Academic literature on the topic 'Threshold-based'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threshold-based.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Threshold-based"
Poornima, B., Y. Ramadevi, and T. Sridevi. "Threshold Based Edge Detection Algorithm." International Journal of Engineering and Technology 3, no. 4 (2011): 400–403. http://dx.doi.org/10.7763/ijet.2011.v3.260.
Full textTOSUN, A. "Threshold-based declustering." Information Sciences 177, no. 5 (March 1, 2007): 1309–31. http://dx.doi.org/10.1016/j.ins.2006.08.011.
Full textMittal, Mamta, Rajendra Kumar Sharma, Varinder Pal Singh, and Raghvendra Kumar. "Adaptive Threshold Based Clustering." International Journal of Information System Modeling and Design 10, no. 1 (January 2019): 42–59. http://dx.doi.org/10.4018/ijismd.2019010103.
Full textGan, Xiao Ying, and Bin Liu. "Shamir Threshold Based Encryption." Applied Mechanics and Materials 52-54 (March 2011): 709–12. http://dx.doi.org/10.4028/www.scientific.net/amm.52-54.709.
Full textBoneva, Lena, Richard Harrison, and Matt Waldron. "Threshold-based forward guidance." Journal of Economic Dynamics and Control 90 (May 2018): 138–55. http://dx.doi.org/10.1016/j.jedc.2018.02.003.
Full textWang, Hai-Kun, Hong-Zhong Huang, Yan-Feng Li, and Yuan-Jian Yang. "Condition-Based Maintenance With Scheduling Threshold and Maintenance Threshold." IEEE Transactions on Reliability 65, no. 2 (June 2016): 513–24. http://dx.doi.org/10.1109/tr.2015.2487578.
Full textGuo, Gencheng, and Mrinal Mandal. "On optimal threshold and structure in threshold system based detector." Signal Processing 92, no. 1 (January 2012): 170–78. http://dx.doi.org/10.1016/j.sigpro.2011.06.016.
Full textGomide, F. A., and A. F. Rocha. "Neurofuzzy Components based on Threshold." IFAC Proceedings Volumes 25, no. 6 (May 1992): 131–36. http://dx.doi.org/10.1016/s1474-6670(17)50893-9.
Full textJenila, A., and J. Joslin Iyda. "Threshold Based Human Face Detection." Procedia Engineering 38 (2012): 2748–53. http://dx.doi.org/10.1016/j.proeng.2012.06.321.
Full textNam, Sung Sik, Mohamed-Slim Alouini, Hong-Chuan Yang, and Khalid A. Qaraqe. "Threshold-based parallel multiuser scheduling." IEEE Transactions on Wireless Communications 8, no. 4 (April 2009): 2150–59. http://dx.doi.org/10.1109/twc.2009.080784.
Full textDissertations / Theses on the topic "Threshold-based"
Zheng, Yexin. "Novel RTD-Based Threshold Logic Design and Verification." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/32011.
Full textMaster of Science
Calota, Andra. "Reliability of spasticity measurement based on tonic stretch reflex threshold." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=111947.
Full textHaboush, W. S. "Adaptive task selection using threshold-based techniques in dynamic sensor networks." Thesis, University of Kent, 2008. https://kar.kent.ac.uk/24027/.
Full textKannamareddy, Aruna Sai. "Density and partition based clustering on massive threshold bounded data sets." Kansas State University, 2017. http://hdl.handle.net/2097/35467.
Full textDepartment of Computing and Information Sciences
William H. Hsu
The project explores the possibility of increasing efficiency in the clusters formed out of massive data sets which are formed using threshold blocking algorithm. Clusters thus formed are denser and qualitative. Clusters that are formed out of individual clustering algorithms alone, do not necessarily eliminate outliers and the clusters generated can be complex, or improperly distributed over the data set. The threshold blocking algorithm, a current research paper from Michael Higgins of Statistics Department on other hand, in comparison with existing algorithms performs better in forming the dense and distinctive units with predefined threshold. Developing a hybridized algorithm by implementing the existing clustering algorithms to re-cluster these units thus formed is part of this project. Clustering on the seeds thus formed from threshold blocking Algorithm, eases the task of clustering to the existing algorithm by eliminating the overhead of worrying about the outliers. Also, the clusters thus generated are more representative of the whole. Also, since the threshold blocking algorithm is proven to be fast and efficient, we now can predict a lot more decisions from large data sets in less time. Predicting the similar songs from Million Song Data Set using such a hybridized algorithm is considered as the data set for the evaluation of this goal.
Whiten, Darren M. (Darren Mark) 1977. "Threshold predictions based on an electro-anatomical model of the cochlear implant." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/87847.
Full textIncludes bibliographical references (p. 135-141).
by Darren M. Whiten.
S.M.and Elec.E.
Zou, Tao. "Non-Destructive Bridge Deck Condition Assessment with a Probability-Based Deterioration Threshold." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/49384.
Full textPh. D.
Dickinson, James Edwin. "A ground based gamma ray telescope of high sensitivity and low energy threshold." Thesis, Durham University, 1995. http://etheses.dur.ac.uk/5279/.
Full textHild, Kerstin [Verfasser]. "Femtosecond laser-based investigations of magnetic circular dichroism in near-threshold photoemission / Kerstin Hild." Mainz : Universitätsbibliothek der Johannes Gutenberg-Universität Mainz, 2011. http://d-nb.info/1221804103/34.
Full textAl, Tobi Amjad Mohamed. "Anomaly-based network intrusion detection enhancement by prediction threshold adaptation of binary classification models." Thesis, University of St Andrews, 2018. http://hdl.handle.net/10023/17050.
Full textWang, Shiyuan. "Fatigue crack threshold and growth behaviour in a near fully-lamellar gamma based titanium aluminides." Thesis, University of Birmingham, 2015. http://etheses.bham.ac.uk//id/eprint/6347/.
Full textBooks on the topic "Threshold-based"
Drakopoulos, S. A. Threshold based demand and product market clearing. Aberdeen: University of Aberdeen. Department of Economics, 1990.
Find full textThreshold of love: Pauline family meditation : liturgical meditation based on St. Paul's hymn of love and rite of marraige. Bangalore: Asian Trading Corp., 2008.
Find full textLionel, S. Joseph. Threshold of love: Pauline family meditation : liturgical meditation based on St. Paul's hymn of love and rite of marraige. Bangalore: Asian Trading Corp., 2008.
Find full textMeador, James Parnell. Use of tissue and sediment based threshold concentrations of polychlorinated biphenyls (PCBs) to protect juvenile salmonids listed under the Endangered Species Act. [Seattle, Wash.]: U.S. Dept. of Commerce, National Oceanic and Atmospheric Administration, National Marine Fisheries Service, [Northwest Fisheries Science Center, 2001.
Find full textNetherlands. Werkgroep van Deskundigen ter Vaststelling van MAC-Waarden. Health-based recommended occupational exposure limits for fluorcarbons (except FC11). Voorburg, The Netherlands: Directorate-General of Labour of the Ministry of Social Affairs and Employment, 1987.
Find full textMAC-Waarden, Netherlands Werkgroep van Deskundigen ter Vaststelling van. Health-based recommended occupational exposure limits for 1,3 butadiene. Den Haag: Ministerie van Sociale Zaken en Werkgelegenheid, 1990.
Find full textNetherlands. Werkgroep van Deskundigen ter Vaststelling van MAC-Waarden. Health-based recommended occupational exposure limits for ethyl acrylate. Den Haag: Ministerie van Sociale Zaken en Werkgelegenheid, 1990.
Find full textNetherlands. Werkgroep van Deskundigen ter Vaststelling van MAC-Waarden. Health-based recommended occupational exposure limits for amyl acetate. Den Haag: Ministerie van Sociale Zaken en Werkgelegenheid, 1990.
Find full textNetherlands. Werkgroep van Deskundigen ter Vaststelling van MAC-Waarden. Health-based recommended occupational exposure limit for methyl ethyl ketone. Den Haag: Ministerie van Sociale Zaken en Werkgelegenheid, 1991.
Find full textNetherlands. Werkgroep van Deskundigen ter Vaststelling van MAC-Waarden. Health-based recommended occupational exposure limits for ethyl methanesulphonate (EMS), methyl methanesulphonate (MMS). Voorburg, The Nederlands: Directorate-General of Labour, 1989.
Find full textBook chapters on the topic "Threshold-based"
Gagné, Martin, Shivaramakrishnan Narayan, and Reihaneh Safavi-Naini. "Threshold Attribute-Based Signcryption." In Lecture Notes in Computer Science, 154–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15317-4_11.
Full textBlachnik, Marcin, and Włodzisław Duch. "Prototype-Based Threshold Rules." In Neural Information Processing, 1028–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11893295_113.
Full textBaek, Joonsang, and Yuliang Zheng. "Identity-Based Threshold Decryption." In Public Key Cryptography – PKC 2004, 262–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24632-9_19.
Full textMohammadi, Leila, and Sara van de Geer. "On threshold-based classification rules." In Institute of Mathematical Statistics Lecture Notes - Monograph Series, 261–80. Beachwood, OH: Institute of Mathematical Statistics, 2003. http://dx.doi.org/10.1214/lnms/1215091942.
Full textKatz, Jonathan, and Moti Yung. "Threshold Cryptosystems Based on Factoring." In Lecture Notes in Computer Science, 192–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36178-2_12.
Full textChow, Sherman S. M., Lucas C. K. Hui, and S. M. Yiu. "Identity Based Threshold Ring Signature." In Lecture Notes in Computer Science, 218–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496618_17.
Full textMohammadi, Leila, and Sara van de Geer. "On threshold-based classification rules." In Institute of Mathematical Statistics Lecture Notes - Monograph Series, 261–80. Beachwood, OH: Institute of Mathematical Statistics, 2003. http://dx.doi.org/10.1214/lnms/1215091942.
Full textKipouridis, Evangelos, Paul G. Spirakis, and Kostas Tsichlas. "Threshold-Based Network Structural Dynamics." In Structural Information and Communication Complexity, 127–45. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79527-6_8.
Full textHe, Xin, and Mei-Ling Ting Lee. "First-Hitting-Time Based Threshold Regression." In International Encyclopedia of Statistical Science, 523–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-04898-2_252.
Full textTosun, Ali Şaman. "Threshold Based Declustering in High Dimensions." In Lecture Notes in Computer Science, 818–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11546924_80.
Full textConference papers on the topic "Threshold-based"
Shuai Wan, Fuzheng Yang, and Mingyi He. "Gradient-threshold Edge Detection based on Perceptually Adaptive Threshold Selection." In 2008 3rd IEEE Conference on Industrial Electronics and Applications. IEEE, 2008. http://dx.doi.org/10.1109/iciea.2008.4582665.
Full textParolari, P., L. Marazzi, M. Connen, and M. Martinelli. "SOA based all-optical threshold." In Conference on Lasers and Electro-Optics (CLEO 2000). Technical Digest. Postconference Edition. TOPS Vol.39. IEEE, 2000. http://dx.doi.org/10.1109/cleo.2000.907050.
Full textAli-Yahiya, Tara, Hakima Chaouchi, Andre-Luc Beylot, and Guy Pujolle. "Threshold based WiMax resource reservation." In the 3rd international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1292331.1292376.
Full textZhou, You, Yian Zhou, and Shigang Chen. "Threshold-Based Widespread Event Detection." In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2019. http://dx.doi.org/10.1109/icdcs.2019.00047.
Full textKarypis, George, and Vipin Kumar. "Parallel threshold-based ILU factorization." In the 1997 ACM/IEEE conference. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/509593.509621.
Full textPan, Xiaoying, and Xinfu Chen. "Subsquarewise Threshold Based Image Denoising." In 2009 2nd International Congress on Image and Signal Processing (CISP). IEEE, 2009. http://dx.doi.org/10.1109/cisp.2009.5303620.
Full textNam, Sung Sik, Mohamed-Slim Alouini, Khalid A. Qaraqe, and Hong-Chuan Yang. "Threshold-based Parallel Multiuser Scheduling." In 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394277.
Full textYao, W., and S. Rahardja. "Dynamic threshold based keyframe detection." In 2010 5th IEEE Conference on Industrial Electronics and Applications (ICIEA). IEEE, 2010. http://dx.doi.org/10.1109/iciea.2010.5516644.
Full text"Threshold Based LSB Audio Steganography." In International Conference on Chemical Engineering and Advanced Computational Technologies. International Institute of Engineers, 2014. http://dx.doi.org/10.15242/iie.e1114031.
Full textV K, Pallavi, R. Trupthi, Varnitha G, and Keerthan Kumar T G. "Improvised Threshold Based Task Scheduling." In 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2021. http://dx.doi.org/10.1109/icesc51422.2021.9532666.
Full textReports on the topic "Threshold-based"
Malloy, Kevin. Ultralow Threshold Semiconductor Lasers Based on Gain without Inversion. Fort Belvoir, VA: Defense Technical Information Center, September 1999. http://dx.doi.org/10.21236/ada412265.
Full textFricker, Jr, Banschbach Ronald D., and David. Optimizing Biosurveillance Systems that Use Threshold-based Event Detection Methods. Fort Belvoir, VA: Defense Technical Information Center, June 2009. http://dx.doi.org/10.21236/ada512279.
Full textChang, MoonJeong, Ing-Ray Chen, Fenye Bao, and Jin-Hee Cho. Trust-Threshold Based Routing in Mobile Ad Hoc Delay Tolerant Networks. Fort Belvoir, VA: Defense Technical Information Center, February 2011. http://dx.doi.org/10.21236/ada536897.
Full textDillender, Marcus. The Effect of Health Insurance on Workers' Compensation Filing: Evidence from the Affordable Care Act's Age-Based Threshold for Dependent Coverage. W.E. Upjohn Institute, July 2015. http://dx.doi.org/10.17848/wp15-232.
Full textYoung, Craig. Problematic plant monitoring in Hopewell Culture National Historical Park: 2008–2019. Edited by Tani Hubbard. National Park Service, July 2021. http://dx.doi.org/10.36967/nrr-2286658.
Full textYoung, Craig. Problematic plant monitoring in Lincoln Boyhood National Memorial: 2006–2019. Edited by Tani Hubbard. National Park Service, July 2021. http://dx.doi.org/10.36967/nrr-2286660.
Full textYoung, Craig. Problematic plant monitoring in Arkansas Post National Memorial: 2006–2019. Edited by Tani Hubbard. National Park Service, July 2021. http://dx.doi.org/10.36967/nrr-2286657.
Full textSchulz, Florian, Jörg Wolstein, and Henriette Engelhardt-Wölfler. The choice of indicators influences conclusions about the educational gradient of sex-specific alcohol consumption. OPUS, 2019. http://dx.doi.org/10.20378/irbo-55267.
Full textLi, Howell, Tom Platte, Jijo K. Mathew, W. Benjamin Smith, Enrique Saldivar-Carranza, and Darcy M. Bullock. Using Connected Vehicle Data to Reassess Dilemma Zone Performance of Heavy Vehicles. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317321.
Full textDowning, W. Logan, Howell Li, William T. Morgan, Cassandra McKee, and Darcy M. Bullock. Using Probe Data Analytics for Assessing Freeway Speed Reductions during Rain Events. Purdue University, 2021. http://dx.doi.org/10.5703/1288284317350.
Full text