Ara
Toplam kayıt 14, listelenen: 1-10
A novel hybrid edge detection technique: ABC-FA
(ISRES Organizasyon Turizm Eğitim Danışmanlık Ltd. Şti., 2017-11-09)
Image processing is a vast research field with diversified set of practices utilized in so many application areas such as military, security, medical imaging, machine learning and computer vision based on extracted useful ...
Uncertainty as a Swiss army knife: new adversarial attack and defense ideas based on epistemic uncertainty
(Springer, 2022-04-02)
Although state-of-the-art deep neural network models are known to be robust to random perturbations, it was verified that these architectures are indeed quite vulnerable to deliberately crafted perturbations, albeit being ...
Fully decentralized and collaborative multilateration primitives for uniquely localizing WSNs
(Springer International Publishing AG, 2010)
We provide primitives for uniquely localizing WSN nodes. The goal is to maximize the number of uniquely localized nodes assuming a fully decentralized model of computation. Each node constructs a cluster of its own and ...
A tree-based approach for English-to-Turkish translation
(Tubitak Scientific & Technical Research Council Turkey, 2019)
In this paper, we present our English-to-Turkish translation methodology, which adopts a tree-based approach. Our approach relies on tree analysis and the application of structural modification rules to get the target side ...
Construction of a Turkish proposition bank
(Tubitak Scientific & Technical Research Council Turkey, 2018)
This paper describes our approach to developing the Turkish PropBank by adopting the semantic role-labeling guidelines of the original PropBank and using the translation of the English Penn-TreeBank as a resource. We discuss ...
Crossing minimization in weighted bipartite graphs
(Elsevier B.V., 2009-12)
Given a bipartite graph G = (L0, L1, E) and a fixed ordering of the nodes in L0, the problem of finding an ordering of the nodes in L1 that minimizes the number of crossings has received much attention in literature. The ...
Comment on "Encryption and decryption of images with chaotic map lattices" [Chaos 16, 033118 (2006)]
(American Institute of Physics Inc., 2008-09)
In this paper, we comment on the chaotic encryption algorithm proposed by A. N. Pisarchik et al. [Chaos 16, 033118 (2006)]. We demonstrate that the algorithm is not invertible. We suggest simple modifications that can ...
On the online coalition structure generation problem
(AI Access Foundationusc Information Sciences Inst, 2021)
We consider the online version of the coalition structure generation problem, in which agents, corresponding to the vertices of a graph, appear in an online fashion and have to be partitioned into coalitions by an authority ...
From past to present: spam detection and identifying opinion leaders in social networks
(Yildiz Teknik Univ., 2022-06-22)
On microblogging sites, which are gaining more and more users every day, a wide range of ideas are quickly emerging, spreading, and creating interactive environments. In some cases, in Turkey as well as in the rest of the ...
English-Turkish parallel treebank with morphological annotations and its use in tree-based SMT
(SciTePress, 2016)
In this paper, we report our tree based statistical translation study from English to Turkish. We describe our data generation process and report the initial results of tree-based translation under a simple model. For ...