Bilgisayar Mühendisliği Bölümü Koleksiyonu
Güncel Gönderiler
-
Stacked ensemble modeling for improved tuberculosis treatment outcome prediction in pediatric cases
(Wiley, 2024)The promising results of ML (machine learning) methods in various disciplines have led to the frequent use of these methods in health fields such as disease diagnosis, personalized medicine, medical image-based diagnosis, ... -
Machine learning based feature optimization and early detection system in heart diseases
(IEEE, 2023)In today's world, humanity faces a myriad of challenges, many of which pose significant threats to our well-being. Chief among these challenges are health-related issues. Among these health problems, heart diseases stand ... -
ANOVA method reveals key factors influencing geopolymer strength: A comprehensive evaluation of input variables
(IEEE, 2023)In this study, we present an ANOVA (Analysis of Variance) method conducted on a geopolymer dataset. The analysis focuses on evaluating the impact of various input variables, including OB, GW, FA, S, M, M/B, AGE, HEAT, SiO2, ... -
Learner characteristics and competencies
(Springer, 2023)The advances in technology and the demand for open, distance, and digital education redefined the characteristics and competencies of learners in these learning environments. Although technology ownership and access to an ... -
Accuracy improvement in Ag:a-Si memristive synaptic device-based neural network through Adadelta learning method on handwritten-digit recognition
(Springer, 2023)Traditional computing architecture (Von Neumann) that requires data transfer between the off-chip memory and processor consumes a large amount of energy when running machine learning (ML) models. Memristive synaptic devices ... -
A novel framework for strength prediction of geopolymer mortar: Renovative precursor effect
(Elsevier, 2023)Concrete is the most used building material today as it has many advantages due to its structure. Geopolymer composites could potentially replace concrete in the future due to the demands of the construction industry. The ... -
An investigation of the factors that influence online learners' satisfaction with the learning experience
(Springer, 2023)Online learning environments offer flexibility for learners who would like to study at a distance. However, research informs us that online learners are usually less likely to complete the learning experience and more ... -
Development and evaluation of ensemble learning models for detection of distributed denial-of-service attacks in ınternet of things
(Hitit University, 2022)Internet of Things that process tremendous confidential data have difficulty performing traditional security algorithms, thus their security is at risk. The security tasks to be added to these devices should be able to ... -
Hybrid machine learning model coupled with school closure for forecasting covıd-19 cases in the most affected countries
(2021)Coronavirus disease (Covid-19) caused millions of confirmed cases and deaths worldwide since first appeared in China. Forecasting methods are essential to take precautions early and control the spread of this rapidly ... -
Bilgisayar ve öğretim teknolojileri eğitimi bölümü öğrencilerinin öğretim tasarımı yeterliklerinin incelenmesi
(2021)Bilgisayar ve Öğretim Teknolojileri Eğitimi (BÖTE) bölümü mezunlarının öğretim tasarımı yeterliklerini de içine alan geniş bir yelpazede görevleri yerine getirmeleri beklenmektedir. Ancak BÖTE öğretim programı içerisinde ... -
Trust, privacy, and self-disclosure on Facebook: Institutional implications of social media use among American and Turkish students
(Taylor & Francis Ltd., 2021)..... -
Distributed denial of service (DDoS): A history
(IEEE, 2022)Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of ... -
Correlation value determined to increase Salmonella prediction success of deep neural network for agricultural waters
(Springer, 2022)The use of computer-based tools has been becoming popular in the field of produce safety. Various algorithms have been applied to predict the population and presence of indicator microorganisms and pathogens in agricultural ... -
Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications
(IEEE, 2022)Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum ... -
ESAR: Enhanced secure authentication and revocation scheme for vehicular ad hoc networks
(Elsevier, 2022)Vehicle Ad Hoc Network (VANET) systems that use Public Key Infrastructure (PKI) experience significant delays when checking Certificate Revocation Lists (CRLs) and performing key pair-based asymmetric cryptographic operations. ... -
Measuring instructional design competencies of future professionals: construct validity of the ibstpi(R) standards
(Springer, 2021)Competencies that constitute the instructional design profession and how these competencies should be measured have been of interest to researchers for many years. Among the competency sets developed to date, the ibstpi(R) ... -
Lightweight offline authentication scheme for secure remote working environment
(IEEE, 2021)During pandemic situations, remote work security and reliability become more important for sustainability. The main problem in remote working is providing a reliable internet connection between remote working employees and ... -
Fuzzy rule based classification system from vehicle-to-grid data
(IEEE, 2021)Vehicle-to-Grid (V2G) system is becoming a very popular concept since it has various benefits such as reducing energy consumption, being environmental friendly, bi-directional charging, and load balancing. Although, it ... -
Selecting the best forensic report by using a group decision making method: A case study on three forensic reports
(IEEE, 2021)Group decision making (GDM) techniques have been very popular to take the best and the most convenient decision from an alternative set. GDM techniques have been applied in various area of information sharing as well as ... -
An analysis on the relation between users' online social networks addiction and users security concerns
(Scitepress, 2021)Use of online social network platforms has increased over last decades. There are various activities that users can do on those platforms such as, making friends, enjoying time, making business, and education. Given ...