Search Results - (( using detection device algorithm ) OR ( java application using algorithm ))
Search alternatives:
- device algorithm »
- java application »
- using detection »
- using algorithm »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022“…LED Seven Segment displays have become embedded in our daily lives, beginning with small devices like wristwatches and progressing to massive mechanical equipment used in industry. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
-
5
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
6
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
7
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. …”
Get full text
Get full text
Article -
8
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
9
-
10
Detection of eye movements based on EEG signals and the SAX algorithm
Published 2018“…Classification algorithms have been investigated in past research to allow detection of eye movement. …”
Get full text
Get full text
Conference or Workshop Item -
11
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
12
-
13
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card numbers, social security numbers, national identification numbers etc. …”
Get full text
Get full text
Journal -
14
Investigating the performance of an amplitude-independent algorithm for detecting the hand muscle activity of stroke survivors
Published 2020“…A comparison between the performance of an amplitude-independent muscle activity detection algorithm and three amplitude-dependent algorithms was conducted by using sEMG signals recorded from six hemiparesis stroke survivors and from six healthy subjects. …”
Get full text
Get full text
Get full text
Article -
15
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
16
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017“…In order to enhance the efficacy of the prosthetic and orthotic robotic devices controlled by surface electromyography (sEMG) signals, muscle activity detection algorithms need to be independent of the amplitude variation in the sEMG signal to make these devices more feasible and reliable for the disabled people. …”
Get full text
Get full text
Conference or Workshop Item -
17
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
Get full text
Get full text
Thesis -
18
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…For machine learning classification algorithms, we used a type of fuzzy logic called lattice reasoning. …”
Get full text
Get full text
Get full text
Article -
19
Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI
Published 2019“…An algorithm to detect the centroid of the moiré fringe pattern was developed. …”
Get full text
Get full text
Monograph -
20
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…Moreover, the decision threshold value must be adaptive to the changes in the sEMG signal characteristics to reduce the number of false alarms that may arise with the fixed threshold and lead to unintended movements to these devices. In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article
