Browsing by Title
Now showing items 1571-1590 of 3349
-
Mach-Zehnder interferometer fringe projector for variable resolution video moire
(1998-12-29)A Mach-Zehnder based variable resolution fringe projection system has been built for 3-D video moini machine vision. This system uses the three main advantages of the Mach-Zehnder - 1) There is no optical feedback to the ... -
A machine learning approach to anomaly detection
(2003-03-29) -
A machine learning approach to detecting attacks by identifying anomalies in network traffic
(2003-05-15)The current approach to detecting novel attacks in network traffic is to model the normal frequency of session IP addresses and server port usage and to signal unusual combinations of these attributes as suspicious. We ... -
A Machine Learning Approach to Forecasting SEP Events with Solar Activities
(2020-12)Solar energetic particles (SEPs) are fast-moving events which can cause severe damage to astronauts and their equipment, and can disrupt communications on Earth. There are no clear patterns in solar activities which indicate ... -
Machine Learning Approach To Predict Mortality Rates Based On Hospital Clinical Data
(2021-05)This thesis integrates fundamental concepts from conventional statistics with the more explanatory, algorithmic, and computational techniques offered by machine learning to predict early mortality risk of surgical patients. ... -
Machine Learning for Classifying Malware in Closed-set and Open-set Scenarios
(2018-04)Anti-malware vendors regularly receive large amount of suspected malware files to be examined. However, the sheer number of files makes manual analysis time-consuming. Therefore, it is important to automate this process. ... -
Machine learning for computer security
(2006-12)The prevalent use of computers and internet has enhanced the quality of life for many people, but it has also attracted undesired attempts to undermine these systems. This special topic contains several research studies ... -
Machine learning for host-based anomaly detection
(2008-04-23)Anomaly detection techniques complement signature based methods for intrusion detection. Machine learning approaches are applied to anomaly detection for automated learning and detection. Traditional host-based anomaly ... -
Machine Learning in the State Design Pattern
(2019-12)As the Internet of Things revolution continues to become more prevalent in humanity's daily routine, securing these devices is paramount. Society has seen a substantial increase in activity in the cyber-warfare battle ... -
Machine Learning Models on Prognostic Outcome Prediction for Cancer Images with Multiple Modalities
(2019-12)Machine learning algorithms have been applied to predict different prognostic outcomes for many different diseases by directly using medical images. However, the higher resolution in various types of medical imaging ... -
A Machine Learning-Based Approach to Predict and Optimize the Performance of Zero Energy Building (ZEB): A Case Study for Florida
(2021-12)Machine learning is currently one of the most searched fields aiming to solve real-life problems. Building simulation software tools help engineers estimate building energy behaviors before the actual construction, ... -
Magnetic cloud boundary layer of 9 November 2004 and its associated space weather effects
(2010-10)On 9 November 2004, the WIND spacecraft detected a magnetic cloud boundary layer (MCBL) during the interval from 19:07 UT to 20:30 UT. Within the MCBL, there is intense southward magnetic field and the dynamic pressure is ... -
The magnetic field induced by a lightning strike's indirect effect double exponential current waveform
(2010)Abstract Problem statement: Develop a new formula which describes the magnetic field induced by a lightning strike's indirect effect double exponential current waveform. Approach: A novel approach for developing a closed-form ... -
The magnetic field induced by a lightning strike's indirect effect double exponential current waveform
(2010)Problem statement: Develop a new formula which describes the magnetic field induced by a lightning strike's indirect effect double exponential current waveform. Approach: A novel approach for developing a closed-form ... -
The Magnetic Field of Theta1 Orionis C
θ1 Orionis C is an O type star found in the Orion Nebula. An O type star on the main sequence is 15 to 90 times more massive than the sun, and has a surface temperature between 30,000 and 50,000 K. These massive stars were ... -
Magnetic massive stars as progenitors of 'heavy' stellar-mass black holes
(2016-12-02)The groundbreaking detection of gravitational waves produced by the inspiralling and coalescence of the black hole (BH) binary GW150914 confirms the existence of 'heavy' stellar-mass BHs with masses > 25 M⊙. Initial ... -
Maintenance and Improvement of the Florida Public Hurricane Loss Model
(2016-12)The Florida Public Hurricane Loss Model (FPHLM) predicts insurance losses due to hurricane events. This thesis describes maintenance tasks of the vulnerability component of the FPHLM. First, it explores the applicability ... -
Maintenance in Single-Server Queues: A Game-Theoretic Approach
(2009)We use antagonistic stochastic games and fluctuation analysis to examine a single-server queue with bulk input and secondary work during server's multiple vacations. When the buffer contents become exhausted the server ... -
The Making of the Modern Airport Executive: Causal Connections Among Key Attributes in Career Development, Compromise, and Satisfaction in Airport Management
(2004-05)The purpose of this study was to identify specific career development attributes of contemporary senior-level airport executives and to evaluate the relationship of these attributes to the level of satisfaction airport ...