Browsing Bilgisayar Mühendisliği Bölümü by Access Type "info:eu-repo/semantics/embargoedAccess"
Now showing items 1-20 of 77
-
An Adaptive Feature Extraction Method for Classification of Covid-19 X-Ray Images
(Springer Science and Business Media Deutschland GmbH, 2022)This study aims to detect Covid-19 disease in the fastest and most accurate way from X-ray images by developing a new feature extraction method and deep learning model . Partitioned Tridiagonal Enhanced Multivariance ... -
Akıllı Nesneler İçin Fiziksel Saldırı Tespiti
(IEEE, 2018)Nesnelerin İnterneti akıllı Dünya vizyonuyla hayatın her alanında yeni ürün ve hizmetleriyle girmektedir. Geleneksel diğer bilinen cihazların aksine akıllı nesneler evde, işte veya sokakta hayatın içerisinde karşımıza ... -
Az Örnekli Öğrenme ile Mikroskobik Görüntülerden Maya Hücresi Segmentasyonu
(IEEE, 2021)Mikroskobik görüntülerden otomatik hücre segmentasyonu, derin sinir ağları veya görüntü işleme teknikleri kullanılarak yapılabilmektedir. Bu tekniklerin ayrı ayrı problemleri ve zorlukları bulunmakla birlikte özellikle ... -
BaDENAS: Retina Damar Segmentasyonu için Bayes Tabanlı Sinir Mimarisi Arama
(IEEE, 2023)Retinal damar segmentasyonu, retinal görüntülerin analizi için önemli bir görevdir ve göz hastalıklarının teşhisinde ve tedavisinde kullanılan etkili bir araçtır. Damar segmentasyonunu otomatik hale getiren U-Net gibi derin ... -
Beyin Tümörlerinin Görüntü İşleme Teknikleri Kullanılarak Bilgisayar Destekli Tespiti
(Institute of Electrical and Electronics Engineers (IEEE), 2015)Günümüz teknolojisinde bilgisayar destekli tespit uygulamaları tıp alanına büyük katkılar sa˘glamayı ba¸sarmı¸stır. Bu çalı¸smada, beyin manyetik rezonans görüntülerindeki tümörlerin tespiti gerçekle¸stirilmi¸stir. ... -
A Bi-criteria Hybrid Genetic Algorithm with Robustness Objective for the Course Timetabling Problem
(Elsevier, 2018)Traditional methods of generating timetables may yield high-quality solutions, but they may not yield robust solutions that may easily be adapted to changing inputs. Incorporating late changes by making minimum modifications ... -
A Bi-criteria Hybrid Genetic Algorithm with Robustness Objective for the Course Timetabling Problem
(Patat, 2016)Traditional methods of generating timetables may not yield robust solutions that may easily be adapted to changing inputs. Incorporating late changes by making minimum modifications is an important need in many ... -
Bi-criteria Simulated Annealing for the Curriculum-based Course Timetabling Problem With Robustness Approximation
(Springer, 2022)In the process of developing a university’s weekly course timetable, changes in the data, such as the available time periods of professors or rooms, render the timetable infeasible, requiring the administrators to repair ... -
Classification of Covid-19 X-ray Images Using Tridiagonal Matrix Enhanced Multivariance Products Representation (TMEMPR)
(Institute of Electrical and Electronics Engineers Inc., 2021)Medical images are crucial data sources for diseases that can not be diagnosed easily. X-rays, one of the medical images, have high resolution. Processing high-resolution images leads to a few problems such as difficulties ... -
Classification of Fruit Images as Fresh and Rotten Using Convolutional Neural Networks
(IEEE, 2023)Many fruits are produced all over the world, and the fruits produced are sent abroad and sold in a relatively short time in many countries. During the period between collection and sale, the fruits may undergo various types ... -
Classification of Lung Nodules Using Textural Features
(Institute of Electrical and Electronics Engineers (IEEE), 2019)In this study, a computer-aided detection system was developed for detection and investigation of lung nodules in computed tomography images using image processing techniques. The computer aided detection system consists ... -
Combinatorial Bees Algorithm for Vehicle Routing Problem
(Wiley, 2021)Vehicle routing problem (VRP) is a combinatorial optimization problem that has been studied intensively for years. Although VRP can be solved using an exact method for small instances, a more complex one will be impractical ... -
A Comparison of Different Loss Computations in Siamese Networks for Authorship Verification
(Springer, 2023)In this study, we consider the author verification problem as a binary classification problem where the aim is to identify whether the two inputs belong to the same author or not. For this task, we have used several ... -
Comparison of Dimension Reduction Techniques on High Dimensional Datasets
(Zarqa University, 2018)High dimensional data becomes very common with the rapid growth of data that has been stored in databases or other information areas. Thus clustering process became an urgent problem. The well-known clustering algorithms ... -
Computer Aided Brain Tumor Detection with Histogram Equalization and Morphological Image Processing Techniques
(Institute of Electrical and Electronics Engineers (IEEE), 2014)Computer-aided detection (CAD) systems help to radiology experts in mass detection using image processing techniques. This study aims to realize mass detection process on brain MRI (Magnetic Resonance Imaging) images. ... -
Computer-Aided Detection of Lung Nodules Using Outer Surface Features
(IOS Press, 2015)In this study, a computer-aided detection (CAD) system was developed for the detection of lung nodules in computed tomography images. The CAD system consists of four phases, including two-dimensional and three-dimension ... -
Çok Sınıflı Hücre Bölütleme için Derin Sinir Ağlarında Sınıf Ağırlıklı Cezalandırmanın Etkisi
(IEEE, 2024)Derin öğrenme ağları, birçok alanda başarılı sonuçlar vermekle birlikte karmaşıklıları sebebiyle aşırı uyum gibi problemlere sebep olmaktadır. Bu sorunu çözmek için birçok yaklaşım önerilmiş ve sınıf bazlı cezalandırma ... -
A Deep Learning Based Android Malware Detection System with Static Analysis
(Institute of Electrical and Electronics Engineers Inc., 2022)In recent years, smart mobile devices have become indispensable due to the availability of office applications, the Internet, game applications, vehicle guidance or similar most of our daily lives applications in addition ... -
Deep Learning based Malware Detection for Android Systems: A Comparative Analysis
(Sveuciliste Josipa Jurja Strossmayera u Osijeku, 2023)Nowadays, cyber attackers focus on Android, which is the most popular open-source operating system, as main target by applying some malicious software (malware) to access users' private information, control the device, ... -
Deep Learning With Class-Level Abstract Syntax Tree and Code Histories for Detecting Code Modification Requirements
(Elsevier, 2023)Improving code quality is one of the most significant issues in the software industry. Deep learning is an emerging area of research for detecting code smells and addressing refactoring requirements. The aim of this study ...