Ara
Toplam kayıt 49, listelenen: 21-30
A desktop application to learn the actual workload of the students
(Procedia - Social and Behavioral Sciences, 2009)
The use of European Credit Transfer system (ECTS) provides a reference standard for exchange students across the European Union (EU). It helps more transparency and compatibility to compare the self-study period and ...
Integration of GIS: A showcase study on GML based WebGIS
(Proceedings of SPIE - The International Society for Optical Engineering, 2008)
The growth of Geographical Information Systems (GIS) emerges as analytical decision-making tools utilizing highly specialized geographic data. However, a simple system still does not exist for the integration/sharing ...
Detection of hidden hostile/terrorist groups in harsh territories by using animals as mobile biological sensors
(Sensors, 2008)
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist ...
Face matrix: A quick search and indexing method for suspect recognition in police departments
(Information Technology Journal, 2007)
This study presents an indexing and a quick sort method that could be used to find the possible matching guilty pictures from the police database by using a tracing software and eyewitness descriptions about the suspected ...
Critical Factors Affecting Cloud Computing Adoption In Turkishkish Companies With Diffusion Of Innovation Theory
(2021)
Cloud computing provides an effective computing technology in the way IT services such as data storage, network, and
application are supplied externally by companies without software and hardware, long implementations, ...
A Framework Model for Data Reliability in Wireless Sensor Networks
(IEEE, 2016)
In this study a model for data reliability in wireless sensor networks is proposed, in which machine learning methods are used. Proposed framework includes data modelling, missing data prediction, anomaly detection, data ...
Formal Trust Assessment with Confidence Probability
(KSII-KOR SOC INTERNET INFORMATION, 2015)
Trust and trustworthiness of web services and organizations is calculated as scalar values. But there is still a certain level of risk for the overall reliability of this value. In this article, we focus on calculating ...
White Blood Cells Classifications by SURF Image Matching, PCA and Dendrogram
(ALLIED ACAD, 2015)
Determination and classification of white blood cells are very important for diagnosing many diseases. The number of white blood cells and morphological changes or blasts of them provide valuable information for the positive ...
Automatic segmentation, counting, size determination and classification of white blood cells
(ELSEVIER SCI LTD, 2014)
The counts, the so-called differential counts, and sizes of different types of white blood cells provide invaluable information to evaluate a wide range of important hematic pathologies from infections to leukemia. Today, ...
TWO-WAY REAL-TIME METEOROLOGICAL DATA ANALYSIS AND MAPPING INFORMATION SYSTEM
(MINISTRY COMMUNICATIONS & HIGH TECHNOLOGIES REPUBLIC AZERBAIJAN, 2014)
In the paper two-way real-time meteorological data analysis and mapping information system is proposed, that aims to fulfill described disadvantages. In this scope following main results are obtained: 1) updating the raw ...