Now showing items 1-20 of 45

    • Algorithms for sink mobility in wireless sensor networks to improve network lifetime 

      Koç, Metin; Körpeoğlu, İbrahim (Springer, 2012-09)
      Sink mobility is an effective solution in the literature for wireless sensor network lifetime improvement. In this paper, we propose a set of algorithms for sink site determination (SSD) and movement strategy problems of ...
    • Auction based scheduling for distributed systems 

      Zarifoğlu, Emrah; Sabuncuoğlu, İhsan (International Institute of Informatics and Systemics, 2006)
      Businesses deal with huge databases over a geographically distributed supply network. When this is combined with scheduling and planning needs, it becomes too difficult to handle. Recently, Fast Consumer Goods sector tends ...
    • Authorship attribution: performance of various features and classification methods 

      Bozkurt, İlker Nadi; Bağlıoğlu, Özgür; Uyar, Erkan (IEEE, 2007-11)
      Authorship attribution is the process of determining the writer of a document. In literature, there are lots of classification techniques conducted in this process. In this paper we explore information retrieval methods ...
    • Automatic categorization of ottoman literary texts by poet and time period 

      Can, Ethem F.; Can, Fazlı; Duygulu, Pınar; Kalpaklı, Mehmet (Springer, London, 2012)
      Millions of manuscripts and printed texts are available in the Ottoman language. The automatic categorization of Ottoman texts would make these documents much more accessible in various applications ranging from historical ...
    • Carcinoma cell line discrimination in microscopic images using unbalanced wavelets 

      Keskin, Furkan; Suhre, Alexander; Erşahin, Tüli,; Çetin Atalay, Rengül; Çetin, A. Enis (IEEE, 2012-03)
      Cancer cell lines are widely used for research purposes in laboratories all over the world. In this paper, we present a novel method for cancer cell line image classification, which is very costly by conventional methods. ...
    • Cepstrum based method for moving shadow detection in video 

      Cogun, Fuat; Çetin, A. Enis (Springer, 2010-09)
      Moving shadows constitute problems in various applications such as image segmentation and object tracking. Main cause of these problems is the misclassification of the shadow pixels as target pixels. Therefore, the use of ...
    • A compression method based on compressive sampling for 3-D laser range scans of indoor environments 

      Dobrucalı, Oğuzcan; Barshan, Billur (Springer, Dordrecht, 2010)
      When 3-D models of environments need to be transmitted or stored, they should be compressed efficiently to increase the capacity of the communication channel or the storage medium. We propose a novel compression technique ...
    • A content-based social network study of evliyâ çelebi's seyahatnâme-bitlis section 

      Karbeyaz, Ceyhun; Can, Ethem F; Can, Fazlı; Kalpaklı, Mehmet (Springer, London, 2012)
      Evliyâ Çelebi, an Ottoman writer, scholar and world traveler, visited most of the territories and also some of the neighboring countries of the Ottoman Empire in the seventeenth century. He took notes about his trips and ...
    • Data and model driven hybrid approach to activity scoring of cyclic pathways 

      Işık, Z.; Atalay V.; Aykanat, Cevdet; Çetin-Atalay, Rengül (Springer, Dordrecht, 2010)
      Analysis of large scale -omics data based on a single tool remains inefficient to reveal molecular basis of cellular events. Therefore, data integration from multiple heterogeneous sources is highly desirable and required. ...
    • Editing heightfield using history management and 3D widgets 

      Yalçın, M. Aydın; Çapin, Tolga K. (IEEE, 2009-09)
      In virtual environments, terrain is generally modeled by heightfield, a 2D structure. To be able to create desired terrain geometry, software editors for this specific task have been developed. The graphics hardware, data ...
    • Efficiency and effectiveness of query processing in cluster-based retrieval 

      Can, F.; Altingövde I.S.; Demir, E. (Elsevier, 2004)
      Our research shows that for large databases, without considerable additional storage overhead, cluster-based retrieval (CBR) can compete with the time efficiency and effectiveness of the inverted index-based full search ...
    • Energy consumption forecasting via order preserving pattern matching 

      Vanlı, N. Denizcan; Sayın, Muhammed O.; Yıldız, Hikmet; Göze, Tolga; Kozat, Süleyman S. (IEEE, 2014-12)
      We study sequential prediction of energy consumption of actual users under a generic loss/utility function. Particularly, we try to determine whether the energy usage of the consumer will increase or decrease in the future, ...
    • Energy cost model for frequent item set discovery in unstructured P2P networks 

      Cem, E.; Demirkaya, Ender; Esiner, E.; Ozaydin, B.; Ozkasap O. (Springer, London, 2012)
      For large scale distributed systems, designing energy efficient protocols and services has become as significant as considering conventional performance criteria like scalability, reliability, fault-tolerance and security. ...
    • G-network modelling based abnormal pathway detection in gene regulatory networks 

      Kim H.; Atalay, Rengül; Gelenbe, E. (Springer, London, 2012)
      Gene expression centered gene regulatory networks studies can provide insight into the dynamics of pathway activities that depend on changes in their environmental conditions. Thus we propose a new pathway analysis approach ...
    • Generalized ID-based blind signatures from bilinear pairings 

      Kalkan, Said; Kaya, Kamer; Selçuk, Ali Aydın (IEEE, 2008-10)
      Blind signature schemes provide the feature that a user is able to get a signature without giving the actual message to the signer. Recently a number of ID-based blind signatures have been proposed. In this paper, we ...
    • Generalized ID-based ElGamal signatures 

      Kalkan, Said; Kaya, Kamer; Selçuk, Ali Aydın (IEEE, 2007-11)
      ID-based cryptography has been a very active area of research in cryptography since bilinear pairings were introduced as a cryptographic tool, and there have been many proposals for ID-based signatures recently. In this ...
    • Hypergraph-theoretic partitioning models for parallel web crawling 

      Türk, Ata; Cambazoğlu, B. Barla; Aykanat, Cevdet (Springer, London, 2012)
      Parallel web crawling is an important technique employed by large-scale search engines for content acquisition. A commonly used inter-processor coordination scheme in parallel crawling systems is the link exchange scheme, ...
    • Induction of logical relations based on specific generalization of strings 

      Uzun, Yasin; Çiçekli, İlyas (IEEE, 2007-11)
      Learning logical relations from examples expressed as first order facts has been studied extensively by the Inductive Logic Programming research. Learning with positive-only data may cause over generalization of examples ...
    • Information arts and information science: time to unite? 

      Karamuftuoglu, M. (Wiley, 2006)
      This article explicates the common ground between two currently independent fields of Inquiry, namely information arts and information science, and suggests a frame-work that could unite them as a single field of study. ...
    • Joint visual attention modeling for naturally interacting robotic agents 

      Yücel, Zeynep; Salah, A. A.; Meriçli, C.; Meriçli, T. (IEEE, 2009-09)
      This paper elaborates on mechanisms for establishing visual joint attention for the design of robotic agents that learn through natural interfaces, following a developmental trajectory not unlike infants. We describe first ...