110 research outputs found
Tetkik: Akan veri kümeleme algoritmalarını çalıştırma ve karşılaştırma
12th Turkish National Software Engineering Symposium, UYMS 2018; Istanbul; Turkey; 10 September 2018 through 12 September 2018Recently, clustering data streams have become an incredibly important research area for knowledge discovery as applications produce more and more unstoppable streaming data. In this paper we introduce clustering, streams and data streaming clustering algorithms, as well as discussions of the most important stream clustering algorithms, considering their structure. As an additional contribution of our work and differently from review and survey papers in stream clustering, we offer the practical part of the most known stream clustering algorithms, namely: (i) CluStream; (ii) DenStream; (iii) D-Stream; and (iv) ClusTree, showing their experimental results along with some performance metrics computation of for each, depending on MOA framework.Son zamanlarda, veri akışlarını kümelemek uygulamalar daha fazla
durdurulamaz veri akışı üretirken bilgi keşfi için inanılmaz derecede önemli bir
araştırma alanı haline gelmiştir.Bu makalede, kümeleme, akışlar ve veri
akışlarını kümeleme algoritmalarını en önemli akım kümeleme algoritmalarının
irdelenmesini yapılarını da göz önünde bulundurarak tanıtıyoruz. Çalışmamızın
ek bir katkısı ve akış kümeleme alanında yapılmış tetkit ve gözden geçirme
makalelerinden farklı olarak en bilinen akış kümeleme algoritmalarının Pratik
kısmını, yani: (i) CluStream; (ii) DenStream; (iii) D-Stream; and (iv) ClusTree,
MOA Java çerçevesine bağlı olarak, her biri için bazı performans metriklerinin
hesaplanmasıyla birlikte deney sonuçlarını göstererek sunuyoruz
Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device
With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared
COMPUTER AIDED LIP READING TRAINING TOOL
ABSTRACT Worldwide auditory-verbal education is becoming widespread for deaf children. But many prelingually, late-diagnosed deaf children and adults may utilize neither hearing aids nor cochlear implants and needed the support of lip-reading. Therefore, lip-reading skill remains to be important for oral education programmes of hearing impaired. The computerized lip-reading system which will be accomplished in this project is called "AURIS". This project is designed for hearing impaired children with hearing aids or cochlear implants, aims to teach lip reading, by using characteristics of a word and will not be presented on its own but within a sentence
- …