Search Results - (( developing using 3d algorithm ) OR ( java data detection algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system by -, -

    Published 2019
    “…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
    Get full text
    Get full text
    Research Report
  7. 7

    Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi by Mohd Wi, Khairah

    Published 2015
    “…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
    Get full text
    Get full text
    Thesis
  8. 8

    The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment by Kok, Kai Yit

    Published 2016
    “…Thus, a new algorithm known as infection evolution (IE) was developed in this study. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Path planning for unmanned aerial vehicles using visibility line-based methods by Omar, Rosli

    Published 2011
    “…In addition, a software package using Matlab for 2D and 3D path planning has also been developed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin by Saifuddin, Nur Fattin Nadhrah

    Published 2018
    “…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi by Ujang, Muhamad Uznir

    Published 2008
    “…Hereby, the Dijkstra’s algorithm is tested with the developed 3D navigation network inside the building model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Enhanced 3D terrain visualization process using game engine by Mohd Hafiz, Mahayudin

    Published 2018
    “…It may assist the developer on how to enhance the process of developing web-based 3D terrain visualization using Unity3D game engine.…”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Contour generation for mask projection stereolithography 3D printing by Faeiz Azizi, Adnan

    Published 2019
    “…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A novel hierarchical clustering algorithm for the analysis of 3D anthropometric data of the human head by Ellena, Thierry, Subic, Aleksandar, Mustafaa, Helmy, Yen, Pang Toh

    Published 2018
    “…The purpose of this study was to introduce a new method for the clustering of 3D head scans. A novel hierarchical algorithm was developed, in which a squared Euclidean metric was used to assess the head shape similarity of participants. …”
    Get full text
    Get full text
    Article
  17. 17

    Trajectory planning and simulation for 3d printing process by Ng, Chin Yong

    Published 2022
    “…The slicing method used is basic slicing. The slicing algorithm consists of two sections: intersection point tracking algorithm and contour creation algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    3D character reconstruction from 2D orthogonal images by Kok, Yung Thow

    Published 2025
    “…The proposed algorithm is organized into modular stages, allowing artists and developers to further improving the pipeline by integrating computer vision, AI models and 3D modelling and scripting techniques. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments by AL-Obaidi, A.S., Jubair, M.A., Aziz, I.A., Ahmad, M.R., Mostafa, S.A., Mahdin, H., AL-Tickriti, A.T., Hassan, M.H.

    Published 2022
    “…This problem becomes more challenging due to the evolving nature of clusters in VANETs in general and in 3D VANETs in particular. This paper tackles the problem of 3D VANETs using a centralized clustering model based on the developed Cauchy density model. …”
    Get full text
    Get full text
    Article