Başlık için Yazılım Mühendisliği Bölümü Koleksiyonu listeleme
Toplam kayıt 11, listelenen: 6-11
-
AN INTELLIGENT POSTOPERATIVE CHRONIC PAIN PREDICTION SYSTEM (I-POCPP)
(ISTANBUL UNIV, 2022)Objective: Postoperative Chronic Pain (POCP) affects the quality of patients' lives. Machine learning and its applications provide significant contributions to pain research. The aim of this study is to predict the POCP ... -
Machine Learning Approach and Model Performance Evaluation for Tele-Marketing Success Classification
(IGI GLOBAL, 2022)Up to the present, various methods such as data mining, machine learning, and artificial intelligence have been used to get the best assessment from huge and important data resources. Deep learning, one of these methods, ... -
Metaheuristic approaches for solving multiobjective optimization problems
(Elsevier, 2023)Multiobjective optimization problems (MOOPs) require optimizing two or more, often conflicting objectives. The wide application of MOOPs has attracted the attention of researchers in academics and industry; therefore, a ... -
Multi-Criteria Decision-Making-Based Model Selection Proposal in Artificial Learning Process
(WORLD SCIENTIFIC PUBL CO PTE LTD, 2022)In this study, selection of the best classification model in the artificial learning process is considered as a Multi-Criteria Decision-Making problem. In this direction, machine learning- based 10 classification models ... -
A novel model-based technique to improve design processes for microstrip antennas
(Elsevier GmbH, 2023)The present work aims to prove the concept of a novel approach to designing microstrip antennas with desired radiation patterns without time-consuming trials and simulations. While it is pretty straightforward to design a ... -
A Transfer Learning Approach for Securing Resource-Constrained IoT Devices
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2021)In recent years, Internet of Things (IoT) security has attracted significant interest by researchers due to new characteristics of IoT such as heterogeneity of devices, resource constraints, and new types of attacks targeting ...