Browsing Computer Science by Author "Özyeğin University"
Now showing items 341-360 of 546
-
Multivariate sensor data analysis for oil refineries and multi-mode identification of system behavior in real-time
Khodabakhsh, Athar; Arı, İsmail; Bakır, M.; Ercan, Ali Özer (IEEE, 2018)Large-scale oil refineries are equipped with mission-critical heavy machinery (boilers, engines, turbines, and so on) and are continuously monitored by thousands of sensors for process efficiency, environmental safety, and ... -
Mutation testing of PL/SQL programs
Tarımcı, A. B.; Sözer, Hasan (Elsevier, 2022-10)Mutation testing is a prominent technique for evaluating the effectiveness of a test suite. Existing tools developed for supporting this technique are applicable for mainstream programming languages like C and Java. Mutation ... -
NatiQ: An end-to-end text-to-speech system for arabic
Abdelali, A.; Durrani, N.; Demiroğlu, Cenk; Dalvi, F.; Mubarak, H.; Darwish, K. (Association for Computational Linguistics (ACL), 2022)NatiQ is end-to-end text-to-speech system for Arabic. Our speech synthesizer uses an encoder-decoder architecture with attention. We used both tacotron-based models (tacotron-1 and tacotron-2) and the faster transformer ... -
Natural language features for detection of Alzheimer's disease in conversational speech
Khodabakhsh, Ali; Kuşçuoğlu, Serhan; Demiroğlu, Cenk (IEEE, 2014)Automatic monitoring of the patients with Alzheimer's disease and diagnosis of the disease in early stages can have a significant impact on the society. Here, we investigate an automatic diagnosis approach through the use ... -
A near Pareto optimal approach to student–supervisor allocation with two sided preferences and workload balance
Sanchez-Anguix, V.; Chalumuri, R.; Aydoğan, Reyhan; Julian, V. (Elsevier, 2019-03)The problem of allocating students to supervisors for the development of a personal project or a dissertation is a crucial activity in the higher education environment, as it enables students to get feedback on their work ... -
Nearest neighbor approach in speaker adaptation for HMM-based speech synthesis
Mohammadi, Amir; Demiroğlu, Cenk (IEEE, 2013)Statistical speech synthesis (SSS) approach has become one of the most popular and successful methods in the speech synthesis field. Smooth speech transitions, without the spurious errors that are observed in unit selection ... -
Need for low latency: Media over QUIC
Gürel, Zafer; Civelek, Tuğçe Erkılıç; Beğen, Ali Cengiz (ACM, 2023-06-16)This paper overviews developing a low-latency solution for media ingest and distribution, the work undertaken by the IETF's new Media over QUIC (moq) working group. It summarizes the motivation, goals, current work and ... -
NEEL: The nested complex event language for real-time event analytics
Liu, M.; Rundensteiner, E. A.; Dougherty, D.; Gupta, C.; Wang, S.; Arı, İsmail; Mehta, A. (Springer International Publishing, 2011)Complex event processing (CEP) over event streams has become increasingly important for real-time applications ranging from health care, supply chain management to business intelligence. These monitoring applications submit ... -
Negotiation for incentive driven privacy-preserving information sharing
Aydoğan, Reyhan; Øzturk, P.; Razeghi, Yousef (Springer International Publishing, 2017)This paper describes an agent-based, incentive-driven, and privacy-preserving information sharing framework. Main contribution of the paper is to give the data provider agent an active role in the information sharing process ... -
-
Networking standards
Beğen, Ali Cengiz; Bök, P. B.; Saltsidis, P. (IEEE, 2017-03)The article in this special section focus on the market for new networking technologies. Networking technologies are advancing faster than ever before. Aspects driving this change in velocity is the need to support faster, ... -
NFT primary sale price and secondary sale prediction via deep learning
Seyhan, Betül; Sefer, Emre (Association for Computing Machinery, Inc, 2023-11-27)Non Fungible Tokens (NFTs) are blockchain-based unique digital assets defining ownership deeds. They can characterize various different objects such as collectible, art, and in-game items. In general, NFTs are encoded by ... -
Not all mistakes are equal
Şensoy, M.; Saleki, Maryam; Julier, S.; Aydoğan, Reyhan; Reid, J. (The ACM Digital Library, 2020)In many tasks, classifiers play a fundamental role in the way an agent behaves. Most rational agents collect sensor data from the environment, classify it, and act based on that classification. Recently, deep neural networks ... -
Nova: Value-based negotiation of norms
Aydoğan, Reyhan; Kafali, Ö.; Jonker, C. M.; Singh, M. P. (ACM, 2021-08-01)Specifying a normative multiagent system (nMAS) is challenging, because different agents often have conflicting requirements. Whereas existing approaches can resolve clear-cut conflicts, tradeoffs might occur in practice ... -
A novel GBT-based approach for cross-channel fraud detection on real-world banking transactions
Dolu, U.; Sefer, Emre (IEEE, 2022)The most recent research on hundreds of financial institutions uncovered that only 26 % of them have a team assigned to detect cross-channel fraud. Due to the developing technologies, various fraud techniques have emerged ... -
A novel intelligent approach for detecting DoS flooding attacks in software-defined networks
Latah, Majd; Toker, L. (Universitas Ahmad Dahlan, 2018-03)Software-Defined Networking (SDN) is an emerging networking paradigm that provides an advanced programming capability and moves the control functionality to a centralized controller. This paper proposes a two-stage novel ... -
A novel runtime verification solution for LoT systems
İnçki, Koray; Arı, İsmail (IEEE, 2018)Internet of Things (IoT) systems promise a seamless connected world with machines integrating their services without human intervention. It's highly probable that the entities participating in such autonomous machine to ... -
NTIRE 2022 challenge on night photography rendering
Ershov, E.; Kınlı, Osman Furkan; Menteş, Sami; Özcan, Barış; Kıraç, Mustafa Furkan (IEEE, 2022)This paper reviews the NTIRE 2022 challenge on night photography rendering. The challenge solicited solutions that processed RAW camera images captured in night scenes to produce a photo-finished output image encoded in ... -
NTIRE 2023 challenge on night photography rendering
Shutova, A.; Kınlı, Osman Furkan; Özcan, Barış; Kıraç, Mustafa Furkan (IEEE, 2023)This paper presents a review of the NTIRE 2023 challenge on night photography rendering. The goal of the challenge was to find solutions that process raw camera images taken in nighttime conditions conditions, and thereby ... -
Objective and subjective QoE evaluation for adaptive point cloud streaming
Van Der Hooft, J.; Vega, M. T.; Timmerer, C.; Beğen, Ali Cengiz; De Turck, F.; Schatz, R. (IEEE, 2020-05)Volumetric media has the potential to provide the six degrees of freedom (6DoF) required by truly immersive media. However, achieving 6DoF requires ultra-high bandwidth transmissions, which real-world wide area networks ...
Share this page