Please wait a minute...
Computer & Telecommunication  2018, Vol. 1 Issue (9): 36-38    DOI:
Current Issue | Archive | Adv Search |
The Realization of Python Seamless Calling C program in Ubuntu System
Guangdong Baiyun University
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In the actual project development, we often need to combine Python and C programming, so as to achieve win-win situation of efficient development and operation. This requires us to learn how to call C programs in Python programs. The goal of this article is to introduce the specific methods and steps of Python calling C program in Ubuntu system.
Key wordsPython      C      Ubuntu     
Published: 10 September 2018
:  TP311.1  

Cite this article:

WEI Li-mei ZHANG Shu-rong. The Realization of Python Seamless Calling C program in Ubuntu System. Computer & Telecommunication, 2018, 1(9): 36-38.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2018/V1/I9/36

[1] XU Jin-qun XIE Ye-nan ZHOU Ying GU Xiu-xiu. Driver Fatigue Driving Detection System Based on EAR Algorithm[J]. 电脑与电信, 2024, 1(6): 1-.
[2] LI Gai GUO Ze-hao. TrustOCCR: Social One Class Collaborative Ranking Recommendation Algorithm by Trust[J]. 电脑与电信, 2024, 1(6): 7-10.
[3] PAN Qi CAI Si-bo WEI Fang-fang. Building Method for Data Lineage Based on Data Table Similarity Calculation [J]. 电脑与电信, 2024, 1(6): 11-.
[4] HUANG He-lie HUANG Ge-wen CHEN Zhi-hua YAO Zu-fa. Improved Sparrow Search Algorithm for Hybrid Flow-shop Scheduling Problem with Peak Clipping Demand Response [J]. 电脑与电信, 2024, 1(6): 16-.
[5] JIA Mei-juan ZHU Qing JIANG Shan ZHANG Li-hua ZHANG Bai-shun. Risk Analysis and Prevention of Unauthorized Access to Docker API and SpringBoot Actuator[J]. 电脑与电信, 2024, 1(6): 22-.
[6] JIN Yan. Research on DDoS Attack Detection Technology based on SDN [J]. 电脑与电信, 2024, 1(6): 26-30.
[7] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[8] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[9] SUN Li-wei HUANG Ze ZHAN Mei GUO Ling LIN Li-jun. A Quantum Bit Visualization Simulation Model Based on Vizard [J]. 电脑与电信, 2024, 1(6): 40-43.
[10] ZHAO Zi-peng. Design of Waveform Type Recognition and Parameter Measurement Device Based on STM32F407 [J]. 电脑与电信, 2024, 1(6): 44-48.
[11] YANG Li-jia CHEN Xin-fang ZHAO Han-qing WANG Shi-wei. Water Quality Safety Modeling Prediction Based on Extra Tree Classifier[J]. 电脑与电信, 2024, 1(6): 57-.
[12] ZHAO Han-qing CHEN Xin-fang YANG Li-jia WANG Shi-wei LIU Yi-qing. LSTM-based Groundwater Level Prediction and Anomaly Analysis of Earthquake Precursors [J]. 电脑与电信, 2024, 1(6): 68-72.
[13] YAN Qian-he YAN Zhen-ping Xiao Su-hua. Design and Implementation of Household Kitchen Environment Monitoring System Based on Cloud Platform [J]. 电脑与电信, 2024, 1(6): 73-77.
[14] LI Jing-feng QIAO Gao-xue . Research on Intelligent Elevator Blocking System Based on Mobile Internet of Things[J]. 电脑与电信, 2024, 1(6): 78-83.
[15] XU Jian-lin JIANG Jing WANG Kai-gui ZHAO Ping-zhong. Research on the Optimization Measures and Application of High-speed Railway Private Network [J]. 电脑与电信, 2024, 1(6): 85-94.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd