7 sonuçlar
Arama Sonuçları
Listeleniyor 1 - 7 / 7
Yayın Co-registration of surfaces by 3D least squares matching(Amer Soc Photogrammetry, 2010-03) Akça, Mehmet DevrimA method for the automatic co-registration of 3D surfaces is presented. Die method utilizes the mathematical model of Least Squares 2D image matching and extends it for solving the 3D surface matching problem The transformation parameters of the search surfaces are estimated with respect to a template surface. The solution is achieved when the sum of the squares of the 3D Spatial (Euclidean) distances between the surfaces are minimized. The parameter estimation is achieved using the Generalized Gauss-Markov model. Execution level implementation details are given. Apart from the co-registration of the point clouds generated from spacaborne airborne and terrestinal sensors and techniques. the proposed method is also useful for change detection, 3D comparison, and quality assessment tasks Experiments, terrain data examples show file capabilities of the method.Yayın A tokenization-based communication architecture for HCE-Enabled NFC services(Hindawi Publishing Cor, 2016) Özdenizci Köse, Büşra; Ok, Kerem; Coşkun, VedatFollowing the announcement of Host Card Emulation (HCE) technology, card emulation mode based Near Field Communication (NFC) services have gained further appreciation as an enabler of the Cloud-based Secure Element (SE) concept. A comprehensive and complete architecture with a centralized and feasible business model for diverse HCE-based NFC services will be highly appreciated, particularly by Service Providers and users. To satisfy the need in this new emerging research area, a Tokenization-based communication architecture for HCE-based NFC services is presented in this paper. Our architecture proposes Two-Phased Tokenization to enable the identity management of both user and Service Provider. NFC Smartphone users can store, manage, and make use of their sensitive data on the Cloud for NFC services; Service Providers can also provide diverse card emulation NFC services easily through the proposed architecture. In this paper, we initially present the Two-Phased Tokenization model and then validate the proposed architecture by providing a case study on access control. We further evaluate the usability aspect in terms of an authentication scheme. We then discuss the ecosystem and business model comprised of the proposed architecture and emphasize the contributions to ecosystem actors. Finally, suggestions are provided for data protection in transit and at rest.Yayın Quantum fisher information of several qubitsin the superposition of A GHZ and two W stateswith arbitrary relative phase(Springer/Plenum Publishers, 2014-09) Özaydın, Fatih; Altıntaş, Azmi Ali; Buğu, Sinan; Yeşilyurt, Can; Arık, MetinWe study the quantum Fisher information (QFI) of a system of several particles which is in a superposition of a GHZ and two W states with arbitrary relative phase. We show that as the number of particles increases from 3 to 4, the behavior of QFI drastically changes. We also show how the dependence of QFI on the relative phase weakens as the number of particles increases. We also analyze the QFI for the state for several instances of N due to the change of the relative phases.Yayın On the analysis of expected distance between sensor nodes and the base station in randomly deployed WSNs(Springer Verlag, 2014) Sevgi, Cüneyt; Ali, Syed AmjadIn this study, we focus on the analytical derivation of the expected distance between all sensor nodes and the base station (i.e., E[dtoBS]) in a randomly deployed WSN. Although similar derivations appear in the related literature, to the best of our knowledge, our derivation, which assumes a particular scenario, has not been formulated before. In this specific scenario, the sensing field is a square-shaped region and the base station is located at some arbitrary distance to one of the edges of the square. Having the knowledge of E[dtoBS] value is important because E[dtoBS] provides a network designer with the opportunity to make a decision on whether it is energy-efficient to perform clustering for WSN applications that aim to pursue the clustered architectures. Similarly, a network designer might make use of this expected value during the process of deciding on the modes of communications (i.e., multi-hop or direct communication) after comparing it with the maximum transmission ranges of devices. Last but not least, the use of our derivation is not limited to WSN domain. It can be also exploited in any domain when there is a need for a probabilistic approach to find the average distance between any given number of points which are all assumed to be randomly and uniformly located in any square-shaped region and at a specific point outside this region.Yayın Comparison of evolutionary techniques for Value-at-Risk calculation(Springer-Verlag Berlin, 2007) Uludağ, Gönül; Etaner Uyar, Ayşe Şima; Senel, Kerem; Dağ, HasanThe Value-at-Risk (VaR) approach has been used for measuring and controlling the market risks in financial institutions. Studies show that the t-distribution is more suited to representing the financial asset returns in VaR calculations than the commonly used normal distribution. The frequency of extremely positive or extremely negative financial asset returns is higher than that is suggested by normal distribution. Such a leptokurtic distribution can better be approximated by a t-distribution. The aim of this study is to asses the performance of a real coded Genetic Algorithm (CA) with Evolutionary Strategies (ES) approach for Maximum Likelihood (ML) parameter estimation. Using Monte Carlo (MC) simulations, we compare the test results of VaR simulations using the t-distribution, whose optimal parameters are generated by the Evolutionary Algorithms (EAs), to that of the normal distribution. It turns out that the VaR figures calculated with the assumption of normal distribution significantly understate the VaR figures computed from the actual historical distribution at high confidence levels. On the other hand, for the same confidence levels, the VaR figures calculated with the assumption of t-distribution are very close to the results found using the actual historical distribution. Finally, in order to speed up the MC simulation technique, which is not commonly preferred in financial applications due to its time consuming algorithm, we implement a parallel version of it.Yayın Quantum fisher information of a 3 x 3 bound entangled state and its relation with geometric discord(Springer/Plenum Publishers, 2015-09) Özaydın, FatihRecent studies on quantum Fisher information (QFI) have been focused mostly on qubit systems within the context of how entanglement helps surpassing the classical limit of separable states and the limit that a given entangled system can achieve for parameter estimation. However, there are only a few works on bound entangled systems. In this work, we study the QFI of a system of the smallest dimension that bound entanglement can be observed: A bipartite quantum system of two particles of three-levels each. An interesting property of this state is that depending only on a parameter, the state can be separable, bound entangled or free entangled. We show that QFI exhibits a smooth and continues increase with respect to this parameter throughout the transition from separable to bound entangled and from bound entangled to free entangled regions. We show that in any region, this state is not useful for sub-shot noise interferometry. We also relate the QFI of this state with its geometric discord and show how these two properties exhibit a similar behavior throughout this transition.Yayın Thermochemical conversion of bean pods to carbon materials and gas(Freund Publishing House Ltd, 2008) Ekinci, Ekrem; Budinova, Temenuzhka K.; Tsyntsarski, Boyko G.; Petrova, Bilyana N.; Yardım, Mehmet Ferhat; Cabal, Belén; Ania, Conchi O.; Parra, Jose B.The preparation of activated carbons from bean pods by chemical (K(2)CO(3)) and physical (water vapor) activation was investigated. The carbon prepared by chemical activation presented more developed porous structure than one obtained by water vapor activation. Carbon adsorbent with very low ash content and developed micropore structure is obtained by thermochemical treatment with conc.H(2)SO(4) of liquid products from carbonization of bean pods and activation with water vapour.












