Computer Engineering / Bilgisayar Mühendisliği
Permanent URI for this collectionhttps://hdl.handle.net/11147/10
Browse
61 results
Search Results
Conference Object Citation - Scopus: 1Applying Weighted Graph Embeddings To Turkish Metaphor Detection(Institute of Electrical and Electronics Engineers Inc., 2024) İnan, EmrahMetaphor is a common literary mechanism that allows abstract concepts to be conceptualised using more concrete terminology. Existing methods rely on either end-to-end models or hand-crafted pre-processing steps. Generating well-defined training datasets for supervised models is a time-consuming operation for this type of problem. There is also a lack of pre-processing steps for resource-poor natural languages. In this study, we propose an approach for detecting Turkish metaphorical concepts. Initially, we collect non-literal concepts including their meaning and reference sentences by employing a Turkish dictionary. Secondly, we generate a graph by discovering super-sense relations between sample texts including target metaphorical expressions in Turkish WordNet. We also compute weights for relations based on the path closeness and word occurrences. Finally, we classify the texts by leveraging a weighted graph embedding model. The evaluation setup indicates that the proposed approach reaches the best F1 and Gmean scores of 0.83 and 0.68 for the generated test sets when we use feature vector representations of the Node2Vec model as the input of the logistic regression for detecting metaphors in Turkish texts. © 2024 IEEE.Conference Object Citation - WoS: 2Citation - Scopus: 3Adopting Heterogeneous Computing Modules: Experiences From a Touch Summer Workshop(Institute of Electrical and Electronics Engineers Inc., 2022) Bunde, D.P.; Ahmed, K.; Ayloo, S.; Brown-Gaines, T.; Fuentes, J.; Jatala, V.; Yeh, T.Y.We present efforts to encourage the adoption of modules for teaching heterogeneous parallel computing through a faculty development workshop. The workshop was held remotely using a novel format to exploit the advantages of a virtual format and mitigate its disadvantages. Adoption at a wide variety of institutions showed module effectiveness and also gathered feedback leading to several module improvements. We also report on the adoptions themselves, which show the importance of supporting adaptation of the modules for diverse settings. © 2022 IEEE.Conference Object Citation - WoS: 1Citation - Scopus: 2Predicting the Soft Error Vulnerability of Gpgpu Applications(Institute of Electrical and Electronics Engineers Inc., 2022) Topçu, Burak; Öz, IşılAs Graphics Processing Units (GPUs) have evolved to deliver performance increases for general-purpose computations as well as graphics and multimedia applications, soft error reliability becomes an important concern. The soft error vulnerability of the applications is evaluated via fault injection experiments. Since performing fault injection takes impractical times to cover the fault locations in complex GPU hardware structures, prediction-based techniques have been proposed to evaluate the soft error vulnerability of General-Purpose GPU (GPGPU) programs based on the hardware performance characteristics.In this work, we propose ML-based prediction models for the soft error vulnerability evaluation of GPGPU programs. We consider both program characteristics and hardware performance metrics collected from either the simulation or the profiling tools. While we utilize regression models for the prediction of the masked fault rates, we build classification models to specify the vulnerability level of the programs based on their silent data corruption (SDC) and crash rates. Our prediction models achieve maximum prediction accuracy rates of 96.6%, 82.6%, and 87% for masked fault rates, SDCs, and crashes, respectively.Article Citation - WoS: 3Citation - Scopus: 4A Novel Efficient Method for Tracking Evolution of Communities in Dynamic Networks(Institute of Electrical and Electronics Engineers Inc., 2022) Karataş, Arzum; Şahin, SerapTracking community evolution can provide insights into significant changes in community interaction patterns, promote the understanding of structural changes, and predict the evolutionary behavior of networks. Therefore, it is a fundamental component of decision-making mechanisms in many fields such as marketing, public health, criminology, etc. However, in this problem domain, it is an open challenge to capture all possible events with high accuracy, memory efficiency, and reasonable execution times under a single solution. To address this gap, we propose a novel method for tracking the evolution of communities (TREC). TREC efficiently detects similar communities through a combination of Locality Sensitive Hashing and Minhashing. We provide experimental evidence on four benchmark datasets and real dynamic datasets such as AS, DBLP, Yelp, and Digg and compare them with the baseline work. The results show that TREC achieves an accuracy of about 98%, has a minimal space requirement, and is very close to the best performing work in terms of time complexity. Moreover, it can track all event types in a single solution.Article Citation - WoS: 7Citation - Scopus: 8Tracking Code Bug Fix Ripple Effects Based on Change Patterns Using Markov Chain Models(Institute of Electrical and Electronics Engineers Inc., 2022) Ufuktepe, Ekincan; Tuğlular, Tuğkan; Palaniappan, KanappanChange impact analysis evaluates the changes that are made in the software and finds the ripple effects, in other words, finds the affected software components. Code changes and bug fixes can have a high impact on code quality by introducing new vulnerabilities or increasing their severity. A recent high-visibility example of this is the code changes in the log4j web software CVE-2021-45105 to fix known vulnerabilities by removing and adding method called change types. This bug fix process exposed further code security concerns. In this article, we analyze the most common set of bug fix change patterns to have a better understanding of the distribution of software changes and their impact on code quality. To achieve this, we implemented a tool that compares two versions of the code and extracts the changes that have been made. Then, we investigated how these changes are related to change impact analysis. In our case study, we identified the change types for bug-inducing and bug fix changes using the Quixbugs dataset. Furthermore, we used 13 of the projects and 621 bugs from Defects4J to identify the common change types in bug fixes. Then, to find the change types that cause an impact on the software, we performed an impact analysis on a subset of projects and bugs of Defects4J. The results have shown that, on average, 90% of the bug fix change types are adding a new method declaration and changing the method body. Then, we investigated if these changes cause an impact or a ripple effect in the software by performing a Markov chain-based change impact analysis. The results show that the bug fix changes had only impact rates within a range of 0.4-5%. Furthermore, we performed a statistical correlation analysis to find if any of the bug fixes have a significant correlation with the impact of change. The results have shown that there is a negative correlation between caused impact with the change types adding new method declaration and changing method body. On the other hand, we found that there is a positive correlation between caused impact and changing the field type.Editorial Message From Tain Symposium Organizing Committee(Institute of Electrical and Electronics Engineers Inc., 2015) Tuğlular, Tuğkan; Cai, Y.; Dustdar, S.; Yamazaki, K.It is a pleasure to welcome you to COMPSAC 2015 Symposium on Technologies and Applications of the Internet (TAIN). This year, first time in its history, COMPSAC is organized as a series of symposiums under the main theme of “Mobile and Cloud Systems – Challenges and Applications”. TAIN Symposium providing a forum to share latest innovations on Internet technologies and applications perfectly matches with the main theme. Topics of interest for TAIN include all types of networks with their architectures and applications as well as their management, performance, and security. Moreover, TAIN Symposium addresses Internet of things (IoT), machine-to-machine (M2M) and peer-to-peer (P2P) communications, content distribution networks (CDN) and also emerging network technologies such as software defined networks (SDN). A vast array of challenges for Internet technologies and applications and proposals for solutions will be discussed in TAIN Symposium.Conference Object Citation - WoS: 38Citation - Scopus: 57Application Areas of Community Detection: a Review(Institute of Electrical and Electronics Engineers Inc., 2019) Karatas, A.; Sahin, S.In the realm of today's real world, information systems are represented by complex networks. Complex networks contain a community structure inherently. Community is a set of members strongly connected within members and loosely connected with the rest of the network. Community detection is the task of revealing inherent community structure. Since the networks can be either static or dynamic, community detection can be done on both static and dynamic networks as well. In this study, we have talked about taxonomy of community detection methods with their shortages. Then we examine and categorize application areas of community detection in the realm of nature of complex networks (i.e., static or dynamic) by including sub areas of criminology such as fraud detection, criminal identification, criminal activity detection and bot detection. This paper provides a hot review and quick start for researchers and developers in community detection area. © 2018 IEEE.Conference Object Citation - WoS: 5Citation - Scopus: 8Lensless Digital In-Line Holographic Microscopy for Space Biotechnology Applications(Institute of Electrical and Electronics Engineers Inc., 2019) Delikoyun, Kerem; Çine, Ersin; Anıl İnevi, Müge; Özuysal, Mustafa; Özçivici, Engin; Tekin, Hüseyin CumhurBiomechanical changes at cellular level can dramatically affect living organisms in both aviation and space applications. Weightlessness induces morphological alteration of cells, which leads to tissue loss. Therefore, scientists have been studying the effect of weightlessness using cell culture based biological experiments using conventional microscopes. However, strict requirements regarding cost, weight and functionality limit the use of conventional microscopes in space environment. Lensless digital in-line holographic microscopy enables to use low-weight, low-cost and robust elements, such as a light emitting diode (LED), an aperture and an imaging sensor, instead of bulky, expensive and fragile optical elements, such as lenses, mirrors and filters. This technology offers a high field of view compared to conventional microscopes without affecting the resolution and it is also suitable for remote sensing applications with automated imaging capabilities. Here, we present a portable digital in-line holographic microscopy platform that allows to visualize cells and to analyze their viability in a microfluidic chip. The platform offers microscopic imaging with 1.55 mu m spatial resolution, 21.7 mm(2) field of view and image coloring capability. This platform could potentially play an important role in space biotechnology applications by enabling low-cost, high-resolution and portable monitoring of cells.Conference Object Utilizing Modeling Approach Patterns in the Embedded Software Industry(Institute of Electrical and Electronics Engineers Inc., 2019) Akdur, Deniz; Demirörs, OnurTo cope with the growing complexity of software-intensive embedded system development, modeling is a widely used approach. The modeling approaches in the embedded software industry vary depending on many modeling characteristics (e.g., purpose, modeling rigor, medium type used, modeling stakeholder profile, etc.). In the light of our previous studies, we have identified modeling approach patterns of embedded software development projects and constructed a characterization model. This model not only identifies and defines modeling approach patterns of the stakeholder in embedded software development projects, but also gives recommendations for commonsense modeling practices. In this article, one of the application results of this characterization model, which was performed in Defense & Aerospace sector is presented. The model was successfully applied to the case, in which a series of both structured and semi-structured interviews with 17 embedded software professionals were conducted. The results show that identification of individual patterns provide insight for improvement both for individuals as well as larger units of operations such as projects and organizations.Conference Object Citation - WoS: 1Citation - Scopus: 3Context-Aware Operation-Based Access Control for Internet of Things Applications(Institute of Electrical and Electronics Engineers Inc., 2019) Genç, Didem; Tomur, Emrah; Erten, Yusuf MuratRecently, interest of both the academic and industrial world in Internet of Things (IoT) has been increasing and this trend requires development of new security approaches addressing potential weaknesses in this domain. Despite the presence of many studies directed towards security of IoT applications, they are mostly adoption of current methods to IoT scenarios. Yet, IoT applications are comprised of various kinds of different entities including computers, processes, people and services. Therefore, it is inadequate to detect malicious attempts by using conventional security methods, which apply fixed security policies and do not take interaction of things, that is context information, into account. In this study, by considering new security requirements of next generation IoT applications, we propose a fine-grained, dynamic and easily manageable access control model, which is called context-aware operation-based access control.
