Now showing items 40-59 of 138

    • Benchmarking of Regression Algorithms and Time Series Analysis Techniques for Sales Forecasting 

      Akbulut, Akhan (2019-01)
      — Predicting the sales amount as close as to the actual sales amount can provide many benefits to companies. Since the fashion industry is not easily predictable, it is not straightforward to make an accurate prediction ...
    • Building Bilingual Microcomputer Systems 

      Taylı, Murat; Salamah, A. (1990-05)
      In the Arab world the need for bilingual microcomputer systems is ever increasing. In addition to the ability to process the Arabic and English scripts, an ideal system should support the use of existing applications with ...
    • Building up lexical sample dataset for Turkish word sense disambiguation 

      İlgen, Bahar; Adalı, Eşref; Tantuğ, Ahmet Cüneyd (2012-07-02)
      Word Sense Disambiguation (WSD) has become even more important research area in recent years with the widespread usage of Natural Language Processing (NLP) applications. WSD task has two variants: “Lexical Sample” and “All ...
    • CAVE Sanal Gerçeklik Teknolojisinin Üniversite-Sanayi İşbirliği Açısından Değerlendirilmesi ve Örnek bir Durum Çalışması 

      Çatal, Çağatay; Akbulut, Akhan (2019-03)
      CAVE (CAVE Automatic Virtual Environment) sanal gerçeklik teknoloji altyapısı, yurt dışındaki üniversiteler ve araştırma kurumları tarafından, son dönemde farklı fonlarla kurulmaya başlanmış ancak Türkiye’de henüz bir ...
    • Clustering and dimensionality reduction to determine important software quality metrics 

      Turan, Metin; Çataltepe, Zehra (IEEE, 345 E 47th St, New York, Ny 10017 USA, 2007)
      During the last two decades research on software engineering is concentrated on quality. The best approach to quality evaluation goes through determining well-defined metrics on software properties. One such property is ...
    • Code Generator Framework for Smart TV Platforms 

      In recent years, smart TVs have become more common, making them need to be included as targets for the software industry. In this study, the authors developed a code generator framework and demonstrated it in an architectural ...
    • Comparison of Cryptography Algorithms for Mobile Payment Systems 

      Şengel, Öznur; Aydın, Muhammed; Sertbaş, Ahmet (2018-10)
      Mobile payment services are the newest and most popular technology that is developing according to our habits and needs. Consumer all over the world are using mobile phone for payment as well as communication. The main ...
    • Comparison of Face Recognition Algorithms 

      Günay, Melike; Ensari, Tolga (IEEE, 345 E 47Th St, New York, Ny 10017 USA, 2017)
      in this study, we analyze the algorithms that is used for face recognition and make performance comparison of two algorithms. The methods that is analyzed are k-nearest neighbors, Naive Bayes, eigenfaces, principle component ...
    • Comparison of Partition Evaluation Measures in an Adaptive Partitioning Algorithm for Global Optimization 

      Özdamar, Linet; Demirhan, M (ELSEVIER SCIENCE BV, PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS, 2001-01-01)
      An adaptive partitioning algorithm with random search is proposed to locate the global optimum of multimodal functions. Partitioning algorithms divide the feasible region into nonoverlapping partitions in order to restrict ...
    • Component-Based Project Estimation Issues for Recursive Development 

      Altunel, Yusuf; Tolun, Mehmet R. (SPRINGER, PO BOX 17, 3300 AA DORDRECHT, NETHERLANDS, 2008)
      In this paper we investigated the component-based specific issues that might affect project cost estimation. Component-based software development changes the style of software production. With component-based approach the ...
    • Component-based software development with component variants 

      Altunel, Yusuf; Tolun, Mehmet R. (ACTA PRESS ANAHEIM, PO BOX 5124, ANAHEIM, CA 92814-5124 USA, 2007)
      Variants are the new units suggested for component-based software implementation to contain just one set of features that a traditional component might normally contain. They help us to implement the specialization of ...
    • Computer aided autism threapy system design 

      Akbulut, Akhan (IEEE, 345 E 47th St, New York, Ny 10017 USA, 2015)
      Autism spectrum disorder is a developmental disorder such as Asperger's or Rett Syndrome, which damages social interaction and contact with the environment of individuals that prevents brain development. In Turkey, 600,000 ...
    • Control in Networked Systems With Fuzzy Logic 

      Akbulut, Akhan; Öztaş, Oğuzhan (Tubitak Scientific & Technical Research Council Turkey, Ataturk Bulvarı No 221, Kavaklıdere, Ankara, 00000, Turkey, 2013)
      Recently, the development of control systems based on network-based architecture is getting very high attention. Because of its fast data communication, network-based control is in high demand. However, there are some ...
    • Dalgaboyu Bölmeli Çoğullama Yapıları ve Enerji Verimliliği 

      Şengel, Öznur; Aydın, Muhammed Ali (2015-09-02)
    • Decrease of event related theta coherence at left frontal-parietal connection in Alzheimer patients 

      Başar, Erol; Güntekin, Bahar; Yener, Görsev G.; Saatçı, Ertuğrul (Elsevier Science Inc, 360 Park Ave South, New York, Ny 10010-1710 USA, 2008-04-01)
    • Decreased Evoked Right Fronto-Temporal Gamma Coherence in Acute Mania Improves After Valproate Monotherapy 

      Özerdem, Ayşegül; Güntekin, Bahar; Saatçı, Ertuğrul; Başar, Erol (Elsevier Science Inc, 360 Park Ave South, New York, Ny 10010-1710 USA, 2009-04-15)
    • Deep Learning Approaches for Phantom Movement Recognition 

      Akbulut, Akhan; Aşçı, Güven; Güngör, Faray; Tarakçı, Ela; Aydın, Muhammed Ali; Zaim, Abdül Halim (2019-11-03)
      Phantom limb pain has a negative effect on the life of individuals as a frequent consequence of limb amputation. The movement ability on the lost extremity can still be maintained after the amputation or deafferentation, ...
    • Deep Learning Approaches for Predictive Masquerade Detection 

      Elmasry, Wisam; Akbulut, Akhan; Zaim, Abdül Halim (Wiley-Hindawi, Adam House, 3rd Fl, 1 Fitzroy Sq, London, Wit 5He, England, 2018)
      In computer security, masquerade detection is a special type of intrusion detection problem. Effective and early intrusion detection is a crucial factor for computer security. Although considerable work has been focused ...
    • Deep Learning Based Document Modeling for Personality Detection from Turkish Texts 

      İlgen, Bahar (2019-10-24)
      The usage of social media is increasing exponentially since it has been the easiest and fastest way to share information between people or organizations. As a result of this broad usage and activity of people on social ...
    • Deep learning based forecasting in stock market with big data analytics 

      Şişmanoğlu, Gözde; Önde, Mehmet Ali; Koçer, Furkan; Sahingoz, Ozgur Koray (2019)
      In recent years, due to the technological improvements in computers' hardware and enhancements in the machine learning techniques, there are two increasing approaches for problem-solving as the use of "Big Data" and "Parallel ...