Search
Now showing items 1-10 of 27
Validating android permission requests by analyzing APP descriptions
(2016-07)
Android applications can access sensitive user data if they are granted certain permissions. Android security model gives users the responsibility to approve permission requests of applications. For this, a user needs to ...
A healthcare inventory problem with both reliable and unreliable supply channels
(2016-05)
In this study, we investigate the inventory review policy for a healthcare facility to minimize the impact of inevitable drug shortages when an alternative reliable supplier is present. A continuous-time stochastic process ...
DILAF: A framework for distributed analysis of large-scale system logs for anomaly detection
(Wiley, 2019-02)
System logs constitute a rich source of information for detection and prediction of anomalies. However, they can include a huge volume of data, which is usually unstructured or semistructured. We introduce DILAF, a framework ...
Using machine learning tools for forecasting natural gas consumption in the province of Istanbul
(Elsevier, 2019-05)
Commensurate with unprecedented increases in energy demand, a well-constructed forecasting model is vital to managing energy policies effectively by providing energy diversity and energy requirements that adapt to the ...
A platform for personal e-mobility with route forecasting
(IEEE, 2020)
This study reports a new e-mobility platform to construct effective usage of charging points by electric vehicle users to eliminate long charge durations. The e-mobility platform includes such subsystems as smartphones, ...
Polarity classification of twitter messages using audio processing
(Elsevier, 2020-11)
Polarity classification is one of the most fundamental problems in sentiment analysis. In this paper, we propose a novel method, Sound Cosine Similaritye Matching, for polarity classification of Twitter messages which ...
A platform for personal e-mobility with route forecasting
(2021-01-14)
Decreasing fossil fuel sources and increasing carbon exhaust rate makes human-beings lead to search on different technological fields and to develop new technology. Also, thanks to developing tendency to the clean energy ...
An actor-critic reinforcement learning approach for bilateral negotiation
Designing an effective and intelligent bidding strategy is one of the most compelling research challenges in automated negotiation, where software agents negotiate with each other to find a mutual agreement when there is ...
Explorations on inverse reinforcement learning for the analysis of motor control and cognitive decision making mechanisms of the brain
Reinforcement Learning is a framework for generating optimal policies given a task and a reward/punishment structure. Likewise, Inverse Reinforcement Learning, as the name suggests, is used for recovering the reasoning ...
A distributed blacklisting protocol for iot device classification using the hashgraph consensus algorithm
Industrial applications require highly reliable, secure, low-power and low-delay communications. However, wireless communication links in the industrial environment suffer from various channel impairments which can compromise ...
Share this page