Computer Engineering / Bilgisayar Mühendisliği
Permanent URI for this collectionhttps://hdl.handle.net/11147/10
Browse
246 results
Search Results
Conference Object A News Chain Evaluation Methodology Along With a Lattice-Based Approach for News Chain Construction(Association for Computational Linguistics (ACL), 2017) Toprak, Mustafa; Özkahraman,Ö.; Tekir, SelmaChain construction is an important requirement for understanding news and establishing the context. A news chain can be defined as a coherent set of articles that explains an event or a story. There's a lack of well-established methods in this area. In this work, we propose a methodology to evaluate the "goodness" of a given news chain and implement a concept latticebased news chain construction method by Hossain et al. The methodology part is vital as it directly affects the growth of research in this area. Our proposed methodology consists of collected news chains from different studies and two "goodness" metrics, minedge and dispersion coefficient respectively. We assess the utility of the lattice-based news chain construction method by our proposed methodology. © EMNLP 2017.All right reserved.Conference Object Citation - WoS: 2Citation - Scopus: 3Impact of Variations in Synthetic Training Data on Fingerprint Classification(IEEE, 2019) İrtem, Pelin; İrtem, Emre; Erdoğmuş, NesliCreating and labeling data can be extremely time consuming and labor intensive. For this reason, lack of sufficiently large datasets for training deep structures is often noted as a major obstacle and instead, synthetic data generation is proposed. With their high acquisition and labeling complexity, this also applies to fingerprints. In the literature, a number of synthetic fingerprint generation systems have been proposed, but mostly for algorithm evaluation purposes. In this paper, we aim to analyze the use of synthetic fingerprint data with different levels of degradation for training deep neural networks. Fingerprint classification problem is selected as a case-study and the experiments are conducted on a public domain database, NIST SD4. A positive correlation between the synthetic data variation and the classification rate is observed while achieving state-of-the-art results.Editorial Message From Tain Symposium Organizing Committee(Institute of Electrical and Electronics Engineers Inc., 2015) Tuğlular, Tuğkan; Cai, Y.; Dustdar, S.; Yamazaki, K.It is a pleasure to welcome you to COMPSAC 2015 Symposium on Technologies and Applications of the Internet (TAIN). This year, first time in its history, COMPSAC is organized as a series of symposiums under the main theme of “Mobile and Cloud Systems – Challenges and Applications”. TAIN Symposium providing a forum to share latest innovations on Internet technologies and applications perfectly matches with the main theme. Topics of interest for TAIN include all types of networks with their architectures and applications as well as their management, performance, and security. Moreover, TAIN Symposium addresses Internet of things (IoT), machine-to-machine (M2M) and peer-to-peer (P2P) communications, content distribution networks (CDN) and also emerging network technologies such as software defined networks (SDN). A vast array of challenges for Internet technologies and applications and proposals for solutions will be discussed in TAIN Symposium.Conference Object Duyarga Ağları için Bir Γ Eşuyumcusu Tasarım ve Uygulaması(IEEE, 2008) Özsoyeller, Deniz; Erciyeş, Kayhan; Dağdeviren, OrhanImplementation of synchronous algorithms in distributed systems in general is less troublesome than the implementation of asynchronous algorithms. Synchronizers provide synchronous execution of an asynchronous algorithm in distributed systems. In this study, we propose a gamma synchronizer for Wireless Sensor Networks (WSNs). This synchronizer consists of a and beta synchronizers. In our work, the WSN is first divided into clusters and then these clusters are connected using a ring protocol. Synchronization is provided using the beta synchronizer in the cluster and a synchronizer among the clusters. We describe the clustering algorithm and the ring formation algorithm for the WSNs and give the results obtained so far.Conference Object Citation - Scopus: 15Gezgin Tasarsız Ağlar için Taşırma Tabanlı Yönlendirme Yordamı(IEEE, 2008) Çokuslu, Deniz; Erciyeş, KayhanMobile Ad Hoc Networks (MANETs) are videly in use in rescue, military operations, scientific and business areas. Many studies are addressed in MANETs because of their need to long lasting liveness, fault tolerance, dynamic addressing, collusion prevention, mobility management and security. Especially, self clustering, backbone construction and routing are the most interesting academic and industrial research areas in MANETs. A wide range of studies addressed the routing problem in MANETs. Many previous studies address the clustering and routing problems as seperate subjects. However, rowing approaches which are specific to the clustering methodologies may have many advantages in terms of efficiency and availability. In this study, a flooding based routing algorithm is proposed. First, a detailed description of the algorithm is explained, then the analysis and test results using the ns2 simulator are given which show that the designed algorithm is scalable and has favorable performance.Conference Object Citation - WoS: 3Citation - Scopus: 6Truth Ratios of Syllogistic Moods(Institute of Electrical and Electronics Engineers, 2015) Zarechnev, Mikhail; Kumova, Bora İsmailThe syllogistic system consists of 256 moods, of which only 24 have been recognized as true. From a set-theoretical point of view, a mood can be represented with three sets and their possible relationships. Three sets can have up to seven sub-sets or spaces. In an earlier work we have used 41 permutations of the spaces, out of which every mood matches an individual number as true or false cases. The truth ratio of a mood is then calculated, by relating the true and false cases with each other. In this work we revise the previously presented properties of the moods and the syllogistic system, this time by using the maximum possible cover, which consists of 96 distinct space permutations. Our results mostly verify our previous findings, like the additional true mood anasoy, the inherently symmetric truth distribution of the moods. Additionally we have revealed some new properties, like the equivalence of some moods, which reduces the system to 136 distinct moods.Conference Object Zamanda ortalaması alınmış ikili önplan imgeleri kullanarak taşıt sınıflandırması(IEEE, 2015) Karaimer, Hakkı Can; Baştanlar, YalınWe describe a shape-based method for classification of vehicles from omnidirectional videos. Different from similar approaches, the binary images of vehicles obtained by background subtraction in a sequence of frames are averaged over time. We show with experiments that using the average shape of the object results in a more accurate classification than using a single frame. The vehicle types we classify are motorcycle, car and van. We created an omnidirectional video dataset and repeated experiments with shuffled train-test sets to ensure randomization.Conference Object Citation - WoS: 10Citation - Scopus: 12Random Test Generation From Regular Expressions for Graphical User Interface (gui) Testing(Institute of Electrical and Electronics Engineers, 2019) Kılınççeker, Onur; Silistre, Alper; Challenger, Moharram; Belli, FevziGeneration of test sequences, that is, (user) inputs - expected (system) outputs, is an important task of testing of graphical user interfaces (GUI). This work proposes an approach to randomly generate test sequences that might he used for comparison with existing GUI testing techniques to evaluate their efficiency. The proposed approach first models CUI under test by a finite state machine (FSM) and then converts it to a regular expression (RE). A tool based on a special technique we developed analyzes the RE to fulfill missing context information such as the position of a symbol in the RE. The result is a context table representing the RE. The proposed approach traverses the context table to generate the test sequences. To do this, the approach repeatedly selects a symbol in the table, starting from the initial symbol, in a random manner until reaching a special, finalizing symbol for constructing a test sequence. Thus, the approach uses a symbol coverage criterion to assess the adequacy of the test generation. To evaluate the approach, mutation testing is used. The proposed technique is to a great extent implemented and is available as a tool called PQ-Ran Test (PQ-analysis based Random Test Generation). A case study demonstrates the proposed approach and analyzes its effectiveness by mutation testing.Conference Object Deep Convolutional Neural Networks for Viability Analysis Directly From Cell Holograms Captured Using Lensless Holographic Microscopy(The Chemical and Biological Microsystems Society (CBMS), 2019) Delikoyun, Kerem; Çine, Ersin; Anıl İnevi, Müge; Özçivici, Engin; Özuysal, Mustafa; Tekin, Hüseyin CumhurCell viability analysis is one of the most widely used protocols in the fields of biomedical sciences. Traditional methods are prone to human error and require high-cost and bulky instrumentations. Lensless digital inline holographic microscopy (LDIHM) offers low-cost and high resolution imaging. However, recorded holograms should be digitally reconstructed to obtain real images, which requires intense computational work. We introduce a deep transfer learning-based cell viability classification method that directly processes the hologram without reconstruction. This new model is only trained once and viability of each cell can be predicted from its hologram. © 2019 CBMS-0001.Conference Object Yazılım Yapısal Kapsama Analizinde Testlerin Önceliklendirilmesi(CEUR Workshop Proceedings, 2015) Ayav, TolgaBu çalışma değiştirilmiş koşul/karar kapsama stratejisince türetilmiş test girişlerinin önceliklendirilmesi için bir teknik sunmaktadır. Teknik Fourier analizine dayanmaktadır ve testlerin hata ortaya çıkarma potansiyellerine göre sıralanabilmesini hedeflemektedir. Bu sayede yazılımın yüksek öncelikli testlerden başlayarak düşüğe doğru sınanması veya test kümesinin yüksek öncelikli testleri kapsayacak şekilde daraltılması mümkün olabilecektir.
