Güncel Gönderiler: Araştırma Çıktıları | TR-Dizin | WoS | Scopus | PubMed
Toplam kayıt 7740, listelenen: 5781-5800
-
A new computer-based approach for fully automated segmentation of knee meniscus from magnetic resonance images
(Elsevier, 2017)Menisci are tissues that enable mobility and absorb excess loads on the knee. Problems in meniscus can trigger the disorder of osteoarthritis (OA). OA is one of the most common causes of disability, especially among young ... -
Predicting the Direction of Movement for Stock Price Index Using Machine Learning Methods
(Springer-Verlag Berlin, 2016)Stock price prediction with high accuracy may offer significant opportunities for the investors who make decisions on making profit or having high gains over the stocks in stock markets. The aim of this study is to predict ... -
Robust Acoustic Emotion Recognition Based on Cascaded Normalization and Extreme Learning Machines
(Springer International Publishing Ag, 2016)One of the challenges in speech emotion recognition is robust and speaker-independent emotion recognition. In this paper, we take a cascaded normalization approach, combining linear speaker level, non-linear value level ... -
Prediction of Football Match Results in Turkish Super League Games
(Springer-Verlag Berlin, 2016)This paper presents a model that predicts the results (Home Win/Draw/Away Win) of the football matches played in the Turkish Super League, by using three machine learning classification methods, which are Support Vector ... -
Prediction of full load electrical power output of a base load operated combined cycle power plant using machine learning methods
(Elsevier Sci Ltd, 2014)Predicting full load electrical power output of a base load power plant is important in order to maximize the profit from the available megawatt hours. This paper examines and compares some machine learning regression ... -
Classification-based prediction models for stock price index movement
(Ios Press, 2016)Stock price prediction with high accuracy may offer significant opportunities for the investors who make decisions on making profit or having high gains over the stocks in stock markets. In this study, four predictive ... -
On the Construction of 20 x 20 and 24 x 24 Binary Matrices with Good Implementation Properties for Lightweight Block Ciphers and Hash Functions
(Hindawi Ltd, 2014)We present an algebraic construction based on state transform matrix (companion matrix) for n x n (where n + 2(k), k being a positive integer) binary matrices with high branch number and low number of fixed points. We also ... -
Combining Deep Facial and Ambient Features for First Impression Estimation
(Springer International Publishing Ag, 2016)First impressions influence the behavior of people towards a newly encountered person or a human-like agent. Apart from the physical characteristics of the encountered face, the emotional expressions displayed on it, as ... -
Automatic detection of meniscal area in the knee MR images
(IEEE, 2016)Nowadays computer-aided medical systems has become widespread. These systems assist the scientists in the medical field with diagnosis and treatment. In the same vein, in this study detection of medial meniscus from MR ... -
Comparative Analysis of Codeword Representation by Clustering Methods for the Classification of Histological Tissue Types
(Spie-Int Soc Optical Engineering, 2015)In this study, the classification of several histological tissue types, i.e., muscles, nerves, connective and epithelial tissue cells, is studied in high resolutional histological images. In the feature extraction step, ... -
A hybrid approach for extracting informative content from web pages
(Elsevier Sci Ltd, 2013)Eliminating noisy information and extracting informative content have become important issues for web mining, search and accessibility. This extraction process can employ automatic techniques and hand-crafted rules. Automatic ... -
A new method to determine algebraic expression of power mapping based S-boxes
(Elsevier Science Bv, 2013)Power mapping based S-boxes, especially those with finite field inversion, have received significant attention by cryptographers. S-boxes designed by finite field inversion provide good cryptographic properties and are ... -
Author Detection by Using Different Term Weighting Schemes
(IEEE, 2013)In this study, the impact of term weighting on author detection as a type of text classification is investigated. The feature vector being used to represent texts, consists of stem words as features and their weight values, ... -
Analyzing the Performance Differences Between Pattern Matching and Compressed Pattern Matching on Texts
(IEEE, 2013)In this study the statistics of pattern matching on text data and the statistics of compressed pattern matching on compressed form of the same text data are compared. A new application has been developed to count the ... -
Faculty of Engineering Students' Success Analysis with Clustering Methods
(IEEE, 2013)In this study, data clustering analysis for the student of faculty of engineering carried out. Cluster analysis, using the different characteristics or similar properties of objects in the data set, aims at creating in the ... -
An effective and efficient web content extractor for optimizing the crawling process
(John Wiley and Sons Ltd, 2014)Classical Web crawlers make use of only hyperlink information in the crawling process. However, focused crawlers are intended to download only Web pages that are relevant to a given topic by utilizing word information ... -
Web content extraction by using decision tree learning
(2012)Via information extraction techniques, web pages are able to generate datasets for various studies such as natural language processing, and data mining. However, nowadays the uninformative sections like advertisement, ... -
A fuzzy ranking approach for improving search results in Turkish as an agglutinative language
(Pergamon-Elsevier Science Ltd, 2012)This study proposes a fuzzy ranking approach, designed for Turkish as an agglutinative language, that focuses on improving stemming techniques via using distances of characters in its search algorithm. Various studies ... -
Classifying 8-bit to 8-bit S-boxes based on power mappings from the point of DDT and LAT distributions
(Springer-Verlag Berlin, 2008)S-boxes are vital elements in the design of symmetric ciphers. To date, the techniques for the construction of S-boxes have included pseudo-random generation, finite field inversion, power mappings and heuristic techniques. ... -
Designing attacks for SMTP servers
(C R L Publishing Ltd, 2011)Electronic mail is today's most widely used method of communication. In recent years, if e-mail had not been there, communication would not have been possible. Because of SMTP (Simple Mail Transfer Protocol) is an old ...