Search
Now showing items 1-20 of 49
A framework model for data reliability in wireless sensor networks [Kablosuz Algilayici Aglarda Veri Güvenilirligi Için Bir ÇerçEve Model]
(2016 24th Signal Processing and Communication Application Conference, SIU 2016 - Proceedings, 2016)
In this study a model for data reliability in wireless sensor networks is proposed, in which machine learning methods are used. Proposed framework includes data modelling, missing data prediction, anomaly detection, data ...
White blood cells classifications by SURF image matching, PCA and dendrogram
(Biomedical Research (India), 2015)
Determination and classification of white blood cells are very important for diagnosing many diseases. The number of white blood cells and morphological changes or blasts of them provide valuable information for the positive ...
Formal trust assessment with confidence probability
(KSII Transactions on Internet and Information Systems, 2015)
Trust and trustworthiness of web services and organizations is calculated as scalar values. But there is still a certain level of risk for the overall reliability of this value. In this article, we focus on calculating ...
Two-way real-time meteorological data analysis and mapping information system
(Applied and Computational Mathematics, 2014)
In the paper, two-way real-time meteorological data analysis and mapping information system is proposed. In this scope, the following main results are obtained: 1) updating the raw data and performing the analysis and ...
OWL ontology development for destination marketing
(Communications in Computer and Information Science, 2011)
Internet, as a marketing medium in the tourism industry, is a very valuable destination marketing tool. Different tourism authorities and organizations serve as marketing and service providers. They benefit from the use ...
Hash-based document extraction in corporate mobile devices using ontological architectures
(Scientific Research and Essays, 2011)
Due to the rapid technological advances in mobile and wireless networking devices, personal computing has moved towards into ad hoc and pervasive environments. Today, the dynamic nature of mobile applications and services ...
Non-procedural implementation of local heuristic search in control network programming
(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
The report describes the type of improved uninformed or heuristic search algorithms that are well-suited for non-procedural implementation in Control network programming, and how this can be achieved using the tools for ...
Control network programming with SPIDER: Dynamic search control
(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
The report describes the means for dynamic control of the computation process that are available in Spider - a language for Control Network Programming. © 2010 Springer-Verlag.
Semantic access control for corporate mobile devices
(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or ...
Effective use of cloud computing in educational institutions
(Procedia - Social and Behavioral Sciences, 2010)
Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. It will likely have a significant impact ...
The use of internet resources by university students during their course projects elicitation: A case study
(Turkish Online Journal of Educational Technology, 2010)
Although technology is a very important, useful and indispensable part of the life, effective and appropriate usage of it still needs to be improved in education. This study presents the way university students gather their ...
Issues in User Generated Content process and a proposed model to solve them
(International Journal of Technology, Knowledge and Society, 2010)
User-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large ...
A layered security approach for cloud computing infrastructure
(I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, 2009)
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service ...
A desktop application to learn the actual workload of the students
(Procedia - Social and Behavioral Sciences, 2009)
The use of European Credit Transfer system (ECTS) provides a reference standard for exchange students across the European Union (EU). It helps more transparency and compatibility to compare the self-study period and ...
Integration of GIS: A showcase study on GML based WebGIS
(Proceedings of SPIE - The International Society for Optical Engineering, 2008)
The growth of Geographical Information Systems (GIS) emerges as analytical decision-making tools utilizing highly specialized geographic data. However, a simple system still does not exist for the integration/sharing ...
Field-Programmable Gate Array Implementation of Adaptive Neuro-Fuzzy System Using Sensors Monitoring Health-Care Medicinal Internet of Things
(AMER SCIENTIFIC PUBLISHERS, 2020)
In this study, an artificial intelligent algorithm that can be used for monitoring health-care MIoT (Medicinal Internet of Things) and predicting system based on Adaptive Neuro-Fuzzy Inferences System Architecture (ANFIS) ...
MATLAB/SIMULINK Model For HVDC Fault Calculations
(IEEE, 2019)
Power transmission has faced many challenges as the days goes by. Power demand has increased and its becoming increasingly difficult to acquire right way for new lines, due to growth, population, urbanizations and environmental ...
Anomaly Detection in Wireless Sensor Networks Data by Using Histogram Based Outlier Score Method<bold> </bold>
(IEEE, 2018)
Data anomaly detection in wireless sensor networks, which is one of the important technologies and study areas, is a method that enhances data quality and data reliability. Besides data enhancing methods such as estimating ...
A Low Cost Manipulator Training Set
(IEEE, 2018)
Manipulators serve worldwide to increase quality requirements and speed up the production of the manufacturing industry. Typical applications of manipulators include welding, painting, ironing, assembly, picking and placing, ...
A Framework Model for Data Reliability in Wireless Sensor Networks
(IEEE, 2016)
In this study a model for data reliability in wireless sensor networks is proposed, in which machine learning methods are used. Proposed framework includes data modelling, missing data prediction, anomaly detection, data ...