Ray Tracing
What is ray tracing ?
A rendering method that traces rays of light and their interactions with
the objects in a scene
scene.
It is an image-space technique
Physics principle: color and shading of objects is the
reflection of light ray.
Ra

THE TURING TEST
The Turing test involves a computer, a human interrogator and a human foil. The
interrogator attempts to determine, by asking questions of the other two
participants, which is the computer. All communication is via keyboard and screen.
The

CP 460 Applied Cryptography
Fall 2016 Wilfrid Laurier University
Dr. Angle Hamel
Topic 8: Public Key Cryptography
These cryptosystems we have looked at so far have all been private key;
that is, the key is secret. In fact, if an opponent can discover the

CP 460 Applied Cryptography
Fall 2016 Wilfrid Laurier University
Dr. Ang`ele Hamel
Topic 1: Introduction
In this course we study applied cryptography and focus on information
security and network security.
Until relatively recently, cryptography was the c

CP 460 Applied Cryptography
Fall 2016 Wilfrid Laurier University
Dr. Angle Hamel
Topic 3: Cryptanalysis
There are four basic levels of attack:
CIPHERTEXT ONLY: the opponent has only a string of ciphertext.
KNOWN PLAINTEXT: the opponent has a string of pla

CP 460 Applied Cryptography
Fall 2016 Wilfrid Laurier University
Dr. Angle Hamel
Topic 2: Simple Cryptosystems
Alicesends message
Bobreceives message
Oscar-intercepts message (the opponent)
The goal:
Alice wants to communicate with Bob without Oscar under

CP 460 Applied Cryptography
Fall 2016 Wilfrid Laurier University
Dr. Angle Hamel
Topic 6: Modes
So how do we actually use DES (or any block cipher) anyway?
DES is used in five different modes of operation. These modes are suitable
for virtually every type

CP 460 Applied Cryptography
Fall 2016 Wilfrid Laurier University
Dr. Angle Hamel
Topic 7: Advanced Encryption Standard
Selection of the Advanced Encryption Standard
DES is fast becoming obsolete. A replacement must be found. In
January 1997 NIST (Nationa

CP 460 Applied Cryptography
Fall 2016 Wilfrid Laurier University
Dr. Angle Hamel
Topic 5: Simplified DES
DES is the Data Encryption Standard. It was developed by IBM and
was adopted by the National Bureau of Standards in the US in 1977
as a cryptographic

CP 460 Applied Cryptography
Fall 2016 Wilfrid Laurier University
Dr. Angle Hamel
Topic 9: Diffie Hellman Key Exchange and El Gamal
To understand these cryptosystems you first have to understand the
Discrete Log Problem, the hard problem on which they are

CP 460 Applied Cryptography
Fall 2016 Wilfrid Laurier University
Dr. Angle Hamel
Topic 10: Knapsack Cryptosystems
Developed by Merkle and Hellman in 1978.
One of the first public key algorithms.
Insecure! Broken by Shamir in early 80s.
Knapsack Problem

CP 460 Applied Cryptography
Fall 2016 Wilfrid Laurier University
Dr. Angle Hamel
Topic 4: Cryptanalysis of the Vigenre Cipher
Recall the Vigenre cipher is polyalphabetic, so the frequency analysis
performed for the substitution cipher will not work.
The

3
Blue
Red
Red
Green
Blue
Green
Green
Red
Figure 1.4
FILES: figures/blocks-world.eps (Tue Nov 3 16:22:27 2009). A scene from the blocks
world. S HRDLU (?) has just completed the command Find a block which is taller than the one you are
holding and put it

Intelligent Agents
Chapter 2
Outline
Agents and environments
agents operate on environments
Rationality (some agents behave better than others)
the concept of a rational agent is central to our approach to AI
PEAS (Performance measure,
Environment Actu

Local search algorithms
Inmanyproblems,thepath
yp
p
tothegoalisirrelevant;
g
thegoalstateitselfisthesolution
Nqueensproblem:orderofmovingqueensisirrelevant
Find a queens configuration satisfying constraints
Findaqueensconfigurationsatisfyingconstraints
In

Coordinate Systems
Points and vectors can be represented in a similar fashion
list of coordinates
in i, j, k format
Points and vectors are both defined with respect to a particular
coordinate system
Points and vectors are different
Coordinate Systems
Poin

CP411 Computer Graphics Final Exam Coverage Fall 2012
Closed book, calculator is allowed. Weigh 40% of the overall. Write on booklet.
CP411 A TUESDAY , DECEMBER 11, 2012 19:00-21:30 SC N1042
Part I. Graphics pipeline
1. Concepts about 3-D viewing pipeline

Object Modelling and Representation I
1.
2.
3.
4.
5.
5
6.
3D coordinates and vertex
Line equations
Plane equations, normal
Modeling 3D objects with wire frame
Modeling 3D objects with polygons
Hierarchical modeling
Some of the slides are from the CG cours

Homogeneous Coordinates
Claimed:
To convert a Cartesian point to a homogeneous point, we
simply add another component to the point and set it equal
to 1
To convert a homogeneous point to a Cartesian point, we
simply delete the extra component
(x, y, z) <=

1
Lecture 18 Texture Mapping
pp g
Texture mapping is to choose the color of a pixel in a polygon by a
corresponding pixel color of another image (texture)
To map an image onto a surface
1. Rectangles
2.
2 Polygons
3. Cylinders
4. Spheres
5. Sweeping
5 S
i

Sample Final Exam CP411 Computer Graphics
Closed book and notes, calculator is allowed. Duration: 150 minutes
Part I. Viewing pipeline
Question 1
a) Explain the concepts of clipping window, view port, display window, and their relations in
a viewing pipel

Zhang,Jin Yue 101485520
2012-11-20
CP411 Project Proposal
Description: The goal of this project is to create a game that more than 3 object with same
color will disappear.
Design and implementation plan:
Feature 1: Ceiling - click to flip two object color

CP411 Computer Graphics Midterm Exam Sample
Question 1 [1]
(a) What is the relation of resolution, frame buffer size and color depth (i.e., bits per pixel)?
(b) If a raster system has a resolution of 640 by 480 and a color depth of 24 bits, what size fram