Başlık için Bilgisayar Mühendisliği Bölümü Koleksiyonu listeleme
Toplam kayıt 103, listelenen: 9-28
-
Bilgisayar Ağlarında Güvenlik Politikalarının Uygulanması
(TMMOB EMO İzmir Şubesi, 2003)Ağ güvenlik politikası, kısaca bilgisayar ağının güvenliğini ilgilendiren her türlü bileşenin yönetimi ile ilgili stratejinin resmi şekilde yazılı olarak ifade edilmesidir. Bu bildiride güvenlik politikalarının kurumlar ... -
Blockchain Based Metering and Billing System Proposal with Privacy Protection for the Electric Network
(Ieee, 2019)Measurement of energy especially electricity consumption becomes an issue in big cities. Electricity usage monitoring is becoming more crucial and there is a need for the instant view of active energy usage. Solutions like ... -
Blockchain Based Secure Communication Application Proposal: Cryptouch
(Ieee, 2018)The convergence which brought with the globalizing world, highly affects the network and the communication sectors. Mostly closed source and centralized systems are used for network and communication. This contradicts with ... -
Blockchain Based Trusted Adoption and Fostering System Proposal for Turkish Animal Shelters
(Institute of Electrical and Electronics Engineers Inc., 2019)Animal shelters are known as safe places which are managed by governmental or nongovernmental organizations, however the way these establishments harboring animals is a controversial issue. Almost every country in the world ... -
A Blockchain-based Certification System for Education: BCERTIFICATED
(Istanbul University Press, 2018)This study is an attempt to solve the certificate validation problem in open and distance learning programs, and has been specifically designed for a professional development program provided by a state university in Turkey. ... -
Blockchain-Based Secure Recognized Air Picture System Proposal for NATO Air C2 Capabilities
(Springer, 2020)The command and control (C2) systems are of prime importance for leveraging the superiority of the air forces in combat operations. The key element for these systems is a single, coherent recognized air picture (RAP) which ... -
Blokzincirde Güvenli ve Güvenilir Uygulama Geliştirme Temelleri
(Nobel Yayıncılık, 2021)Merkezi olmayan çözümlerin öneminin anlaşıldığı ve hayata geçirilmeye başlandığı bir çağdayız. Blokzincir teknolojisi ve otonom kod (akıllı sözleşme) tabanlı merkezi olmayan uygulamalar (decentralized applications) ... -
Blokzinciri tabanlı siber güvenlik sistemleri
(Şeref SAĞIROĞLU, Gazi Üniversitesi, 2017)Kripto paralar (cryptocurrency), eşler arası (Peer-to-Peer) mimaride birbirine bağlı madenci düğümü adı verilen bilgisayarlara ve blokzinciri yapısında tutulan kayıt sistemine dayanmaktadır. Bu sistemler sadece bir para ... -
Blokzinciri Teknolojisinin E-Devlet Uygulamalarında Kullanımı: Ön İnceleme
(2018)Blok zinciri (blockchain), merkezi olmayan ve sağlama (hash) süreçleri ile değişmezliği garantilenen işlem kayıtlarının takibini sağlayan bir teknolojidir. Bu teknoloji ismini kripto paralar (crypto currency) ile duyursa ... -
Blokzincirinin Askeri Lojistik Takip Sistemlerinde Kullanılması
(Nobel Yayınevi, 2021)Blokzincir teknolojisi ilk olarak kripto paraların mimari altyapısı olarak tanınmıştır. Akıllı anlaşmaların kullanılmaya başlamasıyla finans sektöründen lojistik yönetimine kadar pek çok alanda kullanım imkânı bulmuştur. ... -
Chronotype and Sleep Quality Assessment of Patients with Polycystic Ovary Syndrome
(Galenos, 2021)Aim: Polycystic Ovary Syndrome (PCOS) is the most common endocrine disorder among women during the reproductive ages. The purpose of this study was to investigate the chronotype and sleep quality of PCOS patients. Methods: ... -
Comparison of protein expression profile of limb regeneration between neotenic and metamorphic axolotl
(Academic Press Inc Elsevier Science, 2020)The axolotl (Ambystoma mexicanum) salamander, a urodele amphibian, has an exceptional regenerative capacity to fully restore an amputated limb throughout the life-long lasting neoteny. By contrast, when axolotls are ... -
A computational morphological lexicon for Turkish: TrLex
(Elsevier Science Bv, 2018)A morphological lexicon that is a computational source should be considered together with derivational morphology especially for agglutinative languages. To the best of our knowledge, in the Turkish language there has been ... -
A correlation coefficient-based feature selection approach for virus-host protein-protein interaction prediction
(Plos, 2023)Prediction of virus-host protein-protein interactions (PPI) is a broad research area where various machine-learning-based classifiers are developed. Transforming biological data into machine-usable features is a preliminary ... -
Çevrimiçi Mahremiyet: Teknik ve Hukuksal Durum İncelemesi
(2.12.2014)Çevrimiçi trafiğin takip edilmesi çoğunlukla ticari amaçla yapılmaktadır. Kullanıcının kişisel ilgi alanlarının saptanması ve ona göre reklam gösterilmesine Çevrimiçi Davranışsal Reklamcılık (ÇDR) denmektedir. Bu amaçla ... -
DASH-QoS: A scalable network layer service differentiation architecture for DASH over SDN
(Elsevier, 2019)As one of the key technologies residing in the future Internet concepts, Software Defined Networking (SDN) makes it possible to develop application-centric flow routing strategies. Thanks to the benefits offered by the SDN ... -
Data Storage in the Decentralized World: Blockchain and Derivatives
(Istanbul University Press, 2020)We have entered an era where the importance of decentralized solutions has become more obvious. Blockchain technology and its derivatives are distributed ledger technologies that keep the registry of data between peers of ... -
A Decentralized Resource Management System Proposal For Disasters: NGO-RMSD (STK-AKYS)
(2022)Disaster and emergency management are under the responsibility of many organizations and there are serious coordination problems in post-disaster crisis management. This paper proposes a decentralized non-governmental ... -
Decentralized Solutions for Data Collection and Privacy in Healthcare
(De Gruyter, 1.2.2021)Using artificial intelligence for data-driven medical diagnosis requires processing a wide variety and massive amounts of medical data collected from different resources. Resilience, controllability, and privacy of the ... -
Design and Implementation of SDN-Based Secure Architecture for IoT-Lab
(Springer, 2020)There are various IoT devices with many different hardware environments and an ecosystem that will enable these various devices to work together is not yet existent. As IoT networks are becoming more widespread, the number ...