Tags
raster scan and random scan
computer graphics
information security
3d rotation with axis
shearing
scaling
reflection
rotation
translation
overview of 2d and 3d transformation
character generation
boundary fill
flood fill
polygon
dda line drawing algoritm
crt
software piracy
it act 2000
it act 2008
cyber crime and cyber law
data recovery
ppt
See more
- Presentations
- Documents
- Infographics