Searched for: subject%3A%22Classification%22
(1 - 20 of 191)

Pages

document
Chiscop, I. (author), Soro, F. (author), Smith, P. (author)
Threat hunting and malware prediction are critical activities to ensure network and system security. These tasks are difficult due to increasing numbers of sophisticated malware families. Automatically detecting anomalous Domain Name System (DNS) queries in operational traffic facilitates the detection of new malware infections, significantly...
conference paper 2022
document
Peysakhovich, V. (author), Ledegang, W. (author), Houben, M. (author), Groen, E. (author)
Eye movements analysis has great potential for understanding operator behaviour in many safety-critical domains, including aviation. In addition to traditional eye-tracking measures on pilots’ visual behavior, it seems promising to incorporate machine learning approaches to classify pilots’ visual scanning patterns. However, given the multitude...
conference paper 2022
document
van Battum, C.H.H. (author), Wiegmans, B. (author), Atasoy, B. (author), van Wingerden, E. (author), de Waal, A. (author), Tavasszy, L.A. (author)
Container terminal capacity is often limited by (in)efciency bottlenecks. This paper provides the design and proof of concept for the bottleneck mitigation cycle (BMC), consisting of three steps: bottleneck classifcation, detection and alleviation. While, often, the literature only focuses on alleviation of a single bottleneck and ignores...
article 2022
document
Shahmohammadi, M.S. (author), Parker, L.A. (author), Henke, S. (author), Urbanus, J.H. (author)
Microplastics are a growing environmental and toxicological concern, having been found in the remotest locations of the earth and within multiple organs of the human body. However, the scale of the problem is not yet fully known as the smallest micro- and nanoplastics (MNPs) cannot accurately be measured due to limitations in measurement and...
article 2022
document
Luo, J. (author), Moncada, J. (author), Ramirez, A. (author)
Incorporating (operational) flexibility into process design has been a key approach to cope with uncertainties. The increasing penetration of renewables and the need for developing new low-carbon technologies will increase the demand for flexibility in chemical processes. This paper presents a state-of the-art review focusing on the origin,...
article 2022
document
de Bruin, G.J. (author), Pereira Barata, A. (author), van den Herik, H.J. (author), Takes, F.W. (author), Veenman, C.J. (author)
article 2022
document
Eslami-Mossallam, B. (author), Klein, M. (author), Smagt, C.V.D. (author), Sanden, K.V.D. (author), Jones Jr, S.K. (author), Hawkins, J.A. (author), Finkelstein, I.J. (author), Depken, M. (author)
The S. pyogenes (Sp) Cas9 endonuclease is an important gene-editing tool. SpCas9 is directed to target sites based on complementarity to a complexed single-guide RNA (sgRNA). However, SpCas9-sgRNA also binds and cleaves genomic off-targets with only partial complementarity. To date, we lack the ability to predict cleavage and binding activity...
article 2022
document
Neumann, N.M.P. (author)
conference paper 2021
document
de Boer, M.H.T. (author), Hillerström, F.H.J. (author)
In Hybrid AI, machine learning and knowledge engineering are combined to have the best of both worlds. Insights obtained from data are combined with complementary expert knowledge, which can be represented in a graph structure. Graph networks are a recently new development in machine learning and cover methods that learn on graph structured data...
conference paper 2021
document
den Hollander, R.J.M. (author), van Rooij, S.B. (author), van den Broek, S.P. (author), Dijk, J. (author)
An important surveillance task during naval military operations is early risk assessment of vessels. The potential risk that a vessel poses will depend on the vessel type, and vessel classification is therefore a basic technique in risk assessment. Although automatic identification by AIS is widely available, the AIS transponders can potentially...
conference paper 2021
document
Madhuanand, L. (author), Sadavarte, P. (author), Visschedijk, A.J.H. (author), Denier van der Gon, H.A.C. (author), Aben, I. (author), Osei, F.B. (author)
article 2021
document
Phillipson, F. (author), Wezeman, R.S. (author), Chiscop, I. (author)
Communication networks are managed more and more by using artificial intelligence. Anomaly detection, network monitoring and user behaviour are areas where machine learning offers advantages over more traditional methods. However, computer power is increasingly becoming a limiting factor in machine learning tasks. The rise of quantum computers...
article 2021
document
de Boer, H. (author), Muller, R.W.D. (author), Wong, S. (author), Voogt, V. (author)
A key obstacle within the design of cognitive radios has always been the spectrum sensing component that implements the function automatic modulation classification (AMC). With the transition to software-defined radios (SDRs) followed by the introduction of field-programmable gate arrays (FPGAs) and deep learning (DL), it becomes possible to...
conference paper 2021
document
Kooiman, K. (author), Phillipson, F. (author), Sangers, A. (author)
In this paper Time-stamp Stochastic Assignment Problems are studied. These problems occur in places where an incoming request or task has to be connected to a resource immediately. A definition and framework for these problems is given, in which the different Time-stamp Stochastic Assignment Problems can be categorised. An explicit notation is...
conference paper 2020
document
Gross, D. (author), Jansen, N. (author), Perez, G.A. (author), Raaijmakers, S. (author)
We give a formal verification procedure that decides whether a classifier ensemble is robust against arbitrary randomized attacks. Such attacks consist of a set of deterministic attacks and a distribution over this set. The robustness-checking problem consists of assessing, given a set of classifiers and a labelled data set, whether there exists...
conference paper 2020
document
van de Guchte, L. (author)
book 2020
document
Phillipson, F. (author), Wezeman, R.S. (author), Chiscop, I. (author)
There is a growing trend in using machine learning techniques for detecting environmental context in communication networks. Machine learning is one of the promising candidate areas where quantum computing can show a quantum advantage over their classical algorithmic counterpart on near term Noisy Intermediate-Scale Quantum (NISQ) devices. The...
conference paper 2020
document
de Wit, J.J.M. (author), Gusland, D. (author), Trommel, R.P. (author)
The use of drones grows rapidly, recreational and commercial use, as well as malicious use. Following the trend of increasing use, there is an increasing need for radar systems to detect, track and characterize drones. Drone characterization, i.e., extracting information about the payload and intent of a drone, is crucial for the effective...
conference paper 2020
document
de Jong, R.J. (author), Heiligers, M.J.C. (author), de Wit, J.J.M. (author), Uysal, F. (author)
Camera systems are widely used for surveillance in the security and defense domains. The main advantages of camera systems are their high resolution, their ease of use, and the fact that optical imagery is easy to interpret for human operators. However, particularly when considering application in the defense domain, cameras have some...
conference paper 2019
document
Premel-Cabic, G. (author), de Wit, J.J.M. (author), Cuenca, M. Caro (author)
The ALFA project aims at timely detection, tracking, classification, and intent assessment of LSS targets. The system relies on a heterogeneous sensor suite, including radar. The objective of the radar component is sector surveillance including target classification. Since the revisit time needs to be short, classification must be done with very...
conference paper 2019
Searched for: subject%3A%22Classification%22
(1 - 20 of 191)

Pages