oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 4 )

2018 ( 10 )

2017 ( 4 )

2016 ( 12 )

Custom range...

Search Results: 1 - 10 of 641 matches for " Nermin Hamza "
All listed articles are free for downloading (OA Articles)
Page 1 /641
Display every page Item
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing  [PDF]
Abou-el-ela Abdou Hussien, Nermin Hamza, Hesham A. Hefny
Journal of Information Security (JIS) , 2013, DOI: 10.4236/jis.2013.42012
Abstract:

Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with the data modified to mask sensitive information. The key issues were how to modify the data and how to recover the data mining result from the modified data. Privacy-preserving data mining considers the problem of running data mining algorithms on confidential data that is not supposed to be revealed even to the party running the algorithm. In contrast, privacy-preserving data publishing (PPDP) may not necessarily be tied to a specific data mining task, and the data mining task may be unknown at the time of data publishing. PPDP studies how to transform raw data into a version that is immunized against privacy attacks but that still supports effective data mining tasks. Privacy-preserving for both data mining (PPDM) and data publishing (PPDP) has become increasingly popular because it allows sharing of privacy sensitive data for analysis purposes. One well studied approach is the k-anonymity model [1] which in turn led to other models such as confidence bounding, l-diversity, t-closeness, (α,k)-anonymity, etc. In particular, all known mechanisms try to minimize information loss and such an attempt provides a loophole for attacks. The aim of this paper is to present a survey for most of the common attacks techniques for anonymization-based PPDM & PPDP and explain their effects on Data Privacy.

A Hybrid ANN-GWO Algorithm for Prediction of Heart Disease  [PDF]
Hamza Turabieh
American Journal of Operations Research (AJOR) , 2016, DOI: 10.4236/ajor.2016.62016
Abstract: The paper investigates the powerful of hybridizing two computational intelligence methods viz., Gray Wolf Optimization (GWO) and Artificial Neural Networks (ANN) for prediction of heart disease. Gray wolf optimization is a global search method while gradient-based back propagation method is a local search one. The proposed algorithm implies the ability of ANN to find a relationship between the input and the output variables while the stochastic search ability of GWO is used for finding the initial optimal weights and biases of the ANN to reduce the probability of ANN getting stuck at local minima and slowly converging to global optimum. For evaluation purpose, the performance of hybrid model (ANN-GWO) was compared with standard back-propagation neural network (BPNN) using Root Mean Square Error (RMSE). The results demonstrate that the proposed model increases the convergence speed and the accuracy of prediction.
STRATEGY MAKING WITH QUANTIFIED SWOT APPROACH: A CASE ANALYSIS ON TOURISM INDUSTRY IN BLACK SEA REGION OF TURKEY Nermin Celik
Nermin Celik
Lex et Scientia , 2007,
Abstract: Due to the increasing demand, service competitiveness requirements, and customer expectations in tourism sector in Turkey, satisfactorily solutions and development strategies are required for the ongoing problems to keep the business performance in desired level. Recent researches indicate that the popularity of Black Sea Region, located in the north side of Turkey, has been raised, however, the enterprises and infrastructural quality of service facilities are dramatically seemed to be insufficient. Hence, this paper proposes development strategies on tourism industry by utilizing the Quantified SWOT Analysis. The outcomes of this paper originally contribute strategic vision of Turkish tourism industry subsequently. The extension of this research can be performed to cover the collaborative research programs towards tourism sector under unique implementation plan of Black Sea Economic Cooperation (BSEC).
ORGANIZED CRIME AS A DYNAMIC AND COMPLEX CHALLENGE FACED BY THE MODERN SOCIETY
Nermin Halilagi?
Human : Research in Rehabilitation , 2011,
Abstract: Organized crime is a complex and in many ways speci c criminal phenomenon, now considered to be the most dangerous form of crime. It appeared relatively recently in both Bosnia and Herzegovina and the other republics of the former Yugoslavia. This work reviews the level of danger organized crime has presented to society through history. The author of the paper also refers to the characteristics of organized crime and highlights the presence of different both international and domestic opinions on the de nition of the concept of organized crime, and the fact that today there is still no universal de nition of the content of this concept. Also mentioned are criminal offenses related to organized crime.
CEM: THE FIRST COMIC BOOK IN WESTERN SENSE IN THE DEVELOPMENT OF TURKISH HUMOUR YAZILI TüRK M ZAHININ GEL M SüREC NDE BATILI ANLAMDA LK M ZAH DERG S : CEM
Nermin YAZICI
Turkish Studies , 2011,
Abstract: Media played a significant role in the modernization of Ottoman society and caused westernized styles and methods be recognized and adopted. Media also pioneered in the production and development of comic books and works. Making use of both the earnings of traditional theatre and oral story telling tradition, the media evolved into modern humour concept during the period of Second Constitutional Monarchy. It was during this period that caricatures became a common practice in the newspapers and ironic individualist approaches were seen. The simple characterization of oral storytelling and traditional theatre began to transform as a result of modern humour concept. With its caricatures and own humorist sense towards the events in the era the journal Cem deserves to be called the first representative of comic books among those of others in the western sense during the period of Second Constitutional Monarchy. Osmanl modernle mesinde son derece nemli bir rol oynayan bas n, pek ok türün ortaya kmas nda, Bat l türlerin ve anlay lar n tan nmas nda ve yayg nl k kazanmas nda nemli rol oynam t r. Yaz l mizah ürünlerinin ortaya kmas nda ve modern mizah anlay n n geli mesine de yaz l bas n ncülük etmi tir. S zlü gelenek ve geleneksel tiyatronun k klü birikiminden de yararlanan yaz l mizah, zellikle II. Me rutiyet d neminde modern mizah anlay na evrilir. Karikatürün dergilerde yerle mesi, bireysel üslup ve ironi yüklü yakla mlar bu d nemde a rl k kazan r. S zlü mizah ve geleneksel tiyatro anlay n n uyum kazand ran, yal nkat karakterizasyonu modern mizah anlay la birlikte d nü meye ba lar. Cem dergisi, II. Me rutiyet d nemi mizah dergileri i erisinden hem karikatürleriyle hem de d neme ili kin tutumundaki mizahi anlay la Bat l anlamda ilk mizah dergimiz olarak temsil edici bir zellik g sterir.
Ethics in oncology nursing
Nermin ERSOY
Turkish Journal of Oncology , 2009,
Abstract: In the process of cancer treatment and care, the ethical duties of the cancer nurses contribute to preventing ethical dilemmas, resolving ethical problems, and most importantly maintaining an ethical cancer care system. The ethical duties of humanistic caregiving, disclosure, honesty, relief of pain and suffering, fair distribution of resources, provision of adequate palliative care, and assistance to patients and families for imminent death, which are the hallmarks of oncology nursing, are justified by the values, professional standards and the contemporary roles of nursing. Therefore, ethical competency of the oncology nurse is an inevitable requirement.
Real elements in the mapping class group of $T^2$
Nermin Salepci
Mathematics , 2010, DOI: 10.1016/j.topol.2010.06.012
Abstract: We present a complete classification of elements in the mapping class group of the torus which have a representative that can be written as a product of two orientation reversing involutions. Our interest in such decompositions is motivated by features of the monodromy maps of real fibrations. We employ the property that the mapping class group of the torus is identifiable with $SL(2,\Z)$ as well as that the quotient group $PSL(2,\Z)$ is the symmetry group of the {\em Farey tessellation} of the Poincar\'e disk.
Invariants of real Lefschetz fibrations
Nermin Salepci
Mathematics , 2011,
Abstract: In this note we introduce certain invariants of real Lefschetz fibrations. We call these invariants {\em real Lefschetz chains}. We prove that if the fiber genus is greater than 1, then the real Lefschetz chains are complete invariants of real Lefschetz fibrations with only real critical values. If however the fiber genus is 1, real Lefschetz chains are not sufficient to distinguish real Lefschetz fibrations. We show that by adding a certain binary decoration to real Lefschetz chains, we get a complete invariant.
Classification of totally real elliptic Lefschetz fibrations via necklace diagrams
Nermin Salepci
Mathematics , 2011,
Abstract: We show that totally real elliptic Lefschetz fibrations that admit a real section are classified by their "real loci" which is nothing but an $S^1$-valued Morse function on the real part of the total space. We assign to each such real locus a certain combinatorial object that we call a \emph{necklace diagram}. On the one hand, each necklace diagram corresponds to an isomorphism class of a totally real elliptic Lefschetz fibration that admits a real section, and on the other hand, it refers to a decomposition of the identity into a product of certain matrices in $PSL(2,\Z)$. Using an algorithm to find such decompositions, we obtain an explicit list of necklace diagrams associated with certain classes of totally real elliptic Lefschetz fibrations. Moreover, we introduce refinements of necklace diagrams and show that refined necklace diagrams determine uniquely the isomorphism classes of the totally real elliptic Lefschetz fibrations which may not have a real section. By means of necklace diagrams we observe some interesting phenomena underlying special feature of real fibrations.
High Accuracy Time of Flight Measurement Using Digital Signal Processing Techniques for Subsea Applications  [PDF]
Muhammad Ashraf, Hamza Qayyum
Journal of Signal and Information Processing (JSIP) , 2011, DOI: 10.4236/jsip.2011.24047
Abstract: The techniques widely used in ultrasonic measurements are based on the determination of the time of flight (T.o.F). A short train of waves is transmitted and same transducer is used for reception of the reflected signal for the pulse-echo measurement applications. The amplitude of the received waveform is an envelope which starts from zero reaches to a peak and then dies out. The echoes are mostly detected by simple threshold crossing technique, which is also cause of error. In this paper digital signal processing is used to calculate the time delay in reception i.e. T.o.F, for which a maximum similarity between the reference and the delayed echo signals is obtained. To observe the effect of phase uncertainties and frequency shifts (Doppler), this processing is carried out, both directly on the actual wave shape and after extracting the envelopes of the reference and delayed echo signals. Several digital signal processing algorithms are considered and the effects of different factors such as sampling rate, resolution of digitization and S/N ratio are analyzed. Result show accuracy, computing time and cost for different techniques.
Page 1 /641
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.