Search Results - (( java implementation modified algorithm ) OR ( using 3d using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using algorithm »
- using 3d »
- 3d using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
A novel algorithm for modeling and mapping of 3D terrain in autonomous reconnaissance
Published 2012“…The algorithm uses fractal interpolation to generate 3D terrain surface. …”
Get full text
Get full text
Get full text
Article -
6
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…The proposed slicing algorithm uses line-plane intersection model to generate arbitrary line segment when it receives an STL facet. …”
Get full text
Get full text
Research Report -
7
Optimisation of Surface Roughness in 3D Printing Using the Bees Algorithm
Published 2025“…One of the main challenges in this additive manufacturing technology is selecting proper input process parameters to achieve good quality of the 3D printed model. The focus of this study is to determine the optimum input parameter of the 3D printer using the Bees Algorithm (BA). …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
8
Path planning for unmanned aerial vehicles using visibility line-based methods
Published 2011“…In order to ensure that the 3D path planning algorithms are computationally efficient, the proposed 2D path planning algorithms are applied into them. …”
Get full text
Get full text
Thesis -
9
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Automatic Additive Manufacturing Product Generation Through Computer Aided Process Planning Using 3D/4D/5D Printing
Published 2022“…The algorithm has also been tested and able to produce a complete additive manufacturing product by using an integrated CAD/CAM system with a 3D printer. …”
Get full text
Get full text
Monograph -
11
Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi
Published 2015“…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
Get full text
Get full text
Thesis -
12
-
13
Whole brain radiation therapy verification using 2D gamma analysis method
Published 2020“…A 3D conformal radiotherapy (CRT) of WBRT plans were constructed using both algorithms. …”
Get full text
Get full text
Thesis -
14
Modeling dynamic weight for 3D navigation routing
Published 2007“…This paper discusses the construction of 3D dynamic networks, as well as the corresponding algorithm that can be used for 3D navigation in a 3D GIS environment. …”
Get full text
Get full text
Conference or Workshop Item -
15
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…In order to ensure the image data is secure/ protected and encryption time is low, it is very timely to conduct a research on image encryption and decryption using 3D-AES block cipher algorithm. The aim of this study were to conduct a research on how to identify the implementation of security analysis of image using 3D-AES block cipher algorithm. …”
Get full text
Get full text
Thesis -
16
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
Get full text
Get full text
Thesis -
17
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…After that, critical performance measurements and metrics used in 3D–CA are identified. The module of a KD-3DCA block cipher is designed and algorithms of the new KD-3D-CA block cipher are generated. …”
Get full text
Get full text
Thesis -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof
Published 2021“…Therefore, this research aims to analyse the randomness of 3D-AES, a local SPN-based block cipher algorithm. …”
Get full text
Get full text
Thesis -
20
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…IE simplifies calculation and maximizes the efficiency of generating an improved path plan in a 3D environment. Nine terrain maps were used as case studies, and 100 simulations were carried out for each case to determine the average performance of the proposed algorithm. …”
Get full text
Get full text
Thesis
