Search Results - (( processes activation detection algorithm ) OR ( java application during algorithm ))
Search alternatives:
- processes activation »
- activation detection »
- application during »
- java application »
- during algorithm »
-
1
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017“…A new algorithm has been developed to detect the presence of muscle activities in weak and noisy sEMG signals. …”
Get full text
Get full text
Conference or Workshop Item -
2
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
Get full text
Get full text
Thesis -
3
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
4
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
5
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…The abnormal PPG pattern detection using rule-based algorithm has produced accuracy of 87.30% in training process and 87.18% in testing process with coverage of rule for training and testing, 89.26% and 87.33%. …”
Get full text
Get full text
Undergraduates Project Papers -
6
-
7
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
8
Improving The Algorithm To Detect Internet Worms
Published 2008“…The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Investigating the performance of an amplitude-independent algorithm for detecting the hand muscle activity of stroke survivors
Published 2020“…The results showed that the amplitude-independent algorithm performed better in terms of detecting weak muscle activity and resisting false alarms.…”
Get full text
Get full text
Get full text
Article -
10
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…The effect of video quality on human detection rate is discussed in Chapter 4. In a human detection, the software is represented by algorithms, in which algorithm also being used in the process of training the dataset. …”
Get full text
Get full text
Final Year Project -
11
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Vehicle Monitoring System Using Motion Detection Algorithms For USM Campus.
Published 2007“…Maintaining security in university campuses is most definitely the talk of today. problems surface when security personnel need to constantly patrol the campus grounds to ,monitor activities of vehicles. With the possible introduction of the motion detection and character recognition algorithms in security systems of the future, vehicle identities such as license plate numbers can be captured and processed at the security post to make it possible for the vehicles to be monitored remotely. …”
Get full text
Get full text
Conference or Workshop Item -
13
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…The ICS cyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as the first line of defense, have been detailed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Fetal R-Wave detection in the ambulatory monitoring of maternal abdominal signal
Published 1995“…The algorithm is based on a combination and modification of earlier techniques which have been proposed to perform similar processing. …”
Get full text
Get full text
Article -
15
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
Get full text
Get full text
Thesis -
16
Moving object detection and tracking from video sequence : an analysis between canny edge detection and active contour technique / Mohd Anuar Mohd Salleh
Published 2006“…Keywords: caimy edge detection, active contour, backgroimd subtraction…”
Get full text
Get full text
Thesis -
17
Web Camera Application For Motion Detection
Published 2003“…In the second stage, simulation done on the frame images using Matlab with Image Processing Toolbox as simulation tool to investigate the possibilities of motion detection algorithm on images captured by web camera. …”
Get full text
Get full text
Thesis -
18
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Furthermore, the scale of the web pages (i.e huge data) and with heterogeneous nature of the web itself has complicate the detection process, and unable to detect accurately. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Implementation of Frequency Drift for Identification of Solar Radio Burst Type II
Published 2016“…In order to assist the solar radio researcher to speed up the process of solar burst identification and detection, this work presents a new algorithm to auto classify solar radio burst Type II and III. …”
Get full text
Get full text
Get full text
Article -
20
