- Eklemek veya çıkarmak istediğiniz kriterleriniz için 'Dahil' / 'Hariç' seçeneğini kullanabilirsiniz. Sorgu satırları birbirine 'VE' bağlacı ile bağlıdır. - İptal tuşuna basarak normal aramaya dönebilirsiniz.
A flow is said to be asymmetrically routed if its packets follow separate paths for forward and reverse directions. Routing asymmetry leads to problems in flow identification, policy enforcement, quota management, traffic shaping etc. in DPI systems. There are two existing approaches to battle routing asymmetry: clustering and state sharing. The latter fails with stateless traffic, while clustering leads to large traffic overhead. We propose the Hybrid Asymmetric Traffic Classifier (HATC) method that merges the best aspects of the two existing methods. HATC is able to handle all types of asymm ...Daha fazlası
YUMUŞAK, Semih | ARAS, Rıza Emre | UYSAL, Elif | DOĞDU, Erdoğan | KODAZ, Halife | ÖZTOPRAK, Kasım
We present the project SpEnD, a complete SPARQL endpoint discovery and analysis portal. In a previous study, the SPARQL endpoint discovery and analysis steps of the SpEnD system were explained in detail. In the SpEnD portal, the SPARQL endpoints are extracted from the web by using web crawling techniques, monitored and analyzed by live querying the endpoints systematically. After many sustainability improvements in the SpEnD project, the SpEnD system is now online as a portal. SpEnD portal currently serves 1487 SPARQL endpoints, out of which 911 endpoints are uniquely found by SpEnD only when ...Daha fazlası
Wireless communication technology is spreading rapidly to all areas of our lives. The technology, which has a wide range of applications from radios, intelligent home systems, automation applications to GPS units, was used in monitoring the workers working in mines in this study. Most of the mining area underground mining is risky and the possibility of accident (gas jams, the explosion and dents, etc.) is the area of high. Locating is vital in this line of work when a sudden accident or dent occurred in which the worker will be known and the position of the recovery efforts can be intensified ...Daha fazlası
Network Security is one of the most critical issues of establishments like universities, govermental and private institutions which have significant role on development and security of a state. These establishments use internet to share and keep official information, and to make their institutive operations. A cyber attack that targetted such establishments networks may cause a great loss. Therefore, networks of these establishments ought to protect on a high level security. In this paper, a system is offered which is able to investigate networks of institutions and ranking their network by pr ...Daha fazlası
SADOU, Hakim | HACIB, Tarik | LE BIHAN, Yan | AÇIKGÖZ, Hulusi | MEYER, Olivier
Inverse problems for determination of dielectric materials properties (complex permittivity) are usually solved by iterative methods using numerically based forward model. These methods are computationally expensive. In this paper, we propose a fast inversion model based on partial least square regression (PLSR). The idea is to build a model able to predict in real time the properties of the sample under test using measurements of admittance or reflexion coefficient of the propagating electromagnetic micro wave along the coaxial line. Numerical solution of the direct problem is made using Fini ...Daha fazlası
Publish/subscribe communication systems, where nodes subscribe to many different topics of interest, are becoming increasingly more common in application domains such as social networks, Internet of Things, etc. Designing overlay networks that connect the nodes subscribed to each distinct topic is hence a fundamental problem in these systems. For scalability and efficiency, it is important to keep the maximum node degree of the overlay in the publish/subscribe system low. Ideally one would like to be able not only to keep the maximum node degree of the overlay low, but also to ensure that the ...Daha fazlası
6698 sayılı Kişisel Verilerin Korunması Kanunu kapsamında yükümlülüklerimiz ve cerez politikamız hakkında bilgi sahibi olmak için alttaki bağlantıyı kullanabilirsiniz.