Search Results - (( features extraction window algorithm ) OR ( java application using algorithm ))
Search alternatives:
- features extraction »
- window algorithm »
- java application »
- using algorithm »
-
1
-
2
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
3
Design of intelligent Qira’at identification algorithm
Published 2017“…For the feature vectors that are collected from feature extraction (MFCC) and feature selection (X-ACO), the feature vectors are used as input for the classification phase. …”
Get full text
Get full text
Thesis -
4
-
5
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…This paper introduces an Entropy Window Reduction (EWR) algorithm, which is an improved version of the BOCEDS technique. …”
Article -
6
Identification of Flower Species with Natural Markers
Published 2019“…Algorithms of investigation span from extraction, matching and identification to determine the image features. …”
Get full text
Get full text
Thesis -
7
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
8
Blood vessel segmentation in color fundus images based on regional and Hessian features
Published 2017“…To rectify the variation in contrast, we used a 5 × 5 window filter on each pixel. Based on 5 regional features, 1 intensity feature and 2 Hessian features per scale using 9 scales, we extracted a total of 24 features. …”
Get full text
Get full text
Article -
9
Predictive dynamic CFD approach to reducing airborne transmission in naturally ventilated hospital rooms: Impact of window opening angles during transitional cold seasons in China...
Published 2025“…Stepwise polynomial regression has been validated as a novel algorithm that can effectively predict window opening angles. …”
Get full text
Get full text
Get full text
Thesis -
10
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
11
-
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
Random subspace K-NN based ensemble classifier for driver fatigue detection utilizing selected EEG channels
Published 2021“…Moreover, power spectral density (PSD) was used to extract the feature, confirming the presented method's robustness. …”
Get full text
Get full text
Get full text
Article -
14
Studies on the application of wavelet families for a high impedance fault location algorithm in a distribution network
Published 2016“…However, in this paper, the performance of the previous algorithm is investigated first in terms of different sampling rate and window size. …”
Get full text
Get full text
Article -
15
Adaptive multi-parent crossover GA for feature optimization in epileptic seizure identification
Published 2019“…This process of selecting an optimal feature subset is an optimization problem. Thus, we propose an adaptive multi-parent crossover Genetic Algorithm (GA) for optimizing the features used in classifying epileptic seizures. …”
Get full text
Get full text
Article -
16
EEG-based biometric authentication modelling using incremental fuzzy-rough nearest neighbour technique
Published 2018“…This paper proposes an Incremental Fuzzy-Rough Nearest Neighbour (IncFRNN) technique for biometricauthentication modelling using feature extracted visual evoked. Only small training set is needed for model initialisation. …”
Get full text
Get full text
Article -
17
-
18
Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol
Published 2009“…We have tried to come up with a dynamic back-off algorithm for SMAC that can extract the current traffic information of the network and engage them in estimating the contention window from which the back-off time is chosen. …”
Get full text
Get full text
Thesis -
19
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…This study was solely concerned with the Windows malware dataset. The malware classification was determined by testing and training the supervised ML algorithms using the extracted features from the malware dataset. …”
Get full text
Get full text
Get full text
Article -
20
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…The electrodes, feature extraction, and feature selection analysis were tested using the benchmarking dataset from UCI repositories. …”
Get full text
Get full text
Get full text
Get full text
Thesis
