Now showing items 1-10 of 1508
Improving skeletal shape abstraction using multiple optimal solutions
Shape abstraction is an important problem faced by researchers in many fields such as pattern recognition, computer vision, and industrial design. A recently-developed previous shape abstraction framework (Demirci et al. ...
Çebiş Evi’nden Hisartepe’ye
(TMMOB Mimarlar Odası İstanbul Büyükkent Şubesi, 2019)
[No abstract available]
Güncel Mimarlıkta “Özgün Kopya” Kavramı
(Altınbaş Üniversitesi, 2017-03)
Tarihin her döneminde olduğu gibi bugünlerde de mimarlık gündemi, doğası gereği zamanına biçim veren teknolojik, politik, ekonomik, kültürel etkenlerin gelişim ve dönüşümleri bağlamında farklılaşmaktadır. Özellikle teknoloji ...
Downlink MU-MIMO With QoS Aware Transmission: Precoder Design and Performance Analysis
(Institute of Electrical and Electronics Engineers Inc., 2019-02)
In this paper, a downlink wireless communication channel is considered. The base station (BS) has common data for all users, unicast data for a set of intended users, and transmits the superposition of these messages. This ...
Sparsity based off-grid blind sensor calibration
(Elsevier Inc., 2019-06)
Compressive Sensing (CS) based techniques generally discretize the signal space and assume that the signal has a sparse support restricted on the discretized grid points. This restriction of representing the signal on a ...
Türkiye’de Dijital Dönüşüm Ve Dijital Okuryazarlık
(Türkiye Cumhuriyeti İçişleri Bakanlığı, 2019-06)
In today’s world where the new is discussed against the traditional one, the access to information sources has created different settings in which the ability of digital literacy is regarded as a separate ability. Adapting ...
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services
(Springer London ltd., 2015-12)
Several techniques have been recently proposed to protect user location privacy while accessing location-based services (LBSs). However, applying these techniques to protect location privacy for a group of users would lead ...
The Architect of Today on The Edge of Chaos; An Approach Through Chaos Theory
(Gazi University, 2017-02)
Today, in the frame of the transformation of the city and the social dynamics, there can be seen a congestion and repetition in the context of the city/citizen/architecture. It is possible to examine the spatial consequences ...
Exploiting processor features to implement error detection in reduced precision matrix multiplications
Modern processors incorporate complex arithmetic units that can work with large word-lengths. Those units are useful for applications that require high precision. There are however, many applications for which the use of ...
Exploiting Existing Comparators for Fine-Grained Low-Cost Error Detection
(ASSOC Computing Machinery, 2014-10)
Fault tolerance has become a fundamental concern in computer design, in addition to performance and power. Although several error detection schemes have been proposed to discover a faulty core in the system, these proposals ...