Başlık için Makale Koleksiyonu listeleme
Toplam kayıt 100, listelenen: 14-33
-
DeASCIIfication approach to handle diacritics in Turkish information retrieval
(Elsevier Sci LTD, 2016)The absence of diacritics in text documents or search queries is a serious problem for Turkish information retrieval because it creates homographic ambiguity. Thus, the inappropriate handling of diacritics reduces the ... -
Deriving private data in partitioned data-based privacy-preserving collaborative filtering systems
(Gazi University, Fac Engineering Architecture, 2017)Collaborative filtering algorithms need enough data to provide accurate and reliable predictions. Hence, two e-commerce sites holding insufficient data may want to provide predictions on their partitioned data with privacy. ... -
Designing shilling attacks on disguised binary data
(Inderscience Enterprises LTD, 2017)Privacy-preserving collaborative filtering methods are effectual ways of coping with information overload problem while protecting confidential data. Their success depends on the quality of the collected data. However, ... -
Detecting shilling attacks in private environments
(Springer, 2016)Privacy-preserving collaborative filtering algorithms are successful approaches. However, they are susceptible to shilling attacks. Recent research has increasingly focused on collaborative filtering to protect against ... -
A dynamic wavelet network based adaptive load frequency control in power systems
(Elsevier Sci LTD, 2005)This paper proposes a new adaptive load frequency controller based on a 'dynamic wavelet network (DWN)' that has lag dynamics, nonorthogonal mother wavelets as activation function and interconnection weights. A DWN is ... -
EDCircles: A real-time circle detector with a false detection control
(Elsevier Sci LTD, 2013)We propose a real-time, parameter-free circle detection algorithm that has high detection rates, produces accurate results and controls the number of false circle detections. The algorithm makes use of the contiguous ... -
Edge Drawing: A combined real-time edge and segment detector
(Academic Press Inc Elsevier Science, 2012)We present a novel edge segment detection algorithm that runs real-time and produces high quality edge segments, each of which is a linear pixel chain. Unlike traditional edge detectors, which work on the thresholded ... -
EDLines: A real-time line segment detector with a false detection control
(Elsevier Science BV, 2011)We propose a linear time line segment detector that gives accurate results, requires no parameter tuning, and runs up to 11 times faster than the fastest known line segment detector in the literature; namely, the line ... -
Edpf: a Real-Time Parameter-Free Edge Segment Detector With a False Detection Control
(World Scientific Publ Co Pte LTD, 2012)We propose a real-time, parameter-free edge/edge segment detection algorithm based on our novel edge/edge segment detector, the edge drawing (ED) algorithm; hence the name edge drawing parameter free (EDPF). EDPF works by ... -
EDTriangles: a high-speed triangle detection algorithm with a false detection control
(Springer, 2018)We present a high-speed method for triangular object detection. The proposed method utilizes the recently developed, real-time edge segment detection algorithm, Edge Drawing; hence, the name EDTriangles, which consists of ... -
Effects of similarity measures on the quality of predictions
(2013)Providing accurate predictions efficiently is vital for the success of recommender systems. There are various factors that might affect the quality of the predictions and online performance. Similarity metric used to ... -
Ekg Sinyallerinin Kaba Kümeler Teorisi Kullanılarak Sınıflandırılması
(2014)Kaba kümeler teorisi (KKT), bulanık kümeler gibi uzman sistemler için analiz ve bilgi çıkarımında kullanılan kural tabanlı bir yöntemdir. Kaba kümeler eksik, tutarsız ve belirsiz veri kümelerini düzenleyerek değerlendirme ... -
Enabling peer-to-peer communication for hosts in private address realms using IPv4 LSRR option and IPv4+4 addresses
(Inst Engineering Technology-Iet, 2009)Enabling peer-to-peer (P2P) communication for hosts behind network address translation (NAT) boxes is an important and difficult problem. Existing proposals, for example, UPnP, MIDCOM, TURN, STUN, STUNT, P2PNAT, NATBlaster ... -
An entropy-based neighbor selection approach for collaborative filtering
(Elsevier, 2014)Collaborative filtering is an emerging technology to deal with information overload problem guiding customers by offering recommendations on products of possible interest. Forming neighborhood of a user/item is the crucial ... -
Estimating Kriging-based predictions with privacy
(2013)Kriging is a well-known prediction method. It interpolates the value of an unmeasured location from nearby measured locations. In a traditional Kriging interpolation, a client (an entity that is looking for a prediction ... -
Estimating NBC-based recommendations on arbitrarily partitioned data with privacy
(Elsevier, 2012)Providing partitioned data-based recommendations has been receiving increasing attention due to mutual advantages. In case of limited data, it is not likely to estimate accurate and reliable predictions. Therefore. e-commerce ... -
Estimation of cutting speed in abrasive water jet using an adaptive wavelet neural network
(Springer, 2015)Abrasive water jet cutting has been proven to be an effective technology for processing various engineering materials. To determine the optimal jet traverse rate (cutting speed) in abrasive water jet cutting is not very ... -
An F-Score-Weighted Indoor Positioning Algorithm Integrating WiFi and Magnetic Field Fingerprints
(Hindawi LTD, 2018)Indoor positioning systems have attracted much attention with the recent development of location-based services. Although global positioning system (GPS) is a widely accepted and accurate outdoor localization system, there ... -
Feature Selection and Comparison of Classification Algorithms For Intrusion Detection
(2018)The increase in the frequency of use of the Internet causes the attacks on computer networks to increase. Such phenomena also increase the importance of intrusion detection systems. In this paper, KDD Cup 99 dataset is ... -
From existing trends to future trends in privacy-preserving collaborative filtering
(Wiley Periodicals, Inc, 2015)The information overload problem, also known as infobesity, forces online vendors to utilize collaborative filtering algorithms. Although various recommendation methods are widely used by many electronic commerce sites, ...