Browsing ISCIM 2013 by Title

DSpace Repository

Browsing ISCIM 2013 by Title

Sort by: Order: Results:

  • Irmikci, Burhanettin; Elbir, Ahmet; Karabiber, Fethullah (2013-12-19)
    It is a very common problem to align signals upon time-axis for analysis of datasets obtained from biological experiments. Since biological or chemical signals may be measured differently due to some factors such as ...
  • Canhasi, Ercan (2013-12-19)
    This article describes a method used to calculate the similarity between short English texts, specifically of sentence length. The described algorithm calculates semantic and word order similarities of two sentences. In ...
  • Terolli, Erisa; Hakrama, Igli (2013-12-19)
    Difficulties faced by students while trying to penetrate into the labor market and challenges faced by university career offices when helping students build successful professional careers demand the building of mediums ...
  • Liftaj, Silvana; Sila, Eriola (2013-12-19)
    The concept of inner product lays an important role in functional analysis and in its applications. Starting from its axiomatic, many researches have made various modifications passing in its generalization, such as ...
  • Krakulli, Anjeza; Teliti, Xhezair (2013-12-19)
    Renault has defined in [7] the cohomology of the inverse semigroup G of the G-sets of a given groupoid G as a functor from the category of G-presheaves to that of abelian groups. We show in our paper that G-presheaves is ...
  • Bal, Abdullah (2013-12-19)
    Supervised filtering technique is a kind of dynamic neural network that performs one filter mask and one bias value which are adjustable by a supervised learning algorithm for various types of applications. Training procedure ...
  • Erdem, Hüseyin, Askin; Utku, Semih; Çakir, Sen (2013-12-19)
    In this study, an implementation of an education programme was designed by using Virtual Reality technology. This education system includes primary school course contents and uses Video Capture Virtual Reality technique. ...
  • Apostolova Trpkovska, Marika; Çiço, Betim (2013-12-20)
    The future of health care may be in “predictive health” that emphasizes prediction instead of diagnosis. Nowadays, the researchers are mining the data provided in social networks, aiming in prediction of diverse phenomena ...
  • Görkemli, Beyza; Karaboga, Dervis (2013-12-19)
    Combinatorial Artificial Bee Colony Algorithm (CABC) is a new version of Artificial Bee Colony (ABC) to solve combinatorial type optimization problems and quick Artificial Bee Colony (qABC) algorithm is an improved version ...
  • Seker, Sadi Evren; Mert, Cihan (2013-12-19)
    One of the crucial points in the text mining studies is the feature hashing step. Most of the text mining studies starts with a text data source and processes a feature extraction methodology over the text. Most of the ...
  • Faqolli, Adriola (2013-12-19)
    Acquisition and analysis of data from sensor networks, where nodes operate in unsupervised way, has become a ubiquitous issue. The biggest challenge in this process is related to limited energy, computational and memory ...
  • Chionis, Ioannis; Chroni, Maria; Fylakis, Angelos; Nikolopoulos, Stavros (2013-12-19)
    Digital watermarking involves embedding a watermark value within a digital object, such as image, audio, video, text and software, to prove authenticity in case of intellectual property infringement. Headed to this direction, ...
  • Domi, Eduard; Braja, Islam (2013-12-19)
    In this paper we give some results on gamma-near-fields through a new definition. We prove that a $\Gamma$-near-field is B-simple and for every $\alpha$ exists an element that is $\alpha$-distributive and for every $0 \neq ...
  • Xhafaj, Evgjeni; Nurja, Ines; Xhafaj, Alban (2013-12-19)
    Poverty is a now days case in the developing country, especially in Albania. It is important to define which is the criteria that distinguish poor from non poor and usually is necessary a description of the poverty phenomenon ...
  • Chionis, Ioannis; Nikolopoulos, Stavros; Polenakis, Iosif (2013-12-19)
    Malware is a specific type of software intended to breed damages ranging from computer systems fallout to deprivation of data integrity and confidentiality. Recently, along with the high usage of distributed systems and ...
  • van Emde Boas, Peter (2013-12-19)
    The stratified tree, also called van Emde Boas tree, is a data structure implementing the full repertoire of instructions manipulating a single subset $A$of a finite ordered Universe $U = [0 ... u-1]$. Instructions include ...
  • Capuni, Ilir; Dervishaj, Ervin (2013-12-19)
    The most natural question of reliable computation, in every computation model and noise model,is whether given a certain level of noise, a machine of that model exists that canperform arbitrarily complex computations under ...
  • Kalemi, Edlira; Tola, Krisel (2013-12-19)
    The real-time web is a set of technologies and practices that enable users to receive information as soon as it is published by its authors, rather than requiring that they or their software check a source periodically for ...

Search DSpace


Browse

My Account