Güncel Gönderiler: Bildiri Koleksiyonu
Toplam kayıt 113, listelenen: 81-100
-
Providing Private Recommendations on Personal Social Networks
(Springer-Verlag Berlin, 2010)Personal social networks are recently used to offer recommendations. Due to privacy concerns, privacy protection while generating accurate referrals is imperative. Since accuracy and privacy are conflicting goals, providing ... -
Providing private recommendations using naive Bayesian classifier
(Springer-Verlag Berlin, 2007)Today's CF systems fail to protect users' privacy. Without privacy protection, it becomes a challenge to collect sufficient and high quality data for CF. With privacy protection, users feel comfortable to provide more ... -
Robustness Analysis of Naive Bayesian Classifier-Based Collaborative Filtering
(Springer-Verlag Berlin, 2013)In this study, binary forms of previously defined basic shilling attack models are proposed and the robustness of naive Bayesian classifier-based collaborative filtering algorithm is examined. Real data-based experiments ... -
Privacy-Preserving Trust-based Recommendations on Vertically Distributed Data
(IEEE Computer Soc, 2011)Providing recommendations on trusts between entities is receiving increasing attention lately. Customers may prefer different online vendors for shopping. Thus, their preferences about various products might be distributed ... -
Circular Traffic Sign Recognition empowered by Circle Detection Algorithm
(IEEE, 2013)Automatic traffic sign detection and recognition is one of the most important components of advanced driver assistance systems. In this paper, a novel method utilizing histograms of oriented gradients based features together ... -
A Comparative Study on Machine Learning Algorithms for Indoor Positioning
(IEEE, 2015)Fingerprinting based positioning is commonly used for indoor positioning. In this method, initially a radio map is created using Received Signal Strength (RSS) values that are measured from predefined reference points. ... -
A Novel Multi-Sensor and Multi-Topological Database for Indoor Positioning on Fingerprint Techniques
(IEEE, 2015)In fingerprinting-based indoor positioning systems, Received Signal Strength (RSS) values are collected at predetermined reference points to construct a fingerprint map. A well-established fingerprint database plays an ... -
Integration of Classification Algorithms for Indoor Positioning System
(IEEE, 2017)Positioning applications become more popular with the advancement of location aware services. Global Positioning System is a successful solution for outdoors whereas it is not suitable for indoor environments due to the ... -
Use of novel feature extraction technique with subspace classifiers for speech recognition
(IEEE, 2007)Speech recognition is one of the fast moving research areas in pervasive services requiring human interaction. Like any type of pattern recognition system, selection of the feature extraction method and the classifier play ... -
A Survey on RF Mapping for Indoor Positioning
(IEEE, 2015)In RF based indoor positioning systems, RF map is constructed by collecting Received Signal Strength (RSS) values from access points at predetermined reference points in the working area. RF map is calibrated in order to ... -
Classifier Selection for RF Based Indoor Positioning
(IEEE, 2015)The selection of appropriate classifier is of great importance in improving the positioning accuracy and processing time for indoor positioning. In this work, an extensive analysis is carried out to determine the most ... -
Induction Motor Fault Diagnosis via Current Analysis on Time Domain
(IEEE, 2009)This study proposes a novel approach to induction motor fault diagnosis through motor current analysis. Most of the previous works employing motor current analysis use spectral methods to extract required features for ... -
A Hybrid Fingerprint Based Indoor Positioning with Extreme Learning Machine
(IEEE, 2017)Though global positioning system is a well-accepted technology for outdoor positioning, it is ineffective for indoor environment. Therefore, the search for effective and cheap solutions still continues. In this work, it ... -
Moving Object Tracking Within Surveillance Video Sequences Based On EDContours
(IEEE, 2015)We present a technique to track moving object in a video sequences created by still camera. Contours of each frame is detected using EDContours. Background model obtained with three point estimation technique is created ... -
An Improved Profile-based CF Scheme with Privacy
(IEEE Computer Soc, 2011)Traditional collaborative filtering (CF) systems widely employing k- nearest neighbor (kNN) algorithms mostly attempt to alleviate the contemporary problem of information overload by generating personalized predictions for ... -
A novel shilling attack detection method
(Elsevier Science BV, 2014)Recommender systems provide an impressive way to overcome information overload problem. However, they are vulnerable to profile injection or shilling attacks. Malicious users and/or parties might construct fake profiles ... -
A Multi-Criteria Item-based Collaborative Filtering Framework
(IEEE, 2014)Collaborative filtering methods are utilized to provide personalized recommendations for users in order to alleviate information overload problem in different domains. Traditional collaborative filtering methods operate ... -
On Binary Similarity Measures for Privacy-Preserving Top-N Recommendations
(Scitepress, 2010)Collaborative filtering (CF) algorithms fundamentally depend on similarities between users and/or items to predict individual preferences. There are various binary similarity measures like Kulzinslcy, Sokal-Michener, Yule, ... -
Randomization-based Privacy-preserving Frameworks for Collaborative Filtering
(Elsevier Science BV, 2016)Randomization-based privacy protection methods are widely used in collaborative filtering systems to achieve individual privacy. The basic idea behind randomization utilized in collaborative filtering schemes is to add ... -
Quantification of Projective Distortion for Fiducial Markers
(IEEE, 2013)The aim of this study is to quantify the projective distortion of candidate quadrilaterals found in a square-framed fiducial marker detection algorithm. Based on the quantified value, candidates can be eliminated in such ...