Now showing items 236-255 of 598

• Keep up or drown: adjustment of western Pacific coral reefs to sea-level rise in the 21st century ﻿

(2015-07-22)
Since the Mid-Holocene, some 5000 years ago, coral reefs in the Pacific Ocean have been vertically constrained by sea level. Contemporary sea-level rise is releasing these constraints, providing accommodation space for ...
• The Kepler Light Curve of V344 Lyrae: Constraining the Thermal-viscous Limit Cycle Instability ﻿

(2010-11-29)
We present time-dependent modeling based on the accretion disk limit cycle model for a 270 d light curve of the short-period SU UMa-type dwarf nova V344 Lyr taken by Kepler. The unprecedented precision and cadence (1 minute) ...
• The Kepler Light Curves of V1504 Cygni and V344 Lyrae: A Study of the Outburst Properties ﻿

(2012-02-23)
We examine the Kepler light curves of V1504 Cyg and V344 Lyr, encompassing ~736 days at one-minute cadence. During this span each system exhibited ~64–65 outbursts, including 6 superoutbursts. We find that, in both systems, ...
• Keyword spotting using normalization of posterior probability confidence measures ﻿

(2005-04-09)
Keyword spotting techniques deal with recognition of predefined vocabulary keywords from a voice stream. This research uses HMM based keyword spotting algorithms for this purpose. The three most important components of a ...
• King Park Indicator ﻿

The project will use a fiber optic sensor embedded in a protective mat to detect a moving vehicle and classify it. The fiber optic cable will work as a microbend sensor and be designed to provide recordable attenuation ...
• KnowSmart ﻿

KnowSmart is our team's innovative approach towards implementing smart house technology that is quickly emerging on today's market. Management of the home is done by a central command server. Multiple modules on devices ...
• The Kolmogorov equation with time-measurable coefficients ﻿

(2003-07-13)
Using both probabilistic and classical analytic techniques, we investigate the parabolic Kolmogorov equation  L_t v +\frac {\partial v}{\partial t}\equiv \frac 12 a^{ij}(t)v_{x^ix^j} +b^i(t) v_{x^i} -c(t) v+ f(t) ...
• Lajos Takács and his work ﻿

(1994-10-01)
This paper, written in honor of the 70th birthday of Lajos Takács, addresses his life and work, and includes some personal observations and appreciation of his contributions. In particular, it includes a short biography, ...
• Learning implicit user interest hierarchy for web personalization ﻿

(2005-04-19)
Most web search engines are designed to serve all users in a general way, without considering the interests of individual users. In contrast, personalized web search engines incorporate an individual user's interests when ...
• Learning models of network traffic for detecting novel attacks ﻿

(2002-05-24)
Network intrusion detection systems often rely on matching patterns that are gleaned from known attacks. While this method is reliable and rarely produces false alarms, it has the obvious disadvantage that it cannot detect ...
• Learning nonstationary models of normal network traffic for detecting novel attacks ﻿

(2002-04-29)
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new attacks which do not have known signatures. In ...
• Learning rules for anomaly detection of hostile network traffic ﻿

(2003-06-10)
We introduce an algorithm called LERAD that learns rules for finding rare events in nominal time-series data with long range dependencies. We use LERAD to find anomalies in network packets and TCP sessions to detect novel ...
• Learning rules for time series anomaly detection ﻿

(2005-02-17)
We describe a multi-dimensional time series anomaly detection method in which each point in a test series is required to match the value, slope, and curvature of a point seen in training (with an optional sequential ...
• Learning rules from system call arguments and sequences for anomaly detection ﻿

(2003-06-11)
Many approaches have been suggested and various systems have been modeled to detect intrusions from anomalous behavior of systems calls as a result of an attack. Though these techniques have been shown to be quite effective, ...
• Learning states and rules for time series anomaly detection ﻿

(2003-03-09)
In this paper, we investigate machine learning techniques for discovering knowledge that can be used to monitor the operation of devices or systems. Specifically, we study methods for generating models that can detect ...
• Learning states for detecting anomalies in time series ﻿

(2004-04-24)
The normal operation of a device can be characterized in different operational states. To identify these states, we introduce a segmentation algorithm called Gecko that can determine a reasonable number of segments using ...
• The lightning-TGF relationship on microsecond timescales ﻿

(2011-07-28)
We analyze the count rates of two terrestrial gamma-ray flashes (TGFs) detected by the Fermi Gamma-ray Burst Monitor (GBM) with the broadband magnetic fields (1 to 300 kHz) produced by the simultaneous lightning processes. ...
• Limits on spacetime foam ﻿

(2011-04-04)
Plausibly spacetime is foamy on small distance scales, due to quantum fluctuations. We elaborate on the proposal to detect spacetime foam by looking for seeing disks in the images of distant quasars and active galactic ...
• Linear Inductive Position Sensor ﻿

The aim of this project is to create a linear position sensor with an accuracy of 1 μm. Two 'driving' inductors are powered by a frequency generator with a magnitude of 4.5 V and a frequency of 1.5 kHz. The inductors create ...
• Lionsat ﻿

In the previous semesters, a mission was designed for a cubesatellite to enter a low-earth orbit and take pictures of weather patterns. To overcome drag and provide essential correction maneuvers, a resistojet would be ...