Ara
Toplam kayıt 103, listelenen: 31-40
Using latent semantic analysis for automated keyword extraction from large document corpora
(Tubitak Scientific & Technical Research Council Turkey, 2017)
In this study, we describe a keyword extraction technique that uses latent semantic analysis (LSA) to identify semantically important single topic words or keywords. We compare our method against two other automated keyword ...
Blockchain-Based Secure Recognized Air Picture System Proposal for NATO Air C2 Capabilities
(Springer, 2020)
The command and control (C2) systems are of prime importance for leveraging the superiority of the air forces in combat operations. The key element for these systems is a single, coherent recognized air picture (RAP) which ...
Design and Implementation of SDN-Based Secure Architecture for IoT-Lab
(Springer, 2020)
There are various IoT devices with many different hardware environments and an ecosystem that will enable these various devices to work together is not yet existent. As IoT networks are becoming more widespread, the number ...
Twister2 Cross-platform resource scheduler for big data
(Wiley, 2021)
Twister2 is an open-source big data hosting environment designed to process both batch and streaming data at scale. Twister2 runs jobs in both high-performance computing (HPC) and big data clusters. It provides a cross-platform ...
Models in Graphical User Interface Testing: Study Design
(IEEE, 2020)
Model-based GUI testing is an important concept in Software GUI testing. Manual testing is a time-consuming labor and heavily error-prone. It has several well-accepted models that Software Testing community has been working ...
A framework for investigating search engines’ stemming mechanisms: A case study on Bing
(John Wiley and Sons Ltd, 2021)
Big data attracts the attention of governments and a lot of companies today. The developments in technology and the Internet make it one of the important sources of big data. It is easy to get lost in the enormous amount ...
Recreating a Large-Scale BGP Incident in a Realistic Environment
(Springer, 2013)
The Internet has become a critical asset for both the economy and the society. Realistic experimentation environments are needed to study and improve the resilience and the stability of the Internet. In this paper, we ...
In silico analysis of autoimmune diseases and genetic relationships to vaccination against infectious diseases
(Bmc, 2014)
Background: Near universal administration of vaccines mandates intense pharmacovigilance for vaccine safety and a stringently low tolerance for adverse events. Reports of autoimmune diseases (AID) following vaccination ...
Statistical principal components analysis for retrieval experiments
(Wiley, 2007)
In this article, the statistical principal components analysis (PCA) is proposed as a method for performance comparisons of different retrieval strategies. It is shown that the PCA method can reveal implicit performance ...
A suffix based part-of-speech tagger for Turkish
(Ieee Computer Soc, 2008)
In this paper, we present a stochastic part-of-speech tagger for Turkish. The tagger is primarily developed for information retrieval purposes, but it can as well serve as a light-weight PoS tagger for other purposes. The ...