Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 35

Full-Text Articles in Entire DC Network

Hyper-Heuristic Approach With K-Means Clustering For Inter-Cell Scheduling, Yanlin Zhao, Yunna Tian Apr 2024

Hyper-Heuristic Approach With K-Means Clustering For Inter-Cell Scheduling, Yanlin Zhao, Yunna Tian

Journal of System Simulation

Abstract: According to the actual production situation of China's manufacturing industry, a hyperheuristic algorithm based on K-means clustering is proposed for inter-cell scheduling problem of flexible job-shop. K-means clustering is applied to group entities with similar attributes into the corresponding work cluster decision blocks, and the ant colony algorithm is used to select heuristic rules for each decision block. The optimal scheduling solutions are generated by using corresponding heuristic rules for scheduling of entities in each decision block. Computational results show that, the computational granularity is properly increased by the form of decision blocks, and the computational efficiency of the …


Combating Financial Crimes With Unsupervised Learning Techniques: Clustering And Dimensionality Reduction For Anti-Money Laundering, Ahmed N. Bakry, Almohammady S. Alsharkawy, Mohamed S. Farag, Kamal R. Raslan Apr 2024

Combating Financial Crimes With Unsupervised Learning Techniques: Clustering And Dimensionality Reduction For Anti-Money Laundering, Ahmed N. Bakry, Almohammady S. Alsharkawy, Mohamed S. Farag, Kamal R. Raslan

Al-Azhar Bulletin of Science

Anti-Money Laundering (AML) is a crucial task in ensuring the integrity of financial systems. One keychallenge in AML is identifying high-risk groups based on their behavior. Unsupervised learning, particularly clustering, is a promising solution for this task. However, the use of hundreds of features todescribe behavior results in a highdimensional dataset that negatively impacts clustering performance.In this paper, we investigate the effectiveness of combining clustering method agglomerative hierarchicalclustering with four dimensionality reduction techniques -Independent Component Analysis (ICA), andKernel Principal Component Analysis (KPCA), Singular Value Decomposition (SVD), Locality Preserving Projections (LPP)- to overcome the issue of high-dimensionality in AML data and …


Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater Aug 2023

Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater

SMU Data Science Review

Static and dynamic analyses are the two primary approaches to analyzing malicious applications. The primary distinction between the two is that the application is analyzed without execution in static analysis, whereas the dynamic approach executes the malware and records the behavior exhibited during execution. Although each approach has advantages and disadvantages, dynamic analysis has been more widely accepted and utilized by the research community whereas static analysis has not seen the same attention. This study aims to apply advancements in static analysis techniques to demonstrate the identification of fine-grained functionality, and show, through clustering, how malicious applications may be grouped …


Identifying The Use Of A Park Based On Clusters Of Visitors' Movements From Mobile Phone Data, Roberto Pierdicca, Marina Paolanti, Raffaele Vaira, Ernesto Marcheggiani, Eva Savina Malinverni, Emanuele Frontoni Jul 2021

Identifying The Use Of A Park Based On Clusters Of Visitors' Movements From Mobile Phone Data, Roberto Pierdicca, Marina Paolanti, Raffaele Vaira, Ernesto Marcheggiani, Eva Savina Malinverni, Emanuele Frontoni

Journal of Spatial Information Science

Planning urban parks is a burdensome task, requiring knowledge of countless variables that are impossible to consider all at the same time. One of these variables is the set of people who use the parks. Despite information and communication technologies being a valuable source of data, a standardized method which enables landscape planners to use such information to design urban parks is still broadly missing. The objective of this study is to design an approach that can identify how an urban green park is used by its visitors in order to provide planners and the managing authorities with a standardized …


Clustered Mobile Data Collection In Wsns: An Energy-Delay Trade-Of, İzzet Fati̇h Şentürk Jan 2021

Clustered Mobile Data Collection In Wsns: An Energy-Delay Trade-Of, İzzet Fati̇h Şentürk

Turkish Journal of Electrical Engineering and Computer Sciences

Wireless sensor networks enable monitoring remote areas with limited human intervention. However, the network connectivity between sensor nodes and the base station (BS) may not be always possible due to the limited transmission range of the nodes. In such a case, one or more mobile data collectors (MDCs) can be employed to visit nodes for data collection. If multiple MDCs are available, it is desirable to minimize the energy cost of mobility while distributing the cost among the MDCs in a fair manner. Despite availability of various clustering algorithms, there is no single fits all clustering solution when different requirements …


Slashing Quality Index Modeling And Simulation Based On Data Dispersion Clustering, Yuxian Zhang, Xiaoyi Qian, Dong Xiao, Jianhui Wang Aug 2020

Slashing Quality Index Modeling And Simulation Based On Data Dispersion Clustering, Yuxian Zhang, Xiaoyi Qian, Dong Xiao, Jianhui Wang

Journal of System Simulation

Abstract: For the sensitivity of noise and outliers data in the typical partitioning clustering algorithm, a clustering algorithm based on data dispersion was proposed. The data dispersion was defined and introduced to a non-Euclidean distance. The similarity metric was established, and the data clustering was realized. The optimal clustering number was obtained by the validity function based on improved partition coefficient. Then the proposed clustering algorithm was applied to quality index model in slashing process. A size add-on quality index model was built by radial basis function neural networks. The node number of hidden layer was determined and the center …


Key Technologies Of Precaution And Prediction Of Abnormal Spatial-Temporal Trajectory: A Review Of Recent Advances, Gongda Qiu, He Ming, Yang Jie, Yuting Cao, Jihong Sun Jun 2020

Key Technologies Of Precaution And Prediction Of Abnormal Spatial-Temporal Trajectory: A Review Of Recent Advances, Gongda Qiu, He Ming, Yang Jie, Yuting Cao, Jihong Sun

Journal of System Simulation

Abstract: The ex-post disposition of a major incident, which is expected to transform into prediction and precaution of abnormal behavior, is increasingly unable to meet the urgent needs of the society.Therapid development and popularization of sensor network and positioning technology lay the foundation for mining spatial-temporal trajectory data. With the key objective of prediction and precaution of abnormal trajectory based on big data mining, the future research directions and prospects on trajectory clustering and recognitionareanalyzed, discussed and elaboratedinthis paper.Temporal trajectory prediction applied in prediction and precaution of abnormal spatial-temporal trajectory is also presented, providing a reference for further research on …


Bibsqlqc: Brown Infomax Boosted Sql Query Clustering Algorithm To Detectanti-Patterns In The Query Log, Vinothsaravanan Ramakrishnan, Palanisamy Chenniappan Jan 2020

Bibsqlqc: Brown Infomax Boosted Sql Query Clustering Algorithm To Detectanti-Patterns In The Query Log, Vinothsaravanan Ramakrishnan, Palanisamy Chenniappan

Turkish Journal of Electrical Engineering and Computer Sciences

Discovery of antipatterns from arbitrary SQL query log depends on the static code analysis used to enhance the quality and performance of software applications. The existence of antipatterns reduces the quality and leads to redundant SQL statements. SQL log includes a large load on the database and it is difficult for an analyst to extract large patterns in a minimal time. Existing techniques which discover antipatterns in SQL query face a lot of innumerable challenges to discover the normal sequences of queries within the log. In order to discover the antipatterns in the log, an efficient technique called Brown infomax …


An Efficient Storage-Optimizing Tick Data Clustering Model, Haleh Amintoosi, Masood Niazi Torshiz, Yahya Forghani, Sara Alinejad Jan 2020

An Efficient Storage-Optimizing Tick Data Clustering Model, Haleh Amintoosi, Masood Niazi Torshiz, Yahya Forghani, Sara Alinejad

Turkish Journal of Electrical Engineering and Computer Sciences

Tick data is a large volume of data, related to a phenomenon such as stock market or weather change, with data values changing rapidly over time. An important issue is to store tick data table in a way that it occupies minimum storage space while at the same time it can provide fast execution of queries. In this paper, a mathematical model is proposed to partition tick data tables into clusters with the aim of minimizing the required storage space. The genetic algorithm is then used to solve the mathematical model which is indeed a clustering model. The proposed method …


A Data Science Approach To Defining A Data Scientist, Andy Ho, An Nguyen, Jodi L. Pafford, Robert Slater Dec 2019

A Data Science Approach To Defining A Data Scientist, Andy Ho, An Nguyen, Jodi L. Pafford, Robert Slater

SMU Data Science Review

In this paper, we present a common definition and list of skills for a Data Scientist using online job postings. The overlap and ambiguity of various roles such as data scientist, data engineer, data analyst, software engineer, database administrator, and statistician motivate the problem. To arrive at a single Data Scientist definition, we collect over 8,000 job postings from Indeed.com for the six job titles. Each corpus contains text on job qualifications, skills, responsibilities, educational preferences, and requirements. Our data science methodology and analysis rendered the single definition of a data scientist: A data scientist codes, collaborates, and communicates – …


Spatiotemporal Mode Analysis Of Urban Dockless Shared Bikes Based On Point Of Interests Clustering, Zhang Fang, Bin Chen, Yanghua Tang, Dong Jian, Chuan Ai, Xiaogang Qiu Dec 2019

Spatiotemporal Mode Analysis Of Urban Dockless Shared Bikes Based On Point Of Interests Clustering, Zhang Fang, Bin Chen, Yanghua Tang, Dong Jian, Chuan Ai, Xiaogang Qiu

Journal of System Simulation

Abstract: The city’s dockless shared bikes have developed rapidly, and its features of convenience, economy and efficiency have been widely welcomed. The digital footprint they generate reveals the movement of people in time and space within the city, which makes it possible to quantify the activities of people in the city using shared bikes. In this paper, based on the collected shared bikes data of Beijing, a clustering method based on the point of interests is proposed to divide the urban space, so as to construct a mobile network of urban shared bikes, and analysis the spatiotemporal mode of bike …


A New Model To Determine The Hierarchical Structure Of The Wireless Sensor Networks, Resmi̇ye Nasi̇boğlu, Zülküf Teki̇n Erten Jan 2019

A New Model To Determine The Hierarchical Structure Of The Wireless Sensor Networks, Resmi̇ye Nasi̇boğlu, Zülküf Teki̇n Erten

Turkish Journal of Electrical Engineering and Computer Sciences

Wireless sensor networks are one of the rising areas of scientific research. Common purpose of these investigations is usually constructing optimal structure of the network by prolonging its lifetime. In this study, a new model has been proposed to construct a hierarchical structure of wireless sensor networks. Methods used in the model to determine clusters and appropriate cluster heads are k-means clustering and fuzzy inference system (FIS), respectively. The weighted averaging based on levels (WABL) defuzzification method is used to calculate crisp outputs of the FIS. A new theorem for calculation of WABL values has been proved in order to …


Evaluating The Attributes Of Remote Sensing Image Pixels For Fast K-Means Clustering, Ali̇ Sağlam, Nurdan Baykan Jan 2019

Evaluating The Attributes Of Remote Sensing Image Pixels For Fast K-Means Clustering, Ali̇ Sağlam, Nurdan Baykan

Turkish Journal of Electrical Engineering and Computer Sciences

Clustering process is an important stage for many data mining applications. In this process, data elements are grouped according to their similarities. One of the most known clustering algorithms is the k-means algorithm. The algorithm initially requires the number of clusters as a parameter and runs iteratively. Many remote sensing image processing applications usually need the clustering stage like many image processing applications. Remote sensing images provide more information about the environments with the development of the multispectral sensor and laser technologies. In the dataset used in this paper, the infrared (IR) and the digital surface maps (DSM) are also …


Efficient Hierarchical Temporal Segmentation Method For Facial Expression Sequences, Jiali Bian, Xue Mei, Yu Xue, Liang Wu, Yao Ding Jan 2019

Efficient Hierarchical Temporal Segmentation Method For Facial Expression Sequences, Jiali Bian, Xue Mei, Yu Xue, Liang Wu, Yao Ding

Turkish Journal of Electrical Engineering and Computer Sciences

Temporal segmentation of facial expression sequences is important to understand and analyze human facial expressions. It is, however, challenging to deal with the complexity of facial muscle movements by finding a suitable metric to distinguish among different expressions and to deal with the uncontrolled environmental factors in the real world. This paper presents a two-step unsupervised segmentation method composed of rough segmentation and fine segmentation stages to compute the optimal segmentation positions in video sequences to facilitate the segmentation of different facial expressions. The proposed method performs localization of facial expression patches to aid in recognition and extraction of specific …


Exploring Bigram Character Features For Arabic Text Clustering, Dia Eddin Abuzeina Jan 2019

Exploring Bigram Character Features For Arabic Text Clustering, Dia Eddin Abuzeina

Turkish Journal of Electrical Engineering and Computer Sciences

The vector space model (VSM) is an algebraic model that is widely used for data representation in text mining applications. However, the VSM poses a critical challenge, as it requires a high-dimensional feature space. Therefore, many feature selection techniques, such as employing roots or stems (i.e. words without infixes and prefixes, and/or suffixes) instead of using complete word forms, are proposed to tackle this space challenge problem. Recently, the literature shows that one more basic unit feature can be used to handle the textual features, which is the twoneighboring character form that we call microword. To evaluate this feature type, …


Clustering Method Based On Graph Data Model And Reliability Detection, Yanyun Cheng, Huisong Bian, Changsheng Bian Jun 2018

Clustering Method Based On Graph Data Model And Reliability Detection, Yanyun Cheng, Huisong Bian, Changsheng Bian

Journal of System Simulation

Abstract: For the data in feature space, traditional clustering algorithm can take clustering analysis directly. High-dimensional spatial data cannot achieve intuitive and effective graphical visualization of clustering results in 2D plane. Graph data can clearly reflect the similarity relationship between objects. According to the distance of the data objects, the feature space data are modeled as graph data by iteration. Cluster analysis based on modularity is carried out on the modeling graph data. The two-dimensional visualization of non-spherical-shape distribution data cluster and result is achieved. The concept of credibility of the clustering result is proposed, and a method is proposed, …


Composite Vector Quantization For Optimizing Antenna Locations, Zekeri̇ya Uykan, Riku Jantti Jan 2018

Composite Vector Quantization For Optimizing Antenna Locations, Zekeri̇ya Uykan, Riku Jantti

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, we study the location optimization problem of remote antenna units (RAUs) in generalized distributed antenna systems (GDASs). We propose a composite vector quantization (CVQ) algorithm that consists of unsupervised and supervised terms for RAU location optimization. We show that the CVQ can be used i) to minimize an \textit{upper bound} to the cell-averaged SNR error for a desired/demanded location-specific SNR function, and ii) to maximize the cell-averaged \textit{effective} \textit{SNR}. The CVQ-DAS includes the standard VQ, and thus the well-known squared distance criterion (SDC) as a special case. Computer simulations confirm the findings and suggest that the proposed …


Proposing A New Clustering Method To Detect Phishing Websites, Morteza Arab, Mohammad Karim Sohrabi Jan 2017

Proposing A New Clustering Method To Detect Phishing Websites, Morteza Arab, Mohammad Karim Sohrabi

Turkish Journal of Electrical Engineering and Computer Sciences

Phishing websites are fake ones that are developed by ill-intentioned people to imitate real and legal websites. Most of these types of web pages have high visual similarities to hustle the victims. The victims of phishing websites may give their bank accounts, passwords, credit card numbers, and other important information to the designers and owners of phishing websites. The increasing number of phishing websites has become a great challenge in e-business in general and in electronic banking specifically. In the present study, a novel framework based on model-based clustering is introduced to fight against phishing websites. First, a model is …


A Clustering Approach Using A Combination Of Gravitational Search Algorithm And K-Harmonic Means And Its Application In Text Document Clustering, Mina Mirhosseini Jan 2017

A Clustering Approach Using A Combination Of Gravitational Search Algorithm And K-Harmonic Means And Its Application In Text Document Clustering, Mina Mirhosseini

Turkish Journal of Electrical Engineering and Computer Sciences

Data clustering is one of the most popular techniques of information management, which is used in many applications of science and engineering such as machine learning, pattern reorganization, image processing, data mining, and web mining. Different algorithms have been suggested by researchers, where the evolutionary algorithms are the best in data clustering and especially in big datasets. It is illustrated that GSA-KM, which is a combination of the gravitational search algorithm (GSA) and K-means (KM), is superior over some other comparative evolutionary methods. One of the drawbacks of this approach is dependency on the initial seeds. In this paper, a …


A Novel Approach For Extracting Ideal Exemplars By Clustering For Massivetime-Ordered Datasets, Ömer Faruk Ertuğrul Jan 2017

A Novel Approach For Extracting Ideal Exemplars By Clustering For Massivetime-Ordered Datasets, Ömer Faruk Ertuğrul

Turkish Journal of Electrical Engineering and Computer Sciences

The number and length of massive datasets have increased day by day and this yields more complex machine learning stages due to the high computational costs. To decrease the computational cost many methods were proposed in the literature such as data condensing, feature selection, and filtering. Although clustering methods are generally employed to divide samples into groups, another way of data condensing is by determining ideal exemplars (or prototypes), which can be used instead of the whole dataset. In this study, first the efficiency of traditional data condensing by clustering approach was confirmed according to obtained accuracies and condensing ratios …


An Intelligent Pso-Based Energy Efficient Load Balancing Multipath Technique In Wireless Sensor Networks, Sukhchandan Randhawa, Sushma Jain Jan 2017

An Intelligent Pso-Based Energy Efficient Load Balancing Multipath Technique In Wireless Sensor Networks, Sukhchandan Randhawa, Sushma Jain

Turkish Journal of Electrical Engineering and Computer Sciences

To provide a reliable and efficient service, load balancing plays an important role in wireless sensor networks (WSNs). There is a need to maximize the network lifetime for WSNs applications with periodic generation of data. Due to the relationship between energy consumption and network sensor node lifetime, energy consumption in a network should be minimized and balanced in order to increase network lifetime. Energy-efficient load-balancing techniques are needed to solve this problem. In this paper, a particle swarm optimization (PSO)-based energy-efficient load-balancing technique is proposed, in which the required number of routing paths and energy consumption of different nodes and …


Unsupervised Learning Of Allomorphs In Turkish, Burcu Can Jan 2017

Unsupervised Learning Of Allomorphs In Turkish, Burcu Can

Turkish Journal of Electrical Engineering and Computer Sciences

One morpheme may have several surface forms that correspond to allomorphs. In English, ed and $d$ are surface forms of the past tense morpheme, and $s$, es, and ies are surface forms of the plural or present tense morpheme. Turkish has a large number of allomorphs due to its morphophonemic processes. One morpheme can have tens of different surface forms in Turkish. This leads to a sparsity problem in natural language processing tasks in Turkish. Detection of allomorphs has not been studied much because of its difficulty. For example, tü and di are Turkish allomorphs (i.e. past tense morpheme), but …


An Adaptive Clustering Segmentation Algorithm Based On Fcm, Jun Yang, Yun-Sheng Ke, Mao-Zheng Wang Jan 2017

An Adaptive Clustering Segmentation Algorithm Based On Fcm, Jun Yang, Yun-Sheng Ke, Mao-Zheng Wang

Turkish Journal of Electrical Engineering and Computer Sciences

The cluster number and the initial clustering centers must be reasonably set before the analysis of clustering in most cases. Traditional clustering segmentation algorithms have many shortcomings, such as high reliance on the specially established initial clustering center, tendency to fall into the local maximum point, and poor performance with multithreshold values. To overcome these defects, an adaptive fuzzy C-means segmentation algorithm based on a histogram (AFCMH), which synthesizes both main peaks of the histogram and optimized Otsu criterion, is proposed. First, the main peaks of the histogram are chosen by operations like histogram smoothing, merging of adjacent peaks, and …


Applying Ahp And Clustering Approaches For Public Transportation Decisionmaking: A Case Study Of Isfahan City, Alireza Salavati, Hossein Haghshenas, Bahador Ghadirifaraz, Jamshid Laghaei, Ghodrat Eftekhari Dec 2016

Applying Ahp And Clustering Approaches For Public Transportation Decisionmaking: A Case Study Of Isfahan City, Alireza Salavati, Hossein Haghshenas, Bahador Ghadirifaraz, Jamshid Laghaei, Ghodrat Eftekhari

Journal of Public Transportation

The main purpose of this paper is to define appropriate criteria for the systematic approach to evaluate and prioritize multiple candidate corridors for public transport investment simultaneously to serve travel demand, regarding supply of current public transportation system and road network conditions of Isfahan, Iran. To optimize resource allocation, policymakers need to identify proper corridors to implement a public transportation system. In fact, the main question is to adopt the best public transportation system for each main corridor of Isfahan. In this regard, 137 questionnaires were completed by experts, directors, and policymakers of Isfahan to identify goals and objectives in …


Comparison Of Clustering Techniques For Traffic Accident Detection, Nejdet Doğru, Abdülhami̇t Subaşi Jan 2015

Comparison Of Clustering Techniques For Traffic Accident Detection, Nejdet Doğru, Abdülhami̇t Subaşi

Turkish Journal of Electrical Engineering and Computer Sciences

Transportation infrastructure in intelligent transportation systems (ITSs) is complemented with information and communication technologies to achieve better passenger safety and reduced transportation time, fuel consumption, and vehicle wear and tear. This paper shows how data mining techniques are used in ITSs for accident detection and prevention on motorways. In traffic, vehicles show similar behavior to that of vehicles in closed neighborhoods. Vehicles that show different behaviors than neighbor vehicles in cases like accidents, inappropriate lane changes, and speeding can be considered as anomalies and detected. In this paper, a traffic accident is simulated and the effectiveness of different clustering techniques …


M-Fdbscan: A Multicore Density-Based Uncertain Data Clustering Algorithm, Atakan Erdem, Taflan İmre Gündem Jan 2014

M-Fdbscan: A Multicore Density-Based Uncertain Data Clustering Algorithm, Atakan Erdem, Taflan İmre Gündem

Turkish Journal of Electrical Engineering and Computer Sciences

In many data mining applications, we use a clustering algorithm on a large amount of uncertain data. In this paper, we adapt an uncertain data clustering algorithm called fast density-based spatial clustering of applications with noise (FDBSCAN) to multicore systems in order to have fast processing. The new algorithm, which we call multicore FDBSCAN (M-FDBSCAN), splits the data domain into c rectangular regions, where c is the number of cores in the system. The FDBSCAN algorithm is then applied to each rectangular region simultaneously. After the clustering operation is completed, semiclusters that occur during splitting are detected and merged to …


Motion Clustering On Video Sequences Using A Competitive Learning Network, Sali̇h Görgünoğlu, Şafak Altay Jan 2014

Motion Clustering On Video Sequences Using A Competitive Learning Network, Sali̇h Görgünoğlu, Şafak Altay

Turkish Journal of Electrical Engineering and Computer Sciences

It is necessary to track human movements in crowded places and environments such as stations, subways, metros, and schoolyards, where security is of great importance. As a result, undesired injuries, accidents, and unusual movements can be determined and various precautionary measures can be taken against them. In this study, real-time or existing video sequences are used within the system. These video sequences are obtained from objects such as humans or vehicles, moving actively in various environments. At first, some preprocesses are made respectively, such as converting gray scale, finding the edges of the objects existing in the images, and thresholding …


Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague Jan 2014

Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague

Journal of Digital Forensics, Security and Law

Email is the most common and comparatively the most efficient means of exchanging information in today's world. However, given the widespread use of emails in all sectors, they have been the target of spammers since the beginning. Filtering spam emails has now led to critical actions such as forensic activities based on mining spam email. The data mine for spam emails at the University of Alabama at Birmingham is considered to be one of the most prominent resources for mining and identifying spam sources. It is a widely researched repository used by researchers from different global organizations. The usual process …


Using Trend Clusters For Spatiotemporal Interpolation Of Missing Data In A Sensor Network, Annalisa Appice, Anna Ciampi, Donato Malerba, Pietro Guccione Jun 2013

Using Trend Clusters For Spatiotemporal Interpolation Of Missing Data In A Sensor Network, Annalisa Appice, Anna Ciampi, Donato Malerba, Pietro Guccione

Journal of Spatial Information Science

Ubiquitous sensor stations continuously measure several geophysical fields over large zones and long (potentially unbounded) periods of time. However observations can never cover every location nor every time. In addition due to its huge volume the data produced cannot be entirely recorded for future analysis. In this scenario interpolation i.e. the estimation of unknown data in each location or time of interest can be used to supplement station records. Although in GIScience there has been a tendency to treat space and time separately integrating space and time could yield better results than treating them separately when interpolating geophysical fields. According …


Eetbr: Energy Efficient Token-Based Routing For Wireless Sensor Networks, Taner Çevi̇k, Abdül Hali̇m Zai̇m Jan 2013

Eetbr: Energy Efficient Token-Based Routing For Wireless Sensor Networks, Taner Çevi̇k, Abdül Hali̇m Zai̇m

Turkish Journal of Electrical Engineering and Computer Sciences

The most significant drawback of wireless sensor networks is energy scarcity. As there is an increasing need for operating these networks for relatively long times, energy saving becomes the key challenge in the design of the architectures and protocols for sensor networks. Therefore, several research studies have been performed for making contributions to the analysis of this energy shortage problem. Most of these research activities have been focused on finding solutions for the energy consumption of the communication unit, which is the dominant energy dissipating component of the sensor nodes. In this paper, a novel, token-based routing protocol adapted with …