Search Results - "Ahmet Burak Can"
-
1
Making JavaScript Render Decisions to Optimize Security-Oriented Crawler Process
Published in IEEE access (2024)“…The widespread use of web applications requires important changes in cybersecurity to protect online services and data. In the process of identifying security…”
Get full text
Journal Article -
2
Volumetric Object Recognition Using 3-D CNNs on Depth Data
Published in IEEE access (01-01-2018)“…Recognizing 3-D objects has a wide range of application areas from autonomous robots to self-driving vehicles. The popularity of low-cost RGB-D sensors has…”
Get full text
Journal Article -
3
Ensemble-Based Knowledge Distillation for Video Anomaly Detection
Published in Applied sciences (01-01-2024)“…Video anomaly detection has become a vital task for smart video surveillance systems because of its significant potential to minimize the video data to be…”
Get full text
Journal Article -
4
Systematic Approach for Generation of Feasible Deployment Alternatives for Microservices
Published in IEEE access (2021)“…Microservice architectures rely on the development of modular and independent software units, which typically address a single task and communicate with other…”
Get full text
Journal Article -
5
A Model-Driven Architecture for Automated Deployment of Microservices
Published in Applied sciences (01-10-2021)“…Microservice architecture consists of a collection of loosely coupled, self-contained services that can be deployed independently. Given the limited capacity…”
Get full text
Journal Article -
6
Depth features to recognise dyadic interactions
Published in IET computer vision (01-04-2018)“…Usage of depth sensors in activity recognition is an emerging technology in human–computer interaction. This study presents an approach to recognise…”
Get full text
Journal Article -
7
Akciğer nodül özelliklerinin tahmininde çeşitli sınıflama stratejilerinin incelenmesi
Published in Gazi Üniversitesi Mühendislik Mimarlık Fakültesi dergisi (01-02-2019)“…Nodül özellikleri, akciğer nodüllerinin değerlendirilmesinde kullanılan, genelde uzman görüşüne göre öznel değerlendirmelerdir. Bunlardan en bilineni ve…”
Get full text
Journal Article -
8
Margin-enhanced average precision optimization for visible-infrared person re-identification
Published in Computers & electrical engineering (01-12-2024)“…Average precision-based loss functions are effective for training deep neural networks in ranking tasks and single-modality person re-identification. However,…”
Get full text
Journal Article -
9
A weighted rule based method for predicting malignancy of pulmonary nodules by nodule characteristics
Published in Journal of biomedical informatics (01-08-2015)“…[Display omitted] •A weighted rule based classification method for predicting malignancy of pulmonary nodules is proposed.•We benefit from nodule…”
Get full text
Journal Article -
10
Integrating global and local image features for enhanced loop closure detection in RGB-D SLAM systems
Published in The Visual computer (01-06-2020)“…Loop closure detection is essential for simultaneous localization and mapping systems to decrease accumulating drift of trajectory estimations. Robust loop…”
Get full text
Journal Article -
11
k-SLAM: A fast RGB-D SLAM approach for large indoor environments
Published in Computer vision and image understanding (01-07-2019)“…We present an RGB-D based SLAM system capable of building consistent 3D maps of large indoor environments. The system performs motion estimation by using…”
Get full text
Journal Article -
12
Fast and Effective Loop Closure Detection to Improve SLAM Performance
Published in Journal of intelligent & robotic systems (01-03-2019)“…A fundamental component of simultaneous localization and mapping systems is loop closure detection. For consistent mapping, accurate loop closure detection is…”
Get full text
Journal Article -
13
When CNNs meet random RNNs: Towards multi-level analysis for RGB-D object and scene recognition
Published in Computer vision and image understanding (01-03-2022)“…Recognizing objects and scenes are two challenging but essential tasks in image understanding. In particular, the use of RGB-D sensors in handling these tasks…”
Get full text
Journal Article -
14
AndMFC: Android Malware Family Classification Framework
Published in 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops) (01-09-2019)“…As the popularity of Android mobile operating system grows, the number of malicious software have increased extensively. Therefore, many research efforts have…”
Get full text
Conference Proceeding -
15
Deployment and communication patterns in microservice architectures: A systematic literature review
Published in The Journal of systems and software (01-10-2021)“…Microservice is an architectural style that separates large systems into small functional units to provide better modularity. A key challenge of microservice…”
Get full text
Journal Article -
16
GenTrust: A genetic trust management model for peer-to-peer systems
Published in Applied soft computing (01-09-2015)“…[Display omitted] In recent years, peer-to-peer systems have attracted significant interest by offering diverse and easily accessible sharing environments to…”
Get full text
Journal Article -
17
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
Published in IEEE transactions on dependable and secure computing (01-01-2013)“…Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. This…”
Get full text
Journal Article -
18
Micro‐IDE: A tool platform for generating efficient deployment alternatives based on microservices
Published in Software, practice & experience (01-07-2022)“…Microservice architecture (MSA) is a paradigm to design and develop scalable distributed applications using loosely coupled, highly cohesive components that…”
Get full text
Journal Article -
19
Combining 2D and 3D deep models for action recognition with depth information
Published in Signal, image and video processing (01-09-2018)“…In activity recognition, usage of depth data is a rapidly growing research area. This paper presents a method for recognizing single-person activities and…”
Get full text
Journal Article -
20
Consistency-based trust management in P2P networks
Published in Elektrik : Turkish journal of electrical engineering & computer sciences (01-01-2018)Get full text
Journal Article