Search Results - Deep state in Turkey~
Suggested Topics within your search.
Suggested Topics within your search.
- Computational Intelligence 6
- Computational intelligence 6
- Artificial Intelligence 4
- Artificial intelligence 4
- Signal processing 3
- Signal, Speech and Image Processing 3
- Data and Information Security 2
- Data protection 2
- Aerospace Technology and Astronautics 1
- Aerospace engineering 1
- Application software 1
- Artificial intelligence, Congresses 1
- Astronautics 1
- Big Data 1
- Big data 1
- Communications Engineering, Networks 1
- Computer Communication Networks 1
- Computer and Information Systems Applications 1
- Computer networks 1
- Data Mining and Knowledge Discovery 1
- Data Structures and Information Theory 1
- Data mining 1
- Data structures (Computer science) 1
- Economic Development, Innovation and Growth 1
- Economic development 1
- Emigration and immigration 1
- Engineering geology 1
- Human Migration 1
- Information theory 1
- Language Change 1
-
1
-
2
Advances in Computational Intelligence Systems Contributions Presented at the 18th UK Workshop on Computational Intelligence, September 5-7, 2018, Nottingham, UK /
Published 2019Table of Contents: “…On the Integrity of Performance Comparison for Evolutionary Multi-objective Optimisation Algorithms -- The Influence of Age Assignments on the Performance of Immune Algorithms -- Evolutionary Constraint in Artificial Gene Regulatory Networks -- Exploiting Tournament Selection for Efficient Parallel Genetic Programming -- Solving Partial Differential Equations with Bernstein Neural Networks -- Daily Energy Price Forecasting Using a Polynomial NARMAX Model -- Model Selection in Time Series Forecasting -- Fuzzy Modeling for Uncertain Nonlinear Systems using Fuzzy Equations and Z-numbers -- Medical Expert Systems - A Study of Trust and Acceptance by Healthcare Stakeholders -- Agent Based Micro-Simulation of a Passenger Rail System Using Customer Survey Data -- Fintech Bitcoin Smart Investment based on the Random Neural Network with a Genetic Algorithm -- Generating ANFISs through Rule Interpolation: An Initial Investigation -- Disentangling the Latent Space of (Variational) Autoencoders for NLP -- A Low Computational Approach for Assistive Esophageal Adenocarcinoma and Colorectal Cancer Detection -- Learning from Interaction: An Intelligent Networked based Human-bot and Bot-bot Chatbot System -- A Study on CNN Transfer Learning for Image Classification -- Dendritic Cell Algorithm with Fuzzy Inference System for Input Signal Generation -- A Method of Abstractness Ratings for Chinese Concepts -- Effective Diagnosis of Diabetes with a Decision Tree-initialised Neuro-fuzzy Approach -- A Comparison of Re-sampling Techniques for Pattern Classification in Imbalanced Data-Sets -- Classification of Heterogeneous Data Based on Data Type Impact on Similarity -- Clustering-based Fuzzy Finite State Machine for Human Activity Recognition -- Deep Online Hierarchical Unsupervised Learning for Pattern Mining from Utility Usage Data -- Online Object Trajectory Classification using FPGA-SoC Devices -- Key Frame Extraction and Classification of Human Activities using Motion Energy -- A Comprehensive Obstacle Avoidance System of Mobile Robots Using an Adaptive Threshold Clustering and the Morphin Algorithm -- Physarum Inspired Connectivity and Restoration for Wireless Sensor and Actor Networks -- Mining Unit Feedback to Explore Students' Learning Experiences -- Dimension Reduction Based on Geometric Reasoning for Reducts -- Anomaly Detection in Activities of Daily Living using One-Class Support Vector Machine -- Towards Active Muscle Pattern Analysis for Dynamic Hand Motions via SEMG -- A Novel Crossings-based Segmentation Approach for Gesture Recognition.…”
Full-text access
View in OPAC
e-Book -
3
Data Science and Big Data Analytics ACM-WIR 2018 /
Published 2019Table of Contents: “…-Implementation of Improved Energy Efficient FIR Filter using Reversible Logic -- A Study on benefits of Big data for healthcare sector of India -- Handling Uncertainty in Linguistics using Probability Theory -- Review of Quality of Service based Techniques in Cloud Computing -- Skyline Computation for Big Data -- Available Energy Aware Multipath Routing For Reliable Service Discovery in MANET -- Human Face Detection Enabled Smart Stick for Visually Impaired People -- Web Based Service Recommendation System by Considering User Requirements -- Optimal Energy Conservation for Route Selection to improve in MANET -- Unsupervised Machine Learning for Clustering the Infected Leaves based on the Leaf-colours -- Real Time Big Data Analysis Architecture and Application -- Missing Value Imputation in Medical Records for Remote Healthcare -- Reliable Data Discovery with Two Ray Ground Way on DSR Routing in MANET -- Secure vehicular communication using Road side unit (RSU) trust management scheme -- Recommendation Framework for Diet and Exercise based on Clinical Data: A Systematic Review -- Predictive Models for Recommanding Restaurent System by users own Preference -- Security Assessment of SAODV Protocols in Mobile Adhoc Networks -- Attack Detection and its Analysis in DTN Mobile Ad-hoc network -- Secure Sum Computation using Homomorphic Encryption -- Traffic Analysis in Location Base Routing System in MANET -- Automated Workload management using machine learning -- A survey on Link Recovery in Wireless Mesh Network using resilience scheme -- MultiUser Detection in Wireless Networks Using Decision Feedback Signal Cancellation -- ANN Based Predictive State Modelling of Finite State Machines -- Deep dive exploration of mixed reality in the world of Big Data.…”
Full-text access
View in OPAC
e-Book -
4
-
5
The Palgrave Handbook of Minority Languages and Communities
Published 2019Full-text access
View in OPAC
e-Book -
6
Information Technology - New Generations 15th International Conference on Information Technology /
Published 2018Table of Contents: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks inwireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithmfor Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri NetModel to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- AComputer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of Individual's Perception -- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems -- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise -- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly -- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company -- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review -- Operating System Security Management and…”
Full-text access
View in OPAC
e-Book -
7
Proceedings of the 13th Reinventing Space Conference
Published 2018Table of Contents: “…An analysis of ownership -- The Open Source Movement Reaches CubeSat Missions -- Development of low cost propulsion systems for launch and inspace applications -- The Google Lunar XPRIZE - Past, Present and Future -- Implementing solid rocket thrusters on cube satellites to increase their lifetime and to push them to a decay orbit to avoid being contaminated as space debris -- Using a recovery system of parachutes and gliders to recover the first stage of a launch vehicle for reusability purposes -- Mathematical Modelling and Simulation of a Solid Rocket Booster -- Fostering technology innovation in space through national activities: The swiss example Economic and fast FPGA configuration development of a payload module computer -- Bartolomeo - An innovation platform for end-to-end payload hosting services Venusun floating station for Venus -- An analytical, low-cost deployment strategy for satellite constellations -- Intelligent Satellite Swarm for EO data distribution -- A nanosatellite carrier concept to enable affordable innovative deep space missions -- 3d printed satellites; a manufacturing revolution -- Development of a low cost IVA pressure suit for commercial space flight applications -- SEAHAWK: A nanosatellite mission for sustained ocean observation -- Space Settlement for Ganymede -- Dispatch me to my orbit... -- Space settlement for Europa -- Considerations for low-cost small satellite launchers -- Crowdlift - Harnessing the power of the many -- Global Launcher Market Survey - Where are we and where are we going? …”
Full-text access
View in OPAC
e-Book -
8
Proceedings of International Conference on Artificial Intelligence and Applications : Icaia 2020.
Published 2020Table of Contents: “…Classification of EEG Signals for Hand Gripping Motor Imagery and Hardware Representation of Neural States Using Arduino-Based LED Sensors -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Acquisition -- 3.2 Data Preprocessing -- 3.3 Feature Extraction -- 3.4 Classification -- 3.5 Hardware Implementation -- 4 Results -- 5 Discussion -- References -- Bandwidth and Gain Enhancement Techniques of DRA Antenna -- 1 Introduction -- 2 DRA Mathematical Modeling -- 3 Antenna Designs -- 4 Results and Discussion -- 5 Conclusion -- References -- Social Intelligence and Sustainability -- TODD: Time-Aware Opinion Dynamics Diffusion Model for Online Social Networks -- 1 Introduction -- 2 Existing Diffusion Benchmarks -- 3 Proposed TODD Algorithmic Framework -- 4 Discussion -- 5 Conclusion -- References -- Spectral Graph Theory-Based Spatio-spectral Filters for Motor Imagery Brain-Computer Interface -- 1 Introduction -- 2 Proposed Approach: Graph Theory-Based Common Spatial Patterns (GBCSP) -- 3 Experimental Results -- 4 Conclusions -- References -- Discovering Mutated Motifs in DNA Sequences: A Comparative Analysis -- 1 Introduction -- 2 Problem Definition -- 3 Literature Survey -- 4 Algorithmic Analysis and Evaluation -- 4.1 Graph-Based Algorithm -- 4.2 Anchor-Based Clustering Algorithm -- 4.3 Speed-up Technique -- 4.4 Heuristic Algorithm Using Topic Models -- 4.5 Using Genetic Algorithm -- 4.6 MCES Algorithm for Large Dataset -- 5 Comparative Analysis -- 6 Conclusion -- References -- Classification of S& -- P 500 Stocks Based on Correlating Market Trends -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 3.1 Dataset Collection and Preprocessing -- 3.2 Data Visualization -- 3.3 Classifier Modeling and Implementation -- 4 Results -- 5 Conclusion and Future Scope -- References.…”
Full-text access
View in OPAC
e-Book -
9
Information Systems Design and Intelligent Applications Proceedings of Third International Conference INDIA 2016, Volume 2 /
Published 2016Table of Contents: “…-Chapter 15. Building Stateful Firewall Over Software Defined Networking -- Chapter 16. …”
Full-text access
View in OPAC
e-Book -
10
Land Reclamation in Ecological Fragile Areas : Proceedings of the 2nd International Symposium on Land Reclamation and Ecological Restoration (LRER 2017), October 20-23, 2017, Beiji...
Published 2017Table of Contents: “…Study on calculating projection deformation of measured length using an amended particle swarm optimization -- Study on the acquisition technology for information on damaged land in coal-mining areas -- Deformation mechanism and support measures of the soft rock roadway in Ronghua coal mine -- Evaluation of the ecological environment in mining areas based on fuzzy comprehensive evaluation method -- Evaluation for land damage in mining areas with a high underground water level based on RS -- Assessing ecological security based on fishnet: A case study of Guiyang City -- The application of classified assignment and power-law models for wound space in quantitative assessments of degraded land -- Preliminary analysis of the geological hazards prediction in the process of coal mining -- The application of mobile GIS in mine land reclamation monitoring -- Object-based change monitoring in mining areas-taking Pingshuo as an example -- Fast surveying and large scale mapping in the mining area of the delta wing -- Study on the limit angle of mining subsidence basin based on the field survey data in the mining area -- Formation mechanisms and characteristics of ground collapse during shallow coal seam mining -- Urban heat island effect of mining cities under mining disturbance: A case study of Wu'an -- Application of fuzzy mathematics and GIS technology in the evaluation of mine environmental restoration -- Ecological footprint and carrying capacity of mining cities: A case study of Wu'an -- Landscape pattern change monitoring and predicting using remote sensing method-taking Jiaozuo as an example -- Monitoring of vegetation coverage by multi-temporal remote sensing images: A case study of Yulin coal mine -- Remote sensing inversion of soil organic carbon in Jining city based on decision tree classification.…”
Full-text access
View in OPAC
e-Book -
11
Proceedings of the Second International Conference on Computer and Communication Technologies IC3T 2015, Volume 3 /
Published 2016Table of Contents: “…Imputation of Missing Gene Expressions for DNA Microarray Using Particle Swarm Optimization -- Chapter 9. Deep Belief Network Based Part of Speech Tagger for Telugu Language -- Chapter 10. …”
Full-text access
View in OPAC
e-Book