Search alternatives:
1_decoding algorithm » modeling algorithm (Expand Search)
table 1_decoding » table 1_developing (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
task algorithm » rast algorithm (Expand Search), pass algorithm (Expand Search), based algorithm (Expand Search)
movement task » movement data (Expand Search)
1_decoding algorithm » modeling algorithm (Expand Search)
table 1_decoding » table 1_developing (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
task algorithm » rast algorithm (Expand Search), pass algorithm (Expand Search), based algorithm (Expand Search)
movement task » movement data (Expand Search)
-
1
-
2
-
3
-
4
-
5
Demographic data of the used datasets.
Published 2025“…Comparisons with a CSP and NN framework confirmed DLRCSPNN’s algorithms superior performance. These results demonstrate the effectiveness of the approach, offering a new perspective on the identification of MI task performance in EEG based BCI technology. …”
-
6
Data Sheet 1_Convolutional neural networks decode finger movements in motor sequence learning from MEG data.docx
Published 2025“…LF-CNN stood out for (1) its low computational time and (2) its interpretability in both spatial and spectral domains, allowing to examine neurophysiological patterns reflecting task-related motor cortex activity.</p>Significance<p>We demonstrated the feasibility of finger movement decoding with a tailored Convolutional Neural Network. …”
-
7
List of the time used by each algorithm.
Published 2024“…To this end, this paper proposes an entropy-based dynamic ensemble classification algorithm (EDAC) to consider data streams with class imbalance and concept drift simultaneously. …”
-
8
Sanitized databases using MLHProtector algorithm.
Published 2025“…<div><p>Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …”
-
9
-
10
-
11
-
12
-
13
-
14
The mAP for all algorithms and 80% of the data used for training.
Published 2024“…<p>The mAP for all algorithms and 80% of the data used for training.</p>…”
-
15
The mAP for all algorithms and 50% of the data used for training.
Published 2024“…<p>The mAP for all algorithms and 50% of the data used for training.</p>…”
-
16
The mAP for all algorithms and 60% of the data used for training.
Published 2024“…<p>The mAP for all algorithms and 60% of the data used for training.</p>…”
-
17
Point cloud data registration using the original ICP algorithm.
Published 2025“…<p>Point cloud data registration using the original ICP algorithm.…”
-
18
-
19
-
20