Browsing by Keywords "Information science"
Now showing items 1-20 of 45
-
Algorithms for sink mobility in wireless sensor networks to improve network lifetime
(Springer, 2012-09)Sink mobility is an effective solution in the literature for wireless sensor network lifetime improvement. In this paper, we propose a set of algorithms for sink site determination (SSD) and movement strategy problems of ... -
Auction based scheduling for distributed systems
(International Institute of Informatics and Systemics, 2006)Businesses deal with huge databases over a geographically distributed supply network. When this is combined with scheduling and planning needs, it becomes too difficult to handle. Recently, Fast Consumer Goods sector tends ... -
Authorship attribution: performance of various features and classification methods
(IEEE, 2007-11)Authorship attribution is the process of determining the writer of a document. In literature, there are lots of classification techniques conducted in this process. In this paper we explore information retrieval methods ... -
Automatic categorization of ottoman literary texts by poet and time period
(Springer, London, 2012)Millions of manuscripts and printed texts are available in the Ottoman language. The automatic categorization of Ottoman texts would make these documents much more accessible in various applications ranging from historical ... -
Carcinoma cell line discrimination in microscopic images using unbalanced wavelets
(IEEE, 2012-03)Cancer cell lines are widely used for research purposes in laboratories all over the world. In this paper, we present a novel method for cancer cell line image classification, which is very costly by conventional methods. ... -
Cepstrum based method for moving shadow detection in video
(Springer, 2010-09)Moving shadows constitute problems in various applications such as image segmentation and object tracking. Main cause of these problems is the misclassification of the shadow pixels as target pixels. Therefore, the use of ... -
A compression method based on compressive sampling for 3-D laser range scans of indoor environments
(Springer, Dordrecht, 2010)When 3-D models of environments need to be transmitted or stored, they should be compressed efficiently to increase the capacity of the communication channel or the storage medium. We propose a novel compression technique ... -
A content-based social network study of evliyâ çelebi's seyahatnâme-bitlis section
(Springer, London, 2012)Evliyâ Çelebi, an Ottoman writer, scholar and world traveler, visited most of the territories and also some of the neighboring countries of the Ottoman Empire in the seventeenth century. He took notes about his trips and ... -
Data and model driven hybrid approach to activity scoring of cyclic pathways
(Springer, Dordrecht, 2010)Analysis of large scale -omics data based on a single tool remains inefficient to reveal molecular basis of cellular events. Therefore, data integration from multiple heterogeneous sources is highly desirable and required. ... -
Editing heightfield using history management and 3D widgets
(IEEE, 2009-09)In virtual environments, terrain is generally modeled by heightfield, a 2D structure. To be able to create desired terrain geometry, software editors for this specific task have been developed. The graphics hardware, data ... -
Efficiency and effectiveness of query processing in cluster-based retrieval
(Elsevier, 2004)Our research shows that for large databases, without considerable additional storage overhead, cluster-based retrieval (CBR) can compete with the time efficiency and effectiveness of the inverted index-based full search ... -
Energy consumption forecasting via order preserving pattern matching
(IEEE, 2014-12)We study sequential prediction of energy consumption of actual users under a generic loss/utility function. Particularly, we try to determine whether the energy usage of the consumer will increase or decrease in the future, ... -
Energy cost model for frequent item set discovery in unstructured P2P networks
(Springer, London, 2012)For large scale distributed systems, designing energy efficient protocols and services has become as significant as considering conventional performance criteria like scalability, reliability, fault-tolerance and security. ... -
G-network modelling based abnormal pathway detection in gene regulatory networks
(Springer, London, 2012)Gene expression centered gene regulatory networks studies can provide insight into the dynamics of pathway activities that depend on changes in their environmental conditions. Thus we propose a new pathway analysis approach ... -
Generalized ID-based blind signatures from bilinear pairings
(IEEE, 2008-10)Blind signature schemes provide the feature that a user is able to get a signature without giving the actual message to the signer. Recently a number of ID-based blind signatures have been proposed. In this paper, we ... -
Generalized ID-based ElGamal signatures
(IEEE, 2007-11)ID-based cryptography has been a very active area of research in cryptography since bilinear pairings were introduced as a cryptographic tool, and there have been many proposals for ID-based signatures recently. In this ... -
Hypergraph-theoretic partitioning models for parallel web crawling
(Springer, London, 2012)Parallel web crawling is an important technique employed by large-scale search engines for content acquisition. A commonly used inter-processor coordination scheme in parallel crawling systems is the link exchange scheme, ... -
Induction of logical relations based on specific generalization of strings
(IEEE, 2007-11)Learning logical relations from examples expressed as first order facts has been studied extensively by the Inductive Logic Programming research. Learning with positive-only data may cause over generalization of examples ... -
Information arts and information science: time to unite?
(Wiley, 2006)This article explicates the common ground between two currently independent fields of Inquiry, namely information arts and information science, and suggests a frame-work that could unite them as a single field of study. ... -
Joint visual attention modeling for naturally interacting robotic agents
(IEEE, 2009-09)This paper elaborates on mechanisms for establishing visual joint attention for the design of robotic agents that learn through natural interfaces, following a developmental trajectory not unlike infants. We describe first ...