Search Results - (( java implementation modified algorithm ) OR ( knowledge using eeg algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Shakir, Mohamed, Qidwai, Uvais, Malik, Aamir Saeed, Kamel, Nidal

    Published 2015
    “…Here a framework is presented that can be used to realize EEG simulator in a pseudo-embedded form. …”
    Get full text
    Get full text
    Citation Index Journal
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  5. 5

    Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Mohamed, Shakir, Qidwai, Uvais, Malik, Aamir Saeed, Kamel , Nidal

    Published 2015
    “…Here a framework is presented that can be used to realize EEG simulator in a pseudo-embedded form. …”
    Get full text
    Get full text
    Article
  6. 6

    EEG-based biometric authentication modelling using incremental fuzzy-rough nearest neighbour technique by Liew, Siaw Hong, Choo, Yun Huoy, Low, Yin Fen, Zeratul I., Mohd Yusoh

    Published 2018
    “…Theembedded heuristic update method adjusts the knowledge granules incrementally to maintain all representativeelectroencephalogram (EEG) signal patterns and eliminate those rarely used. …”
    Get full text
    Get full text
    Article
  7. 7

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Detection of Epileptic EEG Signal Using Wavelet Transform and Adaptive Neuro-Fuzzy Inference System by Khosropanah, Pegah

    Published 2011
    “…Such algorithms use brain electrical activity signals called electro encephalography (EEG) and have 2 methods of detection: visual (by specialist inspection) and automatic (by using signal processing knowledge). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    EEG-Based Biometric Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong, Choo, Yun Huoy, Yin, Fen Low, Mohd Yusoh, Zeratul Izzah

    Published 2018
    “…The embedded heuristic update method adjusts the knowledge granules incrementally to maintain all representative electroencephalogram (EEG) signal patterns and eliminate those rarely used. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification by Hussain, A., Hussain, S.S., Uddin, M.M., Zubair, M., Kumar, P., Umair, M.

    Published 2022
    “…In this connection, a recent dataset, â��Mocap Hand Postures Data Set,â�� has been opted to employ the different variants of the machine learning algorithm. To the best of the knowledge, the exhaustive comparative study on the said dataset is found to be deficient in the literature. …”
    Get full text
    Get full text
    Article
  13. 13

    MOTION ESTIMATION IN BRAIN TOPOGRAPHIC MAPS by GOPALAKRISHNAN, GOWRI

    Published 2011
    “…As the EEG procedure is >imple and harmless, it is widely used to study the brain behavior and cognitive processes such iS memory, language, emotions, sensation and alertness. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Machine learning classification model for identifying internet addiction among university students by Tan, Hui Theng, Mun, Hou Kit, Handayani, Dini Oktarina Dwi

    Published 2023
    “…In this era of globalization, Internet addiction is a concerning issue, especially among university students as they are required to use the internet for academic purposes. However, things might go wrong when they are addicted to the Internet as the Internet does not only provide knowledge but also entertainment such as music, videos, games, social media, etc. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis