Search
Now showing items 11-20 of 36
Evaluation of partner companies based on fuzzy inference system for establishing virtual enterprise consortium
(Springer Verlag, 2015)
Virtual Enterprise (VE) is one of the growing trends in agile manufacturing concepts. Under this platform companies with different skills and core competences are cooperate with each other in order to accomplish a manufacturing ...
Informatics olympiads in Turkey: Team selection and training
(Vilnius University, 2015)
In this country report, we present the yearly activities related to Turkish team selection and training for national and international olympiads in informatics. First, we outline the organizational structure and describe ...
High quality clustering of big data and solving empty-clustering problem with an evolutionary hybrid algorithm
(IEEE, 2015)
Achieving high quality clustering is one of the most well-known problems in data mining. k-means is by far the most commonly used clustering algorithm. It converges fairly quickly, but achieving a good solution is not ...
Generalized Class Representative Computation with Graph Embedding and Clustering
(IEEE, 2015)
In this paper, we propose an object category representation framework by first showing objects as graph structures and embedding graphs into vector spaces for color object recognition. The object categories are then built ...
Evaluating energy cost of route diversity for security in wireless sensor networks
(Elsevier, 2015-03)
Route diversity improves the security of Wireless Sensor Networks (WSNs) against adversaries attempting to obtain sensitive sensor data By limiting the fraction of data relayed over each link and/or routed through each ...
Prediction of influenza outbreaks by integrating Wikipedia article access logs and Google flu trend data
(Institute of Electrical and Electronics Engineers Inc., 2015-12-28)
Prediction of influenza outbreaks is of utmost importance for health practitioners, officers and people. After the increasing usage of internet, it became easier and more valuable to fetch and process internet search query ...
Sensor Fingerprint Identification Through Composite Fingerprints and Group Testing
(IEEE-INST Electrical Electronics Engineers Inc., 2015-03)
The photo response non-uniformity noise associated with an imaging sensor has been shown to be a unique and persistent identifier that can be treated as the sensor's digital fingerprint. The method for attributing an image ...
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services
(Springer London ltd., 2015-12)
Several techniques have been recently proposed to protect user location privacy while accessing location-based services (LBSs). However, applying these techniques to protect location privacy for a group of users would lead ...
Using Value Similarity of Registers for Soft Error Mitigation
(IEEE, 2015)
Soft errors caused by the cosmic particles or the radiation from the packaging material of the integrated circuits are an increasingly important design problem. With the shrinking feature sizes, the datapath components of ...
3D Shape Recognition: Enhanced Skeletal Points
(IEEE, 2015)
Digital video production is increasing day after day and the effectiveness and efficiency of the image recognition mechanism has became increasingly important. In this study, a new skeleton-based shape recognition algorithm, ...