Arama Sonuçları
Listeleniyor 1 - 8 / 8
Yayın Spectral renormalization group for the Gaussian model and 𝜓4 theory on nonspatial networks(American Physical Society, 2015-08-06) Tuncer, Aslı; Erzan, AyşeWe implement the spectral renormalization group on different deterministic nonspatial networks without translational invariance. We calculate the thermodynamic critical exponents for the Gaussian model on the Cayley tree and the diamond lattice and find that they are functions of the spectral dimension, (d) over tilde. The results are shown to be consistent with those from exact summation and finite-size scaling approaches. At (d) over tilde = 2, the lower critical dimension for the Ising universality class, the Gaussian fixed point is stable with respect to a psi(4) perturbation up to second order. However, on generalized diamond lattices, non-Gaussian fixed points arise for 2 < <(d)over tilde> < 4.Yayın Neuropsychiatric outcomes and caregiver distress in primary progressive aphasia(Wiley, 2023-01) Seçkin, Mustafa; Yıldırım, Elif; Demir, İlayda; Orhun, Ömer; Bülbül, Ezgi; Velioğlu, H. Aziz; Öget, Öktem; Yeşilot, Nilüfer; Çoban, Oğuzhan; Gürvit, HakanBackground: In this study, we aimed to outline the neuropsychiatric consequences of primary progressive aphasia (PPA) and to understand how neuropsychiatric symptomatology affects distress in caregivers. Methods: The Neuropsychiatric Inventory (NPI) including the distress index (NPI-Distress) was used. Additional information about the caregiver burden was obtained using Zarit Burden Interview (ZBI). NPI, NPI-Distress, and ZBI data from 17 patients with a clinical diagnosis of PPA were compared with 10 stroke aphasia patients. Neuropsychiatric symptomatology was investigated based on three clusters; Mood, Frontal/Comportmental, and Psychotic/Disruptive. Additionally, the Activities of Daily Living Questionnaire (ADLQ) was used to outline the functional impairment. Twelve healthy controls were included to compare the neurocognitive test scores with PPA and stroke aphasia groups. Results: A greater number of neuropsychiatric symptoms were observed in the PPA group compared to the stroke aphasia group. The number of symptoms in Mood, and Frontal/Comportmental clusters were greater than the number of symptoms in Psychotic/Disruptive clusters in the PPA group, whereas no significant relationship between the number of symptoms and symptom clusters was found in the stroke aphasia group. In the PPA group, a strong correlation was found between the NPI-Frequency × Severity scores and the NPI-Distress scores. Moreover, the NPI-Distress scores in the PPA group strongly correlated with the ZBI scores. Scores for anxiety, irritability/lability, and apathy had a stronger correlation with the NPI-Distress scores compared to the other NPI symptoms. The Communication subscale was the most impaired domain in the PPA group. Travel, and Employment and Recreation subscales showed greater functional impairment in the stroke aphasia group compared to the PPA group. Conclusions: Neuropsychiatric symptoms in PPA in our study were more frequent than previously reported. Furthermore, the distress index of the NPI was not only correlated with the severity of the neuropsychiatric symptoms but also reflected the overall burden on the caregivers in the PPA group.Yayın Reciprocal relations between the trajectories of mothers’ harsh discipline, responsiveness and aggression in early childhood(Springer New York LLC, 2018-01-01) Akçinar Yayla, Berna; Baydar, NazlıTheoretical advances in the study of the development of aggressive behaviors indicate that parenting behaviors and child aggression mutually influence one another. This study contributes to the body of empirical research in this area by examining the development of child aggression, maternal responsiveness, and maternal harsh discipline, using 5-year longitudinal data from a nationally representative sample of Turkish children (n = 1009; 469 girls and 582 boys). Results indicated that: (i) maternal responsiveness and harsh discipline at age 3 were associated with the subsequent linear trajectory of aggression; (ii) reciprocally, aggressive behaviors at age 3 were associated with the subsequent linear trajectories of these two types of parenting behaviors; (iii) deviations from the linear trajectories of the child and mother behaviors tended to be short lived; and, (iv) the deviations of child behaviors from the linear trajectories were associated with the subsequent changes in mother behaviors after age 5. These findings are discussed in the cultural context of this study.Yayın VC-dimension of univariate decision trees(IEEE-INST Electrical Electronics Engineers Inc, 2015-02-25) Yıldız, Olcay TanerIn this paper, we give and prove the lower bounds of the Vapnik-Chervonenkis (VC)-dimension of the univariate decision tree hypothesis class. The VC-dimension of the univariate decision tree depends on the VC-dimension values of its subtrees and the number of inputs. Via a search algorithm that calculates the VC-dimension of univariate decision trees exhaustively, we show that our VC-dimension bounds are tight for simple trees. To verify that the VC-dimension bounds are useful, we also use them to get VC-generalization bounds for complexity control using structural risk minimization in decision trees, i.e., pruning. Our simulation results show that structural risk minimization pruning using the VC-dimension bounds finds trees that are more accurate as those pruned using cross validation.Yayın A novel biometric authentication approach using electrocardiogram signals(IEEE, 2013) Gürkan, Hakan; Güz, Ümit; Yarman, Bekir Sıddık BinboğaIn this work, we present a novel biometric authentication approach based on combination of AC/DCT features, MFCC features, and QRS beat information of the ECG signals. The proposed approach is tested on a subset of 30 subjects selected from the PTB database. This subset consists of 13 healthy and 17 non-healthy subjects who have two ECG records. The proposed biometric authentication approach achieves average frame recognition rate of %97.31 on the selected subset. Our experimental results imply that the frame recognition rate of the proposed authentication approach is better than that of ACDCT and MFCC based biometric authentication systems, individually.Yayın Strategies for the evolution of sex(American Physical Soc, One Physics Ellipse, 2001-12) Tüzel, Erkan; Sevim, Volkan; Erzan, AyşeWe find that the hypothesis made by Jan, Stauffer, and Moseley [Theory Biosci. 119, 166 (2000)] for the evolution of sex, namely, a strategy devised to escape extinction due to too many deleterious mutations, is sufficient but not necessary for the successful evolution of a steady state population of sexual individuals within a finite population. Simply allowing for a finite probability for conversion to sex in each generation also gives rise to a stable sexual population, in the presence of an upper limit on the number of deleterious mutations per individual. For large values of this probability, we find a phase transition to an intermittent, multistable regime. On the other hand, in the limit of extremely slow drive. another transition takes place to a different steady state distribution. with fewer deleterious mutations within the population.Yayın Efficient privacy-aware record integration(2013) Kuzu, Mehmet; Kantarcıoğlu, Murat; İnan, Ali; Bertino, Elisa; Durham, Elizabeth Ashley; Malin, Bradley A.The integration of information dispersed among multiple repositories is a crucial step for accurate data analysis in various domains. In support of this goal, it is critical to devise procedures for identifying similar records across distinct data sources. At the same time, to adhere to privacy regulations and policies, such procedures should protect the confidentiality of the individuals to whom the information corresponds. Various private record linkage (PRL) protocols have been proposed to achieve this goal, involving secure multi-party computation (SMC) and similarity preserving data transformation techniques. SMC methods provide secure and accurate solutions to the PRL problem, but are prohibitively expensive in practice, mainly due to excessive computational requirements. Data transformation techniques offer more practical solutions, but incur the cost of information leakage and false matches. In this paper, we introduce a novel model for practical PRL, which 1) affords controlled and limited information leakage, 2) avoids false matches resulting from data transformation. Initially, we partition the data sources into blocks to eliminate comparisons for records that are unlikely to match. Then, to identify matches, we apply an efficient SMC technique between the candidate record pairs. To enable efficiency and privacy, our model leaks a controlled amount of obfuscated data prior to the secure computations. Applied obfuscation relies on differential privacy which provides strong privacy guarantees against adversaries with arbitrary background knowledge. In addition, we illustrate the practical nature of our approach through an empirical analysis with data derived from public voter records.Yayın Compression of the CT images using classified energy and pattern blocks(IEEE, 2013) Gökbay, İnci Zaim; Gezer, Murat; Güz, Ümit; Gürkan, Hakan; Yarman, Bekir Sıddık BinboğaIn this work, a new biomedical image compression method is proposed based on the classified energy and pattern blocks (CEPB). CEPB based compression method is specifically applied on the Computed Tomography (CT) images and the evaluation results are presented. Essentially, the CEPB is uniquely designed and structured codebook which is located on the both the transmitter and receiver part of a communication system in order to implement encoding and decoding processes. The encoding parameters are block scaling coefficient (BSC) and the index numbers of energy (IE) and pattern blocks (IP) determined for each block of the input images based on the CEPB. The evaluation results show that the newly proposed method provides considerable image compression ratios and image quality.












