Search
Now showing items 101-110 of 164
Review of bandwidth estimation tools and application to bandwidth adaptive video streaming
(IEEE, 2012)
Streaming video is very popular in today's best effort delivery networks. Streaming video applications should not only have a good end-to-end transport performance but also have a Quality of Service (QoS) provisioning in ...
Comparison of feature selection algorithms for medical data
(IEEE, 2012)
Data mining application areas widen day by day. Among those areas medical area has been receiving quite a big attention. However working with very large data sets with many attributes is hard. Experts in this field use ...
The effect of secondary user locations on the cooperative detection performance [İki?nci?l kullanıcı konumlarının i?şbi?rli?kli? algılama yöntemi? performansına etki?si?]
(IEEE, 2012)
In conventional cooperative detection a fusion center decides on the presence or absence of the primary user by gathering all the information from secondary users and conveys this decision to all users. This approach does ...
Parallel-in-space implementation of transient stability analysis on a Linux cluster with infiniband
(IEEE, 2012)
On-line transient stability analysis is an inevitable way to provide real time power system security and control. Parallel computing is one of the most viable ways to perform on-line transient stability analysis. This paper ...
Genetic algorithm based broadband equalizer design with ripple level control
(IEEE, 2012)
In this paper broadband equalizer design with ripple control via genetic algorithm has been studied. The equalizer is defined as a lossless two-port terminated by load impedance and the coefficients of its describing ...
Detection of jointly active primary systems
(IEEE, 2012)
Recent studies in cognitive radios consider the detection of multiple bands for a better utilization of the spectrum. If the cognitive radio (CR) is an ultra wideband (UWB) or a wideband system then the CR should ensure ...
Detection of Trojans in integrated circuits
(IEEE, 2012)
This paper presents several signal processing approaches in Trojan detection problem in very large scale integrated circuits. Specifically wavelet transforms spectrograms and neural networks are used to analyze power ...
Connected navigation of non-communicating mobile agents
(IEEE, 2012)
This article discusses the connectivity of autonomous mobile robots that do not have communication capabilities. We show that if the group members follow the proposed Local Steering Strategy which utilizes information only ...
Fuzzy logic for decision extraction from product reviews
(Institute of Electrical and Electronics Engineers Inc., 2018)
Most of manufacturers and merchants sell their products via internet websites where customers buy them and write their reviews regarding the purchased product. These reviews carry a lot of information. Prospective customers ...
Why do students prefer search engines over academic databases
(IEEE Computer Society, 2013)
Students' preference of search engines in online information retrieval has been a problem for several reasons. This work tries to share our experience about the reasons why they do not utilize academic databases. Past ...