Güncel Gönderiler: Bilgisayar Mühendisliği Bölümü Koleksiyonu
Toplam kayıt 103, listelenen: 81-100
-
A suffix based part-of-speech tagger for Turkish
(Ieee Computer Soc, 2008)In this paper, we present a stochastic part-of-speech tagger for Turkish. The tagger is primarily developed for information retrieval purposes, but it can as well serve as a light-weight PoS tagger for other purposes. The ... -
Recreating a Large-Scale BGP Incident in a Realistic Environment
(Springer, 2013)The Internet has become a critical asset for both the economy and the society. Realistic experimentation environments are needed to study and improve the resilience and the stability of the Internet. In this paper, we ... -
In silico analysis of autoimmune diseases and genetic relationships to vaccination against infectious diseases
(Bmc, 2014)Background: Near universal administration of vaccines mandates intense pharmacovigilance for vaccine safety and a stringently low tolerance for adverse events. Reports of autoimmune diseases (AID) following vaccination ... -
UniRef clusters: a comprehensive and scalable alternative for improving sequence similarity searches
(Oxford Univ Press, 2015)Motivation: UniRef databases provide full-scale clustering of UniProtKB sequences and are utilized for a broad range of applications, particularly similarity-based functional annotation. Non-redundancy and intra-cluster ... -
Using latent semantic analysis for automated keyword extraction from large document corpora
(Tubitak Scientific & Technical Research Council Turkey, 2017)In this study, we describe a keyword extraction technique that uses latent semantic analysis (LSA) to identify semantically important single topic words or keywords. We compare our method against two other automated keyword ... -
Religion and the Construction of Ethnic Identity in Kyrgyzstan
(Slavica Publishers, 2017)With the introduction of new definitions of religion and religious actors, defining the relationship of Islam to national identity has been essential for the post-Soviet Central Asian states. This work, based on qualitative ... -
An Augmented Reality Application for Smart Campus Urbanization: MSKU Campus Prototype
(Ieee, 2017)Augmented Reality applications are used in almost every area of our lives. These applications have been started to use in the town planning and smart city applications. In this study, a prototype application was developed ... -
A Web Technology Based Smart hmergency Room System Recommendation: SmartER
(Ieee, 2017)This study aims to design a web technology based Emergency System (SmartER) system, which will enable the doctors and nurses to perform the patient related procedures more quickly and smoothly in the emergency departments. ... -
ABRF Proteome Informatics Research Group (iPRG) 2015 Study: Detection of Differentially Abundant Proteins in Label-Free Quantitative LC-MS/MS Experiments
(Amer Chemical Soc, 2017)Detection of differentially abundant proteins in label-free quantitative shotgun liquid chromatography tandem mass spectrometry (LC-MS/MS) experiments requires a series of computational steps that identify and quantify ... -
Augmented Reality Application for Smart Tourism: GokovAR
(Ieee, 2018)Usage of augmented reality technology in daily life is becoming more widespread. This technology is also being applied in the field of tourism. In this study, a prototype of mobile application for smart tourism has been ... -
Detecting Citizen Problems and Their Locations Using Twitter Data
(Ieee, 2018)Twitter is a social network, which contains information of the city events (concerts, festival, etc.), city problems (traffic, collision, and road incident), the news, feelings of people, etc. For these reasons, there are ... -
Web Application Attack Detection and Forensics: A Survey
(Ieee, 2018)Web application attacks are an increasingly important area in information security and digital forensics. It has been observed that attackers are developing the capability to bypass security controls and launch a large ... -
Blockchain Based Secure Communication Application Proposal: Cryptouch
(Ieee, 2018)The convergence which brought with the globalizing world, highly affects the network and the communication sectors. Mostly closed source and centralized systems are used for network and communication. This contradicts with ... -
Real-Time Object Detection Application for Visually Impaired People: Third Eye
(Ieee, 2018)Visually impaired people can't move safely outdoors because they can not perceive the outside obstacles as normal people. The prototype application in this study aims to make the visually impaired people's lives easier ... -
A computational morphological lexicon for Turkish: TrLex
(Elsevier Science Bv, 2018)A morphological lexicon that is a computational source should be considered together with derivational morphology especially for agglutinative languages. To the best of our knowledge, in the Turkish language there has been ... -
On constituent chunking for Turkish
(Elsevier Sci Ltd, 2018)Chunking is a task which divides a sentence into non-recursive structures. The primary aim is to specify chunk boundaries and classes. Although chunking generally refers to simple chunks, it is possible to customize the ... -
Blockchain Based Metering and Billing System Proposal with Privacy Protection for the Electric Network
(Ieee, 2019)Measurement of energy especially electricity consumption becomes an issue in big cities. Electricity usage monitoring is becoming more crucial and there is a need for the instant view of active energy usage. Solutions like ... -
DASH-QoS: A scalable network layer service differentiation architecture for DASH over SDN
(Elsevier, 2019)As one of the key technologies residing in the future Internet concepts, Software Defined Networking (SDN) makes it possible to develop application-centric flow routing strategies. Thanks to the benefits offered by the SDN ... -
A selective approach to index term weighting for robust information retrieval based on the frequency distributions of query terms
(Springer, 2019)A typical information retrieval (IR) system applies a single retrieval strategy to every information need of users. However, the results of the past IR experiments show that a particular retrieval strategy is in general ... -
Comparison of protein expression profile of limb regeneration between neotenic and metamorphic axolotl
(Academic Press Inc Elsevier Science, 2020)The axolotl (Ambystoma mexicanum) salamander, a urodele amphibian, has an exceptional regenerative capacity to fully restore an amputated limb throughout the life-long lasting neoteny. By contrast, when axolotls are ...