Search
Now showing items 51-60 of 103
Fully Decentralized and Collaborative Multilateration Primitives for Uniquely Localizing WSNs
(Springer International Publishing Ag, 2010)
We provide primitives for uniquely localizing WSN nodes. The goal is to maximize the number of uniquely localized nodes assuming a fully decentralized model of computation. Each node constructs a cluster of its own and ...
FLEX: A Modular Software Architecture for Flight License Exam
(Springer-Verlag Berlin, 2010)
This paper is about the design and implementation of an examination system based on World Wide Web. It is called FLEX-Flight License Exam Software. We designed and implemented flexible and modular software architecture. ...
Importance of Regional Differences in Brain Throughout Aging for Down Syndrome
(Association for Computing Machinery, 2018)
Down syndrome (DS) which affects approximately one in 700 live births is caused by an extra copy of the long arm of human chromosome 21 (HSA21). Statistical analysis has been done for understanding the protein expression ...
Ranking Protein-Protein Binding Using Evolutionary Information and Machine Learning
(Association for Computing Machinery, 2017)
Discriminating native-like complexes from false-positives with high accuracy is one of the biggest challenges in protein-protein docking. The relationship between various favorable intermolecular interactions (e.g. Van ...
Dark Patches in Clustering
(IEEE, 2017)
This survey highlights issues in clustering which hinder in achieving optimal solution or generates inconsistent outputs. We called such malignancies as dark patches. We focus on the issues relating to clustering rather ...
Improving Energy-Efficiency of WSNs through LEFCA
(Sage Publications Inc, 2016)
Wireless sensor networks (WSNs) have become an important part of our lives as they can be used in vast application areas from disaster relief to health care. As a consequence the life span and the energy consumption of a ...
New 2-Edge-Balanced Graphs from Bipartite Graphs
(Wiley-Blackwell, 2016)
Let G be a graph of order n satisfying that there exists lambda epsilon Z(+) for which every graph of order n and size t is contained in exactly. distinct subgraphs of the complete graph K-n isomorphic to G. Then G is ...
Threshold-based Steganography: A Novel Technique for Improved Payload and SNR
(Zarka Private Univ, 2016)
Steganography is the art of hiding user information in various file types including image audio and video. Security of steganography lies in imperceptibility of secret information in the cover image. Human Visual System ...
Accurate Refinement Of Docked Protein Complexes Using Evolutionary Information And Deep Learning
(Imperıal College Press, 2016)
One of the major challenges for protein docking methods is to accurately discriminate native-like structures from false positives. Docking methods are often inaccurate and the results have to be refined and re-ranked to ...
Received signal strength based least squares lateration algorithm for indoor localization
(Pergamon-Elsevier Science Ltd, 2018)
Following the success of accurate location estimation for outdoor environments locating targets in indoor environments has become an important research area. Accurate location estimation of targets for indoor environments ...