Journal articles on the topic 'Threshold-based'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Threshold-based.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Poornima, B., Y. Ramadevi, and T. Sridevi. "Threshold Based Edge Detection Algorithm." International Journal of Engineering and Technology 3, no. 4 (2011): 400–403. http://dx.doi.org/10.7763/ijet.2011.v3.260.
Full textTOSUN, A. "Threshold-based declustering." Information Sciences 177, no. 5 (March 1, 2007): 1309–31. http://dx.doi.org/10.1016/j.ins.2006.08.011.
Full textMittal, Mamta, Rajendra Kumar Sharma, Varinder Pal Singh, and Raghvendra Kumar. "Adaptive Threshold Based Clustering." International Journal of Information System Modeling and Design 10, no. 1 (January 2019): 42–59. http://dx.doi.org/10.4018/ijismd.2019010103.
Full textGan, Xiao Ying, and Bin Liu. "Shamir Threshold Based Encryption." Applied Mechanics and Materials 52-54 (March 2011): 709–12. http://dx.doi.org/10.4028/www.scientific.net/amm.52-54.709.
Full textBoneva, Lena, Richard Harrison, and Matt Waldron. "Threshold-based forward guidance." Journal of Economic Dynamics and Control 90 (May 2018): 138–55. http://dx.doi.org/10.1016/j.jedc.2018.02.003.
Full textWang, Hai-Kun, Hong-Zhong Huang, Yan-Feng Li, and Yuan-Jian Yang. "Condition-Based Maintenance With Scheduling Threshold and Maintenance Threshold." IEEE Transactions on Reliability 65, no. 2 (June 2016): 513–24. http://dx.doi.org/10.1109/tr.2015.2487578.
Full textGuo, Gencheng, and Mrinal Mandal. "On optimal threshold and structure in threshold system based detector." Signal Processing 92, no. 1 (January 2012): 170–78. http://dx.doi.org/10.1016/j.sigpro.2011.06.016.
Full textGomide, F. A., and A. F. Rocha. "Neurofuzzy Components based on Threshold." IFAC Proceedings Volumes 25, no. 6 (May 1992): 131–36. http://dx.doi.org/10.1016/s1474-6670(17)50893-9.
Full textJenila, A., and J. Joslin Iyda. "Threshold Based Human Face Detection." Procedia Engineering 38 (2012): 2748–53. http://dx.doi.org/10.1016/j.proeng.2012.06.321.
Full textNam, Sung Sik, Mohamed-Slim Alouini, Hong-Chuan Yang, and Khalid A. Qaraqe. "Threshold-based parallel multiuser scheduling." IEEE Transactions on Wireless Communications 8, no. 4 (April 2009): 2150–59. http://dx.doi.org/10.1109/twc.2009.080784.
Full textRuddell, Benjamin. "Threshold Based Footprints (for Water)." Water 10, no. 8 (August 3, 2018): 1029. http://dx.doi.org/10.3390/w10081029.
Full textKara, Ferdi, and Hakan Kaya. "Threshold-Based Selective Cooperative-NOMA." IEEE Communications Letters 23, no. 7 (July 2019): 1263–66. http://dx.doi.org/10.1109/lcomm.2019.2914918.
Full textSwartz, Conrad M., and Nikolaus Michael. "Age-Based Seizure Threshold Determination." Journal of ECT 29, no. 1 (March 2013): 18–20. http://dx.doi.org/10.1097/yct.0b013e3182656e5d.
Full textVerma, Chanchal. "Dynamic Threshold MOSFET Based Comparators." International Journal for Research in Applied Science and Engineering Technology 9, no. 4 (April 30, 2021): 292–99. http://dx.doi.org/10.22214/ijraset.2021.33594.
Full textShen, Zhong-hua, and Xiu-yuan Yu. "Threshold signature scheme with threshold verification based on multivariate linear polynomial." Journal of Shanghai Jiaotong University (Science) 16, no. 5 (October 2011): 551–56. http://dx.doi.org/10.1007/s12204-011-1186-4.
Full textLee, Sang Il, and Seong Joon Yoo. "Threshold-based portfolio: the role of the threshold and its applications." Journal of Supercomputing 76, no. 10 (September 14, 2018): 8040–57. http://dx.doi.org/10.1007/s11227-018-2577-1.
Full textTarhini, Ghinwa M., and Reda Shbib. "Detection of Brain Tumor in MRI Images Using Watershed and Threshold-Based Segmentation." International Journal of Signal Processing Systems 8, no. 1 (March 2020): 19–25. http://dx.doi.org/10.18178/ijsps.8.1.19-25.
Full textKwon, Soon-H. "Entropy and AMBE-based Threshold Selection." Journal of Korean Institute of Intelligent Systems 21, no. 3 (June 25, 2011): 347–52. http://dx.doi.org/10.5391/jkiis.2011.21.3.347.
Full textPeeters, Roel, Dave Singelée, and Bart Preneel. "Threshold-Based Location-Aware Access Control." International Journal of Handheld Computing Research 2, no. 3 (July 2011): 22–37. http://dx.doi.org/10.4018/jhcr.2011070102.
Full textZimmer, Mary Ann. "Threshold Concepts in Problem-based Learning." Wabash Center Journal on Teaching 1, no. 2 (April 15, 2020): 113. http://dx.doi.org/10.31046/wabashcenter.v1i2.1732.
Full textHuixian, Li, Gao Jin, Wang Lingyun, and Pang Liaojun2. "MPKC-based Threshold Proxy Signcryption Scheme." International Arab Journal of Information Technology 17, no. 2 (February 28, 2019): 196–206. http://dx.doi.org/10.34028/iajit/17/2/7.
Full textRathore, Neeraj. "Dynamic Threshold Based Load Balancing Algorithms." Wireless Personal Communications 91, no. 1 (July 4, 2016): 151–85. http://dx.doi.org/10.1007/s11277-016-3452-0.
Full textKwon, Soon H. "Threshold selection based on cluster analysis." Pattern Recognition Letters 25, no. 9 (July 2004): 1045–50. http://dx.doi.org/10.1016/j.patrec.2004.03.001.
Full textZhou, Yan. "Block-based threshold modulation error diffusion." Journal of Electronic Imaging 20, no. 1 (January 1, 2011): 013018. http://dx.doi.org/10.1117/1.3555132.
Full textRAVI, V., MA BIN, and P. RAVI KUMAR. "THRESHOLD ACCEPTING BASED FUZZY CLUSTERING ALGORITHMS." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 14, no. 05 (October 2006): 617–32. http://dx.doi.org/10.1142/s0218488506004229.
Full textDai, Y., D. T. Comer, D. J. Comer, and C. S. Petrie. "Threshold voltage based CMOS voltage reference." IEE Proceedings - Circuits, Devices and Systems 151, no. 1 (2004): 58. http://dx.doi.org/10.1049/ip-cds:20040217.
Full textGhenzi, N., M. Barella, D. Rubi, and C. Acha. "Adaptive threshold in TiO2-based synapses." Journal of Physics D: Applied Physics 52, no. 12 (January 25, 2019): 125401. http://dx.doi.org/10.1088/1361-6463/aafdf3.
Full textChandra De, Utpal, Madhabananda Das, Debashis Mishra, and Debashis Mishra. "Threshold based brain tumor image segmentation." International Journal of Engineering & Technology 7, no. 3 (August 22, 2018): 1801. http://dx.doi.org/10.14419/ijet.v7i3.12425.
Full textCornwell, Donald. "Space-Based Laser Communications Break Threshold." Optics and Photonics News 27, no. 5 (May 1, 2016): 24. http://dx.doi.org/10.1364/opn.27.5.000024.
Full textZhang, L., P. Bao, and Q. Pan. "Threshold analysis in wavelet-based denoising." Electronics Letters 37, no. 24 (2001): 1485. http://dx.doi.org/10.1049/el:20010971.
Full textGolubchik, Leana, and John C. S. Lui. "Open problems for threshold-based systems." ACM SIGMETRICS Performance Evaluation Review 28, no. 4 (March 2001): 6–8. http://dx.doi.org/10.1145/544397.544400.
Full textLi, Qingjian, Yan Liang, Zhenzhou Lu, and Guangyi Wang. "Threshold‐type memristor‐based memory circuit." International Journal of Circuit Theory and Applications 49, no. 5 (March 15, 2021): 1515–31. http://dx.doi.org/10.1002/cta.2976.
Full textWang, Yan Qing, Lu Lu Zhuang, and Chao Xia Shi. "Construction Research on Multi-Threshold Segmentation Based on Improved Otsu Threshold Method." Advanced Materials Research 1046 (October 2014): 425–28. http://dx.doi.org/10.4028/www.scientific.net/amr.1046.425.
Full textNi, Wei Chuan, Bai Hui Zhu, and Zhi Ping Wan. "A De-Nosing Algorithm of Wavelet Threshold Based on Efficient Threshold Function." Advanced Materials Research 709 (June 2013): 624–27. http://dx.doi.org/10.4028/www.scientific.net/amr.709.624.
Full textSoni, Ankit Kumar, and Prof Madhuvan Dixit. "Study of Energy Efficient Images with Just Noticeable Difference Threshold Based on Feature Transform." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 924–27. http://dx.doi.org/10.31142/ijtsrd23215.
Full textLi, Jiajia, Botao Wang, Guoren Wang, and Yifei Zhang. "Probabilistic threshold query optimization based on threshold classification using ELM for uncertain data." Neurocomputing 174 (January 2016): 211–19. http://dx.doi.org/10.1016/j.neucom.2015.05.122.
Full textPettenghi, Hector, María J. Avedillo, and José M. Quintana. "Using multi-threshold threshold gates in RTD-based logic design: A case study." Microelectronics Journal 39, no. 2 (February 2008): 241–47. http://dx.doi.org/10.1016/j.mejo.2007.05.015.
Full textTalukder, Ashis, Md Golam Rabiul Alam, Nguyen H. Tran, Dusit Niyato, Gwan Hoon Park, and Choong Seon Hong. "Threshold Estimation Models for Linear Threshold-Based Influential User Mining in Social Networks." IEEE Access 7 (2019): 105441–61. http://dx.doi.org/10.1109/access.2019.2931925.
Full textHan, Joon‐Kyu, Mun‐Woo Lee, Ji‐Man Yu, and Yang‐Kyu Choi. "A Single Transistor‐Based Threshold Switch for a Bio‐Inspired Reconfigurable Threshold Logic." Advanced Electronic Materials 7, no. 5 (March 30, 2021): 2100117. http://dx.doi.org/10.1002/aelm.202100117.
Full textBerlin, K., and A. Padmapriya. "Performance Analysis of Threshold based Image Encryption." International Journal of Computer Applications 99, no. 12 (August 20, 2014): 30–33. http://dx.doi.org/10.5120/17428-8321.
Full textGarg, Rachit, Maitreyee Dutta, and Ramteke Mamta G. "Threshold based Approach for Image Blind Deconvolution." International Journal of Computer Applications 101, no. 6 (September 18, 2014): 37–42. http://dx.doi.org/10.5120/17694-8665.
Full textZhang, Zhi-Hua, Si-Rong Zhang, Wen-Jin Yu, Jian-Jun Li, Bei Gong, and Wei Jiang. "A Threshold Signature Scheme Based on TPM." International Journal of Communications, Network and System Sciences 04, no. 10 (2011): 622–25. http://dx.doi.org/10.4236/ijcns.2011.410075.
Full textChien, Hung‐Yu, Jinn‐Ke Jan, and Yuh‐Min Tseng. "Partially Blind Threshold Signature Based on RSA." Informatica 14, no. 2 (January 1, 2003): 155–66. http://dx.doi.org/10.15388/informatica.2003.011.
Full textZhang, Guo-yin, Xiao-jing Fu, and Chun-guang Ma. "A Dynamic Threshold Attributes-based Signcryption Scheme." Journal of Electronics & Information Technology 34, no. 11 (July 10, 2013): 2680–86. http://dx.doi.org/10.3724/sp.j.1146.2012.00342.
Full textErnawan, Ferda. "Robust Image Watermarking Based on Psychovisual Threshold." Journal of ICT Research and Applications 10, no. 3 (October 31, 2016): 228–42. http://dx.doi.org/10.5614/itbj.ict.res.appl.2016.10.3.3.
Full textZhang, Hua Wei, and Nan Li. "A Threshold-Based Improved Algorithm of PTS." Applied Mechanics and Materials 235 (November 2012): 53–57. http://dx.doi.org/10.4028/www.scientific.net/amm.235.53.
Full textHoffmann, Peter, Christoph Menz, and Arne Spekat. "Bias adjustment for threshold-based climate indicators." Advances in Science and Research 15 (June 8, 2018): 107–16. http://dx.doi.org/10.5194/asr-15-107-2018.
Full textZHANG, Yu-lei, Xiao-dong YANG, and Cai-fen WANG. "ID-based bidirectional threshold proxy re-signature." Journal of Computer Applications 31, no. 1 (March 21, 2011): 127–28. http://dx.doi.org/10.3724/sp.j.1087.2011.00127.
Full textEryilmaz, S. "Random threshold models based on multivariate observations." Journal of Statistical Planning and Inference 113, no. 2 (May 2003): 557–68. http://dx.doi.org/10.1016/s0378-3758(01)00319-6.
Full textChunli, Wang, Zhang Chunlei, and Zhang pengtu. "Denoising algorithm based on wavelet adaptive threshold." Physics Procedia 24 (2012): 678–85. http://dx.doi.org/10.1016/j.phpro.2012.02.100.
Full text