Search
Now showing items 41-49 of 49
Detection of hidden hostile/terrorist groups in harsh territories by using animals as mobile biological sensors
(Sensors, 2008)
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist ...
Face matrix: A quick search and indexing method for suspect recognition in police departments
(Information Technology Journal, 2007)
This study presents an indexing and a quick sort method that could be used to find the possible matching guilty pictures from the police database by using a tracing software and eyewitness descriptions about the suspected ...
Critical Factors Affecting Cloud Computing Adoption In Turkishkish Companies With Diffusion Of Innovation Theory
(2021)
Cloud computing provides an effective computing technology in the way IT services such as data storage, network, and
application are supplied externally by companies without software and hardware, long implementations, ...
A low cost manipulator training set
(2018 6th International Conference on Control Engineering and Information Technology, CEIT 2018, 2018)
Manipulators serve worldwide to increase quality requirements and speed up the production of the manufacturing industry. Typical applications of manipulators include welding, painting, ironing, assembly, picking and placing, ...
Benefits of semantic approach in the learning environment
(ELSEVIER SCIENCE BV, 2011)
Mobile devices are mainly lack of regular user interfaces that facilitate the human-computer interaction and the access to network resources. However, almost all commercial applications contain their mobile versions. If ...
Towards virtualization: A competitive business continuity
(ACADEMIC JOURNALS, 2010)
The ultimate goal of all businesses no matter in which sectors they operate is to maintain their profitability and growth. There is a relationship among the capital, investment, and the personnel in order to achieve ...
Automatic segmentation, counting, size determination and classification of white blood cells
(Measurement: Journal of the International Measurement Confederation, 2014)
The counts, the so-called differential counts, and sizes of different types of white blood cells provide invaluable information to evaluate a wide range of important hematic pathologies from infections to leukemia. Today, ...
Host Based Dynamic Throughput Maximization Model for IEEE 802.11 WLAN
(Communications in Computer and Information Science, 2010)
As the demand for uninterrupted Internet access grows, the popularity of wireless communication increases. However, wireless communication has some problems compared to conventional wired communication. Especially, if ...
Optimization of Costs in Empty Container Repositioning
(Lecture Notes in Mechanical Engineering, 2020)
In this study, the empty container repositioning problem in a liner shipping company is considered. The research includes necessary information about the company and maritime transportation, highlighting the importance of ...