Search
Now showing items 141-150 of 239
Routing performance analysis of opportunistic networks with flooding and partial flooding methods [Fırsatçı a?larda taşırma ve kısmi taşırma yöntemleriyle yönlendirme performans analizi]
(IEEE, 2012)
Opportunistic networks is one of the fast developing research areas in mobile communications. Under opportunistic networks mobile nodes try to communicate with other nodes without any prior information and knowledge about ...
Post outage bus voltage calculations for double branch outages
(IEEE, 2012)
Secure operation of electrical power systems is vital hence fast and accurate post-outage state calculations are important for contingency analysis. Contingency analysis includes simulations of both the single and double ...
Empirical results about efforts for effective teaching to y-generation freshman students
(IEEE, 2012)
New techniques are deployed to teach the new generation of students effectively. This work tries to share our experience in a blended course for over eleven years. It has been observed that the online portion of the course ...
Review of bandwidth estimation tools and application to bandwidth adaptive video streaming
(IEEE, 2012)
Streaming video is very popular in today's best effort delivery networks. Streaming video applications should not only have a good end-to-end transport performance but also have a Quality of Service (QoS) provisioning in ...
Comparison of feature selection algorithms for medical data
(IEEE, 2012)
Data mining application areas widen day by day. Among those areas medical area has been receiving quite a big attention. However working with very large data sets with many attributes is hard. Experts in this field use ...
The effect of secondary user locations on the cooperative detection performance [İki?nci?l kullanıcı konumlarının i?şbi?rli?kli? algılama yöntemi? performansına etki?si?]
(IEEE, 2012)
In conventional cooperative detection a fusion center decides on the presence or absence of the primary user by gathering all the information from secondary users and conveys this decision to all users. This approach does ...
Parallel-in-space implementation of transient stability analysis on a Linux cluster with infiniband
(IEEE, 2012)
On-line transient stability analysis is an inevitable way to provide real time power system security and control. Parallel computing is one of the most viable ways to perform on-line transient stability analysis. This paper ...
Genetic algorithm based broadband equalizer design with ripple level control
(IEEE, 2012)
In this paper broadband equalizer design with ripple control via genetic algorithm has been studied. The equalizer is defined as a lossless two-port terminated by load impedance and the coefficients of its describing ...
Detection of jointly active primary systems
(IEEE, 2012)
Recent studies in cognitive radios consider the detection of multiple bands for a better utilization of the spectrum. If the cognitive radio (CR) is an ultra wideband (UWB) or a wideband system then the CR should ensure ...
Detection of Trojans in integrated circuits
(IEEE, 2012)
This paper presents several signal processing approaches in Trojan detection problem in very large scale integrated circuits. Specifically wavelet transforms spectrograms and neural networks are used to analyze power ...