Yazar "Solak, Ercan" için listeleme
-
Algebraic break of a cryptosystem based on discretized two-dimensional chaotic maps
Solak, Ercan; Çokal, Cahit (Elsevier Science BV, 2009-03-30)Recently, a cryptosystem based on two-dimensional discretized chaotic maps was proposed [T. Xiang, et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we cryptanalyze the proposal using algebraic methods. We give three ... -
Algebraic break of image ciphers based on discretized chaotic map lattices
Solak, Ercan; Çokal, Cahit (Elsevier Science Inc, 2011-01-01)In this paper, we provide an algebraic cryptanalysis of a recently proposed chaotic image cipher. We show that the secret parameters of the algorithm can be revealed using chosen-plaintext attacks. Our attack uses the orbit ... -
Author identification of newspaper columns using style and semantic features
Yıldız, Ergin Doğan (Işık Üniversitesi, 2016-05-17)This study has two major purposes : to implement and compare the author classification results of di erent Naive Bayes Classi ers, and to investigate whether merging individual methods will increase classi cation success ... -
Automatic music transcription
Paşmakoğlu, Berk Ekim (Işık Üniversitesi, 2010)Computational music research is spread out of the world in many fields. One of these fields is automatic music transcription. During this thesis, we concentrated on the detection of music notes inside an audio signal. We ... -
Bilingual software requirements tracing using vector space model
Yıldız, Olcay Taner; Okutan, Ahmet; Solak, Ercan (SciTePress, 2014)In the software engineering world, creating and maintaining relationships between byproducts generated during the software lifecycle is crucial. A typical relation is the one that exists between an item in the requirements ... -
Breaking an orbit-based symmetric cryptosystem
Solak, Ercan; Rhouma, Rhouma; Belghith, Safya Mdimegh (Pergamon-Elsevier Science Ltd, 2011-09)We report a break for a recently proposed class of cryptosystems. The cryptosystem uses constant points of a periodic secret orbit to encrypt the plaintext. In order to break the system, it suffices to sort the constant ... -
Chunking in Turkish with conditional random fields
Yıldız, Olcay Taner; Solak, Ercan; Ehsani, Razieh; Görgün, Onur (Springer-Verlag, 2015-04-14)In this paper, we report our work on chunking in Turkish. We used the data that we generated by manually translating a subset of the Penn Treebank. We exploited the already available tags in the trees to automatically ... -
Comment on "Encryption and decryption of images with chaotic map lattices" [Chaos 16, 033118 (2006)]
Solak, Ercan; Çokal, Cahit (American Institute of Physics Inc., 2008-09)In this paper, we comment on the chaotic encryption algorithm proposed by A. N. Pisarchik et al. [Chaos 16, 033118 (2006)]. We demonstrate that the algorithm is not invertible. We suggest simple modifications that can ... -
Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]
Rhouma, Rhouma; Solak, Ercan; Arroyo, David; Li, Shujun; Alvarez, Gonzalo; Belghith, Safya Mdimegh (Elsevier Science BV, 2009-09-07)In this comment, we analyze a recently proposed Baptista-like cryptosystem and show that it is not invertible. Others weaknesses are also reported. A modified version of this cryptosystem is proposed to show how to overcome ... -
Constructing a Turkish constituency parse treeBank
Yıldız, Olcay Taner; Solak, Ercan; Çandır, Şemsinur; Görgün, Onur; Ehsani, Razieh (Springer Verlag, 2016)In this paper, we describe our initial efforts for creating a Turkish constituency parse treebank by utilizing the English Penn Treebank. We employ a semiautomated approach for annotation. In our previouswork [18], the ... -
Constructing a Turkish-English parallel treebank
Yıldız, Olcay Taner; Solak, Ercan; Görgün, Onur; Ehsani, Razieh (Association for Computational Linguistics (ACL), 2014)In this paper, we report our preliminary efforts in building an English-Turkish parallel treebank corpus for statistical machine translation. In the corpus, we manually generated parallel trees for about 5,000 sentences ... -
Constructing a WordNet for Turkish using manual and automatic annotation
Ehsani, Razieh; Solak, Ercan; Yıldız, Olcay Taner (Assoc Computing Machinery, 2018-05)In this article, we summarize the methodology and the results of our 2-year-long efforts to construct a comprehensive WordNet for Turkish. In our approach, we mine a dictionary for synonym candidate pairs and manually mark ... -
Cryptanalysis of a chaos-based image encryption algorithm
Çokal, Cahit; Solak, Ercan (Elsevier Science BV, 2009-03-30)A chaos-based image encryption algorithm was proposed in [Z.-H. Guan, F. Huang, W. Guan, Phys. Lett. A 346 (2005) 153]. In this Letter, we analyze the security weaknesses of the proposal. By applying chosen-plaintext and ... -
Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps
Solak, Ercan; Çokal, Cahit (Elsevier Science BV, 2008-11-17)Recently, an encryption algorithm based on two-dimensional discretized chaotic maps was proposed [Xiang et al., Phys. Lett. A 364 (2007) 252]. In this Letter, we analyze the security weaknesses of the proposal. Using the ... -
Cryptanalysis of a multi-chaotic systems based image cryptosystem
Solak, Ercan; Rhouma, Rhouma; Belghith, Safya Mdimegh (Elsevier Science BV, 2010-01-15)This paper is a cryptanalysis of a recently proposed multi-chaotic systems based image cryptosystem. The cryptosystem is composed of two shuffling stages parameterized by chaotically generated sequences. We propose and ... -
Cryptanalysis of a new substitution-diffusion based image cipher
Rhouma, Rhouma; Solak, Ercan; Belghith, Safya Mdimegh (Elsevier Science BV, 2010-07)This paper introduces two different types of attacks on a recently proposed cryptosystem based on chaotic standard and logistic maps. In the two attacks, only a pair of (plaintext/ciphertext) was needed to totally break ... -
Cryptanalysis of Chaotic Ciphers
Solak, Ercan (Springer-Verlag Berlin, 2011)[No abstract available] -
Cryptanalysis of Fridrich's chaotic image encryption
Solak, Ercan; Çokal, Cahit; Yıldız, Olcay Taner; Bıyıkoğlu, Türker (World Scientific Publishing, 2010-05)We cryptanalyze Fridrich's chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against chosen-ciphertext attacks. We propose an attack that reveals the secret ... -
Cryptanalysis of image encryption with compound chaotic sequence
Solak, Ercan (IEEE, 2009)Recently, an image encryption algorithm based on compound chaotic sequence was proposed [Tong et al., Image and Vision Computing 26 (2008) 843]. In this paper, we analyze the security weaknesses of the proposal. We give ... -
Data collection and analysis on vanet
Karatoy, Hilal (Işık Üniversitesi, 2009-02-01)The communication between devices is provided by wireless networks and it is growing rapidly, dependent on the needs. Wireless networks strike the attention of people throughout the world, and the ad hoc network is part ...