Güncel Gönderiler: Bilgisayar Mühendisliği Bölümü Koleksiyonu
Toplam kayıt 103, listelenen: 1-20
-
Formal Verification of Bit-Vector Invertibility Conditions in Coq
(Springer Science and Business Media Deutschland GmbH, 2023)We prove the correctness of invertibility conditions for the theory of fixed-width bit-vectors—used to solve quantified bit-vector formulas in the Satisfiability Modulo Theories (SMT) solver cvc5— in the Coq proof assistant. ... -
İnternet Sıkça Sorulan Sorular ve Wiki Yaklaşımı
(internet teknolojileri derneği (inetd), 2010)Bilgiye mümkün oldukça farklı kaynaklardan ve hızlı olarak ulaşmak gerekmektedir. Günümüzde bu bilgiye ulaşmamız için gerekli araştırma ve öğrenme yöntemlerine destek olabilecek en etkili, en kolay ulaşılabilir kaynak; ... -
Is ChatGPT Leading Generative AI What is Beyond Expectations?
(Akademik Perspektif Derneği, 2023)Generative AI has the potential to change the way we do things. The chatbot is one of the most popular implementation areas. Even though companies like Google and Meta had chatbots, ChatGPT became popular as it was made ... -
DEVOUR: Deleterious Variants on Uncovered Regions in Whole-Exome Sequencing
(PMC, 2023)The discovery of low-coverage (i.e. uncovered) regions containing clinically significant variants, especially when they are related to the patient's clinical phenotype, is critical for whole-exome sequencing (WES) based ... -
Machine Learning Methods for Virus–Host Protein–Protein Interaction Prediction
(Humana Press Inc., 2023)The attachment of a virion to a respective cellular receptor on the host organism occurring through the virus–host protein–protein interactions (PPIs) is a decisive step for viral pathogenicity and infectivity. Therefore, ... -
A selective approach to stemming for minimizing the risk of failure in information retrieval systems
(2023)Stemming is supposed to improve the average performance of an information retrieval system, but in practice, past experimental results show that this is not always the case. In this article, we propose a selective approach ... -
A family-centered orthodontic screening approach using a machine learning-based mobile application
(Association for Dental Sciences of the Republic of China, 2023)Background/purpose: Skeletal orthodontic deformities can have functional and aesthetic consequences, making early detection critical. This study aimed to address the issue of parents bringing their children for routine ... -
Opportunities and Challenges in Metaverse for Industry 4.0 and Beyond Applications
(Institute of Electrical and Electronics Engineers Inc., 2022)Metaverse is the next generation of Internet-based applications and social forms using various cutting-edge technologies, such as virtual reality, augmented reality, 3D holographic avatars, video, cloud computing, etc. It ... -
SSI meets Metaverse for Industry 4.0 and Beyond
(Institute of Electrical and Electronics Engineers Inc., 2022)As the global industrial complex gears toward fulfilling the tenets of Industry 4.0 and beyond, technologies such as distributed ledger technologies, digital twins, and artificial intelligence become pivotal enablers. In ... -
A correlation coefficient-based feature selection approach for virus-host protein-protein interaction prediction
(Plos, 2023)Prediction of virus-host protein-protein interactions (PPI) is a broad research area where various machine-learning-based classifiers are developed. Transforming biological data into machine-usable features is a preliminary ... -
A Sound Definitional Interpreter for a Simply Typed Functional Language
(MDPI, 2023)In this paper, we develop, in the proof assistant Coq, a definitional interpreter and a type-checker for a simply typed functional language, and formally prove that the mentioned type-checker is sound with respect to the ... -
OpenAI ChatGPT Generated Literature Review: Digital Twin in Healthcare
(İzmir Akademi Dernegi, 2022)Literature review articles are essential to summarize the related work in the selected field. However, covering all related studies takes too much time and effort. This study questions how Artificial Intelligence can be ... -
Measuring The Robustness of AI Models Against Adversarial Attacks: Thyroid Ultrasound Images Case Study
(2022)The healthcare industry is looking for ways on using artificial intelligence effectively. Decision support systems use AI (Artificial Intelligence) models that diagnose cancer from radiology images. These models in such ... -
Analysis of Popularity Degradation in P2P Overlay Topology
(Institute of Electrical and Electronics Engineers Inc., 2022)Unstructured Peer-to-Peer(P2P) networks can scale to very large number of peers. Therefore, the topology of the P2P networks affects the performance of searches to find items. Popularity based P2P overlay topologies are ... -
Twitter Data Analysis: Izmir Earthquake Case
(İzmir Akademi Derneği, 1.12.2022)Türkiye is located on a fault line; earthquakes often occur on a large and small scale. There is a need for effective solutions for gathering current information during disasters. We can use social media to get insight ... -
Metaverse ve Merkeziyetsizlik
(Nobel Akademik Yayıncılık, 2022)Metaverse farklı teknolojilerle birçok sanal dünyanın oluşturulması ile üç boyutlu erişim sağlayan bir yapı olarak gelişmektedir. Metaverse oluşumunda önce internet büyük bir değişim içerisine girmiştir. Bu değişimin ... -
First case with RANBP2 biallelic mutation and severe acute necrotizing encephalopathy phenotype
(Elsevier B.V., 2022)Familial acute necrotizing encephalopathy (ANE) is a rapidly progressive encephalopathy that can occur after common viral infections at different stages of life. The clinical findings of 2 siblings diagnosed with ANE were ... -
Blokzinciri Teknolojisinin E-Devlet Uygulamalarında Kullanımı: Ön İnceleme
(2018)Blok zinciri (blockchain), merkezi olmayan ve sağlama (hash) süreçleri ile değişmezliği garantilenen işlem kayıtlarının takibini sağlayan bir teknolojidir. Bu teknoloji ismini kripto paralar (crypto currency) ile duyursa ... -
Does Network Awareness Make Difference In Intrusion Detection of Web Attacks
(2006)There is increasing number of attacks aiming web servers; mostly at the application level. This is due to the fact that web services emerging rapidly without security considerations and network level solutions allow their ... -
Uygulama Tabanlı Bilgisayar ve Ağ Güvenliği Eğitimi: MSKÜ Deneyimi
(2017)Siber güvenlik konularında bilgi sahibi olan ve özellikle özgür yazılım araçlarını deneyimlemiş, yetişmiş insan gücü ihtiyacı her geçen gün artmaktadır. Sadece teoriyi vermek yetmemekte, bu bilgilerin uygulamalarla ...