The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study includes what the concept of IoT (Internet of Objects) expresses conceptually. It is stated that there are three generally accepted layers even though IoT does not have a complete layer structure. These layers are; Object layer, Network layer and Application layer. In addition, the most common security epidemics at IOT are; Botnet, Man in the Middle Attacks, Social Engineering, Data and...
In this paper a novel powerful method for Information Retrieval based Factoid Question Answering system is proposed. A factoid question has exactly one correct answer, and the answer is mostly a named entity like person, date, location etc. A rule-based method for question classification, query formulation and answer processing methods are explored based on our coarse-grained semantic representation...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Face recognition is considered as one of the relatively new and interesting concepts in the area of biometrics and comprises a huge number of applications. This study involves implementation of a robust recognition system by employing global and random local facial features of an individual. The proposed scheme considers the extraction of global facial features and some randomly selected local facial...
Automatic gender detection from face images is a challenging problem. In the literature, different techniques have been applied so far on face images for gender detection. In contrast to these existing methods, we have analyzed the usage of first-order configural relations of the face to predict gender from images by using machine learning algorithms. In experiments on the dataset of Wikipedia profile...
In today's conditions, parents have to work for home economics. For this reason, it is not always possible for parents to meet their children's needs, to protect them from dangers and to help them. Parents agree with a fee-paying caregiver to ensure that their children's needs are provided. Looking after a child by a caregiver can create a variety of security problems for the mother and the father...
Speech analysis can be used for healthcare tasks such as pathology detection. Conventionally, a speech-language pathologist is specialized to detect anomalies from speech. Speech disorders result from a variety of causes such as brain injury, stroke, hearing loss, developmental delay or emotion alteration. Content of the speech is often not of interest for pathology detection, but characteristics...
In this article, we present a novel word-based lossless compression algorithm for text files which uses a semi-static model. We named our algorithm as Multi-stream Word-based Compression Algorithm (MWCA), because it stores the compressed forms of the words in three individual streams depending on their frequencies in the text. It also stores two dictionaries and a bit vector as a side information...
In this paper, studies on the assignment of the most suitable people to project teams have been developed and a model based on different calculated quality values under different needs has been created. An algorithm that builds a working set for the problem, heuristic algorithms that are intended to solve the problem sets at the best quality, and their comparison is presented.
In world one out of two people is using a smart device. These devices those protect the personal data, those have people do their payments are targeted by attackers. Mobile applications include so many security threats all over inside the web traffic and the server that they communicate. Threats created by attackers can be divided to two titles which are direct attacks and indirect attacks. In this...
Detecting and analyzing similar words are an important component of natural language processing tasks such as information retrieval, document clustering, making dialog systems, word-sense disambiguation, text summarization and machine translation systems etc. Similar words have notable effect on machine translation. Especially, close languages such as Uyghur, Uzbek, Turkmen, Kazakh, Kyrgyz, Tatar,...
Classification of daily human movements using wearable sensor technology is among the current research topics, especially healthcare. In this study, eight different daily human movements (writing, walking, running, tooth brushing, writing on paper, using keyboard, stationary and cleaning) are classified by using data obtained from only smartwatch motion sensors (accelerometer and gyroscope). To compare...
In this study, crabs mating optimization (CRAB) algorithm that is one of the heuristic algorithms, has been developed and a monogamous crab mating optimization (MCO) algorithm has been proposed. In development, the main goal is to develop an algorithm that runs faster than the CRAB algorithm, to ensure obtaining good results like the CRAB algorithm. The developed MCO algorithm is compared with the...
Web activities are big data revealing the thoughts and intentions of users. Every file that is downloaded, and each searching word in the search engine are thought as reflections of the user's tendencies. Web activities are used to analyze in traces of crime in all kinds of information systems such as computers and mobile phones which are electromagnetic optical devices. The use of smart systems or...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.