Recent Submissions

  • Word sense disambiguation, named entity recognition, and shallow parsing tasks for Turkish 

    Topsakal, Ozan (Işık Üniversitesi, 2019-04-02)
    People interactions are based on sentences. The process of understanding sentences is thru converging, parsing the words and making sense of words. The ultimate goal of Natural Language Processing is to understand the ...
  • Learning filter scale and orientation in convolutional neural networks 

    Çam, İlker (Işık Üniversitesi, 2019-04-02)
    Convolutional neural networks have many hyper-parameters such as filter size, number of filters, and pooling size, which require manual tuning. Though deep stacked structures are able to create multi-scale and hierarchical ...
  • Big data storage and automated text summarization in Turkish text 

    Aysu, Erdinç (Işık Üniversitesi, 2018-06-19)
    The subject of this study is storing the large datasets in accordance with Big Data ecosystem and to extract the summary sentences of a text in Turkish, apply the automatic text summarization process which is a subtopic ...
  • Automatic comment generation using the source code 

    Yıldız, Eren (Işık Üniversitesi, 2018-01-23)
    In this study, automatic comment generation for Java methods is described. It is sufficient that the codes conform to the syntax rules of the Java programming language, and it is not expected to be runnable. In order to ...
  • Sense distinction using computational methods in turkish dictionaries 

    Ertopçu, Burak (Işık Üniversitesi, 2018-01-25)
    NLP(Natural Language Processing) refers to general name of the study elds related with processing languages by using computer-based systems. In NLP studies, dictionaries are required as lexical and semantic resources. ...
  • Morphological analyser for turkish 

    Özenç, Berke (Işık Üniversitesi, 2018-01-25)
    Natural Language Processing is one one the fields of work in computer science and specializes in text summarization, machine translation and many various topics. Morphology is one of the Natural Language Processing features ...
  • Graph clustering approach to sentiment analysis 

    Kanburoğlu, Ali Buğra (Işık Üniversitesi, 2018-01-24)
    In this thesis, we aim at automatically predicting Turkish movie review scores using adjective clustering. We also measured the reliability of the two popular sentiment lexicons. In order to measure the agreement between ...
  • Fabric defect detection in frequency domain using fourier analysis 

    Titrek, Nuri Gökay (Işık Üniversitesi, 2016)
    An overwhelming majority of image processing based defect detection approaches rely on machine learning methods to train a model for comparison of test examples. This requires a training phase for each item to be learned ...
  • A model for corporate e-learning: Learnomotive 

    Cansun, Resmiye Ece (Işık Üniversitesi, 2008-09-17)
    Enterprises with dynamic business processes have training needs that should be addressed innovatively. Depending on the business process, new tasks may be constructed. The competence level differences between workers may ...
  • A mobile haemodialysis patient care expert system 

    Yılmaz, Elif Banu (Işık Üniversitesi, 2005)
    A mobile haemodialysis patient care expert system is explaining the situations and their treatments which required urgent enterprise during the interval of the two hemodialysis sessions. The user of this system is the adult ...
  • Differentially private attribute selection for classification 

    Var, Esra (Işık Üniversitesi, 2015-06-18)
    Any study on processing or analyzing large data sets that contain personally sensitive data should conform against some form of privacy protection mechanism. Otherwise, malicious people can aceess these data sets to extract ...
  • Mathematical modeling of human facial muscles 

    Ağdoğan, Didem (Işık Üniversitesi, 2015-08-10)
    In this study; a new muscle model is proposed for computation of actual muscle forces that exist during facial expressions. Modeling of facial muscle forces is done on the expression of surprise. We choose this expression ...
  • Improved microphone array design with statistical speaker identification methods 

    Demir, Kadir Erdem (Işık Üniversitesi, 2016-05-17)
    Conventional microphone array implementations aim to lock onto a source with given location and if required, tracking it. This implementation is straightforward when the location or the path of the sourceand interference ...
  • Author identification of newspaper columns using style and semantic features 

    Yıldız, Ergin Doğan (Işık Üniversitesi, 2016-05-17)
    This study has two major purposes : to implement and compare the author classification results of di erent Naive Bayes Classi ers, and to investigate whether merging individual methods will increase classi cation success ...
  • Detecting facial features automatically 

    Olzvoi, Uranchimeg (Işık Üniversitesi, 2013-07-02)
    There are many algorithms and approaches in object detection world. Many of them are based on Viola Jones algorithm. According to our observations, the features which help to detect an object are very critical for the ...
  • Design and implementation of a software agent platform applied in e-learning and course management 

    Erdoğan, Gürol (Işık Üniversitesi, 2004)
    In this thesis, we report an experience on constructing a software agent platform for development and implementation of software agent systems running with integrated e-learning and course management applications which are ...
  • Database design and implementation issues in Library Domain 

    Arsun, Onur İhsan (Işık Üniversitesi, 2006)
    In this thesis, we study the design and implementation issues in library management systems. Depending heavily on data, library management systems should have effective means to access and store data. We propose a novel ...
  • Distributed iterative cluster localization in wireless sensor networks 

    Olca Arda, Çakıroğlu (Işık Üniversitesi, 2009-01-07)
    We designed a distributed algorithm for iterative cluster localization. Because this algorithm is especially designed for large scale networks, increase in the number of sensor nodes has no ine ciency e ect on sensor node ...
  • Data collection and analysis on vanet 

    Karatoy, Hilal (Işık Üniversitesi, 2009-02-01)
    The communication between devices is provided by wireless networks and it is growing rapidly, dependent on the needs. Wireless networks strike the attention of people throughout the world, and the ad hoc network is part ...
  • Data access layer code generators 

    Küçükeren, Gökçe (Işık Üniversitesi, 2006)
    Layering techniques are commonly used in order to supply the operational requirements of today's complex enterprise applications. The codes developed for the Data Access Layer (DAL), which is the foundation of most layered ...

View more