Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Bu bölümdeki koleksiyonlar
-
MF - Bildiri Koleksiyonu | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering [113]
Bilgisayar Mühendisliği Bölümüne ait bildiri koleksiyonunu içerir. -
MF - Diğer Koleksiyonu | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering [2]
Bilgisayar Mühendisliği Bölümüne ait diğer koleksiyonu içerir. -
MF - Kitap / Kitap Bölümü Koleksiyonu | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering [5]
Bilgisayar Mühendisliği Bölümüne ait kitap ve kitap bölümü koleksiyonunu içerir. -
MF - Makale Koleksiyonu | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering [68]
Bilgisayar Mühendisliği Bölümüne ait makale koleksiyonunu içerir.
Güncel Gönderiler
-
AnlamVer: Semantic model evaluation dataset for Turkish - word similarity and relatedness
(Association for Computational Linguistics (ACL), 2018-08-26)In this paper, we present AnlamVer, which is a semantic model evaluation dataset for Turkish designed to evaluate word similarity and word relatedness tasks while discriminating those two relations from each other. Our ... -
Mitosis detection using generic features and an ensemble of cascade adaboosts
(Elsevier, 2013-05-30)Context: Mitosis count is one of the factors that pathologists use to assess the risk of metastasis and survival of the patients, which are affected by the breast cancer. Aims: We investigate an application of a set of ... -
BOUN-ISIK participation: an unsupervised approach for the named entity normalization and relation extraction of Bacteria Biotopes
(Association for Computational Linguistics (ACL), 2019-11-04)This paper presents our participation at the Bacteria Biotope Task of the BioNLP Shared Task 2019. Our participation includes two systems for the two subtasks of the Bacteria Biotope Task: the normalization of entities ... -
A novel hybrid edge detection technique: ABC-FA
(ISRES Organizasyon Turizm Eğitim Danışmanlık Ltd. Şti., 2017-11-09)Image processing is a vast research field with diversified set of practices utilized in so many application areas such as military, security, medical imaging, machine learning and computer vision based on extracted useful ... -
Evrisimsel sinir ağları ile rekabetçi derin öğrenme
(Tübitak, 2021-09-15)İmge üzerinde nesne tanımada, nesnenin imge üzerindeki yeri, açısal yönelimi ve ölçeği algoritmik olarak çözülmesi gereken önemli zorluklardır. Bu zorlukları aşmak için son yıllarda en sık kullanılan ve en başarılı sonuçları ... -
Programlamaya giriş dersini alan öğrencilerin programlama öz yeterlilik algılarının ve programlamaya bakış açılarının incelenmesi
(Düzce Üniversitesi, 2021-05-29)Bu çalışmada üniversite öğrencilerinin Java programlama öz yeterlilik algıları, programlama öğrenme istekleri ve çalışma alışkanlıkları çeşitli değişkenlere göre (cinsiyet, bölüm, eğitim dili, harf notu, ders tekrarları ... -
From past to present: spam detection and identifying opinion leaders in social networks
(Yildiz Teknik Univ., 2022-06-22)On microblogging sites, which are gaining more and more users every day, a wide range of ideas are quickly emerging, spreading, and creating interactive environments. In some cases, in Turkey as well as in the rest of the ... -
ComStreamClust: a communicative multi-agent approach to text clustering in streaming data
(Springer Science and Business Media Deutschland GmbH, 2023-12)Topic detection is the task of determining and tracking hot topics in social media. Twitter is arguably the most popular platform for people to share their ideas with others about different issues. One such prevalent issue ... -
Categorization of the models based on structural information extraction and machine learning
(Springer Science and Business Media Deutschland GmbH, 2022-07-21)As various engineering fields increasingly use modelling techniques, the number of provided models, their size, and their structural complexity increase. This makes model management, including finding these models, with ... -
Closeness and uncertainty aware adversarial examples detection in adversarial machine learning
(Elsevier Ltd, 2022-07)While deep learning models are thought to be resistant to random perturbations, it has been demonstrated that these architectures are vulnerable to deliberately crafted perturbations, albeit being quasi-imperceptible. These ... -
Battle Royale Optimizer for solving binary optimization problems
(Elsevier B.V., 2022-05)Battle Royale Optimizer (BRO) is a recently proposed metaheuristic optimization algorithm used only in continuous problem spaces. The BinBRO is a binary version of BRO. The BinBRO algorithm employs a differential expression, ... -
Uncertainty as a Swiss army knife: new adversarial attack and defense ideas based on epistemic uncertainty
(Springer, 2022-04-02)Although state-of-the-art deep neural network models are known to be robust to random perturbations, it was verified that these architectures are indeed quite vulnerable to deliberately crafted perturbations, albeit being ... -
Convolutional attention network for MRI-based Alzheimer's disease classification and its interpretability analysis
(IEEE, 2021-09-17)Neuroimaging techniques, such as Magnetic Resonance Imaging (MRI) and Positron Emission Tomography (PET), help to identify Alzheimer's disease (AD). These techniques generate large-scale, high-dimensional, multimodal ... -
k-Means clustering by using the calculated Z-scores from QEEG data of children with dyslexia
(Taylor & Francis, 2023)Learning the subtype of dyslexia may help shorten the rehabilitation process and focus more on the relevant special education or diet for children with dyslexia. For this purpose, the resting-state eyes-open 2-min QEEG ... -
Tweet sentiment analysis for cryptocurrencies
(IEEE, 2021-10-13)Many traders believe in and use Twitter tweets to guide their daily cryptocurrency trading. In this project, we investigated the feasibility of automated sentiment analysis for cryptocurrencies. For the study, we targeted ... -
Exploiting epistemic uncertainty of the deep learning models to generate adversarial samples
(Springer, 2022-03)Deep neural network (DNN) architectures are considered to be robust to random perturbations. Nevertheless, it was shown that they could be severely vulnerable to slight but carefully crafted perturbations of the input, ... -
BinBRO: Binary Battle Royale Optimizer algorithm
(Elsevier Ltd, 2022-02-04)Stochastic methods attempt to solve problems that cannot be solved by deterministic methods with reasonable time complexity. Optimization algorithms benefit from stochastic methods; however, they do not guarantee to obtain ... -
ISIKUN at the FinCausal 2020: Linguistically informed machine-learning approach for causality identification in financial documents
(Association for Computational Linguistics (ACL), 2020)This paper presents our participation to the FinCausal-2020 Shared Task whose ultimate aim is to extract cause-effect relations from a given financial text. Our participation includes two systems for the two sub-tasks of ... -
On the online coalition structure generation problem
(AI Access Foundationusc Information Sciences Inst, 2021)We consider the online version of the coalition structure generation problem, in which agents, corresponding to the vertices of a graph, appear in an online fashion and have to be partitioned into coalitions by an authority ...