Search
Now showing items 11-20 of 25
Comparison of feature selection algorithms for medical data
(IEEE, 2012)
Data mining application areas widen day by day. Among those areas medical area has been receiving quite a big attention. However working with very large data sets with many attributes is hard. Experts in this field use ...
The effect of secondary user locations on the cooperative detection performance [İki?nci?l kullanıcı konumlarının i?şbi?rli?kli? algılama yöntemi? performansına etki?si?]
(IEEE, 2012)
In conventional cooperative detection a fusion center decides on the presence or absence of the primary user by gathering all the information from secondary users and conveys this decision to all users. This approach does ...
Parallel-in-space implementation of transient stability analysis on a Linux cluster with infiniband
(IEEE, 2012)
On-line transient stability analysis is an inevitable way to provide real time power system security and control. Parallel computing is one of the most viable ways to perform on-line transient stability analysis. This paper ...
Genetic algorithm based broadband equalizer design with ripple level control
(IEEE, 2012)
In this paper broadband equalizer design with ripple control via genetic algorithm has been studied. The equalizer is defined as a lossless two-port terminated by load impedance and the coefficients of its describing ...
Detection of jointly active primary systems
(IEEE, 2012)
Recent studies in cognitive radios consider the detection of multiple bands for a better utilization of the spectrum. If the cognitive radio (CR) is an ultra wideband (UWB) or a wideband system then the CR should ensure ...
Detection of Trojans in integrated circuits
(IEEE, 2012)
This paper presents several signal processing approaches in Trojan detection problem in very large scale integrated circuits. Specifically wavelet transforms spectrograms and neural networks are used to analyze power ...
Connected navigation of non-communicating mobile agents
(IEEE, 2012)
This article discusses the connectivity of autonomous mobile robots that do not have communication capabilities. We show that if the group members follow the proposed Local Steering Strategy which utilizes information only ...
Digital crime and punishment: Turkish online journalism under siege
(International Institute of Informatics and Systemics IIIS, 2012)
Turkish mass media since its beginnings in late 19th century has aimed to gain its role as the fourth estate in Turkish political scene. The freedom of press has been at the paramount of discussions since the foundation ...
An intelligent approach to CAM software selection
(IEEE, 2012)
In this paper an intelligent approach is presented to help the companies select most suitable CAM software for their current and future needs. For this purpose fuzzy AHP method is used to carry out CAM selection process ...
Complex event post processing for traffic accidents
(IEEE, 2012)
In this paper we describe a framework for an expert system that tries to predict effects of an accident based on past data using supervised learning employing artificial neural networks. For this purpose sensory data events ...