Search Results - (( vr application usage algorithm ) OR ( its ((application new) OR (application a)) algorithm ))

Refine Results
  1. 1

    Enhancing unity-based AR with optimal lossless compression for digital twin assets by Hlayel, Mohammed, Hairulnizam, Mahdin, Hayajneh, Mohammad, AlDaajeh, Saleh H., Siti Salwani, Yaacob, Mazidah, Mat Rejab

    Published 2024
    “…This study also creates mathematical models for predicting resource utilization, like RAM and CPU time, required by AR mobile applications. Experimental results show a detailed comparison among these compression algorithms, which can give insights and help choose the best method according to the compression ratio, decompression speed, and resource usage. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    New algorithm for gyroless spacecraft angular rate Estimation and its application by Abdelrahman, Mohammad, Samaan, Malak A.

    Published 2006
    “…A new algorithm for estimating the angular velocity using quaternion measurements is developed based on the concept of the global optimality resulting when using a centralized or master Kalman filter. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Eye fixation versus pupil diameter as eye- tracking features for virtual reality emotion classification by Lim Jia Zheng, James Mountstephens, Jason Teo

    Published 2022
    “…The usage of eye-tracking technology is becoming increasingly popular in machine learning applications, particularly in the area of affective computing and emotion recognition. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  5. 5

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Comprehensive review of the development of the harmony search algorithm and its applications by Al-Omoush, A.A., Alsewari, Abdulrahman A., Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…This paper presents a comprehensive overview of the development of the harmony search (HS) algorithm and its applications. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A new efficient checkpointing algorithm for distributed mobile computing by Mansouri, Houssem, Badache, Nadjib, Aliouat, Makhlouf, Pathan, Al-Sakib Khan

    Published 2015
    “…Considering this issue, the contribution in this paper is a proposal of a new checkpointing algorithm suitable for mobile computing systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    A new modified conjugate gradient coefficient for solving system of linear equations by Mustafa, Mamat, Hajar, N., Aini, N, Shapiee, N., Abidin,, Z.Z., Khadijah, W., Rivaie, M

    Published 2017
    “…This paper also includes an application of the new CG algorithm for solving large system of linear equations…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. These algorithms are formulated for computing Tate and ate pairing. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…This is a new solution meant for a mobile node that might be utilising applications that may not be interrupted when the mobile node moves from one link to another. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN by BISWAS, KALLOL

    Published 2021
    “…The improvements of the original PSO algorithm are proposed by updating its exploitation phase by incorporating the GWO algorithm because of its strong exploitation capability and the exploration phase using a cellular automaton due to its ability to explore more area by constructing new neighbours. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Application of genetic algorithm in optimization of unified power flow controller parameters and its location in the power system network by Hassan, L.H., Moghavvemi, M., Almurib, H.A.F., Steinmayer, O.

    Published 2013
    “…This work demonstrates the application of Genetic Algorithm (GA) technique for the simultaneous stabilization of power systems using a Unified Power Flow Controller (UPFC). …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20