Başlık için Fen Bilimleri Enstitüsü / Graduate School for Science and Engineering listeleme
Toplam kayıt 188, listelenen: 134-153
-
Paragraph and sentence level semantic textual similarity measurement techniques: An application on solving OSYM exam questions
(Işık Üniversitesi, 2019-09-06)An Application on Solving OSYM Exam Questions Semantic textual similarity is a well-known natural language processing (NLP) task which aims to measure the degree of similarity of two texts in terms of meanings. In this ... -
Parallel proposition bank construction for Turkish
(Işık Üniversitesi, 2019-04-02)PropBank is the bank of propositions which contains hand-annotated corpus for predicate-argument information and semantic roles or arguments. It aims to provide an extensive dataset for enhancing NLP applications such as ... -
Partner selection and resource allocation in single-cell, multi-cell and cognitive cooperative multiple access channels
(Işık Üniversitesi, 2013-06-06)Wireless communication has been widely used across the globe for several years. As the technology advances and gains popularity, more people start using it and more throughput is needed. For that reason, several techniques ... -
Perception of it governance in Turkey
(Işık Üniversitesi, 2012-02-08)Effective governance of IT in an organization is essential for delivering value to its business. IT Governance can be identified as an integral part of enterprise governance that includes processes and methods for making ... -
Performance analysis of space time transmit diversity in UMTS under presence of carrier phase offset
(Işık Üniversitesi, 2003-12)The reguirements for the next generation of mobile communication systems are primarily driven by the explosive growth of worldwide mobile communication subscribers. Additionaly, 3G systems will allow various of new services ... -
Performance analysis of static agent architecture with centralized matchmaking
(Işık Üniversitesi, 2005)Large- scale network environments such as the internet possess the characteristics of distributed data, distributed access and distributed control. This gives users a powerful mechanism for building and integrating large ... -
Performance and security issues in e-payment systems: pay on-line case
(Işık Üniversitesi, 2006-06)In this thesis, we report an experience on Performance and Security issues in E-Payment systems. We develop an E-Payment system which covers all introduced performance and security measures written in this thesis. We also ... -
Prediction of final football league standings by dynamic frontier estimation
(Işık Üniversitesi, 2017-07-13)Data Envelopment Analysis (DEA) is a commonly used method for efficiency assessment of teams in many sports including football. In this work, we investigate how estimations of final league standings with DEA efficiency ... -
Procurement and activity planning for a production line provider
(Işık Üniversitesi, 2020-01-16)Consider a production line provider with the following problem. Turnkey production lines should be delivered to global clients by contractual due-dates. Machines in the production lines can be bought from suppliers or built ... -
Project workspace: a computer supported collorative work tool for software project development
(Işık Üniversitesi, 2005-07)Software project development is a very serious job. Most of the project budgets are very big and most of them do not finish. So,the need to improve our software development processes is very real.Development side is not ... -
Prosodic, morphological and lexical feature extraction of Turkish broadcast news data
(Işık Üniversitesi, 2014-06-05)Sentence segmentation from speech is part of a process that aims at enriching the unstructured stream of words that are the output of standard speech recognizers. Its role is to find the sentence units in this stream of ... -
Ring array processing for forward-looking intravascular and intracardiac ultrasonic imaging
(Işık Üniversitesi, 2010-06-08)Forward-looking (FL) catheter-based imaging systems are highly desirable for guiding interventions in IVUS and ICE applications. One of the main challenges in the array based FLIVUS systems is the large channel count which ... -
The risk perception of it outsourcing in Turkey
(Işık Üniversitesi, 2013-08-28)The competition in today's business is getting stronger each day. Due to its proven cost reduction potential the usage of Information Technology (IT) outsourcing and the flexibility it provided are among the attractive and ... -
Risk scalable and modular security architectures
(Işık Üniversitesi, 2005-04)Network security is ensuring the availability, the integrity and the confidentiality in the business activities. Network security is not only limiting acess to the resources; İt is mainly structring the acess to the match ... -
Robust localization framework for wireless sensor networks
(Işık Üniversitesi, 2009-01-07)In this thesis we try to construct a robust localization framework for wireless sensor networks and sample algorithms which uses our robust localization framework. In order to handle noise in distance measurements, our ... -
Rule-based chunking of semantic roles for Turkish
(Işık Üniversitesi, 2018-01-24)In our work, we approached to semantic role labeling from a different angle. Contrary to related works, which focused on determining single role like noun phrase or predicate, we worked on all of the roles. We claim that, ... -
Searching for the optimal ordering of classes in rule induction
(Işık Üniversitesi, 2012-09-19)In this thesis, we work on rule induction algorithms, basically Ripper. These algorithms solve a K>2 class problem by transforming it into a sequence ok K-1 two class problems. As a heuristic, these algorithms learn classes ... -
Secure SMS using simplified PGP
(Işık Üniversitesi, 2008)While communicating with your partner, the ability to communicate in a secure way is a fundamental and important requirement for information security. Security of communication requires identification and verification of ... -
Security analysis of coap and dtls protocols for internet of things applications
(Işık Üniversitesi, 2019-08-26)Internet of Things is a very fast growing area. Its requirements and related technologies are changing from day to day. In Internet of Things, devices can communicate with each other with different messaging protocols. The ... -
Security of chaotic cryptosystems
(Işık Üniversitesi, 2008)In this thesis, we tried to show the weaknesses of chaotic cryptosystems. We break four chaos-based cryptosystems and proved our attacks. In our first cryptanalysis, we broke a cryptosystem based on two dimensional chaotic ...