Adem Tekerek

Adem Tekerek
Gazi University · Faculty of Technology

Doctor of Engineering
Associate Professor, Gazi University Ankara, Turkiye

About

48
Publications
55,516
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
536
Citations

Publications

Publications (48)
Article
Full-text available
Malware is a general name given to all malicious software that threatens and prevents the use of information systems. Computers, which have become mandatory in daily life, are constantly under the threat of malware as well as facilitating human life. Therefore, the detection of malware that threatens computer systems is important. This study focuse...
Article
Full-text available
The rapid advancement of technology brings new threats to the digital world. One of these threats is malicious ransomware attacks. Ransomware is malicious software that demands ransom from innocent users by blocking access to information systems. Since traditional methods are limited to predefined blacklists, they may be ineffective against unknown...
Article
Full-text available
Günümüz bilgi çağında, büyük miktarda metinsel verinin üretilmesi ve kullanılması son derece önemli hale gelmiştir. Yapay zeka alanında, özellikle doğal dil işleme içerisinde, metin sınıflandırma bu veri selinin düzenlenmesine ve anlaşılmasına yardımcı olan kritik bir görev olarak öne çıkar. Metin sınıflandırmanın özü, metin parçalarını kategoriler...
Chapter
Assistive technologies used in the field of special education in higher education are tools and resources developed to support the learning processes of students with disabilities. Additionally assistive technologies are designed to help students overcome their barriers, facilitate their access to educational materials, and improve their learning e...
Article
Full-text available
The rapid growth of mobile applications and online e-commerce websites has made it easy to gather information to create an enormous quantity of training data to aid consumers in making decisions about what to purchase. On online shopping sites, helpful reviews analysis of user reviews can significantly increase users’ loyalty. People may significan...
Article
Full-text available
Supervisory Control and Data Acquisition (SCADA) systems monitor and control critical infrastructure processes. SCADA systems do not have adequate detection and defense mechanisms against developing cyber attacks and contain many security vulnerabilities. Using SCADA systems in critical infrastructures of national and international importance means...
Article
Full-text available
Covid19 corona virus has caused widespread disruption across the world, in terms of the health, economy, and society problems. X-ray images of the chest can be helpful in making an accurate diagnosis because the corona virus typically first manifests its symptoms in patients' lungs. In this study, a classification method based on deep learning is p...
Article
An artificial neural network (ANN) model is recommended for the analysis and prediction of the output results of a recently designed and constructed generator known as a permanent magnet generator with axial flux. The generator is considered to generate a power scale of P = 3 kW, especially for off-grid household usage far from the network. This ma...
Article
Full-text available
In recent years, especially with the (COVID-19) pandemic, shopping has been a challenging task. Increased online shopping has increased information available via the World Wide Web. Finding new products or identifying the most suitable products according to customers’ personalization trends is the main benefit of E-commerce recommendation systems,...
Article
The rapid development and widespread use of the Internet have led to an increase in the number and variety of malware proliferating via the Internet. Malware is the general nomenclature for malicious software. Malware classification is an undecidable problem and technically NP hard problem because the halting problem is NP hard. In this study, we p...
Article
In the present study, an artificial neural network (ANN) design has been proposed to analyze and estimate the output quantities of a newly manufactured generator, namely axial flux permanent magnet generator (AFPMG). The machine has been designed with a maximum power of 3 kW for the household electric power generation. As one of the innovative poin...
Conference Paper
Full-text available
Malicious Software (Mal-ware) is an abusive term defined as malicious pieces of code or program scripts that can damage information technology systems. Malware is prepared to steal information, capture private data such as username and password and damage information technologies hardware. Therefore, it can cause computers to crash or slow down as...
Article
Full-text available
Offline handwritten signature verification is a challenging pattern recognition task. One of the most significant limitations of the handwritten signature verification problem is inadequate data for training phases. Due to this limitation, deep learning methods that have obtained the state-of-the-art results in many areas achieve quite unsuccessful...
Preprint
Full-text available
Data Clustering stands for a group of methods classifying patterns into groups and retrieving similarities or dissimilarities of a collection of objects. Clustering is used for pattern recognition, machine learning, etc. One of the approaches to clustering is optimization. The aim of the optimization is finding the best solution in the search space...
Article
Unprotected Web applications are vulnerable places for hackers to attack an organization's network. Statistics show that 42% of Web applications are exposed to threats and hackers. Web requests that Web users request from Web applications are manipulated by hackers to control Web servers. Web queries are detected to prevent manipulations of hacker'...
Conference Paper
Biometric data such as fingerprint, palm vascular structure or gait pattern that human have had since their birth is are almost impossible to change. Biometrics is a collection of measures of human physiology and behaviour. In this study, an artificial neural network-based model is proposed in order to determine the recognition of human by gait pat...
Conference Paper
Full-text available
In the present study, an artificial neural network (ANN) design has been proposed to analyze and estimate the output quantities of a new manufactured generator, namely axial flux permanent magnet generator (AFPMG). The machine has been designed with a maximum power of 3 kW for the household electric power generation. As one of the innovative points...
Article
Full-text available
Deep learning (DL) is a powerful machine learning field that has achieved considerable success in many research areas. Especially in the last decade, the-state-of-the-art studies on many research areas such as computer vision, object recognition, speech recognition, natural language processing were led to the awakening of the artificial intelligenc...
Conference Paper
Full-text available
In last decades’ web application security has become one of the most important case study of information security studies. Business processes are transferred to web platforms. So web application usage is increased very fast. Web-based attacks have also increased due to the increased use of web applications. In order to ensure the security of web ap...
Conference Paper
Full-text available
Deep learning methods are used in many popular areas such: image processing, computer vision, autonomous vehicles, character recognition, audio and video processing. These methods require high processing power, such as graphics cards (GPUs), to obtain successful results in the solution of NP hard problems which have big data. In this study, perform...
Article
Full-text available
Short Message Service (SMS) is the most important communication tool in recent decades. With the increased popularity of mobile devices, the usage rate of SMS will increase more and more in years. SMS is a practical method used to reach individuals directly. But this practical and easy method can cause SMS to be misused. The advertising or promotio...
Chapter
Full-text available
Bilgi sistemlerindeki zayıfl ıkları ve eksiklikleri tanımlamanın en etkili yöntemlerinden olan sızma testleri potansiyel güvenlik ihlalleriyle ilişkili risklerin değerlendirilmesi amacıyla erişim, yetkilendirme ve işlevsellik amaçlı sistemlere zarar verilmeden yapılan gerçek saldırıların simüle edilmesini sağlar. Sızma testleriyle güvenlik amaçlı a...
Article
Full-text available
Internet of Things is the next-generation Internet network created by intelligent objects with software and sensors, employed in a wide range of fields such as automotive, construction, health, textile, education and transportation. With the advent of Industry 4.0, Internet of Things has been started to be used and it has led to the emergence of in...
Preprint
Full-text available
Natural language is one of the most fundamental features that distinguish people from other living things and enable people to communicate each other. Language is a tool that enables people to express their feelings and thoughts and to transfers cultures through generations. Texts and audio are examples of natural language in daily life. In the nat...
Conference Paper
Full-text available
Çoklu ortam öğeleri, öğrenmeyi kolaylaştırması yönüyle eğitimin vazgeçilmez bir parçasıdır. Çevrimiçi öğrenme ve öğretme platformlarının yaygınlaşması ile eğitimlerde ve konferanslarda video kullanımına rastlanmaktadır. Bilgi videolarda hem görsel hem de işitsel olarak hızlı bir şekilde sunulmaktadır, dolayısıyla videolarda anlamayı daha da kolayla...
Conference Paper
Full-text available
Natural language is one of the most fundamental features that distinguish people from other living things and enable people to communicate each other. Language is a tool that enables people to express their feelings and thoughts and to transfers cultures through generations. Texts and audio are examples of natural language in daily life. In the nat...
Conference Paper
Full-text available
One of the most important biometric authentication technique is signature. Nowadays, there are two types of signatures, offline (static) and online (dynamic). Online signatures have higher distinctive features but offline signatures have fewer distinctive features. So offline signatures are more difficult to verify. In addition, the most important...
Conference Paper
Full-text available
The data is called unprocessed information which is obtained by measurement or research and classified as quantitative or qualitative. Recently, the amount and the type of produced data are increasing exponentially each passing day. In order to benefit from the produced data and obtain information, the data is required to be interpreted using data...
Conference Paper
Full-text available
E-mail is one of the most important communication tools in last decades. E-mail usage rates are growing every year. In 2017, number of worldwide e-mail users was nearly 2.8 billion and total number of e-mails sent and received per day was over 225 billion. By the end of 2019, the number of worldwide e-mail users will increase to over 2.9 billion an...
Conference Paper
Full-text available
Geleneksel arama motoru yöntemlerinde, aranan anahtar kelimenin metin içinde geçmesi gerekmektedir. Anlamsal aramada ise aranan anahtar kelimeler bire bir metin içinde bulunmak zorunda değildir. Anlamsal aramada anahtar kelime etiketlenen kelimelerle bulunabilir. Böylece anahtar kelime olmasa bile anlam bütünlüğü sağlanmış şekilde arama gerçekleşti...
Conference Paper
Full-text available
Web application firewall (WAF) is a web server plugin, filter or a dedicated application that applies a set of rules to HTTP requests and responses. Generally, these rules cover common web based attacks such as SQL injection and cross site scripting (XSS). By customizing the rules of WAF, web based attacks can be identified and blocked according to...
Article
Full-text available
Web uygulama guvenligini saglamak icin ag ortamindan yapilan saldirilara karsi guvenlik duvarlari, saldiri tespit ve engelleme sistemleri kullanilmaktadir. Web uygulamalarina HTTP kullanilarak da saldirilar gerceklestirilmekte, bu saldirilari onlemek icin HTTP denetimi yapilmaktadir. Bu calismada, imza tabanli ve anormal tabanli denetimler kullanil...
Article
Full-text available
Bu arastirmada ilkogretim ve lise ogrencilerinin bilgi ve bilgisayar guvenligi farkindalik duzeyleri ortaya cikarilmaya calisilmistir. Arastirma kapsaminda Kahramanmaras ili, il merkezi, ilce, kasaba ve koylerinde ogrenim goren 2449 ogrenciye, gelistirilen bilgi ve bilgisayar guvenligi farkindalik olcegi uygulanmis ve elde edilen veriler istatistik...
Conference Paper
Full-text available
Widespread use of internet reveals the idea that it can also be more widely used for educational purposes. In this respect, teachers have a very important function in education and the determination of teachers’ attitude towards internet using is also important. In the literature although it is possible to see many studies on pre-service teachers’...
Conference Paper
Full-text available
Data mining is the process that managing data in databases or files by using particular statistical methods. Data mining can be expressed as whole of techniques of obtaining information from the data. it is the prosess that disclosuring of confidential information in the data and coverting data to usable information by using statistical analysis te...
Thesis
Full-text available
İş ve iş süreçlerinin hızla internet ortamına aktarılması sonucu internet ortamındaki bilgi miktarı da hızla artmaktadır. İnternet ortamındaki bilginin yönetilmesi de bilgi miktarının artması sonucu zorlaşmıştır. İnternet ortamındaki bilginin kolay ve hızlı bir şekilde yönetilmesini sağlamak amacıyla otomasyon sistemleri geliştirilmeye başlanmıştır...
Article
Full-text available
A web content management application is an application that manages web components from web interface. As the usage of internet increases, for fasten and simplify the tracking of business and proccess, the usage of web content management systems is inscreased. In this study, a content management system was developed which enables users to manage, u...

Network

Cited By