Computer Engineering / Bilgisayar Mühendisliği

Permanent URI for this collectionhttps://hdl.handle.net/11147/10

Browse

Search Results

Now showing 1 - 10 of 17
  • Conference Object
    Citation - Scopus: 1
    Applying Weighted Graph Embeddings To Turkish Metaphor Detection
    (Institute of Electrical and Electronics Engineers Inc., 2024) İnan, Emrah
    Metaphor is a common literary mechanism that allows abstract concepts to be conceptualised using more concrete terminology. Existing methods rely on either end-to-end models or hand-crafted pre-processing steps. Generating well-defined training datasets for supervised models is a time-consuming operation for this type of problem. There is also a lack of pre-processing steps for resource-poor natural languages. In this study, we propose an approach for detecting Turkish metaphorical concepts. Initially, we collect non-literal concepts including their meaning and reference sentences by employing a Turkish dictionary. Secondly, we generate a graph by discovering super-sense relations between sample texts including target metaphorical expressions in Turkish WordNet. We also compute weights for relations based on the path closeness and word occurrences. Finally, we classify the texts by leveraging a weighted graph embedding model. The evaluation setup indicates that the proposed approach reaches the best F1 and Gmean scores of 0.83 and 0.68 for the generated test sets when we use feature vector representations of the Node2Vec model as the input of the logistic regression for detecting metaphors in Turkish texts. © 2024 IEEE.
  • Conference Object
    Citation - Scopus: 11
    An Analysis of Large Language Models and Langchain in Mathematics Education
    (Association for Computing Machinery, 2023) Soygazi,F.; Oğuz, Damla
    The development of large language models (LLMs) has led to the consideration of new approaches, particularly in education. Word problems, especially in subjects like mathematics, and the need to solve these problems by collectively addressing specific stages of reasoning, have raised the question of whether LLMs can be successful in this area as well. In our study, we conducted analyses by asking mathematics questions especially related to word problems using ChatGPT, which is based on the latest language models like Generative Pretrained Transformer (GPT). Additionally, we compared the correct and incorrect answers by posing the same questions to LLMMathChain, a mathematics-specific LLM based on the latest language models like LangChain. It was observed that the answers obtained were more successful with ChatGPT (GPT 3.5), particularly in the field of mathematics. However, both language models were found to be below expectations, particularly in word problems, and suggestions for improvement were provided. © 2023 ACM.
  • Book Part
    Citation - Scopus: 2
    Dementia Detection With Deep Networks Using Multi-Modal Image Data
    (CRC Press, 2023) Yiğit, Altuğ; Işık, Zerrin; Baştanlar, Yalın
    Neurodegenerative diseases give rise to irreversible neural damage in the brain. By the time it is diagnosed, the disease may have progressed. Although there is no complete treatment for many types of neurodegenerative diseases, by detecting the disease in its early stages, treatments can be applied to relieve some symptoms or prevent disease progression. Many invasive and non-invasive methods are employed for the diagnosis of dementia. Computer-assisted diagnostic systems make the diagnosis based on volumetric features (structural or functional) or some two-dimensional brain perspectives obtained from a single image modality. This chapter firstly introduces a broad review of multi-modal imaging approaches proposed for dementia diagnosis. Then it presents deep neural networks, which extract structural and functional features from multi-modal imaging data, are employed to diagnose Alzheimer’s and mild cognitive impairments. While MRI scans are safer than most types of scans and provide structural information about the human body, PET scans provide information about functional activities in the brain. Thus, the setup has been designed to make experiments using both MRI and FDG-PET scans. Performances of multi-modal models were compared with single-modal solutions. The multi-modal solution showed superiority over single-modals due to the advantage of focusing on assorted features. © 2023 selection and editorial matter, Jyotismita Chaki; individual chapters, the contributors.
  • Conference Object
    Citation - WoS: 7
    Citation - Scopus: 12
    Utilization of Three Software Size Measures for Effort Estimation in Agile World: a Case Study
    (IEEE, 2022) Unlu, Huseyin; Hacaloglu, Tuna; Buber, Fatma; Berrak, Kivilcim; Leblebici, Onur; Demirors, Onur
    Functional size measurement (FSM) methods, by being systematic and repeatable, are beneficial in the early phases of the software life cycle for core project management activities such as effort, cost, and schedule estimation. However, in agile projects, requirements are kept minimal in the early phases and are detailed over time as the project progresses. This situation makes it challenging to identify measurement components of FSM methods from requirements in the early phases, hence complicates applying FSM in agile projects. In addition, the existing FSM methods are not fully compatible with today's architectural styles, which are evolving into event-driven decentralized structures. In this study, we present the results of a case study to compare the effectiveness of different size measures: functional -COSMIC Function Points (CFP)-, event-based - Event Points-, and code length-based - Line of Code (LOC)- on projects that were developed with agile methods and utilized a microservice- based architecture. For this purpose, we measured the size of the project and created effort estimation models based on three methods. It is found that the event-based method estimated effort with better accuracy than the CFP and LOC-based methods.
  • Conference Object
    Citation - WoS: 2
    Citation - Scopus: 3
    Adopting Heterogeneous Computing Modules: Experiences From a Touch Summer Workshop
    (Institute of Electrical and Electronics Engineers Inc., 2022) Bunde, D.P.; Ahmed, K.; Ayloo, S.; Brown-Gaines, T.; Fuentes, J.; Jatala, V.; Yeh, T.Y.
    We present efforts to encourage the adoption of modules for teaching heterogeneous parallel computing through a faculty development workshop. The workshop was held remotely using a novel format to exploit the advantages of a virtual format and mitigate its disadvantages. Adoption at a wide variety of institutions showed module effectiveness and also gathered feedback leading to several module improvements. We also report on the adoptions themselves, which show the importance of supporting adaptation of the modules for diverse settings. © 2022 IEEE.
  • Conference Object
    Deep Convolutional Neural Networks for Viability Analysis Directly From Cell Holograms Captured Using Lensless Holographic Microscopy
    (The Chemical and Biological Microsystems Society (CBMS), 2019) Delikoyun, Kerem; Çine, Ersin; Anıl İnevi, Müge; Özçivici, Engin; Özuysal, Mustafa; Tekin, Hüseyin Cumhur
    Cell viability analysis is one of the most widely used protocols in the fields of biomedical sciences. Traditional methods are prone to human error and require high-cost and bulky instrumentations. Lensless digital inline holographic microscopy (LDIHM) offers low-cost and high resolution imaging. However, recorded holograms should be digitally reconstructed to obtain real images, which requires intense computational work. We introduce a deep transfer learning-based cell viability classification method that directly processes the hologram without reconstruction. This new model is only trained once and viability of each cell can be predicted from its hologram. © 2019 CBMS-0001.
  • Conference Object
    Citation - Scopus: 4
    Test Case Generation for Firewall Implementation Testing Using Software Testing Techniques
    (Tafford Publishing, 2008) Tuğlular, Tuğkan
    The firewall implementation testing approach checks actions performed by the firewall with respect to corresponding firewall rules. This type of firewall testing can be implemented by developing test cases from firewall rule sequence, generating test packets using those test cases and injecting those test packets into the firewall. Although this method has been already defined in the academic world, an approach to generate test cases does not exist in the literature. In this work, a test case generation approach is developed using software testing techniques. © 2008 Atilla Elçi.
  • Conference Object
    The Performance Results of Ecdsa Implementation on Different Coordinate Systems
    (Tafford Publishing, 2008) Atay, Serap
    Elliptic Curve Cryptography has a high computational cost due to arithmetic operations of point addition and point doubling. But the cost can be reduced if different coordinate systems utilized. This paper shows that the performance of an elliptic curve digital signature algorithm (ECDSA) can be significantly increased by using different coordinate systems.
  • Conference Object
    A Memory Management Model for Cryptographic Software Libraries
    (Tafford Publishing, 2008) Mersin, Ali; Beyazıt, Mutlu
    Cryptographic protocols are implemented on the abstraction of multiple precision number libraries in which the dominant design criterion mostly turns out to be the maximization of the system performance. In contrast, each protocol may have its own memory usage pattern. In general case, the memory allocation and release routines are frequently called during the runtime. For this reason, an improper memory management strategy may yield an inefficient implementation. In this paper, we propose a memory management technique which is constructed under the consideration of the context of high level cryptographic software running on multi-programmed environments. Also, we show the implementation results of our approach and discuss with respect to the common static and dynamic memory allocation strategies. © 2008 Atilla Elçi.
  • Conference Object
    Monitoring of Policy Operations in a Distributed Firewall Environment
    (2008) Çakı, Oğuzhan; Tuğlular, Tuğkan; Çetin, Füsun
    Distributed firewalls concept has been introduced to overcome some drawbacks of traditional firewalls. Distributed firewall approach is based on the idea of enforcing policy rules at the intermediate and end points rather than a single entry point to the network. Management of policy rules in a distributed firewall environment requires surveillance of policy operations performed on each firewall. With this paper, we propose a monitoring architecture and its application prototype for distributed firewalls to keep track of actions, such as create, read, update, and delete, carried out on policy rule sets. We performed some emulation and laboratory experiments to obtain operational values of the proposed architecture. ©2008 by Bo?aziçi University.