Search
Now showing items 41-50 of 103
Early Steps in Automated Behavior Mapping via Indoor Sensors
(MDPI, 2017)
Behavior mapping (BM) is a spatial data collection technique in which the locational and behavioral information of a user is noted on a plan layout of the studied environment. Among many indoor positioning technologies we ...
Partitioning 3-arcs into Steiner Triple Systems
(Wiley, 2017)
In this article it is shown that there is a partitioning of the set of 3-arcs in a projective plane of order three into nine pairwise disjoint Steiner triple systems of order 13.
Strategic Early Warning System for the French milk market: A graph theoretical approach to foresee volatility
(Elsevier, 2017)
This paper presents a new approach for developing a Strategic Early Warning System aiming to better detect and interpret weak signals. We chose the milk market as a case study in line with the recent call from the EU ...
RedNemo: topology-based PPI network reconstruction via repeated diffusion with neighborhood modifications
(Oxford University Press, 2017)
Motivation: Analysis of protein-protein interaction (PPI) networks provides invaluable insight into several systems biology problems. High-throughput experimental techniques together with computational methods provide ...
Energy Aware Multi-Hop Routing Protocol for WSNs
(IEEE, 2018)
In this paper we propose an energy-efficient multi-hop routing protocol for wireless sensor networks (WSNs). The nature of sensor nodes with limited batteries and inefficient protocols are the key limiting factors of the ...
Peer-to-peer live video streaming with rateless codes for massively multiplayer online games
(Springer, 2018)
We present a multi-level multi-overlay hybrid peer-to-peer live video system that enables players of Massively Multiplayer Online Games to simultaneously stream the video of their game and watch the game videos of other ...
Channel Estimation for Residual Self-Interference in Full-Duplex Amplify-and-Forward Two-Way Relays
(IEEE-INST Electrical Electronics Engineers Inc, 2017)
Training schemes for full duplex two-way relays are investigated. We propose a novel one-block training scheme with a maximum likelihood estimator to estimate the channels between the nodes as well as the residual ...
A Novel Image Steganography Technique based on Similarity of Bits Pairs
(IEEE, 2017)
Steganography is one of the most important information hiding mechanism which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text image audio and video ...
Bayesian estimation of discrete-time cellular neural network coefficients
(TUBITAK Scientific & Technical Research Council Turkey, 2017)
A new method for finding the network coefficients of a discrete-time cellular neural network (DTCNN) is proposed. This new method uses a probabilistic approach that itself uses Bayesian learning to estimate the network ...
Machine Learning Approaches for Predicting Protein Complex Similarity
(Mary Ann Liebert Inc Publ, 2017)
Discriminating native-like structures from false positives with high accuracy is one of the biggest challenges in protein-protein docking. While there is an agreement on the existence of a relationship between various ...