Ara
Toplam kayıt 23, listelenen: 1-10
Real-Time Object Detection Application for Visually Impaired People: Third Eye
(Ieee, 2018)
Visually impaired people can't move safely outdoors because they can not perceive the outside obstacles as normal people. The prototype application in this study aims to make the visually impaired people's lives easier ...
Web Application Attack Detection and Forensics: A Survey
(Ieee, 2018)
Web application attacks are an increasingly important area in information security and digital forensics. It has been observed that attackers are developing the capability to bypass security controls and launch a large ...
A selective approach to index term weighting for robust information retrieval based on the frequency distributions of query terms
(Springer, 2019)
A typical information retrieval (IR) system applies a single retrieval strategy to every information need of users. However, the results of the past IR experiments show that a particular retrieval strategy is in general ...
Blockchain Based Metering and Billing System Proposal with Privacy Protection for the Electric Network
(Ieee, 2019)
Measurement of energy especially electricity consumption becomes an issue in big cities. Electricity usage monitoring is becoming more crucial and there is a need for the instant view of active energy usage. Solutions like ...
Detecting Citizen Problems and Their Locations Using Twitter Data
(Ieee, 2018)
Twitter is a social network, which contains information of the city events (concerts, festival, etc.), city problems (traffic, collision, and road incident), the news, feelings of people, etc. For these reasons, there are ...
Kırgızistan’da Büyü ve Şifacılığın Sosyal Antropoloji Bağlamında Değerlendirilmesi
(2018)
Bu makale, Kırgızistan’ın Bişkek şehrinde bağımsızlık sonrası oldukça popülerleşen ve günü- müzde de devam eden büyü ve şifacılık pratiklerini analiz etmektedir. Bu analiz aracılığıyla, Sovyet sonrası ekonomik ve sosyal ...
Türkiye’nin Otonom Sistem Seviyesinde İnternet Haritasının Çıkarımı ve İncelenmesi
(2010)
İnternet, üst seviyede incelendiğinde, Otonom Sistem (OS) olarak temsil edilen binlerce ağın birbirine bağlandığı, dünyayı saran her OS'nin bir düğüm ve Border Gateway Protokolü komşuluğu olan diğer OS'ler ile birleşmesinin ...
Towards Uniform Modeling and Holistic Testing of Hardware and Software
(Institute of Electrical and Electronics Engineers Inc., 2019)
This paper introduces an approach to uniform modeling and testing of hardware and software systems and their faults. As an example, for hardware under consideration, designs at a behavioral level will be used, implemented ...
UniRef clusters: a comprehensive and scalable alternative for improving sequence similarity searches
(Oxford Univ Press, 2015)
Motivation: UniRef databases provide full-scale clustering of UniProtKB sequences and are utilized for a broad range of applications, particularly similarity-based functional annotation. Non-redundancy and intra-cluster ...
Using latent semantic analysis for automated keyword extraction from large document corpora
(Tubitak Scientific & Technical Research Council Turkey, 2017)
In this study, we describe a keyword extraction technique that uses latent semantic analysis (LSA) to identify semantically important single topic words or keywords. We compare our method against two other automated keyword ...