Başlık için Bilgisayar Mühendisliği Bölümü Koleksiyonu listeleme
Toplam kayıt 103, listelenen: 14-33
-
Blockchain-Based Secure Recognized Air Picture System Proposal for NATO Air C2 Capabilities
(Springer, 2020)The command and control (C2) systems are of prime importance for leveraging the superiority of the air forces in combat operations. The key element for these systems is a single, coherent recognized air picture (RAP) which ... -
Blokzincirde Güvenli ve Güvenilir Uygulama Geliştirme Temelleri
(Nobel Yayıncılık, 2021)Merkezi olmayan çözümlerin öneminin anlaşıldığı ve hayata geçirilmeye başlandığı bir çağdayız. Blokzincir teknolojisi ve otonom kod (akıllı sözleşme) tabanlı merkezi olmayan uygulamalar (decentralized applications) ... -
Blokzinciri tabanlı siber güvenlik sistemleri
(Şeref SAĞIROĞLU, Gazi Üniversitesi, 2017)Kripto paralar (cryptocurrency), eşler arası (Peer-to-Peer) mimaride birbirine bağlı madenci düğümü adı verilen bilgisayarlara ve blokzinciri yapısında tutulan kayıt sistemine dayanmaktadır. Bu sistemler sadece bir para ... -
Blokzinciri Teknolojisinin E-Devlet Uygulamalarında Kullanımı: Ön İnceleme
(2018)Blok zinciri (blockchain), merkezi olmayan ve sağlama (hash) süreçleri ile değişmezliği garantilenen işlem kayıtlarının takibini sağlayan bir teknolojidir. Bu teknoloji ismini kripto paralar (crypto currency) ile duyursa ... -
Blokzincirinin Askeri Lojistik Takip Sistemlerinde Kullanılması
(Nobel Yayınevi, 2021)Blokzincir teknolojisi ilk olarak kripto paraların mimari altyapısı olarak tanınmıştır. Akıllı anlaşmaların kullanılmaya başlamasıyla finans sektöründen lojistik yönetimine kadar pek çok alanda kullanım imkânı bulmuştur. ... -
Chronotype and Sleep Quality Assessment of Patients with Polycystic Ovary Syndrome
(Galenos, 2021)Aim: Polycystic Ovary Syndrome (PCOS) is the most common endocrine disorder among women during the reproductive ages. The purpose of this study was to investigate the chronotype and sleep quality of PCOS patients. Methods: ... -
Comparison of protein expression profile of limb regeneration between neotenic and metamorphic axolotl
(Academic Press Inc Elsevier Science, 2020)The axolotl (Ambystoma mexicanum) salamander, a urodele amphibian, has an exceptional regenerative capacity to fully restore an amputated limb throughout the life-long lasting neoteny. By contrast, when axolotls are ... -
A computational morphological lexicon for Turkish: TrLex
(Elsevier Science Bv, 2018)A morphological lexicon that is a computational source should be considered together with derivational morphology especially for agglutinative languages. To the best of our knowledge, in the Turkish language there has been ... -
A correlation coefficient-based feature selection approach for virus-host protein-protein interaction prediction
(Plos, 2023)Prediction of virus-host protein-protein interactions (PPI) is a broad research area where various machine-learning-based classifiers are developed. Transforming biological data into machine-usable features is a preliminary ... -
Çevrimiçi Mahremiyet: Teknik ve Hukuksal Durum İncelemesi
(2.12.2014)Çevrimiçi trafiğin takip edilmesi çoğunlukla ticari amaçla yapılmaktadır. Kullanıcının kişisel ilgi alanlarının saptanması ve ona göre reklam gösterilmesine Çevrimiçi Davranışsal Reklamcılık (ÇDR) denmektedir. Bu amaçla ... -
DASH-QoS: A scalable network layer service differentiation architecture for DASH over SDN
(Elsevier, 2019)As one of the key technologies residing in the future Internet concepts, Software Defined Networking (SDN) makes it possible to develop application-centric flow routing strategies. Thanks to the benefits offered by the SDN ... -
Data Storage in the Decentralized World: Blockchain and Derivatives
(Istanbul University Press, 2020)We have entered an era where the importance of decentralized solutions has become more obvious. Blockchain technology and its derivatives are distributed ledger technologies that keep the registry of data between peers of ... -
A Decentralized Resource Management System Proposal For Disasters: NGO-RMSD (STK-AKYS)
(2022)Disaster and emergency management are under the responsibility of many organizations and there are serious coordination problems in post-disaster crisis management. This paper proposes a decentralized non-governmental ... -
Decentralized Solutions for Data Collection and Privacy in Healthcare
(De Gruyter, 1.2.2021)Using artificial intelligence for data-driven medical diagnosis requires processing a wide variety and massive amounts of medical data collected from different resources. Resilience, controllability, and privacy of the ... -
Design and Implementation of SDN-Based Secure Architecture for IoT-Lab
(Springer, 2020)There are various IoT devices with many different hardware environments and an ecosystem that will enable these various devices to work together is not yet existent. As IoT networks are becoming more widespread, the number ... -
Detecting Citizen Problems and Their Locations Using Twitter Data
(Ieee, 2018)Twitter is a social network, which contains information of the city events (concerts, festival, etc.), city problems (traffic, collision, and road incident), the news, feelings of people, etc. For these reasons, there are ... -
DEVOUR: Deleterious Variants on Uncovered Regions in Whole-Exome Sequencing
(PMC, 2023)The discovery of low-coverage (i.e. uncovered) regions containing clinically significant variants, especially when they are related to the patient's clinical phenotype, is critical for whole-exome sequencing (WES) based ... -
Digital Twin Based Disaster Management System Proposal: DT-DMS
(İzmir Akademi Derneği, 1.3.2021)The damage and the impact of natural disasters are becoming more destructive with the increase of urbanization. Today's metropolitan cities are not sufficiently prepared for the pre and post-disaster situations. Digital ... -
Digital Twin Security Threats and Countermeasures: An Introduction
(Institute of Electrical and Electronics Engineers Inc., 2021)The digital twin is based on integrated technologies such as the Internet of Things (IoT), Cloud Computing, Machine Learning, and Artificial Intelligence. The digital twin has become an important method of the digital ... -
Does Network Awareness Make Difference In Intrusion Detection of Web Attacks
(2006)There is increasing number of attacks aiming web servers; mostly at the application level. This is due to the fact that web services emerging rapidly without security considerations and network level solutions allow their ...