Search Results - (( vr application design algorithm ) OR ( web application among algorithm ))
Search alternatives:
- application design »
- application among »
- design algorithm »
- web application »
- among algorithm »
- vr application »
-
1
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…This research aims to design and develop VR in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
2
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…Apparently, latency is one of the most frequently cited shortcomings of current Virtual Reality (VR) applications. To compensate latency, previous prediction mechanisms insert a complex mathematical algorithm, which may not be appropriate for complex virtual training applications. …”
Get full text
Get full text
Thesis -
3
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
4
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
5
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007Get full text
Get full text
Get full text
Article -
6
Real-time robotic avatar control using fuzzy gaze-classification for people with disability
Published 2016“…The psychological impetus can assist tremendously in their treatment. The Fuzzy Algorithm presented here enables a very fast image classification method for such near-real-time application. …”
Get full text
Get full text
Conference or Workshop Item -
7
Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes
Published 2013“…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
Get full text
Get full text
Get full text
Thesis -
8
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
-
12
-
13
Robotics in Education
Published 2026“…Core programming concepts, including control systems, algorithm design, and debugging, are elaborated upon using tools like Python and ROS. …”
Get full text
Get full text
Get full text
Get full text
Book -
14
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
15
Mining Web usage using FRS
Published 2018“…Web Usage Mining (WUM) is the application of data mining methods in extracting potentially useful information from web usage data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Multi-population Genetic Algorithm for Rich Vehicle Routing Problems
Published 2020“…However, genetic algorithm is stochastic in nature and does not guarantee optimal solution in an application all the time, a problem referred to as premature convergence in literature. …”
Get full text
Get full text
Final Year Project -
17
Adopting Jaya Algorithm for Team Formation Problem
Published 2020“…This paper presents a simple and mighty metaheuristic algorithm, Jaya, which is applied to solve the team formation (TF) problem and it is a very fundamental problem in many databases and expert collaboration networks or web applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
19
-
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis
