“I was happy when I design my own signature. Also, deciding to put my signature under this job makes me … More
Author: Sefik Serengil
Exchanging Encrypted Mails
2016 released Snowden is a biographical movie fictionalised life story of Former NSA employee Edward Snowden. The movie reveals illegal surveillance techniques of the government organization. Also, … More
Protecting Java Codes: Encrypted Class Loader
Cloud services are adopted by both start-ups and enterprises in recent years. However, it comes security issues. At this point, … More
Homer Sometimes Nods: Error Metrics in Machine Learning
Even the worthy Homer sometimes nods. The idiom means even the most gifted person occasionally makes mistakes. We would adapt this … More
Small is Beautiful: working with short URLs
Today’s world limits our expressions lenght to 140 character. No matter you text SMS or Tweet, you have to fit your … More
AI: a one-day wonder or an everlasting challenge
Debates between humans and computers start with mechanical turk. That’s an historical autonomous chess player costructed in 18th century. However, … More
Adaptive Learning in Neural Networks
Gradient descent is one of the most powerful optimizing method. However, learning time is a challange, too. Standard version of gradient … More
Incorporating Momentum Into Neural Networks Learning
Newton’s cradle is the most popular example of momentum conservation. A lifted and released sphere strikes the stationary spheres and … More
Even Superheroes Need to Rest: Working on Trained Neural Networks in Weka
Applying neural networks could be divided into two phases as learning and forecasting. Learning phase has high cost whereas forecasting … More
Building Neural Networks with Weka In Java
Building neural networks models and implementing learning consist of lots of math this might be boring. Herein, some tools help researchers to … More