Ara
Toplam kayıt 145, listelenen: 1-10
Software defect prediction using Bayesian networks and kernel methods
(Işık Üniversitesi, 2012-07-01)
There are lots of different software metrics discovered and used for defect prediction in the literature. Instead of dealing with so many metrics, it would be practical and easy if we could determine the set of metrics ...
H.264 vi̇deo kodlamada B-çerçeveler i̇çi̇n kodçözücü tarafında aday devi̇ni̇m vektör seçi̇mi̇
(IEEE, 2012-04-18)
H.264 standardında devinim vektör farklarının kodlanması sebebiyle özellikle düşük bit hızlarında nesne sınırlarında devinimdeki ani değişiklikler harcanan bit miktarlarını artırmaktadır. Bu bildiride B-çerçevelerde kod ...
İngi̇li̇zce-Türkçe i̇stati̇sti̇ksel maki̇ne çevi̇ri̇si̇nde bi̇çi̇m bi̇li̇m kullanımı
(IEEE, 2012-04-18)
Bu çalışmada, İngilizce-Türkçe dil ikilisi için biçimbilimsel çözümleme yardımı ile SIU dermecesi üzerinde istatistiksel makine çevirisi denemeleri yapılmıştır. Kelime biçimlerinin baz alındığı çeviri denemeleri İngilizce-Türkçe ...
Energy load balancing for fixed clustering in wireless sensor networks
(IEEE, 2012-05-07)
Clustering can be used as an effective technique to achieve both energy load balancing and an extended lifetime for a wireless sensor network (WSN). This paper presents a novel approach that first creates energy balanced ...
Demo abstract: TeleHealth - Intelligent healthcare with M2M communication module
(ACM, 2012-11-06)
Chronic diseases, such as diabetes, heart disease (e.g. arrhythmia and hypertension), chronic respiratory diseases (e.g. asthma and COPD), are by far the leading cause of mortality in the world, representing 63% of all ...
Texture recognition for frog identification
(ACM SIGMM, 2012-11-02)
This paper describes a visual processing technique for automatic frog (Xenopus Laevis sp.) localization and identification. The problem of frog identification is to process and classify an unknown frog image to determine ...
Adaptation of professional skills in the unit operations laboratory
(2012)
We introduce the design of three consecutive unit operations laboratory (UOL) courses that retain the academic rigor of the course while incorporating skills essential for professional careers, such as ability to propose ...
On the VC-dimension of univariate decision trees
(2012)
In this paper, we give and prove lower bounds of the VC-dimension of the univariate decision tree hypothesis class. The VC-dimension of the univariate decision tree depends on the VC-dimension values of its subtrees and ...
Robust stability analysis of a class of delayed neural networks
(2012)
This paper studies the global robust stability of delayed neural networks. A new sufficient condition that ensures the existence, uniqueness and global robust asymptotic stability of the equilibrium point is presented. The ...
A numerical solution of an inverse parabolic problem
(Işık University Press, 2012-05-07)
In this paper, we will first study the existence and uniqueness of the solution of an inverse problem for a linear equation with non-linear boundary conditions (radiation terms), via an auxiliary problem. Furthermore, a ...