Now showing items 3141-3160 of 8733

    • Hybrid Deep Learning-based Models for Crop Yield Prediction 

      Oikonomidis, Alexandros; Catal, Cagatay; Kassahun, Ayalew ( Taylor and Francis Ltd. , 2022 , Article)
      Predicting crop yield is a complex task since it depends on multiple factors. Although many models have been developed so far in the literature, the performance of current models is not satisfactory, and hence, they must ...
    • Energy load forecasting using a dual-stage attention-based recurrent neural network 

      Ozcan, Alper; Catal, Cagatay; Kasif, Ahmet ( MDPI , 2021 , Article)
      Providing a stable, low-price, and safe supply of energy to end-users is a challenging task. The energy service providers are affected by several events such as weather, volatility, and special events. As such, the prediction ...
    • ADS-B Attack Classification using Machine Learning Techniques 

      Kacem, Thabet; Kaya, Aydin; Seydi Keceli, Ali; Catal, Cagatay; Wijsekera, Duminda; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)
      Automatic Dependent Surveillance Broadcast (ADS-B) is one of the most prominent protocols in Air Traffic Control (ATC). Its key advantages derive from using GPS as a location provider, resulting in better location accuracy ...
    • Deep learning-based multi-task prediction system for plant disease and species detection 

      Keceli, Ali Seydi; Kaya, Aydin; Catal, Cagatay; Tekinerdogan, Bedir ( Elsevier , 2022 , Article)
      The manual prediction of plant species and plant diseases is expensive, time-consuming, and requires expertise that is not always available. Automated approaches, including machine learning and deep learning, are increasingly ...
    • Product failure detection for production lines using a data-driven model 

      Kang, Ziqiu; Catal, Cagatay; Tekinerdogan, Bedir ( Elsevier , 2022 , Article)
      For a healthy production line, it is essential to ensure a low failure rate of products. Product quality in production lines can be inspected using several techniques at the end of a production process, including a manual ...
    • A Firewall Policy Anomaly Detection Framework for Reliable Network Security 

      Togay, Cengiz; Kasif, Ahmet; Catal, Cagatay; Tekinerdogan, Bedir ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      One of the key challenges in computer networks is network security. For securing the network, various solutions have been proposed, including network security protocols and firewalls. In the case of so-called packet-filtering ...
    • Data analytics platforms for agricultural systems: A systematic literature review 

      Nyoman Kutha Krisnawijaya, Ngakan; Tekinerdogan, Bedir; Catal, Cagatay; Tol, Rik van der ( Elsevier , 2022 , Article Review)
      With the rapid developments in ICT, the current agriculture businesses have become increasingly data-driven and are supported by advanced data analytics techniques. In this context, several studies have investigated the ...
    • Techniques for calculating software product metrics threshold values: A systematic mapping study 

      Mishra, Alok; Shatnawi, Raed; Catal, Cagatay; Akbulut, Akhan ( MDPI , 2021 , Article)
      Several aspects of software product quality can be assessed and measured using product metrics. Without software metric threshold values, it is difficult to evaluate different aspects of quality. To this end, the interest ...
    • Systematic reviews in sentiment analysis: a tertiary study 

      Ligthart, Alexander; Catal, Cagatay; Tekinerdogan, Bedir ( Springer Science and Business Media B.V. , 2021 , Article)
      With advanced digitalisation, we can observe a massive increase of user-generated content on the web that provides opinions of people on different subjects. Sentiment analysis is the computational study of analysing people's ...
    • Smart warehouses: Rationale, challenges and solution directions 

      van Geest, Maarten; Tekinerdogan, Bedir; Catal, Cagatay ( MDPI , 2022 , Article Review)
      Smart warehouses aim to increase the overall service quality, productivity, and efficiency of the warehouse while minimizing costs and failures. In recent years, several studies have proposed and discussed different types ...
    • Dairy Farm Management Information Systems 

      Kassahun, Ayalew; Bloo, Robbin; Catal, Cagatay; Mishra, Alok ( MDPI , 2022 , Article)
      Nowadays, different types of farm management information systems (FMIS) are being used in practice in several sectors of farming, such as dairy, arable, fruits, vegetables, and meat farming. The goal of this research is ...
    • Remaining useful life (Rul) prediction of equipment in production lines using artificial neural networks 

      Kang, Ziqiu; Catal, Cagatay; Tekinerdogan, Bedir ( MDPI , 2021 , Article)
      Predictive maintenance of production lines is important to early detect possible defects and thus identify and apply the required maintenance activities to avoid possible breakdowns. An important concern in predictive ...
    • Automation of systematic literature reviews: A systematic literature review 

      van Dinter, Raymon; Tekinerdogan, Bedir; Catal, Cagatay ( Elsevier , 2021 , Article Review)
      Context: Systematic Literature Review (SLR) studies aim to identify relevant primary papers, extract the required data, analyze, and synthesize results to gain further and broader insight into the investigated domain. ...
    • A Multi-Channel Convolutional Neural Network approach to automate the citation screening process 

      van Dinter, Raymon; Catal, Cagatay; Tekinerdogan, Bedir ( Elsevier , 2021 , Article)
      The systematic literature review (SLR) process is separated into several steps to increase rigor and reproducibility. The selection of primary studies (i.e., citation screening) is an important step in the SLR process. The ...
    • A hybrid DNN-LSTM model for detecting phishing URLs 

      Ozcan, Alper; Catal, Cagatay; Donmez, Emrah; Senturk, Behcet ( Springer Science and Business Media Deutschland GmbH , 2021 , Article)
      Phishing is an attack targeting to imitate the official websites of corporations such as banks, e-commerce, financial institutions, and governmental institutions. Phishing websites aim to access and retrieve users' important ...
    • A feature-based approach for guiding the selection of Internet of Things cybersecurity standards using text mining 

      van der Schaaf, Koen; Tekinerdogan, Bedir; Catal, Cagatay ( John Wiley and Sons Ltd , 2021 , Article)
      Cybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires ...
    • A decision support system for automating document retrieval and citation screening 

      van Dinter, Raymon; Catal, Cagatay; Tekinerdogan, Bedir ( Elsevier , 2021 , Article)
      The systematic literature review (SLR) process includes several steps to collect secondary data and analyze it to answer research questions. In this context, the document retrieval and primary study selection steps are ...
    • Designing a reference architecture for health information systems 

      Tummers, Joep; Tobi, Hilde; Catal, Cagatay; Tekinerdogan, Bedir ( BioMed Central Ltd , 2021 , Article)
      Background: Healthcare relies on health information systems (HISs) to support the care and receive reimbursement for the care provided. Healthcare providers experience many problems with their HISs due to improper architecture ...
    • A Dynamic Trust Evaluation and Update Mechanism Based on C4.5 Decision Tree in Underwater Wireless Sensor Networks 

      Jiang, Jinfang; Zhu, Xinyu; Han, Guangjie; Guizani, Mohsen; Shu, Lei ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      At present, Underwater Wireless Sensor Networks (UWSNs) have been widely used in enormous applications, and simultaneously face many security threats. The trust management mechanism plays an important role in protecting ...
    • An Efficient, Accountable, and Privacy-Preserving Access Control Scheme for Internet of Things in a Sharing Economy Environment 

      Liu, Yu; Xue, Kaiping; He, Peixuan; Wei, David S.L.; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      The Internet of Things (IoT) has set off a new information technology revolution due to its convenience and efficiency. An IoT enables sharing economy, as more people are willing to share their own things (mostly mobile ...