Search Results - (( java implementation modified algorithm ) OR ( knowledge using eeg algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- knowledge using »
- eeg algorithm »
- using eeg »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…Here a framework is presented that can be used to realize EEG simulator in a pseudo-embedded form. …”
Get full text
Get full text
Citation Index Journal -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…Here a framework is presented that can be used to realize EEG simulator in a pseudo-embedded form. …”
Get full text
Get full text
Article -
6
EEG-based biometric authentication modelling using incremental fuzzy-rough nearest neighbour technique
Published 2018“…Theembedded heuristic update method adjusts the knowledge granules incrementally to maintain all representativeelectroencephalogram (EEG) signal patterns and eliminate those rarely used. …”
Get full text
Get full text
Article -
7
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
Get full text
Get full text
Thesis -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
9
Detection of Epileptic EEG Signal Using Wavelet Transform and Adaptive Neuro-Fuzzy Inference System
Published 2011“…Such algorithms use brain electrical activity signals called electro encephalography (EEG) and have 2 methods of detection: visual (by specialist inspection) and automatic (by using signal processing knowledge). …”
Get full text
Get full text
Thesis -
10
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
11
EEG-Based Biometric Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2018“…The embedded heuristic update method adjusts the knowledge granules incrementally to maintain all representative electroencephalogram (EEG) signal patterns and eliminate those rarely used. …”
Get full text
Get full text
Get full text
Article -
12
An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification
Published 2022“…In this connection, a recent dataset, â��Mocap Hand Postures Data Set,â�� has been opted to employ the different variants of the machine learning algorithm. To the best of the knowledge, the exhaustive comparative study on the said dataset is found to be deficient in the literature. …”
Get full text
Get full text
Article -
13
MOTION ESTIMATION IN BRAIN TOPOGRAPHIC MAPS
Published 2011“…As the EEG procedure is >imple and harmless, it is widely used to study the brain behavior and cognitive processes such iS memory, language, emotions, sensation and alertness. …”
Get full text
Get full text
Final Year Project -
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
15
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
16
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
17
Machine learning classification model for identifying internet addiction among university students
Published 2023“…In this era of globalization, Internet addiction is a concerning issue, especially among university students as they are required to use the internet for academic purposes. However, things might go wrong when they are addicted to the Internet as the Internet does not only provide knowledge but also entertainment such as music, videos, games, social media, etc. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
Get full text
Get full text
Thesis
