Ara
Toplam kayıt 12, listelenen: 1-10
A novel hybrid edge detection technique: ABC-FA
(ISRES Organizasyon Turizm Eğitim Danışmanlık Ltd. Şti., 2017-11-09)
Image processing is a vast research field with diversified set of practices utilized in so many application areas such as military, security, medical imaging, machine learning and computer vision based on extracted useful ...
Programlamaya giriş dersini alan öğrencilerin programlama öz yeterlilik algılarının ve programlamaya bakış açılarının incelenmesi
(Düzce Üniversitesi, 2021-05-29)
Bu çalışmada üniversite öğrencilerinin Java programlama öz yeterlilik algıları, programlama öğrenme istekleri ve çalışma alışkanlıkları çeşitli değişkenlere göre (cinsiyet, bölüm, eğitim dili, harf notu, ders tekrarları ...
Uncertainty as a Swiss army knife: new adversarial attack and defense ideas based on epistemic uncertainty
(Springer, 2022-04-02)
Although state-of-the-art deep neural network models are known to be robust to random perturbations, it was verified that these architectures are indeed quite vulnerable to deliberately crafted perturbations, albeit being ...
Fully decentralized and collaborative multilateration primitives for uniquely localizing WSNs
(Springer International Publishing AG, 2010)
We provide primitives for uniquely localizing WSN nodes. The goal is to maximize the number of uniquely localized nodes assuming a fully decentralized model of computation. Each node constructs a cluster of its own and ...
Sınıflandırma için diferansiyel mahremiyete dayalı öznitelik seçimi
(Gazi Univ, Fac Engineering Architecture, 2018)
Veri madenciliği ve makine öğrenmesi çözümlerinin en önemli ön aşamalarından biri yapılacak analizde kullanılacak verinin özniteliklerinin uygun bir alt kümesini belirlemektir. Sınıflandırma yöntemleri için bu işlem, bir ...
A tree-based approach for English-to-Turkish translation
(Tubitak Scientific & Technical Research Council Turkey, 2019)
In this paper, we present our English-to-Turkish translation methodology, which adopts a tree-based approach. Our approach relies on tree analysis and the application of structural modification rules to get the target side ...
Construction of a Turkish proposition bank
(Tubitak Scientific & Technical Research Council Turkey, 2018)
This paper describes our approach to developing the Turkish PropBank by adopting the semantic role-labeling guidelines of the original PropBank and using the translation of the English Penn-TreeBank as a resource. We discuss ...
Crossing minimization in weighted bipartite graphs
(Elsevier B.V., 2009-12)
Given a bipartite graph G = (L0, L1, E) and a fixed ordering of the nodes in L0, the problem of finding an ordering of the nodes in L1 that minimizes the number of crossings has received much attention in literature. The ...
Comment on "Encryption and decryption of images with chaotic map lattices" [Chaos 16, 033118 (2006)]
(American Institute of Physics Inc., 2008-09)
In this paper, we comment on the chaotic encryption algorithm proposed by A. N. Pisarchik et al. [Chaos 16, 033118 (2006)]. We demonstrate that the algorithm is not invertible. We suggest simple modifications that can ...
On the online coalition structure generation problem
(AI Access Foundationusc Information Sciences Inst, 2021)
We consider the online version of the coalition structure generation problem, in which agents, corresponding to the vertices of a graph, appear in an online fashion and have to be partitioned into coalitions by an authority ...