Güncel Gönderiler: Bilgisayar Mühendisliği Bölümü
Toplam kayıt 216, listelenen: 181-200
-
A novel shilling attack detection method
(Elsevier Science BV, 2014)Recommender systems provide an impressive way to overcome information overload problem. However, they are vulnerable to profile injection or shilling attacks. Malicious users and/or parties might construct fake profiles ... -
A Multi-Criteria Item-based Collaborative Filtering Framework
(IEEE, 2014)Collaborative filtering methods are utilized to provide personalized recommendations for users in order to alleviate information overload problem in different domains. Traditional collaborative filtering methods operate ... -
A Survey of Privacy-Preserving Collaborative Filtering Schemes
(World Scientific Publ Co Pte LTD, 2013)With increasing need for preserving confidential data while providing recommendations, privacy-preserving collaborative filtering has been receiving increasing attention. To make data owners feel more comfortable while ... -
On Binary Similarity Measures for Privacy-Preserving Top-N Recommendations
(Scitepress, 2010)Collaborative filtering (CF) algorithms fundamentally depend on similarities between users and/or items to predict individual preferences. There are various binary similarity measures like Kulzinslcy, Sokal-Michener, Yule, ... -
A survey on ECG analysis
(Elsevier Sci LTD, 2018)The electrocardiogram (ECG) signal basically corresponds to the electrical activity of the heart. In the literature, the ECG signal has been analyzed and utilized for various purposes, such as measuring the heart rate, ... -
Robustness analysis of privacy-preserving model-based recommendation schemes
(Pergamon-Elsevier Science LTD, 2014)Privacy-preserving model-based recommendation methods are preferable over privacy-preserving memory-based schemes due to their online efficiency. Model-based prediction algorithms without privacy concerns have been ... -
On circular traffic sign detection and recognition
(Pergamon-Elsevier Science LTD, 2016)Automatic traffic sign detection and recognition play crucial roles in several expert systems such as driver assistance and autonomous driving systems. In this work, novel approaches for circular traffic sign detection and ... -
A review on deep learning for recommender systems: challenges and remedies
(Springer, 2019)Recommender systems are effective tools of information filtering that are prevalent due to increasing access to the Internet, personalization trends, and changing habits of computer users. Although existing recommender ... -
EDTriangles: a high-speed triangle detection algorithm with a false detection control
(Springer, 2018)We present a high-speed method for triangular object detection. The proposed method utilizes the recently developed, real-time edge segment detection algorithm, Edge Drawing; hence, the name EDTriangles, which consists of ... -
Randomization-based Privacy-preserving Frameworks for Collaborative Filtering
(Elsevier Science BV, 2016)Randomization-based privacy protection methods are widely used in collaborative filtering systems to achieve individual privacy. The basic idea behind randomization utilized in collaborative filtering schemes is to add ... -
Quantification of Projective Distortion for Fiducial Markers
(IEEE, 2013)The aim of this study is to quantify the projective distortion of candidate quadrilaterals found in a square-framed fiducial marker detection algorithm. Based on the quantified value, candidates can be eliminated in such ... -
Comparison of Feature Extraction Techniques for Handwriting Recognition
(IEEE, 2018)Feature extraction is an important phase for image processing purposes since the output of the feature extraction is the input for classifiers. The importance of it applies to handwriting recognition problem, too. Distinctive ... -
Methods of Privacy Preserving in Collaborative Filtering
(IEEE, 2017)Privacy considerations of individuals becomes more and more popular issue in recommender systems due to the increasing need for protecting confidential data. Even though users of recommender systems enjoy with personalized ... -
Web Application Attack Detection and Forensics: A Survey
(IEEE, 2018)Web application attacks are an increasingly important area in information security and digital forensics. It has been observed that attackers are developing the capability to bypass security controls and launch a large ... -
Designing shilling attacks on disguised binary data
(Inderscience Enterprises LTD, 2017)Privacy-preserving collaborative filtering methods are effectual ways of coping with information overload problem while protecting confidential data. Their success depends on the quality of the collected data. However, ... -
Artificial Intelligence Aided Recommendation Based Mobile Trip Planner For Eskisehir City
(IEEE, 2015)Recent years have seen a proliferation of applications aimed for the mobile users. Although there are some mobile trip planning applications available for big cities such Istanbul, they lack some important features that ... -
Comparison of Three Search Algorithms for Mobile Trip Planner for Eskisehir City
(IEEE, 2015)The comparison of three searching algorithms; A*, Ant Colony Optimization and Genetic Algorithms to solve the Traveler Salesman Problem for a mobile trip planning application for Eskisehir City, Turkey, is presented in ... -
The Comparison of A* Algorithm and Ant Colonial Optimization for Mobile Traveler Application
(IEEE, 2015)In this paper, a route planning application has been developed for mobile devices. The goal was to select the algorithm that computes the route in the shortest amount of time. To this end, a database containing information ... -
A biorthogonal wavelet design technique using Karhunen-Loeve transform approximation
(Academic Press Inc Elsevier Science, 2016)The lifting style biorthogonal wavelet implementation has a nice property of enabling flexible design; it is immediately reversible and has a simple relation to subband filters. In this work, we present a method to design ... -
A computational morphological lexicon for Turkish: TrLex
(Elsevier Science BV, 2018)A morphological lexicon that is a computational source should be considered together with derivational morphology especially for agglutinative languages. To the best of our knowledge, in the Turkish language there has been ...