Search Results - (( java application based algorithm ) OR ( event detection method algorithm ))
Search alternatives:
- application based »
- java application »
- method algorithm »
- event detection »
-
1
An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents
Published 2022“…This work focuses on the FS problem by automatically detecting events through a novel wrapper FS method based on Adapted Binary Bat Algorithm (ABBA) and Adapted Markov Clustering Algorithm (AMCL), termed ABBA-AMCL. …”
Get full text
Get full text
Thesis -
2
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Fatigue Features Extraction of Road Load Time Data Using the S-Transform
Published 2013“…Three types of road load fatigue data were used for simulation purpose, pave track, highway and country road. In this study, an algorithm was developed, to detect the damaging events in the original fatigue signal. …”
Get full text
Get full text
Article -
5
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Sleep arousal events detection using PNN-GBMO classifier based on EEG and ECG signals: A hybrid-learning model
Published 2020“…The notion is very effective in the detection of sleep disorders. In this paper, the detection of arousal events is performed using an automatic analysis of EEG and ECG signals. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Analysis of artificial neural network and viola-jones algorithm based moving object detection
Published 2014“…Analysis of moving object detection methods is presented in this paper, includes Artificial Neural Network (ANN) and Viola-Jones algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…Also, the results show that the proposed Anomaly Detection (AD) outperforms FTDA in terms of aggregated data accuracy in which the AD conserved approximately, 59.5% of aggregated data accuracy for event compared with FTDA algorithm which conserved 54.25% of aggregated data accuracy for event. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals
Published 2014“…This project aims at developing an automated epileptic seizure event detection algorithm. The proposed algorithm depends on using five features which are singular values, total power, delta band power, variance and mean. …”
Get full text
Get full text
Final Year Project -
10
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
11
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
Get full text
Get full text
Article -
12
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…TVS algorithm design is still challenging because most of the recent methods are unable to achieve robust detection for different types of transitions: hard transition (HT) and soft transition (ST). …”
Get full text
Get full text
Get full text
Thesis -
13
Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach
Published 2020“…This method uses an improved Pan-Tompkins algorithm from the previous work with independent of the isoelectric line approach for detecting the QRS onset and the T offset. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
16
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
17
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
18
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
19
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
20
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article
