Browsing Master's Theses by Author "Şensoy, Murat"
Now showing items 1-8 of 8
-
Fusion of subjective opinions through behavior estimation
Aycı, Gönül (2016-01)Information is significantly important in almost all decision-making process. A decision- maker agent collects information from diverse sources. Thus, it should correctly fuse opinions, which are shared from different ... -
Increasing visual detail for tv watchers with color vision deficiencies by using image processing methods
Kırgız, Gamze (2018-05)There are three types of cone cells in the human retina that respond to different color spectrums. The signals generated by these cone cells are combined and the color information is interpreted. Color blindness, or color ... -
Intelligent information gathering for open world policy reasoning
Büyükyıldız, İrfan Can (2015-08)Sistem politikaları her birimin kendi hedeflerine ulaşmaya çalıştığı çoklu etmen sistemlerinde önemli bir rol oynamaktadır. Politikalar ve ilgili mekanizmalar birimlerin kötü niyetli ve istenmeyen faaliyetlerini engellemek ... -
Location-based access control and trust in location estimation
Soyluoğlu, Berker (2017-01)With the introduction of touchscreen smartphones our way of life changed. Indie developers are in a rush to find the next big thing. Available sensors and the powerful mobile operating systems made location aware applications ... -
Multi-scale binary similarity a local binary pattern variant for face recognition
Tavlı, Ahmet (2018-08)Face recognition problem were studied for more than four-decade, and many descriptors and neural network architectures have been proposed since then. The aim is simple, extract features from the same subjects for training ... -
Risk-calibrated evidential classifiers
Saleki, Maryam (2020-01-17)In some applications, intelligent agents rely on classifiers in order to make their decisions and accuracy of their predictions may play a significant role in performing their tasks successfully. Although deep neural ... -
Spoofing and anti-spoofing techniques for text-independent speaker verification systems
Khodabakhsh, Ali (2015-10)There has been substantial progress in the speaker verification field in recent years. I-vector based approach in particular received significant attention due to its high performance. Improvements in the verification ... -
Validating android permission requests by analyzing APP descriptions
Şahin, Mustafa Kaan (2016-07)Android applications can access sensitive user data if they are granted certain permissions. Android security model gives users the responsibility to approve permission requests of applications. For this, a user needs to ...
Share this page