Search Results - (( web applications model algorithm ) OR ( vr application ((a algorithm) OR (_ algorithm)) ))*
Search alternatives:
- applications model »
- web applications »
- model algorithm »
- vr application »
- a algorithm »
-
1
Enhancing unity-based AR with optimal lossless compression for digital twin assets
Published 2024“…At the same time, 7-Zip/LZMA achieves the highest compression ratios at the cost of slower loading. Brotli emerged as a strong option for web-based AR/VR content, striking a balance between compression efficiency and decompression speed, outperforming Gzip in WebGL contexts. …”
Get full text
Get full text
Get full text
Article -
2
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The product developed is in the form of a VR application that presents learning by having a variety of learning styles. …”
Get full text
Get full text
Get full text
Article -
3
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…Apparently, latency is one of the most frequently cited shortcomings of current Virtual Reality (VR) applications. To compensate latency, previous prediction mechanisms insert a complex mathematical algorithm, which may not be appropriate for complex virtual training applications. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
A dataset for emotion recognition using virtual reality and EEG (DER-VREEG): Emotional state classification using low-cost wearable VR-EEG headsets
Published 2022“…This study aims to use a virtual reality (VR) headset to induce four classes of emotions (happy, scared, calm, and bored), to collect brainwave samples using a low-cost wearable EEG headset, and to run popular classifiers to compare the most feasible ones that can be used for this particular setup. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Web application vulnerabilities detection model
Published 2016“…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
8
Real-time robotic avatar control using fuzzy gaze-classification for people with disability
Published 2016“…The psychological impetus can assist tremendously in their treatment. The Fuzzy Algorithm presented here enables a very fast image classification method for such near-real-time application. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Car dealership web application
Published 2022“…The web service performed model explaining and monitoring by querying the application data from the Azure SQL Database. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Cyberbullying detection: a machine learning approach
Published 2022“…Finally, the model was pickled and loaded into the web application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
13
-
14
Robotics in Education
Published 2026“…The AI section discusses machine learning, path-planning algorithms (e.g., A* search, SLAM), and classroom case studies. …”
Get full text
Get full text
Get full text
Get full text
Book -
15
-
16
Eye fixation versus pupil diameter as eye- tracking features for virtual reality emotion classification
Published 2022“…In this study, an empirical comparison of the accuracy of eye-tracking-based emotion recognition in a virtual reality (VR) environment using eye fixation versus pupil diameter as the classification feature is performed. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
17
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Online prediction is one Web Usage Mining application. However, the accuracy of the prediction and classification in the current architecture of predicting users' future requests systems can not still satisfy users especially in huge Web sites. …”
Get full text
Get full text
Article -
18
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
19
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
20
Intelligent Web caching using neurocomputing and particle swarm optimization algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item
