A nearest-neighbor model for regional avalanche forecasting

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Nearest neighbour models for local and regional avalanche forecasting

This paper presents two avalanche forecasting applications NXD2000 and NXD-REG which were developed at the Swiss Federal Institute for Snow and Avalanche Research (SLF). Even both are based on the nearest neighbour method they are targeted to different scales. NXD2000 is used to forecast avalanches on a local scale. It is operated by avalanche forecasters responsible for snow safety at snow spo...

متن کامل

Nearest Neighbor and Reverse Nearest Neighbor Queries for Moving Objects

With the proliferation of wireless communications and the rapid advances in technologies for tracking the positions of continuously moving objects, algorithms for efficiently answering queries about large numbers of moving objects increasingly are needed. One such query is the reverse nearest neighbor (RNN) query that returns the objects that have a query object as their closest object. While a...

متن کامل

a nonparametric model by using k-nearest neighbor technique for predicting soil saturated hydraulic conductivity

abstract saturated hydraulic conductivity (ks) is needed for many studies related to water and solute transport, but often cannot be measured because of practical and/or cost-related reasons. nonparametric approaches are being used in various fields to estimate continuous variables. one type of the nonparametric lazy learning algorithms, a k-nearest neighbor (k-nn) algorithm, was introduced and...

متن کامل

a lattice based nearest neighbor classifier for anomaly intrusion detection

as networking and communication technology becomes more widespread, thequantity and impact of system attackers have been increased rapidly. themethodology of intrusion detection (ids) is generally classified into two broadcategories according to the detection approaches: misuse detection and anomalydetection. in misuse detection approach, abnormal system behavior is defined atfirst, and then an...

متن کامل

Nearest Neighbor

Over the last decade, an immense amount of data has become available. From collections of photos, to genetic data, and to network traffic statistics, modern technologies and cheap storage have made it possible to accumulate huge datasets. But how can we effectively use all this data? The ever growing sizes of the datasets make it imperative to design new algorithms capable of sifting through th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Annals of Glaciology

سال: 2001

ISSN: 0260-3055,1727-5644

DOI: 10.3189/172756401781819247