Search Results - "Yesiltepe, Mirsat"
-
1
A Hybrid CNN and RNN Variant Model for Music Classification
Published in Applied sciences (01-02-2023)“…Music genre classification has a significant role in information retrieval for the organization of growing collections of music. It is challenging to classify…”
Get full text
Journal Article -
2
An Efficient Machine Learning-Based Model to Effectively Classify the Type of Noises in QR Code: A Hybrid Approach
Published in Symmetry (Basel) (01-10-2022)“…Granting smart device consumers with information, simply and quickly, is what drives quick response (QR) codes and mobile marketing to go hand in hand. It…”
Get full text
Journal Article -
3
N-gram based approach to recognize the twitter accounts of Turkish daily newspapers
Published in 2017 International Artificial Intelligence and Data Processing Symposium (IDAP) (01-09-2017)“…Twitter is one of the most popular social media networks in the world. It is also mostly used by corporate companies, media as well as individual users. Media…”
Get full text
Conference Proceeding -
4
Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users
Published in Security and communication networks (01-01-2018)“…At present, the notion of a cloud has expanded so much that there is no area of knowledge other than the concept of cloud. The most important reason for this…”
Get full text
Journal Article -
5
SOA layers and layers safety definitions
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01-04-2016)“…Service-oriented architecture (SOA), the well-defined structure in which business functions are carried out by the service multiple applications through…”
Get full text
Conference Proceeding -
6
Web services for mobile devices from one server
Published in 2018 20th International Conference on Advanced Communication Technology (ICACT) (01-02-2018)“…Mobile devices used for communication between people only for speaking people in the past but today one of the most personal kind devices in the cloud…”
Get full text
Conference Proceeding -
7
Web services for mobile devices from one server
Published in 2018 20th International Conference on Advanced Communication Technology (ICACT) (01-02-2018)“…Mobile devices used for communication between people only for speaking people in the past but today one of the most personal kind devices in the cloud…”
Get full text
Conference Proceeding -
8
A Decision Support System for Diabetes Prediction Using Machine Learning and Deep Learning Techniques
Published in 2019 1st International Informatics and Software Engineering Conference (UBMYK) (01-11-2019)“…With the continuing increase in the number of the deadly diseases that threaten both human health and life, medical Decision Support Systems (DSS) continue to…”
Get full text
Conference Proceeding -
9
Noise Presence Detection in QR Code Images
Published in 2022 12th International Conference on Advanced Computer Information Technologies (ACIT) (26-09-2022)“…A quick response (QR) code is symbols used to encode information such as key identifiers (website addresses, product, etc.) that can be printed and scanned…”
Get full text
Conference Proceeding -
10
Hexadecimal Hash Value Hiding in a Message in Web Service against Deep Learning
Published in 2019 11th International Conference on Electrical and Electronics Engineering (ELECO) (01-11-2019)“…One of the main aim of information security is to communicate information from the one environment to the other. This is one of the main purposes of message…”
Get full text
Conference Proceeding -
11
Effects of Glow Data Augmentation on Face Recognition System based on Deep Learning
Published in 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (01-06-2020)“…Biometric artificial intelligence application depends on amount of material on which they are trained. In this paper, we integrated Glow data augmentation…”
Get full text
Conference Proceeding -
12
A Deep Learning-based Method for Turkish Text Detection from Videos
Published in 2019 11th International Conference on Electrical and Electronics Engineering (ELECO) (01-11-2019)“…The text appearing in videos provides useful information, which can be exploited for developing automatic video indexing and retrieval systems. In this study,…”
Get full text
Conference Proceeding -
13
Protocols of cipher suite
Published in 2016 Electric Electronics, Computer Science, Biomedical Engineerings' Meeting (EBBT) (01-04-2016)“…The value of software is proportional to the value of quality. Quality is one of the elements of security. There are two basic concepts that basically contains…”
Get full text
Conference Proceeding -
14
Study triple data encryption standart encryption algorithm in windows communication foundation environment
Published in 2016 Electric Electronics, Computer Science, Biomedical Engineerings' Meeting (EBBT) (01-04-2016)“…Today, the concept has left the place of the concept of the internet to cloud. But security is still a problem in web services continues to be, as in all…”
Get full text
Conference Proceeding