Browsing Computer Science by Author "Özyeğin University"
Now showing items 161-180 of 546
-
Emergent emotion via neural computational energy conservation on a humanoid robot
Kırtay, Murat; Öztop, Erhan (IEEE, 2013)This paper presents our initial work on how emotion based behaviors may emerge through computational mechanisms. We hold that in addition to basic emotions such as anger and fear that serves bodily well being of the organism, ... -
Emotion as an emergent phenomenon of the neurocomputational energy regulation mechanism of a cognitive agent in a decision-making task
Kırtay, M.; Vannucci, L.; Albanese, U.; Laschi, C.; Öztop, Erhan; Falotico, E. (Sage, 2021-02)Biological agents need to complete perception-action cycles to perform various cognitive and biological tasks such as maximizing their wellbeing and their chances of genetic continuation. However, the processes performed ... -
Enabling difference-based dynamic partial self reconfiguration for large differences
Gören, S.; Özkurt, Ö.; Türk, Y.; Yıldız, A.; Uğurdağ, Hasan Fatih (IEEE, 2013)This paper presents a new Dynamic Partial Self Reconfiguration (DPSR) flow for Xilinx FPGAs. Leveraging the Xilinx FPGA Editor and PlanAhead tools, we provide two implementation approaches that enable partial reconfiguration ... -
Enabling smart environments through scalable policy reasoning and Internet of Things
Göynügür, Emre; Şensoy, Murat; de Mel, G. (Wiley, 2019-04)In this paper, we discuss how to combine ontology-based policy reasoning mechanisms with in-use Internet of Things applications to customize and automate device behaviors. We discuss how the policy framework can be extended ... -
Enhancing MPEG DASH performance via server and network assistance
Thomas, E.; Deventer, M.O. van; Stockhammer, T.; Beğen, Ali Cengiz; Famaey, J. (IEEE, 2017)MPEG-Dynamic Adaptive Streaming over HTTP (DASH) provides formats that are suitable to stream media content over HTTP. Typically, the DASH client adaptively requests small chunks of media based on the available bandwidth ... -
EPIoT: Enhanced privacy preservation based blockchain mechanism for internet-of-things
Kashif, Muhammad; Çakmakçı, Kübra Kalkan (Elsevier, 2024-01)With the increasing popularity of the Internet of things (IoT) and giving the end users the opportunity of collecting and analyzing the data by these IoT devices give rise to ultimate privacy concern and is attracting ... -
Evaluating software architecture erosion for PL/SQL programs
Altınışık, M.; Ersoy, E.; Sözer, Hasan (The ACM Digital Library, 2017)PL/SQL procedures are grouped into packages for providing modularity. These procedures are indirectly coupled due to their use of common database tables. We define a cohesion metric and cluster PL/SQL procedures based on ... -
Evaluating the effectiveness of multi-level greedy modularity clustering for software architecture recovery
Sözer, Hasan (Springer Nature, 2019)Software architecture recovery approaches mainly analyze various types of dependencies among software modules to group them and reason about the high-level structural decomposition of a system. These approaches employ a ... -
Evaluating the English-Turkish parallel treebank for machine translation
Görgün, O.; Yıldız, Olcay Taner (TÜBİTAK, 2022)This study extends our initial efforts in building an English-Turkish parallel treebank corpus for statistical machine translation tasks. We manually generated parallel trees for about 17K sentences selected from the Penn ... -
Evaluating the performance of apple’s low-latency HLS
Durak, Kerem; Akçay, Mehmet Necmettin; Erinç, Yiğit Kemal; Pekel, Boran; Beğen, Ali Cengiz (IEEE, 2020-09-21)In its annual developers conference in June 2019, Apple has announced a backwards-compatible extension to its popular HTTP Live Streaming (HLS) protocol to enable low-latency live streaming. This extension offers new ... -
Evaluation of distributed machine learning algorithms for anomaly detection from large-scale system logs: a case study
Astekin, M.; Zengin, H.; Sözer, Hasan (IEEE, 2018)Anomaly detection is a valuable feature for detecting and diagnosing faults in large-scale, distributed systems. These systems usually provide tens of millions of lines of logs that can be exploited for this purpose. ... -
Evaluation of linguistic and prosodic features for detection of Alzheimer’s disease in Turkish conversational speech
Khodabakhsh, Ali; Yesil, Fatih; Guner, Ekrem; Demiroğlu, Cenk (Springer Science+Business Media, 2015-12)Automatic diagnosis and monitoring of Alzheimer’s disease can have a significant impact on society as well as the well-being of patients. The part of the brain cortex that processes language abilities is one of the earliest ... -
Evidential deep learning to quantify classification uncertainty
Şensoy, Murat; Kaplan, L.; Kandemir, M. (Neural Information Processing Systems Foundation, 2018)Deterministic neural nets have been shown to learn effective predictors on a wide range of machine learning problems. However, as the standard approach is to train the network to minimize a prediction loss, the resultant ... -
EXPECTATION: Personalized explainable artificial intelligence for decentralized agents with heterogeneous knowledge
Calvaresi, D.; Ciatto, G.; Najjar, A.; Aydoğan, Reyhan; Van der Torre, L.; Omicini, A.; Schumacher, M. (Springer, 2021)Explainable AI (XAI) has emerged in recent years as a set of techniques and methodologies to interpret and explain machine learning (ML) predictors. To date, many initiatives have been proposed. Nevertheless, current ... -
Experimental studies on chemical concentration map building by a multi-robot system using bio-inspired algorithms
Turduev, M.; Cabrita, G.; Kırtay, Murat; Gazi, V.; Marques, L. (Springer Science+Business Media, 2014-01)In this article we describe implementations of various bio-inspired algorithms for obtaining the chemical gas concentration map of an environment filled with a contaminant. The experiments are performed using Khepera III ... -
Explain to me: Towards understanding privacy decisions
Aycı, G.; Şensoy, Murat; Özgür, A.; Yolum, P. (International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), 2023)Privacy assistants help users manage their privacy online. Their tasks could vary from detecting privacy violations to recommending sharing actions for content that the user intends to share. Recent work on these tasks are ... -
Explanation-based negotiation protocol for nutrition virtual coaching
Buzcu, Berk; Varadhajaran, V.; Tchappi, I.; Najjar, A.; Calvaresi, D.; Aydoğan, Reyhan (ACM, 2023)People’s awareness about the importance of healthy lifestyles is rising. This opens new possibilities for personalized intelligent health and coaching applications. In particular, there is a need for more than simple ... -
Exploration with intrinsic motivation using object–action–outcome latent space
Sener, M. İ.; Nagai, Y.; Öztop, Erhan; Uğur, E. (IEEE, 2023-06)One effective approach for equipping artificial agents with sensorimotor skills is to use self-exploration. To do this efficiently is critical, as time and data collection are costly. In this study, we propose an exploration ... -
Exploring scaling efficiency of intel loihi neuromorphic processor
Uludağ, Recep Buğra; Çaǧdaş, S.; Işler, Y. S.; Şengör, N. S.; Aktürk, İsmail (IEEE, 2023)In this paper, we focus on examining how scaling efficiency evolves in winner-take-all (WTA) network models on Intel Loihi neuromorphic processor, as network-related features such as network size, neuron type, and connectivity ... -
Extending static code analysis with application-specific rules by analyzing runtime execution traces
Ersoy, E.; Sözer, Hasan (Springer International Publishing, 2016)Static analysis tools cannot detect violations of application-specific rules. They can be extended with specialized checkers that implement the verification of these rules. However, such rules are usually not documented ...
Share this page