Search Results - "2017 International Conference on Computer Science and Engineering (UBMK)"

Refine Results
  1. 1

    Crude oil price forecasting using XGBoost by Gumus, Mesut, Kiran, Mustafa S.

    “…One of the most important role of economic variables in today's world countries are the price and the change of the price of crude oil. Changes in the price of…”
    Get full text
    Conference Proceeding
  2. 2

    Data classification with deep learning using Tensorflow by Ertam, Fatih, Aydin, Galip

    “…Deep learning is a subfield of machine learning which uses artificial neural networks that is inspired by the structure and function of the human brain…”
    Get full text
    Conference Proceeding
  3. 3

    Twitter fake account detection by Ersahin, Buket, Aktas, Ozlem, Kilinc, Deniz, Akyol, Ceyhun

    “…Social networking sites such as Twitter and Facebook attracts millions of users across the world and their interaction with social networking has affected…”
    Get full text
    Conference Proceeding
  4. 4

    Detection of cyberbullying on social media messages in Turkish by Ozel, Selma Ayse, Sarac, Esra, Akdemir, Seyran, Aksu, Hulya

    “…The increased use of the Internet and the ease of access to online communities like social media have provided an avenue for cybercrimes. Cyberbullying, which…”
    Get full text
    Conference Proceeding
  5. 5

    Big data analytics for network anomaly detection from netflow data by Terzi, Duygu Sinanc, Terzi, Ramazan, Sagiroglu, Seref

    “…Cyber-attacks was organized in a simple and random way in the past. However attacks are carried out systematically and long term nowadays. In addition, the…”
    Get full text
    Conference Proceeding
  6. 6

    Binary classification performance measures/metrics: A comprehensive visualized roadmap to gain new insights by Canbek, Gurol, Sagiroglu, Seref, Temizel, Tugba Taskaya, Baykal, Nazife

    “…Binary classification is one of the most frequent studies in applied machine learning problems in various domains, from medicine to biology to meteorology to…”
    Get full text
    Conference Proceeding
  7. 7

    Using deep learning for mammography classification by Hepsag, Pinar Uskaner, Ozel, Selma Ayse, Yazici, Adnan

    “…Breast biopsies based on the results of mammography and ultrasound have been diagnosed as benign at a rate of approximately 40 to 60 percent. Negative biopsy…”
    Get full text
    Conference Proceeding
  8. 8

    Role of NPCR and UACI tests in security problems of chaos based image encryption algorithms and possible solution proposals by Ozkaynak, Fatih

    “…Although chaos based cryptology studies are an active research area, it does not make a significant contribution to the mainstream cryptology literature. Many…”
    Get full text
    Conference Proceeding
  9. 9

    Preprocessing framework for Twitter bot detection by Kantepe, Mucahit, Ganiz, Murat Can

    “…One of the important problems in social media platforms like Twitter is the large number of social bots or sybil accounts which are controlled by automated…”
    Get full text
    Conference Proceeding
  10. 10

    Detecting phishing attacks from URL by using NLP techniques by Buber, Ebubekir, Diri, Banu, Sahingoz, Ozgur Koray

    “…Nowadays, cyber attacks affect many institutions and individuals, and they result in a serious financial loss for them. Phishing Attack is one of the most…”
    Get full text
    Conference Proceeding
  11. 11

    Prediction of heart disease using neural network by Karayilan, Tulay, Kilic, Ozkan

    “…Heart disease is a deadly disease that large population of people around the world suffers from. When considering death rates and large number of people who…”
    Get full text
    Conference Proceeding
  12. 12

    Image classification with caffe deep learning framework by Cengil, Emine, Cinar, Ahmet, Ozbay, Erdal

    “…Image classification is one of the important problems in the field of machine learning. Deep learning architectures are used in many machine learning…”
    Get full text
    Conference Proceeding
  13. 13

    Predicting financial market in big data: Deep learning by Hasan, Afan, Kalipsiz, Oya, Akyokus, Selim

    “…Deep Learning is appealing for learning from large amounts of unlabeled/unsupervised data, making it attractive for extracting meaningful representations and…”
    Get full text
    Conference Proceeding
  14. 14

    Public transport route planning: Modified dijkstra's algorithm by Bozyigit, Alican, Alankus, Gazihan, Nasiboglu, Efendi

    “…Public transport applications, which aim to propose the ideal route to end users, have commonly been used by passengers. However, the ideal route for public…”
    Get full text
    Conference Proceeding
  15. 15

    Sentiment analysis on Twitter data with semi-supervised Doc2Vec by Bilgin, Metin, Senturk, Izzet Fatih

    “…Twitter is one of the most popular microblog sites developed in recent years. Feelings are analysed on the messages shared on Twitter so that users ideas on…”
    Get full text
    Conference Proceeding
  16. 16

    Augmented reality based mobile learning system design in preschool education by Baykara, Muhammet, Gurturk, Ugur, Atasoy, Bedirhan, Percin, Ibrahim

    “…With the development of computers, the Internet and mobile technologies, different needs have emerged for people and different solutions have been discovered…”
    Get full text
    Conference Proceeding
  17. 17

    Visual program application for supplier selection using fuzzy DEMATEL and fuzzy AHP by Tarim, Ergun Alperay, Kandemir, Emel Kuruoglu

    “…The choice of supplier in the supply chain network is a very important and quick issue for decision makers. When we work in line with these requirements, a…”
    Get full text
    Conference Proceeding
  18. 18

    Trustworthy scrum: Development of secure software with scrum by Koc, Guler, Aydos, Murat

    “…Software development process models focus on ordering and combination of phases to develop the intended software product within time and cost estimates…”
    Get full text
    Conference Proceeding
  19. 19

    Link prediction methods in bipartite networks by Aslan, Serpil, Kaya, Mehmet

    “…Nowadays, social networks, whose application areas are increasing day by day; Such as data mining, protein-gene interaction networks, online social networks,…”
    Get full text
    Conference Proceeding
  20. 20

    Wireless sensor network based fire detection system for libraries by Arslan, Sadik, Challenger, Moharram, Dagdeviren, Orhan

    “…The library environment is vulnerable to fire threat due to the paper based publications it contains. Since it is a public open environment and it contains…”
    Get full text
    Conference Proceeding