Overtraining syndrome as a complex systems phenomenon
LE Armstrong, MF Bergeron, EC Lee… - Frontiers in network …, 2022 - frontiersin.org
The phenomenon of reduced athletic performance following sustained, intense training
(Overtraining Syndrome, and OTS) was first recognized more than 90 years ago. Although …
(Overtraining Syndrome, and OTS) was first recognized more than 90 years ago. Although …
Pattern mining approaches used in sensor-based biometric recognition: a review
Sensing technologies place significant interest in the use of biometrics for the recognition
and assessment of individuals. Pattern mining techniques have established a critical step in …
and assessment of individuals. Pattern mining techniques have established a critical step in …
A lightweight attention-based CNN model for efficient gait recognition with wearable IMU sensors
Wearable sensors-based gait recognition is an effective method to recognize people's
identity by recognizing the unique way they walk. Recently, the adoption of deep learning …
identity by recognizing the unique way they walk. Recently, the adoption of deep learning …
Machine learning and Design of Experiments: Alternative approaches or complementary methodologies for quality improvement?
J Freiesleben, J Keim, M Grutsch - Quality and Reliability …, 2020 - Wiley Online Library
Abstract Machine Learning (ML), or the ability of self‐learning computer algorithms to
autonomously structure and interpret data, is a methodological approach to solve …
autonomously structure and interpret data, is a methodological approach to solve …
Gait recognition with wearable sensors using modified residual block-based lightweight cnn
Gait recognition with wearable sensors is an effective approach to identifying people by
recognizing their distinctive walking patterns. Deep learning-based networks have recently …
recognizing their distinctive walking patterns. Deep learning-based networks have recently …
Hybrid local phase quantization and grey wolf optimization based SVM for finger vein recognition
As a novelist and the most secure biometric method, finger vein recognition has gained
substantial significance and various pertinent researches have been reported in literature …
substantial significance and various pertinent researches have been reported in literature …
A fuzzy authentication system based on neural network learning and extreme value statistics
Internet-connected smart devices in, on, and around us,(eg, embedded devices, wearable
devices, and smart sensors) can collect human biometric features and facilitate identity …
devices, and smart sensors) can collect human biometric features and facilitate identity …
[PDF][PDF] General pattern recognition using machine learning in the cloud
A Salim, L Raymond, JV Moniaga - Procedia Computer Science, 2023 - e-tarjome.com
Abstract Machine learning (ML) and cloud computing are two subjects that mix very well.
The existence of cloud computing enables data scientists to create their machine learning …
The existence of cloud computing enables data scientists to create their machine learning …
[HTML][HTML] Circular shift combination local binary pattern (CSC-LBP) method for dorsal finger crease classification
Biometric technology has drawn increasing attention and significance importance in recent
years. In biometric security systems, personal identification and verification rely on their …
years. In biometric security systems, personal identification and verification rely on their …
[PDF][PDF] EEG-based biometric authentication using machine learning: A comprehensive survey
TB Shams, MS Hossain… - ECTI Transactions …, 2022 - pdfs.semanticscholar.org
An electroencephalogram (EEG) is a measurement that reflects the overall electrical activity
in the brain. EEG signals are effective for biometric authentication and robust against …
in the brain. EEG signals are effective for biometric authentication and robust against …