The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Massive Open Online Courses (MOOCs) have attracted millions of people who are geographically dispersed. MOOCs are mainly authored in English. However, a big proportion of the participants speaks English as a foreign language. There are studies reporting that some participants struggle with understanding the language in the video lectures and are reluctant to communicate with other fellow learners...
The choice of supplier in the supply chain network is a very important and quick issue for decision makers. When we work in line with these requirements, a multi-criteria decision support system focusing on supplier importance and ordering is being established. The fuzzy analytical hierarchy process (AHP) and fuzzy DEMATEL methods are used in the decision support system. With Fuzzy DEMATEL (Decision-Making...
Identifying structure of genes in Human genomes highly depends upon accurate recognition of boundaries between exons and introns, i.e. splice sites. Hence, development of new methods for effective detection of splice sites is essential. DNA encoding approaches are used for feature extraction from gene sequences, while machine learning methods are used for classification of splice sites using those...
Since breast cancer is a common disease in society all over the world, early diagnosis is of vital importance in order to treat patients before it reaches an irreversible phase. Expert systems are being developed to make it easier to diagnose the disease. In this study, an ensemble of neural networks named radial basis function network (RBFN), generalized regression neural network (GRNN) and feed...
In this empirical study we develop forecasting models for electricity demand using publicly available data and three models based on machine learning algorithms. It compares accuracy of these models using different evaluation metrics. The data consist of several measurements and observations related to the electricity market in Turkey from 2011 to 2016. It is available in different time granularities...
Central examinations are one of the measurement and evaluation tools used throughout the world to select from among the participants, to rank, to reduce the number of candidates before the interview or determine whether the level of education varies between regional and demographic criteria. A more objective measurement and evaluation can be made through the questioning of multiple choice questions...
In optimization problems, Genetic Algorithms are one of the most commonly used methods to search optimum points of a given function. These algorithms stochastically select the individual that is close to the optimum point in the population. By choosing appropriate individual in each iteration, it is desired to find the best individual step by step, or converge to the best individual. Therefore, it...
Nowadays, Virtual Reality (VR) and Augmented Reality (AR) offer new and extend existing customer experience in web and mobile environment. VR has been practiced a good start with game applications. By increasing interaction with user or equipment motion, applications have been strongly continuing to produce and reach more user experience target. In this paper, we would like to announce and introduce...
With the progress of technology and widespread use of internet, the data has become digital. It is getting easier day by day to copy, modify and transform digital data / applications into another form. The term of digital rights management (DRM) has been suggested to limit the use of data in digital media and to protect copyrights. Different architectures / technologies are used to provide DRM. In...
Today, with the development of technology, communication tools like computers, phones, tablets and etc. use the http as default protocol. The fact that large data stream transactions are over the http protocol has caused this protocol to become a target for attackers. It is important to analyse HTTP traffic for attack prevention systems and to detect attack attempts. Signature based, anomaly based...
With the technology improvements, managing a large amount of multimedia objects such as audio, video, picture or a combination of these has become possible. Multimedia data needs more real time storage and high data transfer than traditional textual and numeric data. In addition to these requirements, significant amount of computation is demanded for multimedia applications to serve many users at...
Software engineering principles require that software should comply with particular design rules. However, expressing design rules in a developer friendly manner is an open problem. Besides, these rules are easily broken during development. As a result, design flaws usually occur in software products. In this paper, an approach is proposed to define design rules and to provide compliance between source...
The high reliance on the Internet observed recently makes the quests of mobile networks capacity demand and reliability crucial in mobile networks design and management. The next generation mobile networks is anticipated to address the problem of increasing capacity demand by employing various techniques such as Massive MIMO, Heterogeneous Networks (HetNets), and millimeter wave (mm-Wave). Nevertheless,...
Internet of Things (IoT) refers to interconnectivity of different devices and services through applications, sensors and industrial equipments. A fundamental aspect of this interconnectivity is the transfer of the data from providers to requestors via a data transportation channel. However, the many-to-many relationship between the requestors and providers makes communication management difficult...
In recent years, automatic detection of on-shelf products has become an industrial need along with the technological improvements in the field of computer vision. In this respect, localization of on-shelf products and detection of the brands of these products have evolved into two main objectives. In this work, a hidden Markov model, which is commonly used in signal processing for post-processing...
Identifying the sense of a word within a context is a challenging problem and has many applications in natural language processing. This assignment problem is called word sense disambiguation (WSD). Many papers in the literature focus on English language and data. Our dataset consists of 1400 sentences translated to Turkish from the Penn Treebank Corpus. This paper seeks to address and discuss 6 different...
As the number and variety of cyber threats increase, it becomes more critical to share intelligence information in a fast and efficient manner. However, current cyber threat intelligence data do not contain sufficient information about how to specify countermeasures or how institutions should apply countermeasures automatically on their networks. A flexible and agile network architecture is required...
The prediction of power outputs generated from photovoltaic (PV) systems at different times is necessary for reliable and economical use of solar panels. The prediction of the power output is also very important in terms of factors such as installation of solar panels, guidance of electricity companies, energy management and distribution. In this study, we propose an Artificial Neural Network (ANN)...
In this study, we developed a mobile application that provides scatternet network setup using Bluetooth interface on smart phones running Android Operating System to meet the communication needs of people in real-life scenarios where there is no central access point, the Internet or physical infrastructure in the environment. The messages transmitted on the network are transmitted peer to peer in...
Android is an open source operating system which is becoming increasingly popular in embedded systems that are used both in consumer electronics and industrial environments. In order to be able to respond to both user and manufacturer requests, Android have a very flexible and complex structure. This is especially the cause of the prolongation of the boot time. In general, an Android device takes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.