xmlui.ArtifactBrowser.ConfigurableBrowse.title.metadata.type
Toplam kayıt 26, listelenen: 1-20
-
Acoustic Scene Classification Using Spatial Pyramid Pooling With Convolutional Neural Networks
(2019)Automatic understanding of audio events and acoustic scenes has been an active research topic for researchers from signal processing and machine learning communities. Recognition of acoustic scenes in the real life scenarios ... -
Anomaly Detection in Smart Home Environments using Convolutional Neural Network
(2021)The use of smart devices in home environments has been increasing in recent years. The wireless connection of these devices to the internet enables smart homes to be built with less cost and hence, recognition of activities ... -
Applications of Deep Learning Techniques to Wood Anomaly Detection
(2022)Wood products and structures have an important place in today's industry. They are widely used in many fields. However, there are various difficulties in production systems where wood raw material is under many processes. ... -
Benefiting from the popular films integrated into the curriculum in boosting the efficacy of the social work education
(2014)Benefiting from visuals both in every facet of social sciences in broad terms and in social work education in narrow terms improves students learning significantly. It is a known fact that learning a material by heating, ... -
A Component Based Model Developed for Machine Tool Selection Decisions
(2020)Machine tools are widely used in manufacturing sectors; such as automotive industry, metal cutting industry, aerospace industry etc. Purchase of a machine tool is a long-term capital investment decision and requires a high ... -
Daphnet Freezing Recognition with Gait Data by Using Machine Learning Algorithms
(2020)The aim of this study was to test the success of the data set obtained by a wearable health assistant developed for the symptom of freezing (FOG) in gait of Parkinson's patients and to increase the success of the system. ... -
A Deep LSTM Approach for Activity Recognition
(2019)Since 1990s, activity recognition effectual field in machine learning literature. Most of studies that relevant activity recognition, use feature extraction method to achieve higher classification performance. Moreover, ... -
Detecting COVID-19 from Respiratory Sound Recordings with Transformers
(2022)Auscultation is an established technique in clinical assessment of symptoms for respiratory disorders. Auscultation is safe and inexpensive, but requires expertise to diagnose a disease using a stethoscope during hospital ... -
Distributed Database Design: A Case Study
(2014)Data Allocation is an important problem in Distributed Database Design. Generally, evolutionary algorithms are used to determine the assignments of fragments to sites. Data Allocation Algorithms should handle replication, ... -
Explaining intrapreneurial behaviors of employees with perceived organizational climate and testing the mediating role of organizational identification: A research study among employees of Turkish innovative firms
(2014)This study examines perceived organizational climate and organizational identification as potential antecedents of employees' intrepreneurial behaviors. In particular, the study suggests positive relationships between ... -
How Elementary School Principals' Change Tendencies Are Related With Their Opinion About Curriculum Change
(2014)Leadership is important in change process and change management. Turkish educational system is undergoing a constant change. One of those changes was the change of the elementary school curricula, which had been accepted ... -
IS THERE A WAY OUT FOR THE TURKISH ECONOMY?
(2019)International trade is one of the most important issues of macroeconomics. Almost all international trade theories have tried to determine which country produces what, for which price it sells its products to whom. In a ... -
Ka Band Far Field Radio Link System Based on OAM Multiplexed Vortex Beams Collimated by a Paraboloidal Reflector
(2021)Electromagnetic vortex-waves (VW) have linear azimuthal-phase, orthogonality in azimuth and orbital-angular-momentum (OAM). The VW-pattern has a null along the vorticity-axis and the cone-half-angle (CHA) and the beam-width ... -
Multiple Service Home Health Care Routing and Scheduling Problem: A Mathematical Model
(2020)The home health care routing and scheduling problem (HHCRSP) is an extension of the vehicle routing problem (VRP) that are scheduled and routed to perform a wide range of health care services. Nurses, doctors and/or ... -
A New Modeling Approach for Stability of Micro/Nano Bubbles
(2021)Microbubbles and nanobubbles have several characteristics that are comparable with millimeter- and centimeter-sized bubbles. These characteristics are their small size, which results in large surface area and high bioactivity, ... -
A New Recombination Operator for the Genetic Algorithm Solution of the Quadratic Assignment Problem
(2014)The Quadratic Assignment Problem (QAP) is a well known combinatorial optimization problem with a diverse set of applications. It can be transformed into many problems such as the travelling salesman, weapon target assignment, ... -
Objective Pain Assessment Using Vital Signs
(2020)Pain is considered as an emotional experience and unrestful feeling associated with tissue damage. The feeling of pain occurs when the interpretation starts in brain; as a signal is sent through nerve fiber to the brain. ... -
On computer-aided prognosis of septic shock from vital signs
(2019)Sepsis is a life-threatening condition due to the reaction to an infection. With certain changes in circulatory system, sepsis may progress to septic shock if it is left untreated. Therefore, early prognosis of septic shock ... -
Order Acceptance and Scheduling Problem: A Proposed Formulation and the Comparison with the Literature
(2020)In classical scheduling problem, it is assumed that all orders must be processed. In the order acceptance and scheduling (OAS) problem, some orders are rejected due to limited capacity. In make-to-order production environment, ... -
Policy Misuse Detection in Communication Networks with Hidden Markov Models
(2014)With the recent advances in computer networking applications, Intrusion Detection Systems (IDS) are widely used to detect the malicious connections in computer networks. IDS provide a high level security between organizations ...