Browsing Bilgisayar Mühendisliği Bölümü Koleksiyonu by Issue Date
Now showing items 1-20 of 30
-
Cusum - Entropy: An efficient method for DDoS attack detection
(Ieee, 2016)Computers and Internet have evolved into necessary tools for our professional, personal and social lives. As a result of growing dependence, the availability of these systems has become a concern. This concern increases ... -
Büyük Choi Williams zaman-frekans öznitelik seti kullanarak EKG aritmi tespiti
(Ieee, 2017)Early detection and monitoring of heart diseases increase human quality of life and this can prevent negative consequences. It is even more important because it can prevent sudden deaths. in today's technology, these ... -
Classification of new titles by two stage latent dirichlet allocation
(Ieee, 2018)With the rapid development of the Internet, thousands of different news reports from different channels are presented to us. So much news, particularly in the media sector, is an important question to be categorized and ... -
Climate control of an smart greenhouse based on android
(Ieee, 2018)Smart systems are systems used by new technologies that facilitate human life. Smart greenhouses have an important place in smart agriculture application. in this study, the amount of energy and water consumed for controlling ... -
Avuç içi görüntüleri kullanarak gerçek zamanlı nabız sayımı
(Ieee, 2018)In this study, real-time pulse counting was performed using palm images obtained from a standard webcam. the signals obtained from the real-time palm images taken from the webcam were subjected to various signal processing ... -
Human-animal recognition in camera trap images
(Ieee, 2018)Camera trap is an image sensor that is widely used in monitoring biodiversity, identifying and tracking species in natural life. in this study, we investigate human-animal distinction in image dataset obtained from camera ... -
Sperm detection and analysis using feature description algorithms
(Ieee, 2019)Computer aided sperm analysis (CASA) systems have been used in recent years to examine the mobility and morphology of human and animal sperm. While these systems detect sperm, they fail to detect more than one sperm image ... -
An overview of cryptographic accumulators
(Scitepress, 2021)This paper contributes a primer on cryptographic accumulators and how to apply them practically. A cryptographic accumulator is a space- and time-efficient data structure used for set membership tests. Since it is possible ... -
CAPEN: Cryptographic accumulator based privacy preserving exposure notification
(IEEE, 2021)Contact tracing has a significant contribution in preventing the rapid spread of infectious diseases. During the COVID-19 pandemic, local authorities, researchers and the tech industry focused on developing digital contact ... -
Lightweight offline authentication scheme for secure remote working environment
(IEEE, 2021)During pandemic situations, remote work security and reliability become more important for sustainability. The main problem in remote working is providing a reliable internet connection between remote working employees and ... -
Measuring instructional design competencies of future professionals: construct validity of the ibstpi(R) standards
(Springer, 2021)Competencies that constitute the instructional design profession and how these competencies should be measured have been of interest to researchers for many years. Among the competency sets developed to date, the ibstpi(R) ... -
Fuzzy rule based classification system from vehicle-to-grid data
(IEEE, 2021)Vehicle-to-Grid (V2G) system is becoming a very popular concept since it has various benefits such as reducing energy consumption, being environmental friendly, bi-directional charging, and load balancing. Although, it ... -
Selecting the best forensic report by using a group decision making method: A case study on three forensic reports
(IEEE, 2021)Group decision making (GDM) techniques have been very popular to take the best and the most convenient decision from an alternative set. GDM techniques have been applied in various area of information sharing as well as ... -
An analysis on the relation between users' online social networks addiction and users security concerns
(Scitepress, 2021)Use of online social network platforms has increased over last decades. There are various activities that users can do on those platforms such as, making friends, enjoying time, making business, and education. Given ... -
Trust, privacy, and self-disclosure on Facebook: Institutional implications of social media use among American and Turkish students
(Taylor & Francis Ltd., 2021)..... -
Bilgisayar ve öğretim teknolojileri eğitimi bölümü öğrencilerinin öğretim tasarımı yeterliklerinin incelenmesi
(2021)Bilgisayar ve Öğretim Teknolojileri Eğitimi (BÖTE) bölümü mezunlarının öğretim tasarımı yeterliklerini de içine alan geniş bir yelpazede görevleri yerine getirmeleri beklenmektedir. Ancak BÖTE öğretim programı içerisinde ... -
Hybrid machine learning model coupled with school closure for forecasting covıd-19 cases in the most affected countries
(2021)Coronavirus disease (Covid-19) caused millions of confirmed cases and deaths worldwide since first appeared in China. Forecasting methods are essential to take precautions early and control the spread of this rapidly ... -
ESAR: Enhanced secure authentication and revocation scheme for vehicular ad hoc networks
(Elsevier, 2022)Vehicle Ad Hoc Network (VANET) systems that use Public Key Infrastructure (PKI) experience significant delays when checking Certificate Revocation Lists (CRLs) and performing key pair-based asymmetric cryptographic operations. ... -
Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications
(IEEE, 2022)Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum ... -
Distributed denial of service (DDoS): A history
(IEEE, 2022)Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of ...