Search Results - (( program virtualization _ algorithm ) OR ( java application during algorithm ))
Search alternatives:
- program virtualization »
- application during »
- java application »
- during algorithm »
-
1
Virtual Reality in Algorithm Programming Course: Practicality and Implications for College Students
Published 2024“…Virtual Reality in Algorithm Programming Course: Practicality and Implications for College Students by Hafizul Fahri bin Hanafi…”
Get full text
article -
2
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
3
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…Findings indicated that heuristic-based algorithm is an accurate prediction method to compensate latency in virtual training. …”
Get full text
Get full text
Thesis -
4
System program management environment in cloud computing using hybrid Genetic Algorithm and Moth Flame Optimization (GA-MFO)
Published 2022“…Program system assigns user tasks to the suitable Virtual Machines in order to attain Quality of Service (QoS) parameters. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
-
6
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
7
Photo Based Walkthrough Using Prefetch and Caching Strategies
Published 2007“…The virtual scene is constructed using retrieval algorithms that take user coordinates into consideration. …”
Get full text
Get full text
Conference or Workshop Item -
8
Development of a Mobile Robot Local Navigation System Based on Fuzzy-Logic Control and Actual Virtual Target Switching
Published 2006“…While the fuzzy logic body of the algorithm performs the main tasks of obstacle avoidance, target seeking, and speed adjustment, an actual-virtual target switch strategy integrated with the fuzzy logic algorithm enables the robot to show wall following behavior when needed. …”
Get full text
Get full text
Thesis -
9
Photo Based Walkthrough Using Prefetch and Caching Strategies
Published 2007“…The virtual scene is constructed using retrieval algorithms that take user coordinates into consideration. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed
Published 2008“…The theory of the repetitive control algorithm was applied to the MATLAB and SIMULINK software to making the algorithm converges to zero tracking error exponentially by satisfied the condition that was explained in chapter 2. …”
Get full text
Get full text
Student Project -
11
Development of virtual control panel for single spindle configuration 2-axis filament winding machine(SSFWM)
Published 2009“…Furthermore the main idea is to transfer a fiber mould parameter equation into visual basic programming code. And from the programming code control the actuators on filament winding machine to meet with the setting given by user. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Cognitive benefits of employing multiple AI voices as specialist virtual tutors in a multimedia learning environment
Published 2025“…To address this gap, we draw on multimedia learning and cognitive models to investigate the effects of using multiple AI voices as specialist virtual tutors for distinct programming algorithm subtopics on cognitive load and learning outcomes. …”
Get full text
Get full text
Get full text
Article -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
-
15
-
16
-
17
-
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
Development of capability-based virtual cellular manufacturing systems in dual-resource constrained settings over semi-distributed layouts
Published 2012“…Virtual Cellular Manufacturing Systems (VCMSs) as a highly flexible manufacturing concept have been designed to improve the performance of classical Cellular Manufacturing Systems (CMSs) and job shop manufacturing environments by creating virtual grouping resources. …”
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
