The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Social engineering has emerged as a serious threat in virtual communities and is an important means to attack information systems. The services used by today's knowledge workers prepare the base for complicated social engineering attacks. Phishing is a kind of technically generated social engineering attack and is the type of identity theft that uses the social engineering techniques and complex attack...
Millions of people around the world suffer from hearing disability. This large number demonstrates the importance of developing a sign language recognition system converting sign language to text for sign language to become clearer to understand without a translator. In this paper, a sign language recognition system using Backpropagation Neural Network Algorithm is proposed based on American Sign...
This study aims to design a web technology based Emergency System (SmartER) system, which will enable the doctors and nurses to perform the patient related procedures more quickly and smoothly in the emergency departments. SmartER is not just software, it is planned as a system that includes a monitor screen to be mounted on the wall, a barcode bracelet for the patients, mobile devices to be used...
Data sizes that cannot be processed by conventional data storage and analysis systems are named as Big Data. It also refers to new technologies developed to store, process and analyze large amounts of data. Automatic information retrieval about the contents of a large number of documents produced by different sources, identifying research fields and topics, extraction of the document abstracts, or...
Digital images have become very important in our daily lives and some other important areas such as medicine, journalism and it can be also used as forensic evidence. However, the simplicity of using digital images with freely available software tools makes the authenticity of images questionable. The most common image forgery type is copy move forgery because it can be done easily but the detection...
Although chaos based cryptology studies are an active research area, it does not make a significant contribution to the mainstream cryptology literature. Many design proposals have weaknesses. The most important reason is that the proposals are not adequately analyzed. For example, statistical tests such as NPCR and UACI are used in the analysis of chaos based image encryption algorithms. In this...
With the widespread usage of information and communication technologies rapidly and the increase in data storage and transformation electronically it is very important to provide personal data security and raising security awareness in public. One of the most problematic issues about information technologies are the ones relating with personal and vital data security. Within the context of this study...
One of the important problems in social media platforms like Twitter is the large number of social bots or sybil accounts which are controlled by automated agents, generally used for malicious activities. These include directing more visitors to certain websites which can be considered as spam, influence a community on a specific topic, spread misinformation, recruit people to illegal organizations,...
In this work, a hybrid method that includes metaheuristic algorithms has been proposed for solving optimization problems. The proposed method was implemented as employing three metaheuristic algorithms which are Artificial Bee Colony, Differential Evolution and Particle Swarm Optimization in an order. The success of the developed method is presented by testing on 12 continuous optimization test functions...
Natural Language Processing (NLP) is a prominent subject which includes various subcategories such as text classification, error correction, machine translation, etc. Unlike other languages, there are limited number of Turkish NLP studies in literature. In this study, we apply text classification on Turkish documents by using n-gram features. Our algorithm applies different preprocessing techniques,...
In the scope of this study, it is aimed to develop a software and hardware product that will help the patients and physiotherapists in the physiotherapeutic process of the patients who will have surgery or not in the knee anterior cruciate ligament injuries. Tele-rehabilitation makes it possible to provide quality services to patients with disabilities and geographically distant living from physical...
Iraqi Correction Services (ICS) is a department within the Ministry of Justice. Most services are provided through traditional paper and pen system. This system causes delays in service provision time and work over-load on ICS staff which translates into a high cost of service provision. E-government applications represent an opportunity to automate governmental services while improving both effectiveness...
For any language, general purpose or special purpose, a language-based editor is an essential part of an integrated development environment. Traditionally, language-based editors are text-based. Blocks-based syntax offers a gentler approach for novices to get initiated to the language. Transition from blocks-based to text-based syntax, however, can be difficult. To ease the transition, seamless integration...
Course timetabiling is a process that must be done at the beginning of the education period in all educational institutions. The purpose of the timetabling is to bring together classrooms, lectures, students and lecturers at the same time without any conflicts. Course timetabiling is a difficult problem to solve when classroom constraints, teaching staff preferences, course restrictions are taken...
In this paper, the trend of Business Intelligence (BI) adoption and maturity has been evaluated. Special emphasis was given to the small-to-medium enterprises (SME) business adoption and intensive review of BI maturity model in for the contemporary business world. Therefore, this study surveyed research works that reveal most determinants for BI efficiency. The survey has extract what lead organization...
Artificial neural networks (ANN) are among the nonlinear prediction techniques popular in the last two decades. Recent studies show that ANN can be modeled with different training techniques. ANN is usually trained by the backpropagation method (BP). In this study, ANN structures were trained by using artificial bee colony algorithm (ABC) and, weight and bias values were tried to be determined. ABC...
The choice of supplier in the supply chain network is a very important and quick issue for decision makers. When we work in line with these requirements, a multi-criteria decision support system focusing on supplier importance and ordering is being established. The fuzzy analytical hierarchy process (AHP) and fuzzy DEMATEL methods are used in the decision support system. With Fuzzy DEMATEL (Decision-Making...
With the development of technology and industrialization, problems that haven't been solved in the past have become more easily solvable. The artificial intelligence (AI) field has emerged by starting to apply the working mechanism of the human brain in various ways in computers. With the use and widespread use of AI techniques, solutions to problems in every area of the scientific world are presented...
EEG (Electroencephalography) signals are used in different fields increasingly with the development of technology because they contain a lot of important information. In recent years, a great deal of these studies has been carried out about the concrete meaning of the signals. Most of these systems are called BBA (Brain Computer Interface) systems. Various applications have been developed with BBA...
It is expected that server rooms equipped with expensive and complex devices must be reliable and stable. However, excessive environmental factors such as temperature and humidity can cause very serious effects on the devices and can lead to unrecoverable data losses or financial losses. In this study, a WSN (Wireless Sensor Network) was designed for real time monitoring the temperature, humidity,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.