Search Results - (( developing program rendering algorithms ) OR ( java identification method algorithm ))
Search alternatives:
- identification method »
- rendering algorithms »
- java identification »
- developing program »
- program rendering »
- method algorithm »
-
1
Ray Casting for Iso-surface in Volumetric Data
Published 2005“…Over the years, many rendering algorithms have been created and enhanced. …”
Get full text
Get full text
Final Year Project -
2
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Hybrid scheduling and dual queue scheduling
Published 2009“…Our research work involves the design and development of new CPU scheduling algorithms (the Hybrid Scheduling Algorithm and the Dual Queue Scheduling Algorithm) with a view to optimization. …”
Get full text
Get full text
Conference or Workshop Item -
4
Hybrid scheduling and dual queue scheduling
Published 2009“…Our research work involves the design and development of new CPU scheduling algorithms (the Hybrid Scheduling Algorithm and the Dual Queue Scheduling Algorithm) with a view to optimization. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Development of LabVIEW FPGA program for Energy Management System (EMS) Controller for Hybrid Electric Vehicle (HEV)
Published 2016Get full text
Get full text
Final Year Project -
6
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Object Oriented Software Development was used as the methodology to develop this application. …”
Get full text
Get full text
Get full text
Article -
7
Audio files comparator using wavelet transform and similarity metrics
Published 2025“…The aim of this project is to develop a program that utilizes continuous wavelet transform (CWT) for audio similarity recognition. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…These existing schemes, however, rely on different types of cryptographic methods that usually have high computation complexity. …”
Get full text
Get full text
Thesis
