287 results on '"computer networks"'
Search Results
2. Dindar Yeni Orta Sınıfa Dair Bir İnceleme: Çatlak ile İki Şafak Arasında Filmlerinde Hane ve Dışarısı.
- Author
-
TARHAN, Belgin
- Subjects
- *
MIDDLE class , *MIDDLE class families , *ETHICAL problems , *SOCIAL groups , *COMPUTER networks , *ONLINE social networks , *FILM adaptations - Abstract
Since the 2000s, the representation of religious social groups living in reference of religious values and traditions in Turkish cinema has been multiplying and diversifying. Films that interpret religiosity with a sociological motive are increasing while surpassing the productions in mainstream Turkish cinema that present reactionary, bigoted, and religious stereotypes. The films Çatlak (Fractured, Fikret Reyhan, 2020) and İki Şafak Arasında (Between Two Dawns, Selman Nacar, 2021) stand out as examples reflecting this new perspective. The two films focus on a religious new middle-class family who comes from the province's socio-economic background and tries to live according to their religious obligation while undergoing a process of adaptation to the modern life surrounding them. Their cinematography approaching the religious new middle class from within brings the two films side by side. In this respect, these films differ from their predecessors in placing religiosity at their periphery or center. In this paper, the dual status of household and public life is presented through the concept of online and offline borrowed from computer and network technologies. The concepts of online and offline, illustrate the individual desires and moral dilemmas that are covered up both in the household and in public life. The two films interpret the practices of the new religious middle class in and out of the household, and the problems arising from the dual understanding of morality and justice are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. Eğilme Etkisindeki Büyük Dairesel Boşluklu Kirişlerin Davranışının Deneysel İncelenmesi.
- Author
-
Qaderi, Abdulwahed, Saoud, Mouad Ben, Eren, Volkan, Gündoğay, Abdullah, Yaman, Sıla, and Kabaş, Hamide Tekeli
- Subjects
STRUCTURAL engineering ,REINFORCED concrete buildings ,STRUCTURAL engineers ,COMPUTER networks ,REINFORCED concrete - Abstract
Copyright of Karaelmas Science & Engineering Journal / Karaelmas Fen ve Mühendislik Dergisi is the property of Karaelmas Science & Engineering Journal and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
4. MÜZİK YÖNETİCİLİĞİ'NDE ETKİN SUNUMLAR.
- Author
-
DE THORPE MILLARD, Esin
- Subjects
TELECOMMUNICATION ,COMPUTER networks ,COMMUNICATION of technical information ,INFORMATION society ,GLOBALIZATION ,CHIEF information officers - Abstract
Copyright of International Yegâh Music Journal is the property of International Yegah Music Journal and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
5. Sosyal Medyada Etik, Bilgi Manipülasyonu ve Siber Güvenlik.
- Author
-
TEKKE, Aynur and LALE, Aybala
- Subjects
CYBERTERRORISM ,COMPUTER networks ,DIGITAL media ,CYBERSPACE ,INTERNET security ,MASS media ethics - Abstract
Copyright of Journal of Academic Inquiries / Akademik Incelemeler Dergisi is the property of Akademik Incelemeler Dergisi (Journal of Academic Inquiries) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
6. Covid-19 Pandemisi Sürecinin Okul Müdürleri Üzerindeki Etkileri.
- Author
-
Taşar, Hacı Hüseyin
- Subjects
SOCIAL media in education ,MEDICAL personnel ,COMPUTERS in education ,ONLINE education ,QUANTITATIVE research ,COMPUTER networks ,SOLIDARITY - Abstract
Copyright of Journal of Kirsehir Education Faculty is the property of Journal of Kirsehir Education Faculty and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
7. KAZAK TÜRKÇE SİNDE EK, KELİME VE KELİME GRUPLARINDA GÖRÜLEN EKSİLTİM ÜZERİNE.
- Author
-
YAVUZ, ESRA
- Subjects
PROGRAMMING languages ,ZIPF'S law ,COMPUTER networks ,COLLOQUIAL language ,HUMAN-animal communication - Abstract
Copyright of Journal of Turkish Research Institute / Atatürk Üniversitesi Türkiyat Arastirmalari Enstitüsü Dergisi is the property of Ataturk University Coordinatorship of Scientific Journals and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
8. Pattern search-based firewall in application layer
- Author
-
Kızılkaya, Tolga, Cicioğlu, Murtaza, Toğay, Cengiz, and Bursa Uludağ Üniversitesi/Fen Bilimleri Enstitüsü/Bilgisayar Mühendisliği Anabilim Dalı.
- Subjects
SDN ,FreeBSD ,Güvenlik duvarı ,Kernel programming ,Katman 7 filtreleme ,Layer 7 filtering ,Yazılım tanımlı ağlar ,Firewall ,Desen arama algoritmaları ,Çekirdek programlama ,Pattern searching algorithm ,Computer networks - Abstract
FreeBSD, servis sunucusu (web, http, ftp vb.), masaüstü kullanımı (X ile kde veya xfce) ve güvenlik duvarı (ipfw) olarak kullanılan bir işletim sistemidir. Freebsd işletim sistemi güvenlik duvarı olarak endüstride yaygın bir kullanıma sahiptir. pfSense ve OPNsense dağıtımları, Freebsd işletim sistemini kullanan ve endüstride birçok firma tarafından tercih edilen (Google, US Department of Homeland Security, Shopify ve NASA) açık kaynak kodlu güvenlik duvarlarıdır. Freebsd işletim sisteminde bulunan güvenlik duvarı IP ve Port adresi filtreleme işlemlerini yapabilmektedir. Ancak OSI modelinin yedinci katmanı olan uygulama katmanında filtreleme özelliğine sahip değildir. Pfsense ve Opnsense bu kısıtlamayı aşmak için snort ve suricata gibi açık kaynak kodlu yazılımları kullanmaktadır. Bu yazılımlar da işletim sistemlerinin kullanıcı uzayında (user-space) çalışabilmektedir. Bununla birlikte kullanıcı uzayında çalışan uygulamaların, çekirdek (kernel) seviyesinde çalışan uygulamalara göre daha fazla kaynak tükettiği de bilinmektedir. Bu tez çalışmasında Freebsd işletim sistemine ait güvenlik duvarı olan PF’in Pfill hook yöntemi kullanılarak uygulama katmanında filtreleme işlemi çekirdek seviyesinde gerçekleştirilmiştir. Paket içerisinde desen araması yapmak için Aho-Corasick algoritması kullanılmıştır. Önerilen teknik pfsense işletim sistemi üzerinde suricata yazılımı ile aynı kural sayısında bant genişliğinin kullanımı ve işlemci tüketimi açısından karşılaştırılmıştır. Karşılaştırma sonucunda bu tez kapsamında geliştirilen uygulamanın aynı kural sayısında yaklaşık 2 kat daha fazla bant genişliğinde filtreleme yapabildiği ve aynı kural sayısı ile aynı bant genişliğinde yaklaşık %20 daha az işlemci gücü tükettiği tespit edilmiştir. Ayrıca önerilen teknik son zamanlarda bilgisayar ağ dünyasında yaygın bir kabul gören yazılım tanımlı ağ (YTA) mimarisine uygulanmış ve literatürde YTA mimarisinin uygulandığı çalışmalarla karşılaştırılmıştır. Literatürdeki diğer çalışmalardan uygulama kolaylığı ve kaynak kullanımı açısından daha iyi olduğu ortaya konmuştur. FreeBSD is an operating system used as a service server (web, http, ftp etc.), desktop use (kde or xfce with X) and firewall (ipfw). Freebsd is widely used in the industry as an operating system firewall. pfSense and OPNsense distributions are open source firewalls that use the Freebsd operating system and are preferred by many companies in the industry (Google, US Department of Homeland Security, Shopify and NASA). The firewall in the Freebsd operating system can perform IP and Port address filtering. However, it does not have filtering in the application layer, which is the seventh layer of the OSI model. Pfsense and Opnsense use open source software such as snort and suricata to overcome this limitation. These software can also work in the user-space of operating systems. However, it is also known that applications running in user space consume more resources than applications running at kernel level. In this thesis, the filtering process in the application layer is carried out at the kernel level by using the Pfill hook method of PF, which is the firewall of the Freebsd operating system. Aho-Corasick algorithm was used to search for patterns in the package. The proposed technique was compared with the suricata software on the pfsense operating system in terms of bandwidth usage and processor consumption in the same rule number. As a result of the comparison, it has been determined that the application developed within the scope of this thesis can filter approximately 2 times more bandwidth in the same number of rules and consumes approximately 20% less processing power in the same bandwidth with the same number of rules. In addition, the proposed technique has been applied to the software-defined network (YTA) architecture, which has been widely accepted in the computer networking world, and has been compared with the studies in the literature where YTA architecture has been applied. It has been shown to be better than other studies in the literature in terms of ease of application and resource use. BG-Tek Bilgi Güvenliği Teknolojileri
- Published
- 2023
9. 34 konuda yeni başlayanlar için bilgisayar
- Author
-
Pala, Zeydin, Hiperlink (Firm), Pala, Zeydin, and Hiperlink (Firm)
- Subjects
- Computer architecture, Internet, Computer networks, Isletim sistemleri (Bilgisayarlar), Computers, Bilgisayar yapisi, Operating systems (Computers), Bilgisayarlar, Bilgisayar aglari
- Published
- 2008
10. BİLGİSAYAR AĞLARI DERSİNİN WEB TABANLI ÖĞRETİMİ
- Author
-
Hakan Kaptan and Yılmaz Çamurcu
- Subjects
computer networks ,e-learning ,web based education ,simulation ,animation ,bilgisayar ağları ,e-öğrenme ,web tabanlı eğitim ,simülasyon ,animasyon ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
Internet ve bilgisayar alanlarındaki gelişmelerin sonucu olarak web tabanlı eğitim de üzerinde en çok çalışılan ve araştırma yapılan alanlardan biri olmuştur. Bu çalışmada, Teknik Eğitim Fakülteleri'nde okutulan Bilgisayar Ağları dersine ilişkin çoklu ortam, animasyon ve simülasyonlarla zenginleştirilmiş olan web tabanlı eğitim dokümanları açıklanmaktadır. Bu dokümanlardaki ders içeriği oluşturulurken üniversitelerde okutulan kitaplardan web ortamındaki eğitim dokümanlarından ve üretici firmaların teknoloji sayfalarından yararlanılmıştır. Ders materyali yazı, resim ve şekillerden oluşturulmuş; öğrencilerin derse olan ilgisini arttırmak ve öğrenmesini kolaylaştırmak için bazı konularda animasyonlarla anlatım yapılmıştır. Ayrıca yönlendirme algoritmaları ve tıkanıklık kontrol algoritmalarının çalışma ilkelerinin daha kolay şekilde anlaşılmasına yardımcı olmak amacıyla, öğrencilerin bu konuları etkileşimli olarak öğrenmesini sağlayacak simülatörler tasarlanmıştır.
- Published
- 2004
11. Siberpsikoloji çağında mutluluk belleği : deneyimlenen mutluluğun sosyal medyada dönüşümü
- Author
-
Saltik, Rabiya, Barlas Bozkuş, Şeyda, Marmara Üniversitesi, Sosyal Bilimler Enstitüsü, Radyo Televizyon ve Sinema Anabilim Dalı, and Radyo Televizyon Bilim Dalı
- Subjects
Cyberspace ,Social media ,Bilgisayar ağları ,Sosyal medya ,Psikoloji ,Siber-uzay ,Bilgisayar bilimi ,Psychology ,Computer science ,Computer networks - Abstract
Fotoğraf mutlu bir deneyimin somut belgesi, anda bulunmanın garantisidir. Bu anlamı var olduğu ilk günden itibaren onu bellekle ilişkili hale getirmiştir. Önemli deneyimlerin, anıların, otobiyografik yaşantının kesitlerini sunan fotoğraf dijital teknolojilerin hâkim olduğu çağdaş dünyada sosyal medyanın da etkisiyle daha etkin biçimde kullanılmaya başlamıştır. Bir zamanlar mutlu anların belgesi olarak saklanan fotoğraf sosyal medyada paylaşılan bir profil nesnesine dönüşmüş ve görüntülerin hâkim olduğu imgeler dünyasını beslemeye başlamıştır. Dijital çağda fotoğrafın bellekle ilişkisi tartışmalı hale gelirken sosyal medya paylaşılan fotoğraflar aracılığıyla yeni hatıra evreni olmaya başlamıştır.Mutluluk ve bellek tabanlı bir medya psikolojisi araştırması sunan bu tez çalışmasında, 21.yüzyılda profesyonel teknikler kullanılarak gerçek mekanlarda gerçekleştirilen dış çekim düğün fotoğrafçılığının özneler bazındaki deneyimi ve bu deneyimin sosyal medyadaki dönüşümü problem edinilmiştir. Bir zamanlar stüdyoda birkaç kare çekilerek aile belleğinin olumlu imgesini inşa eden, yatak odalarında ve mukavva albümlerde muhafaza edilen düğün fotoğrafları çağdaş dünyada gerçek mekanlarda estetik kaygılar gözetilerek gerçekleştirilen postmodern bir özne deneyimine dönüşmüş ve bu deneyimin estetik kareleri sosyal medyada paylaşılmaya başlamıştır.Deneyimlenen mutluluğun sosyal medyada dönüşümünün ve inşa edilen mutluluk belleğinin düğün fotoğrafçılığı üzerinden ele alındığı bu tez araştırmasında nitel araştırma deseni benimsenerek katılımcı etnografi ve çevrimiçi etnografi yöntemleriyle veriler toplanmıştır. Profesyonel düğün çekimi görüşmeleri, düğün fotoğrafçısı görüşmeleri ve çevrimiçi paylaşım görüşmeleri olmak üzere üç farklı kategoride görüşmeler yapılmıştır. Üç kategoride kırk üç örneklemden toplanan veriler içerik analizi yöntemi ile analiz edilerek kategori ve temalar ortaya çıkarılmıştır. Elde edilen veriler sosyal medya çağında fotoğraf ve mutluluk belleği ekseninde sonuç bölümünde tartışılmıştır. Photography is the tangible document of a happy experience, a guarantee of being present. This meaning has made it associated with memory, since the first day of its existence. Photography, which presents cross-sections of important experiences, memories and autobiographical life, has begun to be used more effectively in the contemporary world dominated by digital technologies, also with the influence of social media. The photograph, which was once kept as a document of happy moments, has turned into a profile object shared on social media and has begun to feed the world of images dominated by images. While the relationship between photography and memory has become controversial in the digital age, social media has become a new memory universe through shared photos.In this thesis study, which presents a media psychology research based on happiness and memory, the subject-based experience of outdoor wedding photography carried out in real places using professional techniques in the 21st century, and the transformation of this experience in social media is taken as a problem. Wedding photos, which once took a few frames in the studio and built the positive image of the family memory, and were kept in bedrooms and cardboard albums, have turned into a postmodern subject experience that is realized in real places in the contemporary world. Considering aesthetic concerns, the aesthetic frames of this experience have begun to be shared on social media.In this thesis, the transformation of experienced happiness in social media and the memory of happiness built are discussed through wedding photography. Data were collected by adopting a qualitative research design and using participatory ethnography and online ethnography methods. Interviews were conducted in three categories: professional wedding shoot interviews, wedding photographer interviews and online sharing interviews. The data collected from forty-three samples in three categories were analyzed by the content analysis method, and categories and themes were revealed.The data obtained are discussed in the conclusion section on the axis of photography and memory of happiness in the age of social media.
- Published
- 2021
12. Derin öğrenme tabanlı oltalama saldırıları tespit sistemi
- Author
-
Gül, Ferdi, Demir, Önder, Marmara Üniversitesi, Fen Bilimleri Enstitüsü, and Siber Güvenlik Anabilim Dalı
- Subjects
Cyberspace ,Bilgisayar ağları ,Bilgi koruma ,Güvenlik önlemleri ,Security measures ,Siberuzay ,Bilişim teknolojisi ,Information technology ,Computer networks ,Data protection - Abstract
ÖZETDERİN ÖĞRENME TABANLI OLTALAMA SALDIRILARININ TESPİT SİSTEMİ GELİŞTİRİLMESİGünümüzde artık gerek kamu kurumları gerekse özel sektörü içinde barındıran başta banka, telekom, savunma sanayi ve diğer kurumlara yönelik her geçen gün siber saldırılar artmaktadır. Mavi takım tarafında gelişen teknolojilere rağmen saldırganlarda kendini geliştirmekte ve gelişen teknolojilerinde yardımıyla siber saldırı vektörleri çeşitlenmektedir. Yapılan araştırmalarda siber saldırılarının başarılı olmasının en büyük sebebinin insan faktörü olduğu gözlemlenmiştir. Siber savunmaya harcanan yatırımlar kimi kurumlarda milyonları bulsa da bu sistemlerin yönetimi de insanlara bağlıdır ve bu kurumlarda çalışanın insan kimliği olduğu göz ardı edilmemelidir. İnsan faktörünün siber uzayda yaratmış olduğu zafiyetlerden yararlanarak kurum veya kişi özelinde gizlilik, bütünlük, erişilebilirlik gibi bilgi güvenliği temel ilkelerin ihlal etmeye yönelik siber saldırılar her geçen gün artmakta ve kendini geliştirmektedir. Oltalama Saldırıları (OS) temelde sahte sitelerin, hedefteki kurum veya kişiye yönelik aldatma ilkesine dayandığı bilinmektedir. Birçok siber güvenlik ürünleri kendini geliştirirken insan faktörünü göz ardı etmesi kaçınılamaz bir durumdur. Sistemlerde tespit edilen saldırılar genelde daha önce karşılaşılan saldırı vektörlerinden yola çıkılarak oluşturulmaktadır ancak sıfırıncı gün zafiyetleri gibi durumlarda önceden öğretilmiş veriler ışığında benzerlik gösteren yeni bir varyant ile karşılaşıldığında artık sistemin kendisini savunması beklenmektedir. Son zamanlarda bu alanda ürünlerde daha yeni kendini göstermeye başlamıştır. SANS Enstitüsü’nün 2020 yılında yayımladığı oltalama saldırıları raporunda, kurumsal ağlara yönelik yapılan saldırıların %95’i başarılı olduğu belirtilmiştir [1]. Oltalama mesajların %30’u hedef kullanıcılar tarafından açılmakta ve bu kullanıcıların %12’side bu zararlı ek veya linklere tıklamaktadır.2019 yılı ile birlikte tüm dünyayı etkisi altına alan Covid-19 salgınında oltalama saldırıları daha da arttığı önde gelen siber güvenlik kurumların raporlarında da belirtilmiştir. 2020 raporunda bu süreçte %220 oltalama e-posta saldırıların sayısı arttığı gözlemlenmiştir. Google’ın 2021 Ocak ayında kayıt edilen oltalama sitelerinin sayısının geçen yılın aynı ayına göre %27 artış gösterdiği gözlemlenmiştir. Ocak 2021’de 2.145.013 olarak kayıt edilen oltalama sitelerinin sayısı bir yıl önce ise 1.690.000 olarak kayıtlara geçmiştinr [2]. Oltalama saldırıları her geçen gün artmaktadır. APWG(Anti-Phishing Working Group)’in en güncel 2020 son çeyrek trend raporuna göre oltalama saldırıları 200.000 sınırını aşarak 2016 yılının dördüncü çeyreğinden beri en yüksek seviyeye ulaşmıştır [3].Bu çalışmada Oltalama Saldırılarına özgü öznitelik çıkarımı yapılarak siber saldırı uzayında önemli bir yer edinen konu, derin öğrenme tabanlı sistem ile ele alınmıştır. Bu sistemin çalışması için öznitelik çıkarımı yapılmıştır. Bu öznitelikler derin öğrenme sistemine aktarılan URL’lerin çıktı olarak zararlı ya da zararlı olmadığını belirten bir sistem oluşturulmuştur. Bu çıktı sonuçları, URL kontrol modülü ile birden fazla güvenilir repütasyon sağlayıcı sitesinde karşılaştırılması yapılmıştır. Rastgele Orman, LSTM, Naive Bayes sınıflandırıcı algoritmaları kullanılarak başarım oranları karşılaştırılmıştır. DEEP LEARNING BASED DEVELOPMENT OF PISHING ATTACK DETECTIONNowadays, cyber attacks are increasing day by day against banks, telecom, defense industry and other institutions that include both public institutions and private sector. Attackers are developing themselves and cyber attack vectors are diversifying with developing technologies despite the developing technologies on the blue team side. The biggest reason for the success of cyber attacks is the human factor based on researches. Even if the investments spent on cyber defense reach millions in institutions, the management of these systems depends on people and it should not be ignored that the human identity of the employee in these institutions. Along with the vulnerabilities created by the human factor in cyberspace, cyber attacks aimed at violating the basic principles of information security such as confidentiality, integrity and accessibility are increasing and improving day by day in the institution or individual. It is known that Phishing Attacks (OS) are basically based on the principle of deception of fake sites, target institution or person. Although many cyber security products have developed themselves, it is inevitable situation that they ignore the human factor. In general, the attacks detected in the systems are created based on the attack vectors encountered before, but in cases such as zero-day vulnerabilities, the system is now expected to defend itself when a new variant that is similar in the light of the previously taught data is encountered. Recently, it has just started to show itself in products in this area. Recently, products in this field have started to show themselves. In the phishing attacks report published by the SANS Institute in 2020, the 95% of attacks on corporate networks were successful [1]. 30% of phishing messages are opened by target users and 12% of these users click on these harmful attachments or links. It is stated in the reports of leading cyber security institutions that phishing attacks increased even more with the Covid-19 epidemic that affected the whole world in 2019. In this process, it has been observed that the number of phishing e-mail attacks increased by 220% in 2020. It has been observed that the number of phishing sites registered by Google in January 2021 increased by 27% compared to the same month of the previous year. The number of phishing sites registered as 2,145,013 in January 2021 was recorded as 1,690,000 a year ago [2]. Phishing attacks are increasing day by day. According to APWG (Anti-Phishing Working Group)'s latest 2020 latest quarter trend report, phishing attacks exceeded the 200,000 mark and reached the highest level since the fourth quarter of 2016 [3]. In this study, feature extraction specific to Phishing Attacks is made and handled with a deep learning-based system. Feature extraction has been done for the operation of this system. A system has been created that indicates that the URLs transferred to the deep learning system with these attributes are not harmful or harmful as output. These output results were compared with the URL control module on multiple trusted reputation provider sites. Performance rates were compared using Random Forest, LSTM, Naive Bayes classifier algorithms.
- Published
- 2021
13. Eğitim Yöneticileri Bakış Açısıyla 12 Yıllık Kesinti-li Zorunlu Eğitim Sistemi: Iğdır Örneği.
- Author
-
ÖRS, ÇETİN, ERDOĞAN, HALİS, and KİPİCİ, KEMAL
- Subjects
- *
COMPULSORY education , *EDUCATION , *HIGH schools , *SECONDARY schools , *COMPUTER networks - Abstract
In this study, the intermittent compulsory education system for 12 years, was evaluated by the view of administrators. In this research; that 132 administrators, who serve in separate primary, secondary and high schools in Iğdır province at 2012-2013 academic year ;participated in; the questionnaire and structured interview method were used as data collect means with qualitative and quantitative research methods. The study was evaluated under 5 main headings, in the light of "the function of school", "the teacher", "the student and curator relationships", "the administrator" and "the problems of administration", various problems were observed in practice phase of 4+4+4 intermittent compulsory system for 12 years and the solutions were suggested to these problems. [ABSTRACT FROM AUTHOR]
- Published
- 2014
14. Çiğ Süt Kalite Değerlendirmesinde Bulanık Mantık Yaklaşımı.
- Author
-
AKILLI, Aslı, ATIL, Hülya, and KESENKAŞ, Harun
- Subjects
- *
FUZZY logic , *COMPUTER networks , *FUZZY systems , *DECISION making , *NUMERICAL analysis - Abstract
The problems that faced with in real life and perspective of the events change with developing structure of society. The people in the face of problem use a variety of methods with their verbal and numerical data to find solution. Mathematical methods that including precision are sufficient in the analyses of numerical data while the modeling of verbal data may be insufficient in case of uncertainty. In recent years, fuzzy logic is one of the artificial intelligence methods that used in solution of the problems which are rosed from quality evaluation situations that consists of uncertainty cases. The fuzzy logic theory that has more flexible structure than the theory of classical logic, describe the events with degree of accuracy which is between *0* and *1* appointed to object. Fuzzy logic-based decision support system offers to people a more realistic and objective perspective in decision making. In this study, fuzzy logic base decision support system which aims to classify raw milk samples in quality has been developed. System inputs are; bacteria count for milk samples, somatic cell count and values for measured protein amounts. Designed fuzzy logic output is consist of raw milk quality value measurement; in order to calculate the success of the analysis, results have been compared to specialist's decisions and due to the comparison, it noticed that the system has 80% success rate. Modeling of the system has been made via Matlab (version R2010b) programme. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
15. TÜRKİYE VE İNGİLTERE KALKINMA AJANSLARI: İNGİLTERE DENEYİMİNDEN ALINABİLECEK DERSLER.
- Author
-
DEMİROĞLU, Mahsut and TOPAL DEMİROĞLU, Elif
- Subjects
- *
COMPUTER networks , *TACKLING (Football) , *PIGEON pea - Abstract
Regional Development Agencies (RDAs), embarking on significant roles in the development of both undeveloped regions and developed economies of the world, especially in many European countries, have come to agenda with intense discussions in Turkey. Although forms and directions of these discussions have changed following of RDAs going into action, concerns about their vision and future roles are still up to date. In this study, place and importance of Turkey's RDAs, of which legal basis was formed in 2006 and establishment was completed all over the country in 2010, will be handled by presenting experience of regional development agencies of England. As England model has been generally tackled in the formation process of RDAs in Turkey, discussions have remained mostly theoretical in similarly entitled studies in the literature. There have also existed concrete practices in Turkey with the agencies' coming into operation. This paper aims to add the experience of these practices to the previously conducted theoretical studies in the same title and make contribution to studies to be carried out in this area. [ABSTRACT FROM AUTHOR]
- Published
- 2014
16. Kablosuz vücut alan ağları için yazılım tanımlı ağ destekli yeni bir protokol mimarisi
- Author
-
Cicioğlu, Murtaza, Çalhan, Ali, Elektrik-Elektronik ve Bilgisayar Mühendisliği Anabilim Dalı, and Cicioğlu, Murtaza
- Subjects
Bilgisayar ağları ,Computer network protocols ,Bilgisayar ağ protokolleri ,Computer Engineering and Computer Science and Control ,Computer networks ,Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrol - Abstract
YÖK Tez No: 611442 Kablosuz vücut alan ağları (KVAA), insan sağlığı verilerinin izlenmesini sağlayan en umut verici iletişim teknolojilerinden biridir. KVAA mimarisinin heterojen ve karmaşık ağ yapısı, üretici firma bağımlılığı, hareketlilik durumları, sınırlı enerji kaynakları, trafik önceliklendirme yönetimi, kurulum/yeniden yapılandırma gibi kontrol ve yönetim süreçleri halen çözüm bekleyen bazı sorunlar arasında yerini almaktadır. Bu sorunlarla başa çıkabilmek için ağ iletişiminde yeni bir tasarım ve yönetim anlayışını tanımlayan Yazılım Tanımlı Ağ (YTA) yaklaşımı son zamanlarda hem akademi hem de endüstri dünyası tarafından oldukça ilgiyle karşılanmıştır. Bu tez çalışmasında, uygulama gereksinimleri CSMA-CA temelli IEEE 802.15.6 standardına göre tanımlanmış KVAA mimarisinin esnek, programlanabilir, enerji duyarlı ve yönetilebilir dinamik bir ağ yapısına kavuşabilmesi için Yazılım Tanımlı Kablosuz Vücut Alan Ağ (YT-KVAA) yaklaşımı önerilmiştir. YT-KVAA mimarisi için HUBsFlow ağ ara yüz protokolü, SDNRouting ile ESR-W enerji duyarlı yönlendirme algoritmaları, bulanık mantık tabanlı ağ geçidi seçim algoritması ve özgül emilim oranına (SAR) dayalı dinamik koordinatör düğüm seçim algoritması geliştirilmiştir. Ağın genel görünümüne sahip, kapsama alanındaki tüm HUB düğümlerini yönetebilen, ağla ilgili kontrol ve yönetim işlemlerini devralmış bir denetleyici tasarlanmıştır. HUBsFlow ağ ara yüz protokolü, kontrol katmanı elemanı olan denetleyicinin veri katmanı elemanları olan HUB düğümleri ile iletişim kurma biçimini standartlaştırmak için önerilmiştir. YT-KVAA mimarisinin tüm bileşenleri, protokolleri ve algoritmaları Riverbed Modeler benzetim yazılımı kullanılarak geliştirilmiştir. Çeşitli senaryolar ile yapılan performans değerlendirmesinde iş çıkarımı, uçtan uca gecikme, paket kayıp oranı, bit hata oranı, başarılı iletim oranı ve enerji tüketim değerleri gibi ağ başarım parametreleri incelenmiştir. Elde edilen sonuçlara göre, IEEE/ISO 11073 kişisel sağlık veri standardının tanımladığı servis kalite gereksinimleri temel alındığında, YT-KVAA yaklaşımı geleneksel KVAA mimarisine göre daha uygun sonuçlar verdiği saptanmıştır. Wireless Body Area Networks (WBANs) are one of the most promising communication technologies for monitoring human health data. Some pending issues in WBAN e.g., it's heterogeneous and complex architecture, vendor dependency, mobility, limited energy resources, traffic prioritization management, control and management processes such as installation/reconfiguration are still among the problems waiting for solutions. In order to cope with these problems, the Software-Defined Networking (SDN) paradigm, which defines a new paradigm of design and management in network communication, has recently been received with great interest by both academia and industry. In this thesis, Software-Defined Wireless Body Area Network (SD-WBAN) approach has been proposed in order to achieve a flexible, programmable, energy sensitive and manageable dynamic network structure of WBAN architecture whose application requirements are defined according to CSMA-CA based IEEE 802.15.6 standard. For SD-WBAN architecture, HUBsFlow network interface protocol, SDNRouting and ESR-W energy sensitive routing algorithms, Fuzzy Logic based gateway selection algorithm and dynamic coordinator node selection algorithm based on specific absorption rate (SAR) have been developed. A controller has been designed with an overview of the network, capable of managing all HUB nodes in range, and taking over network-related control and management operations. The HUBsFlow network interface protocol has been proposed to standardize the communication between the controller as a control layer element and HUB nodes as data layer elements. All components, protocols, and algorithms of SD-WBAN architecture were developed using Riverbed Modeler simulation software. Network performance parameters such as throughput, end-to-end delay, packet loss rate, bit error rate, successful transmission rate, and energy consumption values were examined with various scenarios. According to the results obtained, based on the quality of service requirements defined by IEEE/ISO 11073 personal health data standard, SD-WBAN approach is found to be more suitable than traditional WBAN architecture.
- Published
- 2020
17. Türkiye'de Basın Gözüyle 'Acil Servis': Ulusal Gazetelerdeki Acil Servis Haberlerinin İçerik Analizi.
- Author
-
ACAR, Yahya Ayhan, ÇEVİK, Erdem, UYGUNER, Cem, and ÇINAR, Orhan
- Subjects
- *
EMERGENCY medical services , *MEDICAL care , *LIKERT scale , *MILITARY airplanes , *COMPUTER networks - Abstract
Objectives The aim of this study was to analyze the news content regarding emergency health services in Turkish newspapers. Methods News reporting on emergency health services from January 1, 2010 to December 31, 2012 from the five highest circulating online newspapers were analyzed. News that qualified for analysis had at least one word indicating emergency health services in the title or at least one paragraph reporting on emergency health services in the report. Four researchers graded the newspaper reports in a blinded fashion according to the 5-point Likert scale for content and tone. Then based on the scores, the news articles were categorized as either conveying positive (1-2 points), neutral (3 points), or negative (4-5 points) perspectives on emergency health care. Results In all, a total of 604 articles regarding emergency health services were analyzed. In regards to content it was found that 27% of the news reports described emergency health services positively, 12% portrayed emergency health in a neutral fashion, and 61% of the articles depicted emergency health services negatively. As for the tone of the articles, it was found that 63% of the reports took a neutral stance on emergency health services, 23% had a negative tone, and 14% had a positive tone. Most often, the news articles reported on patient transport to the emergency department while violence toward health workers was the second most commonly reported. Conclusions Emergency health services in Turkey are largely portrayed negatively in newspaper reports in both tone and content and mostly concern patient transport and violence toward healthcare providers. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
18. Acil Servise Ambulans İle Müracaat Eden Geriatrik Olguların Analizi.
- Author
-
KALDIRIM, Ümit, TUNCER, Salim Kemal, ARDIÇ, Şükrü, TEZEL, Onur, EYİ, Yusuf Emrah, ARZIMAN, İbrahim, DURUSU, Murat, YILDIRIM, Ali Osman, and EROĞLU, Murat
- Subjects
- *
EMERGENCY medical services , *GRAPHIC methods , *ORGANIZATIONAL structure , *HOSPITAL care , *COMPUTER networks - Abstract
Objectives The volume of elderly patients presenting to emergency departments (ED) has been increasing. Many times elderly patients are conveyed to the ED via the ambulance. In this study, we aimed to analyze how many elderly patients presented to the ED via the ambulance. Methods In this descriptive and retrospective study, collected data of elderly patients presenting to emergency department encompasses patient report forms of ambulance, charts, data belongs to patient in the hospital data system. These data were compared to data of elderly patients admitted by themselves including length of stay, discharge status and rate of hospitalization. Results Over a one-year period 93,609 patients were admitted to the emergency department and 19.02% of them were considered elderly or over the age of 66.0 years. Out of the elderly patients that presented to the ED, 5.58% of were transported by ambulance. For all ambulance runs made to the ED, 37.45% of them conveyed elderly patients, and 27.26% of these patients were hospitalized. Length of hospital stay was significantly longer for elderly patients that were transported via the ambulance versus elderly patients that transported themselves to the ED (p⩽0.001). Conclusions Shortness of breath was the most common complaint observed for all elderly patients that presented to the ED. The duration of ED length of stay for elderly patients transported by the ambulance was shorter than that of their counterparts that were not taken by ambulance. However, the length of hospital stay for elderly patients that were conveyed to the ED by ambulance was longer than that for elderly patients that transported themselves to the hospital. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
19. MADRA DAĞI VE ÇEVRESİNİN ARAZİ ÖRTÜSÜ/ KULLANIMINDAKİ ZAMANSAL DEĞİŞİMİN UZAKTAN ALGILAMA YÖNTEMİ İLE DEĞERLENDİRİLMESİ.
- Author
-
UZUN, Alper and SOMUNCU, Mehmet
- Subjects
- *
REMOTE sensing , *MOUNTAINS , *AEROSPACE telemetry , *AERIAL photogrammetry , *LAND cover , *LAND use , *COMPUTER networks - Abstract
Problem Statement: The changes in the land cover can occur both in the natural process and significantly through the needs of human beings. Human beings cause permanent changes in the land cover because of their different needs. Mountain areas, although not as much affected as other geomorphologic units, are important units which are affected by land use. City settlements in Turkey are generally in plain and lowland areas. Contrary to this, mountain areas host more rural areas. Mountain landscapes are areas which are used for agriculture and lumbering activities by people. These kind of activities related with land use cause some environmental problems (erosion, reduction in biodiversity and fresh water resources) on different levels. In this respect, it is important to identify and evaluate the change in the land cover use in time and provide solutions. Purpose of the Study: The main purpose of this study is to identify and evaluate the change in the land cover of Madra Mountain and its environment in time by using satellite images of different dates. In this work, in which the change in the land cover is identified by maps, the type, direction and amount of the change are explained with its causes by maps. Methodology: To determine the change in the land cover between 1987 and 2000 , the images of Landsat TM and Landsat ETM satellites are used; dated 05.05.1987 and 07.06.2000 respectively. The Landsat images of different times are classified by using controlled and uncontrolled classifying techniques and the change in land cover / use have been identified. Also topography maps, which are scaled as 1/25000 covering 24 sections on Madra Mountain and its environment, are among the main data used in this study. Results and Conclusions: The changes in the land cover and its use in Madra Mountain and its environment between 1987 and 2000 have been identified by using satellite images. As a result of the findings, change has been identified in an area covering 35% of the research area. The hypothesis about the reduction in the forest area of Madra Mountain and its environment because of the devastation of forests; and the expansion of settlement, agriculture, olive and fruit areas, has been proved. [ABSTRACT FROM AUTHOR]
- Published
- 2013
20. BAĞIL GÜVEN ELİPSLERİ YÖNTEMİYLE DEFORMASYON ANALİZİ: ERMENEK BARAJI ÖRNEĞİ.
- Author
-
İNAL, Cevat and BÜLBÜL, Sercan
- Subjects
ELLIPSES (Geometry) ,GEODESY ,MATHEMATICAL geography ,COMPUTER networks ,DAM design & construction - Abstract
Copyright of Selcuk University Journal of Engineering, Science & Technology / Selçuk Üniversitesi Mühendislik, Bilim ve Teknoloji Dergisi is the property of Selcuk University, Engineering & Architecture Faculty and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2013
21. ENTEGRE SINIR YÖNETİMİNDE PİLOT UYGULAMALAR: RİSK ANALİZİ VE PİLOT BÖLGELERİN KATEGORİZASYONU.
- Author
-
KARA, Mehmet
- Subjects
BORDER security ,COMPUTER networks ,GEOGRAPHY ,LEGISLATION ,SURVEILLANCE detection - Abstract
Copyright of Turkish Journal of Police Studies / Polis Bilimleri Dergisi is the property of Turkish National Police Academy and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2013
22. Türkçede renk adlarıyla özel ad yapımı.
- Author
-
Bayr, Nesrin
- Subjects
LANGUAGE & education ,COMPUTER networks ,ELECTRONIC systems ,LANGUAGE & languages - Abstract
Copyright of Journal of Language & Linguistics Studies is the property of Journal of Language & Linguistics Studies and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2013
23. Yeni Kurulan Üniversitelerin Sorunları ve Çözüm Önerileri.
- Author
-
DOĞAN, Didem
- Subjects
UNIVERSITIES & colleges ,COMPUTER networks ,ORGANIZATIONAL structure ,ORGANIZATION charts ,COLLEGE teachers ,OFFICE management - Abstract
Copyright of Journal of Higher Education & Science / Yüksekögretim ve Bilim Dergisi is the property of Zonguldak Bulent Ecevit Universitesi and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2013
- Full Text
- View/download PDF
24. Üniversite Özerkliği: Mali, Akademik ve Yönetsel Açıdan Yaklaşım.
- Author
-
ERDEM, Ali Rıza
- Subjects
INSTITUTIONAL autonomy ,UNIVERSITY faculty ,COMPUTER networks ,TUITION tax credits ,EDUCATION research ,POSTSECONDARY education - Abstract
Copyright of Journal of Higher Education & Science / Yüksekögretim ve Bilim Dergisi is the property of Zonguldak Bulent Ecevit Universitesi and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2013
- Full Text
- View/download PDF
25. ANLATI TARİH ÜZERİNE TARTIŞMALAR VE YENİ YAKLAŞMLAR.
- Author
-
GÜL, Serkan
- Subjects
- *
HISTORIANS , *COMPUTER networks , *LANGUAGE & languages , *THEORY - Abstract
This article, first of all, aims to explain discussions in the academic world concerning narrative history in terms of style, language, content and theory. Thus, it would be possible to demonstrate weaknesses and strengths of narrative history writing an old and oftenused way of writing history in comparison with some other historical approaches. Secondly, new approaches to narrative history called by some historians as 'new narrative' will be discussed. As a result of all these discussions and evaluations it is aimed at contributing a better understanding of narrative history, which is widely used in Turkish history writing but little known in terms of theory and methodology. [ABSTRACT FROM AUTHOR]
- Published
- 2013
26. TDMA TABANLI KABLOSUZ ALGILAYICI AĞ ORTAM ERĠġĠM KONTROL PROTOKOLLERĠ ĠÇĠN GENEL ANALĠTĠK VE BENZETĠM MODELLERĠ.
- Author
-
KARAHAN, Alper, ERTÜRK, İsmail, ATMACA, Sedat, and ÇAKICI, Süleyman
- Subjects
- *
WIRELESS sensor networks , *DEPLOYMENT (Military strategy) , *COMPUTER simulation , *COMPUTER networks , *APPLICATION software - Abstract
The vast variety of Wireless Sensor Network (WSN) applications makes it necessary that they should be easily tested and validated before deployment. In this work, it is aimed at obtaining the basic criteria that are used to evaluate the performance of the WSNs using both the analytical modeling and the computer modeling & simulation as well as validating the results. Computer network modeling techniques have some advantages and disadvantages over each other according to their usage in different type of applications. Each method provides only basic estimations related to the system performance when used alone, however the reliability of the results can only be guaranteed by using more than one of these methods together. The use of analytical modeling and simulation techniques together is the most effective way to evaluate the performance of computer networks. Matching up the results from two different models provides a remarkable validation way and points out whether the system runs stable or not in reality. [ABSTRACT FROM AUTHOR]
- Published
- 2013
27. ÇALIŞANLARIN CİNSİYETİNE GÖRE ÖRGÜTSEL STRESTEN ETKİLENME DÜZEYLERİ: TBMM BASIN VE HALKLA İLİŞKİLER MÜDÜRLÜĞÜ ÇALIŞANLARI ÜZERİNDE BİR ARAŞTIRMA
- Author
-
ÖZEN, Hasan Özgür
- Subjects
JOB stress ,LABOR productivity ,INDUSTRIAL publicity ,COMPUTER networks ,EMPLOYEE participation in management ,QUALITY of work life - Abstract
Copyright of Uludağ Journal of Economy & Society / Uludağ Üniversitesi İktisadi ve İdari Bilimler Fakültesi Dergisi is the property of Uludag Journal of Economy & Society and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2013
28. SOĞUK SAVAŞ'IN BARIŞÇIL OLARAK SONA ERMESİ VE ULUSLARARASI İLİŞKİLER TEORİLERİ.
- Author
-
Kolasi, Klevis
- Subjects
INTERNATIONAL relations ,ECONOMIC summit conferences ,INTERNATIONAL alliances ,POLITICAL doctrines ,COMPUTER networks ,INTERNATIONAL organization - Abstract
Copyright of Ankara University SBF Journal / Ankara Üniversitesi SBF Dergisi is the property of Ankara University SBF Journal and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2013
- Full Text
- View/download PDF
29. KABLOSUZ ÖRGÜ AĞLAR İÇİN ÖLÇEKLENEBİLİR YÖNLENDİRME PROTOKOLÜ.
- Author
-
KOCAOĞLU, Ramazan and AKCAYOL, M. Ali
- Subjects
- *
NETWORK routing protocols , *WIRELESS communications , *MESH networks , *COMPUTER networks , *SCALABILITY , *DATA packeting , *HEURISTIC programming , *SIMULATION methods & models , *MULTIPATH channels - Abstract
In this study, routing protocols for wireless mesh networks have been investigated in terms of scalability and a scalability routing protocol has been developed for wireless mesh networks. Developed protocol, Ad-hoc on Demand Scalable Routing Protocol (ADSRP), has been activated whenever it needs to find a route. The protocol prevents packet loss due to scalability in network. Moreover, it needs less routing overhead than the others. It does not need unnecessary route request packets using heuristic route. The protocol enables scalability of network with low cost. ADSRP has been tested using ns-2 simulation tool and experimental results have been compared with Ad-hoc On Demand Distance Vector (AODV) and Ad-hoc On Demand Multipath Distance Vector (AOMDV) protocols extensively. Obtained results show that the developed protocol is successful for wireless mesh networks. [ABSTRACT FROM AUTHOR]
- Published
- 2012
30. Büyükşehir Belediyeleri ve Sosyal Medya Kullanımı.
- Author
-
Solmaz, Başak and Görkemli, H. Nur
- Subjects
- *
DIGITAL technology , *SOCIAL media , *INFORMATION & communication technologies , *PARALLEL computers , *MASS media , *METROPOLITAN areas , *SCALABILITY , *COMPUTER networks - Abstract
Digital revolution, which comes with rapid developments in information and communication technologies, leads to major changes in communication and information transfer in everyday life. Parallel to these developments, the role of media and communication technologies are increasing rapidly in our lives. Social media environments became very important, particularly with its impact in the mass media throughout the world. Together with marketing, advertising and public relations, social media environments also began to take place in managerial process in effective communication strategies. Social media is an area of social interaction and sharing by means of accessible and scalable communication tools. In other words, it is possible to define it as online areas where people stay in touch with each other and share their feelings, thoughts, observations, and experiences. With all their activities, it is inevitable for local governments to take place in the world of people, who see the media as a part of their life. Like large companies, municipalities should not ignore the impact of social media and try to develop social media projects. In management processes, the relationship between governed people and governing bodies gained new dimensions with new communication technologies and the facilities offered by these technologies. Municipalities the administrators should be aware about all the positive and negative views on the region, their services and activities. To prevent negative factors, provide rapid response to unfair messages, and enlighten the public, it became a necessity for municipalities to take part in social media. [ABSTRACT FROM AUTHOR]
- Published
- 2012
31. NS-2 ve NS-3 Ağ Simülatörlerinin Ölçeklenebilirlik Analizi ve Karşılaştırma.
- Author
-
ÇAVUŞOĞLU, Ünal and ZENGİN, Ahmet
- Subjects
COMPUTER networks ,SCALABILITY ,COMPUTER simulation ,COMPUTER storage devices ,COMPUTER input-output equipment ,COMPUTER software ,COMPARATIVE studies - Abstract
Copyright of International Journal of InformaticsTechnologies is the property of Institute of Informatics, Gazi University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2012
32. Farklı Akvaryum Yemlerinin Kırmızı Kıskaçlı Yengeçlerde (Perisesarma bidens) Büyüme ve Yaşama Oranı Üzerine Etkileri.
- Author
-
TÜRKMEN, Gürel and KARADAL, Onur
- Subjects
- *
AQUARIUMS , *COMPUTER networks , *CRABBING , *ANIMAL feeds , *ANIMAL young - Abstract
In recent years, interest in alternative species in aquariums has increased con-siderably. Especially, decapod species are popular group among the freshwater species. Red claw crab (Perisesarma bidens) is the most traded crab species. In this study, effects of feeds in different forms (flake, stick, granule) on growth and survival of red claw crabs were investigated. The study was carried out in nine glass aquariums with three replicates. A group of ten juveniles (average 2±0.05 g of body weight) were placed in each aquarium. The experiment groups were fed with ad libitum for 60 days. At the end of the study, the best weight gain was found on granule diet group statistically (P<0.01). There was no significant difference in survival rates among experimental groups (P>0.01). [ABSTRACT FROM AUTHOR]
- Published
- 2012
33. A Comparison of Preschool Teacher Training Programs in the UK, Germany, France, Italy, Russia and Turkey.
- Author
-
KÜÇÜKOĞLU, Adnan and KIZILTAŞ, Emine
- Subjects
OCCUPATIONAL training ,COMPUTER networks ,EDUCATION ,EDUCATION libraries - Abstract
Copyright of Ilkogretim Online is the property of Ilkogretim Online and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2012
34. Views of Prospective Classroom Teachers Regarding Creating Instructional Environment Based on Cognitive Coaching and Cognitive Flexibility.
- Author
-
Kılıç, Figen and Demir, Özden
- Subjects
COLLEGE teachers ,ECOLOGY education ,TEACHERS ,COMPUTER networks ,LEARNING - Abstract
Copyright of Ilkogretim Online is the property of Ilkogretim Online and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2012
35. Görme Engelli Öğrencilerin Okuma Etkinliğinde Dikkatini Sürdürme Becerileri Üzerine Kendini İzleme Tekniğinin Etkililiği.
- Author
-
Sosun, Tülay Haytabay and Özdemir, Selda
- Subjects
SELF-monitoring (Psychology) ,PEOPLE with visual disabilities ,PRIMARY education ,BLIND children ,COMPUTER networks ,EDUCATION - Abstract
Copyright of Ozel Egitim Dergisi is the property of Ankara University, Faculty of Educational Sciences and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2012
- Full Text
- View/download PDF
36. Değişik Renkli Monofilament Galsama Ağlarının Farklı Hava Şartlarındaki Av Verimlerinin Karşılaştırılması.
- Author
-
Orsay, Bülent and Duman, Erdal
- Subjects
- *
BYCATCHES , *COMPUTER networks , *GILLS , *WEATHER , *CLOUDS - Abstract
In this study, catching efficiency of monofilament gill nets with various colours (green, blue, black and Bordeaux) at different weather conditions was examined comparatively. A total of 677 specimens belong to Capoeta capoeta, Cyprinus carpio, Barbus rajanomus mystaceus, Barbus esocunus and Barbus xanthopterus were caught with coloured gill nets. The results were showed that 193 specimens (28.50%) were caught at clear weather and 484 specimens (71.50%) were caught at cloudy weather. As a result of the present study, fishing at cloudy weather was more efficient than that at clear weather for both all coloured gill nets and each fish species. [ABSTRACT FROM AUTHOR]
- Published
- 2012
37. Ağların Hareketli Yol-Kesici Tarafından En Kısa Güzergâh Kullanılarak Kesilmesi.
- Author
-
Kabarcık, Ahmet, Kandiller, Levent, and Aygüneş, Haluk
- Subjects
AIR interdiction ,COMPUTATIONAL complexity ,ALGORITHMS ,PROBLEM solving ,COMPUTER networks ,PATHS & cycles in graph theory - Abstract
Copyright of Journal of Defense Sciences / Savunma Bilmleri Dergisi is the property of Turkish Military Academy Defense Sciences Institute and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2012
38. TÜRKİYE CUMHURİYETİ DEVLET DEMİRYOLLARI İŞLETMESİNİN PERFORMANS DEĞERLENDİRMESİ.
- Author
-
Kazancioğlu, Fikret Şinasi
- Subjects
- *
DATA envelopment analysis , *COMPUTER networks , *DECISION making , *MONETARY unions , *LINEAR programming , *EUROPEAN integration - Abstract
The European Union (EU) has a structure where its criteria and objectives are known and where member states are obligated to carry out these criteria. Turkey is continuing to carry out the requirements as a candidate to the Union through the chapters of the acquits opened by the EU. One of the chapters opened is "transport." In this context, with this work, "railway" operations, as one of the most important parameters of the Ministry of Transportation, and Turkey's situation in relation to the EU nations has been put forward by using the Data Envelopment Analysis (DEA). The DEA is conducted by selected decision making units (DMU) (in this case countries) with a relative performance analysis using a multi-parameter and non-parametric approach bearing in mind the railway indicators. In the analysis, two different models are considered in which a performance evaluation has been done in railway preference for operations as well as passenger transport. The output of this work, in terms of Turkey's railway indicators, will assist with tangible values in identifying the target policies for EU integration. [ABSTRACT FROM AUTHOR]
- Published
- 2012
39. FPGA TABANLI PROGRAMLANABİLİR GÖMÜLÜ SALDIRI TESPİT SİSTEMİNİN GERÇEKLEŞTİRİLMESİ.
- Author
-
Tuncer, Taner and Tatar, Yetkin
- Subjects
- *
FIBER Distributed Data Interface (Computer network standard) , *ETHERNET , *LOCAL area networks , *DATA transmission systems , *GATE array circuits , *COMPUTER networks - Abstract
In this paper, an embedded Intrusion Detection System (IDS) running in the real time has been implemented. The implemented system is based on System On Programmable Chip (SOPC) to classify the captured packet from the network. IEEE 802.3 standard frames have been captured with 10/100 Ethernet MAC Core programming of the processor used in the system. Each captured frame has stored to the memory of the embedded IDS for the determination of packet classes from obtained frames. The processor has been programmed to determine the packet classification and to obtain the packet summaries and the packets from frames. Artifical Neural Network (ANN) has been used in the classification process of the system. The inputs of ANN are obtained from the features of packet headers, such as port number and IP number. The implemented embedded IDS has been first trained with training data. Then, packet classification has been performed in the real time and finally time of determining packet classes have been obtained. The system has been implemented on Altera's Cyclone III EPC3C40F484C7N platform and software environments. [ABSTRACT FROM AUTHOR]
- Published
- 2012
40. KUTU VE PLAZMA PASTA BORLANMIŞ 21NiCrMo2 ÇELİĞİNİN YÜZEY KAREKTERİZASYONU.
- Author
-
Güneş, İbrahim and Taktak, Şükrü
- Subjects
- *
OPTICAL diffraction , *COMPUTER networks , *CHEMICAL reactions , *BEARINGS (Machinery) , *CHEMICAL processes , *PROPERTIES of matter - Abstract
In the present study, 21NiCrMo2 steel were plasma paste boronized by using 100 wt.% B2O3, 70 wt.% B2O3 + 30 wt. % SiC, 70 wt.% B2O3 + 30 wt.% B4C, 30 wt. % B2O3 + 70 wt.% SiC, 30 wt.% B2O3 + 70 wt.% B4C pastes. This steel ispopular bearing steel and have a widespread use in engineering applications. Plasma paste boronizing process was carried out in a dc plasma system at temperature of 700, 750 and 800 °C for 2, 5 and 7 h in a gas mixture of 70%H2 - 30%Ar under a constant pressure of 10 mbar. Pack boronizing of same steel was also carried out at 700, 750 and 800 °C for 2, 5 and 7 h. The properties of boride layer were evaluated by SEM, EDX, X-ray diffraction, Vickers micro-hardness testing. X-ray diffraction analysis of boride layers on the surface of the boronized steel revealed FeB and Fe2B. Plasma paste boronizing process showed that since the plasma activated the chemical reaction more, a thicker boride layer was formed than conventional boronizing methods at same temperatures. It was possible to form boride layer with the same thickness at lower temperatures in plasma environment by using B2O3 paste mixture. [ABSTRACT FROM AUTHOR]
- Published
- 2012
41. SİNİR HÜCRESİNİN PASİF KABLO MODELLEMESİ VE SİMÜLASYONU.
- Author
-
Coşkun, Özlem, Kahriman, Mesud, Çömlekçi, Selçuk, and Özkorucuklu, Suat
- Subjects
- *
HOUSEHOLD electronics , *COMPUTER networks , *SIMULATION methods & models , *BESSEL functions , *EQUATIONS , *CALCULUS - Abstract
Modeling and simulations developed for examining the physiological structures and dynamical behaviours of the neurons are of importance in terms of supporting the experimental studies. In this study the electrical theory of excitation propagation in excitable cell was investigated. The basic principals of linear cable theory were given and general differential equations concerning excitable cells were derived. The passive cable model simulation of neuron was made through the programme of MATLAB7.0.4/Simulink. In order to reach the realistic model, which is one of the main targets of the study, two simplified and revised models were used. A realistic wave shape was produced in MATLAB7.0.4/Simulink as the action potential wave shape spreading in neuron. They are as expected in the simplified model. When the simulation results of the two simplified and revised models compared, in the output of the revised model the minimum amplitude is seen to decrease. In the revised model, an ideal capacity element which we recommend was found. [ABSTRACT FROM AUTHOR]
- Published
- 2012
42. Sığ Sismik Yansıma, MASW ve ReMi Yöntemleri ile Sığ Yapıların İncelenmesi: Isparta Yerleşim Merkezi Kuzeyi Pliyo-Kuvaterner Çökel Yapı öÖrneği.
- Author
-
Kanbur, Mehmet Zakir, Silahtar, Ali, and Özsoy, Can
- Subjects
- *
SHEAR waves , *SEISMIC refraction method , *COMPUTER networks , *ELASTIC waves , *SEDIMENTATION & deposition - Abstract
Shear (S) wave velocities and seismic sections derived from MASW, ReMi and shallow seismic reflection techniques are compared with an existing 8 m depth cliff. The techniques were performed along with Plio-Quaternary aged unconsolidated and partly consolidated sediments of the the study area in Suleyman Demirel University Campus. The layers of sediment accumulation were imaged up to 35 m depth. Two sets of S-wave velocities and the comparable seismic sections are obtained. It is demonstrated that reliable results in similar areas may be obtained using these techniques without any need of borehole measurements. [ABSTRACT FROM AUTHOR]
- Published
- 2011
43. Yapay Arı Kolonisi Algoritması Kullanarak Otomatik Ders Çizelgeleme.
- Author
-
Küçüksille, Ecir Uğur and Tokmak, Mahmut
- Subjects
- *
SCHEDULING , *HUMAN-computer interaction , *WEB development , *COMPUTER networks , *USER interfaces - Abstract
Scheduling is an assignment making process normatively in specific time intervals by regarding resource constraints. Preparation process of syllabus is one of the scheduling types for educational institutions. The purpose is placement of term courses to the timeline in the framework of determined constraints. In educational institutions, syllabus is usually prepared manually by administrators. In this study, a programme that does not require manual preparation and prepares a syllabus automatically has been developed. In the programme, term courses of Süleyman Demirel University Gelendost Vocational School and course assignments have been used. By examining the previous studies and regarding the needs of Gelendost Vocational School, constraints of problem have been determined. To solve the problem, in C# programming language, using artificial bee colony algorithm, a programme with an interactive user interface has been developed. As a result of studies, a suitable course schedule has been formed with used algorithm and taken reports of these schedules. [ABSTRACT FROM AUTHOR]
- Published
- 2011
44. EĞİTİM FAKÜLTESİ SON SINIF ÖĞRENCİLERİNİN MEZUNİYET BAŞARI NOTLARI İLE KPSS PUANLARI ARASINDAKİ İLİŞKİ ÜZERİNE BİR ARAŞTIRMA (EĞİTİM FAKÜLTESİ ÖRNEĞİ)
- Author
-
Özkan, Recep and Pektaş, Sami
- Subjects
- *
EDUCATIONAL tests & measurements , *HIGHER education , *COLLEGE teachers , *COMPUTER networks , *GRADUATION (Education) - Abstract
Various examination results carried out after graduation is effective on getting an occupation after university education and almost all fields. PSSE (Public Staff Selection Exam) is one of these examinations. Especially, for education faculty students getting a determined mark from the exam to be assigned as a teacher has been designated as the basic criterion for being assigned in their fields. Because of the qualification of the exam, it is thought that the effect of the courses thought during undergraduate process is not so much but knowing the test technique brings success. In this research, the problem is that whether there is a correlation between the PSSE scores and the graduation success degree of education faculty senior year students. Through 446 pre-service teachers graduated from various departments of Nigde University education faculty during 2007-2008 education years have been designated as sample group and any scale has not been designated as sample group and any scale has not been used for gathering data. It has been indicated that there is low but positive correlation between the PSSE score and the graduation success degree and the graduation success degree procedure the %3 of the effect on PSSE score. Also, significance difference has been designated about gender and department on PSSE scores. The variation of the PSSE nets of students in terms of departments and significance differences have been indicated. [ABSTRACT FROM AUTHOR]
- Published
- 2011
45. Kablosuz ağ ve testisler.
- Author
-
Saygın, Mustafa, Çalışkan, Sadettin, and Köylü, Halis
- Subjects
- *
WIRELESS communications , *TESTIS , *ELECTRONIC equipment , *COMPUTER networks , *WIRELESS LANs , *HISTOPATHOLOGY , *SPERMATOGENESIS , *ELECTROMAGNETIC fields - Abstract
Today, by the help of technological advances; the widespread usage of communication tools in different areas at our daily life has made several facilities. In recent years the rapid development of communication, as well as an incredible era of our life; putting in electronic devices, radios, cell phones, internet networks, such as technology products. Besides providing convenience to our lives, some disadvantages have been produced. These affects are not considered important and shown in most people by the end of a long time because of the effect of electromagnetic field (EMA). Wireless local area networks (WLAN, Wireless Local Area Networks) are two-way broadband data communications allowing the transmission media by radio frequency (RF, Radio Frequency) or an infrared beam instead of fiber optic or copper wire in the limited working places such as building or campus. When we examined carefully the relation between wireless Networks and testicular tissue in our study; we realized that testicular tissue is essential for sperm production and the potential damages in this tissue affects the reproductive system, iyonize and noniyonize radiation that laptop users are influenced has a large role on this subject. The most important effect of magnetic field is histopathological changes by the temperature. [ABSTRACT FROM AUTHOR]
- Published
- 2011
46. Kablosuz Örgü Ağlarda Verimlilik Analizi ve Çözüm Önerileri.
- Author
-
Akcayol, M. Ali and Kocaoğlu, Ramazan
- Subjects
WIRELESS communications ,COMPUTER networks ,WIRELESS LANs ,INTERNET access ,PERFORMANCE evaluation ,TELECOMMUNICATION systems - Abstract
Copyright of International Journal of InformaticsTechnologies is the property of Institute of Informatics, Gazi University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2011
47. Uçucu Madde Kötüye Kullanımı Olan Ergenlerin Altı Aylık İzlem Sonuçları.
- Author
-
Taymur, İbrahim, Çalışkan, Hidayet, and Varol, Hasan
- Subjects
- *
MEDICAL research , *PSYCHOTHERAPY , *COMPUTER networks , *MENTAL health of youth , *DRUG abuse , *ALCOHOLISM ,TREATMENT of inhalant abuse - Abstract
Objective: This study aims to evaluate 6 month follow up results of adolescents who were found to have inhalent abuse in Elazığ province and voluntarily agreed for follow up and treatment. Method: Seventeen adolescents with a history of abuse of volatile compounds were voluntarily included in the study. At the beginning and during follow up, families and schools of adolescents were visited. During 6 month follow up, supportive psychotherapy was carried out once a week. Results: Adolescents participating in the study were all male. 53% of those adolescents had committed a crime or encountered legal problem. The mean age for the onset of inhalant use was 13.6±2.1. There was also alcohol and marijuana use in 83% of the adolescents. At the end of 6 month follow up, it has been observed that 4 adolescents had a regular job, 4 continued to school regularly, and all of them quitted inhalant use. Conclusion: The results of the study suggest that, informing about inhalant use, following up and supportive psychotherapy may have been helpful for quitting inhalant abuse. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
48. Madde Bağımlılığı TanısıAlan Gençlerde Cinsel Yolla Bulaşan Hastalıklar ve Aile Planlaması ile İlgili Bilgi Düzeyi ve Verilen Eğitimin Etkisi.
- Author
-
Yalnız, Hacer, Nebioğlu, Melike, Karacan, Birsen Saydam, Güven, Mükerrem, and Geçici, Ömer
- Subjects
- *
MEDICAL research , *SEXUALLY transmitted diseases , *FAMILY planning , *COMPUTER networks , *COMMUNICABLE diseases , *OUTPATIENT medical care - Abstract
Objective: We aimed to evaluate the knowledge level of young patients (aged between 15-25) with substance dependency about sexually transmitted disease (STD) and family planning (FP) and organized an education in order to inform them and correct their knowledge, if inappropriate and measured the efficacy of this education. Method: This descriptive and cross-sectional study was performed between 1 March 2010 and 31 March 2010. A total of 42 patients either hospitalized or outpatient, diagnosed with substance dependency according to DSM-IV were included in the study at Akdeniz University Alcohol and Substance Dependency Research and Treatment Center (AMBAUM). A standardized education on STD and FP was given to these young patients and a questionnaire consisting of 20 questions was performed before and after the education. Results: After a standardized education on STD and FP, number of correct answers increased for all questions and this reached to statistical significance for 15 of 20 questions (75%). When total scores were considered, the mean total score of the former test was 11.28±2.52 and the mean total score of the latter test was 16.85±2.20. Conclusion: According to the results of the study, young patients with substance dependency have inadequate knowledge about STD and FP, and education programme significantly increases the level of knowledge. It seems reasonable to include an education about STD and FP to alcohol and substance dependency rehabilitation programmes. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
49. YAPILANDIRMACI ÖĞRENME YAKLAŞIMINA DAYALI BİR DERS YAZILIMININ HAZIRLANMASI VE DEĞERLENDİRİLMESG.
- Author
-
Gül, Şeyda and Yeşilyurt, Selami
- Subjects
- *
CONSTRUCTIVISM (Education) , *COMPUTER software , *SECONDARY education , *EDUCATIONAL evaluation , *EDUCATIONAL programs , *COMPUTER networks , *CURRICULUM evaluation , *PROGRAM design (Education) , *SOCIAL constructionism - Abstract
The aim of this study is to prepare and evaluate a course software based on constructivist learning approach about Transport and Circulatory Systems. This study was implemented on totally 40 participants including secondary school students and educationistes at computer and biology area. In study, An course software based on constructivist learning approach was developed primarily. This software the preliminary review of which had been done by the experts was evaluated by means of "Software Evaluation Form". Software Evaluation Form includes in dimensions of "general design features", "usage features" and "instructional design features". The data were analysed by SPSS statistical program. The findings showed that the software was fairly good level in 3 dimensions. [ABSTRACT FROM AUTHOR]
- Published
- 2011
50. Optik WDM ağları için ayrıştırılmış kullanılabilirlik kısıtı altında yol ve dalgaboyu atama teknikleri.
- Author
-
Kantarci, Burak, Oktuğ, Sema, and Mouftah, Hussein T.
- Subjects
- *
OPTICAL communications , *WAVELENGTH division multiplexing , *BANDWIDTHS , *SPECTRUM allocation , *APPLICATION software , *COMPUTER networks - Abstract
As a result of the increase in the bandwidth demand of the next generation Internet applications, Optical Wavelength division Multiplexing (WDM) networks seem to be the most appropriate technology that can be deployed in the backbone. Optical WDM networks introduce the advantage of offering bandwidth partitioned into a number of gigabits per second wavelength channels. However, the ad-vantage introduced by the huge bandwidth offer also introduces a disadvantage when the network experiences a failure. Service interrupts on any component along the lightpath may lead to significant amount of data loss since the fiber capacity is huge. Factors like multiple errors, long fault recovery duration, and component failure characteristics introduce availability constraint for the network elements, and also for the connections. Therefore, connections are required to be provisioned by taking availability constraint into consideration. In short, availability stands for the probability of a network component, a channel or a link being in the operational state at any time t. Significant amount of the previous work is concerned with availability aware routing and wave-length assignment (RWA) under shared backup protection. The first and the most common availability aware routing scheme is compute-a-feasible-solution (CAFES). In this scheme, a number of candidate working paths are selected. For each working path, a corresponding backup path is selected by forcing the backup channels to be shared. The working and backup path pair that leads to the highest availability or another lowest cost metric is selected, and assigned to the incoming connection request. In this work, we present two dynamic connection provisioning schemes for differentiated availability-constrained RWA. Both of the schemes are derived from the conventional reliable provisioning scheme CAFES. In the dynamic environment, connections arrive with the availability requirements of 98% (class-1), 99% (class-2), 99.9% (class-3), 99.99% (class-4), and 99.999% (class-5). First scheme is called Global Differentiated Availability-aware Provisioning (G-DAP). This scheme monitors the average availability per connection for each class and resource-overbuild throughout the network. In order to enhance the performance of the connection provisioning, G-DAP also takes the advantage of the trade-off between resource overbuild and connection unavailability where resource overbuild is the ratio of the number of backup channels to the number of working channels in the network, and unavailability is one's complement of the availability. Based on the change in these two parameters it attempts to specify a feasible global sharing degree for all wavelength channels per availability class. The trade-off function is defined as the product of these two parameters. Hence, if the tradeoff is monitored to be de-creasing for the related availability class, the last action (increment or decrement) taken on the sharing degree of that class is repeated; otherwise, it is reversed. The second scheme is called Link-by-Link Differentiated Availability-aware Provisioning (LBL-DAP). LBL-DAP estimates a separate feasible sharing degree per class for the channels of each link. It periodically runs an integer linear programming (ILP) function to obtain the feasible sharing degrees on each link. When searching for a backup RWA configuration, both schemes modify the link costs based on the feasible sharing degree obtained for the availability class of the incoming connection and current load for the connection's class on the link respectively. Since we aim to improve the performance in terms of resource overbuild, connection availability, and blocking probability, we use the conventional reliable provisioning scheme, CAFES as a base in our simulations. Moreover, since connections arrive with differentiated availability requirements, we also modify CAFES to enable a connection to be provisioned unprotected if a selected working path can meet its availability requirement. Thus, resource consumption overhead of this scheme is modified for its favor. Performance of G-DAP and LBL-DAP are compared to that of CAFES by simulation under NSFNET and EON topologies. Simulation results are collected under two different conditions where the connection requests are distributed uniformly and heterogeneously among the availability classes. It is shown that the proposed schemes lead to enhanced blocking ratio and connection availability. Moreover, by taking the advantage of optimization and considering the feasible sharing degrees for the links separately, LBL-DAP also introduces significant decrease in resource overbuild. [ABSTRACT FROM AUTHOR]
- Published
- 2011
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.