Browsing Computer Science by Author "2"
Now showing items 1-20 of 88
-
Adaptive domain-specific service monitoring
Ünsal, A. A.; Sazara, G.; Aktemur, Tankut Barış; Sözer, Hasan (Springer Science+Business Media, 2014)We propose an adaptive and domain-specific service monitoring approach to detect partner service errors in a cost-effective manner. Hereby, we not only consider generic errors such as file not found or connection timed ... -
Adaptive inverse kinematics of a 9-DOF surgical robot for effective manipulation
Sunal, Begüm; Öztop, Erhan; Bebek, Özkan (IEEE, 2019)In a robotic-assisted surgical system, fine and precise movement is essential. However, when the user wishes to cover a wider area during tele-operation, the configuration designed for precise motion may restrict the user ... -
Analysis of energy harvesting for green cognitive radio networks
Ercan, Ali Özer; Sunay, Mehmet Oğuz; Pollin, S. (IEEE, 2014)This paper develops a Markov Chain analysis framework for an RF energy harvesting cognitive radio network where the secondary system users are furnished with finite-sized batteries. We consider a network where the only ... -
Analysis of speaker similarity in the statistical speech synthesis systems using a hybrid approach
Güner, Ekrem; Mohammadi, A.; Demiroğlu, Cenk (IEEE, 2012)Statistical speech synthesis (SSS) approach has become one of the most popular and successful methods in the speech synthesis field. Smooth speech transitions, without the spurious errors that are observed in unit selection ... -
Analysis of speech-based measures for detecting and monitoring Alzheimer’s disease
Khodabakhsh, Ali; Demiroğlu, Cenk (Springer Science+Business Media, 2014)Automatic diagnosis of the Alzheimer’s disease as well as monitoring of the diagnosed patients can make significant economic impact on societies. We investigated an automatic diagnosis approach through the use of speech ... -
Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance
Wu, Z.; Leon, P. L. de; Demiroğlu, Cenk; Khodabakhsh, Ali (IEEE, 2016-04)In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis ... -
An area efficient real time implementation of dual tree complex wavelet transform in field programmable gate arrays
Canbay, F.; Levent, Vecdi Emre; Serbes, G.; Uğurdağ, Hasan Fatih; Goren, S.; Aydin, N. (IEEE, 2015)Biomedical signals (BSs), which give information about the normal condition and also the inherent irregularities of our body, are expected to have non-stationary character due to the time-varying behavior of physiological ... -
Automated classification of static code analysis alerts: a case study
Yüksel, Ulaş; Sözer, Hasan (IEEE, 2013)Static code analysis tools automatically generate alerts for potential software faults that can lead to failures. However, developers are usually exposed to a large number of alerts. Moreover, some of these alerts are ... -
Automatic fall detection for elderly by using features extracted from skeletal data
Davari, Amir; Aydin, T; Erdem, Tanju (IEEE, 2013)Automatic detection of unusual events such as falls is very important especially for elderly people living alone. Realtime detection of these events can reduce the health risks associated with a fall. In this paper, we ... -
Autotuning runtime specialization for sparse matrix-vector multiplication
Yılmaz, Buse; Aktemur, Tankut Barış; Garzaran, M. J.; Kamin, S.; Kıraç, Mustafa Furkan (ACM, 2016-04)Runtime specialization is used for optimizing programs based on partial information available only at runtime. In this paper we apply autotuning on runtime specialization of Sparse Matrix-Vector Multiplication to predict ... -
Büyük veri problemlerine çözüm olarak veri akış madenciliği
Ölmezoğulları, Erdi; Arı, İsmail; Çelebi, Ö. F.; Ergüt, S. (IEEE, 2013)Günümüzde bilişim dünyası faydalı bilgiye ulaşma yolunda “büyük veri” problemleri (verinin kütlesi, hızı, çeşitliliği, tutarsızlığı) ile baş etmeye çalışmaktadır. Bu makalede, büyük veri akışları üzerinde İlişkisel Kural ... -
Collective voice of experts in multilateral negotiation
Güneş, Taha Doğan; Arditi, Emir; Aydoğan, Reyhan (Springer International Publishing, 2017)Inspired from the ideas such as “algorithm portfolio”, “mixture of experts”, and “genetic algorithm”, this paper presents two novel negotiation strategies, which combine multiple negotiation experts to decide what to bid ... -
Combined AES + AEGIS architectures for high performance and lightweight security applications
Şahin, Furkan; Uğurdağ, Hasan Fatih; Yalçın, T. (Springer International Publishing, 2014)AES has been the prominent block cipher since its introduction as the standard. It has been the cipher used in almost all new applications that require solid, unbreakable security with reasonable resource usage. Several ... -
Combining semantic web and IoT to reason with health and safety policies
Göynügür, Emre; Şensoy, Murat; Mel, G. de (IEEE, 2018-01-12)Monitoring and following health and safety regulations are especially important - but made difficult - in hazardous work environments such as underground mines to prevent work place accidents and illnesses. Even though ... -
Cross-lingual speaker adaptation for statistical speech synthesis using limited data
Sarfjoo, Seyyed Saeed; Demiroğlu, Cenk (Interspeech, 2016)Cross-lingual speaker adaptation with limited adaptation data has many applications such as use in speech-to-speech translation systems. Here, we focus on cross-lingual adaptation for statistical speech synthesis (SSS) ... -
Data stream analytics and mining in the cloud
Arı, İsmail; Ölmezoğulları, Erdi; Çelebi, Ö. F. (IEEE, 2012)Due to prevalent use of sensors and network monitoring tools, big volumes of data or “big data” today traverse the enterprise data processing pipelines in a streaming fashion. While some companies prefer to deploy their ... -
Deep reinforcement learning for acceptance strategy in bilateral negotiations
Razeghi, Yousef; Yavuz, Ozan; Aydoğan, Reyhan (TÜBİTAK, 2020)This paper introduces an acceptance strategy based on reinforcement learning for automated bilateral negotiation, where negotiating agents bargain on multiple issues in a variety of negotiation scenarios. Several acceptance ... -
Democratization of runtime verification for internet of things
İnçki, Koray; Arı, İsmail (Elsevier, 2018-05)Internet of Things (IoT) devices have gained more prevalence in ambient assisted living (AAL) systems. Reliability of AAL systems is critical especially in assuring the safety and well-being of elderly people. Runtime ... -
Design and implementation of a cloud computing service for finite element analysis
Arı, İsmail; Muhtaroğlu, Nitel (Elsevier, 2013-06)This paper presents an end-to-end discussion on the technical issues related to the design and implementation of a new cloud computing service for finite element analysis (FEA). The focus is specifically on performance ... -
Dynamic movement primitives for human movement recognition
Pehlivan, Alp Burak; Öztop, Erhan (IEEE, 2015)Dynamic Movement Primitives (DMPs)-originally a method for movement trajectory generation [1] has been also used for recognition tasks [2, 3]. However there has not been a systematic comparison between other recognition ...
Share this page