İletişim Ağları ve Sosyal Organizasyon

2015-01-01

Suggestions

Dynamic quantization for track fusion under communication constraints
Gök, Görkem; Orguner, Umut; Department of Electrical and Electronics Engineering (2015)
Quantization is one of the important problems for track fusion in defense systems. Due to the communication constraints, the track information has to be quantized while it is sent from local agents to the fusion center. In this study, a new quantization approach is proposed for track fusion in fusion systems under communication constraints. The quantization algorithm used in practice for track fusion is a static nearest neighbor approach which selects the closest vector and the covariance in a table to the ...
Routing optimization methods for communication networks
Demircan, Ahmet Emrah; Leblebicioğlu, Mehmet Kemal; Department of Electrical and Electronics Engineering (2005)
This study discusses the routing optimization techniques and algorithms for communication networks. Preventing data loss on overloaded communication links and utilizing link bandwidths efficiently are the main problems of traffic engineering. Load balancing and routing problems are solved using both by heuristics such as genetic algorithms, and simulation techniques. These algorithms work on destination-based or flow-based routing techniques and mainly change the link weight system or try to select the best...
İletişim Kanallarını Kullanarak, Üniversitelerde Yeşil Yönetim Sürecinin Arttırılmasına Yönelik Bir İnceleme.
Erden, Nazif Kutay (null; 2019-04-28)
İletişim Sorunlarının Saldırganlığa Dil Ekseninde Yansımaları
Erden, Nazif Kutay (null; 2020-10-23)
Partial encryption of video for communication and storage
Yüksel, Turan; Yarman Vural, Fatoş Tunay; Akar, Gözde Bozdağı; Department of Computer Engineering (2003)
In this study, a new method is proposed to protect video data through partial encryption. Unlike previous methods, the bit rate of the encrypted portion can be controlled. In order to accomplish this task, a simple model for the time to break the partial encryption by a chipertext-only attack is defined. Then, the encrypted bit budget distribution strategy maximizing the time subject to the bitrate constraint is found. An algorithm to estimate the model parameters is constructed and it isthen implemented ov...
Citation Formats
Ç. Atakuman and D. Erdem, “İletişim Ağları ve Sosyal Organizasyon,” 2015, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/79303.