Ara
Toplam kayıt 65, listelenen: 41-50
Security of chaotic cryptosystems
(Işık Üniversitesi, 2008)
In this thesis, we tried to show the weaknesses of chaotic cryptosystems. We break four chaos-based cryptosystems and proved our attacks. In our first cryptanalysis, we broke a cryptosystem based on two dimensional chaotic ...
Evolving strategies for web crawler
(Işık Üniversitesi, 2009-05-06)
With the rapid growth of Internet and Internet-based information, it becomes the largest and publicly accessible data source in the world. Every day millions of information available so to achieve information becomes harder. ...
Spline based neural networks
(Işık Üniversitesi, 2005-06)
In this thesis, we applied the Catmull-Rom splines and B-splines to the neural networks models, which are Multi Layer Perceptrons, Elman Networks, and Locally Recurrent Neural Networks, as adaptive activation functions. ...
GSM and GPRS security
(Işık Üniversitesi, 2004-09)
In this thesis study, today's popular mobile voice (GSM) and data (GPRS) communication technologies (as an intorduction) and their security were studied. GSM arhitecture, key components of the GSM, security fonctions, and ...
Cost sensitive learning algorithms
(Işık Üniversitesi, 2008)
This thesis studies the cost sensitive learning algorithms that calculate the class learning algorithms errors and costs. Data mining is the automated extraction of hidden predictive information from databases that can be ...
Distributed iterative cluster localization in wireless sensor networks
(Işık Üniversitesi, 2009-01-07)
We designed a distributed algorithm for iterative cluster localization. Because this algorithm is especially designed for large scale networks, increase in the number of sensor nodes has no ine ciency e ect on sensor node ...
Performance and security issues in e-payment systems: pay on-line case
(Işık Üniversitesi, 2006-06)
In this thesis, we report an experience on Performance and Security issues in E-Payment systems. We develop an E-Payment system which covers all introduced performance and security measures written in this thesis. We also ...
Artifact reduction in occluded regions for motion compensated frame interpolation
(Işık Üniversitesi, 2008)
In this paper, we propose a new method to be used in occluded regions for motion compensated frame interpolation. Frame rate up conversion is becoming much more important when usage of digital video systems increase. ...
Performance analysis of static agent architecture with centralized matchmaking
(Işık Üniversitesi, 2005)
Large- scale network environments such as the internet possess the characteristics of distributed data, distributed access and distributed control. This gives users a powerful mechanism for building and integrating large ...
Enterprise manager tool
(Işık Üniversitesi, 2005)
In this thesis we develop a new Enterprise Manager Tool with transformation data to Excel sheet capability. This is a user friendly tool.This tool gives user to access databases and database objects such as tables,views,stored ...