Search Results - (( render extraction method algorithm ) OR ( java application matching algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2
  3. 3

    Out-of-core simplification with appearance preservation for computer game applications by Tan, Kim Heok

    Published 2006
    “…During run-time, the visible mesh is rendered based on the distance criterion by extracting the required data from the previously generated octree structure. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Out-of-core simplification with appearance preservation for computer game applications by Bade, Abdullah, Daman, Daut, Sunar, Mohd. Shahrizal, Tan , Kim Heok

    Published 2006
    “…During run-time, the visible mesh is rendered based on the distance criterion by extracting the required data from the previously generated octree structure. …”
    Get full text
    Get full text
    Monograph
  5. 5

    The development of level of detail (LOD) technique in 3D computer graphics application by Ismail, Nor Anita Fairos, Daman, Daut, Mohd. Rahim, Mohd. Shafry

    Published 2009
    “…During run-time, the visible mesh is rendered based on the distance criterion by extracting the required data from the previously generated octree structure. …”
    Get full text
    Get full text
    Monograph
  6. 6
  7. 7
  8. 8

    Modeling 2D appearance evolution for 3D object categorization by Mohd Zaki, Hasan Firdaus, Shafait, Faisal, Mian, Ajmal

    Published 2016
    “…Experiments on the ModelNet40 and ModelNet10 datasets show that the proposed method consistently outperforms existing state-of-the-art algorithms in 3D shape recognition.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10

    Craniofacial surgery simulation using volumetric object representations by Rana, Mohammad Azam, Setan, Halim, Majid, Zulkepli, Chong, Albert K.

    Published 2006
    “…The surfaces of soft tissue and hard tissue have been extracted from CT data using Marching Cubes algorithm and are rendered with surface based methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Trajectory planning and simulation for 3d printing process by Ng, Chin Yong

    Published 2022
    “…The slicing method used is basic slicing. The slicing algorithm consists of two sections: intersection point tracking algorithm and contour creation algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Evaluating the Efficacy of Intelligent Methods for Maximum Power Point Tracking in Wind Energy Harvesting Systems by Umar D.A., Alkawsi G., Jailani N.L.M., Alomari M.A., Baashar Y., Alkahtani A.A., Capretz L.F., Tiong S.K.

    Published 2024
    “…These traditional methods in the standalone form are characterized by some drawbacks which render the method ineffective. …”
    Review
  16. 16

    POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD by HENG KEOW, CHUAH

    Published 2012
    “…Unfortunately, the signal under investigation is often polluted by noises, rendering the extraction of features a difficult task. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Automated fault detection and extraction under gas chimneys using hybrid discontinuity attributes by Imran, Q.S., Siddiqui, N.A., Latiff, A.H.A., Bashir, Y., Khan, M., Qureshi, K., Al-Masgari, A.A.-S., Ahmed, N., Jamil, M.

    Published 2021
    “…The result is the volume with razor sharp discontinuities which are tracked and extracted automatically. Contrary to several available fault tracking techniques that use local seismic continuity like coherency attributes, our hybrid method is based on directed semblance, which incorporates aspects of Dave Haleâ��s superior fault-oriented semblance algorithm. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Human action recognition using slow feature analysis / Bardia Yousefi by Bardia, Yousefi

    Published 2016
    “…The Gabor wavelet-based and supervised method is efficient in terms of Gabor beam utilization and object recognition-directed task through form pathway. …”
    Get full text
    Get full text
    Thesis
  20. 20