Search
Now showing items 21-30 of 49
Formal Trust Assessment with Confidence Probability
(KSII-KOR SOC INTERNET INFORMATION, 2015)
Trust and trustworthiness of web services and organizations is calculated as scalar values. But there is still a certain level of risk for the overall reliability of this value. In this article, we focus on calculating ...
White Blood Cells Classifications by SURF Image Matching, PCA and Dendrogram
(ALLIED ACAD, 2015)
Determination and classification of white blood cells are very important for diagnosing many diseases. The number of white blood cells and morphological changes or blasts of them provide valuable information for the positive ...
Automatic segmentation, counting, size determination and classification of white blood cells
(ELSEVIER SCI LTD, 2014)
The counts, the so-called differential counts, and sizes of different types of white blood cells provide invaluable information to evaluate a wide range of important hematic pathologies from infections to leukemia. Today, ...
TWO-WAY REAL-TIME METEOROLOGICAL DATA ANALYSIS AND MAPPING INFORMATION SYSTEM
(MINISTRY COMMUNICATIONS & HIGH TECHNOLOGIES REPUBLIC AZERBAIJAN, 2014)
In the paper two-way real-time meteorological data analysis and mapping information system is proposed, that aims to fulfill described disadvantages. In this scope following main results are obtained: 1) updating the raw ...
OWL Ontology Development for Destination Marketing
(SPRINGER-VERLAG BERLIN, 2011)
Internet, as a marketing medium in the tourism industry, is a very valuable destination marketing tool. Different tourism authorities and organizations serve as marketing and service providers. They benefit from the use ...
Hash-based document extraction in corporate mobile devices using ontological architectures
(ACADEMIC JOURNALS, 2011)
Due to the rapid technological advances in mobile and wireless networking devices, personal computing has moved towards into ad hoc and pervasive environments. Today, the dynamic nature of mobile applications and services ...
THE USE OF INTERNET RESOURCES BY UNIVERSITY STUDENTS DURING THEIR COURSE PROJECTS ELICITATION: A CASE STUDY
(TURKISH ONLINE JOURNAL EDUCATIONAL TECH-TOJET, 2010)
Although technology is a very important, useful and indispensable part of the life, effective and appropriate usage of it still needs to be improved in education. This study presents the way university students gather their ...
Semantic Access Control for Corporate Mobile Devices
(SPRINGER-VERLAG BERLIN, 2010)
Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or ...
Non-procedural Implementation of Local Heuristic Search in Control Network Programming
(SPRINGER-VERLAG BERLIN, 2010)
The report describes the type of improved uninformed or heuristic search algorithms that are well-suited for non-procedural implementation in Control network programming, and how this can be achieved using the tools for ...
Control Network Programming with SPIDER: Dynamic Search Control
(SPRINGER-VERLAG BERLIN, 2010)
The report describes the means for dynamic control of the computation process that are available in Spider - a language for Control Network Programming.