Zobrazeno 1 - 10
of 58 252
pro vyhledávání: '"A. A. Yigit"'
Autor:
Dogangun, Fatih, Bahar, Serdar, Yildirim, Yigit, Temir, Bora Toprak, Ugur, Emre, Dogan, Mustafa Doga
As robotics continue to enter various sectors beyond traditional industrial applications, the need for intuitive robot training and interaction systems becomes increasingly more important. This paper introduces Robotic Augmented Reality for Machine P
Externí odkaz:
http://arxiv.org/abs/2410.13412
Fake news threatens democracy and exacerbates the polarization and divisions in society; therefore, accurately detecting online misinformation is the foundation of addressing this issue. We present CrediRAG, the first fake news detection model that c
Externí odkaz:
http://arxiv.org/abs/2410.12061
Autor:
Salehi, Shavbo, Zhou, Hao, Elsayed, Medhat, Bavand, Majid, Gaigalas, Raimundas, Ozcan, Yigit, Erol-Kantarci, Melike
Network slicing is a pivotal paradigm in wireless networks enabling customized services to users and applications. Yet, intelligent jamming attacks threaten the performance of network slicing. In this paper, we focus on the security aspect of network
Externí odkaz:
http://arxiv.org/abs/2410.05153
Autor:
Habib, Md Arafat, Zhou, Hao, Iturria-Rivera, Pedro Enrique, Ozcan, Yigit, Elsayed, Medhat, Bavand, Majid, Gaigalas, Raimundas, Erol-Kantarci, Melike
Traffic Steering is a crucial technology for wireless networks, and multiple efforts have been put into developing efficient Machine Learning (ML)-enabled traffic steering schemes for Open Radio Access Networks (O-RAN). Given the swift emergence of n
Externí odkaz:
http://arxiv.org/abs/2409.20391
Zernike Polynomials serve as an orthogonal basis on the unit disc, and have been proven to be effective in optics simulations, astrophysics, and more recently in plasma simulations. Unlike Bessel functions, they maintain finite values at the disc cen
Externí odkaz:
http://arxiv.org/abs/2409.19156
Autor:
Alsop, Hamish, Alsop, Douglas, Solomon, Joseph, Aumento, Liam, Butters, Mark, Millar, Cameron, Yigit, Yagmur, Maglaras, Leandros, Moradpoor, Naghmeh
End-to-End Encryption (E2EE) ensures that only the intended recipient(s) can read messages. Popular instant messaging (IM) applications such as Signal, WhatsApp, Apple's iMessage, and Telegram claim to offer E2EE. However, client-side scanning (CSS)
Externí odkaz:
http://arxiv.org/abs/2409.04457
Autor:
Salehi, Shavbo, Iturria-Rivera, Pedro Enrique, Elsayed, Medhat, Bavand, Majid, Gaigalas, Raimundas, Ozcan, Yigit, Erol-Kantarci, Melike
In 5G networks, network slicing has emerged as a pivotal paradigm to address diverse user demands and service requirements. To meet the requirements, reinforcement learning (RL) algorithms have been utilized widely, but this method has the problem of
Externí odkaz:
http://arxiv.org/abs/2408.10376
Autor:
Balik, Mehmet Yigit
Predicting hospital length of stay (LOS) reliably is an essential need for efficient resource allocation at hospitals. Traditional predictive modeling tools frequently have difficulty acquiring sufficient and diverse data because healthcare instituti
Externí odkaz:
http://arxiv.org/abs/2407.12741
Modeling and analysis for event series generated by heterogeneous users of various behavioral patterns are closely involved in our daily lives, including credit card fraud detection, online platform user recommendation, and social network analysis. T
Externí odkaz:
http://arxiv.org/abs/2407.05625
Autor:
Ozince, Ekin, Ihlamur, Yiğit
This study explores the application of large language models (LLMs) in venture capital (VC) decision-making, focusing on predicting startup success based on founder characteristics. We utilize LLM prompting techniques, like chain-of-thought, to gener
Externí odkaz:
http://arxiv.org/abs/2407.04885