Search Results - (( developing virtualization learning algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    A cognitive mapping approach in real-time haptic rendering interaction for improved spatial learning ability among autistic people / Kesavan Krishnan by Kesavan , Krishnan

    Published 2024
    “…Even though there has been recent achievement in haptic-based virtual environments (HBVE), the designing process of HBVE for spatial learning of autistic people has become more challenging. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Biodiesel synthesis from Ceiba pentandra oil by microwave irradiation-assisted transesterification: ELM modeling and optimization by Silitonga A.S., Shamsuddin A.H., Mahlia T.M.I., Milano J., Kusumo F., Siswantoro J., Dharma S., Sebayang A.H., Masjuki H.H., Ong H.C.

    Published 2023
    “…Alternative fuels; Energy efficiency; Irradiation; Knowledge acquisition; Learning algorithms; Machine learning; Microwave irradiation; Optimization; Potassium hydroxide; Synthetic fuels; Transesterification; Biodiesel production; Catalyst concentration; Cuckoo search algorithms; Extreme learning machine; Modeling and optimization; Research and development; Transesterification process; Virtual experimentations; Biodiesel; angiosperm; biofuel; catalyst; hydroxide; irradiation; microwave radiation; optimization; Ceiba pentandra…”
    Article
  7. 7
  8. 8

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  18. 18

    StockMaster simulator / Nor Hamiza Mohd Noor ... [et al.] by Mohd Noor, Nor Hamiza, Asbullah, Nurul Farzana, Hairi Annuar, Syazana Ezzati, Tujang, Anatasha Alfiera, Muhammad Rasli, Irdina Hani

    Published 2023
    “…This Stock Market Simulator provides a realistic virtual trading experience to connect theory and practise so that users can develop successful investment strategies. …”
    Get full text
    Get full text
    Book Section
  19. 19

    Immersive AR pet game with hand motion by Chong, Jing Voon

    Published 2023
    “…ManoMotion is a hand-tracking software that uses machine learning algorithms to track and recognise hand movements in real-time. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis