Bilgisayar Mühendisliği Bölümü Koleksiyonu
Permanent URI for this collectionhttps://hdl.handle.net/20.500.11779/1940
Browse
Browsing Bilgisayar Mühendisliği Bölümü Koleksiyonu by Publisher "IEEE"
Now showing 1 - 20 of 50
- Results Per Page
- Sort Options
Conference Object Citation - Scopus: 2A Visualization Platfom for Disk Failure Analysis(IEEE, 2018) Arslan, Şuayb Şefik; Yiğit, İbrahim Onuralp; Zeydan, EnginIt has become a norm rather than an exception to observe multiple disks malfunctioning or whole disk failures in places like big data centers where thousands of drives operate simultaneously. Data that resides on these devices is typically protected by replication or erasure coding for long-term durable storage. However, to be able to optimize data protection methods, real life disk failure trends need to be modeled. Modelling helps us build insights while in the design phase and properly optimize protection methods for a given application. In this study, we developed a visualization platform in light of disk failure data provided by BackBlaze, and extracted useful statistical information such as failure rate and model-based time to failure distributions. Finally, simple modeling is performed for disk failure predictions to alarm and take necessary system-wide precautions.Conference Object Citation - WoS: 1Citation - Scopus: 1Adaptive Boosting of Dnn Ensembles for Brain-Computer Interface Spellers(IEEE, 2021) Çatak, Yiğit; Aksoy, Can; Özkan, Hüseyin; Güney, Osman Berke; Koç, Emirhan; Arslan, Şuayb ŞefikSteady-state visual evoked potentials (SSVEP) are commonly used in brain computer interface (BCI) applications such as spelling systems, due to their advantages over other paradigms. In this study, we develop a method for SSVEP-based BCI speller systems, using a known deep neural network (DNN), which includes transfer and ensemble learning techniques. We test performance of our method on publicly available benchmark and BETA datasets with leave-one-subject-out procedure. Our method consists of two stages. In the first stage, a global DNN is trained using data from all subjects except one subject that is excluded for testing. In the second stage, the global model is fine-tuned to each subject whose data are used in the training. Combining the responses of trained DNNs with different weights for each test subject, rather than an equal weight, provide better performance as brain signals may differ significantly between individuals. To this end, weights of DNNs are learnt with SAMME algorithm with using data belonging to the test subject. Our method significantly outperforms canonical correlation analysis (CCA) and filter bank canonical correlation analysis (FBCCA) methods.Conference Object Citation - Scopus: 2Alternative Data Sources and Psychometric Scales Supported Credit Scoring Models(IEEE, 2023) Şahin, Türkay; Filiz, Gözde; Çakar, Tuna; Özvural, Özden Gebizlioğlu; Nicat, ŞahinThis study aims to evaluate individuals with limited access to banking services and enhance credit scoring models with alternative data sources. A psychometric-based credit scoring model was developed and tested. Despite limited data, significant potential findings were obtained. However, clarification of the distinction between credit payment intention and ability and validation of the results with more data are necessary.Conference Object Citation - WoS: 15Citation - Scopus: 40An Overview of Blockchain Technologies: Principles, Opportunities and Challenges(IEEE, 2018) Arslan, Şuayb Şefik; Mermer, Gültekin Berahan; Zeydan, EnginBlokzincir, toplumumuzun birbiriyle iletişim kurma ve ticaret yapma biçiminde devrim yapma potansiyeline sahip, yakın zamanda ortaya çıkmış olan bir teknolojidir. Bu teknolojinin sağladığı en önemli avantaj aracı gerektiren bir oluşumda güvenilir bir merkezi kuruma ihtiyaç duymadan değer taşıyan işlemleri değiş tokuş edebilmesidir. Ayrıca, veri bütünlüğü, dahili orijinallik ve kullanıcı şeffaflığı sağlayabilir. Blokzincir, birçok yenilikçi uygulamanın temel alınacağı yeni internet olarak görülebilir. Bu çalışmada, genel çalışma prensibi, oluşan fırsatlar ve ileride karşılaşılabilecek zorlukları içerecek şekilde güncel blokzincir teknolojilerinin genel bir görünümünü sunmaktayız.Conference Object Citation - Scopus: 3An Xml Parser for Turkish Wikipedia(IEEE, 2019) Demir, Şeniz; Vardar, Uluç Furkan; Devran, İlkay TevfikNowadays, visual and written data that can be easily accessed over the internet has enabled the development of research in many different fields. However, the availability of data is not sufficient by itself. It is of great importance that these data can be effectively utilized and interpreted in accordance with the requirements. Access to written content in the Wikipedia encyclopedia, which is becoming increasingly common in Turkish natural language processing, can be done via XML dumps. In this study, our aim is to develop and demonstrate the applicability of an XML parser for the processing of Turkish Wikipedia dumps. The use of the open-source parser, which allows information extraction at different levels of granularity, is reported on pages containing biography infoboxes and textual contents.Conference Object Citation - Scopus: 1Analytical Approaches in Customer Relationship Management(IEEE, 2023) Akata, Mustafa Aşkım; Ergin, Kaan; Kaya, Büşra; Kızılay, Ayşe; Çakar, Tuna; Şahin, ZeynepThis study examines the impact of analytical customer relationship management (aCRM) strategies, specifically the segmentation approach using RFM analysis and artificial learning methods, on customer satisfaction, revenue performance, and loyalty in businesses. The research adopts an approach that integrates data from both online and offline channels onto a single platform, providing a holistic view of customer behaviors. Combining the segmentation obtained through RFM analysis and artificial learning methods with timely campaigns has enhanced shopping opportunities for customers and increased customer satisfaction and loyalty. The use of aCRM as a strategic marketing and sales tool has enabled businesses to manage customer relationships more effectively. This paper contributes to the literature in this field by presenting in detail the advantages offered by aCRM, its application methods, and the results obtained.Conference Object Analyzing Consumer Behavior: the Impact of Retro Music in Advertisements on a Chocolate Brand and Consumer Engagement(IEEE, 2023) Girişken, Yener; Soyaltın, Tuğçe Ezgi; Filiz, Gözde; Çakar, Tuna; Türkyılmaz, Ceyda AysunaThis study presents research utilizing binary classification models to analyze consumer behaviors such as chocolate consumption and retro music ad viewing. Retro music, with its potential to evoke nostalgic feelings in consumers, is used in advertisements, which can have a significant impact on brand perception and consumer engagement. Firstly, a model focusing on chocolate consumption was developed and tested. The model yields significant outcomes. Secondly, a model based on retro music ad viewing status was developed and tested. Significant potential findings were obtained. This study emphasizes the applicability of effective classification models that can be used to understand and predict consumer behaviors, yielding significant outcomes.Conference Object Analyzing Customer Churn: a Comparative Study of Machine Learning Models on Pay-Tv Subscribers in Turkey(IEEE, 2023) Obalı, Emir; Çalışkan, Sibel Kırmızıgül; Karani Yılmaz, Veysel; Kara, Erkan; Meşe, Yasemin Kürtcü; Çakar, Tuna; Yıldız, Ayşenur; Hataş, Tuğce AydınUnderstanding the reasons for customer churn provides added value in terms of retaining existing customers, as customer attrition leads to revenue loss for companies and incurs marketing costs for acquiring new customers. In this study, the 6-month historical data of a Pay-TV company operating in Turkey was used, and due to the imbalanced nature of the dataset on a label basis, the oversampling method was applied. During the model development phase, various artificial learning algorithms (Random Forest, Logistic Regression, KNearest Neighbors, Decision Tree, AdaBoost, XGBoost, Extra Tree Classifier) were utilized, and their performances were compared. Based on the evaluation of success criteria for each model, it was observed that the tree-based Random Forest, Extra Tree Classifier and XGBoost achieved the highest performance for this dataset.Article Citation - WoS: 3Citation - Scopus: 3Array Bp-Xor Codes for Hierarchically Distributed Matrix Multiplication(IEEE, 2021) Arslan, Şuayb ŞefikA novel fault-tolerant computation technique based on array Belief Propagation (BP)-decodable XOR (BP-XOR) codes is proposed for distributed matrix-matrix multiplication. The proposed scheme is shown to be configurable and suited for modern hierarchical compute architectures such as Graphical Processing Units (GPUs) equipped with multiple nodes, whereby each has many small independent processing units with increased core-to-core communications. The proposed scheme is shown to outperform a few of the well–known earlier strategies in terms of total end-to-end execution time while in presence of slow nodes, called stragglers. This performance advantage is due to the careful design of array codes which distributes the encoding operation over the cluster (slave) nodes at the expense of increased master-slave communication. An interesting trade-off between end-to-end latency and total communication cost is precisely described. In addition, to be able to address an identified problem of scaling stragglers, an asymptotic version of array BP-XOR codes based on projection geometry is proposed at the expense of some computation overhead. A thorough latency analysis is conducted for all schemes to demonstrate that the proposed scheme achieves order-optimal computation in both the sublinear as well as the linear regimes in the size of the computed product from an end-to-end delay perspective.Conference Object Citation - WoS: 2Citation - Scopus: 1Average Bandwidth-Cost Vs. Storage Trade-Off for Bs-Assisted Distributed Storage Networks(IEEE, 2021) Tengiz, Ayse Ceyda; Haytaoğlu, Elif; Pusane, Ali Emre; Arslan, Şuayb Şefik; Pourmandi, MassoudIn this study, we consider a hierarchically structured base station (BS)-assisted cellular system equipped with a backend distributed data storage in which nodes randomly arrive and depart the cell. We numerically motivate and characterize the fundamental trade-off between the average repair bandwidth cost versus storage space where BS communication cost (higher than that of local) and link capacity constraints exist while the number of failed nodes can vary dynamically. We establish the capacity region that is most relevant to 5G and beyond networks, which are layered by design. We hope that this study shall motivate novel regeneration code constructions that will be able to achieve the presented limits.Conference Object Citation - WoS: 1Citation - Scopus: 1Base Station-Assisted Cooperative Network Coding for Cellular Systems With Link Constraints(IEEE, 2022) Arslan, Suayb S.; Pourmandi, Massoud; Haytaoglu, ElifWe consider a novel distributed data storage/caching scenario in a cellular network, where multiple nodes may fail/depart simultaneously To meet reliability, we allow cooperative regeneration of lost nodes with the help of base stations allocated in a set of hierarchical layers1. Due to this layered structure, a symbol download from each base station has a different cost, while the link capacities between the nodes of the cellular system and the base stations are also constrained. Under such a setting, we formulate the fundamental trade-off with closed form expressions between repair bandwidth cost and the storage space per node. Particularly, the minimum storage as well as bandwidth cost points are formulated. Finally, we provide an explicit optimal code construction for the minimum storage regeneration point for a special set of system parameters.Conference Object Citation - WoS: 2Citation - Scopus: 2Classification of Altruistic Punishment Decisions by Optical Neuroimaging and Machine Learning Methods(IEEE, 2023) Erözden, Ozan; Şahin, Türkay; Akyürek, Güçlü; Filiz, Gözde; Çakar, TunaAltruistic punishment (third-party punishment) is important in terms of maintaining social norms and promoting prosocial behavior. This study examined data obtained using the near infrared spectroscopy (fNIRS) method to predict altruistic punishment decisions. It was found that specific neural activity patterns were significantly related to decisions regarding the punishment of the perpetrator. This research contributes to the development of social decision-making models and helps advance our understanding of the cognitive and neural processes involved in third-party punishments.Conference Object Citation - WoS: 5Citation - Scopus: 7Cloud2hdd: Large-Scale Hdd Data Analysis on Cloud for Cloud Datacenters(IEEE, 2020) Zeydan, Engin; Arslan, Şefik ŞuaybThe main focus of this paper is to develop a distributed large scale data analysis platform for the opensource data of Backblaze cloud datacenter which consists of operational hard disk drive (HDD) information collected over an observable period of 2272 days (over 74 months). To carefully analyze the intrinsic characteristics of the hard disk behavior, we have exploited a large bolume of data and the benefits of Hadoop ecosystem as our big data processing engine. In other words, we have utilized a special distributed scheme on cloud for cloud HDD data, which is termed as Cloud2HDD. To classify the remaining lifetime of hard disk drives based on health indicators such as in-built S.M.A.R.T (Self-Monitoring, Analysis, and Reporting Technology) features, we used some of the state-of-the-art classification algorithms and compared their accuracy, precision, and recall rates simultaneously. In addition, importance of various S.M.A.R.T. features in predicting the true remaining lifetime of HDDs are identified. For instance, our analysis results indicate that Random Forest Classifier (RFC) can yield up to 94% accuracy with the highest precision and recall at a reasonable time by classifying the remaining lifetime of drives into one of three different classes, namely critical, high and low ideal states in comparison to other classification approaches based on a specific subset of S.M.A.R.T. features.Conference Object Customer Segmentation and Churn Prediction via Customer Metrics(IEEE, 2022) Bozkan, Tunahan; Cakar, Tuna; Sayar, Alperen; Ertugrul, SeyitIn this study, it is aimed to predict whether customers operating in the factoring sector will continue to trade in the next three months after the last transaction date, using data-driven machine learning models, based on their past transaction movements and their risk, limit and company data. As a result of the models established, Loss Analysis (Churn) of two different customer groups (Real and Legal factory) was carried out. It was estimated by the XGBoost model with an F1 Score of 74% and 77%. Thanks to this modeling, it was aimed to increase the retention rate of customers through special promotions and campaigns to be made to these customer groups, together with the prediction of the customers who will leave. Thanks to the increase in retention rates, a direct contribution to the transaction volume on a company basis was ensured.Conference Object Citation - WoS: 3Citation - Scopus: 3Data Repair in Bs-Assisted Distributed Data Caching(IEEE, 2020) Kaya, Erdi; Haytaoğlu, Elif; Arslan, Şuayb ŞefikIn this paper, centralized and independent repair approaches based on device-to-device communication for the repair of the lost nodes have been investigated in a cellular network where distributed caching is applied whose fault tolerance is provided by erasure codes. The caching mechanisms based on Reed-Solomon codes and minimum bandwidth regenerating codes are adopted. The proposed approaches are analyzed in a simulation environment in terms of base station utilization load during the repair process. Based on the intuitive assumption that the base station is usually more costly than device-to-device communication, the centralized repair approach demonstrates a better performance than the independent repair approaches on the number of symbols retrieved from the base station. On the other hand, the centralized approach has not achieved a dramatic reduction in the number of symbols downloaded from the other devices.Article Citation - WoS: 4Citation - Scopus: 5Data Repair-Efficient Fault Tolerance for Cellular Networks Using Ldpc Codes(IEEE, 2021) Haytaoglu, Elif; Kaya, Erdi; Arslan, Şuayb ŞefikThe base station-mobile device communication traffic has dramatically increased recently due to mobile data, which in turn heavily overloaded the underlying infrastructure. To decrease Base Station (BS) interaction, intra-cell communication between local devices, known as Device-to-Device, is utilized for distributed data caching. Nevertheless, due to the continuous departure of existing nodes and the arrival of newcomers, the missing cached data may lead to permanent data loss. In this study, we propose and analyze a class of LDPC codes for distributed data caching in cellular networks. Contrary to traditional distributed storage, a novel repair algorithm for LDPC codes is proposed which is designed to exploit the minimal direct BS communication. To assess the versatility of LDPC codes and establish performance comparisons to classic coding techniques, novel theoretical and experimental evaluations are derived. Essentially, the theoretical/numerical results for repair bandwidth cost in presence of BS are presented in a distributed caching setting. Accordingly, when the gap between the cost of downloading a symbol from BS and from other local network nodes is not dramatically high, we demonstrate that LDPC codes can be considered as a viable fault-tolerance alternative in cellular systems with caching capabilities for both low and high code rates.Conference Object Development of a Knowledge-Based Multimodal Deep Learning System for Automatic Breast Lesion Segmentation and Diagnosis in Mg/Dmr Images(IEEE, 2023) Orhan, Gözde; Çavuşoğlu, Mustafa; Sürmeli, Hulusi Emre; Çakar, Tuna; Araz, Nusret; Bayram, BülentDeep learning networks (DLNs) rely on labeled training datasets as their fundamental building blocks. While various databases exist worldwide, there is currently no domestic solution available in our country. This project aims to create a domestic database by automatically segmenting breast lesions in MG/DMR images based on their types and developing a knowledge-based multimodal DL-based integrated computer-aided diagnosis system to analyze the images, thereby providing the system with continuous learning capability. Different brands of devices exist for MG/DMR, necessitating the multimodal operation of image processing/artificial intelligence algorithms. To achieve this goal, the network was trained first, and then prelearned data were transferred to enable the training of data from different networks once accurate results are obtained. The developed system has the potential to enable the automatic detection of breast lesions, ensuring fast and high diagnostic accuracy. Additionally, it might also facilitate the retrospective analysis of patients' periodic check-up results.Conference Object Citation - WoS: 2Citation - Scopus: 2Distributed Matrix Multiplication With Mds Array Bp-Xor Codes for Scaling Clusters(IEEE, 2019) Arslan, Şuayb ŞefikThis study presents a novel coded computation technique for distributed matrix-matrix product computation at a massive scale that outperforms well known previous strategies in terms of total execution time. Our method achieves this performance by distributing the encoding operation over the cluster (slave) nodes at the expense of increased master-slave communication. The product computation is performed using MDS array Belief Propagation (BP)-decodable codes based on pure XOR operations. In addition, our scheme is configurable and suited for modern compute node architectures equipped with multiple processing units organized in a hierarchical manner. Assuming the number of backup nodes being sublinear in the size of the product, we shall demonstrate that the proposed scheme achieves order-optimal computation from an end-to-end latency perspective while ensuring acceptable communication requirements that can be addressed by today's high speed network link infrastructures.Conference Object Dog Walker Segmentation(IEEE, 2022) Ercan, Alperen; Karan, Baris; Çakar, TunaIn this study dog walkers were separated into clusters according to walkers' walk habits. Due to the fact that the distributions were non-normal, normalization algorithms were applied before the onset of clustering. After normalizing, K Means algorithm and Gaussian Mixture Models used for finding optimum cluster count. According to these clusters, walkers' consecutive months separated to follow-up their behavioral traits. This part of the study adds value to the project to examine walkers' behaviors closer.Conference Object Eaft: Evolutionary Algorithms for Gcc Flag Tuning(IEEE, 2022) Tagtekin, Burak; Çakar, TunaDue to limited resources, some methods come to the fore in finding and applying the factors that affect the working time of the code. The most common one is choosing the correct GCC flags using heuristic algorithms. For the codes compiled with GCC, the selection of optimization flags directly affects the speed of the processing, however, choosing the right one among hundreds of markers during this process is a resource consuming problem. This article explains how to solve the GCC flag optimization problem with EAFT. Rather than other autotuner tools such as Opentuner, EAFT is an optimized tool for GCC marker selection. Search infrastructure has been developed with particle swarm optimization and genetic algorithm with diffent submodels rather than using only Genetic Algorithm like FOGA. © 2022 IEEE.
- «
- 1 (current)
- 2
- 3
- »

