Search Results - (( vr application learning algorithms ) OR ( its application usage algorithm ))
Search alternatives:
- application learning »
- application usage »
- its application »
- usage algorithm »
- vr application »
-
1
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
2
A dataset for emotion recognition using virtual reality and EEG (DER-VREEG): Emotional state classification using low-cost wearable VR-EEG headsets
Published 2022“…Secondly, we use a low-cost wearable EEG headset that is both compact and small, and can be attached to the scalp without any hindrance, allowing freedom of movement for participants to view their surroundings inside the immersive VR stimulus. Finally, we evaluate the emotion recognition system by using popular machine learning algorithms and compare them for both intra-subject and inter-subject classification. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Eye fixation versus pupil diameter as eye- tracking features for virtual reality emotion classification
Published 2022“…The usage of eye-tracking technology is becoming increasingly popular in machine learning applications, particularly in the area of affective computing and emotion recognition. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
4
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
7
-
8
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
9
-
10
Robotics in Education
Published 2026“…The AI section discusses machine learning, path-planning algorithms (e.g., A* search, SLAM), and classroom case studies. …”
Get full text
Get full text
Get full text
Get full text
Book -
11
-
12
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…In addition, CORDIC algorithm has a low usage of memory space compared to Look Up table (LUT) technique. …”
Get full text
Get full text
Student Project -
13
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The genetic similarity algorithm combines semantic similarity measure algorithm with parallel genetic algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Mining Web usage using FRS
Published 2018“…Web Usage Mining (WUM) is the application of data mining methods in extracting potentially useful information from web usage data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
16
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
17
The usage of watermarking to store patient information and diagnosis in medical images
Published 2011Get full text
Get full text
Undergraduates Project Papers -
18
-
19
-
20
