Erişim şekli için "info:eu-repo/semantics/openAccess" Yüksek Lisans / Master's Programs listeleme
Toplam kayıt 146, listelenen: 21-40
-
A combined algorithm for placement of rectangular vehicles in a ferry
(Işık Üniversitesi, 2013-06-14)Management of inland maritime transportation is an important task since it has a costly operation environment, as well as public service responsibility with safety and speed concerns. A typical operation involves multiple ... -
Compress and forward based cooperation strategies in wireless networks
(Işık Üniversitesi, 2011-09-09)Cooperative Communications are emerging as an alternative technology to MIMO Communications. In this thesis, we first summarize information theoretical anal- ysis of known channel types and also consider three fundamental ... -
Compression of the mammography images using quadtree based energy and pattern blocks
(Işık Üniversitesi, 2017-01-16)Medical images, like any other digital data, require compression in order to reduce disk space needed for storage and time needed for transmission. This thesis offers , a novel image compression method based on generation ... -
A computer aided learning application in industrial engineering
(Işık Üniversitesi, 2013-08-28)Learning is the most central process in education where it's essential outcome being the assimilation of new skills, abilities, perspectives, attitudes, and knowledge. Learning is a life-long quest that is vital in today's ... -
Construction of multivariable broadband matching networks : an integrated design tool
(Işık Üniversitesi, 2009)One of the major problems in high frequency applications is designing matching circuits. Real frequency design of broadband matching networks is a commonly preferred approach since experimental termination data is directly ... -
A cooperative communication approach to cognitive radio
(Işık Üniversitesi, 2011-09-12)Cognitive radio, whose main idea is to have intelligent devices utilize the linı- ited resources, such as frequency spectrum in wireless channels, is becoming a groundbreaking technology. The aim of this thesis is to apply ... -
Cost sensitive learning algorithms
(Işık Üniversitesi, 2008)This thesis studies the cost sensitive learning algorithms that calculate the class learning algorithms errors and costs. Data mining is the automated extraction of hidden predictive information from databases that can be ... -
Data access layer code generator
(Işık Üniversitesi, 2006)Layering techniques are commonly used in order to supply the operational requirements of today's complex enterprise applications. The codes developed for the Data Access Layer (DAL), which is the foundation of most layered ... -
Data collection and analysis on vanet
(Işık Üniversitesi, 2009-02-01)The communication between devices is provided by wireless networks and it is growing rapidly, dependent on the needs. Wireless networks strike the attention of people throughout the world, and the ad hoc network is part ... -
Data compression for smart grid infrastructure
(Işık Üniversitesi, 2018-01-15)Embedded systems, which work with large data sets, need larger memory and consume much more data traffc when compared to other IOT (Interne Of Things) devices. In this study, Human's Lossless Compression Algorithm is ... -
Database design and implementation issues in library domain
(Işık Üniversitesi, 2006-07)In this thesis, we study the design and implementation issues in library management systems. Depending heavily on data, library management systems should have effective means to access and store data. We propose a novel ... -
Deep learning techniques for building density estimation from remotely sensed imagery
(Işık Üniversitesi, 2019-04-05)This thesis is about point-wise estimation of building density on the remote sensing optical imageries by applying deep learning methods. The goal of the project is to reduce mean square error of the estimated density by ... -
Design and implementation of a software agent platform applied in E-learning and course management
(Işık Üniversitesi, 2004-08)In this thesis, we report an experience on constructing a software agent platform for development and implementation of software agent systems running with integrated e-learning and course management applications which are ... -
Design of reed-solomon and convolutional coded OFDM system and performance analysis
(Işık Üniversitesi, 2003)In this study, OFDM and error-correcting codes, which have an important place in digital communication systems, have been studied. Literature research has been made on OFDM and error-correcting codes like Reed-Solomon and ... -
Designing innovative applications using near field communications (NFC) technology
(Işık Üniversitesi, 2012-01-26)Nowadays, there is a growing interest on rapid development and adoption of information technologies (IT) especially in contactless smart cards and mobile communication technologies. Near Field Communication (NFC) technology ... -
Detecting facial features automatically
(Işık Üniversitesi, 2013-07-02)There are many algorithms and approaches in object detection world. Many of them are based on Viola Jones algorithm. According to our observations, the features which help to detect an object are very critical for the ... -
Determining the opinion leaders in online social networks
(Işık Üniversitesi, 2014-06-12)As online social networks have become the most visited web portals, marketing professionals are having more attention over them. Besides advertising options of the OSNs, advertisers try to leverage content marketing by ... -
Development of an electronics mail environment with NFC technology extension
(Işık Üniversitesi, 2010-01-12)E-mail is one of today's widely used communication tools. Mobility, which is defined as being free from any geographical restrictions to make use of any service, is a very important requirement for the users to access ... -
Differentially private attribute selection for classification
(Işık Üniversitesi, 2015-06-18)Any study on processing or analyzing large data sets that contain personally sensitive data should conform against some form of privacy protection mechanism. Otherwise, malicious people can aceess these data sets to extract ... -
Dilemma between security and privacy on the internet
(Işık Üniversitesi, 2005-07-31)In this thesis, the following issues are discussed. Even in today society, it is hard to talk about security and privacy. And no one can imagine what will be structure of tomorrow society. We study what are the internet ...