Ara
Toplam kayıt 210, listelenen: 201-210
Randomness analysis of Antimycielski number generator [Anti-mycielski sayi ureteci·ni·n rastsallik anali·zi·]
(2008)
Random number generation is one of the important issues of cryptography. Based on the efficient Mycielski predictor, we propose a new random number generation algorithm, denoted by Anti-mycielski, which generates a new ...
Separation of noisy astrophysical images by blind time-frequency source separation methods [Gürültülü astroflziksel görüntü karişimlannin kör zaman-siklik kaynak ayriştirma yöntemleri ile ayriştirilmasi]
(2007)
Two blind time-frequency source separation methods in the literature are adapted to astrophysical image mixtures and four algorithms are developed to separate them into their cosmic components; cosmic microwave background ...
Separation of noisy astrophysical images by blind time-frequency source separation methods
(IEEE, 2007)
Two blind time-frequency source separation methods in the literature are adapted to astrophysical image mixtures and four algorithms are developed to separate them into their cosmic components; cosmic microwave background ...
Biobjective scheduling algorithms for execution time-reliability trade-off in heterogeneous computing systems
(Oxford University Press, 2005)
A heterogeneous computing (HC) system is composed of a suite of geographically distributed high-performance machines interconnected by a high-speed network, thereby providing high-speed execution of computationally intensive ...
Concurrent scheduling: Efficient heuristics for online large-scale data transfers in distributed real-time environments
(IEEE Computer Soc, 2006)
The static staging heuristics proposed in the literature for staging the data items associated with real-time distributed applications adhere to a method by which only one data item is transferred in each communication ...
A comparison of the Common Vector and the discriminative Common Vector methods for face recognition
(2005)
The Common Vector (CV) method is a successful method which has been originally proposed for isolated word recognition problems in the case where the number of samples for each class is less than or equal to the dimensionality ...
Frequency domain subispace-based identification of discrete-time power spectra from nonuniformly spaced measurements
(Pergamon-Elsevier Science LTD, 2004)
In this paper, we present a new subspace-based algorithm for the identification of multi-input/multi-output, square, discrete-time, linear-time invariant systems from nonuniformly spaced power spectrum measurements. The ...
Mycielski approach for synthetic wind speed data generation [Yapay rüzgar hizi verisi üretiminde mycielski yaklaşimi]
(2009)
In this paper, a novel Mycielski based approach for wind speed data generation is developed and presented. The efficincy of the proposed approach is tested using hourly wind speed data obtained from İzmir region. To test ...
Frequency domain subspace-based identification of discrete-time power spectra from nonuniformly spaced measurements
(IEEE, 2004)
In this paper, we present a new subspace-based algorithm for the identification of multi-input/multi-output, square, discrete-time, linear-time invariant systems from nonuniformly spaced power spectrum measurements. The ...
Deadlock analysis for continuous Petri nets by using overlapping decompositions
(2007)
The continuous Petri nets model, in which the tokens are denoted by real numbers and the firing of transitions depends on speeds of each transition and time, is considered to analyse deadlock in this work. Deadlock analysis, ...