Keyword : threshold


Efficient ID-Based Threshold Random Key Pre-Distribution Scheme for Wireless Sensor Networks
Tran Thanh DAI Choong Seon HONG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/08/01
Vol. E91-B  No. 8 ; pp. 2602-2609
Type of Manuscript:  PAPER
Category: Network
Keyword: 
ID-basedrandom key pre-distributionkey agreementthresholdsecuritywireless sensor networks
 Summary | Full Text:PDF(397.5KB)

Assessment of On-Line Model Quality and Threshold Estimation in Speaker Verification
Javier R. SAETA Javier HERNANDO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/04/01
Vol. E90-D  No. 4 ; pp. 759-765
Type of Manuscript:  PAPER
Category: Speech and Hearing
Keyword: 
speaker verificationthresholdqualitymodel estimationpruning
 Summary | Full Text:PDF(298.3KB)

Wide-Dynamic-Range Digital-Pixel CMOS Image Sensor Applying New Readout Operation
Masahide GOTO Toshihisa WATABE Hiroshi OHTAKE Masahide ABE Norifumi EGAMI Kenkichi TANIOKA 
Publication:   IEICE TRANSACTIONS on Electronics
Publication Date: 2006/02/01
Vol. E89-C  No. 2 ; pp. 206-208
Type of Manuscript:  LETTER
Category: Electronic Circuits
Keyword: 
CMOS image sensordynamic rangeA/D converterthresholdpulse
 Summary | Full Text:PDF(106.1KB)

Dimensioning Burst Assembly Process in Optical Burst Switching Networks
JungYul CHOI JinSeek CHOI Minho KANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/10/01
Vol. E88-B  No. 10 ; pp. 3855-3863
Type of Manuscript:  Special Section PAPER (Special Section on Next Generation Photonic Network Technologies)
Category: 
Keyword: 
burst assembly parametercontrol packet processoptical burst switchingtimerthreshold
 Summary | Full Text:PDF(843.9KB)

The Correlation Deduction Method for Intrusion Decision Based on Heterogeneous Sensors
Minsoo KIM Bong-Nam NOH 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2003/10/01
Vol. E86-D  No. 10 ; pp. 2209-2217
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
intrusion detectionthresholdsensor correlation
 Summary | Full Text:PDF(1.3MB)

An Efficient Cell Placement Strategy for Shared Multibuffer ATM Switches
Pong-Gyou LEE Woon-Cheon KANG Yoon-Hwa CHOI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1999/09/25
Vol. E82-B  No. 9 ; pp. 1424-1431
Type of Manuscript:  PAPER
Category: Switching and Communication Processing
Keyword: 
shared multi-buffer ATM switchcell placementthreshold
 Summary | Full Text:PDF(622.2KB)

An Automated Thresholding Approach for Segmenting Deteriorated SEM Images in X-Ray Mask Visual Inspection
Minoru ITO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1996/06/25
Vol. E79-D  No. 6 ; pp. 866-872
Type of Manuscript:  PAPER
Category: Image Processing,Computer Graphics and Pattern Recognition
Keyword: 
visual inspectionthresholdSEMLSI pattern
 Summary | Full Text:PDF(669KB)

Restricted Overflow Strategy in Integrated Services Network
Tatsuya TANIAI Azuchi MIKI Takashi KOJIMA Iwao SASASE Shinsaku MORI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1992/07/25
Vol. E75-B  No. 7 ; pp. 649-656
Type of Manuscript:  PAPER
Category: Communication Networks and Service
Keyword: 
ISDNoverflowrestricted overflow strategythreshold
 Summary | Full Text:PDF(550.2KB)