Başlık için Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering listeleme
Toplam kayıt 188, listelenen: 14-33
-
Bagging soft decision trees
(Springer Verlag, 2016)The decision tree is one of the earliest predictive models in machine learning. In the soft decision tree, based on the hierarchical mixture of experts model, internal binary nodes take soft decisions and choose both ... -
Battle Royale Optimizer for solving binary optimization problems
(Elsevier B.V., 2022-05)Battle Royale Optimizer (BRO) is a recently proposed metaheuristic optimization algorithm used only in continuous problem spaces. The BinBRO is a binary version of BRO. The BinBRO algorithm employs a differential expression, ... -
Biclustering expression data based on expanding localized substructures
(Springer-Verlag Berlin Heidelberg, 2009)Biclustering gene expression data is the problem of extracting submatrices of genes and conditions exhibiting significant correlation across both the rows and the columns of a data matrix of expression values. We provide ... -
Bilingual software requirements tracing using vector space model
(SciTePress, 2014)In the software engineering world, creating and maintaining relationships between byproducts generated during the software lifecycle is crucial. A typical relation is the one that exists between an item in the requirements ... -
BinBRO: Binary Battle Royale Optimizer algorithm
(Elsevier Ltd, 2022-02-04)Stochastic methods attempt to solve problems that cannot be solved by deterministic methods with reasonable time complexity. Optimization algorithms benefit from stochastic methods; however, they do not guarantee to obtain ... -
BOUN-ISIK participation: an unsupervised approach for the named entity normalization and relation extraction of Bacteria Biotopes
(Association for Computational Linguistics (ACL), 2019-11-04)This paper presents our participation at the Bacteria Biotope Task of the BioNLP Shared Task 2019. Our participation includes two systems for the two subtasks of the Bacteria Biotope Task: the normalization of entities ... -
Breaking an orbit-based symmetric cryptosystem
(Pergamon-Elsevier Science Ltd, 2011-09)We report a break for a recently proposed class of cryptosystems. The cryptosystem uses constant points of a periodic secret orbit to encrypt the plaintext. In order to break the system, it suffices to sort the constant ... -
Budding trees
(IEEE Computer Soc, 2014-08-24)We propose a new decision tree model, named the budding tree, where a node can be both a leaf and an internal decision node. Each bud node starts as a leaf node, can then grow children, but then later on, if necessary, its ... -
Bulanık mantık kullanılarak sese duyarlı aydınlatma
(IEEE, 2017-10-31)Sanayileşmenin ve teknolojinin gelişmesiyle birlikte, geçmişte çözülememiş olan problemler daha kolay çözülebilir hale gelmiştir. İnsan beyninin çalışma mekanizması çeşitli metotlar halinde bilgisayarlarda uygulanmaya ... -
Calculating the VC-dimension of decision trees
(IEEE, 2009)We propose an exhaustive search algorithm that calculates the VC-dimension of univariate decision trees with binary features. The VC-dimension of the univariate decision tree with binary features depends on (i) the ... -
Categorization of the models based on structural information extraction and machine learning
(Springer Science and Business Media Deutschland GmbH, 2022-07-21)As various engineering fields increasingly use modelling techniques, the number of provided models, their size, and their structural complexity increase. This makes model management, including finding these models, with ... -
Chunking in Turkish with conditional random fields
(Springer-Verlag, 2015-04-14)In this paper, we report our work on chunking in Turkish. We used the data that we generated by manually translating a subset of the Penn Treebank. We exploited the already available tags in the trees to automatically ... -
Closeness and uncertainty aware adversarial examples detection in adversarial machine learning
(Elsevier Ltd, 2022-07)While deep learning models are thought to be resistant to random perturbations, it has been demonstrated that these architectures are vulnerable to deliberately crafted perturbations, albeit being quasi-imperceptible. These ... -
Colored simultaneous geometric embeddings
(Springer-Verlag Berlin, 2007)We introduce the concept of colored simultaneous geometric embeddings as a generalization of simultaneous graph embeddings with and without mapping. We show that there exists a universal pointset of size n for paths colored ... -
Colored simultaneous geometric embeddings and universal pointsets
(Springer, 2011-07)Universal pointsets can be used for visualizing multiple relationships on the same set of objects or for visualizing dynamic graph processes. In simultaneous geometric embeddings, the same point in the plane is used to ... -
Comment on "Encryption and decryption of images with chaotic map lattices" [Chaos 16, 033118 (2006)]
(American Institute of Physics Inc., 2008-09)In this paper, we comment on the chaotic encryption algorithm proposed by A. N. Pisarchik et al. [Chaos 16, 033118 (2006)]. We demonstrate that the algorithm is not invertible. We suggest simple modifications that can ... -
Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]
(Elsevier Science BV, 2009-09-07)In this comment, we analyze a recently proposed Baptista-like cryptosystem and show that it is not invertible. Others weaknesses are also reported. A modified version of this cryptosystem is proposed to show how to overcome ... -
Comparing sense categorization between English propbank and english wordnet
(Oficyna Wydawnicza Politechniki Wroclawskiej, 2020)Given the fact that verbs play a crucial role in language comprehension, this paper presents a study which compares the verb senses in English PropBank with the ones in English WordNet through manual tagging. After analyzing ... -
Comparison of Turkish proposition banks by frame matching
(IEEE, 2018-12-06)By indicating semantic relations between a predicate and its associated participants in a sentence and identifying the role-bearing constituents, SRL provides an extensive dataset to understand natural languages and to ... -
ComStreamClust: a communicative multi-agent approach to text clustering in streaming data
(Springer Science and Business Media Deutschland GmbH, 2023-12)Topic detection is the task of determining and tracking hot topics in social media. Twitter is arguably the most popular platform for people to share their ideas with others about different issues. One such prevalent issue ...