Ara
Toplam kayıt 16, listelenen: 11-16
On approximation process by certain modified Dunkl generalization of Szasz-Beta type operators
(Journal Mathematics & Computer Science, 2019)
In this paper, we give a generalization of the Szasz-Beta type operators generated by Dunkl generalization of exponential function and obtain convergence properties of these operators by using Korovkin's theorem and weighted ...
Informatics education in different disciplines at university level case study: a survey of students' attitude toward informatics technologies
(2011)
This article presents a quantitative study on attitudes toward the usage of Information Technology related tools and applications. The study was conducted at a private university, Turkey, with 97 female and 113 male students ...
Designing a dynamic protocol for real-time Industrial Internet of Things-based applications by efficient management of system resources
(SAGE Publications Inc., 2019)
Wireless sensor networks have gained the attention of researchers from various fields due to increased applicability. This has thus led to rapid development in the field. However, these networks still suffer from various ...
FACE RECOGNITION BY GREY-LEVEL CO-OCCURRENCE MATRICES IN HEXAGONAL DIGITAL IMAGE PROCESSING
(ASOS Eğitim Bilişim Danışmanlık Otomasyon Yayıncılık Reklam Sanayi ve Ticaret LTD ŞTİ, 2019)
Face Recognition has been an attractive field of research fordecades, because face is one of the most useful and deterministicbiometrics. Image processing is called square pixel-based imageprocessing since its existence. ...
Serviks Kanserinin Erken Teşhisi için Çok Katmanlı Sitoloji Küplerinde Çekirdek ve Sitoplazma Bölütlenmesi
(Süleyman Demirel Üniversitesi, 2018)
Özet: Dünya genelinde kadınlarda yaygın olarak görülen ve kanser ölümlerinin
önde gelen nedenlerinden biri olan serviks kanseri, Pap smear testi sonucunda
elde edilen görüntülerdeki hücre sayısı, şekli ve özelliklerinden ...
Anomaly Detection Using Data Mining Methods in IT Systems: A Decision Support Application
(Sakarya Üniversitesi Fen Bilimleri Enstitüsü, 2018)
Although there are various studies on anomaly detection, effective and simple anomaly detection
approaches are necessary as the inadequacy of appropriate ways for substantial network environments. In
the existing analysis ...