In this article, I would like to mention benefits of using “Extension Methods” and provide a Nuget Package containing some of them. This feature started to be available in C # 3.0 compilers and continued in further versions (C# 4.0); it is very important for all developers especially if you would like to use the dynamism of the C# enhancements to take place in your class design. How to Create a simple Extension Method? Simply, create…

Edge detection is the process of identify the presence and location of edges by sharp discontinuities of image. Edge detection plays an important role in image processing and helps in solving many complex problems. One useful and easy to implement algorithm is the Prewitt filter. As compared to Sobel, the Prewitt masks are simpler to implement but are very sensitive to noise. Mathematically, the operator uses two 3×3 kernels which are convolved with the original…

Following the  previous post about Queues, In this post i publish a simple modular stack written in C which can be used either by assigning a static space for the elements of a dynamic one (malloc etc). In computer science, a stack is an abstract data type that serves as a collection of elements, with two principal operations: push, which adds an element to the collection, and pop, which removes the most recently added element…

In concurrent programming, concurrent accesses to shared resources can lead to unexpected or erroneous behavior, so parts of the program where the shared resource is accessed are protected. This protected section is the critical section or critical region. It cannot be executed by more than one process. Typically, the critical section accesses a shared resource, such as a data structure, a peripheral device, or a network connection, that would not operate correctly in the context…

In this post i publish a simple modular queue written in C which can be used either by assigning a static space for the elements of a dynamic one (malloc etc). Queue is a particular kind of abstract data type or collection in which the entities in the collection are kept in order. The only requirement is that the memory space which will hold the queue items have to be allocated in prior. Below is the header/source…

Kalman filtering-smoothing is a fundamental tool in statistical time series analysis: it implements the optimal Bayesian filter in the linear-Gaussian setting, and serves as a key step in the inference algorithms for a wide variety of nonlinear and non-Gaussian models. However, using this kind of filter in small embedded systems is not a good choice due to the computational intensive maths. For that reason there are several variations of the original Kalman filter which may…

J-Lock Encryption Tool is a windows application dedicated to securely encrypt your files. The encryption algorithm that is utilized in this software is well know AES. For the most of the security, this application does not store any password (beware that there is no recovery of the file(s) in case you loose you password). For more information please contact us at: i_-_-_s(at)outlook.com or apps(at)devcoons.com. The full version of this application is available in Microsoft Store @ …

The I²C bus is the most popular of the three current serial EEPROM protocols because of its simplicity, high signal density, and unique write protect (WP) pin characteristics. This illustration shows the typical pin-out of an I²C device with pins 1 through 3 as address pins A0, A1, and A2. Pin 4 is designated as ground, Vcc, while pin 5 is the data line, SDA. The clock signal SCL is at pin 6, pin 7…

KWP2000/UDS devices are essential tools for anyone who wants to tinker with a vehicle’s onboard computer system. Whether you’ll use yours for chip tuning a hobby-racing vehicle or you need to equip your auto-shop business with better on-board vehicle diagnostics (OBD) programming tools. KWP2000 actually stands for Keyword Protocol 2000, which is the name of a set of communications codes employed by vehicle computers and systems that meet the OBDII regulatory standard. Diagnostic scanners and…

In our times, there has been a tremendous evolution of technology that among others has extended human capabilities. One of the latest adapted concepts with a significant impact in various sectors is the Blockchain technology. This term was first coined in 2008 by an individual (or group) under the name of Satoshi Nakamoto in a white-paper entitled Bitcoin: A Peer-To-Peer Electronic Cash System.. This paper represents a decentralized peer-to-peer version of the electronic cash that…

Warnings about bitcoins and other cryptocurrencies are coming from all directions. Concerns about the security of the cryptocurrency have continued to shadow it. Last year, almost 120,000 bitcoin worth around $78m (£58m)were stolen from Hong Kong-based Bitfinex, one of the most popular cryptocurrency exchanges, which resulted in a 20% drop in the value of the currency at the time. Moreover, there is also a high risk of fraud. There is still a good deal of misinformation and lack…

Universal Plug & Play describes devices that work with a computer system as soon as they are connected. UPnP is an extension of this idea that expands the range of Plug and Play devices to networking equipment. Universal Plug and Play uses network protocols to allow a wide range of devices to be interconnected and work seamlessly with each other. [1] Since most UPnP devices support zero-configuration setup (like ordinary Plug and Play devices), it…