4 sonuçlar
Arama Sonuçları
Listeleniyor 1 - 4 / 4
Yayın Türkçe için biçimbirim temelli bir bileşen grameri yaklaşımı(Beykoz Üniversitesi, 2024-12-26) Özenç, Berke; Solak, ErcanDilin modellenmesi, dil çalışmalarında önemli bir temel olarak yer alır. Farklı modelleme yöntemleri, farklı diller için uyarlanabilir olsa da bu uyarlamalar, hedef dil için her zaman yeterli olmayabilir. Bu durumdan en çok biçimbirimsel açıdan zengin diller etkilenir. Böyle bir dil için hazırlanacak model kurgulanırken dilin evrensel olarak ortak olan özelliklerinin yanı sıra, dilin kendine özgü özelliklerine odaklanılmalıdır. Bu makalede, bağımlı biçimbirim bakımından zengin bir görünüm sunan Türkçe ele alınarak uyarlanan gramer sunulmuştur. Çalışmada açıklanan gramer temelleri geleneksel üretici gramer yönteminden uyarlanmıştır. Bununla birlikte, sunulan gramer, biçimbirimleri söz dizimi elemanı olarak geleneksel söz dizimi elemanlarıyla birlikte, söz dizimine olan etkilerini ele almasıyla ve kullanılan özel bileşen kümesiyle geleneksel üretici gramer yöntemden ayrılır. Geleneksel yöntemden farklı olarak önerilen gramerde, tümce çözümlemesine sözcüklerden değil, biçimbirim elemanları olan sözcük gövdeleri, ekler, biçimbirimler ve bu gibi elemanların oluşturduğu gruplardan başlanır. Buna ek olarak Türkçenin söz dizimsel ve birimbirimsel özelliklerine göre kurgulanan bir bileşen kümesi de sunulmuştur. Sunulan bileşen kümesi, tümce, ad öbeği, eylem öbeği, belirteç öbeği gibi geleneksel sözdizimsel bileşenleri, öbek gövdesi olarak adlandırılan ara bir yapıyı ve çoğul eki, durum eki, zaman çekimi eki gibi, biçimbirimleri veya biçimbirim gruplarını temsil eden bileşenleri içerir.Yayın Text-to-SQL: a methodical review of challenges and models(TÜBİTAK, 2024-05-20) Kanburoğlu, Ali Buğra; Tek, Faik BorayThis survey focuses on Text-to-SQL, automated translation of natural language queries into SQL queries. Initially, we describe the problem and its main challenges. Then, by following the PRISMA systematic review methodology, we survey the existing Text-to-SQL review papers in the literature. We apply the same method to extract proposed Text-to-SQL models and classify them with respect to used evaluation metrics and benchmarks. We highlight the accuracies achieved by various models on Text-to-SQL datasets and discuss execution-guided evaluation strategies. We present insights into model training times and implementations of different models. We also explore the availability of Text-to-SQL datasets in non-English languages. Additionally, we focus on large language model (LLM) based approaches for the Text-to-SQL task, where we examine LLM-based studies in the literature and subsequently evaluate the LLMs on the cross-domain Spider dataset. Finally, we conclude with a discussion of future directions for Text-to-SQL research, identifying potential areas of improvement and advancements in this field.Yayın Evaluation of password hashing competition finalists: performance, security, compliance mapping, and post-quantum readiness(Karyay Karadeniz Yayımcılık Ve Organizasyon Ticaret Limited Şirketi, 2025-11-15) Ulutaş, Erdem; Çeliktaş, BarışPassword hashes and key derivation functions (KDFs) are central to authentication and cryptographic security schemes crafted to defend user credentials from brute-force attacks and unauthorized access. Password hashing algorithms, for example PBKDF2, bcrypt, or scrypt, are very popular today, but are lacking in the face of modern hardware acceleration, parallel processing, and advanced cryptanalytic attacks. To contest these shortcomings, the Password Hashing Competition (PHC) was started in 2013 and had 22 candidates for functions for hashing passwords. After thorough evaluation, 9 finalists were selected based on how secure, fast, memory-friendly, flexible, and efficient these functions were. This study evaluates the nine PHC finalists—Argon2, battcrypt, Catena, Lyra2, MAKWA, Parallel, POMELO, Pufferfish, and yescrypt—through survey findings and performance benchmarks. We have evaluated these functions from an architectural standpoint and studied their security features, memory hardness, performance tradeoff, and practical usage. We also compare these finalists with traditional password hashing functions to highlight their advantages and limitations. We also investigate the post-quantum assumption for password hashing – the effectiveness of these functions against quantum assaults, their position in a new cryptography set, and the role of peppering as an additional security measure. In addition, we perform a comprehensive compliance mapping of the PHC finalists against major global standards and regulations such as NIST SP 800-63B, OWASP ASVS, PCI DSS, GDPR, KVKK, and ISO/IEC 27001, highlighting their practical suitability for secure deployment in regulated environments. Finally, we provide usage recommendations for these functions for web authentication, KDFs, and embedded platforms. This paper serves as a reference for researchers, developers, and security engineers, while also introducing a complianceaware, post-quantum-ready framework that bridges cryptographic design with regulatory and deployment needs.Yayın An analysis of enterprise-level cloud transition barriers within the Technology-Organization-Environment (TOE) framework and strategic solution proposals(Gazi Üniversitesi, 2025-10-31) Çeliktaş, Barış; Birgin, Berat; Tok, Mevlüt SerkanEnterprise-level transitions to cloud service providers are frequently delayed or disrupted due to the multilayered nature of technical, organizational, and legal barriers. This study classifies these obstacles within the TechnologyOrganization-Environment (TOE) theoretical framework and provides a comprehensive analysis. Methodologically, a triangulated data source approach was adopted, combining systematic literature review, the 2025 Flexera Cloud Report, and Cloud Adoption Framework (CAF) documentation from major providers such as AWS, Azure, and Google Cloud. Findings indicate that technological barriers particularly cryptographic complexity, cost unpredictability, and weak system integration, are the most dominant. These barriers were visually modeled, and the structural interdependencies among five core cryptographic components (key management, secure computation, algorithm selection, access control, and regulatory compliance) were illustrated through a flow diagram. By aligning FinOps and compliance-oriented solution strategies with the TOE framework, the study offers a strategic roadmap for decision-makers and cloud architects planning cloud adoption. It links conceptual models to applied practices, providing structured support for organizations seeking to mature their cloud strategy.












