Başlık için Bilgisayar Mühendisliği Bölümü listeleme
Toplam kayıt 263, listelenen: 33-52
-
An Improved Device Identifier Composition Engine Architecture to Enhance Internet of Things Security
(Fen Bilimleri Enstitüsü, 2023)The number of Internet-of-Things (IoT) devices has been increasing rapidly every year. Most of these devices have access to important personal data such as health, daily activities, location, and finance. However, these ... -
An In-Depth Analysis of Visual Saliency in Rendered Virtual Reality Environments
(Fen Bilimleri Enstitüsü, 2023-02-03)In virtual reality (VR), visual saliency has been exploited in order to solve different problems in the literature. However, the studies to reveal the underlying mechanism and the potential of visual saliency in VR are ... -
An Investıgatıon Of Factors Affectıng The Adoptıon Of Do-200a Standard
(Fen Bilimleri Enstitüsü, 2021-04-30)Software organizations can use standards in the software field in order to reach their targeted quality level, to be a legal requirement or to increase their market shares in line with the accreditation or certification ... -
An Rnn-Based Approach for Dıscoverıng Inconsıstencıes Between Permıssıons and Metadata In Androıd Applıcatıons
(Fen Bilimleri Enstitüsü, 2019-09)Since mobile devices are increasingly on hand today, users have become more heavily involved with their use in accessing the Internet. Today, most mobile devices use the Android operating system. On mobile devices, users' ... -
Analysis of Smart City Technologies
(Fen Bilimleri Enstitüsü, 2020)Technology, that cannot be prevented and reaches unbelievable points in the light of science, maintains a modern and technological era by offering great convenience to people in their lives. Smart Systems, Applications, ... -
Analyzing the Effects of Lowlevel Features for Visual Attribute Recognition
(Fen Bilimleri Enstitüsü, 2015)In recent years, visual attributes became a popular topic of computer vision research. Visual attributes are being used on various tasks including object recognition, people search, scene recognition, and so on. In order ... -
Android Uygulama Kurulum Sürecı̇ İçin Verı̇mlı̇ Bir Evrı̇msel Tabanlı Fuzz Testı̇
(Fen Bilimleri Enstitüsü, 2018)Automated tools based on source code analysis used in application development and test phases are insufficient to ensure application security. For this reason, researchers also resort to fuzz testing methods to analyze ... -
Anti-Ramsey Number of Matchings in Hypergraphs
(Elsevier Science Bv, 2013)A k-matching in a hypergraph is a set of k edges such that no two of these edges intersect. The anti-Ramsey number of a k-matching in a complete s-uniform hypergraph H on n vertices, denoted by ar(n, s, k), is the smallest ... -
Applıcatıon of Defuzzıfıcatıon-Free Hıerarchıcal Fuzzy Inference Rule Generatıon Method to Software Fault Predıctıon Problems and Fuzzy Rule Dıscussıon
(Fen Bilimleri Enstitüsü, 2020)Fuzzy inference systems, a sub-branch of artificial intelligence, are decision support systems based on fuzzy set theory. The knowledge is transmitted to these systems through linguistic fuzzy rules. In general, the rule ... -
Araçsal Tasarsız Ağlar İçin İstatistiksel Tabanlı Bir Saldırı Tespit Yöntemi
(Fen Bilimleri Enstitüsü, 2018)The number of fast-moving devices connected to the internet is increasing day by day. Accordingly, the proposed mobile ad hoc networks are becoming widespread for these mobile devices to communicate with each other. As ... -
Artificial Intelligence Applications in Early Diagnosis of Sepsis Disease
(Fen Bilimleri Enstitüsü, 2023)Sepsis is a major cause of death in intensive care units worldwide. Early diagnosis and treatment are crucial for improving patient survival and reducing organ dysfunction. Combining sepsis research and computer science ... -
Artificial Intelligence Based Flexible Preamble Allocation for Radio Access Network Slicing in 5G Networks
(Fen Bilimleri Enstitüsü, 2021)One of the most difficult challenges in Radio Access Network (RAN) slicing occurs in the connection establishment phase where multiple devices use a common Random Access Channel (RACH) to gain access to the network. It is ... -
Assessing Risks And Threats With Layered Approach To Internet Of Things Security
(2019)Internet of Things is the next-generation Internet network created by intelligent objects with software and sensors, employed in a wide range of fields such as automotive, construction, health, textile, education and ... -
Assessment of Fractal Dimension and Geometrical Characteristics of the Landslides Identified in North of Tehran, Iran
(Springer, 2014)The aim of the presented study is to assess the fractal dimension (D) and the geometrical characteristics (length and width) of the landslides identified in North of Tehran, Iran. At first, the landslide locations (528 ... -
Attribute Based Classifiers for Image Understanding
(Fen Bilimleri Enstitüsü, 2017-01-09)Attributes are mid-level semantic concepts which describe visual appearance, functional affordance or other human-understandable aspects of objects and scenes. In the recent years, several works have investigated the use ... -
Automatic Description Generation from Images: A Survey of Models, Datasets, and Evaluation Measures
(Ai Access Foundation, 2016)Automatic description generation from natural images is a challenging problem that has recently received a large amount of interest from the computer vision and natural language processing communities. In this survey, we ... -
Automatic Generation of Scientific Terminology with Deep Learning
(Fen Bilimleri Enstitüsü, 2021)Automatic term extraction is an essential task in natural language processing. In this thesis, we work on terminology extraction for two purposes. The first aim is to measure inconsistency of scientific terminology for ... -
Automatic WordNet Construction Using Wikipedia Data
(Fen Bilimleri Enstitüsü, 2019-07-02)Building WordNets from comparable corpora is a task that is explored, but especially using Wikipedia for this purpose is not explored in depth. Wikipedia, has a structure that makes it a comparable corpora for lots of ... -
B-Mode Echotexture Analysis and Color Doppler Sonography in Canine Mammary Tumors
(Kafkas Univ, Veteriner Fakultesi Dergisi, 2016)Forty-one mammary gland tumors from twenty eight bitches were used for the study. Ultrasonographic examinations of tumor masses were performed before surgical excision and a quadratic region-of-interest (ROI) was chosen ... -
Bağlama-Dayalı Rol Tabanlı Yetkilendirmede Semantik Model Kullanarak Erişim Denetimi ve Yönetimi: Sağlık Alanı için Bir Durum Çalışması
(Fen Bilimleri Enstitüsü, 2015)In today s, Information Technologies (IT) World security have become a very important and complicated problem. The possibility of unauthorized access to protected knowledge results in unexpected damages and outcomes. In ...