Browsing by Keywords "Cybernetics"
Now showing items 1-16 of 16
-
Authorship attribution: performance of various features and classification methods
(IEEE, 2007-11)Authorship attribution is the process of determining the writer of a document. In literature, there are lots of classification techniques conducted in this process. In this paper we explore information retrieval methods ... -
Channel polarization: A method for constructing capacity-achieving codes
(IEEE, 2008-07)A method is proposed, called channel polarization, to construct code sequences that achieve the symmetric capacity I(W) of any given binary-input discrete memoryless channel (B-DMC) W. The symmetric capacity I(W) is the ... -
Chemical concentration map building through bacterial foraging optimization based search algorithm by mobile robots
(IEEE, 2010)In this article we present implementation of Bacterial Foraging Optimization algorithm inspired search by multiple robots in an unknown area in order to find the region with highest chemical gas concentration as well as ... -
Concept representation with overlapping feature intervals
(Taylor & Francis Inc., 1998)This article presents a new form of exemplar-based learning method, based on overlapping feature intervals. In this model, a concept is represented by a collection of overlappling intervals for each feature and class. ... -
Foraging swarms as Nash equilibria of dynamic games
(IEEE, 2014)The question of whether foraging swarms can form as a result of a noncooperative game played by individuals is shown here to have an affirmative answer. A dynamic game played by N agents in 1-D motion is introduced and ... -
Generalized ID-based ElGamal signatures
(IEEE, 2007-11)ID-based cryptography has been a very active area of research in cryptography since bilinear pairings were introduced as a cryptographic tool, and there have been many proposals for ID-based signatures recently. In this ... -
Induction of logical relations based on specific generalization of strings
(IEEE, 2007-11)Learning logical relations from examples expressed as first order facts has been studied extensively by the Inductive Logic Programming research. Learning with positive-only data may cause over generalization of examples ... -
Ordinal covering using block designs
(IEEE, 2010)A frequently encountered problem in peer review systems is to facilitate pairwise comparisons of a given set of documents by as few experts as possible. In [7], it was shown that, if each expert is assigned to review k ... -
Ordinal evaluation and assignment problems
(IEEE, 2010)In many assignment problems, a set of documents such as research proposals, promotion dossiers, resumes of job applicants is assigned to a set of experts for ordinal evaluation, ranking, and classification. A desirable ... -
Parallel preconditioners for solutions of dense linear systems with tens of millions of unknowns
(2007-11)We propose novel parallel preconditioning schemes for the iterative solution of integral equation methods. In particular, we try to improve convergence rate of the ill-conditioned linear systems formulated by the electric-field ... -
PocketDrive: A system for mobile control of desktop PC and its applications using PDAs
(IEEE, 2007-11)Today, consumer electronic devices and PCs are inevitable parts of our daily life. Controlling those devices remotely is an important aspect of the technology. We have already universal remote control devices for controlling ... -
Research issues in peer-to-peer data management
(IEEE, 2007-11)Data management in Peer-to-Peer (P2P) systems is a complicated and challenging issue due to the scale of the network and highly transient population of peers. In this paper, we identify important research problems in P2P ... -
Revealing the potential of human-centered design in architecture
(Bilkent University, 2021-03)The increase of everyday usage of technology has urged consideration of human factors in the human-computer interaction. This thesis focuses on the transformation of design going beyond the human being a factor to the human ... -
Solution of large-scale scattering problems with the multilevel fast multipole algorithm parallelized on distributed-memory architectures
(IEEE, 2007)We present the solution of large-scale scattering problems involving three-dimensional closed conducting objects with arbitrary shapes. With an efficient parallelization of the multilevel fast multipole algorithm on ... -
Threshold broadcast encryption with reduced complexity
(IEEE, 2007-11)Threshold Broadcast Encryption (TBE) is a promising extension of threshold cryptography with its advantages over traditional threshold cryptosystems, such as eliminating the need of a trusted party, the ability of setting ... -
Turkish keyphrase extraction using KEA
(IEEE, 2007-11)Keyphrases provide semantic metadata to summarize and characterize documents. Unfortunately, there are many digital documents especially on the Internet that do not have a list of assigned keyphrases. Assigning keyphrases ...