Search Results - (( developing implementation rendering algorithms ) OR ( java implementation modified algorithm ))
Search alternatives:
- developing implementation »
- implementation rendering »
- implementation modified »
- rendering algorithms »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Ray Casting for Iso-surface in Volumetric Data
Published 2005“…Over the years, many rendering algorithms have been created and enhanced. …”
Get full text
Get full text
Final Year Project -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
Get full text
Get full text
Thesis -
7
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…The implemented algorithm replaced the original content of the files with uninformative words provided by the application. …”
Get full text
Get full text
Get full text
Article -
8
Dynamic scene occlusion culling in architectural scenes based on dynamic bounding volume
Published 2006“…In this thesis, the aim of the research carried out, is to handle dynamic objects efficiently with faster frame rate display. This algorithm is implemented using portal occlusion culling and kD-tree, which is suitable for indoor and architectural scenes. …”
Get full text
Get full text
Thesis -
9
Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution
Published 2006“…The visualization of the segmented structures uses a combination of volume rendering and surface rendering. The mutual information algorithms used in this work has been developed and experimented in the system and has proven to yield more accurate and stable results than other algorithms. …”
Get full text
Get full text
Thesis -
10
Craniofacial surgery simulation using volumetric object representations
Published 2006“…The surfaces of soft tissue and hard tissue have been extracted from CT data using Marching Cubes algorithm and are rendered with surface based methods. …”
Get full text
Get full text
Conference or Workshop Item -
11
Development of LabVIEW FPGA program for Energy Management System (EMS) Controller for Hybrid Electric Vehicle (HEV)
Published 2016Get full text
Get full text
Final Year Project -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
Virtual GIS walkthrough Innovation Center / Mohd Sufean Abu Samah
Published 1999“…A standard called VRML (Virtual Reality Modeling Language) and Caligari Truespace 3.0 has been developed to enable virtual reality application to be implemented on the web. …”
Get full text
Get full text
Thesis -
14
Simulation of multiple mobile robots using JMonkey Engine
Published 2016“…Nowadays simulation in the robotics field is very important before the implementation of the real mobile robot. Due to the advanced robotics system are getting more complex nowadays, simulation has become a valuable tool which helps researchers in development industry and testing robot control algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Transcultural diabetes nutrition algorithm : a Malaysian application
Published 2013“…However, Asian patients with T2D, including Malaysians, have unique disease characteristics and risk factors, as well as cultural and lifestyle dissimilarities, which may render international guidelines and recommendations less applicable and/or difficult to implement. …”
Get full text
Get full text
Get full text
Article -
16
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…The algorithms for the conveyor system were implemented using C# within Visual Studio and Unity environments. …”
Get full text
Get full text
Get full text
Article -
17
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
Get full text
Get full text
Get full text
Article -
18
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
Get full text
Get full text
Article -
19
Developement of 3D virtual environment for Teratai College, UiTM Shah Alam using open source platform / Tengku Mohd Najib Tengku Ishak
Published 2006“…Therefore a project for developing a web map that enables a user to connect in a virtual visit to Teratai College in UiTM Shah Alam is proposed. …”
Get full text
Get full text
Thesis -
20
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article
