Adem TekerekGazi University · Faculty of Technology
Adem Tekerek
Doctor of Engineering
Associate Professor, Gazi University Ankara, Turkiye
About
48
Publications
55,516
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
536
Citations
Introduction
Artificial Intelligence
Data Mining
Optimization
Publications
Publications (48)
Malware is a general name given to all malicious software that threatens and prevents the use of information systems. Computers, which have become mandatory in daily life, are constantly under the threat of malware as well as facilitating human life. Therefore, the detection of malware that threatens computer systems is important. This study focuse...
The rapid advancement of technology brings new threats to the digital world. One of these threats is malicious ransomware attacks. Ransomware is malicious software that demands ransom from innocent users by blocking access to information systems. Since traditional methods are limited to predefined blacklists, they may be ineffective against unknown...
Günümüz bilgi çağında, büyük miktarda metinsel verinin üretilmesi ve kullanılması son derece önemli hale gelmiştir. Yapay zeka alanında, özellikle doğal dil işleme içerisinde, metin sınıflandırma bu veri selinin düzenlenmesine ve anlaşılmasına yardımcı olan kritik bir görev olarak öne çıkar. Metin sınıflandırmanın özü, metin parçalarını kategoriler...
Assistive technologies used in the field of special education in higher education are tools and resources developed to support the learning processes of students with disabilities. Additionally assistive technologies are designed to help students overcome their barriers, facilitate their access to educational materials, and improve their learning e...
The rapid growth of mobile applications and online e-commerce websites has made it easy to gather information to create an enormous quantity of training data to aid consumers in making decisions about what to purchase. On online shopping sites, helpful reviews analysis of user reviews can significantly increase users’ loyalty. People may significan...
Supervisory Control and Data Acquisition (SCADA) systems monitor and control critical infrastructure processes. SCADA systems do not have adequate detection and defense mechanisms against developing cyber attacks and contain many security vulnerabilities. Using SCADA systems in critical infrastructures of national and international importance means...
Covid19 corona virus has caused widespread disruption across the world, in terms of the health, economy, and society problems. X-ray images of the chest can be helpful in making an accurate diagnosis because the corona virus typically first manifests its symptoms in patients' lungs. In this study, a classification method based on deep learning is p...
An artificial neural network (ANN) model is recommended for the analysis and prediction of the output results of a recently designed and constructed generator known as a permanent magnet generator with axial flux. The generator is considered to generate a power scale of P = 3 kW, especially for off-grid household usage far from the network. This ma...
In recent years, especially with the (COVID-19) pandemic, shopping has been a challenging task. Increased online shopping has increased information available via the World Wide Web. Finding new products or identifying the most suitable products according to customers’ personalization trends is the main benefit of E-commerce recommendation systems,...
The rapid development and widespread use of the Internet have led to an increase in the number and variety of malware proliferating via the Internet. Malware is the general nomenclature for malicious software. Malware classification is an undecidable problem and technically NP hard problem because the halting problem is NP hard. In this study, we p...
In the present study, an artificial neural network (ANN) design has been proposed to analyze and estimate the output quantities of a newly manufactured generator, namely axial flux permanent magnet generator (AFPMG). The machine has been designed with a maximum power of 3 kW for the household electric power generation. As one of the innovative poin...
Malicious Software (Mal-ware) is an abusive term defined as malicious pieces of code or program scripts that can damage information technology systems. Malware is prepared to steal information, capture private data such as username and password and damage information technologies hardware. Therefore, it can cause computers to crash or slow down as...
Offline handwritten signature verification is a challenging pattern recognition task. One of the most significant limitations of the handwritten signature verification problem is inadequate data for training phases. Due to this limitation, deep learning methods that have obtained the state-of-the-art results in many areas achieve quite unsuccessful...
Data Clustering stands for a group of methods classifying patterns into groups and retrieving similarities or dissimilarities of a collection of objects. Clustering is used for pattern recognition, machine learning, etc. One of the approaches to clustering is optimization. The aim of the optimization is finding the best solution in the search space...
Unprotected Web applications are vulnerable places for hackers to attack an organization's network. Statistics show that 42% of Web applications are exposed to threats and hackers. Web requests that Web users request from Web applications are manipulated by hackers to control Web servers. Web queries are detected to prevent manipulations of hacker'...
Biometric data such as fingerprint, palm vascular structure or gait pattern that human have had since their birth is are almost impossible to change. Biometrics is a collection of measures of human physiology and behaviour. In this study, an artificial neural network-based model is proposed in order to determine the recognition of human by gait pat...
In the present study, an artificial neural network (ANN) design has been proposed to analyze and estimate the output quantities of a new manufactured generator, namely axial flux permanent magnet generator (AFPMG). The machine has been designed with a maximum power of 3 kW for the household electric power generation. As one of the innovative points...
Deep learning (DL) is a powerful machine learning field that has achieved considerable success in many research areas. Especially in the last decade, the-state-of-the-art studies on many research areas such as computer vision, object recognition, speech recognition, natural language processing were led to the awakening of the artificial intelligenc...
In last decades’ web application security has become one of the most important case study of information security studies. Business processes are transferred to web platforms. So web application usage is increased very fast. Web-based attacks have also increased due to the increased use of web applications. In order to ensure the security of web ap...
Deep learning methods are used in many popular areas such: image processing, computer vision, autonomous vehicles, character recognition, audio and video processing. These methods require high processing power, such as graphics cards (GPUs), to obtain successful results in the solution of NP hard problems which have big data. In this study, perform...
Short Message Service (SMS) is the most important communication tool in recent decades. With the increased popularity of mobile devices, the usage rate of SMS will increase more and more in years. SMS is a practical method used to reach individuals directly. But this practical and easy method can cause SMS to be misused. The advertising or promotio...
Bilgi sistemlerindeki zayıfl ıkları ve eksiklikleri tanımlamanın en etkili yöntemlerinden olan sızma testleri potansiyel güvenlik ihlalleriyle ilişkili risklerin değerlendirilmesi amacıyla erişim, yetkilendirme ve işlevsellik amaçlı sistemlere zarar verilmeden yapılan gerçek
saldırıların simüle edilmesini sağlar. Sızma testleriyle güvenlik amaçlı a...
Internet of Things is the next-generation Internet network created by intelligent objects with software and sensors, employed in a wide range of fields such as automotive, construction, health, textile, education and transportation. With the advent of Industry 4.0, Internet of Things has been started to be used and it has led to the emergence of in...
Natural language is one of the most fundamental features that distinguish people from other living things and enable people to communicate each other. Language is a tool that enables people to express their feelings and thoughts and to transfers cultures through generations. Texts and audio are examples of natural language in daily life. In the nat...
Çoklu ortam öğeleri, öğrenmeyi kolaylaştırması yönüyle eğitimin vazgeçilmez bir parçasıdır. Çevrimiçi öğrenme ve öğretme platformlarının yaygınlaşması ile eğitimlerde ve konferanslarda video kullanımına rastlanmaktadır. Bilgi videolarda hem görsel hem de işitsel olarak hızlı bir şekilde sunulmaktadır, dolayısıyla videolarda anlamayı daha da kolayla...
Natural language is one of the most fundamental features that distinguish people from other living things and enable people to communicate each other. Language is a tool that enables people to express their feelings and thoughts and to transfers cultures through generations. Texts and audio are examples of natural language in daily life. In the nat...
One of the most important biometric authentication technique is signature. Nowadays, there are two types of signatures, offline (static) and online (dynamic). Online signatures have higher distinctive features but offline signatures have fewer distinctive features. So offline signatures are more difficult to verify. In addition, the most important...
The data is called unprocessed information which is obtained by measurement or research and classified as quantitative or qualitative. Recently, the amount and the type of produced data are increasing exponentially each passing day. In order to benefit from the produced data and obtain information, the data is required to be interpreted using data...
E-mail is one of the most important communication tools in last decades. E-mail usage rates are growing every year. In 2017, number of worldwide e-mail users was nearly 2.8 billion and total number of e-mails sent and received per day was over 225 billion. By the end of 2019, the number of worldwide e-mail users will increase to over 2.9 billion an...
Geleneksel arama motoru yöntemlerinde, aranan anahtar kelimenin metin içinde geçmesi gerekmektedir. Anlamsal aramada ise aranan anahtar kelimeler bire bir metin içinde bulunmak zorunda değildir. Anlamsal aramada anahtar kelime etiketlenen kelimelerle bulunabilir. Böylece anahtar kelime olmasa bile anlam bütünlüğü sağlanmış şekilde arama gerçekleşti...
Web application firewall (WAF) is a web server plugin, filter or a dedicated application that applies a set of rules to HTTP requests and responses. Generally, these rules cover common web based attacks such as SQL injection and cross site scripting (XSS). By customizing the rules of WAF, web based attacks can be identified and blocked according to...
Web uygulama guvenligini saglamak icin ag ortamindan yapilan saldirilara karsi guvenlik duvarlari, saldiri tespit ve engelleme sistemleri kullanilmaktadir. Web uygulamalarina HTTP kullanilarak da saldirilar gerceklestirilmekte, bu saldirilari onlemek icin HTTP denetimi yapilmaktadir. Bu calismada, imza tabanli ve anormal tabanli denetimler kullanil...
Bu arastirmada ilkogretim ve lise ogrencilerinin bilgi ve bilgisayar guvenligi farkindalik duzeyleri ortaya cikarilmaya calisilmistir. Arastirma kapsaminda Kahramanmaras ili, il merkezi, ilce, kasaba ve koylerinde ogrenim goren 2449 ogrenciye, gelistirilen bilgi ve bilgisayar guvenligi farkindalik olcegi uygulanmis ve elde edilen veriler istatistik...
Widespread use of internet reveals the idea that it can also be more widely used for educational purposes. In this respect, teachers have a very important function in education and the determination of teachers’ attitude towards internet using is also important. In the literature although it is possible to see many studies on pre-service teachers’...
Data mining is the process that managing data in databases or files by using particular statistical methods. Data mining can be expressed as whole of techniques of obtaining information from the data. it is the prosess that disclosuring of confidential information in the data and coverting data to usable information by using statistical analysis te...
İş ve iş süreçlerinin hızla internet ortamına aktarılması sonucu internet ortamındaki bilgi miktarı da hızla artmaktadır. İnternet ortamındaki bilginin yönetilmesi de bilgi miktarının artması sonucu zorlaşmıştır. İnternet ortamındaki bilginin kolay ve hızlı bir şekilde yönetilmesini sağlamak amacıyla otomasyon sistemleri geliştirilmeye başlanmıştır...
A web content management application is an application that manages web components from web interface. As the usage of internet increases, for fasten and simplify the tracking of business and proccess, the usage of web content management systems
is inscreased.
In this study, a content management system was developed which enables users to manage, u...