Başlık için Bildiri Koleksiyonu listeleme
Toplam kayıt 355, listelenen: 17-36
-
Cable and Wire Detection System for Aircrafts
(IEEE, 2013)EDlines is a robust and accurate line segment detector that is known to run 11 times faster than the popular (and fastest known) method of LSD, while avoiding necessity of parameter adjustments. In this work, this detector ... -
Cable and wire detection system for aircrafts [Hava araçlari için tel ve kablo tespit sistemi]
(2013)EDlines is a robust and accurate line segment detector that is known to run 11 times faster than the popular (and fastest known) method of LSD, while avoiding necessity of parameter adjustments. In this work, this detector ... -
Central and projection algorithms in identification with periodic set membership inputs
(IEEE, 2004)In this paper, we study the central and the projection algorithms in set membership identification with periodic input signals for the case that the number of the estimated parameters equals the input period. First, we ... -
Central and projection algorithms in set membership identification with periodic inputs
(2004)In this paper, we study the central and the projection algorithms in set membership identification with periodic input signals for the case that the number of the estimated parameters equals the input period. First, we ... -
Centralized and Decentralized Robust Servomechanism Problems for Time-delay Systems
(IEEE, 2017)Centralized and decentralized robust servomechanism problems for time-delay systems are considered. Sufficient and necessary conditions for the solvability of these problems are presented. The conditions for the two problems ... -
Coin Recognition based on Geometric Features
(IEEE, 2015)In this study, it is aimed to count the total amount in an image of coins using machine vision methods. The extrinsic parameters of the camera whose intrinsic parameters are already known are estimated relative to the plane ... -
Coin recognition based on geometric features [Geometrik Öznitelik Tabanli Madeni Para Tanima]
(Institute of Electrical and Electronics Engineers Inc., 2015)In this study, it is aimed to count the total amount in an image of coins using machine vision methods. The extrinsic parameters of the camera whose intrinsic parameters are already known are estimated relative to the plane ... -
A combined direct and indirect adaptive control scheme for a wheeled mobile robot using multiple models
(Springer Verlag, 2014)This chapter presents a method about trajectory tracking control of a nonholonomic wheeled mobile robot. The main focus of the chapter is to improve the transient response for the trajectory tracking control of mobile ... -
Combining Feature-based and Model-based Approaches For Robust Ellipse Detection
(IEEE, 2016)Fast and robust ellipse detection is a vital step in many image processing and computer vision applications. Two main approaches exist for ellipse detection, i.e., model-based and feature-based. Model-based methods require ... -
Compact hardware architecture for Hummingbird cryptographic algorithm
(2011)Hummingbird is an ultra-lightweight cryptographic algorithm aiming at resource-constrained devices. In this paper, we present an enhanced hardware implementation of the Hummingbird cryptographic algorithm that is based on ... -
Compact implementation of threefish and Skein on FPGA
(2012)The SHA-3 finalist Skein is built from the tweak able Threefish block cipher. In order to have a better understanding of the computational efficiency of Skein (resource sharing, memory access scheme, scheduling, etc.), we ... -
Comparing PI controllers for delay models of TCP/AQM networks
(IFAC Secretariat, 2010)In this paper, ns-2 simulations and related comparisons of four different PI controllers designed for TCP/AQM networks will be presented. The simulations are performed for various scenarios -
A Comparison of Classification Methods for Local Binary Patterns
(IEEE, 2016)Texture recognition is an important tool used for content-based image retrieval, face recognition, and satellite image classification applications. One of the most successful features for texture recognition is local binary ... -
A comparison of classification methods for local binary patterns [Yerel Ikili Örüntüler Için Siniflandirma Yöntemlerinin Karşilaştirilmasi]
(Institute of Electrical and Electronics Engineers Inc., 2016)Texture recognition is an important tool used for content-based image retrieval, face recognition, and satellite image classification applications. One of the most successful features for texture recognition is local binary ... -
A Comparison of Corner and Saliency Detection Methods for Power Line Detection
(IEEE, 2017)Issuing an alarm for power lines continues to be an important issue for low altitude aircraft safety. In this study, edge and gradient based methods are applied and compared according to their detection performances (in ... -
Comparison of H-infinity and mu-synthesis based flow controllers for high-speed networks with multiple time delays
(IEEE, 2001)A flow controller design approach based on mu-synthesis is proposed. The performances of the resulting controllers and the H-infinity controllers designed based on an approach proposed earlier, are compared. -
Comparison of H? and µ-synthesis based flow controllers for high-speed networks with multiple time delays
(2001)A flow controller design approach based on µ-synthesis is proposed. The performances of the resulting controllers and the H? controllers designed based on an approach proposed earlier, are compared. -
A Comparison of Line Detection Methods for Power Line Avoidance in Aircrafts
(IEEE, 2015)Power lines constitute a great thread for aircraft flight safety. Digital camera based methods consider these power lines as digital lines and edges which are desired to be detected using line and edge detectors. EDLines, ... -
A comparison of static QoS-based scheduling heuristics for a meta-task with multiple QoS dimensions in heterogeneous computing
(2004)The problem of scheduling a set of independent tasks (a meta-task) with multiple QoS needs, such as Timeliness, Reliability, Versions, Security and Priority, in a Heterogeneous Computing (HC) environment is referred to as ... -
A comparison of the Common Vector and the discriminative Common Vector methods for face recognition
(2005)The Common Vector (CV) method is a successful method which has been originally proposed for isolated word recognition problems in the case where the number of samples for each class is less than or equal to the dimensionality ...