Search
Now showing items 21-40 of 49
A desktop application to learn the actual workload of the students
(Procedia - Social and Behavioral Sciences, 2009)
The use of European Credit Transfer system (ECTS) provides a reference standard for exchange students across the European Union (EU). It helps more transparency and compatibility to compare the self-study period and ...
Integration of GIS: A showcase study on GML based WebGIS
(Proceedings of SPIE - The International Society for Optical Engineering, 2008)
The growth of Geographical Information Systems (GIS) emerges as analytical decision-making tools utilizing highly specialized geographic data. However, a simple system still does not exist for the integration/sharing ...
Detection of hidden hostile/terrorist groups in harsh territories by using animals as mobile biological sensors
(Sensors, 2008)
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist ...
Face matrix: A quick search and indexing method for suspect recognition in police departments
(Information Technology Journal, 2007)
This study presents an indexing and a quick sort method that could be used to find the possible matching guilty pictures from the police database by using a tracing software and eyewitness descriptions about the suspected ...
Critical Factors Affecting Cloud Computing Adoption In Turkishkish Companies With Diffusion Of Innovation Theory
(2021)
Cloud computing provides an effective computing technology in the way IT services such as data storage, network, and
application are supplied externally by companies without software and hardware, long implementations, ...
A Framework Model for Data Reliability in Wireless Sensor Networks
(IEEE, 2016)
In this study a model for data reliability in wireless sensor networks is proposed, in which machine learning methods are used. Proposed framework includes data modelling, missing data prediction, anomaly detection, data ...
Formal Trust Assessment with Confidence Probability
(KSII-KOR SOC INTERNET INFORMATION, 2015)
Trust and trustworthiness of web services and organizations is calculated as scalar values. But there is still a certain level of risk for the overall reliability of this value. In this article, we focus on calculating ...
White Blood Cells Classifications by SURF Image Matching, PCA and Dendrogram
(ALLIED ACAD, 2015)
Determination and classification of white blood cells are very important for diagnosing many diseases. The number of white blood cells and morphological changes or blasts of them provide valuable information for the positive ...
Automatic segmentation, counting, size determination and classification of white blood cells
(ELSEVIER SCI LTD, 2014)
The counts, the so-called differential counts, and sizes of different types of white blood cells provide invaluable information to evaluate a wide range of important hematic pathologies from infections to leukemia. Today, ...
TWO-WAY REAL-TIME METEOROLOGICAL DATA ANALYSIS AND MAPPING INFORMATION SYSTEM
(MINISTRY COMMUNICATIONS & HIGH TECHNOLOGIES REPUBLIC AZERBAIJAN, 2014)
In the paper two-way real-time meteorological data analysis and mapping information system is proposed, that aims to fulfill described disadvantages. In this scope following main results are obtained: 1) updating the raw ...
Understanding determinants of cloud computing adoption using an integrated diffusion of innovation (Doi)-technological, organizational and environmental (TOE) model
(Humanities and Social Sciences Reviews, 2020)
Purpose of the study: This study aims to investigate the internal and external factors for CC adoption decisions of companies in Izmir, Turkey using a combination of DOI and TOE models. Methodology: This is a confirmatory ...
Optimization of Costs in Empty Container Repositioning
(Lecture Notes in Mechanical Engineering, 2020)
In this study, the empty container repositioning problem in a liner shipping company is considered. The research includes necessary information about the company and maritime transportation, highlighting the importance of ...
Design and Implementation of a Customized Micro Server Platform for Indoor Monitoring and Control [Kapali Ortamlarda Izleme ve Denetleme için Ozel leçtiri 1 ini Mikro Sunucu Platformunun Tasanmi ve Uygulanmasi]
(Proceedings - 2019 Innovations in Intelligent Systems and Applications Conference, ASYU 2019, 2019)
The concept of the Internet of Industrial Things (IIoT), which emerged when the Internet of Things (IoT) applications started to be used in the industry, has provided the efficiency, flexibility, traceability and security ...
MATLAB/SIMULINK Model for HVDC Fault Calculations
(Proceedings 2019 International Aegean Conference on Electrical Machines and Power Electronics, ACEMP 2019 and 2019 International Conference on Optimization of Electrical and Electronic Equipment, OPTIM 2019, 2019)
Power transmission has faced many challenges as the days goes by. Power demand has increased and its becoming increasingly difficult to acquire right way for new lines, due to growth, population, urbanizations and environmental ...
Design of an FPGA-based intelligent gateway for industrial IoT
(International Journal of Advanced Trends in Computer Science and Engineering, 2019)
The use of information technologies in the implementation of industry 4.0 applications has naturally attracted the attention of many entrepreneurs and the business community. Industry 4.0 applications enabled cost reduction ...
OWL Ontology Development for Destination Marketing
(SPRINGER-VERLAG BERLIN, 2011)
Internet, as a marketing medium in the tourism industry, is a very valuable destination marketing tool. Different tourism authorities and organizations serve as marketing and service providers. They benefit from the use ...
Hash-based document extraction in corporate mobile devices using ontological architectures
(ACADEMIC JOURNALS, 2011)
Due to the rapid technological advances in mobile and wireless networking devices, personal computing has moved towards into ad hoc and pervasive environments. Today, the dynamic nature of mobile applications and services ...
THE USE OF INTERNET RESOURCES BY UNIVERSITY STUDENTS DURING THEIR COURSE PROJECTS ELICITATION: A CASE STUDY
(TURKISH ONLINE JOURNAL EDUCATIONAL TECH-TOJET, 2010)
Although technology is a very important, useful and indispensable part of the life, effective and appropriate usage of it still needs to be improved in education. This study presents the way university students gather their ...
Towards virtualization: A competitive business continuity
(ACADEMIC JOURNALS, 2010)
The ultimate goal of all businesses no matter in which sectors they operate is to maintain their profitability and growth. There is a relationship among the capital, investment, and the personnel in order to achieve ...
Effective use of cloud computing in educational institutions
(ELSEVIER SCIENCE BV, 2010)
Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. It will likely have a significant impact ...