Başlık için Bildiri Koleksiyonu listeleme
Toplam kayıt 113, listelenen: 21-40
-
The comparison of A* algorithm and Ant Colonial Optimization for mobile traveler application [Mobil Gezgin Uygulamasi için A* Algoritmasi ve Karinca Kolonisi Optimizasyonu Karşilaştirilmasi]
(Institute of Electrical and Electronics Engineers Inc., 2015)In this paper, a route planning application has been developed for mobile devices. The goal was to select the algorithm that computes the route in the shortest amount of time. To this end, a database containing information ... -
Comparison of Feature Extraction Techniques for Handwriting Recognition
(IEEE, 2018)Feature extraction is an important phase for image processing purposes since the output of the feature extraction is the input for classifiers. The importance of it applies to handwriting recognition problem, too. Distinctive ... -
A Comparison of Relational Databases and Information Retrieval Libraries on Turkish Text Retrieval
(IEEE, 2008)The present work covers a comparison of the text retrieval performances of relational databases and IR Systems over a TREC-like test collection for Turkish. The effects of language specific preprocessing and different query ... -
A comparison of relational databases and information retrieval libraries on turkish text retrieval
(2008)The present work covers a comparison of the text retrieval performances of relational databases and IR Systems over a TREC-like test collection for Turkish. The effects of language specific preprocessing and different query ... -
Comparison of Three Search Algorithms for Mobile Trip Planner for Eskisehir City
(IEEE, 2015)The comparison of three searching algorithms; A*, Ant Colony Optimization and Genetic Algorithms to solve the Traveler Salesman Problem for a mobile trip planning application for Eskisehir City, Turkey, is presented in ... -
Corner detection via trilateral filtering of chain codes
(2011)Contours are the most common feature used in the shape detection and recognition applications. Contours in digital images constitute of consecutive pixels, thus they can be represented with chain codes by encoding the ... -
Corner detection with bilateral filtering of freeman codes [Freeman kodlarinin çi·ft-yönlü süzgeç lenmesi· i·le köşe tespi·ti·]
(2011)Shape contours are one of the most widely used features in the shape detection and recognition applications. A contour can be represented by the chain code which is obtained by coding the relative directions of the elements ... -
Design and implementation of a bandwidth sensitive distributed continuous media file system using the fibre channel network
(Springer-Verlag Berlin, 2005)With the advent of Storage Area Networks (SAN) and Network Attached Disks (NASD), a new trend in storage systems design is to move disks from behind storage servers and attach them to a SAN for direct client access. Such ... -
Detection of SMS spam messages on mobile phones [Mobi·l telefonlarda i·stenmeyen SMS mesajlarinin beli·rlenmesi·]
(2012)In this study, a novel "SMS spam message filter" utilizing effective feature selection and pattern classification techniques is proposed. The proposed filter detects and filters out SMS spam messages in a smart manner ... -
Document Embedding Approach for Efficient Authorship Attribution
(IEEE, 2017)Authorship attribution has been well studied in terms of text classification with many diverse feature sets. However, finding topic independent features is hard and trained models with hand crafted features in one domain ... -
Dynamic Fuzzy System Design for Modeling and Control of Nonlinear Dynamical Processes
(IEEE, 2015)This paper introduces the architecture and learning procedure of dynamic fuzzy system (DFS) and its control application with linear quadratic regulator (LQR). Our DFS model is a Takagi-Sugeno type fuzzy system. IF parts ... -
Early detection of breast cancer using mathematical morphology
(Springer-Verlag Berlin, 2004)In this paper a method for detection of microcalcifications (MCCs), which appear at the beginning stages of breast cancer, is presented by using mathematical morphology. This method consists of four steps. At the first ... -
ECG Based Biometric Authentication Using Ensemble of Features
(IEEE, 2014)In this work, the efficacy of various features on electrocardiogram (ECG) based biometric authentication process is thoroughly examined. In particular, the features acquired from temporal analysis, wavelet transformation, ... -
Edcircles: Real-Time Circle Detection By Edge Drawing (Ed)
(IEEE, 2012)We propose a real-time, parameter-free circle detection algorithm that produces accurate results with very few false positives. The algorithm makes use of the contiguous (connected) set of edge segments produced by our ... -
Edcontours: High-Speed Parameter-Free Contour Detecton Using Edpf
(IEEE, 2012)We present a high-speed contour detector, which we name EDContours, that works by running our real-time parameter-free edge segment detector, Edge Drawing Parameter Free (EDPF), at different scale-space representations of ... -
Edge drawing: A heuristic approach to robust real-time edge detection
(2010)We propose a new edge detection algorithm that works by computing a set of anchor edge points in an image and then linking these anchor points by drawing edges between them. The resulting edgemap consists of perfect ... -
Edlines: Real-Time Line Segment Detection By Edge Drawing (Ed)
(IEEE, 2011)We propose a linear time line segment detector that gives accurate results, requires no parameter tuning, and runs up to 11 times faster than the fastest known line segment detection algorithm in the literature; namely, ... -
Effects of Inconsistently Masked Data Using RPT on CF with Privacy
(Assoc Computing Machinery, 2007)Randomized perturbation techniques (RPT) are applied to perturb the customers' private data to protect privacy while providing accurate referrals. In the RPT-based collaborative filtering (CF) with privacy schemes, proposed ... -
Effects of inconsistently masked data using RPT on CF with privacy
(2007)Randomized perturbation techniques (RPT) are applied to perturb the customers' private data to protect privacy while providing accurate referrals. In the RPT-based collaborative filtering (CF) with privacy schemes, proposed ... -
Efficient Integrity Verification for Outsourced Collaborative Filtering
(IEEE, 2014)Collaborative filtering (CF) over large datasets requires significant computing power. Due to this data owning organizations often outsource the computation of CF (including some abstraction of the data itself) to a public ...