Güncel Gönderiler

  • Fabric defect detection in frequency domain using fourier analysis 

    Titrek, Nuri Gökay (Işık Üniversitesi, 2016)
    An overwhelming majority of image processing based defect detection approaches rely on machine learning methods to train a model for comparison of test examples. This requires a training phase for each item to be learned ...
  • A model for corporate e-learning: Learnomotive 

    Cansun, Resmiye Ece (Işık Üniversitesi, 2008-09-17)
    Enterprises with dynamic business processes have training needs that should be addressed innovatively. Depending on the business process, new tasks may be constructed. The competence level differences between workers may ...
  • A mobile haemodialysis patient care expert system 

    Yılmaz, Elif Banu (Işık Üniversitesi, 2005)
    A mobile haemodialysis patient care expert system is explaining the situations and their treatments which required urgent enterprise during the interval of the two hemodialysis sessions. The user of this system is the adult ...
  • Differentially private attribute selection for classification 

    Var, Esra (Işık Üniversitesi, 2015-06-18)
    Any study on processing or analyzing large data sets that contain personally sensitive data should conform against some form of privacy protection mechanism. Otherwise, malicious people can aceess these data sets to extract ...
  • Mathematical modeling of human facial muscles 

    Ağdoğan, Didem (Işık Üniversitesi, 2015-08-10)
    In this study; a new muscle model is proposed for computation of actual muscle forces that exist during facial expressions. Modeling of facial muscle forces is done on the expression of surprise. We choose this expression ...
  • Improved microphone array design with statistical speaker identification methods 

    Demir, Kadir Erdem (Işık Üniversitesi, 2016-05-17)
    Conventional microphone array implementations aim to lock onto a source with given location and if required, tracking it. This implementation is straightforward when the location or the path of the sourceand interference ...
  • Author identification of newspaper columns using style and semantic features 

    Yıldız, Ergin Doğan (Işık Üniversitesi, 2016-05-17)
    This study has two major purposes : to implement and compare the author classification results of di erent Naive Bayes Classi ers, and to investigate whether merging individual methods will increase classi cation success ...
  • Detecting facial features automatically 

    Olzvoi, Uranchimeg (Işık Üniversitesi, 2013-07-02)
    There are many algorithms and approaches in object detection world. Many of them are based on Viola Jones algorithm. According to our observations, the features which help to detect an object are very critical for the ...
  • Design and implementation of a software agent platform applied in e-learning and course management 

    Erdoğan, Gürol (Işık Üniversitesi, 2004)
    In this thesis, we report an experience on constructing a software agent platform for development and implementation of software agent systems running with integrated e-learning and course management applications which are ...
  • Database design and implementation issues in Library Domain 

    Arsun, Onur İhsan (Işık Üniversitesi, 2006)
    In this thesis, we study the design and implementation issues in library management systems. Depending heavily on data, library management systems should have effective means to access and store data. We propose a novel ...
  • Distributed iterative cluster localization in wireless sensor networks 

    Olca Arda, Çakıroğlu (Işık Üniversitesi, 2009-01-07)
    We designed a distributed algorithm for iterative cluster localization. Because this algorithm is especially designed for large scale networks, increase in the number of sensor nodes has no ine ciency e ect on sensor node ...
  • Data collection and analysis on vanet 

    Karatoy, Hilal (Işık Üniversitesi, 2009-02-01)
    The communication between devices is provided by wireless networks and it is growing rapidly, dependent on the needs. Wireless networks strike the attention of people throughout the world, and the ad hoc network is part ...
  • Data access layer code generators 

    Küçükeren, Gökçe (Işık Üniversitesi, 2006)
    Layering techniques are commonly used in order to supply the operational requirements of today's complex enterprise applications. The codes developed for the Data Access Layer (DAL), which is the foundation of most layered ...
  • Cost sensetive learning algorithms 

    Köse, Gülay (Işık Üniversitesi, 2008)
    This thesis studies the cost sensitive learning algorithms that calculate the class learning algorithms errors and costs. Data mining is the automated extraction of hidden predictive information from databases that can be ...
  • A new priority based packet scheduler with deadline considerations 

    Gökgöl, Oral (Işık Üniversitesi, 2006)
    Quality of Services (QoS) issues have become a focus point of research on Next Generation Networks (NGNs). In order to supply the various QoS requirements for different kinds of applications, new packet scheduling policies ...
  • Cased based approach to semantic web 

    Demirel, Pınar (Işık Üniversitesi, 2005)
    World Wide Web (WWW, Web) presents an incredibly rich medium for information sharing and communication. Most, if not all, of the applications utilizing WWW transforms information through HyperText Markup Language (HTML) ...
  • Automatic music transcription 

    Paşmakoğlu, Berk Ekim (Işık Üniversitesi, 2010)
    Computational music research is spread out of the world in many fields. One of these fields is automatic music transcription. During this thesis, we concentrated on the detection of music notes inside an audio signal. We ...
  • Improving search engine performance with context extraction using lucence, dbpedia-spotlight, and wordnet 

    Düzağaç, Remzi (Işık Üniversitesi, 2014)
    Search engines are common tools which retrieve information from considerable amount of data according to the user needs. The data size that needs to be handled and retrieving relevant information, are the main problems of ...
  • Project workspace: a computer supported collorative work tool for software project development 

    Çoruh, Tuncay (Işık Üniversitesi, 2005)
    Software project development is a very serious job. Most of the project budgets are very big and most of them do not finish. So,the need to improve our software development processes is very real.Development side is not ...
  • Performance and security issues in e-payment systems: pay on-line case 

    Karahasan, Orhan (Işık Üniversitesi, 2006)
    In this thesis, we report an experience on Performance and Security issues in E-Payment systems. We develop an E-Payment system which covers all introduced performance and security measures written in this thesis. We also ...

Daha Fazla