: This paper describes a full two-level morphological description 5,9 of Turkish word structures. The description has been implemented using the PC-KIMMO environment 2 and is based...
The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitous society, and it is necessary to study how to construct RFID network system ...
Outlier detection techniques are widely used in many applications such as credit card fraud detection, monitoring criminal activities in electronic commerce, etc. These application...
Most image and video compression algorithms that have been proposed to improve picture quality relative to compression efficiency have either been designed based on objective crite...
In this paper we consider a two-node tandem Jackson network. Starting from a given state, we are interested in estimating the probability that the content of the second buffer exc...