Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Nurdan Saran"'
Autor:
Ayse Nurdan Saran
Publikováno v:
Frontiers in Computer Science, Vol 6 (2024)
A password hashing algorithm is a cryptographic method that transforms passwords into a secure and irreversible format. It is used not only for authentication purposes but also for key derivation mechanisms. The primary purpose of password hashing is
Externí odkaz:
https://doaj.org/article/1f09f2d260ff4472bba8529188e0d2d1
Autor:
Nurdan Saran, Ozgun Erdogan
Publikováno v:
PeerJ Computer Science, Vol 7, p e734 (2021)
PeerJ Computer Science
PeerJ Computer Science
The design, development, and implementation of e-Government applications aim to improve the quality of daily life and facilitate the mobility of citizens by reducing the constraints imposed by existing borders. This study examines previous research i
Autor:
Nurdan Saran, Murat Saran
Publikováno v:
Volume: 5, Issue: 2 1-11
Uluslararası Bilgi Güvenliği Mühendisliği Dergisi
Uluslararası Bilgi Güvenliği Mühendisliği Dergisi
Bu çalışmada, MongoDB (sürüm 3.6.3) ve Cassandra (sürüm 3.11.1) NoSQL veri tabanlarının güvenliğinin çok düğümlü yapılandırmada ve iki adımda karşılaştırılmalı analiz sonuçları sunulmaktadır. İlk adımda, her iki veritaba
Publikováno v:
SIU
In the last decade, Deep Learning is applied in a wide range of problems with tremendous success. Large data, increased computational resources, and theoretical improvements are main reasons for this success. As the dataset grows, the realworld is be
Publikováno v:
PeerJ Computer Science
PeerJ Computer Science, Vol 7, p e571 (2021)
PeerJ Computer Science, Vol 7, p e571 (2021)
In the last decade, deep learning has been applied in a wide range of problems with tremendous success. This success mainly comes from large data availability, increased computational power, and theoretical improvements in the training phase. As the
Publikováno v:
IEEE Geoscience and Remote Sensing Letters. 13:1032-1036
In this letter, a method for detecting changes in multitemporal synthetic aperture radar (SAR) images by minimizing a novel cost function is proposed. This cost function is constructed with log-ratio-based data fidelity terms and an $\ell_{1}$ -norm-
Publikováno v:
Turkish Journal of Electrical Engineering & Computer Sciences. Mar2014, Vol. 22 Issue 2, p499-516. 18p.
Publikováno v:
SIU
In this study, Sparsity-driven Change Detection (SDCD) method, which has been proposed for detecting changes in multitemporal synthetic aperture radar (SAR) images, is parallelized to reduce the execution time. Parallelization of the SDCD is realized
Publikováno v:
Volume: 22, Issue: 2 499-516
Turkish Journal of Electrical Engineering and Computer Science
Turkish Journal of Electrical Engineering and Computer Science
Vessel segmentation is important for many clinical applications, such as the diagnosis of vascular diseases, the planning of surgery, or the monitoring of the progress of disease. Although various approaches have been proposed to segment vessel struc
Autor:
Nurdan Saran, Ali Doğanaksoy
Publikováno v:
ARES
In 1980, Hellman proposed the Time Memory Trade Off (TMTO) attack and applied it on block cipher DES (Data Encryption Standard). Time Memory Trade Off attack is one of the methods that inverts a one way function. The resistance to TMTO attacks is an