Recent Submissions

  • Deep Learning Based Document Modeling for Personality Detection from Turkish Texts 

    İlgen, Bahar (2019-10-24)
    The usage of social media is increasing exponentially since it has been the easiest and fastest way to share information between people or organizations. As a result of this broad usage and activity of people on social ...
  • Machine Learning Based Phishing Detection from URIs 

    Şahingöz, Özgür Koray; Buber, Ebubekir; Demir, Önder; Diri, Banu (2017-12)
    Due to the rapid growth of the Internet, users change their preference from traditional shopping to the electronic commerce. Instead of bank/shop robbery, nowadays, criminals try to find their victims in the cyberspace ...
  • Disease Prediction Using Weighted Artificial Immune System 

    Günay, Melike; Orman, Zeynep (2019-07)
    The Artificial Immune System (AIS) is a computational intelligence method inspired from the human immune system, which is applied to real-world problem solving related to classification, optimization and anomaly detection ...
  • On the Direction Guidance in Structure Tensor Total Variation Based Denoising 

    Demircan-Tureyen, Ezgi (2019-07)
    This paper introduces a new analysis-based regularizer, which incor­ porates the neighborhood-awareness of the structure tensor total variation (STV) and the tunability of the directional total variation (DTV), in favor ...
  • Software Versioning with Microservices through the API Gateway Desing Pattern 

    Akbulut, Akhan (2019-06)
    he microservices architecture is a relatively new approach in implementing service-oriented systems. This cloud­ native architectural style enables the implementation of loosely coupled, agile, reuse-oriented, and lightweight ...
  • A Novel Input Set for LSTM based Transport Mode Detection 

    Aşcı, Güven; Güvensan, M.Amaç (2019-03)
    The capability of mobile phones are increasing with the development of hardware and software technology. Especially sensors on smartphones enable to collect environmental and personal information. Thus, smartphones become ...
  • Comparison of Cryptography Algorithms for Mobile Payment Systems 

    Şengel, Öznur; Aydın, Muhammed; Sertbaş, Ahmet (2018-10)
    Mobile payment services are the newest and most popular technology that is developing according to our habits and needs. Consumer all over the world are using mobile phone for payment as well as communication. The main ...
  • Determining the Cryptography Algorithm and Model for Mobile Payment Systems 

    Şengel, Öznur; Aydın, Muhammed Ali; Şertbaş, Ahmet (2018-10)
    New payment applications are developed with demands and needs of people. People wants to do their transaction and shopping faster and easily than the other devices. Mobile phones are used for not only communications but ...
  • Digital Data Forgetting: A Machine Learning Approach 

    Mete, Büşra Rümeysa; Günay, Melike; Aşıroğlu, Batuhan; Yıldız, Eyyüp; Zencirli, Ahmet; Ensari, Tolga; Nalçakan, Yağız (2018-10)
    Digital transformation of the world goes very fast during last two decades. Today, data is power and very important. Firstly, magnetic tapes and then digital data storages have been used to collect all data. After this ...
  • A Wearable Device for Virtual Cyber Therapy of Phantom Limb Pain 

    Aşcı, Güven; Akbulut, Akhan ; Tarakçı, Ela; Aydın, Muhammed; Zaim, Abdul Halim (2018-09)
    Phantom limb pain (PLP) is the condition most often occurs in people who have had a limb amputated and it is may affect their life severely. When the brain sends movement signals to the phantom limb, it returns and causes ...

View more