Search Results - (( render extraction method algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- render extraction »
- extraction method »
- method algorithm »
- java application »
- during algorithm »
-
1
-
2
Out-of-core simplification with appearance preservation for computer game applications
Published 2006“…During run-time, the visible mesh is rendered based on the distance criterion by extracting the required data from the previously generated octree structure. …”
Get full text
Get full text
Thesis -
3
Out-of-core simplification with appearance preservation for computer game applications
Published 2006“…During run-time, the visible mesh is rendered based on the distance criterion by extracting the required data from the previously generated octree structure. …”
Get full text
Get full text
Monograph -
4
The development of level of detail (LOD) technique in 3D computer graphics application
Published 2009“…During run-time, the visible mesh is rendered based on the distance criterion by extracting the required data from the previously generated octree structure. …”
Get full text
Get full text
Monograph -
5
Panoramic image matching method for UAV remote sensing based of sift algorithm
Published 2024text::Final Year Project -
6
Modeling 2D appearance evolution for 3D object categorization
Published 2016“…Experiments on the ModelNet40 and ModelNet10 datasets show that the proposed method consistently outperforms existing state-of-the-art algorithms in 3D shape recognition.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Craniofacial surgery simulation using volumetric object representations
Published 2006“…The surfaces of soft tissue and hard tissue have been extracted from CT data using Marching Cubes algorithm and are rendered with surface based methods. …”
Get full text
Get full text
Conference or Workshop Item -
8
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
9
A De-noising Scheme for Enhancing Power Quality Problem Classification System Based on Wavelet Transform and Rule-Based Method
Published 2011Get full text
Conference or Workshop Item -
10
Trajectory planning and simulation for 3d printing process
Published 2022“…The slicing method used is basic slicing. The slicing algorithm consists of two sections: intersection point tracking algorithm and contour creation algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Evaluating the Efficacy of Intelligent Methods for Maximum Power Point Tracking in Wind Energy Harvesting Systems
Published 2024“…These traditional methods in the standalone form are characterized by some drawbacks which render the method ineffective. …”
Review -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…Unfortunately, the signal under investigation is often polluted by noises, rendering the extraction of features a difficult task. …”
Get full text
Get full text
Thesis -
14
Automated fault detection and extraction under gas chimneys using hybrid discontinuity attributes
Published 2021“…The result is the volume with razor sharp discontinuities which are tracked and extracted automatically. Contrary to several available fault tracking techniques that use local seismic continuity like coherency attributes, our hybrid method is based on directed semblance, which incorporates aspects of Dave Haleâ��s superior fault-oriented semblance algorithm. …”
Get full text
Get full text
Article -
15
-
16
-
17
Human action recognition using slow feature analysis / Bardia Yousefi
Published 2016“…The Gabor wavelet-based and supervised method is efficient in terms of Gabor beam utilization and object recognition-directed task through form pathway. …”
Get full text
Get full text
Thesis -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
20
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
