Ara
Toplam kayıt 23, listelenen: 11-20
Efficient Deployment of Wireless Sensor Nodes with Evolutionary Approaches
(Institute of Electrical and Electronics Engineers Inc., 2022)
In previous WSN studies, it was observed that there are two common methods used in coverage area calculation: 1) image processing technique or 2) mathematical formulas. calculation of the coverage area, if the sensing ...
Implementation of Socket Programming Simulation Using Quantum Communication Technologies
(Institute of Electrical and Electronics Engineers Inc., 2022)
Using socket programming, which plays a major role in the communication between devices and people, data is transmitted instantly over predetermined ports. By the evolution of technology, the size of the data is increasing ...
A Proposed Methodology for Risk Classification Using Fuzzy Group Decision Making and Fuzzy C-Means
(Springer Science and Business Media Deutschland GmbH, 2022)
Clean production and resource efficiency are two major concerns of contemporary manufacturing processes. The main reason is that the resources and environment are significant concerns for the future. The study proposes the ...
A Survey of Product Recognition in Shelf Images
(IEEE, 2017)
Nowadays, merchandising is one of the significant method which allows to increase the sales. Therefore, activities such as monitoring the number of products on the shelves, completing the missing products and matching the ...
Gendered differentiated communication & educational characteristics in online technologies at undergraduate, MA or Doctorate degrees
(2012)
In this study one of the most important approaches will be: it is so open that online learning has different effects on male and female students; also it has various effects on male and female faculty members. This paper ...
Segmenting Customers with Data Mining Techniques
(IEEE, 2015)
Retail marketers are constantly looking for ways to improve the effectiveness of their campaigns. One way to do this is to target customers with the particular offers most likely to attract them back to the store and to ...
A Joint Design of User Modeling and Resource Management in Cognitive Radio Networks
(IEEE Computer Society, 2019)
The limited available spectrum and inefficient spectrum utilization make it necessary to employ dynamic spectrum access techniques. The key enabling technology for dynamic spectrum access is cognitive radio (CR), which ...
Analyzing five conscious and unconscious behaviors using google n-gram database generated from millions of books
(Institute of Electrical and Electronics Engineers Inc., 2020)
Due to the exponential increase in the proliferation of information by humans and machines, the 21st century is called the "Information Age"and the "Digital Age". Regardless of the size of the data at hand, the challenge ...
2D Vector Representation of Binomial Hierarchical Tree Items
(Institute of Electrical and Electronics Engineers Inc., 2022)
Today Artificial Intelligence (AI) algorithms need to represent different kinds of input items in numeric or vector format. Some input data can easily be transformed to numeric or vector format but the structure of some ...
Adaptation of n-out-of-n secret sharing scheme into IoT network
(Institute of Electrical and Electronics Engineers Inc., 2023)
Internet of Things (IoT) has become an established part of our daily lives by interconnecting billions of devices in diverse areas such as healthcare, smart home technologies, agriculture, etc. However, these devices are ...