Search
Now showing items 1-10 of 12
From the Atlantic Pact to NATO: Debating Turkey's location and function in the Turkish Grand National Assembly
(International Relations Council of Turkey, 2012)
This article, using critical geopolitics as a framework, analyzes identity formation in Turkey during Turkey's NATO accession. The main thesis of this article is that identity that is made through foreign policy discourse ...
Applications of ML/DL in the management of smart cities and societies based on new trends in information technologies: A systematic literature review
(Elsevier, 2022)
The goal of managing smart cities and societies is to maximize the efficient use of finite resources while enhancing the quality of life. To establish a sustainable urban existence, smart cities use some new technologies ...
Resilient and dependability management in distributed environments: a systematic and comprehensive literature review
(Springer, 2023)
With the galloping progress of the Internet of Things (IoT) and related technologies in multiple facets of science, distribution environments, namely cloud, edge, fog, Internet of Drones (IoD), and Internet of Vehicles ...
Adults' recollection of the earliest memories: early parental elaboration mediated the link between attachment and remembering
(Springer, 2022)
Social interactions are a major factor in organizing the earliest experiences in the memory system. In the current study, we tested the role of parental reminiscing on the relationship between parental attachment and ...
Cloud healthcare services: A comprehensive and systematic literature review
(Wiley, 2022)
Over the last decade, the landscape of cloud computing has been significantly changed. It has been known as a paradigm in which a shared pool of computing resources is accessible for users. The rapid growth of the healthcare ...
AnomalyAdapters: Parameter-Efficient Multi-Anomaly Task Detection
(IEEE-Inst Electrical Electronics Engineers Inc, 2022)
The emergence of technological innovations brings sophisticated threats. Cyberattacks are increasing day by day aligned with these innovations and entails rapid solutions for defense mechanisms. These attacks may hinder ...
Physical-Layer Security in 6G Networks
(IEEE-Inst Electrical Electronics Engineers Inc, 2021)
The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us. These ...
Security and Reliability Performance of Noise-Loop Modulation: Theoretical Analysis and Experimentation
(IEEE-Inst Electrical Electronics Engineers Inc, 2022)
Security is a crucial feature of current (5G) and even more for future (6G) communication networks. While the innate nature of the wireless channel is an issue for guaranteeing security, its physical characteristics can ...
Blockchain Systems in Embedded Internet of Things: Systematic Literature Review, Challenges Analysis, and Future Direction Suggestions
(Mdpi, 2022)
Internet of Things (IoT) environments can extensively use embedded devices. Without the participation of consumers; tiny IoT devices will function and interact with one another, but their operations must be reliable and ...
Secure Transmission for THz-Empowered RIS-Assisted Non-Terrestrial Networks
(IEEE-Inst Electrical Electronics Engineers Inc, 2023)
The non-terrestrial networks (NTNs) are recognized as a key component to provide cost-effective and high-capacity ubiquitous connectivity in the future wireless communications. In this paper, we investigate the secure ...