Institutional Repository

Browsing Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering by Title

Browsing Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering by Title

Sort by: Order: Results:

  • Sirin, Yahya; Demirci, Muhammed Fatih (Springer, 2017-03)
    As an increasing number of digital images are generated, a demand for an efficient and effective image retrieval mechanisms grows. In this work, we present a new skeleton-based algorithm for 2D and 3D shape retrieval. The ...
  • Sirin, Yahya; Demirci, Muhammed Fatih (IEEE, 2015)
    Digital video production is increasing day after day and the effectiveness and efficiency of the image recognition mechanism has became increasingly important. In this study, a new skeleton-based shape recognition algorithm, ...
  • Sezer, Ömer Berat; Özbayoglu, Ahmet Murat (Elsevier Ltd, 2018-09)
    Computational intelligence techniques for financial trading systems have always been quite popular. In the last decade, deep learning models start getting more attention, especially within the image processing community. ...
  • Dirik, Ahmet Emir; Sencar, Hüsrev Taha; Memon, Nasir (IEEE-INST Electrical Electronics Engineers Inc., 2014-12)
    The availability of sophisticated source attribution techniques raises new concerns about privacy and anonymity of photographers, activists, and human right defenders who need to stay anonymous while spreading their images ...
  • Cerit, Betul; Boluk, S. Arda; Demirci, Muhammed Fatih (IEEE, 2016)
    In this paper, the effect of the image resolution for gender detection and age classification have been analyzed by conducting experiments with facial images that have 10 different image resolutions ranging from 2 x 1 to ...
  • Sarikan, S.S.; Özbayoğlu, Ahmet Murat (Elsevier B.V., 2018)
    Anomaly detection is an important part of an Intelligent Transportation System. In this study, image processing and machine learning techniques are used to detect anomalies in vehicle movements. These anomalies include ...
  • Abul, Osman (SPRINGER, 2014)
    In this paper we study the problem of anonymity in multi-instance (MI) micro-data publication. The classical k-anonymity approach is shown to be insufficient and/or inappropriate for MI databases. Thus, it is extended to ...
  • Ak, Murat; Pehlivanoglu, Serdar; Selçuk, Ali Aydın (Elsevier, 2014-03-15)
    A broadcast encryption (BE) scheme is a method for encrypting messages in a way that only a set of privileged users can decrypt it. Anonymity in a BE system is to hide any information on the privileged set. This problem ...
  • Tolan, Ertan; Tan, Mehmet (SCITEPRESS, 2016)
    Personalized cancer treatment is an ever-evolving approach due to complexity of cancer. As a part of personalized therapy, effectiveness of a drug on a cell line is measured. However, these experiments are backbreaking and ...
  • Bilgin, Ahmet Tunc; Kadıoğlu-Ürtiş, Esra (IEEE, 2015)
    The game of pursuit-evasion has always been a popular research subject in the field of robotics. Reinforcement learning, which employs an agent's interaction with the environment, is a method widely used in pursuit-evasion ...
  • Ceylan, Doğa; Güdelek, Mehmet Uğur; Keyşan, Ozan (Institute of Electrical and Electronics Engineers Inc., 2018-10)
    Barrel and pulsed power supply modules are two crucial parts of an electromagnetic launcher (EML), in terms of overall efficiency. One of the most important features of the barrel side is the armature geometry. In this ...
  • Sezer, O.B.; Özbayoğlu, Ahmet Murat; Dogdu, E. (Association for Computing Machinery, Inc., 2017-04-13)
    In this paper, a neural network-based stock price prediction and trading system using technical analysis indicators is presented. The model developed first converts the financial time series data into a series of buy-sell-hold ...
  • Aksu, M.U.; Bıçakçı, Kemal; Dilek, M.H.; Özbayoglu, Ahmet Murat; Tatlı, E.İ. (Association for Computing Machinery, Inc., 2018)
    Today’s computer networks are prone to sophisticated multi-step, multi-host attacks. Common approaches of identifying vulnerabilities and analyzing the security of such networks with naive methods such as counting the ...
  • Adali, Selim F.; Demirci, Muhammed Fatih; Özbayoğlu, Ahmet Murat (Vandenhoeck & Ruprecht, 2017-12)
    This article introduces an automated image matching technique called Scale Invariant Feature Transform (SIFT) as a tool to supplement the collation of problematic cuneiform signs. The Nabonidus Chronicle (II, 16), which ...
  • Sarikan, Selim S.; Özbayoğlu, Ahmet Murat; Zilci, Oguzhan (ELSEVIER Science BV, 2017)
    Classification of vehicles is an important part of an Intelligent Transportation System. In this study, image processing and machine learning techniques are used to classify vehicles in dedicated lanes. Images containing ...
  • Bardak, Batuhan; Demirci, Muhammed Fatih (IEEE, 2017)
    With the increased use of smart devices, digital cameras and abundance of memory in the devices, the pictures of the same scenes have been taken several times, resulting in a number of images consisting of the same or very ...
  • Pancaroglu, Doruk; Tan, Mehmet (Bentham Bcience Publ. Ltd., 2016)
    Background: In cases where only a single group (or class) of samples is available for a given problem, positive unlabeled learning algorithms can be applied. One such case is the interactions between various biological/chemical ...
  • Can, Serdar Zafer; Yalcin, Gulay; Ergin, Oğuz; Sabri Unsal, Osman; Cristal, Adrian (Elsevier, 2014-08)
    Reliability is becoming a major design concern in contemporary microprocessors since soft error rate is increasing due to technology scaling. Therefore, design time system vulnerability estimation is of paramount importance. ...
  • Ceyhan, K.; Kurtulmaz, E.; Sert, O.C.; Özyer, Tansel (Institute of Electrical and Electronics Engineers Inc., 2018-07-05)
    In the last few years, Bitcoin is one of the most discussed and popular topic in financial system. This article aims to predict Bitcoin movement by using Machine Learning and Text Mining models. Many models have been used ...
  • Ozturk, O.; Aksac, A.; Özyer, Tansel; Alhajj, R. (Springer New York LLC, 2015-06-09)
    The design and implementation of polylogarithmically or polynomially bounded algorithms on faster processors has gained popularity and attracted the attention of both researchers and practitioners. The evolution in the ...