Search Results

Now showing 1 - 10 of 196
  • Book Part
    Citation - Scopus: 2
    Novel Covid-19 Recognition Framework Based on Conic Functions Classifier
    (Springer Science and Business Media Deutschland GmbH, 2022) Karim,A.M.; Mishra,A.
    The new coronavirus has been declared as a global emergency. The first case was officially declared in Wuhan, China, during the end of 2019. Since then, the virus has spread to nearly every continent, and case numbers continue to rise. The scientists and engineers immediately responded to the virus and presented techniques, devices and treatment approaches to fight back and eliminate the virus. Machine learning is a popular scientific tool and is applied to several medical image recognition problems, involving tumour recognition, cancer detection, organ transplantation and COVID-19 diagnosis. It is proved that machine learning presents robust, fast and accurate results in various medical image recognition problems. Generally, machine learning-based frameworks consist of two stages: feature extraction and classification. In the feature extraction, overwhelmingly unsupervised learning techniques are applied to reduce the input data’s size. This step extracts appropriate features by reducing the computational time and increasing the performance of the classifiers. A classifier is the second step that aims to categorise the input. Within the proposed step, the unsupervised part relies on the feature extraction by using local binary patterns (LBP), followed by feature selection relying on factor analysis technique. The LBP is a kind of visual descriptor, mainly applied for image recognition problem. The aim of using LBP is to analyse the input COVID-19 image and extract salient features. Furthermore, factor analysis is a statistical technique applied to define variability among observed variables in less unnoticed variables named factors. The factor analysis applied to the LBP wavelet aims to select sensitive features from input data (LBP output) and reduce the size input. In the last stage, conic functions classifier is applied to classify two sets of data, categorising the extracted features by using LBP and factor analysis as positive or negative COVID-19 cases. The proposed solution aims to diagnose COVID-19 by using LBP and factor analysis, based on conic functions classifier. The conic functions classifier presents remarkable results compared with these popular classifiers and state-of-the-art studies presented in the literature. © 2022, Springer Nature Switzerland AG.
  • Book Part
    A Simulation Environment for Cybersecurity Attack Analysis Based on Network Traffic Logs
    (inst Engineering Tech-iet, 2019) Daneshgadeh, Salva; Oney, Mehmet Ugur; Kemmerich, Thomas; Baykal, Nazife
    The continued and rapid progress of network technology has revolutionized all modern critical infrastructures and business models. Technologies today are firmly relying on network and communication facilities which in turn make them dependent on network security. Network-security investments do not always guarantee the security of organizations. However, the evaluation of security solutions requires designing, testing and developing sophisticated security tools which are often very expensive. Simulation and virtualization techniques empower researchers to adapt all experimental scenarios of network security in a more cost and time-effective manner before deciding about the final security solution. This study presents a detailed guideline to model and develop a simultaneous virtualized and simulated environment for computer networks to practice different network attack scenarios. The preliminary object of this study is to create a test bed for network anomaly detection research. The required dataset for anomaly or attack detection studies can be prepared based on the proposed environment in this study. We used open source GNS3 emulation tool, Docker containers, pfSense firewall, NTOPNG network traffic-monitoring tool, BoNeSi DDoS botnet simulator, Ostinato network workload generation tool and MYSQL database to collect simulated network traffic data. This simulation environment can also be utilized in a variety of cybersecurity studies such as vulnerability analysis, attack detection, penetration testing and monitoring by minor changes.
  • Book Part
    Citation - Scopus: 1
    Boundary-Element Method in Microfluidics
    (Springer Science+Business Media, 2015) Çetin, Barbaros; Baranoğlu, Besim
  • Book Part
    Citation - Scopus: 3
    Making Foreign Policy Through Twitter: an Analysis of Trump's Tweets on Iran
    (IGI Global, 2020) Orhan,D.D.
    Through the development of technology, the understanding of traditional foreign policy has changed. Foreign policy making, which was shaped by diplomatic correspondence, visits, agreements, and notes between countries, is carried out today via messages sent over the Internet. Twitter is the most frequently used internet tool in the hands of institutions, decision makers, and leaders in foreign policy making. US President Donald J. Trump is one of the leaders who use Twitter most effectively. Twitter was the center of Trump's messages, both during the presidential campaign and after his election. Trump is not just using Twitter as a platform for meeting his supporters and announcing the country's official policies. Twitter has also been an important way for Trump to challenge and send harsh messages to certain countries, companies, and individuals. Iran is one of the countries that Trump targets through Twitter. This study aims to examine the use of Twitter as a platform in foreign policy making by using content analysis method through Trump's tweets about Iran. © 2021, IGI Global.
  • Book Part
    Citation - Scopus: 2
    Materials and Processes for Treatment of Microbiological Pollution in Water
    (Springer, 2021) Alazzawi,M.; Turkoglu Sasmazel,H.
    Clean and safe water is vital for the life and health of human beings. However, there are still millions of people around the world with inadequate clean water sources. Microbiological pollution is one of the most concerned water pollutants and is the crucial cause of waterborne diseases like diarrhea, resulting in about two million deaths annually due to severe dehydration (WHO in Guidelines for drinking-water quality. Incorporating the first addendum, WHO, Geneva, 2017). It is critical to develop methods using advanced materials and process to mitigate contaminants from water resources. Production of safe water usually involves disinfection and decontamination processes. Conventional disinfection process, such as chlorination, is challenged by the formation of disinfection by-products. Furthermore, the presence of emerging pathogenic, that resist conventional water treatment techniques, raised the crucial necessity for emerging materials and techniques for treating water from microbiological pollution (Shannon et al. in Nature 452:301–310, 2008). This chapter describes bacterial, viral, and protozoal microbiological pollution in water supplies and the application of emerging materials and techniques to eliminate such contaminations. © 2021, Springer Nature Switzerland AG.
  • Book Part
    Citation - Scopus: 1
    Web Privacy: Issues, Legislations, and Technological Challenges
    (IGI Global, 2008) Mishra,A.; Mishra,D.
    People all over the world increasingly are concerned about the privacy issues surrounding the personal information collected by private organizations, governments and employers. Privacy relates to issues regarding collection, secure transmission, storage, authorized access, usage, and disclosure of personal information. This information is used for commercial gain by many organizations. Individual privacy concerns significantly affects consumer willingness to engage in electronic commerce over the Internet. The increased use of the Internet and Web for everyday activities is bringing new threats to personal privacy. This chapter assessed various issues related to individual privacy on the Web, growing concerns among the Web users, technologies employed for collecting and protecting information on the Web, privacy-enhancing technologies and the legal provisions to curb the Web privacy. This chapter also reported detailed discussion about Platform for Privacy Preferences (P3P), its structure, present scenario of its implementation and its future success. Global consistency on Internet privacy protection is important to promote the growth of electronic commerce. To protect consumers in a globally consistent manner, legislation, self-regulation, technical solutions and combination solutions are different ways that can be implemented. © 2008, IGI Global.
  • Book Part
    The Invisibles: The Case of the Seasonal Agricultural Workers of Turkey From a Non-Discrimination Perspective
    (Springer International Publishing, 2022) Gençoglu,F.; Gençoğlu, Funda; Fistikçi,A.C.; Gençoğlu, Funda; Political Science and Public Administration; Political Science and Public Administration
    Above are the famous first words of the Universal Declaration of Human Rights (1948) establishing, decades ago, the basic premises of the international human rights law. As the Office of the High Commissioner for Human Rights (OHCHR) recognizes, however, discrimination undermines a true fulfillment of these premises and “the fight against discrimination remains a daily struggle for millions around the globe. For millions of people globally, the struggle to extract themselves from situations of discrimination at almost every turn in their daily lives is an impossible ambition” (OHCHR 2009). © The Editor(s)(if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022.
  • Book Part
    Citation - WoS: 7
    Citation - Scopus: 10
    Stereolithography and its applications
    (de Gruyter Oldenbourg, 2020) Oliaei, Samad Nadimi Bavil; Nasseri, Behzad
    Additive manufacturing (AM) using cost-effective, accurate, and fast processes is one of the major challenges of today's manufacturing community. Stereolithography (SL or SLA) is a promising technique of AM that is believed to satisfy these requirements. In this process, photopolymerization is used to obtain a 3D model of the desired parts directly from their computer-aided design models. The process works by focusing an ultraviolet (UV) laser on a reservoir of photosensitive polymer resin to solidify it layer by layer, resulting in the desired 3D shape. In this chapter, photopolymerization process and how photopolymers response when they are exposed to UV light sources are discussed along with the application of SLA process in different industries such as manufacturing of industrial parts, including military, medical, and biomedical applications. The physicomechanical properties of fabricated polymeric parts will be explained, including viscosity, tensile strength, elastic modulus, flexibility, and toughness. Some case studies regarding the application of this method for polymeric composite material fabrication, preoperation phantom models, scaffolds preparation used in tissue engineering, and drug-loaded models are discussed.
  • Book Part
    Citation - Scopus: 11
    Same Same or Different?: Accession Europeanization in Central and Eastern Europe and Turkey Compared
    (Taylor and Francis Inc., 2015) Börzel,T.A.; Soyaltin,D.; Yilmaz,G.
    [No abstract available]
  • Book Part
    Citation - Scopus: 4
    Stress, Coping, and Social Media Use
    (IGI Global, 2022) Demirtepe-Saygılı, D.
    Social media has become a part of people’s lives and many psychological processes are suggested to be related with social media use. This chapter examines social media use from a stress and coping perspective. Social media can be a stressor for users with the content of posts they see, with a fear of negative evaluation, as an unhealthy attachment to social media accounts, and as a result of cyberbullying. Social media use can also be a problem-focused coping as a source of information, an emotion-focused coping as a distraction, and a source of social support. Lastly, it can be a predictor or a part of well-being as well as a moderator or mediator between coping and well-being. After elaborating on social media use as a part of the coping process, implications for research and practice are discussed. The key points from a coping viewpoint are specified for users, parents, teachers, and professionals. While problematic use of social media can be part of dysfunctional coping and a worse well-being, healthy use can help individuals deal with stresses and lead to a better well-being. © 2022 by IGI Global. All rights reserved.