Başlık için Bilgisayar Mühendisliği Bölümü Koleksiyonu listeleme
Toplam kayıt 43, listelenen: 1-20
-
Accuracy improvement in Ag:a-Si memristive synaptic device-based neural network through Adadelta learning method on handwritten-digit recognition
(Springer, 2023)Traditional computing architecture (Von Neumann) that requires data transfer between the off-chip memory and processor consumes a large amount of energy when running machine learning (ML) models. Memristive synaptic devices ... -
An analysis on the relation between users' online social networks addiction and users security concerns
(Scitepress, 2021)Use of online social network platforms has increased over last decades. There are various activities that users can do on those platforms such as, making friends, enjoying time, making business, and education. Given ... -
ANOVA method reveals key factors influencing geopolymer strength: A comprehensive evaluation of input variables
(IEEE, 2023)In this study, we present an ANOVA (Analysis of Variance) method conducted on a geopolymer dataset. The analysis focuses on evaluating the impact of various input variables, including OB, GW, FA, S, M, M/B, AGE, HEAT, SiO2, ... -
Avuç içi görüntüleri kullanarak gerçek zamanlı nabız sayımı
(Ieee, 2018)In this study, real-time pulse counting was performed using palm images obtained from a standard webcam. the signals obtained from the real-time palm images taken from the webcam were subjected to various signal processing ... -
Bilgisayar ve öğretim teknolojileri eğitimi bölümü öğrencilerinin öğretim tasarımı yeterliklerinin incelenmesi
(2021)Bilgisayar ve Öğretim Teknolojileri Eğitimi (BÖTE) bölümü mezunlarının öğretim tasarımı yeterliklerini de içine alan geniş bir yelpazede görevleri yerine getirmeleri beklenmektedir. Ancak BÖTE öğretim programı içerisinde ... -
Büyük Choi Williams zaman-frekans öznitelik seti kullanarak EKG aritmi tespiti
(Ieee, 2017)Early detection and monitoring of heart diseases increase human quality of life and this can prevent negative consequences. It is even more important because it can prevent sudden deaths. in today's technology, these ... -
CAPEN: Cryptographic accumulator based privacy preserving exposure notification
(IEEE, 2021)Contact tracing has a significant contribution in preventing the rapid spread of infectious diseases. During the COVID-19 pandemic, local authorities, researchers and the tech industry focused on developing digital contact ... -
Classification of new titles by two stage latent dirichlet allocation
(Ieee, 2018)With the rapid development of the Internet, thousands of different news reports from different channels are presented to us. So much news, particularly in the media sector, is an important question to be categorized and ... -
Classification of Turkishtweet emotions by n- stage latent dirichlet allocation
(Institute of Electrical and Electronics Engineers Inc., 2018)The classification of the emotions contained in the social media is of great importance in terms of its use in related fields such as media as well as developing technology. The Latent Dirichlet Allocation (LDA), a topic ... -
Climate control of an smart greenhouse based on android
(Ieee, 2018)Smart systems are systems used by new technologies that facilitate human life. Smart greenhouses have an important place in smart agriculture application. in this study, the amount of energy and water consumed for controlling ... -
Comparative analysis of computational intelligence techniques in financial forecasting: A case study on ANN and ANFIS models
(Institute of Electrical and Electronics Engineers Inc., 2024)This paper explores the evolution of financial analysis and forecasting models, contrasting traditional statistical methods with computational intelligence techniques. While conventional methods like autoregressive moving ... -
Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications
(IEEE, 2022)Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum ... -
Correlation value determined to increase Salmonella prediction success of deep neural network for agricultural waters
(Springer, 2022)The use of computer-based tools has been becoming popular in the field of produce safety. Various algorithms have been applied to predict the population and presence of indicator microorganisms and pathogens in agricultural ... -
Cusum - Entropy: An efficient method for DDoS attack detection
(Ieee, 2016)Computers and Internet have evolved into necessary tools for our professional, personal and social lives. As a result of growing dependence, the availability of these systems has become a concern. This concern increases ... -
Design and optimisations of metal-oxide artificial synaptic device based machine learning model
(IEEE, 2024)Synaptic device-based neural network models are increasingly favored for their energy-efficient computing capabilities. However, as the demand for scalable and resource-efficient computing solutions continues to grow, there ... -
Development and evaluation of ensemble learning models for detection of distributed denial-of-service attacks in ınternet of things
(Hitit University, 2022)Internet of Things that process tremendous confidential data have difficulty performing traditional security algorithms, thus their security is at risk. The security tasks to be added to these devices should be able to ... -
Distributed denial of service (DDoS): A history
(IEEE, 2022)Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of ... -
ESAR: Enhanced secure authentication and revocation scheme for vehicular ad hoc networks
(Elsevier, 2022)Vehicle Ad Hoc Network (VANET) systems that use Public Key Infrastructure (PKI) experience significant delays when checking Certificate Revocation Lists (CRLs) and performing key pair-based asymmetric cryptographic operations. ... -
Fuzzy rule based classification system from vehicle-to-grid data
(IEEE, 2021)Vehicle-to-Grid (V2G) system is becoming a very popular concept since it has various benefits such as reducing energy consumption, being environmental friendly, bi-directional charging, and load balancing. Although, it ... -
Human-animal recognition in camera trap images
(Ieee, 2018)Camera trap is an image sensor that is widely used in monitoring biodiversity, identifying and tracking species in natural life. in this study, we investigate human-animal distinction in image dataset obtained from camera ...