Browsing Computer Science by Author "2"
Now showing items 41-60 of 82
-
Minimal sign representation of boolean functions: algorithms and exact results for low dimensions
Sezener, Can Eren; Öztop, Erhan (MIT Press, 2015-08)Boolean functions (BFs) are central in many fields of engineering and mathematics, such as cryptography, circuit design, and combinatorics. Moreover, they provide a simple framework for studying neural computation mechanisms ... -
A multi-channel real time implementation of dual tree complex wavelet Transform in field programmable gate arrays
Canbay, F.; Levent, Vecdi Emre; Serbes, G.; Uğurdağ, Hasan Fatih (Springer International Publishing, 2016)In medical applications, biomedical acquisition systems (BASs) are frequently used in order to diagnose and monitor critical conditions such as stroke, epilepsy, Alzheimer disease, arrhythmias and etc. Biomedical signals ... -
Multi-lingual depression-level assessment from conversational speech using acoustic and text features
Özkanca, Yasin Serdar; Demiroğlu, Cenk; Besirli, A.; Çelik, S. (International Speech Communication Association, 2018)Depression is a common mental health problem around the world with a large burden on economies, well-being, hence productivity, of individuals. Its early diagnosis and treatment are critical to reduce the costs and even ... -
Multivariate sensor data analysis for oil refineries and multi-mode identification of system behavior in real-time
Khodabakhsh, Athar; Arı, İsmail; Bakır, M.; Ercan, Ali Özer (IEEE, 2018)Large-scale oil refineries are equipped with mission-critical heavy machinery (boilers, engines, turbines, and so on) and are continuously monitored by thousands of sensors for process efficiency, environmental safety, and ... -
Nearest neighbor approach in speaker adaptation for HMM-based speech synthesis
Mohammadi, Amir; Demiroğlu, Cenk (IEEE, 2013)Statistical speech synthesis (SSS) approach has become one of the most popular and successful methods in the speech synthesis field. Smooth speech transitions, without the spurious errors that are observed in unit selection ... -
Not all mistakes are equal
Şensoy, M.; Saleki, Maryam; Julier, S.; Aydoğan, Reyhan; Reid, J. (The ACM Digital Library, 2020)In many tasks, classifiers play a fundamental role in the way an agent behaves. Most rational agents collect sensor data from the environment, classify it, and act based on that classification. Recently, deep neural networks ... -
A novel runtime verification solution for LoT systems
İnçki, Koray; Arı, İsmail (IEEE, 2018)Internet of Things (IoT) systems promise a seamless connected world with machines integrating their services without human intervention. It's highly probable that the entities participating in such autonomous machine to ... -
Observing interoperability of IoT systems through model-based testing
İnçki, Koray; Arı, İsmail (Springer Nature, 2018)Internet of Things (IoT) has drastically modified the industrial services provided through autonomous machine-to-machine interactions. Such systems comprise of devices manufactured by various suppliers. Verification is a ... -
OCR-aided person annotation and label propagation for speaker modeling in TV shows
Budnik, M.; Besacier, L.; Khodabakhsh, Ali; Demiroğlu, Cenk (IEEE, 2016)In this paper, we present an approach for minimizing human effort in manual speaker annotation. Label propagation is used at each iteration of an active learning cycle. More precisely, a selection strategy for choosing the ... -
On characterizing sectoral interactions via connections between employees in professional online social networks
Ayvaz, Demet; Gürsun, Gonca; Özlale, Ümit (Elsevier, 2018-12)The collaboration among individuals is essential to maximize economic efficiency. Today most of the technological and economical advancements require multidisciplinary efforts. Therefore promoting interaction and knowledge ... -
On context-aware DDoS attacks using deep generative networks
Gürsun, Gonca; Şensoy, Murat; Kandemir, Melih (IEEE, 2018-10)Distributed Denial of Service (DDoS) attacks continue to be one of the most severe threats in the Internet. The intrinsic challenge in preventing DDoS attacks is to distinguish them from legitimate flash crowds since two ... -
Online association rule mining over fast data
Ölmezoğulları, Erdi; Arı, İsmail (IEEE, 2013)To extract useful and actionable information in real-time, the information technology (IT) world is coping with big data problems today. In this paper, we present implementation details and performance results of ReCEPtor, ... -
ÖZÜ konuşmacı doğrulama sisteminin çok sınıflı senaryoda NIST 2010 veritabanı ile başarımı
Yeşil, Fatih; Demiroğlu, Cenk (IEEE, 2011)Performance of the speaker verification systems is typically measured based on their binary decision accuracy. However, in speaker verification applications where close to %100 accuracy is required, such as the systems ... -
Pedestrian tracking in outdoor spaces of a suburban university campus for the investigation of occupancy patterns
Göçer, Özgür; Göçer, K.; Özcan, Barış; Bakovic, M.; Kıraç, Mustafa Furkan (Elsevier, 2019-02)The design of a livable and comfortable environment has been one of the main aims of sustainable university campus design. The creation of outdoor spaces for accommodating amenities has a positive effect on users with ... -
Performance of the OZU speaker verification systems with the NIST SRE 2010 data in a multi-class scenario
Yeşil, Fatih; Demiroğlu, Cenk (IEEE, 2012)Konuşmacı doğrulama sistemlerinin başarımı tipik olarak ikili karar mekanizmasına dayanır. Yine de finans şirketlerinin çağrı merkezi gibi 100%’ e yakın kesinlik gerektiren uygulamalarda var olan sistemlerin ikili kararlarına ... -
Policy conflict resolution in IoT via planning
Göynügür, Emre; Bernardini, S.; Mel, G. de; Talamadupula, K.; Şensoy, Murat (Advances in Artificial Intelligence, 2017)With the explosion of connected devices to automate tasks, manually governing interactions among such devices—and associated services—has become an impossible task. This is because devices have their own obligations and ... -
Postprocessing synthetic speech with a complex cepstrum vocoder for spoofing phase-based synthetic speech detectors
Demiroğlu, Cenk; Buyuk, O.; Khodabakhsh, Ali; Maia, R. (IEEE, 2017-06)State-of-the-art speaker verification systems are vulnerable to spoofing attacks. To address the issue, high-performance synthetic speech detectors (SSDs) for existing spoofing methods have been proposed. Phase-based SSDs ... -
Privacy enforcement through policy extension
Arunkumar, S.; Srivatsa, M.; Soyluoglu, Berker; Şensoy, Murat; Cerutti, F. (IEEE, 2016)Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility ... -
Quickly starting media streams using QUIC
Arısu, Şevket; Beğen, Ali Cengiz (Association for Computing Machinery, Inc, 2018-06-12)Originally proposed by Google, QUIC is a low-latency transport protocol currently being developed and specified in the IETF. QUIC's low-latency, improved congestion control, multiplexing features are promising and may help ... -
Rafinerilerdeki büyük veri problemlerine gerçek-zamanlı veri uzlaştırma çözümleri
Bakır, M.; Aydoğan, B.; Aydın, M.; Khodabakhsh, Athar; Arı, İsmail; Ercan, Ali Özer (IEEE, 2014)Rafineriler tonlarca ham petrolün, her gün faklı kimyasal işlemden geçirilerek benzine ve diğer yan ürünlere dönüştürüldüğü dev endüstriyel tesislerdir. Bu makalede sensör-tabanlı petrol rafinelerine özel endüstriyel büyük ...
Share this page