Search Results - (( pattern extraction sensor algorithm ) OR ( java application model algorithm ))
Search alternatives:
- pattern extraction »
- extraction sensor »
- application model »
- sensor algorithm »
- java application »
- model algorithm »
-
1
-
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Modeling of vehicle trajectory clustering based on LCSS for traffic pattern extraction
Published 2017“…These behavioural manoeuvres are useful for interpreting the indepth study of traffic pattern in a traffic network. Hence, with the advancement of the available vehicle tracking system, vehicle trajectory dataset is selected as suitable candidate input for the traffic pattern extraction. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
5
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…Specifically, this study focuses on investigating the optimal placement of smartphones to extract tri- axis accelerometer data from the inertial sensors during stair movement. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
7
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Comparison Of Ridge Filters Performance in Human Vein Extraction Using 850nm Near Infrared Led Illumination
Published 2023“…The vein feature extraction algorithm is a crucial factor in the vein visualisation process. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
-
10
Integrated multichannel Young’s interferometer sensor based on long-range surface plasmon waveguides
Published 2019“…The diverging output beams from the waveguides are overlapped in the far field to form interference patterns which are then post-processed using the fast Fourier transform (FFT) algorithm to extract phase values. …”
Get full text
Get full text
Article -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…This is further worsen by the use of single sensors modality and machine learning algorithms. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions
Published 2019“…These sensors are pre-processed and different feature sets such as time domain, frequency domain, wavelet transform are extracted and transform using machine learning algorithm for human activity classification and monitoring. …”
Get full text
Get full text
Article -
15
-
16
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
17
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
18
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
19
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
20
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…One of the approaches for structural health monitoring (SHM) consists of two major components, i.e. a network of sensors to collect the response data and an extraction method to obtain information on the structural health condition. …”
Get full text
Get full text
Get full text
Thesis
