Search Results - (( vr application ((_ algorithm) OR (bat algorithm)) ) OR ( its application usage algorithm ))
Search alternatives:
- application usage »
- its application »
- usage algorithm »
- vr application »
- bat algorithm »
-
1
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
2
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…Apparently, latency is one of the most frequently cited shortcomings of current Virtual Reality (VR) applications. To compensate latency, previous prediction mechanisms insert a complex mathematical algorithm, which may not be appropriate for complex virtual training applications. …”
Get full text
Get full text
Thesis -
3
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
6
-
7
A dataset for emotion recognition using virtual reality and EEG (DER-VREEG): Emotional state classification using low-cost wearable VR-EEG headsets
Published 2022“…Secondly, we use a low-cost wearable EEG headset that is both compact and small, and can be attached to the scalp without any hindrance, allowing freedom of movement for participants to view their surroundings inside the immersive VR stimulus. Finally, we evaluate the emotion recognition system by using popular machine learning algorithms and compare them for both intra-subject and inter-subject classification. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…In addition, CORDIC algorithm has a low usage of memory space compared to Look Up table (LUT) technique. …”
Get full text
Get full text
Student Project -
12
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The genetic similarity algorithm combines semantic similarity measure algorithm with parallel genetic algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Mining Web usage using FRS
Published 2018“…Web Usage Mining (WUM) is the application of data mining methods in extracting potentially useful information from web usage data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Real-time robotic avatar control using fuzzy gaze-classification for people with disability
Published 2016“…The psychological impetus can assist tremendously in their treatment. The Fuzzy Algorithm presented here enables a very fast image classification method for such near-real-time application. …”
Get full text
Get full text
Conference or Workshop Item -
15
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
16
-
17
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
18
The usage of watermarking to store patient information and diagnosis in medical images
Published 2011Get full text
Get full text
Undergraduates Project Papers -
19
-
20
