The impact of cyber security attacks increased globally, implementing proper security standards to protect data in the cyber environment has been prioritized, while assets are also at risk of being exploited through physical ...
A password hashing algorithm is a cryptographic method that transforms passwords into a secure and irreversible format. It is used not only for authentication purposes but also for key derivation mechanisms. The primary ...
Named entity recognition (NER) plays a pivotal role in Natural Language Processing by identifying and classifying entities within textual data. While NER methodologies have seen significant advancements, driven by pretrained ...
Dündar, Naz; Keçeli, Ali Seydi; Kaya, Aydın; Sever, Hayri(2024-06)
With the recent worldwide statistical rise in the amount of public violence, automated violence detection in surveillance cameras has become a matter of high importance. This work introduces an end-to-end, trainable 3D ...
Yazılım
geliştirme süreçleri, gelişen yeni teknolojiler ve onun sağladığı imkânlar
doğrultusunda sürekli iyileştirme gerektirir. Yazılım müşterilerinin
pazarlanabilir fonksiyonlar içeren ürün talepleri üzerine kurgulanmış ...
This paper intends to examine the research trends in Empirical Software Engineering domain within the last two decades using text
mining. It studies published articles in the relevant literature with an emphasis on abstracts ...
Çağıltay, Nergiz Erçil; Tokdemir, Gül; Aydın, Elif; Kara, Ali(2012-07-19)
This work presents a case study about how action research (AR) has been conducted in developing a
real-life educational system. An explanation is given of the modified implementation of the classical AR
methodology, based ...
Nüfus artışı ve plansız sanayileşmenin sonucunda oluşan çevre kirliliği, insanoğlunun neden olduğu en büyük sorunlardan birisidir ve her geçen gün canlı ve cansız varlıklara olan olumsuz etkisi artarak devam etmektedir. ...
Today’s organizations were mostly built over their documents. These documents are very crucial sources of knowledge. Even they know the existence of these documents, most of the time, it is nearly impossible to extract ...
With the COVID-19 pandemic, strict measures have been taken to slow down the spread of the virus, and consequently, software professionals have been forced to work from home. However, home-based working entails many ...
The Scholarly Communications processes consist of collecting and analyzing of data—including published information—through its transformation into publications or other output, and its usage or preservation by other users. ...
At the beginning of 2020, the new coronavirus disease (Covid-19), a deadly viral illness, is declared as a public health emergency situation by WHO. Consequently, it is accepted as pandemic that affected millions of people ...
In the construction of effective and scalable overlay networks, publish/subscribe (pub/sub) network designers prefer to keep the diameter and maximum node degree of the network low. However, existing algorithms are not ...
Otomatik konumsal veri toplama araçlarının kullanımının hızlıca artmasına paralel olarak konumsal içeriklerinin hacim olarak genişlemesi, geleneksel yöntemlerin ötesinde konumsal veritabanlarının etkin kullanılabilmesini ...
Usability is the key to develop and improve any system as it represents the direct contact point between users and machines. The use of the critical control system in the oil and gas industry is increasing. Due to the ...
Progressively, number of radio spectrum users is increasing as life tends towards new technologies in all sectors, so even those users of licensed band are demanding larger radio spectrum. Users may get assigned into other ...
The ideas expressed in social media are not always compliant with natural language rules, and the mood and emotion indicators are mostly highlighted by emoticons and emotion specific keywords. There are language independent ...
Agile software development (ASD) is a popular
research area that attracts the attention of the software
development industry as well. Many studies have been
conducted to explore the issues related to the ASD domain.
Research ...
Big Data is one of the most commonly encountered
buzzwords among IT professionals nowadays. Technological
advancements in data acquisition, storage, telecommunications,
embedded systems and sensor technologies resulted ...