Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Cengiz Gezer"'
Publikováno v:
Sensors, Vol 14, Iss 3, Pp 5622-5643 (2014)
Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathemati
Externí odkaz:
https://doaj.org/article/5f501086c5d844e69dad56a7ffe2e7f8
Autor:
Zafer Örs, Tayyip Uğur Taşkın, İrem Arhan, Levent Doğan, Cengiz Gezer, Ahmet Faruk Karakebelioğlu, Meltem Kesler
Publikováno v:
Orclever Proceedings of Research and Development. 1:188-197
Street lighting is an important part of the energy consumption of cities. With suitable smart lighting systems that increase energy efficiency, it is possible to save on lighting costs substantially. Intelligent street lighting systems generally cons
© 2022 IEEE.In an emergency, it is vital to evacuate individuals from the dangerous environments. Emergency evacuation plan-ning ensures that the evacuation is safe and optimal in terms of evacuation time for all of the people in evacuation. To this
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b008dab87b49c3c374ed9153234407ba
https://avesis.kayseri.edu.tr/publication/details/d525e0a7-77a3-4ce9-b162-45a7205871e0/oai
https://avesis.kayseri.edu.tr/publication/details/d525e0a7-77a3-4ce9-b162-45a7205871e0/oai
Publikováno v:
Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation ISBN: 9783030855765
In this paper, we introduce an end-to-end IoT framework for predictive maintenance with machine learning. With this framework, all the processes for developing a learning-based predictive maintenance model such as data acquisition, data preprocessing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2ba9399126f5f5e1361f63536737e196
https://doi.org/10.1007/978-3-030-85577-2_54
https://doi.org/10.1007/978-3-030-85577-2_54
Publikováno v:
Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation ISBN: 9783030856250
The loyalty programs are one of the effective marketing and business development strategies. Solutions offered for loyalty programs are generally tailor-made and created by sector-specific software. Existing loyalty program solutions cannot offer cam
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0cab6a0c284b1149be87bc6b2592a5d2
https://doi.org/10.1007/978-3-030-85626-7_89
https://doi.org/10.1007/978-3-030-85626-7_89
Publikováno v:
2021 the 5th International Conference on Information System and Data Mining.
Email templates have a significant impact on users in terms of productivity. Using an email template that is produced successfully is going to transfer the main information with a considerable impression. While the previous studies were focused on th
Publikováno v:
2021 the 5th International Conference on Information System and Data Mining.
Determining the potential customers is very important in direct marketing. Data mining techniques are one of the most important methods for companies to determine potential customers. However, since the number of potential customers is very low compa
Publikováno v:
ICISDM
Employees leave an organization when other organizations offer better opportunities than their current organizations. Continuity and sustenance and even completion of jobs are crucial issues for the companies not to suffer financial losses. Especiall
Publikováno v:
Journal of Parallel and Distributed Computing
This work was supported by the Turkish Scientific and Technical Research Council (TUBITAK) under Grant no. 3140911. Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines a
Publikováno v:
2019 4th International Conference on Computer Science and Engineering (UBMK).
With the increase in credit card usage of people, the credit card transactions increase dramatically. It is difficult to identify fraudulent transactions among the vast amount of credit card transactions. Although credit card fraud is limited in numb