Yayın tarihi için Bilgisayar Mühendisliği Bölümü Koleksiyonu listeleme
Toplam kayıt 103, listelenen: 41-60
-
Religion and the Construction of Ethnic Identity in Kyrgyzstan
(Slavica Publishers, 2017)With the introduction of new definitions of religion and religious actors, defining the relationship of Islam to national identity has been essential for the post-Soviet Central Asian states. This work, based on qualitative ... -
An Augmented Reality Application for Smart Campus Urbanization: MSKU Campus Prototype
(Ieee, 2017)Augmented Reality applications are used in almost every area of our lives. These applications have been started to use in the town planning and smart city applications. In this study, a prototype application was developed ... -
Using latent semantic analysis for automated keyword extraction from large document corpora
(Tubitak Scientific & Technical Research Council Turkey, 2017)In this study, we describe a keyword extraction technique that uses latent semantic analysis (LSA) to identify semantically important single topic words or keywords. We compare our method against two other automated keyword ... -
Blokzinciri tabanlı siber güvenlik sistemleri
(Şeref SAĞIROĞLU, Gazi Üniversitesi, 2017)Kripto paralar (cryptocurrency), eşler arası (Peer-to-Peer) mimaride birbirine bağlı madenci düğümü adı verilen bilgisayarlara ve blokzinciri yapısında tutulan kayıt sistemine dayanmaktadır. Bu sistemler sadece bir para ... -
Uygulama Tabanlı Bilgisayar ve Ağ Güvenliği Eğitimi: MSKÜ Deneyimi
(2017)Siber güvenlik konularında bilgi sahibi olan ve özellikle özgür yazılım araçlarını deneyimlemiş, yetişmiş insan gücü ihtiyacı her geçen gün artmaktadır. Sadece teoriyi vermek yetmemekte, bu bilgilerin uygulamalarla ... -
Real-Time Object Detection Application for Visually Impaired People: Third Eye
(Ieee, 2018)Visually impaired people can't move safely outdoors because they can not perceive the outside obstacles as normal people. The prototype application in this study aims to make the visually impaired people's lives easier ... -
Web Application Attack Detection and Forensics: A Survey
(Ieee, 2018)Web application attacks are an increasingly important area in information security and digital forensics. It has been observed that attackers are developing the capability to bypass security controls and launch a large ... -
A computational morphological lexicon for Turkish: TrLex
(Elsevier Science Bv, 2018)A morphological lexicon that is a computational source should be considered together with derivational morphology especially for agglutinative languages. To the best of our knowledge, in the Turkish language there has been ... -
Blockchain Based Secure Communication Application Proposal: Cryptouch
(Ieee, 2018)The convergence which brought with the globalizing world, highly affects the network and the communication sectors. Mostly closed source and centralized systems are used for network and communication. This contradicts with ... -
Augmented Reality Application for Smart Tourism: GokovAR
(Ieee, 2018)Usage of augmented reality technology in daily life is becoming more widespread. This technology is also being applied in the field of tourism. In this study, a prototype of mobile application for smart tourism has been ... -
Detecting Citizen Problems and Their Locations Using Twitter Data
(Ieee, 2018)Twitter is a social network, which contains information of the city events (concerts, festival, etc.), city problems (traffic, collision, and road incident), the news, feelings of people, etc. For these reasons, there are ... -
On constituent chunking for Turkish
(Elsevier Sci Ltd, 2018)Chunking is a task which divides a sentence into non-recursive structures. The primary aim is to specify chunk boundaries and classes. Although chunking generally refers to simple chunks, it is possible to customize the ... -
Kırgızistan’da Büyü ve Şifacılığın Sosyal Antropoloji Bağlamında Değerlendirilmesi
(2018)Bu makale, Kırgızistan’ın Bişkek şehrinde bağımsızlık sonrası oldukça popülerleşen ve günü- müzde de devam eden büyü ve şifacılık pratiklerini analiz etmektedir. Bu analiz aracılığıyla, Sovyet sonrası ekonomik ve sosyal ... -
A Survey on Feasibility and Suitability of Blockchain Techniques for the E-Voting Systems
(Tejass Publisheers, 2018)In the second decade of the 21st century, blockchain definitely became one of the most trending computational technologies. This research aims to question the feasibility and suitability of using blockchain technology ... -
A Blockchain-based Certification System for Education: BCERTIFICATED
(Istanbul University Press, 2018)This study is an attempt to solve the certificate validation problem in open and distance learning programs, and has been specifically designed for a professional development program provided by a state university in Turkey. ... -
Blokzinciri Teknolojisinin E-Devlet Uygulamalarında Kullanımı: Ön İnceleme
(2018)Blok zinciri (blockchain), merkezi olmayan ve sağlama (hash) süreçleri ile değişmezliği garantilenen işlem kayıtlarının takibini sağlayan bir teknolojidir. Bu teknoloji ismini kripto paralar (crypto currency) ile duyursa ... -
A selective approach to index term weighting for robust information retrieval based on the frequency distributions of query terms
(Springer, 2019)A typical information retrieval (IR) system applies a single retrieval strategy to every information need of users. However, the results of the past IR experiments show that a particular retrieval strategy is in general ... -
Blockchain Based Metering and Billing System Proposal with Privacy Protection for the Electric Network
(Ieee, 2019)Measurement of energy especially electricity consumption becomes an issue in big cities. Electricity usage monitoring is becoming more crucial and there is a need for the instant view of active energy usage. Solutions like ... -
DASH-QoS: A scalable network layer service differentiation architecture for DASH over SDN
(Elsevier, 2019)As one of the key technologies residing in the future Internet concepts, Software Defined Networking (SDN) makes it possible to develop application-centric flow routing strategies. Thanks to the benefits offered by the SDN ... -
Blockchain Based Trusted Adoption and Fostering System Proposal for Turkish Animal Shelters
(Institute of Electrical and Electronics Engineers Inc., 2019)Animal shelters are known as safe places which are managed by governmental or nongovernmental organizations, however the way these establishments harboring animals is a controversial issue. Almost every country in the world ...