Search Results - (( java implementation a algorithm ) OR ( using eeg using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Clustering natural language morphemes from EEG signals using the Artificial Bee Colony algorithm by Sulaiman, Suriani, Ahmed Yahya, Saba, Mohd Shukor, Nur Sakinah, Ismail , Amelia Ritahani, Zaahirah, Qazi, Yaacob, Hamwira, Abdul Rahman, Abdul Wahab, Dzulkifli, Mariam Adawiah

    Published 2015
    “…This study aims at analyzing EEG signals for the purpose of clustering natural language morphemes using the Artificial Bee Colony (ABC) algorithm. …”
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh by Sai , Chong Yeh

    Published 2020
    “…The training and parameters selection of the machine learning algorithms are conducted using EEG data collected from ten subjects in the laboratory. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Real time ocular and facial muscle artifacts removal from EEG signals using LMS adaptive algorithm by Mehrkanoon, S., Moghavvemi, M., Fariborzi, H.

    Published 2007
    “…The EEG signal is most useful for clinical diagnosis and in biomedical research. …”
    Get full text
    Conference or Workshop Item
  7. 7

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Swarm negative selection algorithm for electroencephalogram signals classification by Sahel Ba-Karait, Nasser Omer, Shamsuddin, Siti Mariyam, Sudirman, Rubita

    Published 2009
    “…The SNS classification model use negative selection and PSO algorithms to form a set of memory Artificial Lymphocytes (ALCs) that have the ability to distinguish between normal and epileptic EEG patterns. …”
    Get full text
    Article
  9. 9

    Single-trial visual evoked potential extraction using partial least-squares-based approach by Yanti, D.K., Yusoff, M.Z., Asirvadam, V.S.

    Published 2016
    “…For P100, the proposed PLS algorithm is able to provide comparable results to the generalized eigenvalue decomposition (GEVD) algorithm, which alters (prewhitens) the EEG input signal using the prestimulation EEG signal. …”
    Get full text
    Get full text
    Article
  10. 10

    Single-trial visual evoked potential extraction using partial least-squares-based approach by Yanti, D.K., Yusoff, M.Z., Asirvadam, V.S.

    Published 2016
    “…For P100, the proposed PLS algorithm is able to provide comparable results to the generalized eigenvalue decomposition (GEVD) algorithm, which alters (prewhitens) the EEG input signal using the prestimulation EEG signal. …”
    Get full text
    Get full text
    Article
  11. 11

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14

    Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals by Ahmed, Ahmed Elsayed Elmahdy

    Published 2014
    “…The proposed algorithm was tested through using CHB-MIT Scalp EEG Database which was recorded in the children hospital in Boston. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization by Khosropanah, Pegah, Ramli, Abdul Rahman, Lim, Kheng Seang, Marhaban, Mohammad Hamiruce, Ahmedov, Anvarjon

    Published 2018
    “…High accuracy results of proposed algorithm using non-invasive and low-resolution EEG provide the potential of using this work for pre-surgical evaluation towards epileptogenic zone localization in clinics.…”
    Get full text
    Get full text
    Article
  16. 16

    Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization by Khosropanah, Pegah, Ramli, Abdul Rahman, Lim, Kheng Seang, Marhaban, Mohammad Hamiruce, Ahmedov, Anvarjon

    Published 2018
    “…High accuracy results of proposed algorithm using non-invasive and low-resolution EEG provide the potential of using this work for pre-surgical evaluation towards epileptogenic zone localization in clinics.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Detection of the onset of epileptic seizure signal from scalp EEG using blind signal separation by Moghavvemi, M., Mehrkanoon, S.

    Published 2009
    “…BSS algorithm is used to demix the EEG signal into signals with independent features. …”
    Get full text
    Article
  18. 18

    Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Md. Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2019
    “…The differential evolution-based channel selection algorithm (DEFS_Ch) was computed to find the most suitable EEG channels that have the greatest efficacy for identifying the various emotional states of the brain regions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…In order to make BCI useful, one of the approaches is to classify the EEG time series signal that may indicate given eye movements that will be used as input instructions to a device. …”
    Get full text
    Thesis
  20. 20

    EEG Different Frequency Sound Response Identification using Neural Network and Fuzzy Techniques by Wan Daud, Wan Mohd Bukhari, Sudirman , R, Koh, A. C, Safri, N.M, Mahmood, N.H

    Published 2010
    “…Principle Component algorithm, Discrete Wavelet Transform and Fast Fourier Transform, are applied onto the raw EEG signal to extract useful information and specific characteristics from the EEG signals. …”
    Get full text
    Get full text
    Get full text
    Article