WoS İndeksli Yayınlar / WoS Indexed Publications
Permanent URI for this collectionhttps://hdl.handle.net/11413/6359
Browse
Browsing WoS İndeksli Yayınlar / WoS Indexed Publications by Type "conferenceObject"
Now showing 1 - 20 of 66
- Results Per Page
- Sort Options
Publication A Comparative Study to Determine the Effective Window Size of Turkish Word Sense Disambiguation Systems(Springer, 233 Spring Street, New York, Ny 10013, United States, 2013) Adalı, Eşref; Tantuğ, Ahmet Cüneyd; İLGEN, BAHAR; 141812; 8786; 21833In this paper, the effect of different windowing schemes on word sense disambiguation accuracy is presented. Turkish Lexical SampleDataset has been used in the experiments. We took the samples of ambiguous verbs and nouns of the dataset and used bag-of-word properties as context information. The experi-ments have been repeated for different window sizes based on several machine learning algorithms. We follow 2/3 splitting strategy (2/3 for training, 1/3 for test-ing) and determine the most frequently used words in the training part. After re-moving stop words, we repeated the experiments by using most frequent 100, 75, 50 and 25 content words of the training data. Our findings show that the usage of most frequent 75 words as features improves the accuracy in results for Turkish verbs. Similar results have been obtained for Turkish nouns when we use the most frequent 100 words of the training set. Considering this information, selected al-gorithms have been tested on varying window sizes {30, 15, 10 and 5}. Our find-ings show that Naive Bayes and Functional Tree methods yielded better accuracy results. And the window size +/-5 gives the best average results both for noun and the verb groups. It is observed that the best results of the two groups are 65.8 and 56% points above the most frequent sense baseline of the verb and noun groups respectively.Publication A method to analyze the living spaces of wheelchair users using IFC(Elsevier Science Bv, Sara Burgerhartstraat 25, Po Box 211, 1000 AE Amsterdam, Netherlands, 2016) TÜRKYILMAZ, EMRAH; 113480Full physical adequacy for individuals is a temporary condition. Everyone has some limitations on the part of his life. Disabled people have some special needs. However, design for disabled are still made generic. The conventional methods are used to control the design and results are not satisfactory. BIM (Building Information Modeling) is such a good option to control the design. In this study, a method that analyzes the living spaces by using BIM model was developed. While using proposed model, it is possible to define all incompatibilities properly and use them as design feedback to create effective living spaces for wheelchair users. (C) 2016 The Authors. Published by Elsevier Ltd.Publication A proposal for the definition of housing with EXPRESS(2019-07) Bayer, Semih; TÜRKYILMAZ, EMRAHThis article describes how to use the EXPRESS language for the definition of an architectural product. To make this definition, EXPRESS language and ISO 10303 standards examined. A housing project in the BIM environment described as an example by EXPRESS. The results show that it is possible to make the desired calculations about the house with EXPRESS. The definition made with a project that is still in the design phase can determine whether the project provides the desired spatial conditions by making any calculations. Thus, quality and cost-effective projects can obtain.Publication A Survey on White Box Cryptography Model for Mobile Payment Systems(2017-12-28) Aydın, Muhammed Ali; Sertbaş, Ahmet; ŞENGEL, ÖZNUR; 144004; 176402; 2283The technology is showing rapid development and these developments are changing our lives, our habits, and our needs. As electronic devices, which are indispensable for our daily lives, continue to be intelligent, we are able to do our every operation through these devices. Mobile payment technologies and services are one of the innovations. Consumers all over the world and in our country have started to use their mobile devices as a means of payment as well as communication services. With rapidly developing technology, one of the most important needs of many systems such as electronic, mobile and bank is to move and store the data safely. In addition to data security in electronic transactions, the speed of the system operations is becoming very important. Developing a mobile payment system whether by installing an application or using existing hardware, the most important issue in both cases is the creation of a reliable system based on the protection of the current situation of the consumer and the confidentiality of their information.Publication A Wearable Device for Virtual Cyber Therapy of Phantom Limb Pain(2018-09) Tarakçı, Ela; Aydın, Muhammed; Zaim, Abdul Halim; AKBULUT, AKHAN; AŞCI, GÜVEN; 285689; 116056; 101760; 176402; 8693Phantom limb pain (PLP) is the condition most often occurs in people who have had a limb amputated and it is may affect their life severely. When the brain sends movement signals to the phantom limb, it returns and causes a pain. Many medical approaches aim to treat the PLP, however the mirror therapy still considered as the base therapy method. The aim of this research is to develop a wearable device that measures the EMG signals from PLP patients to classify movements on the amputated limb. These signals can be used in virtual reality and augmented reality environments to realize the movements in order to reduce pain. A data set was generated with measurements taken from 8 different subjects and the classification accuracy achieved as 90% with Neural Networks method that can be used in cyber therapies.This type of therapy provides strong visuals which make the patient feel he/she really have the limb. The patient will have great therapy session time with comparison to the other classical therapy methods that can be used in home environments.Publication An Arduino UNO application: GPS guided unmanned ground vehicle(IEEE, 345 E 47Th St, New York, Ny 10017 USA, 2017) Bozik, Tugay; GÜRKAN, GÜRAY; 113297This paper presents an application of Arduino UNO to GPS guided unmanned vehicle. The four-wheeled small scale (55 cm x 25 cm) vehicle is capable of moving forward, rotating and consists of a GPS sensor, a magnetometer, a motor driver and four DC motors. The target coordinates (key points) are manually entered as a part of the control algorithm script (.ino file). The developed control algorithm makes a blind calculation of the distance and required rotation between consecutive key points. The initial coordinates of the vehicle, however, requires the only field-dependent calculation of the distance and target heading between the initial and the first key point. The whole target route is achieved by consecutive "rotation" and "forward movements (straight path)" between key points. The GPS sensor is used to determine the initial coordinates whereas magnetometer is used to determine the heading (and rotation) before (and during) each key point movement. When taxiing through blind-calculated route, the acquired GPS data is transmitted via Bluetooth for offline monitoring.Publication An Analytical Approach to Machine Layout Design at a High-Pressure Die Casting Manufacturer(Springer-Verlag Singapore Pte Ltd., 2022) EMİR, OĞUZ; AKTİN, AYŞE TÜLİNSahin Metal was founded in 1975 on a 7500 m(2) area in.Istanbul to supply high-pressure aluminum casting parts to a variety of industries, especially automotive manufacturers. 64 different products are produced with various routings through 14 workstations in the plant. Being a Tier 2 company, these products are then sent to Tier 1 firms and finally reach the leading vehicle manufacturers. Nowadays, increasing competition, changing customer demands, and quality targets bring the necessity of restructuring internal processes. In this regard, Sahin Metal plans to rearrange the existing machine layout to minimize the distance traveled between departments by taking into account the material flow. This study aims to determine an efficient machine layout design by implementing analytical approaches. The study is started by visiting the production facility and meeting with the company's engineers to determine the project roadmap. Following that, the data collection process is initiated, and ABC analysis is performed to define product classes. After this identification, two approaches are utilized simultaneously. The Hollier method is employed to find a logical machine arrangement. In addition, a mathematical model based on the Quadratic Assignment Problem (QAP) is developed to obtain the optimum machine layout. The developed integer nonlinear model is solved by CONOPT using GAMS software under various scenarios. Finally, these results are compared with the existing system, and a convenient layout design is proposed to the company.Publication B-Spline Solution and the Chaotic Dynamics of Troesch's Problem(Polish Acad Sciences Inst Physics, Al Lotnikow 32-46, Pl-02-668 Warsaw, Poland, 2014-02) Çağlar, Süleyman Hikmet; Çağlar, Hatice Nazan; Özer, Mehmet; 114368; 110809; 2509A B-spline method is presented for solving the Troesch problem. The numerical approximations to the solution are calculated and then their behavior is studied and commenced. The chaotic dynamics exhibited by the solutions of Troesch's problem as they were derived by the decomposition method approximation are examined and an approximate critical value for the parameter lambda is introduced also in this study. For the parameter value slightly less than lambda approximate to 2.2, the solutions begin to show successive bifurcations, finally entering chaotic regimes at higher lambda values. The effectiveness and accuracy of the B-spline method is verified for different values of the parameter, below its critical value, where the first bifurcation occurs.Publication B-Spline Solution for a Convection-Diffusion Equation(Polish Acad Sciences Inst Physics, Al Lotnikow 32-46, Pl-02-668 Warsaw, Poland, 2014-02) Çağlar, Süleyman Hikmet; Çağlar, Hatice Nazan; Özer, Mehmet; 114368; 110809; 2509This paper is concerned with the numerical solution of the convection diffusion problems. A family of B-spline methods has been considered for the numerical solution of the problems. The results showed that the present method is an applicable technique and approximates the exact solution.Publication Capacity Loss Analysis Using Machine Learning Regression Algorithms(IEEE, 2022) Atay, Sergen; AYRANCI, AHMET AYTUĞ; Erkmen, BurcuIn this study, time dependent measurements of the power capacitor, which is the main equipment of a compensation unit, are given. The power capacitor is actively working in an industrial facility. Six months of the data from this capacitor were recorded and tests were carried out using Machine Learning (ML) algorithms for its remaining useful life. ML algorithms were selected from the algorithms that used for regression problems. In the study, Support Vector Machine (SVM), Linear Regression (LR) and Regression Trees (RT) algorithms were used. The rated powers of the analyzed capacitor are 50kVAR and 25kVAR from the active plant. The data set was created by running the capacitor continuously for 6 months and the capacity loss was examined with using ML algorithms. The algorithm that gives the best result in the regression analyzes is the LR algorithm. With the results obtained, it is possible to analyze how long the useful life of capacitors with the same characteristics have under the same stress.Publication Conformational Landscape and Polymorphism in 5-Acetic Acid Hydantoin(2017) Nogueira, Bernardo, A.; Canotilho, Joa; M E S Eusebio, M. E. S.; Henriques, M. S. C.; Paixao, Antonia; Rui, Fausto; ILDIZ, GÜLCE ÖĞRÜÇ; 107326Publication Copying urban identity and pasting it on residential architecture: 'themes' for gated settlements in Istanbul(Yıldız Technical Univ, Fac Architecture, Merkez Yerlesim, Besiktas, İstanbul, 34349, Turkey, 2015) Garip, Saniye Banu; Garip, Ervin; 106178; 162379The aim of the present study was to discuss an emerging trend in Istanbul housing - a trend of essentially copying urban identity and pasting it on housing- in an effort to test the reaction of potential users to these environments. The present study includes research regarding a possible divergence in opinion of these environments among laypeople and experts in the field of architecture. Sample sites selected were themed "San Marco Square, Venice" and "Bosphorus, Istanbul." It was hypothesized that a difference in opinion would be present among groups regarding the description of and preferences for visual attributes of the sample sites. Twenty architects and 20 non-architects were asked to describe the selected buildings. A "Visual Evaluation Test" featuring images of the buildings was included in the questionnaire. Significant differences in opinion were present among the groups of respondents. Architects generally held a negative view of the sites, focusing primarily on design and context. Non-architects evaluated the visual attributes positively, focusing primarily on "function-units" and quality. They were uninterested in Venice or the Bosphorus as housing concepts, but were largely impressed by the newness of the sites, their social and recreational facilities, and their planned organization, features consumers are deprived of within the city center.Publication Cyberbullying: A new kind of peer bullying through online technology and its relationship with aggression and social anxiety(Elsevier Science Bv, Sara Burgerhartstraat 25, Po Box 211, 1000 Ae Amsterdam, Netherlands, 2014) İçellioğlu, Serra; YILDIRIM, MELİS SERAY ÖZDEN; 107162; 107268Cyberbullying is becoming a crucial problem that has been arised with increased use of internet and other technological devices. According to recent research in Turkiye %56 of 1470 internet users with avarege age 23, has indicated they become victims of cyberbullying at least once in their lifetime. The results have shown that the issue of cyberbullying should be considered as a problem that should be investigated. In this study, cyberbullying scale had been given to the university students aged between 18-29. Also, Spielberger's Trait Anger&Anger Styles Scale and Liebowitz Social Anxiety Scale had been given to examine the relationship between cyberbullying and aggression and social anxiety. Social anxiety and avoidance scores were significantly different between genders. The correlations between 10 indexes of cyberbullying behaviors and social anxiety scores together with anger (trait anger, anger-in, anger-out and anger control) scores were analyzed. Correlations were found between sending rude, vulgar or threating messages and anger-in scores, creating fake profile or web page statement and social anxiety, social avoidance, trait-anger and anger-out scores respectively, publishing photographs or videos of someone without consent and anger-in scores, sending online request for sexual relation statement and anger-out and anger control scores, hacking someone's web profile statement and anger-out and anger control scores, publishing fake statues or check-in notifications and anger-in and anger-out scores. (C) 2013 The Authors. Published by Elsevier Ltd.Publication Decision making and skin resistance as a somatic marker in mesial temporal lobe epilepsy(2015) Korkmaz, Bektaş; Kurdish, Selin; ŞANDOR, SERRA; 107162; 3000Publication Deep Learning Based Document Modeling for Personality Detection from Turkish Texts(2019-10-24) İLGEN, BAHAR; 141812The usage of social media is increasing exponentially since it has been the easiest and fastest way to share information between people or organizations. As a result of this broad usage and activity of people on social networks, considerable amount of data is generated continuously. The availability of user generated data makes it possible to analyze personality of people. Personality is the most distinctive feature for an individual. The results of these analyses can be utilized in several ways. They provide support for human resources recruitment units to consider suitable candidates. Similar products and services can be offered to people who share the similar personality characteristics. Personality traits help in diagnosis of certain mental illnesses. It is also helpful in forensics to use personality traits on suspects to clarify the forensic case. With the rapid dissemination of online documents in many different languages, the classification of these documents has become an important requirement. Machine Learning (ML) and Natural Language Processing (NLP) methods are used to classify these digitized data. In this study, current ML techniques and methodologies have been used to classify text documents and analyze person characteristics from these datasets. As a result of classification, detailed information about the personality traits of the writer could be obtained. It was understood that the frequency-based analysis and the use of the emotional words at the word level are very important in the textual personality analysis.Publication Deep Learning in Intrusion Detection Systems(2018) Demir, Önder; BAYDOĞMUŞ, GÖZDE KARATAŞ; ŞAHİNGÖZ, ÖZGÜR KORAY; 110942; 170651; 214903Publication Detection of Phishing Websites from URLs by using Classification Techniques on WEKA(IEEE, 2021) GEYİK, BÜŞRA; ERENSOY, KÜBRA; Koçyiğit, EmreThe Internet is getting stronger day by day and it makes our lives easier with many applications that are executed on cyberworld. However, with the development of the internet, cyber-attacks have increased gradually and identity thefts have emerged. It is a type of fraud committed by intruders by using fake web pages to access people's private information such as userid, password, credit card number and bank account numbers, etc. These scammers can also send e-mail from many important institutions and organizations by using phishing attacks which imitate these web pages and acts as if they are original. Traditional security mechanisms can not prevent these attacks because they directly target the weakest part of connection : end-users. Machine learning technology has been used to detect and prevent this type of intrusions. The anti-phishing method has been developed by detecting the attacks made with the technologies used. In this paper, we combined the websites used by phishing attacks into a dataset, then we obtained some results using 4 classification algorithms with this dataset. The experimental results showed that the proposed systems give very good accuracy levels for the detection of these attacks.Publication Differences in Proline Accumulation and Gene Expression Profiles of Salt-Tolerant Soybean Mutants(Springer, 233 Spring Street, New York, Ny 10013, United States, 2012-08) Ünsal, Selin Gül; ÇELİK, ÖZGE; 113987Publication Digital Data Forgetting: A Machine Learning Approach(2018-10) Aşıroğlu, Batuhan; Yıldız, Eyyüp; Zencirli, Ahmet; Ensari, Tolga; Nalçakan, Yağız; GÜNAY, MELİKE; METE, BÜŞRA RÜMEYSA; 283334; 286270; 261185; 176400; 270484Digital transformation of the world goes very fast during last two decades. Today, data is power and very important. Firstly, magnetic tapes and then digital data storages have been used to collect all data. After this process, big data and its tool machine learning became very popular in both literature and industry. People use machine learning in order to obtain meaningful information from the big data. It brings valuable planning results. However, nowadays it is quite hard to collect and store all digital data to computers. This process is expensive and we will not have enough space to store data in the future. Therefore, we need and propose "Digital Data Forgetting" phrase with machine learning approach. With this digital / software solution, we will have more valuable data and will be able to erase the rest of the them. We called this operation "Big Cleaning". In this article, we use data set to get and extract more valuable data with principal component analysis (PCA), deep autoencoder and k-nearest neighbor machine learning methods in the experimental analysis section.Publication The Effect of Seed Value Choice in an Incomplete Fuzzy Preference Relations Guided by Social Influence(Springer International Publishing, 2022) ÇİÇEKLİ, SEVRA; Gürbüz, TuncayNowadays, there is an enormous increase in alternatives almost in every area with the development of technology. Thus, it has become harder for a single decision maker (DM) to completely evaluate each alternative for a problem on hand. In group decision making (GDM) problems, each DM has a different effect on the final decision because of their background. Also, it has been observed that DM's judgments are affected by those of other DMs in the group. This is defined as social influence (SI). Social Influence Network (SIN) is useful especially when there is incomplete preference information. In this paper, a proposed model has been used to demonstrate the effect of seed value choice in completion process of missing fuzzy information given by DMs.