Search
Now showing items 61-70 of 141
A Novel Image Steganography Technique based on Similarity of Bits Pairs
(IEEE, 2017)
Steganography is one of the most important information hiding mechanism which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text image audio and video ...
Reduction of energy costs and traffic flow rate in urban logistics process
(Elsevier Science, 2017)
Energy cost is a phenomenon relating to logistics and transportation activities of logistics operators as well as governments local authorities and citizens. Actually all the logistics parties may be affected by energy ...
Beacons for Indoor Positioning
(IEEE, 2017)
This work aims to develop a system for the tracking and control of elderly or handicapped people in an indoor environment. We have developed both a special box using an Arduino board and a mobile application on Android to ...
Experimental experience in design education as a resource for innovative thinking: The case of Bruno Munari
(Elsevier Science Bv, 2010)
Design education in general includes various design fields such as product design graphic design communication design and design in engineering. Designing as an activity captures all these various fields. Design refers ...
Visual culture in art teacher education: A Turkish case
(Elsevier Science Bv, 2010)
As globalization impacts Turkish culture the training and preparation of art teachers is increasingly important because these individuals will play a key role in teaching children how to become visually literate in a quickly ...
On-Line Transient Stability Assessment Using Matlab Parallel Programming Environment
(IEEE, 2010)
Transient Stability Assessment (TSA) is the major part of Dynamic Security Assessment (DSA) in an electric power system. On-line TSA has gained more importance for power system security in last two decades. The decreasing ...
Parallel Implementation Of Iterative Rational Krylov Methods For Model Order Reduction
(IEEE, 2010)
Model order reduction (MOR) techniques are getting more important in large scale computational tasks like large scale electronic circuit simulations. In this paper we present some experimental work on multiprocessor systems ...
Relay-Aided Secure Broadcasting for VLC
(IEEE, 2018)
A visible light communication (VLC) broadcast channel is considered in which a transmitter communicates with two receivers in the presence of an external eavesdropper. Trusted cooperative half-duplex relays are deployed ...
A Recommender Model Based on Trust Value and Time Decay Improve the Quality of Product Rating Score in E-commerce Platforms
(IEEE, 2017)
Most of the existing products rating score algorithms do not take fake accounts and time decay of users' ratings into account when creating the list of recommendations. The trust values and the time decay of users' ratings ...
Ranking Protein-Protein Binding Using Evolutionary Information and Machine Learning
(Association for Computing Machinery, 2017)
Discriminating native-like complexes from false-positives with high accuracy is one of the biggest challenges in protein-protein docking. The relationship between various favorable intermolecular interactions (e.g. Van ...