Searched for: +
(1 - 9 of 9)
document
Herrera-Semenets, Vitali (author), Hernández-León, Raudel (author), van den Berg, Jan (author)
We live in a world that is being driven by data. This leads to challenges of extracting and analyzing knowledge from large volumes of data. An example of such a challenge is intrusion detection. Intrusion detection data sets are characterized by huge volumes, which affects the learning of the classifier. So there is a need to reduce the size...
journal article 2022
document
Herrera-Semenets, Vitali (author), Bustio-Martínez, Lázaro (author), Hernández-León, Raudel (author), van den Berg, Jan (author)
Every day the number of devices interacting through telecommunications networks grows resulting into an increase in the volume of data and information generated. At the same time, a growing number of information security incidents is being observed including the occurrence of unauthorized accesses, also named intrusions. As a consequence of...
journal article 2021
document
Scott, Fred (author)
Many tropical, coral reef-lined coasts, are low-lying with elevations less than five meters above mean sea level. Climate-change-driven sea level rise, coral reef decay and changes in (storm) wave climate will lead to greater chance and impacts of wave-driven flooding, posing a heavy threat to these coastal communities. Early warning systems ...
master thesis 2019
document
Herrera Semenets, V. (author), Pérez-García, Osvaldo Andrés (author), Hernández-León, Raudel (author), van den Berg, Jan (author), Dörr, C. (author)
In the last few years, the telecommunications scenario has experienced an increase in the volume of information generated, as well as in the execution of malicious activities. In order to complement Intrusion Detection Systems (IDSs), data mining techniques have begun to play a fundamental role in data analysis. On the other hand, the...
journal article 2018
document
Kuijpers, E.A. (author)
Existing robot vision algorithms are evaluated for application in space for proximity extraction using one camera. Lighting conditions and image formation differ from earth conditions which have implications. An algorithm is derived which is based on the use of run coding, tracking and a least mean error method. Problems concerning hardware...
report 1987
document
Roefs, H.F.A. (author), Monkel, A. (author)
Project CADISS has produced an elegant breadboard of a system for compression (and -if required- decompression) of signals generated by imaging sensors on-board scientific satellites. The performance, specifications and physical characteristics of CADISS are the result of trade-offs on function (algorithms), technology, through-put speed and...
report 1987
document
Hoogendoorn, R.A. (author)
Computations in numerical fluid dynamics create large sets of data. Transmission of these datasets requires a high speed communication link or, alternatively, the use of data compression techniques. This report describes the results of a study to the applicability of data compression techniques. An algorithm is designed that yields favourable...
report 1986
document
Breeman, J.H. (author)
This report presents the parameter identification results derived from data recorded during non-steady symmetric flight test manoeuvres with the Hawker Hunter Mk VII laboratory aircraft. This flight test program was executed in co-operation with the Department of Aerospace Engineering of the Delft University of Technology. The reproducibility of...
report 1983
document
Bosgra, J.A. (author)
Noise measurements were performed on two identical space qualified gyroscopes of the floated rate integrating type (Perranti Type I25) in an analog rehalance loop configuration of selectable loop bandwidth, running under space representative conditions. The noise frequency range of interest was O.OO5 Hz to 50 Hz. The noise results were processed...
report 1979
Searched for: +
(1 - 9 of 9)