Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Deep learning

Institution
Publication Year
Publication
Publication Type

Articles 31 - 60 of 144

Full-Text Articles in Physical Sciences and Mathematics

Generating Ad Creatives Using Deep Learning For Search Advertising, Kevser Nur Çoğalmiş, Ahmet Bulut Jul 2022

Generating Ad Creatives Using Deep Learning For Search Advertising, Kevser Nur Çoğalmiş, Ahmet Bulut

Turkish Journal of Electrical Engineering and Computer Sciences

We generated advertisement creatives programmatically using deep neural networks. A landing page contains relevant text data, which can be used for generating advertisement creatives, i.e. ads. We treated the ad generation task as a text summarization problem and built a sequence to sequence model. In order to assess the validity of our approach, we conducted experiments on four datasets. Our empirical results showed that our model generated relevant ads on a template-based dataset with moderate hyperparameters. Training the model with more content increased the performance of the model, which we attributed to rigorous hyperparameter tune-up. The choice of word embedding …


Anomaly Detection In Rotating Machinery Using Autoencoders Based On Bidirectional Lstm And Gru Neural Networks, Krishna Patra, Rabi Narayan Sethi, Dhiren Kkumar Behera May 2022

Anomaly Detection In Rotating Machinery Using Autoencoders Based On Bidirectional Lstm And Gru Neural Networks, Krishna Patra, Rabi Narayan Sethi, Dhiren Kkumar Behera

Turkish Journal of Electrical Engineering and Computer Sciences

A time series anomaly is a form of anomalous subsequence that indicates future faults will occur. The development of novel techniques for detecting this type of anomaly is significant for real-time system monitoring. Several algorithms have been used to classify anomalies successfully. However, the time series anomaly detection algorithm was not studied well. We use a new bidirectional LSTM and GRU neural networks-based hybrid autoencoder to detect if a machine is operating normally in this research. An autoencoder is trained on a set of 12 features taken from healthy operating data gathered promptly after a planned maintenance period using vibration …


Radar Remote Sensing Data Augmentation Method Based On Generative Adversarial Network, Xu Kang, Xiaofeng Zhang Apr 2022

Radar Remote Sensing Data Augmentation Method Based On Generative Adversarial Network, Xu Kang, Xiaofeng Zhang

Journal of System Simulation

Abstract: In the research field of radar remote sensing, both the completeness and diversity of radar data samples cannot meet the requirement of effective training of deep learning models, and the models are prone to over-fitting, which significantly limits the wide application of deep learning techniques in this field. Targeting on the needs of intelligent application in radar remote sensing, a microwave imaging radar suited data augmentation method is proposed to solve the issue of insufficient radar data samples by leveraging the general framework of generative adversarial network. Aiming at the features of radar samples being not obvious, the label …


A Deep Learning-Based Approach To Extraction Of Filler Morphology In Sem Images With The Application Of Automated Quality Inspection, Md. Fashiar Rahman, Tzu-Liang Bill Tseng, Jianguo Wu, Yuxin Wen, Yirong Lin Mar 2022

A Deep Learning-Based Approach To Extraction Of Filler Morphology In Sem Images With The Application Of Automated Quality Inspection, Md. Fashiar Rahman, Tzu-Liang Bill Tseng, Jianguo Wu, Yuxin Wen, Yirong Lin

Engineering Faculty Articles and Research

Automatic extraction of filler morphology (size, orientation, and spatial distribution) in Scanning Electron Microscopic (SEM) images is essential in many applications such as automatic quality inspection in composite manufacturing. Extraction of filler morphology greatly depends on accurate segmentation of fillers (fibers and particles), which is a challenging task due to the overlap of fibers and particles and their obscure presence in SEM images. Convolution Neural Networks (CNNs) have been shown to be very effective at object recognition in digital images. This paper proposes an automatic filler detection system in SEM images, utilizing a Mask Region-based CNN architecture. The proposed system …


Performance Analysis And Feature Selection For Network-Based Intrusion Detectionwith Deep Learning, Serhat Caner, Nesli̇ Erdoğmuş, Yusuf Murat Erten Mar 2022

Performance Analysis And Feature Selection For Network-Based Intrusion Detectionwith Deep Learning, Serhat Caner, Nesli̇ Erdoğmuş, Yusuf Murat Erten

Turkish Journal of Electrical Engineering and Computer Sciences

An intrusion detection system is an automated monitoring tool that analyzes network traffic and detects malicious activities by looking out either for known patterns of attacks or for an anomaly. In this study, intrusion detection and classification performances of different deep learning based systems are examined. For this purpose, 24 deep neural networks with four different architectures are trained and evaluated on CICIDS2017 dataset. Furthermore, the best performing model is utilized to inspect raw network traffic features and rank them with respect to their contributions to success rates. By selecting features with respect to their ranks, sets of varying size …


Biometric Identification Using Panoramic Dental Radiographic Images Withfew-Shot Learning, Musa Ataş, Cüneyt Özdemi̇r, İsa Ataş, Burak Ak, Esma Özeroğlu Mar 2022

Biometric Identification Using Panoramic Dental Radiographic Images Withfew-Shot Learning, Musa Ataş, Cüneyt Özdemi̇r, İsa Ataş, Burak Ak, Esma Özeroğlu

Turkish Journal of Electrical Engineering and Computer Sciences

Determining identity is a crucial task especially in the cases of mass disasters such as tsunamis, earthquakes, fires, epidemics, and in forensics. Although there are various studies in the literature on biometric identification from radiographic dental images, more research is still required. In this study, a panoramic dental radiographic (PDR) imagebased human identification system was developed using a customized deep convolutional neural network model in a few-shot learning scheme. The proposed model (PDR-net) was trained on 600 PDR images obtained from a total of 300 patients. As the PDR images of the patients were very different in terms of pose …


Study On Prediction Of Crystal Properties Based On Deep Learning, Buwei Wang, Wang Min, Fan Qian, Ya'nan Wang, Hanwen Zhang, Yunliang Yue Jan 2022

Study On Prediction Of Crystal Properties Based On Deep Learning, Buwei Wang, Wang Min, Fan Qian, Ya'nan Wang, Hanwen Zhang, Yunliang Yue

Journal of System Simulation

Abstract: Predicting crystal properties using traditional machine learning methods requires complex feature engineering. In order to bypass time-consuming feature engineering, element network (ElemNet), representation learning from stoichiometry (Roost), compositionally-restricted attention-based network (CrabNet) and crystal graph convolution neural network (CGCNN) based on deep learning technology are used to simulate the formation energy, total energy per atom, band gap, and Fermi energy of crystal. The residual learning is introduced into CGCNN, and a crystal graph convolution residual neural network (CGCRN) is proposed. In the CGCRN, the number of hidden layers and the number of nodes in the hidden layers are increased, …


Variety Recognition Based On Deep Learning And Double-Sided Characteristics Of Maize Kernel, Feng Xiao, Zhang Hui, Zhou Rui, Qiao Lu, Wei Dong, Dandan Li, Yuyao Zhang, Guoqing Zheng Jan 2022

Variety Recognition Based On Deep Learning And Double-Sided Characteristics Of Maize Kernel, Feng Xiao, Zhang Hui, Zhou Rui, Qiao Lu, Wei Dong, Dandan Li, Yuyao Zhang, Guoqing Zheng

Journal of System Simulation

Abstract: In order to construct a maize kernel variety recognition model with high recognition accuracy and suitable for mobile phone application, a mobile phone is used to obtain maize kernel double-sided (embryonic and non-embryonic) images. Based on the lightweight convolutional neural network MobileNetV2 and transfer learning, a maize kernel image variety recognition model is constructed. In view of the existing research methods are mainly for single-sided recognition of maize kernel variety, the performance of single-sided and double-sided characteristics modeling and recognition is compared. The results show that the double-sided recognition accuracy of maize kernel double-sided characteristics modeling is 99.83%, which …


Brief Review On Applying Reinforcement Learning To Job Shop Scheduling Problems, Xiaohan Wang, Zhang Lin, Ren Lei, Kunyu Xie, Kunyu Wang, Ye Fei, Chen Zhen Jan 2022

Brief Review On Applying Reinforcement Learning To Job Shop Scheduling Problems, Xiaohan Wang, Zhang Lin, Ren Lei, Kunyu Xie, Kunyu Wang, Ye Fei, Chen Zhen

Journal of System Simulation

Abstract: Reinforcement Learning (RL) achieves lower time response and better model generalization in Job Shop Scheduling Problem (JSSP). To explain the current overall research status of JSSP based on RL, summarize the current scheduling framework based on RL, and lay the foundation for follow-up research, the backgrounds of JSSP and RL are introduced. Two simulation techniques commonly used in JSSP are analyzed and two commonly used frameworks for RL to solve JSSP are given. In addition, some existing challenges are pointed out, and related research progress is introduced from three aspects: direct scheduling, feature representation-based scheduling, and parameter search-based scheduling.


Application Of Long Short-Term Memory (Lstm) Neural Network Based On Deeplearning For Electricity Energy Consumption Forecasting, Mehmet Bi̇lgi̇li̇, Ni̇yazi̇ Arslan, Ali̇i̇hsan Şekerteki̇n, Abdulkadi̇r Yaşar Jan 2022

Application Of Long Short-Term Memory (Lstm) Neural Network Based On Deeplearning For Electricity Energy Consumption Forecasting, Mehmet Bi̇lgi̇li̇, Ni̇yazi̇ Arslan, Ali̇i̇hsan Şekerteki̇n, Abdulkadi̇r Yaşar

Turkish Journal of Electrical Engineering and Computer Sciences

Electricity is the most substantial energy form that significantly affects the development of modern life, work efficiency, quality of life, production, and competitiveness of the society in the ever-growing global world. In this respect, forecasting accurate electricity energy consumption (EEC) is fairly essential for any country?s energy consumption planning and management regarding its growth. In this study, four time-series methods; long short-term memory (LSTM) neural network, adaptive neuro-fuzzy inference system (ANFIS) with subtractive clustering (SC), ANFIS with fuzzy cmeans (FCM), and ANFIS with grid partition (GP) were implemented for the short-term one-day ahead EEC prediction. Root mean square error (RMSE), …


Evaluating The Performance Of Vision Transformer Architecture For Deepfake Image Classification, Devesan Govindasamy Jan 2022

Evaluating The Performance Of Vision Transformer Architecture For Deepfake Image Classification, Devesan Govindasamy

Dissertations

Deepfake classification has seen some impressive results lately, with the experimentation of various deep learning methodologies, researchers were able to design some state-of-the art techniques. This study attempts to use an existing technology “Transformers” in the field of Natural Language Processing (NLP) which has been a de-facto standard in text processing for the purposes of Computer Vision. Transformers use a mechanism called “self-attention”, which is different from CNN and LSTM. This study uses a novel technique that considers images as 16x16 words (Dosovitskiy et al., 2021) to train a deep neural network with “self-attention” blocks to detect deepfakes. It creates …


Cnn Based Sensor Fusion Method For Real-Time Autonomous Robotics Systems, Berat Yildiz, Aki̇f Durdu, Ahmet Kayabaşi, Mehmet Duramaz Jan 2022

Cnn Based Sensor Fusion Method For Real-Time Autonomous Robotics Systems, Berat Yildiz, Aki̇f Durdu, Ahmet Kayabaşi, Mehmet Duramaz

Turkish Journal of Electrical Engineering and Computer Sciences

Autonomous robotic systems (ARS) serve in many areas of daily life. The sensors have critical importance for these systems. The sensor data obtained from the environment should be as accurate and reliable as possible and correctly interpreted by the autonomous robot. Since sensors have advantages and disadvantages over each other they should be used together to reduce errors. In this study, Convolutional Neural Network (CNN) based sensor fusion was applied to ARS to contribute the autonomous driving. In a real-time application, a camera and LIDAR sensor were tested with these networks. The novelty of this work is that the uniquely …


Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu Jan 2022

Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu

Engineering Technology Faculty Publications

Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of medical data, which is a sort of machine learning technique. The training data is disseminated across numerous machines in federated learning, and the learning process is collaborative. There are numerous privacy attacks on deep learning (DL) models that attackers can use to obtain sensitive information. As a result, the DL model should be safeguarded from adversarial attacks, particularly in medical data applications. Homomorphic encryption-based model security from the adversarial collaborator is one of the answers …


Design, Analysis, And Optimization Of Traffic Engineering For Software Defined Networks, Mohammed Ibrahim Salman Jan 2022

Design, Analysis, And Optimization Of Traffic Engineering For Software Defined Networks, Mohammed Ibrahim Salman

Browse all Theses and Dissertations

Network traffic has been growing exponentially due to the rapid development of applications and communications technologies. Conventional routing protocols, such as Open-Shortest Path First (OSPF), do not provide optimal routing and result in weak network resources. Optimal traffic engineering (TE) is not applicable in practice due to operational constraints such as limited memory on the forwarding devices and routes oscillation. Recently, a new way of centralized management of networks enabled by Software-Defined Networking (SDN) made it easy to apply most traffic engineering ideas in practice. \par Toward creating an applicable traffic engineering system, we created a TE simulator for experimenting …


Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler Dec 2021

Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler

Computer Science and Computer Engineering Undergraduate Honors Theses

Sounds with a high level of stationarity, also known as sound textures, have perceptually relevant features which can be captured by stimulus-computable models. This makes texture-like sounds, such as those made by rain, wind, and fire, an appealing test case for understanding the underlying mechanisms of auditory recognition. Previous auditory texture models typically measured statistics from auditory filter bank representations, and the statistics they used were somewhat ad-hoc, hand-engineered through a process of trial and error. Here, we investigate whether a better auditory texture representation can be obtained via contrastive learning, taking advantage of the stationarity of auditory textures to …


Joint Linear And Nonlinear Computation With Data Encryption For Efficient Privacy-Preserving Deep Learning, Qiao Zhang Dec 2021

Joint Linear And Nonlinear Computation With Data Encryption For Efficient Privacy-Preserving Deep Learning, Qiao Zhang

Electrical & Computer Engineering Theses & Dissertations

Deep Learning (DL) has shown unrivalled performance in many applications such as image classification, speech recognition, anomalous detection, and business analytics. While end users and enterprises own enormous data, DL talents and computing power are mostly gathered in technology giants having cloud servers. Thus, data owners, i.e., the clients, are motivated to outsource their data, along with computationally-intensive tasks, to the server in order to leverage the server’s abundant computation resources and DL talents for developing cost-effective DL solutions. However, trust is required between the server and the client to finish the computation tasks (e.g., conducting inference for the newly-input …


Research On The Network Of 3d Smoke Flow Super-Resolution Data Generation, Jinlian Du, Shufei Li, Xueyun Jin Oct 2021

Research On The Network Of 3d Smoke Flow Super-Resolution Data Generation, Jinlian Du, Shufei Li, Xueyun Jin

Journal of System Simulation

Abstract: Aiming at the problem of low data generation efficiency due to the high complexity of solving the N-S equation of smoke flow field, a deep learning model which can generate high-resolution smoke flow data based on low-resolution smoke flow data solved by N-S equation is explored and designed. Based on the Generative Adversarial Network, the smoke data reconstruction network based on the sub voxel convolution layer is constructed. Considering the fluidity of smoke, time loss based on advection step is introduced into the loss function to realize high-precision smoke simulation. By extending the image super-resolution quality evaluation index, the …


Research On Intrusion Detection Based On Stacked Autoencoder And Long-Short Memory, Lin Shuo, An Lei, Zhijun Gao, Shan Dan, Wenli Shang Jun 2021

Research On Intrusion Detection Based On Stacked Autoencoder And Long-Short Memory, Lin Shuo, An Lei, Zhijun Gao, Shan Dan, Wenli Shang

Journal of System Simulation

Abstract: As network attacks increasingly hidden, intelligent and complex. Simple machine learning cannot deal with attacks timely. A deep learning method based on the combination of SDAE and LSTM is proposed. Firstly, the distribution rules of network data are extracted intelligently layer by layer by SDAE, and the diverse anomaly features of high-dimensional data ate extracted by using coefficient penalty and reconstruction error of each coding layer. Then, LSTM’ s memory function and the powerful learning ability of sequence data are used to classify learning depth. Finally, the experiments are carried out with the UNSW-NB15 data set, which is analyzed …


Creating Synthetic Satellite Cloud Data Based On Gan Method, Wencong Cheng, Xiaokang Shi, Zhigang Wang Jun 2021

Creating Synthetic Satellite Cloud Data Based On Gan Method, Wencong Cheng, Xiaokang Shi, Zhigang Wang

Journal of System Simulation

Abstract: To create the synthetic satellite cloud data in the domain of Meteorology, a method based on Generative Adversarial Networks (GAN) is proposed. Depending on ability of the nonlinear mapping and the information extraction of raster data with the deep learning network, a deep generative adversarial network model is proposed to extract the corresponding information between the numerical weather prediction(NWP) products and the satellite cloud data, and then the appropriate elements of the NWP product are chosen as the input to synthesize the corresponding satellite cloud data. The experiments are conducted on the re-analysis products of the European Centre …


Deep Learning On Image Forensics And Anti-Forensics, Zhangyi Shen May 2021

Deep Learning On Image Forensics And Anti-Forensics, Zhangyi Shen

Dissertations

Image forensics protect the authenticity and integrity of digital images. On the contrary, as the countermeasures of digital forensics, anti-forensics is applied to expose the vulnerability of forensics tools. Consequently, forensics researchers could develop forensics tools against possible new attacks. This dissertation investigation demonstrates two image forensics methods based on convolutional neural network (CNN) and two image anti-forensics methods based on generative adversarial network (GAN).

Detecting unsharp masking (USM) sharpened image is the first study in this dissertation. A CNN architecture comprises four convolutional layers and a classification module is proposed to discriminate sharpened images and unsharpened images. The results …


A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi May 2021

A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi

Master's Theses

An important feature of an Autonomous Surface Vehicles (ASV) is its capability of automatic object detection to avoid collisions, obstacles and navigate on their own.

Deep learning has made some significant headway in solving fundamental challenges associated with object detection and computer vision. With tremendous demand and advancement in the technologies associated with ASVs, a growing interest in applying deep learning techniques in handling challenges pertaining to autonomous ship driving has substantially increased over the years.

In this thesis, we study, design, and implement an object recognition framework that detects and recognizes objects found in the sea. We first curated …


A Fully-Automated, Deep Learning-Based Framework For Ct-Based Localization, Segmentation, Verification And Planning Of Metastatic Vertebrae, Tucker Netherton, Tucker James Netherton May 2021

A Fully-Automated, Deep Learning-Based Framework For Ct-Based Localization, Segmentation, Verification And Planning Of Metastatic Vertebrae, Tucker Netherton, Tucker James Netherton

Dissertations & Theses (Open Access)

Palliative radiotherapy is an effective treatment for the palliation of symptoms caused by vertebral metastases. Visible evidence of disease is localized on medical images as part of the treatment planning process. However, complicating factors such as time pressures, anatomic variants in the spine, and similarities in adjacent vertebrae are associated with wrong level treatments of the spine. In addition, erroneous manual contouring of anatomic structures is a major failure mode in radiotherapy treatment planning.

The purpose of this study is to mitigate the challenges associated with treatment planning of the spine by automating the treatment planning process for three-dimensional conformal …


Improving Treatment Of Local Liver Ablation Therapy With Deep Learning And Biomechanical Modeling, Brian Anderson, Kristy Brock, Laurence Court, Carlos Eduardo Cardenas, Erik Cressman, Ankit Patel May 2021

Improving Treatment Of Local Liver Ablation Therapy With Deep Learning And Biomechanical Modeling, Brian Anderson, Kristy Brock, Laurence Court, Carlos Eduardo Cardenas, Erik Cressman, Ankit Patel

Dissertations & Theses (Open Access)

In the United States, colorectal cancer is the third most diagnosed cancer, and 60-70% of patients will develop liver metastasis. While surgical liver resection of metastasis is the standard of care for treatment with curative intent, it is only avai lable to about 20% of patients. For patients who are not surgical candidates, local percutaneous ablation therapy (PTA) has been shown to have a similar 5-year overall survival rate. However, PTA can be a challenging procedure, largely due to spatial uncertainties in the localization of the ablation probe, and in measuring the delivered ablation margin.

For this work, we hypothesized …


Network Traffic Anomaly Detection Method For Imbalanced Data, Shuqin Dong, Bin Zhang Mar 2021

Network Traffic Anomaly Detection Method For Imbalanced Data, Shuqin Dong, Bin Zhang

Journal of System Simulation

Abstract: Aiming at the poor detection performances caused by the low feature extraction accuracy of rare traffic attacks from scarce samples, a network traffic anomaly detection method for imbalanced data is proposed. A traffic anomaly detection model is designed, in which the traffic features in different feature spaces are learned by alternating activation functions, architectures, corrupted rates and dropout rates of stacked denoising autoencoder (SDA), and the low accuracy in extracting features of rare traffic attacks in a single space is solved. A batch normalization algorithm is designed, and the Adam algorithm is adopted to train parameters of …


On-Device Deep Learning Inference For System-On-Chip (Soc) Architectures, Tom Springer, Elia Eiroa-Lledo, Elizabeth Stevens, Erik Linstead Mar 2021

On-Device Deep Learning Inference For System-On-Chip (Soc) Architectures, Tom Springer, Elia Eiroa-Lledo, Elizabeth Stevens, Erik Linstead

Engineering Faculty Articles and Research

As machine learning becomes ubiquitous, the need to deploy models on real-time, embedded systems will become increasingly critical. This is especially true for deep learning solutions, whose large models pose interesting challenges for target architectures at the “edge” that are resource-constrained. The realization of machine learning, and deep learning, is being driven by the availability of specialized hardware, such as system-on-chip solutions, which provide some alleviation of constraints. Equally important, however, are the operating systems that run on this hardware, and specifically the ability to leverage commercial real-time operating systems which, unlike general purpose operating systems such as Linux, can …


Wg2An: Synthetic Wound Image Generation Using Generative Adversarial Network, Salih Sarp, Murat Kuzlu, Emmanuel Wilson, Ozgur Guler Mar 2021

Wg2An: Synthetic Wound Image Generation Using Generative Adversarial Network, Salih Sarp, Murat Kuzlu, Emmanuel Wilson, Ozgur Guler

Engineering Technology Faculty Publications

In part due to its ability to mimic any data distribution, Generative Adversarial Network (GAN) algorithms have been successfully applied to many applications, such as data augmentation, text-to-image translation, image-to-image translation, and image inpainting. Learning from data without crafting loss functions for each application provides broader applicability of the GAN algorithm. Medical image synthesis is also another field that the GAN algorithm has great potential to assist clinician training. This paper proposes a synthetic wound image generation model based on GAN architecture to increase the quality of clinical training. The proposed model is trained on chronic wound datasets with various …


Deep Learning Techniques Of Losses In Data Transmitted In Wirelesssensor Networks, Mevlüt Ersoy, Beki̇r Aksoy Jan 2021

Deep Learning Techniques Of Losses In Data Transmitted In Wirelesssensor Networks, Mevlüt Ersoy, Beki̇r Aksoy

Turkish Journal of Electrical Engineering and Computer Sciences

Wireless sensor network (WSN) systems are frequently used today as a result of rapid technological developments. Wireless sensor networks, which form the basis of the Internet of Things (IoT), have a wide range of use in theworld from education to health, and from military applications to home applications. It enables the data obtained fromthe sensors to be transferred between nodes with the help of end-to-end wireless protocols. In parallel with the increasingnumber of nodes in WSN, data tra?ic density also increases. Due to the limitations of the WSN network, lost packetrates also increase with increasing data tra?ic. In this study, …


Ensemble Learning Of Multiview Cnn Models For Survival Time Prediction Of Braintumor Patients Using Multimodal Mri Scans, Abdela Ahmed Mossa, Ulus Çevi̇k Jan 2021

Ensemble Learning Of Multiview Cnn Models For Survival Time Prediction Of Braintumor Patients Using Multimodal Mri Scans, Abdela Ahmed Mossa, Ulus Çevi̇k

Turkish Journal of Electrical Engineering and Computer Sciences

Brain tumors have been one of the most common life-threatening diseases for all mankind. There have beenhuge efforts dedicated to the development of medical imaging techniques and radiomics to diagnose tumor patients quicklyand e?iciently. One of the main aims is to ensure that preoperative overall survival time (OS) prediction is accurate.Recently, deep learning (DL) algorithms, and particularly convolutional neural networks (CNNs) achieved promisingperformances in almost all computer vision fields. CNNs demand large training datasets and high computational costs.However, curating large annotated medical datasets are difficult and resource-intensive. The performances of singlelearners are also unsatisfactory for small datasets. Thus, this study …


Neural Relation Extraction: A Review, Mehmet Aydar, Özge Bozal, Furkan Özbay Jan 2021

Neural Relation Extraction: A Review, Mehmet Aydar, Özge Bozal, Furkan Özbay

Turkish Journal of Electrical Engineering and Computer Sciences

Neural relation extraction discovers semantic relations between entities from unstructured text using deeplearning methods. In this study, we make a clear categorization of the existing relation extraction methods in termsof data expressiveness and data supervision, and present a comprehensive and comparative review. We describe theevaluation methodologies and the datasets used for model assessment. We explicitly state the common challenges inrelation extraction task and point out the potential of the pretrained models to solve them. Accordingly, we investigateadditional research directions and improvement ideas in this field.


Learning Multiview Deep Features From Skeletal Sign Language Videos Forrecognition, Ashraf Ali Shaik, Venkata Durga Prasad Mareedu, Venkata Vijaya Kishore Polurie Jan 2021

Learning Multiview Deep Features From Skeletal Sign Language Videos Forrecognition, Ashraf Ali Shaik, Venkata Durga Prasad Mareedu, Venkata Vijaya Kishore Polurie

Turkish Journal of Electrical Engineering and Computer Sciences

The most challenging objective in machine translation of sign language has been the machine?s inability tolearn interoccluding finger movements during an action process. This work addresses the problem of teaching a deeplearning model to recognize differently oriented skeletal data. The multi-view 2D skeletal sign language video data isobtained using 3D motion-captured system. A total of 9 signer views were used for training the proposed network andthe 6 for testing and validation. In order to obtain multi-view deep features for recognition, we proposed an end-to-endtrainable multistream convolutional neural network (CNN) with late feature fusion. The fused multiview features arethen inputted to …