Academic literature on the topic 'User activity detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'User activity detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "User activity detection"
Zhu, Hao, and Georgios B. Giannakis. "Exploiting Sparse User Activity in Multiuser Detection." IEEE Transactions on Communications 59, no. 2 (2011): 454–65. http://dx.doi.org/10.1109/tcomm.2011.121410.090570.
Full textMitra, U., and H. V. Poor. "Activity detection in a multi-user environment." Wireless Personal Communications 3, no. 1-2 (1996): 149–74. http://dx.doi.org/10.1007/bf00333928.
Full textLee, Junho, and Seung-Hwan Lee. "Low dimensional multiuser detection exploiting low user activity." Journal of Communications and Networks 15, no. 3 (2013): 283–91. http://dx.doi.org/10.1109/jcn.2013.000051.
Full textZou, Shihong, Huizhong Sun, Guosheng Xu, and Ruijie Quan. "Ensemble Strategy for Insider Threat Detection from User Activity Logs." Computers, Materials & Continua 65, no. 2 (2020): 1321–34. http://dx.doi.org/10.32604/cmc.2020.09649.
Full textWang, Shuwen, Xingquan Zhu, Weiping Ding, and Amir Alipour Yengejeh. "Cyberbullying and Cyberviolence Detection: A Triangular User-Activity-Content View." IEEE/CAA Journal of Automatica Sinica 9, no. 8 (2022): 1384–405. http://dx.doi.org/10.1109/jas.2022.105740.
Full textPark, Hansol, Kookjin Kim, Dongil Shin, and Dongkyoo Shin. "BGP Dataset-Based Malicious User Activity Detection Using Machine Learning." Information 14, no. 9 (2023): 501. http://dx.doi.org/10.3390/info14090501.
Full textParwez, Md Salik, Danda B. Rawat, and Moses Garuba. "Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network." IEEE Transactions on Industrial Informatics 13, no. 4 (2017): 2058–65. http://dx.doi.org/10.1109/tii.2017.2650206.
Full textPathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan, and Ahmet Kondoz. "CNN for User Activity Detection Using Encrypted In-App Mobile Data." Future Internet 14, no. 2 (2022): 67. http://dx.doi.org/10.3390/fi14020067.
Full textBashir, Sulaimon Adebayo, Andrei Petrovski, and Daniel Doolan. "A framework for unsupervised change detection in activity recognition." International Journal of Pervasive Computing and Communications 13, no. 2 (2017): 157–75. http://dx.doi.org/10.1108/ijpcc-03-2017-0027.
Full textKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textDissertations / Theses on the topic "User activity detection"
Amanzi, Richard. "A natural user interface architecture using gestures to facilitate the detection of fundamental movement skills." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/6204.
Full textSagheer, Fakher. "Bayesian statistical methods for joint user activity detection, channel estimation, and data decoding in dynamic wireless networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. https://theses.hal.science/tel-04874844.
Full textDias, Pereira dos Santos Augusto. "Using Motion Sensor and Machine Learning to Support the Assessment of Rhythmic Skills in Social Partner Dance: Bridging Teacher, Student and Machine Contexts." Thesis, The University of Sydney, 2019. https://hdl.handle.net/2123/21302.
Full textOdehnal, Jiří. "Řízení a měření sportovních drilů hlasem/zvuky." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399705.
Full textMcEachern, Matthew. "Neural Voice Activity Detection and its practical use." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119733.
Full textTholen, Andrea. "The use of animal activity data and milk components as indicators of clinical mastitis." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/76826.
Full textAzhar, Faisal. "Marker-less human body part detection, labelling and tracking for human activity recognition." Thesis, University of Warwick, 2015. http://wrap.warwick.ac.uk/69575/.
Full textMyles, Kimberly. "Activity-Based Target Acquisition Methods for Use in Urban Environments." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/28422.
Full textHenriksson, Mikael. "Implementation of a Hardware Coordinate Wise Descend Algorithm with Maximum Likelihood Estimator for Use in mMTC Activity Detection." Thesis, Linköpings universitet, Datorteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-171071.
Full textGoodlich, Benjamin I. "Machine learning algorithms for the automatic detection and classification of physical activity in children with cerebral palsy who use mobility aids for ambulation." Thesis, Griffith University, 2019. http://hdl.handle.net/10072/389853.
Full textBooks on the topic "User activity detection"
Nazarov, Dmitriy, and Anton Kopnin. Information technologies in professional activity: data mining and business analytics. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2110964.
Full textMeijer, Ewout H., and Bruno Verschuere. Detection Deception Using Psychophysiological and Neural Measures. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190612016.003.0010.
Full textShaikh, Mohd Faraz. Machine Learning in Detecting Auditory Sequences in Magnetoencephalography Data : Research Project in Computational Modelling and Simulation. Technische Universität Dresden, 2021. http://dx.doi.org/10.25368/2022.411.
Full textOurada, Jason D., and Kenneth L. Appelbaum. Intoxication and drugs in facilities. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199360574.003.0024.
Full textWalczak, Jean-Sébastien. Understanding the responsiveness of C-fibres. Edited by Paul Farquhar-Smith, Pierre Beaulieu, and Sian Jagger. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780198834359.003.0006.
Full textChinoy, Hector, and Robert G. Cooper. Polymyositis and dermatomyositis. Oxford University Press, 2013. http://dx.doi.org/10.1093/med/9780199642489.003.0124.
Full textHarper, Lorraine, and David Jayne. The patient with vasculitis. Edited by Giuseppe Remuzzi. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199592548.003.0160.
Full textUfimtseva, Nataliya V., Iosif A. Sternin, and Elena Yu Myagkova. Russian psycholinguistics: results and prospects (1966–2021): a research monograph. Institute of Linguistics, Russian Academy of Sciences, 2021. http://dx.doi.org/10.30982/978-5-6045633-7-3.
Full textBook chapters on the topic "User activity detection"
Baek, Jonghun, Geehyuk Lee, Wonbae Park, and Byoung-Ju Yun. "Accelerometer Signal Processing for User Activity Detection." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30134-9_82.
Full textJahn, Andreas, Marek Bachmann, Philipp Wenzel, and Klaus David. "Focus on the User: A User Relative Coordinate System for Activity Detection." In Modeling and Using Context. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57837-8_47.
Full textScardino, Giuseppe, Ignazio Infantino, and Filippo Vella. "Recognition of Human Identity by Detection of User Activity." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39345-7_6.
Full textMiu, TungNgai, Chenxu Wang, Daniel Xiapu Luo, and Jinhe Wang. "Modeling User Browsing Activity for Application Layer DDoS Attack Detection." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59608-2_42.
Full textGrushka-Cohen, Hagit, Ofer Biller, Oded Sofer, Lior Rokach, and Bracha Shapira. "Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection." In Policy-Based Autonomic Data Governance. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17277-0_5.
Full textMärker, Marcus, Sebastian Wolf, Oliver Scharf, Daniel Plorin, and Tobias Teich. "KNX-Based Sensor Monitoring for User Activity Detection in AAL-environments." In Ambient Assisted Living and Daily Activities. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13105-4_4.
Full textTokhtabayev, Arnur, Anton Kopeikin, Nurlan Tashatov, and Dina Satybaldina. "Malware Analysis and Detection via Activity Trees in User-Dependent Environment." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9_17.
Full textLukashin, Aleksey, Mikhail Popov, Dmitrii Timofeev, and Igor Mikhalev. "Employee Performance Analytics Approach Based on Anomaly Detection in User Activity." In Proceedings of International Scientific Conference on Telecommunications, Computing and Control. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6632-9_28.
Full textBurghouwt, Pieter, Marcel Spruit, and Henk Sips. "Towards Detection of Botnet Communication through Social Media by Monitoring User Activity." In Information Systems Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_9.
Full textOrtega, Jose Luis Gomez, Liangxiu Han, and Nicholas Bowring. "Modelling and Detection of User Activity Patterns for Energy Saving in Buildings." In Emerging Trends and Advanced Technologies for Computational Intelligence. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33353-3_9.
Full textConference papers on the topic "User activity detection"
Derya, Sertac, Shih-Chen Yu, Hsu-Wen Young, Eduard A. Jorswieck, Pin-Hsun Lin, and Shih-Chun Lin. "Joint Delay And User Activity Detection in Asynchronous Massive Access." In 2024 33rd Wireless and Optical Communications Conference (WOCC). IEEE, 2024. https://doi.org/10.1109/wocc61718.2024.10786075.
Full textSun, Guangyue, Zhaoji Zhang, and Ying Li. "Hybrid Model-Data-Driven User-Activity Detection Network for Massive Random Access." In 2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring). IEEE, 2024. http://dx.doi.org/10.1109/vtc2024-spring62846.2024.10683656.
Full textZhang, Yuanyuan, Yongtian Luo, Jin Xu, Weihua Liu, Lixun Huang, and Zhe Zhang. "Structured Compressive Sensing Based Joint User Activity and Data Detection for Grant-Free mMTC." In 2024 9th International Conference on Intelligent Computing and Signal Processing (ICSP). IEEE, 2024. http://dx.doi.org/10.1109/icsp62122.2024.10743465.
Full textKhan, Muhammad Usman, Enrico Testi, Marco Chiani, and Enrico Paolini. "Blind User Activity Detection for Grant-Free Random Access in Cell-Free mMIMO Networks." In 2024 IEEE 8th Forum on Research and Technologies for Society and Industry Innovation (RTSI). IEEE, 2024. http://dx.doi.org/10.1109/rtsi61910.2024.10761492.
Full textForsch, Christian, Alexander Karataev, and Laura Cottatellucci. "Distributed Joint User Activity Detection, Channel Estimation, and Data Detection via Expectation Propagation in Cell-Free Massive MIMO." In 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2024. http://dx.doi.org/10.1109/spawc60668.2024.10694527.
Full textWang, Yixin, Yichen Wang, Tao Wang, and Julian Cheng. "Joint Channel Estimation and User Activity Detection for mmWave Grant-Free Massive MTC Networks Under Pilot Contamination Attack." In 2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring). IEEE, 2024. http://dx.doi.org/10.1109/vtc2024-spring62846.2024.10683251.
Full textZhong, Sheng, Li Zhen, Shuchang Li, Ping Dong, and Hao Qin. "Joint User Activity Detection and Channel Estimation for Grant-Free Temporal-Correlated Random Access in LEO Satellite Based IoT." In 2024 IEEE 7th International Conference on Electronic Information and Communication Technology (ICEICT). IEEE, 2024. http://dx.doi.org/10.1109/iceict61637.2024.10671064.
Full textHasara Pathmaperuma, Madushi, Yogachandran Rahulamathavan, Safak Dogan, and Ahmet M. Kondoz. "User Mobile App Encrypted Activity Detection." In ESCC '21: The 2nd European Symposium on Computer and Communications. ACM, 2021. http://dx.doi.org/10.1145/3478301.3478303.
Full textSwarnalaxmi, S., I. Elakkiya, M. Thilagavathi, Anil Thomas, and Gunasekaran Raja. "User Activity Analysis Driven Anomaly Detection in Cellular Network." In 2018 Tenth International Conference on Advanced Computing (ICoAC). IEEE, 2018. http://dx.doi.org/10.1109/icoac44903.2018.8939064.
Full textHu, Qiaona, Baoming Tang, and Derek Lin. "Anomalous User Activity Detection in Enterprise Multi-source Logs." In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, 2017. http://dx.doi.org/10.1109/icdmw.2017.110.
Full textReports on the topic "User activity detection"
Malik, Arun, Andrea López, and Paul E. Carrillo. Pollution or Crime: The Effect of Driving Restrictions on Criminal Activity. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0011747.
Full textMichaels, Trevor. Red-tailed boa (Boa constrictor) surveys at Salt River Bay National Park, St. Croix U.S. Virgin Islands: 2023 report of activities. National Park Service, 2024. http://dx.doi.org/10.36967/2303799.
Full textBarefoot, Susan F., Bonita A. Glatz, Nathan Gollop, and Thomas A. Hughes. Bacteriocin Markers for Propionibacteria Gene Transfer Systems. United States Department of Agriculture, 2000. http://dx.doi.org/10.32747/2000.7573993.bard.
Full textCytryn, Eddie, Mark R. Liles, and Omer Frenkel. Mining multidrug-resistant desert soil bacteria for biocontrol activity and biologically-active compounds. United States Department of Agriculture, 2014. http://dx.doi.org/10.32747/2014.7598174.bard.
Full textHanna, Benjamin, Tom Bubenik, and Barbara Padgett. PR186-203813-R01 Literature Review Pipeline Mid-wall Defect Detection and FFS Assessment. Pipeline Research Council International, Inc. (PRCI), 2021. http://dx.doi.org/10.55274/r0012076.
Full textWongpakdeea, Thinnapong, Karin Crenshaw, Hery Figueroa Wong, Duangjai Nacapricha, and Bruce McCord. Advancements in Analytical Techniques for Rapid Identification of Gunshot Residue and Low Explosives through Electrochemical Detection and Surface-Enhanced Raman Spectroscopy. Florida International University, 2024. https://doi.org/10.25148/gfjcsr.2024.7.
Full textChen, Yona, Jeffrey Buyer, and Yitzhak Hadar. Microbial Activity in the Rhizosphere in Relation to the Iron Nutrition of Plants. United States Department of Agriculture, 1993. http://dx.doi.org/10.32747/1993.7613020.bard.
Full textBurns, Malcom, and Gavin Nixon. Literature review on analytical methods for the detection of precision bred products. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.ney927.
Full textGraham, Timothy, and Katherine M. FitzGerald. Bots, Fake News and Election Conspiracies: Disinformation During the Republican Primary Debate and the Trump Interview. Queensland University of Technology, 2023. http://dx.doi.org/10.5204/rep.eprints.242533.
Full textZárate-Solano, Héctor M., and Norberto Rodríguez-Niño. Consumer Prices Trends in Colombia: Detecting Breaks and Forecasting Inflation. Banco de la República, 2024. https://doi.org/10.32468/be.1289.
Full text