Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Multiple Sclerosis (MS) is a neurological, progressive widespread disease whose diagnosis, treatment and monitoring have vital importance. However, manual method based on visual inspection for diagnosis and time-series assessments of changes in MS lesions is not re-producible and quantitative. Also, it is subjective and yields in inter-/intra-observer variabilities. Furthermore, the conventional method...
Because of innovations and improvements in technology, the use of smartphones that make it easier for users to work has become widespread. At this point, companies can reach their customers more easily and can communicate continuously. Once mobile applications are created, the system infrastructure needs to be improved in response to changing needs and demands to actively retain registered users and...
In this study, it is aimed to demonstrate how to develop a strategy in order to ensure effective cyber security of the assets owned, information and communication systems and infrastructures in cyberspace and to be a powerful force in cyber warfare and deterrence in a country. In this context, an approach is established for the creation and implementation of a national cyber security strategy required...
In today's world, enterprise information systems exhibit a heterogeneous distribution due to highly coupled applications and systems. As a result of this coupling, there are many problems such as inefficient code, delayed project deliveries, code repetition, lack of documentation and reduced happiness and productivity among software developers. An application named Enterprise Service Governance (ESG)...
In this study, an active alarm and event notification system that can provide security against theft of motorcycles has been designed. With this system, the owner of the motorcycle will be alerted at the moment of burglary action using the voice dialing method. Burglary action will be more difficult and deterrent when the horn on the bike is activated by the system.
Digital image watermarking methods are one of the mostly used methods for copyright protection and image content authentication. In this article, a new bit-based reversible digital image watermarking method (BB-RIW) is proposed for authentication in images. The proposed BB-RIW method consists of identifying the pixels to be stigmatized, generating the stamp, embedding the stamp, stamping, and image...
In recent years, automatic detection of on-shelf products has become an industrial need along with the technological improvements in the field of computer vision. In this respect, localization of on-shelf products and detection of the brands of these products have evolved into two main objectives. In this work, a hidden Markov model, which is commonly used in signal processing for post-processing...
In this paper, we proposed a framework for detecting network's intrusions using Genetic Algorithm (GA) with multiple criteria. First of all, we build an intrusion detection system (IDS) using a pure GA with multiple selection methods. Then, we proposed one of the few hybrid algorithms in the literature, which is hybridized using a GA and a Tabu search (TS) algorithm. The proposed hybrid algorithm...
Virtualization is the creation of components, such as hardware platform, operating system, storage, processing power, memory, or network resource, in virtual environments. The applications of virtualization are spreading rapidly and the critical systems are working on virtualization infrastructures. However; the effects of security vulnerabilities which may occur can also be high. In this study, security...
Face recognition is a mature domain with lots of different techniques proposed in the literature. Convolutional neural networks have been the most successful approach to face recognition problem recently. In this work, performance of three different face recognition models are compared. Features are extracted using a pre-trained convolutional neural network. The first model is trained using the available...
Internet of Things (IoT) refers to interconnectivity of different devices and services through applications, sensors and industrial equipments. A fundamental aspect of this interconnectivity is the transfer of the data from providers to requestors via a data transportation channel. However, the many-to-many relationship between the requestors and providers makes communication management difficult...
Software effort estimation is important in planning and project budgeting for both developers and customers. Although there are many popular effort estimation techniques which have gone through significant developments in the past, software development methodologies and technologies are developing rapidly as a result of the need to improve the existing models. To this end, this paper compares and...
Software development process models focus on ordering and combination of phases to develop the intended software product within time and cost estimates. However, commonness of software vulnerabilities in the fielded systems show that there is a need for more stringent software development process that focuses on improved security demands. Meanwhile, there are some reports that demonstrate the efficiency...
Nowadays, people take into account complaints of customers about products or services before purchasing them. However, inconsistency as a result of information pollution on the internet make it difficult to get reliable information for users. In terms of companies, they spend a great deal of time and human resource to read complaints one by one. So, it is very important to address the focus of customers'...
Today, it is not possible to use human power alone to cope with the increasing amount of data. For this reason, some automated methods are needed to group similar documents together or to place documents in predefined categories according to certain rules. The use of automated classification techniques is becoming increasingly important for this reason. In this study, a database consisting of 22 thousand...
Privacy considerations of individuals becomes more and more popular issue in recommender systems due to the increasing need for protecting confidential data. Even though users of recommender systems enjoy with personalized productions, they behave timidly about sharing their private data due to the some privacy concerns about price discrimination, unsolicited marketing, govern-ment surveillance and...
Positioning applications become more popular with the advancement of location aware services. Global Positioning System is a successful solution for outdoors whereas it is not suitable for indoor environments due to the lack of line of sight for radio frequency signals. Therefore, various systems have been developed to solve the indoor positioning problem. Enhancing the performance of these systems...
The library environment is vulnerable to fire threat due to the paper based publications it contains. Since it is a public open environment and it contains valuable resources like handwritten historical documents, it is very important to ensure the safety of life and property in libraries. Therefore, gas and smoke detection based fire detection systems are used. In this study, using wireless sensor...
In this study, a remote controlled mobile robot is developed for the educational studies at the Planet Researches Simulation Laboratory in the Anadolu University Yunusemre Gozlemevi. The main objective of the study is to increase the interest of students for the technologies developed within the scope of planetary researches. In this context, the mobile robot system has been developed considering...
Campus network encounters serious security threats because of its expandable size and curious users. Due to the dramatic increase of network technologies and the urgent need to perform the work accurately, campus network is one example that now compels to step in with new trends confronted. This could be adopting robust technologies in order to reach high security, availability and globality. Standing...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.