Search Results - (( java implementation modified algorithm ) OR ( changes activation detection algorithm ))
Search alternatives:
- implementation modified »
- activation detection »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Amplitude independent versus amplitude dependent muscle activity detection algorithms: a comparative study
Published 2020“…Moreover, the sEMG signal amplitude is not constant during the recording time due to the variation in the characteristics of the electrode-skin interface and due to the changes in the ground reference level. Therefore, the performance of the muscle activity detection algorithms should not be affected by the involuntary amplitude variations of the sEMG signal in order to achieve reliable control of robotic devices intended for disabled people.To accentuate the importance of the amplitude independent muscle activity detection methods over the amplitude dependent detection methods, a comparative study has been conducted in this paper between the performance of an amplitude independent muscle activity detection algorithm (FLA-MSE algorithm) and three amplitude dependent algorithms with respect to the detection capability of weak muscle activities and with respect to the immunity against false alarms. …”
Get full text
Get full text
Get full text
Article -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article -
8
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…Finally, the collision avoidance algorithm is verified through MATLAB software. Various cases are tested to demonstrate the robustness of both collision detection and avoidance algorithms.…”
Get full text
Get full text
Thesis -
9
Image authentication using Scale Invariant Feature Transform (SIFT) / Nurul Anis Suriana Adnan
Published 2017“…It is difficult to identify the authenticity of the image since they left no trace for such changes in the image. Forgery detection techniques are divided into two approaches; active and passive. …”
Get full text
Get full text
Thesis -
10
The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases
Published 2015“…Regression testing is one of the software maintenance activities that is time consuming and expensive. Design-based regression testing approaches have been proposed to address changes at higher levels of abstraction, these approaches may not detect changes in the method body and several of the code based addresses procedural programs. …”
Get full text
Get full text
Get full text
Article -
11
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
Driver drowsiness detection using different classification algorithms
Published 2020“…Electrocardiogram (ECG) is an electrical indicator of the heart, provides such criteria as it reflects the heart activity that can detect changes in human response which relates to our emotions and reactions. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Automatic Road Network Recognition and Extraction for Urban Planning
Published 2009“…These results are valuable for building road map and detecting the changes of the existing road database. …”
Get full text
Get full text
Get full text
Article -
15
Zebrafish larvae locomotor activity detection using Convolutional NeuraL Network (CNN)
Published 2022“…To overcome the limitations, this works aims to develop an algorithm to elucidate the zebrafish larvae locomotor activity using Convolutional Neural Network (CNN). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
ARDUINO-BASED FALL DETECTION AND ALERT SYSTEM
Published 2017“…This project developed a robust algorithm with a sensitive and an accurate result for fall detection device by more than 90%.…”
Get full text
Get full text
Final Year Project -
18
Development of a flexible video analysis system for motion detection and alarm generation
Published 2010“…This SVAS is able to detect and track interested objects. It can also detect people and recognize their activities in an application environment, such as in a room, supermarket, car, or security checkpoint. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
A student learning style auto-detection model in a learning management system
Published 2023“…This paper proposes an auto-detection model of student learning styles in learning management systems based on student learning activities. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
