Ara
Toplam kayıt 146, listelenen: 121-130
Data access layer code generator
(Işık Üniversitesi, 2006)
Layering techniques are commonly used in order to supply the operational requirements of today's complex enterprise applications. The codes developed for the Data Access Layer (DAL), which is the foundation of most layered ...
Data collection and analysis on vanet
(Işık Üniversitesi, 2009-02-01)
The communication between devices is provided by wireless networks and it is growing rapidly, dependent on the needs. Wireless networks strike the attention of people throughout the world, and the ad hoc network is part ...
Cost sensitive learning algorithms
(Işık Üniversitesi, 2008)
This thesis studies the cost sensitive learning algorithms that calculate the class learning algorithms errors and costs. Data mining is the automated extraction of hidden predictive information from databases that can be ...
A new priority based packet scheduler with deadline considerations
(Işık Üniversitesi, 2006)
Quality of Services (QoS) issues have become a focus point of research on Next Generation Networks (NGNs). In order to supply the various QoS requirements for different kinds of applications, new packet scheduling policies ...
Improved microphone array design with statistical speaker identification methods
(Işık Üniversitesi, 2016-05-17)
Conventional microphone array implementations aim to lock onto a source with given location and if required, tracking it. This implementation is straightforward when the location or the path of the sourceand interference ...
Mathematical modeling of human facial muscles
(Işık Üniversitesi, 2015-08-10)
In this study; a new muscle model is proposed for computation of actual muscle forces that exist during facial expressions. Modeling of facial muscle forces is done on the expression of surprise. We choose this expression ...
Detecting facial features automatically
(Işık Üniversitesi, 2013-07-02)
There are many algorithms and approaches in object detection world. Many of them are based on Viola Jones algorithm. According to our observations, the features which help to detect an object are very critical for the ...
Author identification of newspaper columns using style and semantic features
(Işık Üniversitesi, 2016-05-17)
This study has two major purposes : to implement and compare the author classification results of di erent Naive Bayes Classi ers, and to investigate whether merging individual methods will increase classi cation success ...
Differentially private attribute selection for classification
(Işık Üniversitesi, 2015-06-18)
Any study on processing or analyzing large data sets that contain personally sensitive data should conform against some form of privacy protection mechanism. Otherwise, malicious people can aceess these data sets to extract ...
Distributed iterative cluster localization in wireless sensor networks
(Işık Üniversitesi, 2009-01-07)
We designed a distributed algorithm for iterative cluster localization. Because this algorithm is especially designed for large scale networks, increase in the number of sensor nodes has no ine ciency e ect on sensor node ...