6 sonuçlar
Arama Sonuçları
Listeleniyor 1 - 6 / 6
Yayın TL and OSL response of turquoise for dosimetric application(University of Aegean, 2010) Subedi, Bhagawan; Afouxenidis, Dimitrios; Polymeris, George S.; Tsirliganis, Nestor C.; Paraskevopoulos, Konstantinos M.; Kitis, GeorgeTurquoise is one of the amongst first gem stones used in jewelry and possessing cultural value since 2000 BC (at least). This work attempts characterize this stone scientifically using both thermally (TL) and optically stimulated luminescence (OSL) techniques. The experimental investigation included 1) the study of the natural TL and OSL signals, 2) the reproducibility of TL sensitivity over repeated irradiation and TL readout cycles, 3) dependence of sensitivity on annealing temperatures and 4) the TL and OSL dose response curves. The potential use of the TL and OSL techniques in determination of provenance, accidental dosimetry and probably to authenticity and dating purposes are then discussed.Yayın An interoperability infrastructure for distributed feed networks(2007) Wild, Fridolin; Siguroarson, Steinn E.; Sobernig, Stefan; Stahl, Christina; Soylu, Ahmet; Rebas, Vahur; Gárka, Dariusz; Danielewska-Tułecka, Anna; Tapiador, AntonioBlogs have the affordance to become an integral part of teaching and learning processes as a vehicle for knowledge management. Open, flexible systems integrating blogs provide user-friendly, personalised microlearning environments while ensuring ubiquitous access. This paper concentrates on blog interoperability in an open space for learning and collaboration. As blogging is one of the most popular web-based forms of publishing today, there is a plethora of different blogging tools, feed readers, and aggregators, enabling information dissemination, filtering, and retrieval. Several different data structure and interaction standards emerged which make integration a real challenge. This paper aims at creating distributed microlearning environments basing on networks of integrated blogs, discusses problems of such an integration along with possible solutions, and proposes an architecture for loosely-coupled blog integration. The core of this infrastructure consists of a service interface for feed management that allows learners as well as facilitators to automatically set up channel structures for feed syndication, while effectively reducing the management efforts thereof through proper system support.Yayın The survey on Near Field Communication(MDPI, 2015-06) Coşkun, Vedat; Özdenizci Köse, Büşra; Ok, KeremNear Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem.Yayın A novel biometric authentication approach using electrocardiogram signals(IEEE, 2013) Gürkan, Hakan; Güz, Ümit; Yarman, Bekir Sıddık BinboğaIn this work, we present a novel biometric authentication approach based on combination of AC/DCT features, MFCC features, and QRS beat information of the ECG signals. The proposed approach is tested on a subset of 30 subjects selected from the PTB database. This subset consists of 13 healthy and 17 non-healthy subjects who have two ECG records. The proposed biometric authentication approach achieves average frame recognition rate of %97.31 on the selected subset. Our experimental results imply that the frame recognition rate of the proposed authentication approach is better than that of ACDCT and MFCC based biometric authentication systems, individually.Yayın A novel human identification system based on electrocardiogram features(IEEE, 2013) Gürkan, Hakan; Güz, Ümit; Yarman, Bekir Sıddık BinboğaIn this work, we present a novel biometric authentication approach based on combination of AC/DCT features, MFCC features, and QRS beat information of the ECG signals. The proposed approach is tested on a subset of 30 subjects selected from the PTB database. This subset consists of 13 healthy and 17 non-healthy subjects who have two ECG records. The proposed biometric authentication approach achieves average frame recognition rate of %97.31 on the selected subset. Our experimental results imply that the frame recognition rate of the proposed authentication approach is better than that of ACDCT and MFCC based biometric authentication systems, individually.Yayın Quarantine region scheme to mitigate spam attacks in wireless sensor networks(IEEE, 2006-08) Coşkun, Vedat; Çayırcı, Erdal; Levi, Albert; Sancak, SerdarThe Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a trade-off between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processes.












