Search Results - (( pattern detection during algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- pattern detection »
- detection during »
- during algorithm »
- java application »
-
1
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). …”
Get full text
Get full text
Article -
4
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
7
-
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
9
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
10
Anomaly detection through spatio-temporal context modeling in crowded scenes
Published 2014“…The proposed framework essentially turns the anomaly detection process into two parts, namely, motion pattern representation and crowded context modeling. …”
Get full text
Get full text
Conference or Workshop Item -
11
Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid
Published 2015“…This thesis proposes a real time gait phase detection system to control AAFO for rehabilitation and assist ankle motion. …”
Get full text
Get full text
Thesis -
12
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
Get full text
Get full text
Thesis -
13
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
14
Mouth covered detection for yawn
Published 2013“…However, the spontaneous human action to cover the mouth during yawn can prevent such measurements. This paper presents a new technique to detect the covered mouth by employing the Local Binary Pattern (LBP) features. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection
Published 2018“…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
Get full text
Get full text
Article -
17
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…This article uses a proximity sensor to perform noncontact-based (sensing) chewing activity detection, capturing the temporalis muscle movement during food intake. …”
Get full text
Get full text
Article -
18
-
19
Pattern Recognition for Human Diseases Classification in Spectral Analysis
Published 2022“…Pattern recognition is a multidisciplinary area that received more scientific attraction during this period of rapid technological innovation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
An improved artificial dendrite cell algorithm for abnormal signal detection
Published 2018“…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
Get full text
Get full text
Get full text
Article
