Search Results - (( developing eeg data algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- level algorithm »
- developing eeg »
- data algorithm »
- eeg data »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Hardware Simulator for Seizure, Preseizure and Normal Mode Signal Generation in LabVIEW Environment for Research
Published 2013“…Here we develop a hardware simulator of the EEG model or to simulator any EEG data set in either .edf or .tdmsot .txtformat from any patient or database depository. …”
Get full text
Get full text
Get full text
Non-Citation Index Journal -
3
Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh
Published 2020“…The training and parameters selection of the machine learning algorithms are conducted using EEG data collected from ten subjects in the laboratory. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Extraction of Inherent Frequency Components of Multiway EEG Data Using Two-Stage Neural Canonical Correlation Analysis
Published 2014“…This paper presents an algorithm for extracting underlying frequency components of massive Electroencephalogram (EEG) data. …”
Get full text
Get full text
Get full text
Article -
6
EEG Eye State Identification based on Statistical Feature and Common Spatial Pattern Filter
Published 2019“…Hence, this work aims to develop an algorithm using statistical-CSP feature for eye state classification from EEG signal. …”
Get full text
Get full text
Conference or Workshop Item -
7
EEG Eye State Identification based on Statistical Feature and Common Spatial Pattern Filter
Published 2019“…Hence, this work aims to develop an algorithm using statistical-CSP feature for eye state classification from EEG signal. …”
Get full text
Get full text
Conference or Workshop Item -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…Generally, every step of the data processing sequence affects the accuracy of EEG source localization. …”
Get full text
Get full text
Article -
10
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…Generally, every step of the data processing sequence affects the accuracy of EEG source localization. …”
Get full text
Get full text
Get full text
Article -
11
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
12
Bayesian Framework based Brain Source Localization Using High SNR EEG Data
Published 2019“…This research work discusses the results based on synthetically generated EEG data at an SNR level of 12 dB with Gaussian noise added linearly in data matrix. …”
Get full text
Get full text
Conference or Workshop Item -
13
“Analysis of EEG Recordings During Grasp and Lift (GAL) Trials
Published 2018“…The purpose of analysing this EEG data is to help develop a prosthetic device that can control an upper limb and generate a power grasp or a pinch grasp involving the thumb and index finger. …”
Get full text
Get full text
Final Year Project -
14
EEG-based fatigue detection using binary pattern analysis and KNN algorithm
Published 2024Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Fuzzification of epileptic data: an application for prediction and identification of partial seizure
Published 2013“…Hence in this proposed system, we introduce fuzzification of epileptic EEG data using fuzzy logic interface to classify partial seizure EEG signals from the normal EEG. …”
Get full text
Citation Index Journal -
16
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…Classification and prediction are the functions provided by the data mining techniques that suit in EEG signal processing. …”
Get full text
Get full text
Thesis -
17
Bio-signal identification using simple growing RBF-network (OLACA)
Published 2007“…These algorithms are developed primarily for applications with fast sampling rate which demands significant reduction in computation load per iteration. …”
Get full text
Get full text
Conference or Workshop Item -
18
Improving EEG Signal Peak Detection Using Feature Weight Learning of a Neural Network with Random Weights for Eye Event-Related Applications
Published 2017“…The optimization of peak detection algorithms for electroencephalogram (EEG) signal analysis is an ongoing project; previously existing algorithms have been used with different models to detect EEG peaks in various applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Epileptic seizure detection using the singular values of EEG signals
Published 2013“…EEG recordings of 4-paediatric patients with 20 seizures are used to validate the proposed algorithm and the preliminary results indicates good level of sensitivity by the singular values to the changes in the EEG signals due to epileptic seizure. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis
