Search Results - (( 3d validation using algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi by Mohd Wi, Khairah

    Published 2015
    “…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The results of the validation show a complete similarity between each original face and the output from our algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    3D surface roughness measurement for scaliness scoring of psoriasis lesions by Ahmad Fadzil, M.H., Prakasa, E., Asirvadam, V.S., Nugroho, H., Affandi, A.M., Hussein, S.H.

    Published 2013
    “…A surface roughness algorithm using structured light projection has been applied to 1999 3D psoriasis lesion surfaces. …”
    Get full text
    Get full text
    Article
  11. 11

    Ground receiving station reference pair selection technique for a minimum configuration 3D emitter position estimation multilateration system by Yaro, A.S., Sha’Ameri, A.Z., Kamel, N.

    Published 2017
    “…Using the minimum number of GRSs for 3D emitter PE, a technique based on the condition number calculation is proposed to select the suitable GRS reference pair for improving the accuracy of the PE using the lateration algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Virtual room decorator in android by Nurul Ain, Ahmed

    Published 2012
    “…This thesis deals with usability assessment for a mobile-emulator of virtual reality environment for room decorating application in Android platform titled,Virtual Room Decorator(VRD)in Android Application,which is it consists of the overview of proposed project, perception of the planetary surface,techniques will use to create the 2D/3D models and its database restoration.I wish to build a high quality database of room decorating scenes,along with its real-world three dimensional (3D) viewer.Such a database is useful for a variety of applications,including training systems for object detection and validation of 3D output. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke, Arifin, Fatchul

    Published 2021
    “…We evaluated the performance of augmenting the 3D object using the techniques, vision-based, and incorporating the sensor data using the video data. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Disparity map algorithm for stereo matching process using local based method by Gan, Melvin Yeou Wei

    Published 2022
    “…Once satisfactory results are obtained, there is demonstration on 3D surface reconstruction using disparity maps produced by the proposed SVDM algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16
  17. 17

    Efficient Numerical Modelling of Extreme Wave by Tan , Vi Nie

    Published 2020
    “…To obtain the largest wave that propagation among the wave groups, focus wave group that represent the largest wave that occur in the random sea was simulated using Ocean Wave 3D. It had validated against the other wave models, Multiple flux BEM model and Spectral model which had been highly validated by the quality experimental data and found to give accurate result. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Efficient Numerical Modelling of Extreme Waves by Tan, Vi Nie

    Published 2020
    “…To obtain the largest wave that propagation among the wave groups, focus wave group that represent the largest wave that occur in the random sea was simulated using Ocean Wave 3D. It had validated against the other wave models, Multiple flux BEM model and Spectral model which had been highly validated by the quality experimental data and found to give accurate result. …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20