Search Results - (( java implication tree algorithm ) OR ( process implementation rendering algorithms ))
Search alternatives:
- implementation rendering »
- process implementation »
- rendering algorithms »
- java implication »
- implication tree »
- tree algorithm »
-
1
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
Get full text
Get full text
Thesis -
2
Performance comparison of colour correction and colour grading algorithm for medical imaging applications
Published 2021“…In medical imaging, researchers have considered colour correction as an essential part in their pre-processing step prior to diagnosis. There are various statistical methods in colour correction and colour grading algorithm being implemented nowadays and finding the best algorithm with high accuracy is non-trivial. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Panoramic image matching method for UAV remote sensing based of sift algorithm
Published 2024text::Final Year Project -
5
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. …”
Get full text
Get full text
Get full text
Article -
6
Diagonal-Newton Fast Iterative Shrinkage-Thresholding Algorithm for solving linear inverse problems in image restoration
Published 2025“…The incorporation of second-order information through diagonal matrix avoids the implementation difficulty of storing a dense matrix and hence rendering the algorithm suitable for large-scale problems. …”
Get full text
Get full text
Get full text
Article -
7
Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks
Published 2011“…The first model is based on original HMAC-SHA1 algorithm and the second one is based on a proposed modified HMAC-SHA1 (M-hmac) algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…The algorithms for the conveyor system were implemented using C# within Visual Studio and Unity environments. …”
Get full text
Get full text
Get full text
Article -
9
Testing the minimal bounded space method on vision-based drone navigation / Yap Seng Kuang
Published 2021“…The results shown from these prior works are encouraging as they do not require complex processing. Furthermore, they show how MBS is successfully implemented for real-time robot experiments. …”
Get full text
Get full text
Get full text
Thesis -
10
Handover Management for Drones in Future Mobile Networks—a Survey
Published 2024journal::journal article -
11
Robust Data Fusion Techniques Integrated Machine Learning Models For Estimating Reference Evapotranspiration
Published 2022“…This for can all model to estimate the be regarded as the major contribution as it could po ssibly elim inate the process of local data collection for the development or calibration of a local ET proposal and implementation of water 0 estimating model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
