Search
Now showing items 1-7 of 7
Machine Learning Based Phishing Detection from URIs
(2017-12)
Due to the rapid growth of the Internet, users change their preference from traditional shopping to the electronic commerce. Instead of bank/shop robbery, nowadays, criminals try to find their victims in the cyberspace ...
Disease Prediction Using Weighted Artificial Immune System
(2019-07)
The Artificial Immune System (AIS) is a computational intelligence method inspired from the human immune system, which is applied to real-world problem solving related to classification, optimization and anomaly detection ...
Development of a software vulnerability prediction web service based on artificial neural networks
(2017)
Detecting vulnerable components of a web application is an important activity to allocate verification resources effectively. Most of the studies proposed several vulnerability prediction models based on private and public ...
Autonomous vehicle control for Lane and vehicle tracking by using deep learning via vision
(2018)
Camera-based lane detection and vehicle tracking algorithms are one of the keystones for many autonomous systems. The navigational process of those systems is mainly focused on the output of detection algorithms. However, ...
Building up lexical sample dataset for Turkish word sense disambiguation
(2012-07-02)
Word Sense Disambiguation (WSD) has become even more important research area in recent years with the widespread usage of Natural Language Processing (NLP) applications. WSD task has two variants: “Lexical Sample” and “All ...
Flower Classification with Deep CNN and Machine Learning Algorithms
(2019-09-11)
Development of the recognition of rare plant species will be advantageous in the fields such as the pharmaceutical industry, botany, agricultural, and trade activities. It was also very challenging that there is diversity ...
Digital Data Forgetting: A Machine Learning Approach
(2018-10)
Digital transformation of the world goes very fast during last two decades. Today, data is power and very important.
Firstly, magnetic tapes and then digital data storages have been used to collect all data. After this ...