110 research outputs found

    Tetkik: Akan veri kümeleme algoritmalarını çalıştırma ve karşılaştırma

    Get PDF
    12th Turkish National Software Engineering Symposium, UYMS 2018; Istanbul; Turkey; 10 September 2018 through 12 September 2018Recently, clustering data streams have become an incredibly important research area for knowledge discovery as applications produce more and more unstoppable streaming data. In this paper we introduce clustering, streams and data streaming clustering algorithms, as well as discussions of the most important stream clustering algorithms, considering their structure. As an additional contribution of our work and differently from review and survey papers in stream clustering, we offer the practical part of the most known stream clustering algorithms, namely: (i) CluStream; (ii) DenStream; (iii) D-Stream; and (iv) ClusTree, showing their experimental results along with some performance metrics computation of for each, depending on MOA framework.Son zamanlarda, veri akışlarını kümelemek uygulamalar daha fazla durdurulamaz veri akışı üretirken bilgi keşfi için inanılmaz derecede önemli bir araştırma alanı haline gelmiştir.Bu makalede, kümeleme, akışlar ve veri akışlarını kümeleme algoritmalarını en önemli akım kümeleme algoritmalarının irdelenmesini yapılarını da göz önünde bulundurarak tanıtıyoruz. Çalışmamızın ek bir katkısı ve akış kümeleme alanında yapılmış tetkit ve gözden geçirme makalelerinden farklı olarak en bilinen akış kümeleme algoritmalarının Pratik kısmını, yani: (i) CluStream; (ii) DenStream; (iii) D-Stream; and (iv) ClusTree, MOA Java çerçevesine bağlı olarak, her biri için bazı performans metriklerinin hesaplanmasıyla birlikte deney sonuçlarını göstererek sunuyoruz

    Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device

    Get PDF
    With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared

    COMPUTER AIDED LIP READING TRAINING TOOL

    Get PDF
    ABSTRACT Worldwide auditory-verbal education is becoming widespread for deaf children. But many prelingually, late-diagnosed deaf children and adults may utilize neither hearing aids nor cochlear implants and needed the support of lip-reading. Therefore, lip-reading skill remains to be important for oral education programmes of hearing impaired. The computerized lip-reading system which will be accomplished in this project is called "AURIS". This project is designed for hearing impaired children with hearing aids or cochlear implants, aims to teach lip reading, by using characteristics of a word and will not be presented on its own but within a sentence
    corecore