Computer Science: Recent submissions
Now showing items 401-420 of 549
-
Darbe i̇şaretleri̇ i̇çi̇n aşırı-hızlı FPGA tabanlı eǧri̇ beti̇mlenmesi̇
(IEEE, 2012)Bu çalışmada anlatılan donanım 1.5 GHz Analog-Sayısal- Çevirici’den gelen darbe işaret dizisini işleyebilmekte ve darbe işaretlerini genlik, yükselme/düşme süresi ve varış zamanı parametreleriyle özetleyebilmektedir. Söz ... -
RANSAC-based training data selection on spectral features for emotion recognition from spontaneous speech
(Springer International Publishing, 2011)Training datasets containing spontaneous emotional speech are often imperfect due the ambiguities and difficulties of labeling such data by human observers. In this paper, we present a Random Sampling Consensus (RANSAC) ... -
Automatic fall detection for elderly by using features extracted from skeletal data
(IEEE, 2013)Automatic detection of unusual events such as falls is very important especially for elderly people living alone. Realtime detection of these events can reduce the health risks associated with a fall. In this paper, we ... -
Welcome from the general chairs
(IEEE, 2013) -
Persica: A Persian corpus for multi-purpose text mining and natural language processing
(IEEE, 2012)Lack of multi-application text corpus despite of the surging text data is a serious bottleneck in the text mining and natural language processing especially in Persian language. This paper presents a new corpus for NEWS ... -
High-performance complex event processing using continuous sliding views
(ACM, 2013)Complex Event Processing (CEP) has become increasingly important for tracking and monitoring anomalies and trends in event streams emitted from business processes such as supply chain management to online stores in e-commerce. ... -
The FIRMER-square contour algorithm
(Springer International Publishing, 2013)The recently proposed Square Contour Algorithm (SCA) provides a good solution to the blind equalization problem as it does not suffer from any type of phase rotation. However, its suitability to Code Division Multiple ... -
A fast circuit topology for finding the maximum of n k-bit numbers
(IEEE, 2013)Finding the value and/or address (position) of the maximum element of a set of binary numbers is a fundamental arithmetic operation. Numerous systems, which are used in different application areas, require fast (low-latency) ... -
Discovering frequent patterns to bootstrap trust
(Springer International Publishing, 2013)When a new agent enters to an open multiagent system, bootstrapping its trust becomes a challenge because of the lack of any direct or reputational evidence. To get around this problem, existing approaches assume the same ... -
Design for ARINC 653 conformance: architecting independent validation of a safety-critical RTOS
(IEEE, 2014)The ARINC 653 specification not only provides a standard application programming interface for an RTOS, but also specifies how to validate an ARINC 653 based RTOS. ARINC 653 Part 3 Conformity Test Specification specifies ... -
Hareketten yapı çıkarımı için görsel kullanıcı arayüzü
(IEEE, 2014)The usage of computer vision applications such as 3D reconstruction, motion tracking and augmented reality gradually increases. The first and the most important stage of these kind of applications is estimating the 3D scene ... -
Referanssız görüntü bloklanma ölçümü için yeni bir yöntem
(IEEE, 2014)Internet’te ve servis sağlayıcı ağlarında video trafiğinin tavan yaptığı günümüzde otomatik görüntü kalitesi ölçümünün faydaları aşikardır. Bu ölçümlerin birçok uygulamada gerçekzamanlı yapılması gerekir ve de bu “Referanssız” ... -
Inferring human values for safe AGI design
(Springer International Publishing, 2015)Aligning goals of superintelligent machines with human values is one of the ways to pursue safety in AGI systems. To achieve this, it is first necessary to learn what human values are. However, human values are incredibly ... -
Field programmable gate arrays implementation of dual tree complex wavelet transform
(IEEE, 2015)Due to the inherent time-varying characteristics of physiological systems, most biomedical signals (BSs) are expected to have non-stationary character. Therefore, any appropriate analysis method for dealing with BSs should ... -
An area efficient real time implementation of dual tree complex wavelet transform in field programmable gate arrays
(IEEE, 2015)Biomedical signals (BSs), which give information about the normal condition and also the inherent irregularities of our body, are expected to have non-stationary character due to the time-varying behavior of physiological ... -
A multi-channel real time implementation of dual tree complex wavelet Transform in field programmable gate arrays
(Springer International Publishing, 2016)In medical applications, biomedical acquisition systems (BASs) are frequently used in order to diagnose and monitor critical conditions such as stroke, epilepsy, Alzheimer disease, arrhythmias and etc. Biomedical signals ... -
Reproducing failures based on semiformal failure scenario descriptions
(Springer International Publishing, 2017)Due to the increasing size and complexity of software systems, it becomes hard to test these systems exhaustively. As a result, some faults can be left undetected. Undetected faults can lead to failures in deployed systems. ... -
Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance
(IEEE, 2016-04)In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis ... -
Availability analysis of software architecture decomposition alternatives for local recovery
(2017)We present an efficient and easy-to-use methodology to predict—at design time—the availability of systems that support local recovery. Our analysis techniques work at the architectural level, where the software designer ... -
How to trust a few among many
(Springer International Publishing, 2017)The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can ...
Share this page