Essays about: "Neural activity"
Showing result 1 - 5 of 179 essays containing the words Neural activity.
-
1. Heart rate estimation from wrist-PPG signals in activity by deep learning methods
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the context of health improving, the measurement of vital parameters such as heart rate (HR) can provide solutions for health monitoring, prevention and screening for certain chronic diseases. Among the different technologies for HR measuring, photoplethysmography (PPG) technique embedded in smart watches is the most commonly used in the field of consumer electronics since it is comfortable and does not require any user intervention. READ MORE
-
2. Combining Cell Painting, Gene Expression and Structure-Activity Data for Mechanism of Action Prediction
University essay from Uppsala universitet/Nationellt resurscentrum för biologi och bioteknikAbstract : The rapid progress in high-throughput omics methods and high-resolution morphological profiling, coupled with the significant advances in machine learning (ML) and deep learning (DL), has opened new avenues for tackling the notoriously difficult problem of predicting the Mechanism of Action (MoA) for a drug of clinical interest. Understanding a drug's MoA can enrich our knowledge of its biological activity, shed light on potential side effects, and serve as a predictor of clinical success. READ MORE
-
3. Neural correlates of pragmatic processing in adolescents
University essay from Stockholms universitet/Institutionen för lingvistikAbstract : Understanding indirect speech, i.e., when an utterance does not match the intended meaning, is one of many pragmatic abilities at play in conversation. While the development of pragmatic abilities starts early, they continually develop throughout adolescence although this period is understudied. READ MORE
-
4. Intrusion Detection in IT Infrastructures using Hidden Markov Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE
-
5. Exploration and Evaluation of RNN Models on Low-Resource Embedded Devices for Human Activity Recognition
University essay from KTH/Mekatronik och inbyggda styrsystemAbstract : Human activity data is typically represented as time series data, and RNNs, often with LSTM cells, are commonly used for recognition in this field. However, RNNs and LSTM-RNNs are often too resource-intensive for real-time applications on resource constrained devices, making them unsuitable. READ MORE