196 results
Search Results
Now showing 1 - 10 of 196
Book Part Citation - Scopus: 2Novel Covid-19 Recognition Framework Based on Conic Functions Classifier(Springer Science and Business Media Deutschland GmbH, 2022) Karim,A.M.; Mishra,A.The new coronavirus has been declared as a global emergency. The first case was officially declared in Wuhan, China, during the end of 2019. Since then, the virus has spread to nearly every continent, and case numbers continue to rise. The scientists and engineers immediately responded to the virus and presented techniques, devices and treatment approaches to fight back and eliminate the virus. Machine learning is a popular scientific tool and is applied to several medical image recognition problems, involving tumour recognition, cancer detection, organ transplantation and COVID-19 diagnosis. It is proved that machine learning presents robust, fast and accurate results in various medical image recognition problems. Generally, machine learning-based frameworks consist of two stages: feature extraction and classification. In the feature extraction, overwhelmingly unsupervised learning techniques are applied to reduce the input data’s size. This step extracts appropriate features by reducing the computational time and increasing the performance of the classifiers. A classifier is the second step that aims to categorise the input. Within the proposed step, the unsupervised part relies on the feature extraction by using local binary patterns (LBP), followed by feature selection relying on factor analysis technique. The LBP is a kind of visual descriptor, mainly applied for image recognition problem. The aim of using LBP is to analyse the input COVID-19 image and extract salient features. Furthermore, factor analysis is a statistical technique applied to define variability among observed variables in less unnoticed variables named factors. The factor analysis applied to the LBP wavelet aims to select sensitive features from input data (LBP output) and reduce the size input. In the last stage, conic functions classifier is applied to classify two sets of data, categorising the extracted features by using LBP and factor analysis as positive or negative COVID-19 cases. The proposed solution aims to diagnose COVID-19 by using LBP and factor analysis, based on conic functions classifier. The conic functions classifier presents remarkable results compared with these popular classifiers and state-of-the-art studies presented in the literature. © 2022, Springer Nature Switzerland AG.Book Part Applying Asymmetric Theory to Optimise Instructional, Assessment, and Administrative Designs of Intensive English Programmes(Springer Science+Business Media, 2025) Sahin, A.Asymmetric Theory emphasizes optimisation, efficiency, and economy by harnessing the transformative power of asymmetry. It offers practical and functional solutions to some complex daily and scientific problems through the application of multilayered asymmetric thinking. The process begins with the careful identification of the most dominant factors influencing the success of the solutions to the problems, ultimately leading to the creation of a main key to successand sub keys to success attached to it. The key tosuccess serves as a guide for its creator as it highlights which factors should be controlled and which should be prioritised over the others. As a result, Asymmetric Theory introduces a structured strategy-oriented approach to problem-solving. This chapter begins by highlighting the importance of Intensive English Programmes (IEPs) for English-medium universities. Then, it introduces the core principles of Asymmetric Theory. Building on these principles, a main key to success is created for the programme development challenge of IEPs followed by the creation of sub keys for optimising their instructional, assessment, and administrative designs. These steps are demonstrated using a think-aloud protocol. Ultimately, this chapter presents how the instructional, assessment, and administrative designs of an educational programme can be effectively optimised through the lens of Asymmetric Theory using IEPs as a comprehensive example. © 2025 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.Book Part Common Fixed Point Results for Meir-Keeler-Type Contraction Mappings(Springer, 2025) Karapńar, Erdal; Cvetković, Marija, S.; Yeşilkaya, Seher Sultan; Karapınar, ErdalMeir–Keeler contraction presents an interesting and widely studied topic in the area of Metric Fixed Point Theory. We intend to present several results concerning common fixed problem and the impact of Meir-Keeler-type contractions on this type of results. We will present results on common fixed problem for a Meir–Keeler contraction mapping in various settings—metric space, b-metric space, partial metric space, Branciari metric space, etc. It is our intention to present a comprehensive study on this topic that will present a good starting point for the researchers in the Fixed Point Theory. © 2025 Elsevier B.V., All rights reserved.Book Part Discrete Scan Statistics Generated by Dependent Trials and Their Applications in Reliability(Springer New York, 2024) Eryilmaz,S.; Yalcin,F.The chapter is concerned with discrete scan statistic based on a sequence of dependent binary trials. In particular, the existing results are reviewed for the distribution of the discrete scan statistic based on a sequence of exchangeable binary trials. The results are discussed in the context of the reliability of the linear consecutive-k-within-m-out-of-n:F system, and a new exact formula for the reliability of the linear consecutive-2-within-m-out-of-n:F system that consists of arbitrarily dependent components is presented. © Springer Science+Business Media, LLC, part of Springer Nature 2024.Book Part A Simulation Environment for Cybersecurity Attack Analysis Based on Network Traffic Logs(inst Engineering Tech-iet, 2019) Daneshgadeh, Salva; Oney, Mehmet Ugur; Kemmerich, Thomas; Baykal, NazifeThe continued and rapid progress of network technology has revolutionized all modern critical infrastructures and business models. Technologies today are firmly relying on network and communication facilities which in turn make them dependent on network security. Network-security investments do not always guarantee the security of organizations. However, the evaluation of security solutions requires designing, testing and developing sophisticated security tools which are often very expensive. Simulation and virtualization techniques empower researchers to adapt all experimental scenarios of network security in a more cost and time-effective manner before deciding about the final security solution. This study presents a detailed guideline to model and develop a simultaneous virtualized and simulated environment for computer networks to practice different network attack scenarios. The preliminary object of this study is to create a test bed for network anomaly detection research. The required dataset for anomaly or attack detection studies can be prepared based on the proposed environment in this study. We used open source GNS3 emulation tool, Docker containers, pfSense firewall, NTOPNG network traffic-monitoring tool, BoNeSi DDoS botnet simulator, Ostinato network workload generation tool and MYSQL database to collect simulated network traffic data. This simulation environment can also be utilized in a variety of cybersecurity studies such as vulnerability analysis, attack detection, penetration testing and monitoring by minor changes.Book Part JAK Inhibitors/Drug Interactions(Springer Science+Business Media, 2025) Demirci Saadet, E.JAK inhibitors are a group of drugs that can affect the signaling of various cytokines simultaneously. The number of indications in dermatology has been increasing in recent years. JAK inhibitors are largely metabolized by the liver. Therefore, drug–drug interactions may occur when used with cytochrome P450 and CYP2C19 inhibitors or inducers, and drug dosages should be adjusted or not used together. In addition, OAT-3 inhibitors, which are known to play a role in renal elimination, interact with some JAK inhibitors, and dose adjustment is recommended. During treatment, drug–drug interactions should be reviewed in combination with JAK inhibitors and other drugs. © 2025 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.Book Part Citation - Scopus: 1Boundary-Element Method in Microfluidics(Springer Science+Business Media, 2015) Çetin, Barbaros; Baranoğlu, BesimBook Part Citation - Scopus: 3Making Foreign Policy Through Twitter: an Analysis of Trump's Tweets on Iran(IGI Global, 2020) Orhan,D.D.Through the development of technology, the understanding of traditional foreign policy has changed. Foreign policy making, which was shaped by diplomatic correspondence, visits, agreements, and notes between countries, is carried out today via messages sent over the Internet. Twitter is the most frequently used internet tool in the hands of institutions, decision makers, and leaders in foreign policy making. US President Donald J. Trump is one of the leaders who use Twitter most effectively. Twitter was the center of Trump's messages, both during the presidential campaign and after his election. Trump is not just using Twitter as a platform for meeting his supporters and announcing the country's official policies. Twitter has also been an important way for Trump to challenge and send harsh messages to certain countries, companies, and individuals. Iran is one of the countries that Trump targets through Twitter. This study aims to examine the use of Twitter as a platform in foreign policy making by using content analysis method through Trump's tweets about Iran. © 2021, IGI Global.Book Part Citation - Scopus: 2Materials and Processes for Treatment of Microbiological Pollution in Water(Springer, 2021) Alazzawi,M.; Turkoglu Sasmazel,H.Clean and safe water is vital for the life and health of human beings. However, there are still millions of people around the world with inadequate clean water sources. Microbiological pollution is one of the most concerned water pollutants and is the crucial cause of waterborne diseases like diarrhea, resulting in about two million deaths annually due to severe dehydration (WHO in Guidelines for drinking-water quality. Incorporating the first addendum, WHO, Geneva, 2017). It is critical to develop methods using advanced materials and process to mitigate contaminants from water resources. Production of safe water usually involves disinfection and decontamination processes. Conventional disinfection process, such as chlorination, is challenged by the formation of disinfection by-products. Furthermore, the presence of emerging pathogenic, that resist conventional water treatment techniques, raised the crucial necessity for emerging materials and techniques for treating water from microbiological pollution (Shannon et al. in Nature 452:301–310, 2008). This chapter describes bacterial, viral, and protozoal microbiological pollution in water supplies and the application of emerging materials and techniques to eliminate such contaminations. © 2021, Springer Nature Switzerland AG.Book Part Clinical Development of Quinone-Based Drugs(Elsevier, 2024) Altuner, E.E.; Issa, G.; Ozalp, V.C.; Aldemir, O.; Torlak, Y.; Dar, U.A.This chapter provides a detailed explanation of the clinical investigations, pharmacological effects, and characteristics of quinone and quinone derivatives, along with references to pertinent sources. Although quinones have an oxygen group in their structure, they are quickly oxidized and interact with reactive oxygen species. This demonstrates how quinones work as drugs. Quinones and their derivatives are used as medications to treat a wide range of diseases, including cancer, lung, kidney, brain, and tumor disorders. Each of the following has effects on a different area of health; lapochols, anthraquinones, naphthoquinone and its derivatives, and other wide range of quinone derivatives are thoroughly explored in this chapter. © 2025 Elsevier Inc. All rights reserved.

