imkanlar
02
Ara 2020
BLU 596E “Bilimsel Araştırma, Etik ve Seminer” dersi kapsamında verilecek seminerler

 
Ad Soyad Deniz Can Köseoğlu
Başlık Mobile Telecommunication Revenue’s and It’s Gross Domestic Product’s proportion for Countries
Özet / Abstract This study explores the modeling of the share of mobile telecommunication revenues in gross domestic product between 1997 to 2011. In this research Germany, Italy, Spain, and Turkey are investigated for the subject. For this research, the fractional calculus and Least Squares Method are used for the mathematical model.With this modelling, we can observe how is the GDP has changed over the years and how it affects countries economically
Danışman Ad Soyad Ertuğrul Karaçuha
Sunum Tarihi 8.12.2020
Sunum Saati 09:30
https://itu-edu-tr.zoom.us/j/94354902759?pwd=dVBtUHgyWlVsdU1XUzBDOFlKbG8vUT09
Ad Soyad Beltus Nkwawir Wiysobunri
Başlık A Deep Learning Approach to Fault Detection and Classification in Data Centers
Özet / Abstract As cloud computing applications have witnessed an exponential growth in recent years, the maintenance of the server uptime has never been more important. A fault in a server due to overload, attack, or a misconfiguration of a cooling system can be of imponderable economicand financial loss to the echelons of global institutions. The advent of thermal cameras has helped to provide fine texture information which can be used for monitoring and providing intelligent thermal management in large data centers. This paper focuses on leveraging the power and effectiveness of modern deep learning techniques for the classification, detection, and diagnosis of faults in data centers using infrared images.
Danışman Ad Soyad Dr. Hamza Erden Salih
Sunum Tarihi 8.12.2020
Sunum Saati 10:15
https://itu-edu-tr.zoom.us/j/94354902759?pwd=dVBtUHgyWlVsdU1XUzBDOFlKbG8vUT09
Ad Soyad Sümeyye Çavaş
Başlık Anomaly Detection in Compressed Video
Özet / Abstract In our daily life, many places such as streets, shops, workplaces aremonitored 24/7 with a camera. Cameras have become part of our lives toensure security. One of the first things that the police examine whenthere is any problem is checking security cameras. Collecting data from cameras at any time causes a lot of data accumulation over time.It takes a long time to examine this huge amount of data with manpowerand causes a lot of workload. In daily life, these videos usually continue as usual. However, insome moments, unusual events can also be observed. For example, in atraffic that travels normally, a pedestrian jumping on the road orcausing a vehicle to cause an accident with high speed is abnormal intraffic. It is also an anomaly for a cyclist to cross the pedestrianpath quickly and through the pedestrians. Our aim is to detect suchanomalies in a video. To put it more clearly, we aim to eliminatelong-term data reviews of people to detect unusual events thanks tothe model we have constructed. We aim to detect anomaly by using Motion vectors in H265 videos. Forthis, we will first use tools that detect motion vectors for theframes of the video. Then, we will construct a model that detectsanomalies using motion vectors we have obtained.
Danışman Ad Soyad Behçet Uğur Töreyin
Sunum Tarihi 8.12.2020
Sunum Saati 11:00
https://itu-edu-tr.zoom.us/j/94354902759?pwd=dVBtUHgyWlVsdU1XUzBDOFlKbG8vUT09
   
Ad Soyad Hüseyin Onur Yağar
Başlık
Compressed Video Action Recognition
Özet / Abstract
Action recognition is a process for extracting information from videos. The actions made by actors, poses they are in have meaningful information and these are extracted from videos. The movements of actors, even when swimming, shopping, reading a book or combing their hair can be separated from each other. It is important to watch these videos and convert them to meaningful data. Action recognition can be done over raw videos or compressed videos. Examining the increasingly sized videos in the compressed domain seems like a more rational, effective and fast solution rather than raw videos.  Developing deep learning methods are applied to almost every problem of computer vision.  But the compressed domain has few research with deep networks. So under these circumstances, researching on compressed domain videos with deep learning  architectures is planned.
Danışman Ad Soyad
Behçet Uğur Töreyin
Sunum Tarihi
15.12.2020
Sunum Saati
9:30
  https://itu-edu-tr.zoom.us/j/92964037119?pwd=MFh5SWRjMCs2MVdPWXlLV0ZQaTcvdz0
   
Ad Soyad
Nizameddin Ahmet Baştuğ
Başlık
OFDM Channel State Information Estimation with Deep Learning
Özet / Abstract
ORTHOGONAL frequency-division multiplexing (OFDM) is a popular  modulation scheme that has been widely adopted in wireless broadband  systems to combat frequency-selective fading in wireless channels.  Channel state information is vital to coherent detection and decoding  
in OFDM systems. Usually, the CSI can be estimated by means of pilots  prior to the detection of the transmitted data. With the estimated  CSI, transmitted symbols can be recovered at the receiver. The  conventional prediction methods like least squares and minimum mean  square error, have been used in various conditions. The method of  least squares estimation requires no pre-channel statistics, but its  performance may be insufficient. The minimum mean square error  
prediction has much better performance by utilizing the second order  statistics of channels. By introducing a deep learning based solution  like convolutional neural networks or multi-layer perceptrons,  estimation can be done with much higher accuracy.
Danışman Ad Soyad
Lütfiye Durak Ata
Sunum Tarihi
15.12.2020
Sunum Saati
10:15
  https://itu-edu-tr.zoom.us/j/92964037119?pwd=MFh5SWRjMCs2MVdPWXlLV0ZQaTcvdz0
   
Ad Soyad
Semih Aslan SAĞLAMOL
Başlık
Common Criteria Evaluation
Özet / Abstract
The Common Criteria for Information Technology Security  Evaluation (CC), and the companion Common Methodology for Information  Technology Security Evaluation (CEM) are the technical basis for an  international agreement, the Common Criteria Recognition Arrangement  
(CCRA), which ensures that: Products can be evaluated by competent and independent licensed  
laboratories so as to determine the fulfilment of particular security properties, to a certain extent or assurance; Supporting documents, are used within the Common Criteria certification process to define how the criteria and evaluation  methods are applied when certifying specific technologies; The certification of the security properties of an evaluated product  can be issued by a number of Certificate Authorizing Schemes, with  this certification being based on the result of their evaluation; These certificates are recognized by all the signatories of the CCRA.
The CC is the driving force for the widest available mutual  recognition of secure IT products. This web portal is available to  support the information on the status of the CCRA, the CC and the  
certification schemes, licensed laboratories, certified products and  related information, news and events.
Danışman Ad Soyad
Eldar Veliyev
Sunum Tarihi
15.12.2020
Sunum Saati
11:00
  https://itu-edu-tr.zoom.us/j/92964037119?pwd=MFh5SWRjMCs2MVdPWXlLV0ZQaTcvdz0