Search Results

Now showing 1 - 10 of 3607
  • Article
    Citation - WoS: 27
    Citation - Scopus: 29
    ON α-ψ-GERAGHTY CONTRACTION TYPE MAPPINGS ON QUASI-BRANCIARI METRIC SPACES
    (Yokohama Publ, 2016) Karapinar, Erdal; Pitea, Ariana
    In this paper, we state and prove results regarding alpha-psi-Geraghty contractive mappings in the setting of quasi-Branciari metric spaces. We provide existence and uniqueness results for periodic and fixed points of such mappings.
  • Article
    Citation - Scopus: 48
    Identifying Phishing Attacks in Communication Networks Using Url Consistency Features
    (Inderscience Publishers, 2020) Azeez,N.A.; Salaudeen,B.B.; Misra,S.; Damasevicius,R.; Maskeliunas,R.
    Phishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing attack may result into financial loss and identity theft. Identifying forensic characteristics of phishing attack can help to detect the attack and its perpetuators and as well as to enable defence against it. To shield internet users from phishing assaults, numerous anti-phishing models have been proposed. Currently employed techniques to handle these challenges are not sufficient and capable enough. We aim at identifying phishing sites in order to guard internet users from being vulnerable to any form of phishing attacks by verifying the conceptual and literal consistency between the uniform resource locator (URL) and the web content. The implementation of the proposed PhishDetect method achieves an accuracy of 99.1%; indicating that it is effective in detecting various forms of phishing attacks. © 2020 Inderscience Enterprises Ltd.. All rights reserved.
  • Article
    Citation - WoS: 4
    Citation - Scopus: 4
    Insights Into a New Paradigm in Translation Eco-Translation and Its Reflections
    (John Benjamins Publishing Co, 2020) Aksoy, Nuzhet Berrin
    The purpose of this paper is to draw attention to the reflection and recreation of the physical landscape in literary texts and in their translations; to explore in what ways nature is represented and, secondly, to discuss aspects of this process in the light of the translational norms proposed by Toury. The focus is the idea that language and culture, the core of literature, are to be transferred to other linguistic and cultural mediums during translation, and constitute the ecological environment of the text. This undertaking assigns to the translator the task of selecting, adapting and recreating this material in the foreign environment. An ecocritical approach will be adopted to explore how and how far this task is materialized by studying a Turkish author Yasar Kemal's novel Ortadirek translated as The Wind from the Plain. Yasar Kemal is regarded as the most ecologically-minded author of Turkish literature and his novels portray nature as the mental landscapes of man, a force under which the constituents of the text are recreated at every linguistic and culture-bound effort of the author. Hence, the main endeavour of this study will be to bring to the surface, with an eco-critical approach, the translational preferences of the translator of Ortadirek and their significance in the recreation of Kemal's ecological vision in the translation.
  • Article
    Citation - WoS: 31
    Citation - Scopus: 52
    Neural Network and Classification Approach in Identifying Customer Behavior in the Banking Sector: a Case Study of an International Bank
    (Wiley, 2015) Ogwueleka, Francisca Nonyelum; Misra, Sanjay; Colomo-Palacios, Ricardo; Fernandez, Luis
    The customer relationship focus for banks is in development of main competencies and strategies of building strong profitable customer relationships through considering and managing the customer impression, influence on the culture of the bank, satisfactory treatment, and assessment of valued relationship building. Artificial neural networks (ANNs) are used after data segmentation and classification, where the designed model register records into two class sets, that is, the training and testing sets. ANN predicts new customer behavior from previously observed customer behavior after executing the process of learning from existing data. This article proposes an ANN model, which is developed using a six-step procedure. The back-propagation algorithm is used to train the ANN by adjusting its weights to minimize the difference between the current ANN output and the desired output. An evaluation process is conducted to determine whether the ANN has learned how to perform. The training process is halted periodically, and its performance is tested until an acceptable result is obtained. The principles underlying detection software are grounded in classical statistical decision theory.
  • Conference Object
    Citation - WoS: 7
    Citation - Scopus: 7
    Effect of Hardening Models on Different Ductile Fracture Criteria in Sheet Metal Forming
    (Springer France, 2016) Dizaji, Shahram Abbasnejad; Darendeliler, Haluk; Kaftanoglu, Bilgin; Abbasnejad Dizaji, Shahram
    Prediction of the fracture is one of the challenging issues which gains attention in sheet metal forming as numerical analyses are being extensively used to simulate the process. To have better results in predicting the sheet metal fracture, appropriate ductile fracture criterion (DFC), yield criterion and hardening rule should be chosen. In this study, the effects of different hardening models namely isotropic, kinematic and combined hardening rules on the various uncoupled ductile fracture criteria are investigated using experimental and numerical methods. Five different ductile fracture criteria are implemented to a finite element code by the user subroutines. The criterion constants of DFCs are obtained by the related experimental tests. The in-plane principle strains obtained by the finite element analyses for different DFCs are compared with the experimental results. Also, the experimental results are used to evaluate the principle strain values calculated by the finite element analysis for different combinations of DFCs and hardening rules. It is shown that some DFCs give better predictions if the appropriate hardening model is employed.
  • Article
    Citation - WoS: 55
    Citation - Scopus: 61
    Encoding the Future: Successful Processing of Intentions Engages Predictive Brain Networks
    (Academic Press inc Elsevier Science, 2010) Poppenk, J.; Moscovitch, M.; McIntosh, A. R.; Ozcelik, E.; Craik, F. I. M.
    Evidence from cognitive, patient and neuroimaging research indicates that "remembering to remember" intentions, i.e., prospective memory (PM) retrieval, requires both general memory systems involving the medial temporal lobes and an executive system involving rostral PFC (BA 10). However, it is not known how prospective memories are initially formed. Using fMRI, we investigated whether brain activity during encoding Of future intentions and present actions differentially predicted later memory for those same intentions (PM) and actions (retrospective memory). We identified two significant patterns of neural activity: a network linked to overall memory and another linked specifically to PM. While overall memory success was predicted by temporal lobe activations that included the hippocampus, PM success was also uniquely predicted by activations in additional regions, including left rostrolateral PFC and the right parahippocampal gyrus. This finding extends the role of these structures to the formation of individual intentions. It also provides the first evidence that PM encoding, like PM retrieval, is supported by both a common episodic memory network and an executive network specifically recruited by future-oriented processing. (C) 2009 Elsevier Inc. All rights reserved.
  • Conference Object
    Citation - WoS: 28
    Citation - Scopus: 25
    A Comparison of Stream Processing Frameworks
    (Institute of Electrical and Electronics Engineers Inc., 2017) Karakaya,Z.; Yazici,A.; Alayyoub,M.
    This study compares the performance of Big Data Stream Processing frameworks including Apache Spark, Flink, and Storm. Also, it measures the resource usage and performance scalability of the frameworks against a varying number of cluster sizes. It has been observed that, Flink outperforms both Spark and Storm under equal constraints. However, Spark can be optimized to provide the higher throughput than Flink with the cost of higher latency. © 2017 IEEE.
  • Article
    Citation - WoS: 29
    Citation - Scopus: 31
    Composition-tuned band gap energy and refractive index in GaSxSe1-x layered mixed crystals
    (Elsevier Science Sa, 2017) Isik, Mehmet; Gasanly, Nizami
    Transmission and reflection measurements on GaSxSe1-x mixed crystals (0 <= x <= 1) were carried out in the 400-1000 nm spectral range. Band gap energies of the studied crystals were obtained using the derivative spectra of transmittance and reflectance. The compositional dependence of band gap energy revealed that as sulfur (selenium) composition is increased (decreased) in the mixed crystals, band gap energy increases quadratically from 1.99 eV (GaSe) to 2.55 eV (GaS). Spectral dependencies of refractive indices of the mixed crystals were plotted using the reflectance spectra. It was observed that refractive index decreases nearly in a linear behavior with increasing band gap energy for GaSxSe1-x mixed crystals. Moreover, the composition ratio of the mixed crystals was obtained from the energy dispersive spectroscopy measurements. The atomic compositions of the studied crystals are well-matched with composition x increasing from 0 to 1 by intervals of 0.25. (C) 2016 Elsevier B.V. All rights reserved.
  • Article
    NEW TURKISH BORROWS LAW ON THE FRAMEWORK OF COMPETITOR PORTER
    (Istanbul Univ, Fac Law, 2014) Suzek, Sarper
    [No Abstract Available]
  • Conference Object
    Citation - Scopus: 9
    A Layered Security Architecture for Corporate 802.11 Wireless Networks
    (Institute of Electrical and Electronics Engineers Inc., 2004) Erten,Y.M.; Tomur,E.
    In this study we have investigated the security aspects of wireless local area networks and discussed the weaknesses associated with various conventional 802.11 security protocols such as WEP and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using the tested wired network components such as VPNs and Firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.