The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Embedded systems with microprocessors require many hardware information such as clock speed, port name, and device address to be entered into the operating system cores. In the classic compilation process for operating system kernel, all features, that the embedded system supports, need to be included in the source code. The kernel of the operating system must be recompiled for each software development...
Positioning and location tracking are two major needs of the modern era; in which logistics, industry automation, smart buildings/cities and the Internet of Things concepts are trending topics and are constantly evolving. Introduction of the Global Positioning System (GPS) solved the issue well for outdoor scenarios, however, it is not a reliable solution for indoors, where satellite communication...
Neuroendocrine tumors (NET) are a heterogeneous group of tumors that can develop in almost every localization of the body. The study is the computation of the Ki-67 proliferation index, which is an important information for physicians, from the NET images. The physician control evaluations were carried out on histopathologic forms taken from healthy and NET-diagnosed patients with the designed automated...
Swarm intelligence or evolutionary computation algorithms search possible solutions in a predetermined search space of an optimization problem. In some cases candidate solutions go out of search space during the search. In such situations, search space limitation techniques or boundary conditions are used for sway up this outcast individual into search space. The boundary conditions are classified...
Breast biopsies based on the results of mammography and ultrasound have been diagnosed as benign at a rate of approximately 40 to 60 percent. Negative biopsy results have negative impacts on many aspects such as unnecessary operations, fear, pain, and cost. Therefore, there is a need for a more reliable technique to reduce the number of unnecessary biopsies in the diagnosis of breast cancer. So, computer-aided...
Link Prediction is a fundamental problem in the social networks analysis. In order to solve this problem supervised learning algorithms, which include one fuzzy rule based algorithm were applied in this study. Besides supervised learning algorithms, an unsupervised strategy is also applied to compare the supervised and unsupervised results. Two different networks are chosen for the experiments: a...
Brain tumors grow in the skull and they can be life threatening in later stages because of the pressure exerted on the brain. Malignant brain tumors have become one of the major causes of human death in recent years. If the tumor can be classified correctly at an early stage, the chances of survival of patients can be improved. The most appropriate treatment to be selected for brain cancer depends...
The quality of life of people is increasing together with the developing technologies. One of the most important factors affecting daily life is smart cities. The quality of life of people is positively affected by emerging this concept in recent years. Autonomous vehicles confront with the term of the smart city and have become even more popular in recent years. In this study, a system of traffic...
Weather forecasting stations are systems that allow forecasting of daily, weekly or monthly weather conditions. These systems, which are used by meteorology in our country, can be both difficult and costly for individual use. Smart weather stations are being developed that can be used individually in order to get rid of such problems. In this study, a smart weather station has realized for the monitoring...
The aim of this study is to compare the successes of various distance metrics and to determine the most appropriate methods in order to detect similarities among textual documents written in Turkish. Computing similarities between text documents is the basic step of plagiarism detection, and text mining methods like author detection, text classification and clustering. Therefore, plagiarism detection...
“EGGSORT: Avian Egg Gender Classification in Early Stages of Incubation” is an R&D project supported by TÜBİTAK and aims to find differentiating information on avian egg gender. Current study is about measuring performance of spectroscopy differentiation methods on egg white and egg yolk and the effect of eggshell on these measurements. Preprocessing methods and correlation measurements between...
The chaotic system and cryptography have some common features. Due to the close relationship between chaotic system and cryptosystem, researchers try to combine the chaotic system with cryptosystem. In this study, security analysis of an encryption algorithm which aims to encrypt the data with ECG signals and chaotic functions was performed using the Logistic map in text encryption and Henon map in...
The identification of association relationships in buying patterns of customers is an important problem to make proper decision by business companies. Current most research works utilizes commonly traditional Apriori algorithm to solve this problem. In this paper, a modified version of Apriori algorithm, and its combination with Eclat algorithm is suggested. Applying this approach to a case study...
In recent years, lightweight cryptography has become essential especially for the resource-constrained devices to ensure data protection and security. The selection of suitable cryptographic algorithm which is directly linked to requirements of the system will have dynamically effect on following such metrics like performance of the device, hardware resource cost, the area, speed, efficiency, computation...
In this study, shallow parsing is applied on Turkish sentences. These sentences are used to train and test the per-formances of various learning algorithms with various features specified for shallow parsing in Turkish.
The aim of this study is to present a virtual reality based rehabilitation system for Parkinson and Multiple Sclerosis (MS) patients. In this study, physical rehabilitation software has been developed using Virtual Reality (VR) technology. The VR environment was used to find a unique solution to the problems of balance, tremor and movement coordination that MS and Parkinson patients suffer from. Virtual...
This study presents a stemming method for Turkish Language that searches inflectional suffixes at the end of the words and eliminate them according to the rules provided by finite state machines and longest match manner.
In this study, the effect of distributions of solution candidates on the problem space in the meta-heuristic search process and the performance of algorithms has been investigated. For this purpose, solution candidates have been created with random and gauss (normal) distributions. Search performance is measured separately for both types of distribution of algorithms. The performances of the algorithms...
In this study, segmentation of medical images is implemented by an edge-based level set approach based on the client-server communication. In the method, a medical image, which is already loaded into the image gallery of the smartphone by the user, is selected, the pathological region to be segmented is roughly marked and then both the input image and the marked region, and some input parameters used...
Improved mobile devices have the computational power and software support for processing complex algorithmic expressions with the similar execution time when compared to the conventional processors. In this study, we investigated both serial and parallel implementations of Artificial Bee Colony (ABC) algorithm that is one of the most important swarm intelligence based algorithms by solving different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.