3 results listed
Studies of Intermittently connected delay tolerant wireless sensor networks (ICDT-WSNs) are a new
field gaining more popularity for various new applications. These networks are an integration of both
wireless sensor networks (WSNs) and delay tolerant networks (DTNs). ICDT-WSNs like the WSN
have limited resources and like DTNs have intermittent connections. Traditional wireless sensor
networks are appropriate for applications that have an end-to-end connection between the source and
destination nodes, but they are not suitable for some applications that have not end-to-end connections
between source and destination nodes and have intermittently connected. ICDT-WSNs designed for
these types of applications. By recognizing the characteristics of these networks, different applications
can offer to them. Surveying of these applications can be led to identify the core needs of ICDT-WSNs
and propose efficient protocols for ICDT-WSNs. This paper summarizes and compares some
applications of ICDT-WSNs and characteristics and requirements.
International Congress on 3D Printing (Additive Manufacturing) Technologies and Digital Industry
3D-PTC2019
Ercüment Öztürk
Nader EBRAHIMPOUR
Tuğrul Çavdar
Today, the connections between vehicles and their surroundings are limited. However, with the
development of the Internet of Things (IoT) and the new technological developments, there have been
serious progresses in the Internet of Vehicles (IoV), and vehicle manufacturers have made various
studies in this subject. However, these studies generally suggest a link between cars and users. Today,
most of the studies do not refer to the connection between vehicles or the vehicle and its environment,
so it is necessary to carry out such a study. In this study, it is aimed to establish an ad-hoc network
between vehicles and their environments to optimize the number of vehicles to be accommodated in
this temporary network. However, it is aimed to share traffic flow and speed information by
communicating the vehicles in urban traffic. In this sense, there is no speed and direction limitations in
the transient network to be created between vehicles without a specific limitation. Simulation studies
have been carried out on the optimization of the network by considering the problems such as; use of
the bandwidth efficiently and the removal of the interference problems in the communication between
the vehicles and their environments. In order to solve these problems, Artificial Neural Network and
Simulated Annealing (SA) algorithms are used to optimize the number of vehicles to be included in
the ad-hoc network in the simulations, which performed in MATLAB environment.
International Congress on 3D Printing (Additive Manufacturing) Technologies and Digital Industry
3D-PTC2019
Ercüment Öztürk
Ahmet Ulu
Tuğrul Çavdar
Mobil cihazlarda son zamanlarda yaşanan teknolojik gelişmeler patlayıcı bir gelişime neden
olmuştur. Bununla birlikte günümüzde telefon kullanıcı sayısı milyarlara ulaşmıştır. Bu durum
beraberinde mobil cihaz içerikli yapılan suçlarda da bir artışa sebep olmuştur. Özellikle akıllı
telefonların kullanımı ile birlikte banka hesabı yönetimi, e-ticaret vb. işlemlerin bu cihazlar üzerinden
yapılması, kötü kişiler için mobil cihazları daha cazip hale getirmiştir. Sonuç olarak, akıllı telefonlarda
bulunan verilerin korunması için yüksek güvenirliliğe sahip mekanizmalara olan ihtiyaç artmıştır.
Mobil cihazlarda kimlik doğrulama için en çok kullanılan 3 farklı yöntem vardır. Bunlardan birincisi
parola sorgulamasıdır. Genel olarak bu tür güvenlik kontrolleri gizli bilgi tabanlı olarak kabul
edilmektedir. İkinci olarak ise jeton tabanlı (token-based) yöntemler söylenebilir. Son olarak
günümüzde çokça tercih edilen biyometrik tabanlı yaklaşımlar kullanılmaktadır. Biyometrik tabanlı
yöntemler kendi içerisinde fiziksel ve davranışsal olarak ikiye ayrılmaktadır. Fiziksel; parmak izi
tanıma ve yüz tanıma gibi çalışmalar olup, davranışsal tabanlı yöntemler ise kişinin davranışsal
özelliklerini içeren yapılar olmaktadır. Davranışsal tabanlı yöntemler biyometrikler tabanlı
yöntemlerdeki gibi ekstra cihaz ihtiyacı olmadığından daha avantajlı yöntemlerdir. Bu çalışmada
literatürde yer alan, son zamanlarda popülerliği artmış olan, dokunma dinamiği tabanlı çalışmalar
üzerine detaylı bir inceleme yapılmış olup mevcut bazı çalışmaların performansları üzerine
kıyaslamalar yapılmıştır.Recent technological developments in mobile devices have led to an explosive development. Today,
however, the number of phone users has reached billions. This situation led to an increase in the crime
of mobile devices. In particular, with the use of smart phones, bank account management, e-commerce
transactions etc. have increased more and more over these devices. So this has made mobile devices
more attractive for snides. As a result, the need for mechanisms with high reliability for the protection
of data contained in smartphones has increased. There are 3 most commonly used methods for
authentication on mobile devices. The first is the password query. In general, these security checks are
considered as confidential information-based. Secondly, token-based methods can be said. Finally,
biometrics-based approaches are being used today. Biometric based methods are divided into physical
and behavioral forms. Physical form; fingerprint recognition and face recognition, and behavioral
based methods are the structures that include the behavioral characteristics of the person. Behavioral-
based methods are more advantageous when there is no need for extra devices such as biometric based
methods. In this study, a detailed study has been done on the touch dynamics based studies which has
recently increased in popularity in the literature.
International Congress on 3D Printing (Additive Manufacturing) Technologies and Digital Industry
3D-PTC2019
Ahmet ULU
Ercüment Öztürk