Search Results - (( developing program rendering algorithms ) OR ( java identification method algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Ray Casting for Iso-surface in Volumetric Data by Ngoc Anh, Do Hoang

    Published 2005
    “…Over the years, many rendering algorithms have been created and enhanced. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Hybrid scheduling and dual queue scheduling by Mahmood, Ahmad Kamil

    Published 2009
    “…Our research work involves the design and development of new CPU scheduling algorithms (the Hybrid Scheduling Algorithm and the Dual Queue Scheduling Algorithm) with a view to optimization. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Hybrid scheduling and dual queue scheduling by A., Oxley, S.N.M., Shah, A.K., Mahmood

    Published 2009
    “…Our research work involves the design and development of new CPU scheduling algorithms (the Hybrid Scheduling Algorithm and the Dual Queue Scheduling Algorithm) with a view to optimization. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Audio files comparator using wavelet transform and similarity metrics by Lee, Da Long

    Published 2025
    “…The aim of this project is to develop a program that utilizes continuous wavelet transform (CWT) for audio similarity recognition. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…These existing schemes, however, rely on different types of cryptographic methods that usually have high computation complexity. …”
    Get full text
    Get full text
    Thesis