Now showing items 1-20 of 195

    • Dönerkanat tipinde bir insansız hava aracının tasarımı, modellenmesi ve kontrolü 

      Önkol, Mert (TOBB Ekonomi ve Teknoloji Üniversitesi - Fen Bilimleri Enstitüsü - Elektrik-Elektronik Mühendisliği Anabilim Dalı - Kontrol ve Otomasyon Mühendisliği Bilim Dalı, 2010)
      Bu tez çalışması dönerkanat tipinde bir insansız hava aracının modellenmesini, tasarımını ve kontrolünü ele almaktadır. Dönerkanat dinamik modeli Newton-Euler yöntemi yardımıyla türetilmiş ve model katsayıları gerçek zamanlı ...
    • Dynamic server allocation for unstable queueing networks with flexible servers 

      Tekin, Salih; Andradottir, Sigrun; Down, Douglas G. (Springer, 2012-01)
      This paper is concerned with the dynamic assignment of servers to tasks in queueing networks where demand may exceed the capacity for service. The objective is to maximize the system throughput. We use fluid limit analysis ...
    • Improving Positive Unlabeled Learning Algorithms for Protein Interaction Prediction 

      Pancaroglu, Doruk; Tan, Mehmet (SPRINGER-Verlag Berlin, 2014)
      In binary classification, it is sometimes difficult to label two training samples as negative. The aforementioned difficulty in obtaining true negative samples created a need for learning algorithms which does not use ...
    • IEEE 802.11 WLAN Based Real Time Indoor Positioning: Literature Survey and Experimental Investigations 

      Kul, Gokhan; Özyer, Tansel; Tavlı, Bülent (ELSEVIER Science BV, 2014)
      Indoor positioning has emerged as a hot topic that gained gradual interest from both academia and industry. Accurate estimation is necessitated in a variety of location-based services such as healthcare, repository tracking, ...
    • Why the Names? Anubanini and His Clan in the Cuthaean Legend 

      Adalı, Selim Ferruh; Demirci, Muhammed Fatih; Özbayoğlu, Ahmet Murat; Ergin, Oğuz (2014)
      This article is a study of the ancient Mesopotamian literary text known as the 'Cuthaean Legend'. This Naram-Sin legend is known from several versions in the extant cuneiform corpus of texts (Westenholz 1997). The names ...
    • Towards Automatic Detection of Child Pornography 

      Sae-Bae, Napa; Sun, Xiaoxi; Sencar, Hüsrev Taha; Memon, Nasir D. (IEEE, 2014)
      This paper presents a child pornographic image detection system that identifies human skin tones in digital images, extracts features to detect explicit images and performs facial image based age classification. The novelty ...
    • Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing 

      Uzunay, Yusuf; Bıçakçı, Kemal (IEEE, 2014)
      The main goal in the design of ThreeBallot system was to provide an end-to-end auditable voting system in a simple way without use of cryptography to bolster voter confidence in the system. However, later it was shown that ...
    • Efficient Shape Recognition with Skeleton Filling Rate 

      Sirin, Yahya; Demirci, Muhammed Fatih (IEEE, 2014)
      As an increasing number of digital images are generated, a demand for an efficient and effective image retrieval mechanisms grows. In this work, we present a new skeleton-based shape retrieval algorithm, which starts by ...
    • On Partial Vertex Cover and Budgeted Maximum Coverage Problems in Bipartite Graphs 

      Çaşkurlu, Buğra; Mkrtchyan, V.; Parekh, O; Subramani, K. (Springer Verlag, 2014)
      Graphs are often used to model risk management in various systems. Particularly, Caskurlu et al. in [6] have considered a system which essentially represents a tripartite graph. The goal in this model is to reduce the ...
    • TN-RSI: Trend-Normalized RSI indicator for Stock Trading Systems with Evolutionary Computation 

      Sahin, Ugur; Özbayoğlu, Ahmet Murat (ELSEVIER Science BV, 2014)
      RSI is a commonly used indicator preferred by stock traders. However, even though it works well when the market is trendless, during bull or bear market conditions (when there is a clear trend) its performance degrades. ...
    • GPU based Parallel Image Processing Library for Embedded Systems 

      Cavus, Mustafa; Sumerkan, Hakki Doganer; Simsek, Osman Seckin; Hassan, Hasan; Yaglikci, Abdullah Giray; Ergin, Oğuz (IEEE, 2014)
      Embedded image processing systems have many challenges, due to large computational requirements and other physical, power, and environmental constraints. However recent contemporary mobile devices include a graphical ...
    • Mobile Authentication Secure Against Man-In-The-Middle Attacks 

      Bıçakçı, Kemal; Unal, Devrim; Ascioglu, Nadir; Adalier, Oktay (ELSEVIER Science BV, 2014)
      Current mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle ...
    • Drug sensitivity prediction for cancer cell lines based on pairwise kernels and miRNA profiles 

      Tan, Mehmet (IEEE, 2014)
      Cancer cell lines comprise an important tool to design and evaluate new drug candidates. Prediction of in vivo drug response for cancer cell lines has become attractive due to recently issued large scale drug screen ...
    • Ontology-centric Data Modelling and Decision Support in Smart Grid Applications A Distribution Service Operator Perspective 

      Dogdu, Erdogan; Özbayoğlu, Ahmet Murat; Benli, Okan; Akinc, Hulya Erdener; Erol, Erdeniz; Atasoy, Tugrul; Gurec, Ozan; Ercin, Ozden (IEEE, 2014)
      Conventional electricity distribution grids are getting smarter by coupling operation technologies with advanced information and communication technologies (ICT). This provides a better, reliable, cost effective and efficient ...
    • Communication / Computation Trade-offs in Wireless Sensor Networks: Comparing Network-Level and Node-Level Strategies 

      Yildiz, Huseyin Ugur; Bıçakcı, Kemal; Tavlı, Bülent (IEEE, 2014)
      In wireless sensor networks, nodes having limited battery resources convey data to an energy-unconstrained base station. The amount of data transmitted by a node usually depends on how much local processing is performed. ...
    • Anonymity in Multi-Instance Micro-Data Publication 

      Abul, Osman (SPRINGER, 2014)
      In this paper we study the problem of anonymity in multi-instance (MI) micro-data publication. The classical k-anonymity approach is shown to be insufficient and/or inappropriate for MI databases. Thus, it is extended to ...
    • Exploiting a Fast and Simple ECC for Scaling Supply Voltage in Level-1 Caches 

      Yalcin, Gulay; Islek, Emrah; Tozu, Oyku; Reviriego, Pedro; Crista, Adrian; Unsall, Osman S.; Ergin, Oğuz (IEEE, 2014)
      Scaling supply voltage to near-threshold is a very effective approach in reducing the energy consumption of computer systems. However, executing below the safe operation margin of supply voltage introduces high number of ...
    • A Multi-Agent System Model for Partner Selection Process in Virtual Enterprise 

      Sadigh, B. Lotfi; Arikan, F.; Özbayoğlu, Ahmet Murat; Ünver, Hakkı Özgür; Kilic, S. E. (ELSEVIER Science BV, 2014)
      Virtual Enterprise (VE) is a collaboration model between multiple business partners in a value chain. VE information system deals with highly dynamic information from heterogeneous data sources. In order to manage and store ...
    • The Impact of Bandwidth Constraints on the Energy Consumption of Wireless Sensor Networks 

      Cotuk, Huseyin; Tavlı, Bülent; Bıçakcı, Kemal; Akgün, Mehmet Burak (IEEE, 2014)
      Optimization of flows to maximize Wireless Sensor Network (WSN) lifetime is a problem already investigated in various aspects. However, most studies ignored the effects of finite bandwidth. As source data rate of sensor ...
    • Skeleton Filling Rate for Shape Recognition 

      Sirin, Yahya; Demirci, Muhammed Fatih (IEEE Computer SOC, 2014)
      As an increasing number of digital images are generated, a demand for an efficient and effective image retrieval mechanisms grows. In this work, we present a new skeleton-based shape retrieval algorithm, which starts by ...