Ara
Toplam kayıt 171, listelenen: 161-170
Analysis of whether news on the Internet is real or fake by using deep learning methods and the TF-IDF algorithm
(Ceyhun Yılmaz, 2021)
Internet use has become increasingly widespread nowadays. In addition, there is a significant
increase in the amount of text content produced in digital media. However, the accuracy and
inaccuracy of the news we read and ...
The Experimental Research Of The Additively Manufactured Ti4Al4V Parts With The Perspective Of Mechanic Features
(Osman Sağdıç, 2021)
This study aims to generate research data on basis of engineering evidences in terms of validation tests for Additively Manufactured
(AM) Ti4Al4V parts. It is known that Ti6Al4V alloy is broadly used for highly-engineered ...
De Moivre-Type Identities For The Padovan Numbers
(Muhammet Kurulay, 2021)
At this work, we give a method for constructing the Perrin and Padovan sequences and obtain the De
Moivre-type identity for Padovan numbers. Also, we define a Padovan sequence with new initial
conditions and find some ...
Password Attack Analysis Over Honeypot Using Machine Learning Password Attack Analysis
(Matematikçiler Derneği, 2021)
Developing information and technology has caused the digitization of data in all areas of our lives.
While this digitization provides entirely new conveniences, speed, efficiency, and effectiveness in our current life, ...
Optimization of cylindrical wall domes via metaheuristic algorithms
(Fatih Mehmet ÖZKAL / Tulpar Academic Publishing, 2021)
Optimization is a widely used phenomenon in various problems and fields. Because
time and resources are very limited in today's world, it can be said that the usage
area of the optimization process will be expanded and ...
Application of a numerical model for wave parameter hindcasting in the Marmara Sea Basin
(Balıkesir Üniversitesi, 2020)
One of the most important factors in design of coastal and marine structures is to
determine the wave characteristics precisely. In this paper, wave characteristics of Sea
of Marmara obtained during the time span between ...
Network Forensics of RPL-Based Attacks
(Düzce Üniversitesi Fen Bilimleri Enstitüsü, 2020)
IoT devices, which are increasing in highly manner day by day, are now in everywhere in our life. WSNs are used
together with IoT devices to monitor real environments. In this study, attacks against WSNs were carried out. ...
Common Generative Adversarial Network Types and Practical Applications
(Osman Sağdıç, 2020)
Generative Adversarial Networks (GAN) which are analyzed in this study are among many deep learning methods which have been
developed to overcome the restrictions of generic deep learning algorithms such as Restricted ...
Static Analysis of FG Beams via Complementary Functions Method
(Ahmet Çalık, 2020)
The bending response of Functionally Graded (FG) beams is carried out by the Complementary Functions
Method (CFM). The mechanical properties of the material, Young’s modulus, of the straight beams are
considered to be ...
Measuring the relationship between spatial configuration, diversity and user behavior: A Post Occupancy Evaluation study in Istanbul’s peripheral districts
(Mehmet Topçu, 2020)
Post Occupancy Evaluation (POE) is a robust tool to systematically evaluate the effects
of design decisions on spatial performance and to identify the relationship between
the space and its users. Although there is a ...