A performance evaluation of in-memory databases AT Kabakus, R Kara Journal of King Saud University-Computer and Information Sciences 29 (4 …, 2017 | 99 | 2017 |
Breast cancer diagnosis via data mining: performance analysis of seven different algorithms ZK Senturk, R Kara Computer Science & Engineering 4 (1), 35, 2014 | 91 | 2014 |
A survey of spam detection methods on twitter AT Kabakus, R Kara International Journal of Advanced Computer Science and Applications 8 (3), 2017 | 66 | 2017 |
Using swarm intelligence algorithms to detect influential individuals for influence maximization in social networks A ŞİMŞEK, K Resul Expert Systems with Applications 114, 224-236, 2018 | 54 | 2018 |
RETRACTED ARTICLE: Leakage detection and localization on water transportation pipelines: a multi-label classification approach F Kayaalp, A Zengin, R Kara, S Zavrak Neural Computing and Applications 28 (10), 2905-2914, 2017 | 48 | 2017 |
Convolutional neural networks predict the onset of paroxysmal atrial fibrillation: Theory and applications M Surucu, Y Isler, M Perc, R Kara Chaos: An Interdisciplinary Journal of Nonlinear Science 31 (11), 2021 | 33 | 2021 |
Öğretim elemanlarının pedagojik formasyon ihtiyacı FE Acar, A Kılıç, Ş Ay, AK Vardar, R Kara International Conference on New Trends in Education and Their Implications …, 2010 | 26 | 2010 |
Fatigue life predictions of metal matrix composites using artificial neural networks I Uygur, A Cicek, E Toklu, R Kara, S Saridemir Archives of Metallurgy and Materials 59 (1), 97-103, 2014 | 20 | 2014 |
“TwitterSpamDetector”: a spam detection framework for Twitter AT Kabakus, R Kara International Journal of Knowledge and Systems Science (IJKSS) 10 (3), 1-14, 2019 | 16 | 2019 |
A new routing algorithm in MANETs: Position based hybrid routing R Kara Scientific Research and Essays, 2010 | 16 | 2010 |
TwitterSentiDetector: a domain-independent Twitter sentiment analyser AT Kabakus, R Kara INFOR: Information Systems and Operational Research 56 (2), 137-162, 2018 | 15 | 2018 |
Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission H Bodur, R Kara 2017 9th International Conference on Computational Intelligence and …, 2017 | 13 | 2017 |
Secure SMS Encryption Using RSA Encryption Algorithm on Android Message Application H Bodur, R Kara 3rd International Symposium On Innovative Technologies In Engineering And …, 2015 | 13 | 2015 |
Fuzzy logic and image compression based energy efficient application layer algorithm for wireless multimedia sensor networks A Senturk, R Kara, I Ozcelik COMSIS CONSORTIUM, 2020 | 9 | 2020 |
Layered model architecture for internet of things Z Bozdogan, R Kara Journal of Engineering Research and Applied Science 4 (1), 260-264, 2015 | 9 | 2015 |
Survey of instant messaging applications encryption methods AT Kabakuş, R Kara Avrupa Bilim ve Teknoloji Dergisi 2 (4), 112-117, 2015 | 9 | 2015 |
Binary apple tree: A game approach to tree traversal algorithms Z Karapinar, A Senturk, S Zavrak, R Kara, P Erdogmus 2012 International Conference on Information Technology Based Higher …, 2012 | 8 | 2012 |
Can exposure to manganese and extremely low frequency magnetic fields affect some important elements in the rat teeth B Ince, Z Akdag, E Bahsi, S Erdogan, S Celik, Z Akkus, M Dalli, C Sahbaz, ... Eur Rev Med Pharmacol Sci 16 (6), 763-769, 2012 | 8 | 2012 |
Power control in wireless ad hoc networks for energy efficient routing with end-to-end packet delay minimization R Kara International Journal of the Physical Sciences 6 (7), 1773-1779, 2011 | 8 | 2011 |
An analysis of image compression techniques in wireless multimedia sensor networks A Senturk, R Kara Tehnički vjesnik 23 (6), 1863-1869, 2016 | 7 | 2016 |