Search Results - (( process detection device algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- process detection »
- device algorithm »
- java application »
-
1
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017“…The algorithm does not employ any amplitude features in the detection process and employs only frequency features of the sEMG signal; therefore it is amplitude independent and can detect muscle activities in signals that have low signal to noise ratio. …”
Get full text
Get full text
Conference or Workshop Item -
2
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…An intelligent novel model comprising Random Forest Classifier with Independent Component Analysis (ICA) was proposed for botnet detection in IoT devices. Various machine learning algorithms were also implemented upon the processed data for comparative analysis. …”
Get full text
Get full text
Article -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Fire Detection Algorithm using Image Processing Techniques
Published 2015“…Due to this the need for application for fire detection has increases in recent years. In this paper we proposed a fire detection algorithm based on image processing techniques which is compatible in surveillance devices like CCTV, wireless camera to UAVs. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
QUAD FLAT NO-LEAD (QFN) DEVICE FAULTY DETECTION USING GABOR WAVELETS
Published 2014Get full text
Get full text
Final Year Project -
6
Investigating the performance of an amplitude-independent algorithm for detecting the hand muscle activity of stroke survivors
Published 2020“…Thus, muscle activity detection methods intended for controlling robotic hand devices should not depend mainly on the amplitude characteristics of the sEMG signal in the detection process, and they need to be more reliable for sEMG signals that have a low SNR. …”
Get full text
Get full text
Get full text
Article -
7
Intruder detection using histogram and edge detection algorithms
Published 2016Get full text
Get full text
Undergraduates Project Papers -
8
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
Get full text
Get full text
Thesis -
9
Enhancing real time heavy metal detection using embedded portable signal processing unit
Published 2019“…On-line multiple peak detection and Gaussian distribution algorithms have been developed onto processor for the detecting and analyzing heavy metals of various applications. …”
Get full text
Get full text
Article -
10
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
12
Finger-worn assistive device for detection tracking and recognition
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…The algorithm showed consistent performance across different wafer types and test configurations, outperforming traditional detection methods with improved computational efficiency. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
-
16
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…It differs from other existing content negotiation approaches by introducing the idea of combining dynamic and static device capabilities detection methods. It consists of a device database and two processing components: (1) device identification module and (2) device capabilities detection module. …”
Get full text
Get full text
Thesis -
17
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
Published 2019“…However, critical reviews have identified that the existing approaches are inefficient in processing data to detect anomalies due to the amassment of massive volumes of data through the connected devices. …”
Get full text
Get full text
Get full text
Thesis -
18
Hybrid intelligent approach for network intrusion detection
Published 2015“…Clustering is the last step of processing before classification has been performed, using k-means algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…This tool can be used to ease the process of developing a new March test algorithm for NPSF.…”
Get full text
Get full text
Thesis -
20
Classification of metal screw defect detection using FOMO on edge impulse / Muhammad Imran Daing
Published 2025“…This project uses the FOMO (Faster Objects, More Objects) algorithm to detect surface flaws on metal screws. …”
Get full text
Get full text
Student Project
