Search Results - "Yesiltepe, Mirsat"

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    A Hybrid CNN and RNN Variant Model for Music Classification by Ashraf, Mohsin, Abid, Fazeel, Din, Ikram Ud, Rasheed, Jawad, Yesiltepe, Mirsat, Yeo, Sook Fern, Ersoy, Merve T.

    Published in Applied sciences (01-02-2023)
    “…Music genre classification has a significant role in information retrieval for the organization of growing collections of music. It is challenging to classify…”
    Get full text
    Journal Article
  2. 2

    An Efficient Machine Learning-Based Model to Effectively Classify the Type of Noises in QR Code: A Hybrid Approach by Rasheed, Jawad, Wardak, Ahmad B., Abu-Mahfouz, Adnan M., Umer, Tariq, Yesiltepe, Mirsat, Waziry, Sadaf

    Published in Symmetry (Basel) (01-10-2022)
    “…Granting smart device consumers with information, simply and quickly, is what drives quick response (QR) codes and mobile marketing to go hand in hand. It…”
    Get full text
    Journal Article
  3. 3

    N-gram based approach to recognize the twitter accounts of Turkish daily newspapers by Mayda, Islam, Yesiltepe, Mirsat

    “…Twitter is one of the most popular social media networks in the world. It is also mostly used by corporate companies, media as well as individual users. Media…”
    Get full text
    Conference Proceeding
  4. 4

    Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users by Yesiltepe, Mirsat, Kurulay, Muhammet

    Published in Security and communication networks (01-01-2018)
    “…At present, the notion of a cloud has expanded so much that there is no area of knowledge other than the concept of cloud. The most important reason for this…”
    Get full text
    Journal Article
  5. 5

    SOA layers and layers safety definitions by Yesiltepe, Mirsat, Bozkurt, O. Ozgur

    “…Service-oriented architecture (SOA), the well-defined structure in which business functions are carried out by the service multiple applications through…”
    Get full text
    Conference Proceeding
  6. 6

    Web services for mobile devices from one server by Yesiltepe, Mirsat

    “…Mobile devices used for communication between people only for speaking people in the past but today one of the most personal kind devices in the cloud…”
    Get full text
    Conference Proceeding
  7. 7

    Web services for mobile devices from one server by Yesiltepe, Mirsat

    “…Mobile devices used for communication between people only for speaking people in the past but today one of the most personal kind devices in the cloud…”
    Get full text
    Conference Proceeding
  8. 8

    A Decision Support System for Diabetes Prediction Using Machine Learning and Deep Learning Techniques by Yahyaoui, Amani, Jamil, Akhtar, Rasheed, Jawad, Yesiltepe, Mirsat

    “…With the continuing increase in the number of the deadly diseases that threaten both human health and life, medical Decision Support Systems (DSS) continue to…”
    Get full text
    Conference Proceeding
  9. 9

    Noise Presence Detection in QR Code Images by Wardak, Ahmad Bilal, Rasheed, Jawad, Yahyaoui, Amani, Waziry, Sadaf, Alimovski, Erdal, Yesiltepe, Mirsat

    “…A quick response (QR) code is symbols used to encode information such as key identifiers (website addresses, product, etc.) that can be printed and scanned…”
    Get full text
    Conference Proceeding
  10. 10

    Hexadecimal Hash Value Hiding in a Message in Web Service against Deep Learning by Yesiltepe, Mirsat, Jamil, Akthar, Rasheed, Jawad, Kurulay, Muhammet

    “…One of the main aim of information security is to communicate information from the one environment to the other. This is one of the main purposes of message…”
    Get full text
    Conference Proceeding
  11. 11

    Effects of Glow Data Augmentation on Face Recognition System based on Deep Learning by Rasheed, Jawad, Alimovski, Erdal, Rasheed, Ahmad, Sirin, Yahya, Jamil, Akhtar, Yesiltepe, Mirsat

    “…Biometric artificial intelligence application depends on amount of material on which they are trained. In this paper, we integrated Glow data augmentation…”
    Get full text
    Conference Proceeding
  12. 12

    A Deep Learning-based Method for Turkish Text Detection from Videos by Rasheed, Jawad, Jamil, Akhtar, Dogru, Hasibe Busra, Tilki, Sahra, Yesiltepe, Mirsat

    “…The text appearing in videos provides useful information, which can be exploited for developing automatic video indexing and retrieval systems. In this study,…”
    Get full text
    Conference Proceeding
  13. 13

    Protocols of cipher suite by Yesiltepe, Mirsat, Kose, Gulsah, Karadeniz, Sinem

    “…The value of software is proportional to the value of quality. Quality is one of the elements of security. There are two basic concepts that basically contains…”
    Get full text
    Conference Proceeding
  14. 14

    Study triple data encryption standart encryption algorithm in windows communication foundation environment by Yesiltepe, Mirsat, Kacmaz, Ece, Kurulay, Muhammet

    “…Today, the concept has left the place of the concept of the internet to cloud. But security is still a problem in web services continues to be, as in all…”
    Get full text
    Conference Proceeding