Ara
Toplam kayıt 16, listelenen: 1-10
An efficient algorithm for rank and subspace tracking
(Pergamon-Elsevier Science Ltd, 2006)
Traditionally, the singular value decomposition (SVD) has been used in rank and subspace tracking methods. However, the SVD is computationally costly, especially when the problem is recursive in nature and the size of the ...
Motion estimation using common spatial frequencies in synthetic aperture imaging
(I E E E, 1996)
Correlation processing using fully common spatial frequencies of overlapping subapertures is explored for motion estimation between consecutive excitations in multi-element synthetic aperure imaging. Signals derived from ...
An ergonomic rendering system for industrial design
(Elsevier Science Bv, 1997)
Product design is one of the most important stages in production processes depending on commercial aims and current technology. Success in modelling the products guarantees that customers' requests can be supplied by these ...
Design and Implementation of a Basic Microcomputer for Educational Purpose
(Ieee, 2016)
Today, most of electronic equipments includes at least one microcomputer. Microcomputers control the operation of electronic devices and to provide the required operations. The microcomputer has a constantly developing and ...
Forming a cloud computing based lifelong learning platform: integration of basic computer courses as mass open online courses to university
(Iclel Conferences, 2016)
Today's formal educational institutions remain incapable of keeping people's knowledge up to date. Updating information in fields like general culture, information technology, language education and vocational education ...
Open Source Slurm Computer Cluster System Design and a Sample Application
(Ieee, 2017)
Cluster computing combines the resources of multiple computers as they act like a single high-performance computer. In this study, a computer cluster consisting of Lustre distributed file system with one cluster server ...
An Intrusion Detection System Based on a Hybrid Tabu-Genetic Algorithm
(Ieee, 2017)
In this paper, we proposed a framework for detecting network's intrusions using Genetic Algorithm (GA) with multiple criteria. First of all, we build an intrusion detection system (IDS) using a pure GA with multiple selection ...
Automatic Landmark Detection through Circular Hough Transform in Cephalometric X-rays
(Ieee, 2017)
In this paper, a knowledge based framework is proposed to detect automatically cephalometric landmarks: Porion (Po), Sella (S), Menton (Me), Pogonion (Pg) and Gnathion (Gn). In this way anomalies can be diagnosed easily ...
The Android Malware Static Analysis: Techniques, Limitations, and Open Challenges
(Ieee, 2018)
This paper aims to explain static analysis techniques in detail, and to highlight the weaknesses and challenges which face it. To this end, more than 80 static analysis based framework have been studied, and in their light, ...
Latent Semantic Analysis via Truncated ULV Decomposition
(Ieee, 2016)
Latent semantic analysis (LSA) usually uses the singular value decomposition (SVD) of the term-document matrix for discovering the latent relationships within the document collection. With the SVD, by disregarding the ...