Computer Engineering / Bilgisayar Mühendisliği
Permanent URI for this collectionhttps://hdl.handle.net/11147/10
Browse
133 results
Filters
Settings
Search Results
Now showing 1 - 10 of 133
Conference Object Citation - Scopus: 1Applying Weighted Graph Embeddings To Turkish Metaphor Detection(Institute of Electrical and Electronics Engineers Inc., 2024) İnan, EmrahMetaphor is a common literary mechanism that allows abstract concepts to be conceptualised using more concrete terminology. Existing methods rely on either end-to-end models or hand-crafted pre-processing steps. Generating well-defined training datasets for supervised models is a time-consuming operation for this type of problem. There is also a lack of pre-processing steps for resource-poor natural languages. In this study, we propose an approach for detecting Turkish metaphorical concepts. Initially, we collect non-literal concepts including their meaning and reference sentences by employing a Turkish dictionary. Secondly, we generate a graph by discovering super-sense relations between sample texts including target metaphorical expressions in Turkish WordNet. We also compute weights for relations based on the path closeness and word occurrences. Finally, we classify the texts by leveraging a weighted graph embedding model. The evaluation setup indicates that the proposed approach reaches the best F1 and Gmean scores of 0.83 and 0.68 for the generated test sets when we use feature vector representations of the Node2Vec model as the input of the logistic regression for detecting metaphors in Turkish texts. © 2024 IEEE.Conference Object A News Chain Evaluation Methodology Along With a Lattice-Based Approach for News Chain Construction(Association for Computational Linguistics (ACL), 2017) Toprak, Mustafa; Özkahraman,Ö.; Tekir, SelmaChain construction is an important requirement for understanding news and establishing the context. A news chain can be defined as a coherent set of articles that explains an event or a story. There's a lack of well-established methods in this area. In this work, we propose a methodology to evaluate the "goodness" of a given news chain and implement a concept latticebased news chain construction method by Hossain et al. The methodology part is vital as it directly affects the growth of research in this area. Our proposed methodology consists of collected news chains from different studies and two "goodness" metrics, minedge and dispersion coefficient respectively. We assess the utility of the lattice-based news chain construction method by our proposed methodology. © EMNLP 2017.All right reserved.Conference Object Citation - Scopus: 11An Analysis of Large Language Models and Langchain in Mathematics Education(Association for Computing Machinery, 2023) Soygazi,F.; Oğuz, DamlaThe development of large language models (LLMs) has led to the consideration of new approaches, particularly in education. Word problems, especially in subjects like mathematics, and the need to solve these problems by collectively addressing specific stages of reasoning, have raised the question of whether LLMs can be successful in this area as well. In our study, we conducted analyses by asking mathematics questions especially related to word problems using ChatGPT, which is based on the latest language models like Generative Pretrained Transformer (GPT). Additionally, we compared the correct and incorrect answers by posing the same questions to LLMMathChain, a mathematics-specific LLM based on the latest language models like LangChain. It was observed that the answers obtained were more successful with ChatGPT (GPT 3.5), particularly in the field of mathematics. However, both language models were found to be below expectations, particularly in word problems, and suggestions for improvement were provided. © 2023 ACM.Conference Object Kurt saldırıları için sentetik irislerde örnek seçilimi(IEEE, 2023) Akdeniz, Eyüp Kaan; Erdoğmuş, NesliIn this study, samples with higher potential to succeed in wolf attacks are picked among synthetically generated iris images, and the composed subset is shown to pose a more significant threat toward an iris recognition system backed by a Presentation Attack Detection (PAD) module with respect to randomly selected samples. Iris images generated by Deep Convolutional Generative Adversarial Networks (DCGAN) are firstly filtered by rejection sampling on PAD score distribution of real iris image PAD scores. Next, the probability of zero success in all attack attempts is calculated for each synthetic iris image, using real iris images in the training set, and match and non-match score distributions are calculated on those. Synthetic images with the lowest probabilities of zero success are included in the final set. Our hypothesis that this set would be more successful in wolf attacks is tested by comparing its spoofing performances with randomly selected sample sets.Book Part Citation - Scopus: 2Dementia Detection With Deep Networks Using Multi-Modal Image Data(CRC Press, 2023) Yiğit, Altuğ; Işık, Zerrin; Baştanlar, YalınNeurodegenerative diseases give rise to irreversible neural damage in the brain. By the time it is diagnosed, the disease may have progressed. Although there is no complete treatment for many types of neurodegenerative diseases, by detecting the disease in its early stages, treatments can be applied to relieve some symptoms or prevent disease progression. Many invasive and non-invasive methods are employed for the diagnosis of dementia. Computer-assisted diagnostic systems make the diagnosis based on volumetric features (structural or functional) or some two-dimensional brain perspectives obtained from a single image modality. This chapter firstly introduces a broad review of multi-modal imaging approaches proposed for dementia diagnosis. Then it presents deep neural networks, which extract structural and functional features from multi-modal imaging data, are employed to diagnose Alzheimer’s and mild cognitive impairments. While MRI scans are safer than most types of scans and provide structural information about the human body, PET scans provide information about functional activities in the brain. Thus, the setup has been designed to make experiments using both MRI and FDG-PET scans. Performances of multi-modal models were compared with single-modal solutions. The multi-modal solution showed superiority over single-modals due to the advantage of focusing on assorted features. © 2023 selection and editorial matter, Jyotismita Chaki; individual chapters, the contributors.Conference Object Citation - Scopus: 1A Lightweight and Energy Efficient Secrecy Outage Probability-Based Friendly Jamming(IEEE, 2023) Yaman, Okan; Ayav, Tolga; Erten, Yusuf MuratThird parties and legitimate entities can reach and process users' private data through most wireless networks. However, attackers such as intruders and eavesdroppers may also try to exploit this property in communication. Hence, wireless networks are intrinsically more vulnerable to threats, unlike their wired alternatives. Cryptographic techniques are the conventional approaches to deal with that weakness. Nevertheless, they still need to meet the requirements of contemporary technologies, including IoT nodes with energy and processing power constraints. In that respect, friendly jamming (FJ) is one of the encouraging countermeasures to overcome the mentioned susceptibility since it has an energy-efficient and computation-friendly nature. However, that promising approach brings another challenge, applicability. Although various models exist against this issue, a lightweight scheme compliant with novel technologies is needed. Hence, we propose a more straightforward FJ model evaluated on cellular network-based simulations in this study. Moreover, introducing a lightweight secrecy outage probability definition increases robustness and energy efficiency. © 2023 IEEE.Data Paper Citation - WoS: 15Citation - Scopus: 20Database Covering the Prayer Movements Which Were Not Available Previously(Nature Publishing Group, 2023) Mihçin, Şenay; Şahin, Ahmet Mert; Yılmaz, Mehmet; Alpkaya, Alican Tuncay; Tuna, Merve; Akdeniz, Sevinç; Can, Nuray Korkmaz; Tosun, Aliye; Şahin, SerapLower body implants are designed according to the boundary conditions of gait data and tested against. However, due to diversity in cultural backgrounds, religious rituals might cause different ranges of motion and different loading patterns. Especially in the Eastern part of the world, diverse Activities of Daily Living (ADL) consist of salat, yoga rituals, and different style sitting postures. A database covering these diverse activities of the Eastern world is non-existent. This study focuses on data collection protocol and the creation of an online database of previously excluded ADL activities, targeting 200 healthy subjects via Qualisys and IMU motion capture systems, and force plates, from West and Middle East Asian populations with a special focus on the lower body joints. The current version of the database covers 50 volunteers for 13 different activities. The tasks are defined and listed in a table to create a database to search based on age, gender, BMI, type of activity, and motion capture system. The collected data is to be used for designing implants to allow these sorts of activities to be performed.Conference Object Citation - WoS: 2Citation - Scopus: 2Effort Prediction With Limited Data: a Case Study for Data Warehouse Projects(IEEE, 2022) Unlu, Huseyin; Yildiz, Ali; Demirors, OnurOrganizations may create a sustainable competitive advantage against competitors by using data warehouse systems with which they can assess the current status of their operations at any moment. They can analyze trends and connections using up-to-date data. However, data warehouse projects tend to fail more often than other projects as it can be tough to estimate the effort required to build a data warehouse system. Functional size measurement is one of the methods used as an input for estimating the amount of work in a software project. In this study, we formed a measurement basis for DWH projects in an organization based on the COSMIC Functional Size Measurement Method. We mapped COSMIC rules on two different architectures used for DWH projects in the organization and measured the size of the projects. We calculated the productivity of the projects and compared them with the organization's previous projects and DWH projects in the ISBSG repository. We could not create an organization-wide effort estimation model as we had a limited number of projects. As an alternative, we evaluated the success of effort estimation using DWH projects in the ISBSG repository. We also reported the challenges we faced during the size measurement process.Conference Object Citation - WoS: 7Citation - Scopus: 12Utilization of Three Software Size Measures for Effort Estimation in Agile World: a Case Study(IEEE, 2022) Unlu, Huseyin; Hacaloglu, Tuna; Buber, Fatma; Berrak, Kivilcim; Leblebici, Onur; Demirors, OnurFunctional size measurement (FSM) methods, by being systematic and repeatable, are beneficial in the early phases of the software life cycle for core project management activities such as effort, cost, and schedule estimation. However, in agile projects, requirements are kept minimal in the early phases and are detailed over time as the project progresses. This situation makes it challenging to identify measurement components of FSM methods from requirements in the early phases, hence complicates applying FSM in agile projects. In addition, the existing FSM methods are not fully compatible with today's architectural styles, which are evolving into event-driven decentralized structures. In this study, we present the results of a case study to compare the effectiveness of different size measures: functional -COSMIC Function Points (CFP)-, event-based - Event Points-, and code length-based - Line of Code (LOC)- on projects that were developed with agile methods and utilized a microservice- based architecture. For this purpose, we measured the size of the project and created effort estimation models based on three methods. It is found that the event-based method estimated effort with better accuracy than the CFP and LOC-based methods.Conference Object Citation - WoS: 2Citation - Scopus: 3Adopting Heterogeneous Computing Modules: Experiences From a Touch Summer Workshop(Institute of Electrical and Electronics Engineers Inc., 2022) Bunde, D.P.; Ahmed, K.; Ayloo, S.; Brown-Gaines, T.; Fuentes, J.; Jatala, V.; Yeh, T.Y.We present efforts to encourage the adoption of modules for teaching heterogeneous parallel computing through a faculty development workshop. The workshop was held remotely using a novel format to exploit the advantages of a virtual format and mitigate its disadvantages. Adoption at a wide variety of institutions showed module effectiveness and also gathered feedback leading to several module improvements. We also report on the adoptions themselves, which show the importance of supporting adaptation of the modules for diverse settings. © 2022 IEEE.
