Search
Now showing items 101-110 of 135
Routing performance analysis of opportunistic networks with flooding and partial flooding methods [Fırsatçı a?larda taşırma ve kısmi taşırma yöntemleriyle yönlendirme performans analizi]
(IEEE, 2012)
Opportunistic networks is one of the fast developing research areas in mobile communications. Under opportunistic networks mobile nodes try to communicate with other nodes without any prior information and knowledge about ...
Empirical results about efforts for effective teaching to y-generation freshman students
(IEEE, 2012)
New techniques are deployed to teach the new generation of students effectively. This work tries to share our experience in a blended course for over eleven years. It has been observed that the online portion of the course ...
The effect of secondary user locations on the cooperative detection performance [İki?nci?l kullanıcı konumlarının i?şbi?rli?kli? algılama yöntemi? performansına etki?si?]
(IEEE, 2012)
In conventional cooperative detection a fusion center decides on the presence or absence of the primary user by gathering all the information from secondary users and conveys this decision to all users. This approach does ...
Genetic algorithm based broadband equalizer design with ripple level control
(IEEE, 2012)
In this paper broadband equalizer design with ripple control via genetic algorithm has been studied. The equalizer is defined as a lossless two-port terminated by load impedance and the coefficients of its describing ...
Detection of jointly active primary systems
(IEEE, 2012)
Recent studies in cognitive radios consider the detection of multiple bands for a better utilization of the spectrum. If the cognitive radio (CR) is an ultra wideband (UWB) or a wideband system then the CR should ensure ...
Detection of Trojans in integrated circuits
(IEEE, 2012)
This paper presents several signal processing approaches in Trojan detection problem in very large scale integrated circuits. Specifically wavelet transforms spectrograms and neural networks are used to analyze power ...
Connected navigation of non-communicating mobile agents
(IEEE, 2012)
This article discusses the connectivity of autonomous mobile robots that do not have communication capabilities. We show that if the group members follow the proposed Local Steering Strategy which utilizes information only ...
Broadband double-matching via lossless unsymmetrical lattice networks
(Istanbul University, 2012)
In this paper a broadband double-matching network design algorithm has been presented. In the network an unsymmetrical lattice network has been used. The branch impedances of the lattice network are composed of singly ...
Fuzzy logic for decision extraction from product reviews
(Institute of Electrical and Electronics Engineers Inc., 2018)
Most of manufacturers and merchants sell their products via internet websites where customers buy them and write their reviews regarding the purchased product. These reviews carry a lot of information. Prospective customers ...
Why do students prefer search engines over academic databases
(IEEE Computer Society, 2013)
Students' preference of search engines in online information retrieval has been a problem for several reasons. This work tries to share our experience about the reasons why they do not utilize academic databases. Past ...