Search Results - "Bostancı, Gazi Erkan"
-
1
Evolutionary feature selection for machine learning based malware classification
Published in Engineering science and technology, an international journal (01-08-2024)“…Conducting thorough research, analysis, and detection of cyber-threatening malware with the right parameters is crucial for safeguarding a country’s security…”
Get full text
Journal Article -
2
RF ANTENNA DESIGN FOR BUTTON-TYPE BEAM POSITION MONITORS USING BIO-INSPIRED OPTIMIZATION METHODS
Published in Communications Faculty of Sciences University of Ankara. Series A2-A3: physics, engineerigng physics, electronic engineering and astronomy (30-06-2020)“…Accelerator based facilities are in a leading position for crafting many scientific and technical innovations for a wide range of application from aviation to…”
Get full text
Journal Article -
3
Common Thorax Diseases Recognition Using Zero-Shot Learning With Ontology In the Multi-Labelled ChestX-ray14 Data Set
Published in IEEE access (01-01-2023)“…Disease detection/recognition with limited data sets and labels in the medical image domain is a very costly and greatest challenge. Although open image data…”
Get full text
Journal Article -
4
Interpretation of Magnetic Resonance Images of Temporomandibular Joint Disorders by Using Deep Learning
Published in IEEE access (01-01-2023)“…In recent years, Machine Learning (ML), especially Deep Learning (DL) approaches, has attracted great attention in medical field. In this study, we proposed a…”
Get full text
Journal Article -
5
Machine Learning Applications in Dentistry
Published in Selcuk Dental Journal (26-12-2022)“…Artificial Intelligence has emerged as a breakthrough in many fields including medicine and dentistry where new approaches can be employed to solve challenging…”
Get full text
Journal Article -
6
Saldırı tespiti için metasezgisel tabanlı özellik seçim yöntemi kullanan evrişimli sinir ağı modelleri
Published in Gazi Üniversitesi Mühendislik Mimarlık Fakültesi dergisi (12-12-2023)“…Bu çalışma, Evrişimsel sinir ağları (CNN'ler) ile birleştirilmiş bir meta-sezgisel tabanlı özellik seçim yöntemi kullanarak izinsiz giriş tespiti için yeni bir…”
Get full text
Journal Article -
7
Cloudy/clear weather classification using deep learning techniques with cloud images
Published in Computers & electrical engineering (01-09-2022)“…In recent years, the accessibility of weather forecasts has reached a point that checking it up on a smart device, like a smartphone, only takes a few seconds…”
Get full text
Journal Article -
8
GENERATING TURKISH LYRICS WITH LONG SHORT TERM MEMORY
Published in Communications Faculty of Sciences University of Ankara. Series A2-A3: physics, engineerigng physics, electronic engineering and astronomy (30-06-2020)“… Long Short Term Memory (LSTM) has gained a serious achievement on sequential data which have been used generally videos, text and time-series. In this…”
Get full text
Journal Article -
9
MODERN LEARNING TECHNIQUES AND PLANT IMAGE CLASSIFICATION
Published in Communications Faculty of Sciences University of Ankara. Series A2-A3: physics, engineerigng physics, electronic engineering and astronomy (31-12-2020)“…The intelligent machines concept is born in sci-fi scenarios. Today it seems to be we are much closer to realizing this idea than ever before. By imitating the…”
Get full text
Journal Article -
10
Analysis of Bragg curve parameters and lateral straggle for proton and carbon beams
Published in Communications Faculty of Sciences University of Ankara. Series A2-A3: physics, engineerigng physics, electronic engineering and astronomy (30-06-2021)“…Heavy ions have varying effects on the target. The most important factor in comparing this effect is Linear Energy Transfer (LET). Protons and carbons are…”
Get full text
Journal Article -
11
Geant4 based dosimetry evaluation for gamma knife using different phantom materials
Published in Communications Faculty of Sciences University of Ankara. Series A2-A3: physics, engineerigng physics, electronic engineering and astronomy (30-12-2021)“…This study examines the dose difference for a variety of phantom materials that can be employed for “Leksell Gamma” Knifes. These materials resemble human…”
Get full text
Journal Article -
12
Adaptation of metaheuristic algorithms to improve training performance of an ESZSL model
Published in Elektrik : Turkish journal of electrical engineering & computer sciences (01-01-2021)Get full text
Journal Article -
13
Askeri savaş alanlarının gerçek zamanda 3-boyutlu sanal simülasyonu
Published 01-01-2009“…Bu tez çalışması kapsamında askeri savaş alanlarının gerçek zamanlı 3 boyutlu sanal benzetiminin yapıldığı bir yazılım geliştirilmiştir. Geliştirilen Sandbox…”
Get full text
Dissertation -
14
Comparative analysis of the MPPT methods employed in the PV system, involving incremental conductance control and sliding mode control
Published in 2023 Second International Conference on Energy Transition and Security (ICETS) (12-12-2023)“…The objective of this research paper is to investigate diverse strategies for achieving optimal maximum power point tracking (MPPT) in photovoltaic (PV)…”
Get full text
Conference Proceeding -
15
Evaluation of YOLO Models with Sliced Inference for Small Object Detection
Published 09-03-2022“…Small object detection has major applications in the fields of UAVs, surveillance, farming and many others. In this work we investigate the performance of…”
Get full text
Journal Article -
16
-
17
Genetic Hyperparameter Optimization Library Development and Its Application on Plant Disease Detection Problem
Published in 2020 28th Signal Processing and Communications Applications Conference (SIU) (05-10-2020)“…Hyperparameters have a direct contribution to the training success in deep learning models. Most of the time, hyperparameters are tried to be determined by…”
Get full text
Conference Proceeding -
18
Blockchain Based Network Access Control (NAC) Management Solution and Architecture
Published in 2021 29th Signal Processing and Communications Applications Conference (SIU) (09-06-2021)“…There are many advantages of managing services and products in the cyber security sector through a central system, but this can sometimes be a disadvantage…”
Get full text
Conference Proceeding