Solved

Capture the images Using External Camera with delphi

Posted on 1998-12-20
4
276 Views
Last Modified: 2010-04-04
How to capture the images Using External Camera with delphi?
0
Comment
Question by:quake241
  • 3
4 Comments
 
LVL 1

Accepted Solution

by:
rpetruni earned 100 total points
ID: 1352229
I have some examples (150kb), if you want i will send it to you...
It's delphi project file (not mine i downloaded it somwhere from network)....
There is also good article on www.undu.com
Read it ....
0
 

Author Comment

by:quake241
ID: 1352230
thank you.
please send at sc383241@sci.kku.ac.th
0
 

Author Comment

by:quake241
ID: 1352231
thank you.
please send at sc383241@sci.kku.ac.th
0
 

Author Comment

by:quake241
ID: 1352232
thank you.
please send at sc383241@sci.kku.ac.th
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
HTML text in the body of an email (delphi code) 12 118
Convert a string into a TDateTime 5 61
JAudiorecorder record freezing the app 29 67
Base1 Encode/Decode 3 77
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question