59 sonuçlar
Arama Sonuçları
Listeleniyor 1 - 10 / 59
Yayın Sınıflandırma için diferansiyel mahremiyete dayalı öznitelik seçimi(Gazi Univ, Fac Engineering Architecture, 2018) Var, Esra; İnan, AliVeri madenciliği ve makine öğrenmesi çözümlerinin en önemli ön aşamalarından biri yapılacak analizde kullanılacak verinin özniteliklerinin uygun bir alt kümesini belirlemektir. Sınıflandırma yöntemleri için bu işlem, bir özniteliğin sınıf niteliği ile ne oranda ilişkili olduğuna bakılarak yapılır. Kişisel gizliliği koruyan pek çok sınıflandırma çözümü bulunmaktadır. Ancak bu yöntemler için öznitelik seçimi yapan çözümler geliştirilmemiştir. Bu çalışmada, istatistiksel veritabanı güvenliğinde bilinen en kapsamlı ve güvenli çözüm olan diferansiyel mahremiyete dayalı özgün öznitelik seçimi yöntemleri sunulmaktadır. Önerilen bu yöntemler, yaygın olarak kullanılan bir veri madenciliği kütüphanesi olan WEKA ile entegre edilmiş ve deney sonuçları ile önerilen çözümlerin sınıflandırma başarımına olumlu etkileri gösterilmiştir.Yayın Mobile applications discovery: a subscriber-centric approach(Wiley Periodicals, 2011-03) Erman, Bilgehan; İnan, Ali; Nagarajan, Ramesh; Uzunalioğlu, HüseyinRapid adoption of smartphones and the business success of the Apple App Store have resulted in the rampant growth of mobile applications. Seeking new revenue opportunities from application development has created a gold rush. However, free or very cheap applications constitute a great bulk of the application downloads putting great pricing pressure on the developers. Furthermore, usage statistics suggest that most of the applications have been either one-trick applications or are downright useless, meriting no attention from the user beyond the first day. This is not surprising since cheap prices will dissuade developers from investing large sums of money to continue to develop more sophisticated, high quality applications. Developers have been complaining about the lack of visibility of their applications in stores that are beginning to resemble a high volume warehouse. It is clear that enhancing application discovery and building better marketing tools will be essential for the continued success of the mobile application marketplace and application stores. This paper proposes and investigates techniques for effective discovery of applications by matching user interests with application characteristics, with a special focus on adapting classical data mining techniques to user ratings of the applications. The user ratings are leveraged to make recommendations on potential applications of interest.Yayın Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427](Elsevier Science BV, 2009-09-07) Rhouma, Rhouma; Solak, Ercan; Arroyo, David; Li, Shujun; Alvarez, Gonzalo; Belghith, Safya MdimeghIn this comment, we analyze a recently proposed Baptista-like cryptosystem and show that it is not invertible. Others weaknesses are also reported. A modified version of this cryptosystem is proposed to show how to overcome the non-invertibility.Yayın Construction of a Turkish proposition bank(Tubitak Scientific & Technical Research Council Turkey, 2018) Ak, Koray; Toprak, Cansu; Esgel, Volkan; Yıldız, Olcay TanerThis paper describes our approach to developing the Turkish PropBank by adopting the semantic role-labeling guidelines of the original PropBank and using the translation of the English Penn-TreeBank as a resource. We discuss the semantic annotation process of the PropBank and language-specific cases for Turkish, the tools we have developed for annotation, and quality control for multiuser annotation. In the current phase of the project, more than 9500 sentences are semantically analyzed and predicate-argument information is extracted for 1330 verbs and 1914 verb senses. Our plan is to annotate 17,000 sentences by the end of 2017.Yayın Cryptanalysis of a multi-chaotic systems based image cryptosystem(Elsevier Science BV, 2010-01-15) Solak, Ercan; Rhouma, Rhouma; Belghith, Safya MdimeghThis paper is a cryptanalysis of a recently proposed multi-chaotic systems based image cryptosystem. The cryptosystem is composed of two shuffling stages parameterized by chaotically generated sequences. We propose and implement two different attacks which completely break this encryption scheme.Yayın k-Means clustering by using the calculated Z-scores from QEEG data of children with dyslexia(Taylor & Francis, 2023) Eroğlu, Günet; Arman, FehimLearning the subtype of dyslexia may help shorten the rehabilitation process and focus more on the relevant special education or diet for children with dyslexia. For this purpose, the resting-state eyes-open 2-min QEEG measurement data were collected from 112 children with dyslexia (84 male, 28 female) between 7 and 11 years old for 96 sessions per subject on average. The z-scores are calculated for each band power and each channel, and outliers are eliminated afterward. Using the k-Means clustering method, three different clusters are identified. Cluster 1 (19% of the cases) has positive z-scores for theta, alpha, beta-1, beta-2, and gamma-band powers in all channels. Cluster 2 (76% of the cases) has negative z-scores for theta, alpha, beta-1, beta-2, and gamma-band powers in all channels. Cluster 3 (5% of the cases) has positive z-scores for theta, alpha, beta-1, beta-2, and gamma-band powers at AF3, F3, FC5, and T7 channels and mostly negative z-scores for other channels. In Cluster 3, there is temporal disruption which is a typical description of dyslexia. In Cluster 1, there is a general brain inflammation as both slow and fast waves are detected in the same channels. In Cluster 2, there is a brain maturation delay and a mild inflammation. After Auto Train Brain training, most of the cases resemble more of Cluster 2, which may mean that inflammation is reduced and brain maturation delay comes up to the surface which might be the result of inflammation. Moreover, Cluster 2 center values at the posterior parts of the brain shift toward the mean values at these channels after 60 sessions. It means, Auto Train Brain training improves the posterior parts of the brain for children with dyslexia, which were the most relevant regions to be strengthened for dyslexia.Yayın ICamp - The educational web for higher education(Springer Verlag, 2006) Kieslinger, Barbara; Wild, Fridolin; Arsun, Onur İhsaniCamp is an EC-funded research project in the area of Technology Enhanced Learning (TEL) that aims to support collaboration and social networking across systems, countries and disciplines in higher education. The concept of an iCamp Space will build on existing interfaces and integrate shared community features. Interoperability amongst different open source learning systems and tools is the key to successful sustainability of iCamp. The content for this collaboration within social communities is provided via distributed networked repositories including, for example, content brokerage platforms, online libraries, and learning object databases. The innovative pedagogical model of iCamp is based on social constructivist learning theories. iCamp creates an environment for a new way of social networking in higher education that puts more emphasis on self-organised, self-directed learning, social networking and cross-cultural collaboration.Yayın A hybrid approach to private record matching(IEEE Computer Soc, 2012-10) İnan, Ali; Kantarcıoğlu, Murat; Ghinita, Gabriel; Bertino, ElisaReal-world entities are not always represented by the same set of features in different data sets. Therefore, matching records of the same real-world entity distributed across these data sets is a challenging task. If the data sets contain private information, the problem becomes even more difficult. Existing solutions to this problem generally follow two approaches: sanitization techniques and cryptographic techniques. We propose a hybrid technique that combines these two approaches and enables users to trade off between privacy, accuracy, and cost. Our main contribution is the use of a blocking phase that operates over sanitized data to filter out in a privacy-preserving manner pairs of records that do not satisfy the matching condition. We also provide a formal definition of privacy and prove that the participants of our protocols learn nothing other than their share of the result and what can be inferred from their share of the result, their input and sanitized views of the input data sets (which are considered public information). Our method incurs considerably lower costs than cryptographic techniques and yields significantly more accurate matching results compared to sanitization techniques, even when privacy requirements are high.Yayın Implicit theories and self-efficacy in an introductory programming course(Institute of Electrical and Electronics Engineers Inc, 2018-08) Tek, Faik Boray; Benli, Kristin Surpuhi; Deveci, EzgiContribution: This paper examined student effort and performance in an introductory programming course with respect to student-held implicit theories and self-efficacy. Background: Implicit theories and self-efficacy help in understanding academic success, which must be considered when developing effective learning strategies for programming.Research Questions: Are implicit theories of intelligence and programming, and programming-efficacy, related to each other and to student success in programming? Is it possible to predict student performance in a course using these constructs? Methodology: Two consecutive surveys ({N}=100 and {N}=81) were administered to non-CS engineering students in Işik University, Turkey. Findings: Implicit theories of programming-aptitude and programming-efficacy are interrelated and positively correlated with effort, performance, and previous failures in the course. Although it was not possible to predict student course grade the data confirms that students who believe in improvable programming aptitude have significantly higher programming efficacy, report more effort, and get higher course grades. In addition, failed students tend to associate the failure with fixed programming aptitude; repeating students favor fixed programming aptitude theory and have lower programming-efficacy, which increases the possibility of further failure.Yayın Unsupervised textile defect detection using convolutional neural networks(Elsevier Ltd, 2021-12) Koulali, Imane; Eskil, Mustafa TanerIn this study, we propose a novel motif-based approach for unsupervised textile anomaly detection that combines the benefits of traditional convolutional neural networks with those of an unsupervised learning paradigm. It consists of five main steps: preprocessing, automatic pattern period extraction, patch extraction, features selection and anomaly detection. This proposed approach uses a new dynamic and heuristic method for feature selection which avoids the drawbacks of initialization of the number of filters (neurons) and their weights, and those of the backpropagation mechanism such as the vanishing gradients, which are common practice in the state-of-the-art methods. The design and training of the network are performed in a dynamic and input domain-based manner and, thus, no ad-hoc configurations are required. Before building the model, only the number of layers and the stride are defined. We do not initialize the weights randomly nor do we define the filter size or number of filters as conventionally done in CNN-based approaches. This reduces effort and time spent on hyper-parameter initialization and fine-tuning. Only one defect-free sample is required for training and no further labeled data is needed. The trained network is then used to detect anomalies on defective fabric samples. We demonstrate the effectiveness of our approach on the Patterned Fabrics benchmark dataset. Our algorithm yields reliable and competitive results (on recall, precision, accuracy and f1-measure) compared to state-of-the-art unsupervised approaches, in less time, with efficient training in a single epoch and a lower computational cost.












