Search Results - (( vr application based algorithm ) OR ( site detection based algorithm ))
Search alternatives:
- application based »
- detection based »
- vr application »
- site detection »
-
1
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
2
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
4
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…Apparently, latency is one of the most frequently cited shortcomings of current Virtual Reality (VR) applications. To compensate latency, previous prediction mechanisms insert a complex mathematical algorithm, which may not be appropriate for complex virtual training applications. …”
Get full text
Get full text
Thesis -
5
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
6
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
Get full text
Get full text
Thesis -
7
Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site
Published 2025“…Based on You Only Look Once (YOLO) v5, A cloud-based real-time hardhat-wearing compliance detection system was proposed to detect workers not wearing hardhats in power construction sites. …”
Get full text
Get full text
Thesis -
8
Wind direction and speed estimation for quadrotor based gas tracking robot
Published 2017“…This paper proposes a quadrotor based gas tracking robot to be used in hazardous gas localization areas, and specifically, to detect methane leak from gas extraction sites. …”
Get full text
Book Section -
9
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017Get full text
Get full text
Final Year Project -
10
Web application vulnerabilities detection model
Published 2016“…This research aim to solve these issues by developing a detection model for detecting and recognizing the web vulnerabilities based on the defined and identified criteria. …”
Get full text
Get full text
Research Reports -
11
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
Get full text
Get full text
Get full text
Article -
12
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…Transferability of each of the models was verified by testing in another site for consistency. The overall accuracy of the Support Vector Machine SVM and Random Forest RF classifiers revealed that three of the six algorithms exhibited higher ranks in the landslide detection. …”
Get full text
Get full text
Get full text
Thesis -
13
Cyberbullying detection: a machine learning approach
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Image Detection Model for Construction Worker Safety Conditions using Faster R-CNN
Published 2024journal::journal article -
15
A buffer-based online clustering for evolving data stream
Published 2019“…In this study, we present a fully online density-based clustering algorithm called buffer-based online clustering for evolving data stream (BOCEDS). …”
Get full text
Get full text
Get full text
Article -
16
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
17
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
Get full text
Get full text
Thesis -
18
Real-Time Detection of Personal Protective Equipment for Site Safety Using Deep Learning Techniques
Published 2022Get full text
Get full text
Undergraduates Project Papers -
19
An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery
Published 2021“…This research implemented a technique for detecting, segmenting, classifying, and measuring tree stumps by using the Multiresolution Segmentation Algorithm method. …”
Get full text
Get full text
Get full text
Article -
20
Smart site monitoring system / Muhammad Azmi and Muhammad Naim Mahyuddin
Published 2023“…These devices collect and transmit data to a centralised cloud-based platform. Advanced data analytics and machine learning algorithms process this data, enabling the system to detect potential safety hazards, monitor construction progress, and predict resource requirements. …”
Get full text
Get full text
Conference or Workshop Item
