Now showing items 1-10 of 45

    • Development of a software vulnerability prediction web service based on artificial neural networks 

      Çatal, Çağatay; Akbulut, Akhan ; Ekenoğlu, Ecem; Alemdaroğlu, Meltem (2017)
      Detecting vulnerable components of a web application is an important activity to allocate verification resources effectively. Most of the studies proposed several vulnerability prediction models based on private and public ...
    • Autonomous vehicle control for Lane and vehicle tracking by using deep learning via vision 

      Olgun, Masum Celil; Baytar, Zakir; Akpolat, Kadir Metin; Şahingöz, Özgür Koray (2018)
      Camera-based lane detection and vehicle tracking algorithms are one of the keystones for many autonomous systems. The navigational process of those systems is mainly focused on the output of detection algorithms. However, ...
    • Estimation of beat-to-beat interval from wearable photoplethysmography sensor on different measurement sites during daily activities 

      Patlar Akbulut, Fatma; Lawless, Kevin; Tanneeru, Akhilesh; Rao, Smriti; Lee, Bongmook; Misra, Veena (2018)
      In this study, we present an algorithm to detect beat-to-beat interval from PPG in the presence of motion artifacts. Our approach includes splitting slowly varying DC components, statistical detrending, and Bessel filtering ...
    • Diagnosis of lung cancer using artificial immune system 

      Günay, Melike; Orman, Zeynep; Ensari, Tolga; Oukid, Salina; Benblidia, Nadjia (International Scientific Meeting on Electrical-Electronics and Biomedical Engineering and Computer Science (EBBT), 2019)
      In this study, we implement the Artificial Immune System method to increase the number of data in the lung cancer dataset and obtain higher prediction rate for the diagnosis of lung cancer. Artificial Immune System is ...
    • Phishing Analysis of Websites Using Classification Techniques 

      Aksu, Doğukan; Turgut, Zeynep; Üstebay, Serpil; Aydın, Muhammed Ali (2019)
      In today's world, where all records are carried into an electronic environment, cyber security represents a very broad scope, with the primary objective of preventing the loss of financial and/or emotional loss of people, ...
    • Deep learning based security management of information systems: A comparative study 

      Sahingoz, Ozgur Koray; Çebi, Cem Berke; Bulut, Fatma Sena; Fırat, Hazal; Karatas, Gözde (2020-01)
      In recent years, there is a growing trend of internetization which is a relatively new word for our global economy that aims to connect each market sectors (or even devices) by using the global network architecture as the ...
    • e-Vital: A Wrist-Worn Wearable Sensor Device for Measuring Vital Parameters 

      Patlar Akbulut, Fatma; Özcan, Özgür; Çınar, İpek (2019-10-03)
      In today’s world, connected wearable sensors be­came a delicate part of the imperative daily analysis and assessment to identify the urgency of the state of health. Recent advances in sensor designs and analysis techniques ...
    • Flower Classification with Deep CNN and Machine Learning Algorithms 

      Mete, Büşra Rümeysa; Ensari, Tolga (2019-09-11)
      Development of the recognition of rare plant species will be advantageous in the fields such as the pharmaceutical industry, botany, agricultural, and trade activities. It was also very challenging that there is diversity ...
    • Deep Learning Approaches for Phantom Movement Recognition 

      Akbulut, Akhan; Aşçı, Güven; Güngör, Faray; Tarakçı, Ela; Aydın, Muhammed Ali; Zaim, Abdül Halim (2019-11-03)
      Phantom limb pain has a negative effect on the life of individuals as a frequent consequence of limb amputation. The movement ability on the lost extremity can still be maintained after the amputation or deafferentation, ...
    • Deep Learning Based Document Modeling for Personality Detection from Turkish Texts 

      İlgen, Bahar (2019-10-24)
      The usage of social media is increasing exponentially since it has been the easiest and fastest way to share information between people or organizations. As a result of this broad usage and activity of people on social ...