Search Results - (( vr application design algorithm ) OR ( web application among algorithm ))

Refine Results
  1. 1
  2. 2

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…Apparently, latency is one of the most frequently cited shortcomings of current Virtual Reality (VR) applications. To compensate latency, previous prediction mechanisms insert a complex mathematical algorithm, which may not be appropriate for complex virtual training applications. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A new algorithm to measure relevance among Web pages by Sadi, M.S., Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2006
    “…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Real-time robotic avatar control using fuzzy gaze-classification for people with disability by Qidwai, U., Shakir, M., Bahameish, M.

    Published 2016
    “…The psychological impetus can assist tremendously in their treatment. The Fuzzy Algorithm presented here enables a very fast image classification method for such near-real-time application. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes by Lu, Chin Mei

    Published 2013
    “…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Robotics in Education by Norashikin, M. Thamrin, Addie, Irawan, Zurita, Zulkifli, Syed Abdul Mutalib, Al Junid, Megat Syahirul Amin, Megat Ali, Anwar P. P., Abdul Majeed

    Published 2026
    “…Core programming concepts, including control systems, algorithm design, and debugging, are elaborated upon using tools like Python and ROS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  14. 14

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Mining Web usage using FRS by Omar, Rosli, Abdullah, Zainatul Shima

    Published 2018
    “…Web Usage Mining (WUM) is the application of data mining methods in extracting potentially useful information from web usage data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Multi-population Genetic Algorithm for Rich Vehicle Routing Problems by Agany Manyiel, Joseph Mabor

    Published 2020
    “…However, genetic algorithm is stochastic in nature and does not guarantee optimal solution in an application all the time, a problem referred to as premature convergence in literature. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Adopting Jaya Algorithm for Team Formation Problem by Kader, Md. Abdul, Kamal Z., Zamli

    Published 2020
    “…This paper presents a simple and mighty metaheuristic algorithm, Jaya, which is applied to solve the team formation (TF) problem and it is a very fundamental problem in many databases and expert collaboration networks or web applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
    Get full text
    Get full text
    Thesis