Ara
Toplam kayıt 70, listelenen: 31-40
Kablosuz Ağlar İçin Bir DoS Saldırısı Tasarımı
(2013)
Kablosuz ağların gelişimi ve kullanımlarının artışı ile bu ağların güvenliğinin sağlanması hususu ön plana çıkmıştır. Kablolu ağlarda bu güne dek kullanılagelmiş olan çeşitli saldırı tipleri, aynı şekilde kablosuz ağlarda ...
Veritabanı Tasarımının Yazılım Performansına Etkisi: Normalizasyona karşı Denormalizasyon
(2018)
Yazılım performansını etkileyen en önemli faktörlerden biri veritabanıtasarımında yapılabilecek iyileştirmelerdir. Veritabanı tasarımında sıklıkla ilişkiselveritabanı teorisi olan normalizasyon işlemi kullanılır. Fakat ...
A fuzzy ranking approach for improving search results in Turkish as an agglutinative language
(Pergamon-Elsevier Science Ltd, 2012)
This study proposes a fuzzy ranking approach, designed for Turkish as an agglutinative language, that focuses on improving stemming techniques via using distances of characters in its search algorithm. Various studies ...
Effect of Imputation Methods in the Classifier Performance
(2019)
Missing values in a dataset present an important problem for almost any traditional and modernstatistical method since most of these methods were developed under the assumption that thedataset was complete. However, in the ...
Designing attacks for SMTP servers
(C R L Publishing Ltd, 2011)
Electronic mail is today's most widely used method of communication. In recent years, if e-mail had not been there, communication would not have been possible. Because of SMTP (Simple Mail Transfer Protocol) is an old ...
A hybrid approach for extracting informative content from web pages
(Elsevier Sci Ltd, 2013)
Eliminating noisy information and extracting informative content have become important issues for web mining, search and accessibility. This extraction process can employ automatic techniques and hand-crafted rules. Automatic ...
A new method to determine algebraic expression of power mapping based S-boxes
(Elsevier Science Bv, 2013)
Power mapping based S-boxes, especially those with finite field inversion, have received significant attention by cryptographers. S-boxes designed by finite field inversion provide good cryptographic properties and are ...
Author Detection by Using Different Term Weighting Schemes
(IEEE, 2013)
In this study, the impact of term weighting on author detection as a type of text classification is investigated. The feature vector being used to represent texts, consists of stem words as features and their weight values, ...
Analyzing the Performance Differences Between Pattern Matching and Compressed Pattern Matching on Texts
(IEEE, 2013)
In this study the statistics of pattern matching on text data and the statistics of compressed pattern matching on compressed form of the same text data are compared. A new application has been developed to count the ...
Faculty of Engineering Students' Success Analysis with Clustering Methods
(IEEE, 2013)
In this study, data clustering analysis for the student of faculty of engineering carried out. Cluster analysis, using the different characteristics or similar properties of objects in the data set, aims at creating in the ...