Search Results - (( developing human virtualization algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- virtualization algorithm »
- human virtualization »
- developing human »
- validation using »
- java validation »
- using algorithm »
-
1
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…In order to overcome latency problem, this research is an attempt to suggest a new prediction algorithm based on heuristic that could be used to develop a more effective and general system for virtual training applications. …”
Get full text
Get full text
Thesis -
2
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
3
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
5
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…A state-flow control algorithm is developed on the model to improve the mentioned shortfalls. …”
Get full text
Get full text
Thesis -
6
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
7
Finger triggered virtual musical instruments
Published 2013“…The developed system has the ability to switch the virtual musical instruments between piano and drum. …”
Get full text
Get full text
Get full text
Article -
8
Finger triggered virtual musical instruments
Published 2012“…The developed system has the ability to switch the virtual musical instruments between piano and drum. …”
Get full text
Get full text
Conference or Workshop Item -
9
High performance visualization of human tumor growth software
Published 2008“…The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Real-Time Stereopsis
Published 2008“…Peoples try to make computer sees as human see. Up today there are manyalgorithm developed and invented by scientist but it's long way to go. …”
Get full text
Get full text
Final Year Project -
11
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
12
Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm
Published 2011“…In comparison to human performance, the algorithm's performance closely matched that of human with 94 accuracy in identifying the syntax level strategies. …”
Get full text
Get full text
Get full text
Article -
13
Tracking of dynamic arm motion estimation and interaction with fuzzy control
Published 2016“…Considerable effort has been put toward the development of intelligent and natural interfaces be- tween users and computer systems. …”
Get full text
Get full text
Article -
14
Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi
Published 2008“…Hereby, the Dijkstra’s algorithm is tested with the developed 3D navigation network inside the building model. …”
Get full text
Get full text
Get full text
Thesis -
15
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
17
A cognitive mapping approach in real-time haptic rendering interaction for improved spatial learning ability among autistic people / Kesavan Krishnan
Published 2024“…This means that the proposed framework through this research becomes a fundamental principle in the development of a haptic-based virtual environment. The main objective of this research is to develop and present a HBVEF-framework to design a HBVE for autistic people to improve their spatial awareness and to significantly improve their interaction abilities through haptic rendering. …”
Get full text
Get full text
Get full text
Thesis -
18
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
19
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
20
