Auswahl der wissenschaftlichen Literatur zum Thema „User activity detection“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "User activity detection" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "User activity detection"

1

Zhu, Hao, and Georgios B. Giannakis. "Exploiting Sparse User Activity in Multiuser Detection." IEEE Transactions on Communications 59, no. 2 (2011): 454–65. http://dx.doi.org/10.1109/tcomm.2011.121410.090570.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Mitra, U., and H. V. Poor. "Activity detection in a multi-user environment." Wireless Personal Communications 3, no. 1-2 (1996): 149–74. http://dx.doi.org/10.1007/bf00333928.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Lee, Junho, and Seung-Hwan Lee. "Low dimensional multiuser detection exploiting low user activity." Journal of Communications and Networks 15, no. 3 (2013): 283–91. http://dx.doi.org/10.1109/jcn.2013.000051.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Zou, Shihong, Huizhong Sun, Guosheng Xu, and Ruijie Quan. "Ensemble Strategy for Insider Threat Detection from User Activity Logs." Computers, Materials & Continua 65, no. 2 (2020): 1321–34. http://dx.doi.org/10.32604/cmc.2020.09649.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Wang, Shuwen, Xingquan Zhu, Weiping Ding, and Amir Alipour Yengejeh. "Cyberbullying and Cyberviolence Detection: A Triangular User-Activity-Content View." IEEE/CAA Journal of Automatica Sinica 9, no. 8 (2022): 1384–405. http://dx.doi.org/10.1109/jas.2022.105740.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Park, Hansol, Kookjin Kim, Dongil Shin, and Dongkyoo Shin. "BGP Dataset-Based Malicious User Activity Detection Using Machine Learning." Information 14, no. 9 (2023): 501. http://dx.doi.org/10.3390/info14090501.

Der volle Inhalt der Quelle
Annotation:
Recent advances in the Internet and digital technology have brought a wide variety of activities into cyberspace, but they have also brought a surge in cyberattacks, making it more important than ever to detect and prevent cyberattacks. In this study, a method is proposed to detect anomalies in cyberspace by consolidating BGP (Border Gateway Protocol) data into numerical data that can be trained by machine learning (ML) through a tokenizer. BGP data comprise a mix of numeric and textual data, making it challenging for ML models to learn. To convert the data into a numerical format, a tokenizer
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Parwez, Md Salik, Danda B. Rawat, and Moses Garuba. "Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network." IEEE Transactions on Industrial Informatics 13, no. 4 (2017): 2058–65. http://dx.doi.org/10.1109/tii.2017.2650206.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Pathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan, and Ahmet Kondoz. "CNN for User Activity Detection Using Encrypted In-App Mobile Data." Future Internet 14, no. 2 (2022): 67. http://dx.doi.org/10.3390/fi14020067.

Der volle Inhalt der Quelle
Annotation:
In this study, a simple yet effective framework is proposed to characterize fine-grained in-app user activities performed on mobile applications using a convolutional neural network (CNN). The proposed framework uses a time window-based approach to split the activity’s encrypted traffic flow into segments, so that in-app activities can be identified just by observing only a part of the activity-related encrypted traffic. In this study, matrices were constructed for each encrypted traffic flow segment. These matrices acted as input into the CNN model, allowing it to learn to differentiate previ
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Bashir, Sulaimon Adebayo, Andrei Petrovski, and Daniel Doolan. "A framework for unsupervised change detection in activity recognition." International Journal of Pervasive Computing and Communications 13, no. 2 (2017): 157–75. http://dx.doi.org/10.1108/ijpcc-03-2017-0027.

Der volle Inhalt der Quelle
Annotation:
Purpose This purpose of this paper is to develop a change detection technique for activity recognition model. The approach aims to detect changes in the initial accuracy of the model after training and when the model is deployed for recognizing new unseen activities without access to the ground truth. The changes between the two sessions may occur because of differences in sensor placement, orientation and user characteristics such as age and gender. However, many of the existing approaches for model adaptation in activity recognition are blind methods because they continuously adapt the recog
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Kim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.

Der volle Inhalt der Quelle
Annotation:
Insider threats are malicious activities by authorized users, such as theft of intellectual property or security information, fraud, and sabotage. Although the number of insider threats is much lower than external network attacks, insider threats can cause extensive damage. As insiders are very familiar with an organization’s system, it is very difficult to detect their malicious behavior. Traditional insider-threat detection methods focus on rule-based approaches built by domain experts, but they are neither flexible nor robust. In this paper, we propose insider-threat detection methods based
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "User activity detection"

1

Amanzi, Richard. "A natural user interface architecture using gestures to facilitate the detection of fundamental movement skills." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/6204.

Der volle Inhalt der Quelle
Annotation:
Fundamental movement skills (FMSs) are considered to be one of the essential phases of motor skill development. The proper development of FMSs allows children to participate in more advanced forms of movements and sports. To be able to perform an FMS correctly, children need to learn the right way of performing it. By making use of technology, a system can be developed that can help facilitate the learning of FMSs. The objective of the research was to propose an effective natural user interface (NUI) architecture for detecting FMSs using the Kinect. In order to achieve the stated objective, an
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Sagheer, Fakher. "Bayesian statistical methods for joint user activity detection, channel estimation, and data decoding in dynamic wireless networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. https://theses.hal.science/tel-04874844.

Der volle Inhalt der Quelle
Annotation:
L'accès multiple non-orthogonal grant-free (GF-NOMA) s'impose progressivement comme une partie intégrante de la couche physique des systèmes d'accès radio du futur. En permettant d'accéder à une station de base sans allocation explicite de ressources temps/fréquence/code, GF-NOMA permet non seulement d'améliorer l'efficacité spectrale, mais également de rendre possible des communications ultra fiables à faible latence (URLLC). De telles exigences permettront de répondre aux enjeux spécifiques d'applications sans fil telles que l'internet des objets, la réalité virtuelle, les jeux vidéo en lign
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Dias, Pereira dos Santos Augusto. "Using Motion Sensor and Machine Learning to Support the Assessment of Rhythmic Skills in Social Partner Dance: Bridging Teacher, Student and Machine Contexts." Thesis, The University of Sydney, 2019. https://hdl.handle.net/2123/21302.

Der volle Inhalt der Quelle
Annotation:
Social partner dance is a popular form of physical activity intended for enjoyment and pleasure. Rhythm is an essential aspect of dance, especially in relation to music; however, it can be a difficult psychomotor skill to learn. Rhythm learning is hindered because dance teachers have a short time during classes to assess and provide feedback to students. Current technical solutions enable automatic assessment and feedback for dance students; however, the available technology is either expensive or cumbersome. Recent improvement and decreased price of wearable technology offer new opportunities
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Odehnal, Jiří. "Řízení a měření sportovních drilů hlasem/zvuky." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399705.

Der volle Inhalt der Quelle
Annotation:
This master's thesis deals with the design and development of mobile aplication for Android platform. The aim of the work is to implement a simple and user-friendly user interface that would support and assist the user in trainning and sport exercises. The thesis also include implementation of sound detection to support during exercises and voice instruction by application. In practice the application should help in making training exercises more comfortable without the user being forced to keep mobile device in hand.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

McEachern, Matthew. "Neural Voice Activity Detection and its practical use." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119733.

Der volle Inhalt der Quelle
Annotation:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 87-90).<br>The task of producing a Voice Activity Detector (VAD) that is robust in the presence of non-stationary background noise has been an active area of research for several decades. Historically, many of the proposed V
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Tholen, Andrea. "The use of animal activity data and milk components as indicators of clinical mastitis." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/76826.

Der volle Inhalt der Quelle
Annotation:
A study was conducted to examine the correlation between a novel behavior monitoring system and a validated data logger. We concluded that the behavior monitoring system was valid for tracking daily rest time in dairy cows (R=0.96); however the correlation values for rest bouts and rest duration were relatively low, (R=0.64) (R=0.47), respectively. Daily monitoring of animal activity and milk components can be used to detect mastitis prior to clinical onset. Data from 268 cases with clinical mastitis and respective controls (n=268) from Virginia Tech and the University of Florida dairy herd
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Azhar, Faisal. "Marker-less human body part detection, labelling and tracking for human activity recognition." Thesis, University of Warwick, 2015. http://wrap.warwick.ac.uk/69575/.

Der volle Inhalt der Quelle
Annotation:
This thesis focuses on the development of a real-time and cost effective marker-less computer vision method for significant body point or part detection (i.e., the head, arm, shoulder, knee, and feet), labelling and tracking, and its application to activity recognition. This work comprises of three parts: significantbody point detection and labelling, significant body point tracking, and activity recognition. Implicit body models are proposed based on human anthropometry, kinesiology, and human vision inspired criteria to detect and label significant body points. The key idea of the proposed me
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Myles, Kimberly. "Activity-Based Target Acquisition Methods for Use in Urban Environments." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/28422.

Der volle Inhalt der Quelle
Annotation:
Many military conflicts are fought in urban environments that subject the U.S. soldier to a number of challenges not otherwise found in traditional battle. In the urban environment, the soldier is subject to threatening attacks not only from the organized army but also from civilians who harbor hostility. U.S. enemies use the civilian crowd as an unconventional tactic to blend in and look like civilians, and in response to this growing trend, soldiers must detect and identify civilians as a threat or non-threat. To identify a civilian as a threat, soldiers must familiarize themselves with b
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Henriksson, Mikael. "Implementation of a Hardware Coordinate Wise Descend Algorithm with Maximum Likelihood Estimator for Use in mMTC Activity Detection." Thesis, Linköpings universitet, Datorteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-171071.

Der volle Inhalt der Quelle
Annotation:
In this work, a coordinate wise descent algorithm is implemented which serves the purpose of estimating active users in a base station/client wireless communication setup. The implemented algorithm utilizes the sporadic nature of users, which is believed to be the norm with 5G Massive MIMO and Internet of Things, meaning that only a subset of all users are active simultaneously at any given time. This work attempts to estimate the viability of a direct algorithm implementation to test if the performance requirements can be satisfied or if a more sophisticated implementation, such as a parallel
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Goodlich, Benjamin I. "Machine learning algorithms for the automatic detection and classification of physical activity in children with cerebral palsy who use mobility aids for ambulation." Thesis, Griffith University, 2019. http://hdl.handle.net/10072/389853.

Der volle Inhalt der Quelle
Annotation:
Background: Literature related to objective measurement of habitual physical activity (PA) disproportionately over represents children with Cerebral Palsy (CP) who are ambulant. Consequently, it is unknown if methods used to examine PA, such as machine learning models built on accelerometer data, are able to accurately detect PA in children with CP who use mobility aids for ambulation. Objective: To develop and test machine learning models used for the automatic detection and classification of PA type in children with CP who use mobility aids for ambulation. Methods: Eleven children and adoles
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "User activity detection"

1

Nazarov, Dmitriy, and Anton Kopnin. Information technologies in professional activity: data mining and business analytics. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2110964.

Der volle Inhalt der Quelle
Annotation:
The textbook offers a comprehensive look covering a wide range of topics related to the role of information technology in the modern world. Starting with an overview of the history of information technology and its evolution, the book introduces the reader to professions in the field of information and digital technologies, emphasizing them in various professional fields. The content of the textbook includes a detailed analysis of key concepts such as Data Science, Data Mining and Machine Learning, and their role in healthcare, law, education, science and business. The textbook provides a deta
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Meijer, Ewout H., and Bruno Verschuere. Detection Deception Using Psychophysiological and Neural Measures. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190612016.003.0010.

Der volle Inhalt der Quelle
Annotation:
The use of physiological signals to detect deception can be traced back almost a century. Historically, the polygraph has been used—and debated. This chapter discusses the merits of polygraph testing, and to what extent the introduction of measures of brain activity—most notably functional magnetic imaging (fMRI)—have solved the problems associated with polygraph testing. It discusses the different question formats used with polygraph and brain activity measures, and argues that these formats are the main factor contributing to the tests’ validity. Moreover, the authors argue that erroneous te
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Shaikh, Mohd Faraz. Machine Learning in Detecting Auditory Sequences in Magnetoencephalography Data : Research Project in Computational Modelling and Simulation. Technische Universität Dresden, 2021. http://dx.doi.org/10.25368/2022.411.

Der volle Inhalt der Quelle
Annotation:
Does your brain replay your recent life experiences while you are resting? An open question in neuroscience is which events does our brain replay and is there any correlation between the replay and duration of the event? In this study I tried to investigate this question by using Magnetoencephalography data from an active listening experiment. Magnetoencephalography (MEG) is a non-invasive neuroimaging technique used to study the brain activity and understand brain dynamics in perception and cognitive tasks particularly in the fields of speech and hearing. It records the magnetic field generat
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ourada, Jason D., and Kenneth L. Appelbaum. Intoxication and drugs in facilities. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199360574.003.0024.

Der volle Inhalt der Quelle
Annotation:
Active abuse of substances by inmates poses a challenge for correctional psychiatrists. Substance use disorders (SUD) are common among inmates, with higher prevalence usually found in those with general psychiatric conditions. Knowledge about substance use in correctional facilities fosters competent clinical intervention and enhances management at all levels. Psychiatrists working in jails and prisons have the challenging task of maintaining therapeutic alliances with patients who have co-occurring SUDs and also may be actively using substances. Patients might not spontaneously report use dur
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Walczak, Jean-Sébastien. Understanding the responsiveness of C-fibres. Edited by Paul Farquhar-Smith, Pierre Beaulieu, and Sian Jagger. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780198834359.003.0006.

Der volle Inhalt der Quelle
Annotation:
In the paper discussed in this chapter, Ainsley Iggo used electrophysiology to characterize mechanosensory fibres from the saphenous nerve in cats. Using fine techniques of dissection he recorded from single units and therefore could discriminate between the various types of sensitivity of afferent fibres. This article describes properties of primary afferent neurons in response to precise calibrated mechanical stimuli and focused on mechanical sensitivity of C-fibres. In addition, the manuscript describes the properties of skin-receptor fields. The paper showed that not all C-fibres responded
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Chinoy, Hector, and Robert G. Cooper. Polymyositis and dermatomyositis. Oxford University Press, 2013. http://dx.doi.org/10.1093/med/9780199642489.003.0124.

Der volle Inhalt der Quelle
Annotation:
Polymyositis (PM), dermatomyositis (DM), and inclusion body myositis (IBM) form part of the idiopathic inflammatory myopathies (IIM), a heterogeneous group of rare autoimmune diseases characterized by an acquired proximal muscle weakness, raised muscle enzymes (including creatine kinase), inflammatory cell infiltrates in muscle biopsy tissue, electrophysiological abnormalities, and presence of circulating myositis-specific/myositis-associated autoantibodies. The underlying aetiology of IIM is poorly understood, but likely involves interactions between environmental and genetic risk factors. My
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Harper, Lorraine, and David Jayne. The patient with vasculitis. Edited by Giuseppe Remuzzi. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199592548.003.0160.

Der volle Inhalt der Quelle
Annotation:
The goals of treatment in renal vasculitis are to stop vasculitic activity and recover renal function. Subsequent strategies are required to prevent vasculitis returning and to address longer-term co-morbidities caused by tissue damage, drug toxicity, and increased cardiovascular and malignancy risk.Cyclophosphamide and high-dose glucocorticoids remain the standard induction therapy with alternative immunosuppressives, such as azathioprine, to prevent relapse. Plasma exchange improves renal recovery in severe presentations. Refractory disease resulting from a failure of induction or remission
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Ufimtseva, Nataliya V., Iosif A. Sternin, and Elena Yu Myagkova. Russian psycholinguistics: results and prospects (1966–2021): a research monograph. Institute of Linguistics, Russian Academy of Sciences, 2021. http://dx.doi.org/10.30982/978-5-6045633-7-3.

Der volle Inhalt der Quelle
Annotation:
The monograph reflects the problems of Russian psycholinguistics from the moment of its inception in Russia to the present day and presents its main directions that are currently developing. In addition, theoretical developments and practical results obtained in the framework of different directions and research centers are described in a concise form. The task of the book is to reflect, as far as it is possible in one edition, firstly, the history of the formation of Russian psycholinguistics; secondly, its methodology and developed methods; thirdly, the results obtained in different research
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "User activity detection"

1

Baek, Jonghun, Geehyuk Lee, Wonbae Park, and Byoung-Ju Yun. "Accelerometer Signal Processing for User Activity Detection." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30134-9_82.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Jahn, Andreas, Marek Bachmann, Philipp Wenzel, and Klaus David. "Focus on the User: A User Relative Coordinate System for Activity Detection." In Modeling and Using Context. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57837-8_47.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Scardino, Giuseppe, Ignazio Infantino, and Filippo Vella. "Recognition of Human Identity by Detection of User Activity." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39345-7_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Miu, TungNgai, Chenxu Wang, Daniel Xiapu Luo, and Jinhe Wang. "Modeling User Browsing Activity for Application Layer DDoS Attack Detection." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59608-2_42.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Grushka-Cohen, Hagit, Ofer Biller, Oded Sofer, Lior Rokach, and Bracha Shapira. "Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection." In Policy-Based Autonomic Data Governance. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17277-0_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Märker, Marcus, Sebastian Wolf, Oliver Scharf, Daniel Plorin, and Tobias Teich. "KNX-Based Sensor Monitoring for User Activity Detection in AAL-environments." In Ambient Assisted Living and Daily Activities. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13105-4_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Tokhtabayev, Arnur, Anton Kopeikin, Nurlan Tashatov, and Dina Satybaldina. "Malware Analysis and Detection via Activity Trees in User-Dependent Environment." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9_17.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Lukashin, Aleksey, Mikhail Popov, Dmitrii Timofeev, and Igor Mikhalev. "Employee Performance Analytics Approach Based on Anomaly Detection in User Activity." In Proceedings of International Scientific Conference on Telecommunications, Computing and Control. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6632-9_28.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Burghouwt, Pieter, Marcel Spruit, and Henk Sips. "Towards Detection of Botnet Communication through Social Media by Monitoring User Activity." In Information Systems Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ortega, Jose Luis Gomez, Liangxiu Han, and Nicholas Bowring. "Modelling and Detection of User Activity Patterns for Energy Saving in Buildings." In Emerging Trends and Advanced Technologies for Computational Intelligence. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33353-3_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "User activity detection"

1

Derya, Sertac, Shih-Chen Yu, Hsu-Wen Young, Eduard A. Jorswieck, Pin-Hsun Lin, and Shih-Chun Lin. "Joint Delay And User Activity Detection in Asynchronous Massive Access." In 2024 33rd Wireless and Optical Communications Conference (WOCC). IEEE, 2024. https://doi.org/10.1109/wocc61718.2024.10786075.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Sun, Guangyue, Zhaoji Zhang, and Ying Li. "Hybrid Model-Data-Driven User-Activity Detection Network for Massive Random Access." In 2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring). IEEE, 2024. http://dx.doi.org/10.1109/vtc2024-spring62846.2024.10683656.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Zhang, Yuanyuan, Yongtian Luo, Jin Xu, Weihua Liu, Lixun Huang, and Zhe Zhang. "Structured Compressive Sensing Based Joint User Activity and Data Detection for Grant-Free mMTC." In 2024 9th International Conference on Intelligent Computing and Signal Processing (ICSP). IEEE, 2024. http://dx.doi.org/10.1109/icsp62122.2024.10743465.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Khan, Muhammad Usman, Enrico Testi, Marco Chiani, and Enrico Paolini. "Blind User Activity Detection for Grant-Free Random Access in Cell-Free mMIMO Networks." In 2024 IEEE 8th Forum on Research and Technologies for Society and Industry Innovation (RTSI). IEEE, 2024. http://dx.doi.org/10.1109/rtsi61910.2024.10761492.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Forsch, Christian, Alexander Karataev, and Laura Cottatellucci. "Distributed Joint User Activity Detection, Channel Estimation, and Data Detection via Expectation Propagation in Cell-Free Massive MIMO." In 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2024. http://dx.doi.org/10.1109/spawc60668.2024.10694527.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Wang, Yixin, Yichen Wang, Tao Wang, and Julian Cheng. "Joint Channel Estimation and User Activity Detection for mmWave Grant-Free Massive MTC Networks Under Pilot Contamination Attack." In 2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring). IEEE, 2024. http://dx.doi.org/10.1109/vtc2024-spring62846.2024.10683251.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Zhong, Sheng, Li Zhen, Shuchang Li, Ping Dong, and Hao Qin. "Joint User Activity Detection and Channel Estimation for Grant-Free Temporal-Correlated Random Access in LEO Satellite Based IoT." In 2024 IEEE 7th International Conference on Electronic Information and Communication Technology (ICEICT). IEEE, 2024. http://dx.doi.org/10.1109/iceict61637.2024.10671064.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Hasara Pathmaperuma, Madushi, Yogachandran Rahulamathavan, Safak Dogan, and Ahmet M. Kondoz. "User Mobile App Encrypted Activity Detection." In ESCC '21: The 2nd European Symposium on Computer and Communications. ACM, 2021. http://dx.doi.org/10.1145/3478301.3478303.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Swarnalaxmi, S., I. Elakkiya, M. Thilagavathi, Anil Thomas, and Gunasekaran Raja. "User Activity Analysis Driven Anomaly Detection in Cellular Network." In 2018 Tenth International Conference on Advanced Computing (ICoAC). IEEE, 2018. http://dx.doi.org/10.1109/icoac44903.2018.8939064.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Hu, Qiaona, Baoming Tang, and Derek Lin. "Anomalous User Activity Detection in Enterprise Multi-source Logs." In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, 2017. http://dx.doi.org/10.1109/icdmw.2017.110.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "User activity detection"

1

Malik, Arun, Andrea López, and Paul E. Carrillo. Pollution or Crime: The Effect of Driving Restrictions on Criminal Activity. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0011747.

Der volle Inhalt der Quelle
Annotation:
Driving restriction programs have been implemented in many cities around the world to alleviate pollution and congestion problems. Enforcement of such programs is costly and can potentially displace policing resources used for crime prevention and crime detection. Hence, driving restrictions may increase crime. To test this hypothesis, this paper exploits both temporal and spatial variation in the implementation of Quito, Ecuador's Pico y Placa program and evaluates its effect on crime. Both difference-in-difference and spatial regression discontinuity estimates provide credible evidence that
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Michaels, Trevor. Red-tailed boa (Boa constrictor) surveys at Salt River Bay National Park, St. Croix U.S. Virgin Islands: 2023 report of activities. National Park Service, 2024. http://dx.doi.org/10.36967/2303799.

Der volle Inhalt der Quelle
Annotation:
St. Croix is home to a variety of threatened and endangered (T&amp;E) species that are at risk for predation by the invasive red-tailed boa (Boa constrictor), such as the St. Croix ground lizard (Amevia polyps), the ground-nesting least tern (Sterna antillarum), and the hawksbill sea turtle (Eretmochelys imbricata). Genetic analysis determined the original red-tailed boa population on St. Croix sourced from a single female released by a pet owner and its range expands every year. Presently, the main population of red-tailed boa is established on the west end of St. Croix and extends as far eas
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Barefoot, Susan F., Bonita A. Glatz, Nathan Gollop, and Thomas A. Hughes. Bacteriocin Markers for Propionibacteria Gene Transfer Systems. United States Department of Agriculture, 2000. http://dx.doi.org/10.32747/2000.7573993.bard.

Der volle Inhalt der Quelle
Annotation:
The antibotulinal baceriocins, propionicin PLG-1 and jenseniin G., were the first to be identified, purified and characterized for the dairy propionibaceria and are produced by Propionibacterium thoenii P127 and P. thoenii/jensenii P126, respectively. Objectives of this project were to (a) produce polyclonal antibodies for detection, comparison and monitoring of propionicin PLG-1; (b) identify, clone and characterize the propionicin PLG-1 (plg-1) and jenseniin G (jnG) genes; and (3) develop gene transfer systems for dairy propionibacteria using them as models. Polyclonal antibodies for detecti
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Cytryn, Eddie, Mark R. Liles, and Omer Frenkel. Mining multidrug-resistant desert soil bacteria for biocontrol activity and biologically-active compounds. United States Department of Agriculture, 2014. http://dx.doi.org/10.32747/2014.7598174.bard.

Der volle Inhalt der Quelle
Annotation:
Control of agro-associated pathogens is becoming increasingly difficult due to increased resistance and mounting restrictions on chemical pesticides and antibiotics. Likewise, in veterinary and human environments, there is increasing resistance of pathogens to currently available antibiotics requiring discovery of novel antibiotic compounds. These drawbacks necessitate discovery and application of microorganisms that can be used as biocontrol agents (BCAs) and the isolation of novel biologically-active compounds. This highly-synergistic one year project implemented an innovative pipeline aimed
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hanna, Benjamin, Tom Bubenik, and Barbara Padgett. PR186-203813-R01 Literature Review Pipeline Mid-wall Defect Detection and FFS Assessment. Pipeline Research Council International, Inc. (PRCI), 2021. http://dx.doi.org/10.55274/r0012076.

Der volle Inhalt der Quelle
Annotation:
A literature review on the current industry understanding of mid-wall cracking and its detection was conducted. A summary of key factors influencing mid-wall cracking and modern integrity management approaches for the phenomenon are summarized. Based on the literature review and subject matter expert interviews, gaps in the published industry knowledge were identified. These gaps will be used to drive work in the direction of backfilling the valuable information that may be used to mitigate the onset of mid-wall cracking and to identify the presence of mid-wall cracking so that the threat can
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Wongpakdeea, Thinnapong, Karin Crenshaw, Hery Figueroa Wong, Duangjai Nacapricha, and Bruce McCord. Advancements in Analytical Techniques for Rapid Identification of Gunshot Residue and Low Explosives through Electrochemical Detection and Surface-Enhanced Raman Spectroscopy. Florida International University, 2024. https://doi.org/10.25148/gfjcsr.2024.7.

Der volle Inhalt der Quelle
Annotation:
This research focuses on developing two analytical methods for forensic investigations using electrochemical detection and surface-enhanced Raman spectroscopy. For electrochemical analysis, screen-printed carbon electrodes are used to detect metals and nitrate/nitrite compounds commonly found in gunshot residue. Gold electrodeposition and copper modification enhance sensitivity and catalytic activity, respectively. Additionally, a screen-printed gold electrode modified with gold nanoparticles enables surface-enhanced Raman spectroscopy, requiring only a single drop of sample solution. Testing
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Chen, Yona, Jeffrey Buyer, and Yitzhak Hadar. Microbial Activity in the Rhizosphere in Relation to the Iron Nutrition of Plants. United States Department of Agriculture, 1993. http://dx.doi.org/10.32747/1993.7613020.bard.

Der volle Inhalt der Quelle
Annotation:
Iron is the fourth most abundant element in the soil, but since it forms insoluble hydroxides at neutral and basic pH, it often falls short of meeting the basic requirements of plants and microorganisms. Most aerobic and facultative aerobic microorganisms possess a high-affinity Fe transport system in which siderophores are excreted and the consequent Fe complex is taken up via a cognate specific receptor and a transport pathway. The role of the siderophore in Fe uptake by plants and microorganisms was the focus of this study. In this research Rhizopus arrhizus was found to produce a novel sid
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Burns, Malcom, and Gavin Nixon. Literature review on analytical methods for the detection of precision bred products. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.ney927.

Der volle Inhalt der Quelle
Annotation:
The Genetic Technology (Precision Breeding) Act (England) aims to develop a science-based process for the regulation and authorisation of precision bred organisms (PBOs). PBOs are created by genetic technologies but exhibit changes which could have occurred through traditional processes. This current review, commissioned by the Food Standards Agency (FSA), aims to clarify existing terminologies, explore viable methods for the detection, identification, and quantification of products of precision breeding techniques, address and identify potential solutions to the analytical challenges presente
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Graham, Timothy, and Katherine M. FitzGerald. Bots, Fake News and Election Conspiracies: Disinformation During the Republican Primary Debate and the Trump Interview. Queensland University of Technology, 2023. http://dx.doi.org/10.5204/rep.eprints.242533.

Der volle Inhalt der Quelle
Annotation:
We used Alexandria Digital, a world leading disinformation detection technology, to analyse almost a million posts on X (formerly known as Twitter) and Reddit comments during the first Republican primary debate and counterprogrammed Tucker Carlson and Donald Trump interview on the 23rd of August. What we did: • Collected 949,259 posts from the platform X, formerly known as Twitter. These posts were collected if they contained one of 11 relevant hashtags or keywords and were posted between 8:45pm and 11:15pm EST on 23rd August 2023. • Collected 20,549 comments from two separate Reddit threads.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Zárate-Solano, Héctor M., and Norberto Rodríguez-Niño. Consumer Prices Trends in Colombia: Detecting Breaks and Forecasting Inflation. Banco de la República, 2024. https://doi.org/10.32468/be.1289.

Der volle Inhalt der Quelle
Annotation:
Colombia’s annual inflation reached 13.3% in March 2023, the highest rate since the implementation of the inflation-targeting regime for monetary policy in 2000. However, some groups within the basket show signs of lower inflation, while others exhibit higher inflation. The persistence of this trend is actively debated, involving analysis of both year-to-year and month-to-month changes in price indices. In this paper, we use a time series methodology to identify shifts in inflation levels based on the 188 price indices that comprise the basket. We classify the trend breaks as positive or negat
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!