- Eklemek veya çıkarmak istediğiniz kriterleriniz için 'Dahil' / 'Hariç' seçeneğini kullanabilirsiniz. Sorgu satırları birbirine 'VE' bağlacı ile bağlıdır. - İptal tuşuna basarak normal aramaya dönebilirsiniz.
Due to wide range of users, email had emerged as one of the preferred method to intrude Local area networks and end users. In this paper we examine the characteristics of various email security threats and the technology used by attackers. In order to counter defense technology, attackers change their mode of operation frequently. The continuous evaluation of attacker's pattern will help the industry to combat attacks effectively. In our study, we collected several thousand spam from a corporate server for a period of 12 months from Jan 2012 to Jan 2013. From the collected data, we identified ...Daha fazlası
The main purpose of this study is to prepare mathematical model for active vibration control of a structure. This paper presents the numerical and experimental modal analysis of aluminum cantilever beam in order to investigate the dynamic characteristics of the structure. The results will be used for active vibration control of structure's experimental setup. Experimental natural frequencies are obtained and compared to verify the proposed numerical model by using modal analysis results. MATLAB System Identification Toolbox and ANSYS harmonic response function are used together to estimate bea ...Daha fazlası
In this paper, using motion capture, we study on Turkish Sign Language Animation. A markerless system, Microsoft Kinect sensor and a professional optical system are compared. Besides, we use the motion capture data in two different approaches; data driven and real time. To animate the sign language, we merge the motion capture output with a cartoon character. In the first approach, which is data-driven, motion capture data is recorded, processed and converted to a character animation off-line. This data is stored in a database and it can be used in mobile devices or any other necessary ways. R ...Daha fazlası
Part of Speech (POS) Tagging can be applied by several tools and several programming languages. This work focuses on the Natural Language Toolkit (NLTK) library in the Python environment and the gold standard corpora installable. The corpora and tagging methods are analyzed and compared by using the Python language. Different taggers are analyzed according to their tagging accuracies with data from three different corpora. In this study, we have analyzed Brown, Penn Treebank and NPS Chat corpuses. The taggers we have used for the analysis are; default tagger, regex tagger, n-gram taggers. We h ...Daha fazlası
Failure of metallic structures operating under shock loading is a common occurrence in engineering applications. It is difficult to estimate the response of complicated systems analytically, due to structure's dynamic characteristics and varying loadings. Therefore, experimental, numerical, or a combination of both methods is used for evaluations. In this study, test pieces made of two different materials are subjected to shock loads stemming from firing of a Gatling gun. Strain measurements are made, and finite element analysis of the test piece is performed. As a result of this study, strain ...Daha fazlası
6698 sayılı Kişisel Verilerin Korunması Kanunu kapsamında yükümlülüklerimiz ve cerez politikamız hakkında bilgi sahibi olmak için alttaki bağlantıyı kullanabilirsiniz.