Academic literature on the topic 'Threshold-based'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threshold-based.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Threshold-based"

1

Poornima, B., Y. Ramadevi, and T. Sridevi. "Threshold Based Edge Detection Algorithm." International Journal of Engineering and Technology 3, no. 4 (2011): 400–403. http://dx.doi.org/10.7763/ijet.2011.v3.260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

TOSUN, A. "Threshold-based declustering." Information Sciences 177, no. 5 (March 1, 2007): 1309–31. http://dx.doi.org/10.1016/j.ins.2006.08.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mittal, Mamta, Rajendra Kumar Sharma, Varinder Pal Singh, and Raghvendra Kumar. "Adaptive Threshold Based Clustering." International Journal of Information System Modeling and Design 10, no. 1 (January 2019): 42–59. http://dx.doi.org/10.4018/ijismd.2019010103.

Full text
Abstract:
Partitioning-based clustering methods have various challenges especially user-defined parameters and sensitivity to initial seed selections. K-means is most popular partitioning based method while it is sensitive to outlier, generate non-overlap cluster and non-deterministic in nature due to its sensitivity to initial seed selection. These limitations are regarded as promising research directions. In this study, a deterministic approach which do not requires user defined parameters during clustering; can generate overlapped and non-overlapped clusters and detect outliers has been proposed. Here, a minimum support value has been adopted from association rule mining to improve the clustering results. Further, the improved approach has been analysed on artificial and real datasets. The results demonstrated that datasets are well clustered with this approach too and it achieved success to generate almost same number of clusters as present in real datasets.
APA, Harvard, Vancouver, ISO, and other styles
4

Gan, Xiao Ying, and Bin Liu. "Shamir Threshold Based Encryption." Applied Mechanics and Materials 52-54 (March 2011): 709–12. http://dx.doi.org/10.4028/www.scientific.net/amm.52-54.709.

Full text
Abstract:
This paper Shamir threshold scheme based on the protection of private keys, by constructing a Lagrange interpolating polynomial to achieve in the real environment using the key shared information systems, computation and communication in the case of less , the program can prevent the system key is lost, damaged, and from the enemy's attack, reduce the responsibility of the key holder, but also can reduce the success rate of an adversary to decipher the key. An example is the feasibility of the program.
APA, Harvard, Vancouver, ISO, and other styles
5

Boneva, Lena, Richard Harrison, and Matt Waldron. "Threshold-based forward guidance." Journal of Economic Dynamics and Control 90 (May 2018): 138–55. http://dx.doi.org/10.1016/j.jedc.2018.02.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Hai-Kun, Hong-Zhong Huang, Yan-Feng Li, and Yuan-Jian Yang. "Condition-Based Maintenance With Scheduling Threshold and Maintenance Threshold." IEEE Transactions on Reliability 65, no. 2 (June 2016): 513–24. http://dx.doi.org/10.1109/tr.2015.2487578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guo, Gencheng, and Mrinal Mandal. "On optimal threshold and structure in threshold system based detector." Signal Processing 92, no. 1 (January 2012): 170–78. http://dx.doi.org/10.1016/j.sigpro.2011.06.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gomide, F. A., and A. F. Rocha. "Neurofuzzy Components based on Threshold." IFAC Proceedings Volumes 25, no. 6 (May 1992): 131–36. http://dx.doi.org/10.1016/s1474-6670(17)50893-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jenila, A., and J. Joslin Iyda. "Threshold Based Human Face Detection." Procedia Engineering 38 (2012): 2748–53. http://dx.doi.org/10.1016/j.proeng.2012.06.321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nam, Sung Sik, Mohamed-Slim Alouini, Hong-Chuan Yang, and Khalid A. Qaraqe. "Threshold-based parallel multiuser scheduling." IEEE Transactions on Wireless Communications 8, no. 4 (April 2009): 2150–59. http://dx.doi.org/10.1109/twc.2009.080784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Threshold-based"

1

Zheng, Yexin. "Novel RTD-Based Threshold Logic Design and Verification." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/32011.

Full text
Abstract:
Innovative nano-scale devices have been developed to enhance future circuit design to overcome physical barriers hindering complementary metal-oxide semiconductor (CMOS) technology. Among the emerging nanodevices, resonant tunneling diodes (RTDs) have demonstrated promising electronic features due to their high speed switching capability and functional versatility. Great circuit functionality can be achieved through integrating heterostructure field-effect transistors (HFETs) in conjunction with RTDs to modulate effective negative differential resistance (NDR). However, RTDs are intrinsically suitable for implementing threshold logic rather than Boolean logic which has dominated CMOS technology in the past. To fully take advantage of such emerging nanotechnology, efficient design methodologies and design automation tools for threshold logic therefore become essential. In this thesis, we first propose novel programmable logic elements (PLEs) implemented in threshold gates (TGs) and multi-threshold threshold gates (MTTGs) by exploring RTD/ HFET monostable-bistable transition logic element (MOBILE) principles. Our three-input PLE can be configured through five control bits to realize all the three-variable logic functions, which is, to the best of our knowledge, the first single RTD-based structure that provides complete logic implementation. It is also a more efficient reconfigurable circuit element than a general look-up table which requires eight configuration bits for three-variable functions. We further extend the design concept to construct a more versatile four-input PLE. A comprehensive comparison of three- and four-input PLEs provides an insightful view of design tradeoffs between performance and area. We present the mathematical proof of PLE's logic completeness based on Shannon Expansion, as well as the HSPICE simulation results of the programmable and primitive RTD/HFET gates that we have designed. An efficient control bit generating algorithm is developed by using a special encoding scheme to implement any given logic function. In addition, we propose novel techniques of formulating a given threshold logic in conjunctive normal form (CNF) that facilitates efficient SAT-based equivalence checking for threshold logic networks. Three different strategies of CNF generation from threshold logic representations are implemented. Experimental results based on MCNC benchmarks are presented as a complete comparison. Our hybrid algorithm, which takes into account input symmetry as well as input weight order of threshold gates, can efficiently generate CNF formulas in terms of both SAT solving time and CNF generating time.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
2

Calota, Andra. "Reliability of spasticity measurement based on tonic stretch reflex threshold." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=111947.

Full text
Abstract:
Studies suggest that deficits in central regulation of stretch reflex thresholds (SRT) underlie both spasticity and other disorders of motor control. We investigated intra- and inter-evaluator reliability to quantify spasticity based on tonic SRT (TSRT) and the relationship between TSRT and Modified Ashworth Scale (MAS, clinical assessment of resistance to stretch). Spasticity was evaluated in 20 subjects with chronic stroke-related spasticity in two different days, by three evaluators. Twenty different velocity-dependent dynamic SRT (angle where biceps brachii EMG signal increased for a given velocity of stretch) were recorded. TSRT (excitability of motoneurons at 0°/sec) was then computed. Spasticity was also estimated with MAS. Reliability was moderately good for subjects with moderately high spasticity (intra--evaluator: 0.46 to 0.68, inter--evaluator: 0.53 to 0.68). There was no correlation between TSRT and MAS since they measure different phenomena. TSRT is a promising new measure of spasticity. Further improvements for its quantification are suggested.
APA, Harvard, Vancouver, ISO, and other styles
3

Haboush, W. S. "Adaptive task selection using threshold-based techniques in dynamic sensor networks." Thesis, University of Kent, 2008. https://kar.kent.ac.uk/24027/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kannamareddy, Aruna Sai. "Density and partition based clustering on massive threshold bounded data sets." Kansas State University, 2017. http://hdl.handle.net/2097/35467.

Full text
Abstract:
Master of Science
Department of Computing and Information Sciences
William H. Hsu
The project explores the possibility of increasing efficiency in the clusters formed out of massive data sets which are formed using threshold blocking algorithm. Clusters thus formed are denser and qualitative. Clusters that are formed out of individual clustering algorithms alone, do not necessarily eliminate outliers and the clusters generated can be complex, or improperly distributed over the data set. The threshold blocking algorithm, a current research paper from Michael Higgins of Statistics Department on other hand, in comparison with existing algorithms performs better in forming the dense and distinctive units with predefined threshold. Developing a hybridized algorithm by implementing the existing clustering algorithms to re-cluster these units thus formed is part of this project. Clustering on the seeds thus formed from threshold blocking Algorithm, eases the task of clustering to the existing algorithm by eliminating the overhead of worrying about the outliers. Also, the clusters thus generated are more representative of the whole. Also, since the threshold blocking algorithm is proven to be fast and efficient, we now can predict a lot more decisions from large data sets in less time. Predicting the similar songs from Million Song Data Set using such a hybridized algorithm is considered as the data set for the evaluation of this goal.
APA, Harvard, Vancouver, ISO, and other styles
5

Whiten, Darren M. (Darren Mark) 1977. "Threshold predictions based on an electro-anatomical model of the cochlear implant." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/87847.

Full text
Abstract:
Thesis (S.M. and Elec.E.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.
Includes bibliographical references (p. 135-141).
by Darren M. Whiten.
S.M.and Elec.E.
APA, Harvard, Vancouver, ISO, and other styles
6

Zou, Tao. "Non-Destructive Bridge Deck Condition Assessment with a Probability-Based Deterioration Threshold." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/49384.

Full text
Abstract:
Deterioration of bridge decks is an ongoing problem faced by transportation agencies across the country. In past decades, Non-Destructive Evaluation (NDE) techniques, capable of detecting various deteriorations types, e.g., cracking, delamination and reinforcing steel corrosion, have emerged. These techniques generate large amounts of data representing different underlying physics, (decibels for ground penetrating radar and volts for half-cell potential), making data interpretation and comparison difficult for bridge owners and practitioners. The deterioration threshold, or the transition between healthy and deteriorated areas, is essential in understanding NDE data. However, this threshold is determined empirically in former research and engineering practice. In the present research, a probability-based method is proposed to identify deterioration thresholds for specified confidence levels. NDE data measuring different underlying physics are transformed into a binary format by threshold values to compare and combine multiple NDE techniques for bridge deck assessment. The finite element method is also implemented to correlate bridge deck surface stresses with deteriorations measured by NDE techniques, and to study the causes on concrete bridge deck degradation. The general methodology developed in this study will be demonstrated on three bridges, i.e., Virginia, New Jersey and New York Pilot Bridges, which were studied under Federal Highway Administration (FHWA)'s Long-Term Bridge Performance (LTBP) Program.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
7

Dickinson, James Edwin. "A ground based gamma ray telescope of high sensitivity and low energy threshold." Thesis, Durham University, 1995. http://etheses.dur.ac.uk/5279/.

Full text
Abstract:
The subject of this thesis is ground based gamma ray astronomy using the atmospheric Cerenkov technique. Chapter 1 defines the gamma ray region of the electromagnetic spectrum, introduces celestial gamma rays as a component of the flux of energetic particles known as cosmic rays and considers the physical mechanisms by which celestial gamma rays may be produced and absorbed. The phenomenon of Cerenkov radiation, and Its production within the extensive air showers which result from the Interaction of energetic cosmic rays with the atmosphere. Is the subject of Chapter 2. Chapter 3 introduces the early Durham telescopes, and considers the possible improvement to instrument sensitivity afforded by invokatlon of more sophisticated background rejection strategies. The Mk.5 telescope, which is the subject of Chapter 4, Is the vehicle by which the Durham group has sought to assess the relative merits of various signal enhancement strategies, and prove the viability of a design for a high resolution Imaging detector with the additional capacity to make observations at very low energies; the Mk.6 telescope. Chapter 5 introduces a novel concept of background rejection based upon the stereoscopic Imaging of extensive air showers, and describes modifications to the Mk.3 necessary to provide a complement to the Mk.5 in this capacity. Chapter 6 presents the analysis of a burst of periodic gamma ray emission from AE Aquarii, which demonstrates the efficacy of the medium resolution 'mono' Imaging and stereoscopic imaging signal enhancement techniques employed by the Mk.5 and modified Mk.3 telescopes. The culmination of the evolution of the Durham telescopes is the Mk.6, described in Chapter 7. Its sensitivity is enhanced by high resolution imaging and the capacity to make observations at energies deficient in background events. Chapter 8 summarises the contemporary status of atmospheric Cerenkov astronomy.
APA, Harvard, Vancouver, ISO, and other styles
8

Hild, Kerstin [Verfasser]. "Femtosecond laser-based investigations of magnetic circular dichroism in near-threshold photoemission / Kerstin Hild." Mainz : Universitätsbibliothek der Johannes Gutenberg-Universität Mainz, 2011. http://d-nb.info/1221804103/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al, Tobi Amjad Mohamed. "Anomaly-based network intrusion detection enhancement by prediction threshold adaptation of binary classification models." Thesis, University of St Andrews, 2018. http://hdl.handle.net/10023/17050.

Full text
Abstract:
Network traffic exhibits a high level of variability over short periods of time. This variability impacts negatively on the performance (accuracy) of anomaly-based network Intrusion Detection Systems (IDS) that are built using predictive models in a batch-learning setup. This thesis investigates how adapting the discriminating threshold of model predictions, specifically to the evaluated traffic, improves the detection rates of these Intrusion Detection models. Specifically, this thesis studied the adaptability features of three well known Machine Learning algorithms: C5.0, Random Forest, and Support Vector Machine. The ability of these algorithms to adapt their prediction thresholds was assessed and analysed under different scenarios that simulated real world settings using the prospective sampling approach. A new dataset (STA2018) was generated for this thesis and used for the analysis. This thesis has demonstrated empirically the importance of threshold adaptation in improving the accuracy of detection models when training and evaluation (test) traffic have different statistical properties. Further investigation was undertaken to analyse the effects of feature selection and data balancing processes on a model's accuracy when evaluation traffic with different significant features were used. The effects of threshold adaptation on reducing the accuracy degradation of these models was statistically analysed. The results showed that, of the three compared algorithms, Random Forest was the most adaptable and had the highest detection rates. This thesis then extended the analysis to apply threshold adaptation on sampled traffic subsets, by using different sample sizes, sampling strategies and label error rates. This investigation showed the robustness of the Random Forest algorithm in identifying the best threshold. The Random Forest algorithm only needed a sample that was 0.05% of the original evaluation traffic to identify a discriminating threshold with an overall accuracy rate of nearly 90% of the optimal threshold.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Shiyuan. "Fatigue crack threshold and growth behaviour in a near fully-lamellar gamma based titanium aluminides." Thesis, University of Birmingham, 2015. http://etheses.bham.ac.uk//id/eprint/6347/.

Full text
Abstract:
Fatigue crack threshold (\(D\)K\(_{th}\)) and fatigue crack growth of a near fully-lamellar \(y\)-TiAl alloy (Ti-4522XD alloy) have been investigated in air at room temperature, 400, 650, 700 and 750 oC and at three R ratios (0.1, 0.5 and 0.8). Studies were carried out on both corner-cracked specimens and smooth specimens. A combination of a \(D\)K- increasing loading method and growing a crack from notch were applied throughout the tests. As a consequence of consistent material microstructure, use of standardized testing procedure and a sufficient number of tests, some trends in fatigue threshold and crack growth have been established, including: trends include: lack of dependence of (\(D\)K\(_{th}\)) values on test temperature; average (\(D\)K\(_{th}\)) values decrease with increasing R ratio; a strong dependence of crack growth rate on K\(_{max}\) values at RT; a reduced dependence of crack growth rate on K\(_{max}\) values and increased plasticity at elevated temperatures; crack blunting causes a reduction of fatigue crack growth rate at R=0.8 and at elevated temperatures; and little effect of test temperature on ‘fracture toughness’ values. Above all, the origins of naturally initiated cracks under cyclic loading are often found to be centered on up to four colonies which have failed by interlamellar fracture.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Threshold-based"

1

Drakopoulos, S. A. Threshold based demand and product market clearing. Aberdeen: University of Aberdeen. Department of Economics, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Threshold of love: Pauline family meditation : liturgical meditation based on St. Paul's hymn of love and rite of marraige. Bangalore: Asian Trading Corp., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lionel, S. Joseph. Threshold of love: Pauline family meditation : liturgical meditation based on St. Paul's hymn of love and rite of marraige. Bangalore: Asian Trading Corp., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Meador, James Parnell. Use of tissue and sediment based threshold concentrations of polychlorinated biphenyls (PCBs) to protect juvenile salmonids listed under the Endangered Species Act. [Seattle, Wash.]: U.S. Dept. of Commerce, National Oceanic and Atmospheric Administration, National Marine Fisheries Service, [Northwest Fisheries Science Center, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Netherlands. Werkgroep van Deskundigen ter Vaststelling van MAC-Waarden. Health-based recommended occupational exposure limits for fluorcarbons (except FC11). Voorburg, The Netherlands: Directorate-General of Labour of the Ministry of Social Affairs and Employment, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

MAC-Waarden, Netherlands Werkgroep van Deskundigen ter Vaststelling van. Health-based recommended occupational exposure limits for 1,3 butadiene. Den Haag: Ministerie van Sociale Zaken en Werkgelegenheid, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Netherlands. Werkgroep van Deskundigen ter Vaststelling van MAC-Waarden. Health-based recommended occupational exposure limits for ethyl acrylate. Den Haag: Ministerie van Sociale Zaken en Werkgelegenheid, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Netherlands. Werkgroep van Deskundigen ter Vaststelling van MAC-Waarden. Health-based recommended occupational exposure limits for amyl acetate. Den Haag: Ministerie van Sociale Zaken en Werkgelegenheid, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Netherlands. Werkgroep van Deskundigen ter Vaststelling van MAC-Waarden. Health-based recommended occupational exposure limit for methyl ethyl ketone. Den Haag: Ministerie van Sociale Zaken en Werkgelegenheid, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Netherlands. Werkgroep van Deskundigen ter Vaststelling van MAC-Waarden. Health-based recommended occupational exposure limits for ethyl methanesulphonate (EMS), methyl methanesulphonate (MMS). Voorburg, The Nederlands: Directorate-General of Labour, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Threshold-based"

1

Gagné, Martin, Shivaramakrishnan Narayan, and Reihaneh Safavi-Naini. "Threshold Attribute-Based Signcryption." In Lecture Notes in Computer Science, 154–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15317-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Blachnik, Marcin, and Włodzisław Duch. "Prototype-Based Threshold Rules." In Neural Information Processing, 1028–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11893295_113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Baek, Joonsang, and Yuliang Zheng. "Identity-Based Threshold Decryption." In Public Key Cryptography – PKC 2004, 262–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24632-9_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mohammadi, Leila, and Sara van de Geer. "On threshold-based classification rules." In Institute of Mathematical Statistics Lecture Notes - Monograph Series, 261–80. Beachwood, OH: Institute of Mathematical Statistics, 2003. http://dx.doi.org/10.1214/lnms/1215091942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Katz, Jonathan, and Moti Yung. "Threshold Cryptosystems Based on Factoring." In Lecture Notes in Computer Science, 192–205. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36178-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chow, Sherman S. M., Lucas C. K. Hui, and S. M. Yiu. "Identity Based Threshold Ring Signature." In Lecture Notes in Computer Science, 218–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496618_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohammadi, Leila, and Sara van de Geer. "On threshold-based classification rules." In Institute of Mathematical Statistics Lecture Notes - Monograph Series, 261–80. Beachwood, OH: Institute of Mathematical Statistics, 2003. http://dx.doi.org/10.1214/lnms/1215091942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kipouridis, Evangelos, Paul G. Spirakis, and Kostas Tsichlas. "Threshold-Based Network Structural Dynamics." In Structural Information and Communication Complexity, 127–45. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79527-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

He, Xin, and Mei-Ling Ting Lee. "First-Hitting-Time Based Threshold Regression." In International Encyclopedia of Statistical Science, 523–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-04898-2_252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tosun, Ali Şaman. "Threshold Based Declustering in High Dimensions." In Lecture Notes in Computer Science, 818–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11546924_80.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Threshold-based"

1

Shuai Wan, Fuzheng Yang, and Mingyi He. "Gradient-threshold Edge Detection based on Perceptually Adaptive Threshold Selection." In 2008 3rd IEEE Conference on Industrial Electronics and Applications. IEEE, 2008. http://dx.doi.org/10.1109/iciea.2008.4582665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Parolari, P., L. Marazzi, M. Connen, and M. Martinelli. "SOA based all-optical threshold." In Conference on Lasers and Electro-Optics (CLEO 2000). Technical Digest. Postconference Edition. TOPS Vol.39. IEEE, 2000. http://dx.doi.org/10.1109/cleo.2000.907050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ali-Yahiya, Tara, Hakima Chaouchi, Andre-Luc Beylot, and Guy Pujolle. "Threshold based WiMax resource reservation." In the 3rd international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1292331.1292376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, You, Yian Zhou, and Shigang Chen. "Threshold-Based Widespread Event Detection." In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2019. http://dx.doi.org/10.1109/icdcs.2019.00047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Karypis, George, and Vipin Kumar. "Parallel threshold-based ILU factorization." In the 1997 ACM/IEEE conference. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/509593.509621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pan, Xiaoying, and Xinfu Chen. "Subsquarewise Threshold Based Image Denoising." In 2009 2nd International Congress on Image and Signal Processing (CISP). IEEE, 2009. http://dx.doi.org/10.1109/cisp.2009.5303620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nam, Sung Sik, Mohamed-Slim Alouini, Khalid A. Qaraqe, and Hong-Chuan Yang. "Threshold-based Parallel Multiuser Scheduling." In 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yao, W., and S. Rahardja. "Dynamic threshold based keyframe detection." In 2010 5th IEEE Conference on Industrial Electronics and Applications (ICIEA). IEEE, 2010. http://dx.doi.org/10.1109/iciea.2010.5516644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Threshold Based LSB Audio Steganography." In International Conference on Chemical Engineering and Advanced Computational Technologies. International Institute of Engineers, 2014. http://dx.doi.org/10.15242/iie.e1114031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

V K, Pallavi, R. Trupthi, Varnitha G, and Keerthan Kumar T G. "Improvised Threshold Based Task Scheduling." In 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2021. http://dx.doi.org/10.1109/icesc51422.2021.9532666.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Threshold-based"

1

Malloy, Kevin. Ultralow Threshold Semiconductor Lasers Based on Gain without Inversion. Fort Belvoir, VA: Defense Technical Information Center, September 1999. http://dx.doi.org/10.21236/ada412265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fricker, Jr, Banschbach Ronald D., and David. Optimizing Biosurveillance Systems that Use Threshold-based Event Detection Methods. Fort Belvoir, VA: Defense Technical Information Center, June 2009. http://dx.doi.org/10.21236/ada512279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chang, MoonJeong, Ing-Ray Chen, Fenye Bao, and Jin-Hee Cho. Trust-Threshold Based Routing in Mobile Ad Hoc Delay Tolerant Networks. Fort Belvoir, VA: Defense Technical Information Center, February 2011. http://dx.doi.org/10.21236/ada536897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dillender, Marcus. The Effect of Health Insurance on Workers' Compensation Filing: Evidence from the Affordable Care Act's Age-Based Threshold for Dependent Coverage. W.E. Upjohn Institute, July 2015. http://dx.doi.org/10.17848/wp15-232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Young, Craig. Problematic plant monitoring in Hopewell Culture National Historical Park: 2008–2019. Edited by Tani Hubbard. National Park Service, July 2021. http://dx.doi.org/10.36967/nrr-2286658.

Full text
Abstract:
Managers are challenged with the impact of problematic plants, including exotic, invasive, and pest plant species. Information on the cover and frequency of these plants is essential for developing risk-based approaches to managing these species. Based on surveys conducted in 2008, 2011, 2015, and 2019, Heartland Network staff and contractors identified a cumulative total of 51 potentially problematic plant species in Hopewell Culture National Historical Park. Of the 37 species found in 2019, we characterized 7 as very low frequency, 9 as low frequency, 17 as medium frequency, and 4 as high frequency. Of these, midpoint cover estimates of 2 medium frequency and 2 high frequency species exceeded the 10-acre threshold. Because of the number, extent, and cover of problematic plants in the park and the small park size, control efforts should focus on treating high priority species across the entire park. High priority species may include plant species capable of rapid spread, species at low population levels, and species which can effectively be controlled.
APA, Harvard, Vancouver, ISO, and other styles
6

Young, Craig. Problematic plant monitoring in Lincoln Boyhood National Memorial: 2006–2019. Edited by Tani Hubbard. National Park Service, July 2021. http://dx.doi.org/10.36967/nrr-2286660.

Full text
Abstract:
Managers are challenged with the impact of problematic plants, including exotic, invasive, and pest plant species. Information on the cover, distribution, and location of these plants is essential for developing risk-based approaches to managing these species. Based on surveys conducted in 2006, 2011, 2015, and 2019, Heartland Network staff and contractors identified a cumulative total of 45 potentially problematic plant taxa in Lincoln Boyhood National Memorial. Of the 34 species found in 2019, we characterized 4 as very low frequency, 14 as low frequency, 9 as medium frequency, and 7 as high frequency. A single species exceeded a 10-acre threshold based on a mid-point estimate. Because of the number of problematic plant taxa, as well as the extent and cover of problematic plants in the park and the small park size, control efforts should focus on treating high priority species across the entire park. High priority species may include plant species capable of rapid spread, species at low population levels, and species which can effectively be controlled.
APA, Harvard, Vancouver, ISO, and other styles
7

Young, Craig. Problematic plant monitoring in Arkansas Post National Memorial: 2006–2019. Edited by Tani Hubbard. National Park Service, July 2021. http://dx.doi.org/10.36967/nrr-2286657.

Full text
Abstract:
Managers are challenged with the impact of problematic plants, including exotic, invasive, and pest plant species. Information on the cover, distribution, and location of these plants is essential for developing risk-based approaches to managing these species. Based on surveys conducted in 2006, 2011, 2015, and 2019, Heartland Network staff and contractors identified a cumulative total of 28 potentially problematic plant taxa in Arkansas Post National Memorial. Of the 23 species found in 2019, we characterized 9 as very low frequency, 7 as low frequency, 5 as medium frequency, and 2 as high frequency. Cover of all species was low with a single species slightly exceeding a 1-acre threshold based on a midpoint estimate. Efforts to control the woody invasive black locust, Chinese privet, and hardy orange appear to have successfully reduced the cover of these plants across the Memorial Unit. Japanese stiltgrass may have been increasing as recently as 2015, but a combination of recent flooding and control efforts may have stemmed the spread of this invasive grass. Efforts to control localized patches of Chinaberry tree also appear to have reduced the cover of this species. Outside of the problematic species currently subject
APA, Harvard, Vancouver, ISO, and other styles
8

Schulz, Florian, Jörg Wolstein, and Henriette Engelhardt-Wölfler. The choice of indicators influences conclusions about the educational gradient of sex-specific alcohol consumption. OPUS, 2019. http://dx.doi.org/10.20378/irbo-55267.

Full text
Abstract:
There has been considerable public interest in reports on harmful alcohol consumption of higher educated females. This study assesses the robustness of this finding with representative German data using ten different indicators of alcohol consumption. This cross-sectional study used data of the Epidemiological Survey on Substance Abuse from 2012. 4,225 females and 3,239 males represent the German population aged 18–64. It presents ten indicators of alcohol consumption by sex and education and provides group specific means and 95 %-confidence intervals. The main results are: (1) Higher educated males and females are drinking alcohol more frequently than lower educated males and females. (2) When drinking, higher educated males and females tend to drink less alcohol than lower educated males and females. (3) Only when using an indicator for hazardous alcohol consumption with different thresholds for males and females, the results indicate a pattern that significantly exposes hazardous alcohol consumption in the group of higher educated females. Concerning the choice of indicators, this study shows that sex-specific threshold-based indicators of alcohol consumption may lead to different conclusions as the majority of other indicators.
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Howell, Tom Platte, Jijo K. Mathew, W. Benjamin Smith, Enrique Saldivar-Carranza, and Darcy M. Bullock. Using Connected Vehicle Data to Reassess Dilemma Zone Performance of Heavy Vehicles. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317321.

Full text
Abstract:
The rate of fatalities at signalized intersections involving heavy vehicles is nearly five times higher than for passenger vehicles in the US. Previous studies in the US have found that heavy vehicles are twice as likely to violate a red light compared with passenger vehicles. Current technologies leverage setback detection to extend green time for a particular phase and are based upon typical deceleration rates for passenger cars. Furthermore, dilemma zone detectors are not effective when the max out time expires and forces the onset of yellow. This study proposes the use of connected vehicle (CV) technology to trigger force gap out (FGO) before a vehicle is expected to arrive within the dilemma zone limit at max out time. The method leverages position data from basic safety messages (BSMs) to map-match virtual waypoints located up to 1,050 ft in advance of the stop bar. For a 55 mph approach, field tests determined that using a 6 ft waypoint radius at 50 ft spacings would be sufficient to match 95% of BSM data within a 5% lag threshold of 0.59 s. The study estimates that FGOs reduce dilemma zone incursions by 34% for one approach and had no impact for the other. For both approaches, the total dilemma zone incursions decreased from 310 to 225. Although virtual waypoints were used for evaluating FGO, the study concludes by recommending that trajectory-based processing logic be incorporated into controllers for more robust support of dilemma zone and other emerging CV applications.
APA, Harvard, Vancouver, ISO, and other styles
10

Downing, W. Logan, Howell Li, William T. Morgan, Cassandra McKee, and Darcy M. Bullock. Using Probe Data Analytics for Assessing Freeway Speed Reductions during Rain Events. Purdue University, 2021. http://dx.doi.org/10.5703/1288284317350.

Full text
Abstract:
Rain impacts roadways such as wet pavement, standing water, decreased visibility, and wind gusts and can lead to hazardous driving conditions. This study investigates the use of high fidelity Doppler data at 1 km spatial and 2-minute temporal resolution in combination with commercial probe speed data on freeways. Segment-based space-mean speeds were used and drops in speeds during rainfall events of 5.5 mm/hour or greater over a one-month period on a section of four to six-lane interstate were assessed. Speed reductions were evaluated as a time series over a 1-hour window with the rain data. Three interpolation methods for estimating rainfall rates were tested and seven metrics were developed for the analysis. The study found sharp drops in speed of more than 40 mph occurred at estimated rainfall rates of 30 mm/hour or greater, but the drops did not become more severe beyond this threshold. The average time of first detected rainfall to impacting speeds was 17 minutes. The bilinear method detected the greatest number of events during the 1-month period, with the most conservative rate of predicted rainfall. The range of rainfall intensities were estimated between 7.5 to 106 mm/hour for the 39 events. This range was much greater than the heavy rainfall categorization at 16 mm/hour in previous studies reported in the literature. The bilinear interpolation method for Doppler data is recommended because it detected the greatest number of events and had the longest rain duration and lowest estimated maximum rainfall out of three methods tested, suggesting the method balanced awareness of the weather conditions around the roadway with isolated, localized rain intensities.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography