Search Results - (( features detection device algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- features detection »
- device algorithm »
- java application »
-
1
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…However due to the development of embedded hardware and object detection algorithm, current embedded device may be able to execute the object detection algorithm in real-time. …”
Get full text
Get full text
Article -
2
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…However due to the development of embedded hardware and object detection algorithm, current embedded device may be able to execute the object detection algorithm in real-time. …”
Get full text
Get full text
Conference or Workshop Item -
3
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…Moreover, the decision threshold value must be adaptive to the changes in the sEMG signal characteristics to reduce the number of false alarms that may arise with the fixed threshold and lead to unintended movements to these devices. In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article -
4
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017“…The algorithm does not employ any amplitude features in the detection process and employs only frequency features of the sEMG signal; therefore it is amplitude independent and can detect muscle activities in signals that have low signal to noise ratio. …”
Get full text
Get full text
Conference or Workshop Item -
5
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…A static analysis technique with machine learning classifier is developed from the permission features noted in the Android mobile device for detecting the malware applications. …”
Get full text
Get full text
Get full text
Article -
6
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…A static analysis technique with machine learning classifier is developed from the permission features noted in the Android mobile device for detecting the malware applications. …”
Get full text
Get full text
Article -
7
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…Moreover, the decision threshold value must be adaptive to the changes in the sEMG signal characteristics to reduce the number of false alarms that may arise with the fixed threshold and lead to unintended movements to these devices. In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article -
8
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…However, in machine learning intelligence detection, too many insignificant features will decrease the percentage of the detection’s accuracy. …”
Get full text
Get full text
Get full text
Article -
9
Hybrid intelligent approach for network intrusion detection
Published 2015“…Feature selection has decreased the features from 41 to 21 features for intrusion detection and later normalization method is employed to perform and reduce the differences among the data. …”
Get full text
Get full text
Get full text
Thesis -
10
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article -
11
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
12
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…Moreover, log files have a lot of irrelevant and redundant features that act as noise. Also, log files are heterogenous and cannot fed them directly in machine learning algorithms. …”
Get full text
Get full text
Get full text
Thesis -
14
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
15
An enhanced android botnet detection approach using feature refinement
Published 2019“…These features are able to disclose the sensitive information stored on the Android mobile devices. …”
Get full text
Get full text
Thesis -
16
-
17
Classification of hand gestures from EMG signals / Diaa Albitar
Published 2022“…Neighbourhood Component Analysis (NCA) are used as features selection technique has reduced the features to fourteen. …”
Get full text
Get full text
Thesis -
18
Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions
Published 2019“…Recently, deep learning algorithms for automatic feature representation have also been proposed to lessen the burden of reliance on handcrafted features and to increase performance accuracy. …”
Get full text
Get full text
Article -
19
Android mobile malware detection model based on permission features using machine learning approach
Published 2022“…Chi-square and information gain algorithms were used for features selection. The aim is to learn the behaviour of permission features that react to the accuracy according to the number of features. …”
Get full text
Get full text
Thesis -
20
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project
