The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this study, we apply machine learning algorithms to predict technical failures that can be encountered in Oracle databases and related services. In order to train machine learning algorithms, data from log files are collected hourly from Oracle database systems and labeled with two classes; normal or abnormal. We use several data science approaches to preprocess and transform the input data from...
Using fuzzy neighborhood relations in density-based clustering, like in Fuzzy Joint Points (FJP) algorithm, yields more robust and autonomous algorithms. Even though the fuzzy neighborhood based clustering methods are proven to be fast enough, such that tens of thousands of data can be handled under a second, the space complexity is still a limiting factor. In this study, a transformed FJP algorithm...
In this work, An automatic recognition system designed to be used while travelling in a coutry whose language is not known to the traveler. The system reads the traffic sign boards by using a camera. Then software of the system gives the meanings of the signs in known language in the computer screen attached to the car dash. OCR system in fact takes the information for the camera as an image. Then,...
Wireless communication technology is spreading rapidly to all areas of our lives. The technology, which has a wide range of applications from radios, intelligent home systems, automation applications to GPS units, was used in monitoring the workers working in mines in this study. Most of the mining area underground mining is risky and the possibility of accident (gas jams, the explosion and dents,...
With the widespread use of internet in the age of information, there has been a continuous growth of social networking which enables people to share breaking news and document personal ideas. Such a significant stream of data enables scientist to conduct research that provides an insight into online social discussions. Aim of this study is to investigate the possibility of summarizing and prioritizing...
Sleep staging is one of the important areas which is used to diagnose several diseases. People try to obtain models to carry out this operation without human interaction due to the time-consuming and complex nature of classification process. Most of the prior studies use concatenation of the extracted features from the electroencephalography (EEG) signals to obtain a single classifier. However, concatenating...
Nowadays, cyber attacks affect many institutions and individuals, and they result in a serious financial loss for them. Phishing Attack is one of the most common types of cyber attacks which is aimed at exploiting people's weaknesses to obtain confidential information about them. This type of cyber attack threats almost all internet users and institutions. To reduce the financial loss caused by this...
Gender recognition from facial images has become one of challenging research problem in computer vision, security, verbal-nonverbal communication and human computer interaction applications nowadays. Because facial images include many information such as gender, facial expressions, age, ethnic origin in computer-aided applications, the success rate of the gender recognition depends on quality of facial...
Clustering is an important unsupervised data analysis technique, which divides data objects into clusters based on similarity. Clustering has been studied and applied in many different fields, including pattern recognition, data mining, decision science and statistics. Clustering algorithms can be mainly classified as hierarchical and partitional clustering approaches. Partitioning around medoids...
The increased use of the Internet and the ease of access to online communities like social media have provided an avenue for cybercrimes. Cyberbullying, which is a kind of cybercrime, is defined as an aggressive, intentional action against a defenseless person by using the Internet, social media, or other electronic contents. Researchers have found that many of the bullying cases have tragically ended...
In bioinformatics studies (eg. rare diseases, population genetics, etc.) variation files are used for high volumes of genetic data. A system that allows the transfer of high-volume genomic variation information, the search for variations on this data, filtering, prioritization, complex queries related to genotypes and hereditary properties will enable bioinformatics researchers to work efficiently...
Recent studies of biological networks show that these networks are robust against the random or selective deletion of network nodes and / or edges. Ability to maintain performance of network under mutations is a key feature of live systems that has long been recognized. However, the molecular and cellular basis of this stability has just begun to be understood. Robustness is a key to understanding...
In this paper, computer engineering education in Turkey were examined on different perspectives. The current model of engineering education was analysed, and then some suggestions were presented. Also, some curriculum changes were suggested to increase the quality of education on undergraduate and graduate educations basis. To be able to have well qualified computer engineers, some methods which can...
Convolutional neural network based methods have provided great success in image classification and object detection tasks. However object detection, unlike the image classification task, requires much more computational intensities and energy consumption. As a result, object detection methods are difficult to integrate into embedded systems with limited resources. In this article, we propose a real-time...
Intelligent mirrors, which continue the works today and will take its place in the future technology, provide both mirror and computer aided information services to its users. Thanks to the microcontroller cards onboard, these systems, which can connect to the internet and take data from the internet, can show this information on the places located on the mirror. In the scope of the study, the developed...
Cryptography has always been a corner stone of security domain. Different security services such as confidentiality, integrity, availability, authentication, non-repudiation and access control, are provided by a number of cryptographic algorithms including block ciphers, stream ciphers and hash functions. Until to day, different operations and functions used in cryptography. In this paper, I have...
Decreasing the effectiveness of GPS technology in indoor environments has necessitated the use of different and cheaper technologies in these environments. Today's indoor positioning systems tend to be developed using wireless medium technologies such as RFID, BLE, WLAN, Geo-Magnetism, UWB and mobile device technology. The fact that these technologies are more likely to be affected by the environment...
Thanks to technological advances, unmanned vehicle studies are continuing every day. These vehicles are often used in land, sea, air, etc. where people cannot enter or entering may be dangerous for human life (Eg. Mine search robot, etc.). These vehicles, which can be controlled remotely or autonomously with the help of controller and sensors on them, can be used in many tasks such as military, industrial,...
Nowadays, identification systems are getting more and more attention due to terrorist attacks seen all over the world. Recognition of the unauthorized person has quite importance to secure critical areas. It is vital to know biometric data to recognize a person. Today face recognition systems has three steps: First, capture the face from image. Then, identify the face. Last, compare the face with...
In this article, we present a novel word-based lossless compression algorithm for text files which uses a semi-static model. We named our algorithm as Multi-stream Word-based Compression Algorithm (MWCA), because it stores the compressed forms of the words in three individual streams depending on their frequencies in the text. It also stores two dictionaries and a bit vector as a side information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.