Murat Dörterler

Murat Dörterler
Gazi University · Department of Computer Engineering (FT)

PhD

About

43
Publications
20,202
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
312
Citations

Publications

Publications (43)
Article
Robot Gripper Design Optimization Problem is a well-known multi-objective optimization problem explored by various approaches in previous studies over the last few decades. The continuous parameter z plays an important role in determining a robot gripper's minimum and maximum gripping forces. However, previous studies have utilized a simple loop ap...
Article
Full-text available
In this study, a prototype based on fuzzy logic (FL) controller and internet of things (IoT) was developed to monitor rumen health parameters in cattle. In the system build as a prototype, the monitoring process related to the parameters is followed through three different applications developed on the Android operating system, the Thingspeak servi...
Article
Full-text available
The widespread use of social networks has caused these platforms to become the target of malicious people. Although social networks have their own spam detection systems, these systems sometimes may not prevent spams in their social networks. Spam contents and messages threaten the security and performance of users of these networks. A spam account...
Article
Although security have to be a key issue for systems carrying intelligence such as surveillance system, it is still overshadowed by bandwidth utilization in multicast networks. Next Generation Firewalls (NGFWs), state of the art cyber security devices, can be a solution with their content awareness features for this issue. NGFWs are both security a...
Article
Automatic detection of emotions in textual data masses provides priceless opportunities for researchers and also it is inevitable for practitioners. The unfavorable factors involved in text data cause ambiguity and adversely affect the performances of emotion classifiers. Although deep learning approaches spark off significantly successive results,...
Article
Emotion classification is a research field that aims to detect the emotions in a text using machine learning methods. In traditional machine learning (TML) methods, feature engineering processes cause the loss of some meaningful information, and classification performance is negatively affected. In addition, the success of modelling using deep lear...
Preprint
Full-text available
Data Clustering stands for a group of methods classifying patterns into groups and retrieving similarities or dissimilarities of a collection of objects. Clustering is used for pattern recognition, machine learning, etc. One of the approaches to clustering is optimization. The aim of the optimization is finding the best solution in the search space...
Article
Full-text available
Robot grippers are widely used in a variety of areas requiring automation, precision and safety. The performance of the grippers is directly associated with their design. In this study, four different multi-objective metaheuristic algorithms including Particle Swarm Optimization (MOPSO), Artificial Algae Algorithm (MOAAA), Grey Wolf Optimizer (MOGW...
Article
Full-text available
The need for precise mechanical and tribological properties of the hydrostatic bearings has made them an interesting study topic for optimisation studies. In this paper, power-loss minimization problems of hydrostatic thrust bearings were solved through Grey Wolf Optimizer (GWO). Grey Wolf Optimizer is a meta-heuristic optimization method standing...
Article
Full-text available
Generalized assignment problem (GAP) considers finding minimum cost assignment of n tasks to m agents provided each task should be assigned to one agent only. In this study, a new Genetic Algorithm (GA) with some new methods is proposed to solve GAPs. The agent-based crossover is based on the concept of dominant gene in genotype science and increas...
Article
Full-text available
Social networks have become an inseparable part of our lives today. Services such as Facebook, Twitter, Instagram, Google + and LinkedIn in particular have had a significant place in Internet use in recent years. People establish instant interactions between each other over the Internet using these social services. They get many advantages such as...
Article
The design of gears with a minimum weight is an optimization problem that has been widely discussed in the literature. Various recent metaheuristic optimization methods, along with the conventional methods, have produced successful results for design optimization problems. In this study, a comprehensive investigation was conducted into the solution...
Article
Full-text available
Robot grippers are the tools used for gripping, moving and fixing objects. They are integrated into robotic systems and can grip an object for at least one maneuver without any damage. Design optimization of robot grippers is crucial to carry on their dedicated jobs without any faults. The design optimization of robot grippers is a research topic....
Data
All Twitter APIs that return Tweets provide that data encoded using JavaScript Object Notation (JSON). JSON is based on key-value pairs, with named attributes and associated values. These attributes, and their state are used to describe objects. Twitter serves many objects as JSON, including Tweets and Users. These objects all encapsulate core attr...
Conference Paper
Full-text available
today, people's quality of life with the development of technology increases. Ads, information and invoce messages or random incoming an E-mail / Short Message Service (SMS) have usually a web page link in them. Short link services, goo. gl, bit. ly, and so on, are used instead of long addresses of websites in order to save the meaning of the messa...
Preprint
Full-text available
today, people's quality of life with the development of technology increases. Ads, information and invoce messages or random incoming an E-mail / Short Message Service (SMS) have usually a web page link in them. Short link services, goo. gl, bit. ly, and so on, are used instead of long addresses of websites in order to save the meaning of the messa...
Article
Full-text available
Optimal design of machine elements is a research field studying in engineering commonly. Design of compression springs according to minimum weight or volume is one of the most studied problems in this field. The problem is also used as a benchmark problem for the optimization methods. Artificial Algae Algorithm (AAA) is an optimization technique an...
Conference Paper
E-mail communication is one of today's indispensable communication ways. The widespread use of email has brought about some problems. The most important one of these problems are spam (unwanted) e-mails, often composed of advertisements or offensive content, sent without the recipient's request. In this study, it is aimed to analyze the content inf...
Article
The weight of gears is an important issue for high performance of the machine elements. Thus, the design of the gear pairs with respect to the minimum weight is an important and attractive subject to study. Various analytical and heuristic approaches were utilized to optimize the weight of gears in previous studies. In this study, the problem of ge...
Article
Full-text available
Safety systems detect unsafe conditions and provide warnings for travellers to take action and avoid crashes. Estimation of the geographical location of a moving vehicle as to where it will be positioned next with high precision and short computation time is crucial for identifying dangers. To this end, navigational and dynamic data of a vehicle ar...
Article
Full-text available
Mobile ad hoc networks (MANETs) consist of mobile devices that communicate with each other without a predefined fixed infrastructure. Using of MANETs provides significant benefits in emergencies thanks to this feature. Various malfunctions such as end to end delay, bandwidth congestion and, reduction in the packet transmission ratio occur in data t...
Article
Full-text available
Son yıllarda akıllı mobil cihazlar hayatımızı ciddi anlamda kolaylaştırmış ve hız kazandırmıştır. Android işletim sistemi (İS) bu cihazlar arasında en yüksek kullanım oranına sahiptir. Yaygın kullanım, yetersiz güvenlik mekanizmaları ve kullanıcıların bilinç düzeyi bu İS’ni saldırganların hedefi haline getirmektedir. Android İS’nin güvenlik mekaniz...
Conference Paper
Full-text available
Geleneksel arama motoru yöntemlerinde, aranan anahtar kelimenin metin içinde geçmesi gerekmektedir. Anlamsal aramada ise aranan anahtar kelimeler bire bir metin içinde bulunmak zorunda değildir. Anlamsal aramada anahtar kelime etiketlenen kelimelerle bulunabilir. Böylece anahtar kelime olmasa bile anlam bütünlüğü sağlanmış şekilde arama gerçekleşti...
Conference Paper
Spam SMS messages are one of the most important problems that arise with the widespread use of SMS. This study aims to identify SMS messages containing spam with the help of Multinomial Naïve Bayes (MNB) Classifier from Machine Learning methods. In the study, a dataset named TurkishSMS consisting of 850 Turkish messages, which include 420 spam and...
Article
Full-text available
Optimization of machine elements is both an important issue and an intensive study topic in engineering. Design of compression springs according to minimum weight or volume is a sample problem in this area. Various optimization methods such as particle swarm optimization, genetic algorithm are applied to the problem. Grey Wolf optimization (GWO) me...
Article
Optimization of machine elements is both an important issue and an intensive study topic in engineering. Design of compression springs according to minimum weight or volume is a sample problem in this area. Various optimization methods such as particle swarm optimization, genetic algorithm are applied to the problem. Grey Wolf optimization (GWO) me...
Article
Full-text available
Many central examinations are performed nationwide in Turkey. These examinations are held simultaneously throughout Turkey. Examinees attempt to arrive at the examination centers at the same time and they encounter problems such as traffic congestion, especially in metropolises. The state of mind that this situation puts them into negatively affect...
Article
Full-text available
Real Time Test Bed for Vehicular Ad-Hoc Networks
Conference Paper
Full-text available
Yükseköğre tim kurumları ve bu ölçekteki diğer kurumlar ağ altyapısı üzerinden sağladıkları servis ve hizmetlerin sürekli ve verimli bir şekilde gerçekleştirmek için performans, süreklilik, ölçeklenebilirlik, güvenilirlik, esneklik ve yönetilebilirlik kriterlerini sa ğlaması gerekmektedir. Tüm üniversitenin iletişiminin tek merkezi bir altyap...
Conference Paper
Full-text available
Gazi Üniversitesi, 2009 yılı başında bilgi işlem alt yapısını çağın ve teknolojinin yeniliklerine göre yenileme kararı almıştır. Bu karar doğrultusunda "Gazi Üniversitesi Bilgi İşlem Altyapısı Yenileme Projesi" adı altında köklü yeniliklere gidilmiştir. Proje bünyesinde ağ topolojisi sadeleştirilerek tüm binalardan merkeze doğrudan fiber bağlantı y...
Article
Full-text available
Nowadays most of the enterprises are comprise of small and middle (Small-Medium Enterprises (SMEs). SMEs have more dynamic structrure and flexible desicion making mechanism than big enterprises. SMEs are defined as enterprises which assessment of creating employment potential bestly. Especially, is the fact which is being intensify and based on the...
Article
Full-text available
Planning actions, continuity and determination on control is very important on management. Collecting information's which are quick; dependable about all components that composed to management is necessary for providing continuity oriented on pointed decisions. Also, this information's must be analyzed true. It is very important that each of compon...
Conference Paper
Bu çalışmada, ayrıntılı olarak web kullanılabilirliğinden bahsedilmiş olup, literatür taraması sonucunda ortaya çıkan kullanılabilirlik prensipleri, kullanılabilirlik tavsiyeleri ve kullanılabilirlik yasakları verilmiştir. Bir siteye ait kullanılabilirlik değerlendirmesi yapılmadan o sitenin iyi veya kötü olduğunun söylenemeyeceği üzerinde durulmuş...
Conference Paper
Nowadays, distance education becomes widespread with advances in information and communication technologies. Distance education activities are predominantly conducted, through the Learnning Management Systems. The success of distance education affects the level of interaction is one of the critical factor. In this context, the success of LMS softwa...
Conference Paper
Full-text available
Veri Madenciliği, veriden bilgi elde etme amaçlı kullanılan teknikler bütünüdür. İstatistiksel analiz tekniklerinin ve yapay zekâ algoritmalarının bir arada kullanılarak veri içerisindeki gizli bilgilerin açığa çıkarılması ve verinin nitelikli bilgiye dönüştürülmesi sürecidir. Veri Madenciliği uygulamalarını gerçekleştirmek için ticari ve açık kayn...
Conference Paper
Full-text available
Küçük ve Orta Büyüklükteki İşletmeler (KOBİ), ekonomiye dinamizm ve rekabetçi bir boyut kazandırarak piyasa mekanizmasının etkinligini artırma, sürdürülebilir kalkınmayı saglama, istihdam yaratma gibi önemli fonksiyonları ile Türk ekonomisinin temel dinamigini olusturmaktadırlar. Büyüme ve gelisme çabaları sonucu giderek karmasıklasan bilgi akıslar...

Questions

Questions (2)
Question
In various studies, researchers use "Pure Random Optimization" (PRO) for performance comparison with the optimization method proposed by them. But, I could not find any detail about PRO and its implementation. What is the definition and implementation of PRO?
Question
I am interested in  the optimal weight design of a gear train problem using optimization methods. There are a variety of studies on this topic.  One of them is "A Solution Method for Optimal Weight Design Problem of the Gear Using Genetic Algorithms" by Takao YOKOTA et al. The objective funticon and constraints are described as same formulations in not only the study of Yokota et al. but also the later studies. Nevertheless, I cannot find any detail about two terms. The former one is "b5" mentioned in the constraint "g5".  g5 is defined as the distance between the axes. The latter one is "l" mentioned in the objective function. "l" is defined as length of boss.
Could you inform me about these terms. Do the terms stand for a formulation or a constant value. 

Network

Cited By