Overtraining syndrome as a complex systems phenomenon

LE Armstrong, MF Bergeron, EC Lee… - Frontiers in network …, 2022 - frontiersin.org
The phenomenon of reduced athletic performance following sustained, intense training
(Overtraining Syndrome, and OTS) was first recognized more than 90 years ago. Although …

Pattern mining approaches used in sensor-based biometric recognition: a review

J Chaki, N Dey, F Shi, RS Sherratt - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
Sensing technologies place significant interest in the use of biometrics for the recognition
and assessment of individuals. Pattern mining techniques have established a critical step in …

A lightweight attention-based CNN model for efficient gait recognition with wearable IMU sensors

H Huang, P Zhou, Y Li, F Sun - Sensors, 2021 - mdpi.com
Wearable sensors-based gait recognition is an effective method to recognize people's
identity by recognizing the unique way they walk. Recently, the adoption of deep learning …

Machine learning and Design of Experiments: Alternative approaches or complementary methodologies for quality improvement?

J Freiesleben, J Keim, M Grutsch - Quality and Reliability …, 2020 - Wiley Online Library
Abstract Machine Learning (ML), or the ability of self‐learning computer algorithms to
autonomously structure and interpret data, is a methodological approach to solve …

Gait recognition with wearable sensors using modified residual block-based lightweight cnn

MAM Hasan, F Al Abir, M Al Siam, J Shin - IEEE Access, 2022 - ieeexplore.ieee.org
Gait recognition with wearable sensors is an effective approach to identifying people by
recognizing their distinctive walking patterns. Deep learning-based networks have recently …

Hybrid local phase quantization and grey wolf optimization based SVM for finger vein recognition

K Kapoor, S Rani, M Kumar, V Chopra… - Multimedia Tools and …, 2021 - Springer
As a novelist and the most secure biometric method, finger vein recognition has gained
substantial significance and various pertinent researches have been reported in literature …

A fuzzy authentication system based on neural network learning and extreme value statistics

Z Qin, G Huang, H Xiong, Z Qin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Internet-connected smart devices in, on, and around us,(eg, embedded devices, wearable
devices, and smart sensors) can collect human biometric features and facilitate identity …

[PDF][PDF] General pattern recognition using machine learning in the cloud

A Salim, L Raymond, JV Moniaga - Procedia Computer Science, 2023 - e-tarjome.com
Abstract Machine learning (ML) and cloud computing are two subjects that mix very well.
The existence of cloud computing enables data scientists to create their machine learning …

[HTML][HTML] Circular shift combination local binary pattern (CSC-LBP) method for dorsal finger crease classification

I Riaz, AN Ali, H Ibrahim - Journal of King Saud University-Computer and …, 2023 - Elsevier
Biometric technology has drawn increasing attention and significance importance in recent
years. In biometric security systems, personal identification and verification rely on their …

[PDF][PDF] EEG-based biometric authentication using machine learning: A comprehensive survey

TB Shams, MS Hossain… - ECTI Transactions …, 2022 - pdfs.semanticscholar.org
An electroencephalogram (EEG) is a measurement that reflects the overall electrical activity
in the brain. EEG signals are effective for biometric authentication and robust against …