Yazılım Mühendisliği Bölümü
Permanent URI for this communityhttps://hdl.handle.net/20.500.12416/2146
Browse
Browsing Yazılım Mühendisliği Bölümü by WoS Q "Q3"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Article Citation - WoS: 1Citation - Scopus: 4A Comparative Evaluation of Popular Search Engines on Finding Turkish Documents for A Specific Time Period(Univ Osijek, Tech Fac, 2017) Gorur, Abdul Kadir; Bitirim, YiltanThis study evaluates the popular search engines, Google, Yahoo, Bing, and Ask, on finding Turkish documents by comparing their current performances with their performances measured six years ago. Furthermore, the study reveals the current information retrieval effectiveness of the search engines. First of all, the Turkish queries were run on the search engines separately. Each retrieved document was classified and precision ratios were calculated at various cut-off points for each query and engine pair. Afterwards, these ratios were compared with the six years ago ratios for the evaluations. Besides the descriptive statistics, Mann-Whitney U and Kruskal-Wallis H statistical tests were used in order to find out statistically significant differences. All search engines, except Google, have better performance today. Bing has the most increased performance compared to six years ago. Nowadays: Yahoo has the highest mean precision ratios at various cut-off points; all search engines have their highest mean precision ratios at cut-off point 5; dead links were encountered in Google, Bing, and Ask; and repeated documents were encountered in Google and Yahoo.Article Citation - WoS: 1Citation - Scopus: 3Identifying Criminal Organizations From Their Social Network Structures(Tubitak Scientific & Technological Research Council Turkey, 2019) Genc, Burkay; Sever, Hayri; Cinar, Muhammet SerkanIdentification of criminal structures within very large social networks is an essential security feat. By identifying such structures, it may be possible to track, neutralize, and terminate the corresponding criminal organizations before they act. We evaluate the effectiveness of three different methods for classifying an unknown network as terrorist, cocaine, or noncriminal. We consider three methods for the identification of network types: evaluating common social network analysis metrics, modeling with a decision tree, and network motif frequency analysis. The empirical results show that these three methods can provide significant improvements in distinguishing all three network types. We show that these methods are viable enough to be used as supporting evidence by security forces in their fight against criminal organizations operating on social networks.
