Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Serpil Üstebay"'
Publikováno v:
Electrica, Vol 24, Iss 1, Pp 218-227 (2024)
Externí odkaz:
https://doaj.org/article/7271f9936b144520a155ff7f9b7bed0d
Publikováno v:
Havacılık ve Uzay Teknolojileri Dergisi, Vol 13, Iss 2, Pp 227-233 (2020)
Customer segmentation is acustomer grouping modelbased on common featuresand it directly relates with customer satisfaction of the companies.It provides access to the right customer with the right methods by knowing the customer better. Dealing with
Externí odkaz:
https://doaj.org/article/500a4a2ca3e34b5391492e886b5c7041
Publikováno v:
Transactions on Emerging Telecommunications Technologies. 30
The ability to detect the mobile user's location with high precision in indoor networks is particularly difficult due to the environmental characteristics and high dynamics of the indoor n...
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811304071
In today’s world, where all records are carried into an electronic environment, cyber security represents a very broad scope, with the primary objective of preventing the loss of financial and/or emotional loss of people, institutions, organization
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8b286225d37b5b41a70901dcccd125f6
https://hdl.handle.net/11413/6227
https://hdl.handle.net/11413/6227
Publikováno v:
Computer Networks ISBN: 9783030219512
CN
CN
As the accuracy rate of artificial intelligence based applications increased, they have started to be used in different areas. Artifical Neural Networks (ANN) can be very successful for extracting meaningful data from features by processing complex d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a1038c69eea07ecb7cb4de3388c39648
https://doi.org/10.1007/978-3-030-21952-9_11
https://doi.org/10.1007/978-3-030-21952-9_11
Publikováno v:
2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT).
In this study, an intrusion detection system (IDS) has been proposed to detect malicious in computer networks. The proposed system is studied on the CICIDS2017 dataset, which is the biggest dataset available online. In order to overcome the challenge
Publikováno v:
Proceedings ISCIS 2018 : 32nd International Symposium on Computer and Information Sciences
ISCIS 2018 : 32nd International Symposium on Computer and Information Sciences
ISCIS 2018 : 32nd International Symposium on Computer and Information Sciences, Sep 2018, Poznan, Poland. pp.141-149, ⟨10.1007/978-3-030-00840-6_16⟩
Communications in Computer and Information Science ISBN: 9783030008390
ISCIS
ISCIS 2018 : 32nd International Symposium on Computer and Information Sciences
ISCIS 2018 : 32nd International Symposium on Computer and Information Sciences, Sep 2018, Poznan, Poland. pp.141-149, ⟨10.1007/978-3-030-00840-6_16⟩
Communications in Computer and Information Science ISBN: 9783030008390
ISCIS
International audience; Rapid development of technologies not only makes life easier, but also reveals a lot of security problems. Developing and changing of attack types affect many people, organizations, companies etc. Therefore, intrusion detectio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::65f4d8bb5a3e1505a20eece0d1d7e9ee
https://hal.archives-ouvertes.fr/hal-01884538
https://hal.archives-ouvertes.fr/hal-01884538
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811304071
In this study, the indoor localization was performed on indoor networks. WiFi technology is located in almost every building. For this reason, WiFi technology has been selected to perform positioning, and RSSI values from WiFi technology access point
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9a44f4f0865e3b88b4ac56d1774ef900
https://doi.org/10.1007/978-981-13-0408-8_9
https://doi.org/10.1007/978-981-13-0408-8_9
Publikováno v:
Computer Networks ISBN: 9783319597669
CN
Proceedings CN 2017 : 24th international conference on Computer Networks
CN 2017 : 24th international conference on Computer Networks
CN 2017 : 24th international conference on Computer Networks, Jun 2017, Lądek Zdrój, Poland. pp.412-421, ⟨10.1007/978-3-319-59767-6_32⟩
CN
Proceedings CN 2017 : 24th international conference on Computer Networks
CN 2017 : 24th international conference on Computer Networks
CN 2017 : 24th international conference on Computer Networks, Jun 2017, Lądek Zdrój, Poland. pp.412-421, ⟨10.1007/978-3-319-59767-6_32⟩
International audience; Indoor Positioning systems are more and more attractive research area and popular studies. They provide direct access of Instant location information of people in large, complex locations such as airports, museums, hospitals,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e6d9525a1a28f4de72e663a5976aa6c3
https://doi.org/10.1007/978-3-319-59767-6_32
https://doi.org/10.1007/978-3-319-59767-6_32
Publikováno v:
Computer Networks ISBN: 9783319597669
CN
Proceedings CN 2017 : 24th international conference on Computer Networks
CN 2017 : 24th international conference on Computer Networks
CN 2017 : 24th international conference on Computer Networks, Jun 2017, Lądek Zdrój, Poland. pp.81-90, ⟨10.1007/978-3-319-59767-6_7⟩
CN
Proceedings CN 2017 : 24th international conference on Computer Networks
CN 2017 : 24th international conference on Computer Networks
CN 2017 : 24th international conference on Computer Networks, Jun 2017, Lądek Zdrój, Poland. pp.81-90, ⟨10.1007/978-3-319-59767-6_7⟩
International audience; In this study, performance of classification algorithms N-Nearest Neighbors (N3) and Binned Nearest Neighbor (BNN) are analyzed in terms of Indoor localizations. Fingerprint method which is based on Received Signal Strength In
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fbc7486e320a83a62e7249eb1dc337a3
https://doi.org/10.1007/978-3-319-59767-6_7
https://doi.org/10.1007/978-3-319-59767-6_7