime after one prime is the sum of the two smaller previous minus three prime numbers back.
For the first five prime numbers 2,3,5,7,11 this pattern is not true also it is not...



sieve-of-eratosthenes algorithm with efficient scaling for big numbers.



Algorithm for solving search and optimization problems.



Finds the nth prime without using a sieve algorithm.



The recipe illustrates a Python implementation of the bitsort algorithm. This algorithm is illustrated in the book "Programming Pearls" by Jon Bentley. The bitsort algorithm provides a very efficient way to sort large numbers in disk files.



An implementation of the token bucket algorithm in Python.



A classic algorithm which can produce entertaining output, given a sufficiently large input



An algorithm to numerically invert functions in the Laplace field is presented.
It is based on the Fast Fourier Transform (FFT) technique and yields a
numerical solution for t=a ("a" is a real number) for a Laplace function