Papers by Muhammed Mehmet Aydin
In every era there are some people misunderstand or misinterpret theQur'anic verses. We know ... more In every era there are some people misunderstand or misinterpret theQur'anic verses. We know that these misunderstandings and errors in theinterpretation of the Qur'anic verses are found in exegesis greatly.However, we observe that during the time of the Prophet, he himselfcorrected these errors, whereas in the time of companians these errorsare corrected by the scholars. Here we try to show that these errors canbe corrected in the light of the examples which were shown by theProphet.
Bookmarks Related papers MentionsView impact
Cumhuriyet Medical Journal, Jun 11, 2010
Özet Caroli hastalığı intrahepatik safra yollarının kistik dilatasyonu ile karakterize, konjenita... more Özet Caroli hastalığı intrahepatik safra yollarının kistik dilatasyonu ile karakterize, konjenital, nadir görülen bir hastalığıdır. Caroli hastalığının klinik özellikleri hepatolitiazis veya bakteriyel kolanjite bağlı olarak gelişen sarılık, sağ üst kadran ağrısı, ateşi kapsamaktadır. ...
Bookmarks Related papers MentionsView impact
Sakarya Universitesi Ilahiyat Fakultesi Dergisi, 2002
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Optical networks enable the solution of many problems seen in current computer networks. In addit... more Optical networks enable the solution of many problems seen in current computer networks. In addition to providing a very high capacity, they also provide a common network infrastructure that supports various services. Also in optical networks, bandwidth can be adjusted in a flexible manner if necessary. Optical switches and networks can be divided into two categories that are slotted and unslotted. Slotted is based on fixed-length time slots and synchronous packet processing. In unslotted, packet length is variable. In this study, the structures of Slotted Optical Burst Switching and Slotted Optical Packet Switching networks are examined. Besides, Slotted Optical Burst Switching and Slotted Optical Packet Switching techniques in the literature are analyzed and the studies to improve the networks in which these techniques are used are addressed.
Bookmarks Related papers MentionsView impact
Sakarya Universitesi Egitim Fakultesi Dergisi, 2007
'Bu makale, cocuk egitiminde en etkin unsurlardan biri olan “odul ve ceza” konusunu Kur’an ve... more 'Bu makale, cocuk egitiminde en etkin unsurlardan biri olan “odul ve ceza” konusunu Kur’an ve sunnet isiginda ele almaktadir. Makalede cocuk egitimi acisindan odul ve cezanin yeri ve onemi ortaya konmaya calisilmistir. Bu baglamda muhatabm bir cocuk oldugu goz onunde tutularak, odul ve ceza oncesi ornekligin onemine vurgu yapilmistir. Odul ve cezanin islevselligi ve boyutlari, cocugun azarlanniasi, cocuga karsi odul ve cezanin basamaklari uzerinde durulmustur
Bookmarks Related papers MentionsView impact
Sakarya Universitesi Ilahiyat Fakultesi Dergisi, Jun 15, 2009
Bookmarks Related papers MentionsView impact
Journal of Solid State Electrochemistry, 2015
ABSTRACT A polythiophene derivative bearing two (2,2,6,6-tetramethylpiperidin-1-yl)oxidanyl (TEMP... more ABSTRACT A polythiophene derivative bearing two (2,2,6,6-tetramethylpiperidin-1-yl)oxidanyl (TEMPO) radicals per monomer unit has been synthesized and demonstrated to have a completely reversible electrochemical oxidation. This polymer has been incorporated as cathode-active material into a rechargeable Li battery. In this article, we demonstrated construction and charge/discharge characteristics of this organic radical battery. The battery has showed an initial specific discharge capacity of 88.8 Ah/kg (about 82 % of the theoretical capacity which is 108.8 Ah/kg) and an average output voltage of 3.6 V. The specific energy density discharged initially by the battery has been measured to be 321 mWh/g.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
2013 The International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013
Cloud computing is a demanding subject and its fans are increasing day by day in the private or c... more Cloud computing is a demanding subject and its fans are increasing day by day in the private or corporate areas. Confidentiality is the most important point of information security with respect to integrity and availability in cloud computing especially in financial, governmental and military usage. An Intrusion Detection System (IDS) service increases the cloud's security level. In this paper, a hybrid approach is introduced that can be used in cloud computing to protect cloud users from the untrusted cloud providers or untrusted employees in a circular chain protection model. This model is proposed over an existing model, AdjointVM, which uses three types of technologies (trusted computing, host-based IDS, virtual machine monitor based IDS) to tackle external and internal threats in cloud systems. The proposed model claims to overcome one of the weakest points of AdjointVM model, and aims to build a more secure cloud environment for the users by adding additional security mechanism between VMs. In the proposed model, responsibility of confidentiality is not giving up only to the providers or cloud administrators, a VM can protect another VM in a circular manner and this results a chain structure and constructs a circular structure to enhance global security of the system. At the same time, users can also manage and monitor their own confidentiality by themselves.
Bookmarks Related papers MentionsView impact
Journal of Polymer Science Part A: Polymer Chemistry, 2014
Bookmarks Related papers MentionsView impact
Proceedings of the 5th International Conference on Networking and Services, ICNS 2009, 2009
This paper presents a comparative study between JET (Just Enough Time) and a number of new preemp... more This paper presents a comparative study between JET (Just Enough Time) and a number of new preemptive channel scheduling algorithms in optical burst switching (OBS) with QoS (Quality of Service) requirement. In terms of performance criteria, loss rate in byte, access delay and end-to-end delay are considered. A 2-state MMPP (Markov Modulated Poisson Process) traffic generator on a 14-node mesh network topology illustrating NSFNET is designed as the testbed. NS2 Network Simulation tool is used for our tests. Bursts are created using a hybrid model that takes into account both timeout and maximum length threshold mechanisms. In core and edge nodes, in order to satisfy QoS requirements two mechanisms such as Regulative Wavelength Grouping (RWG) and priority based queuing are used. RWG mechanism, where the number of wavelengths for each traffic class is arranged for adjusting the burst drop probability of traffic classes under a specific threshold value, is used for providing priority levels in core nodes. In priority based queuing, bursts are sent according to their priority order, in edge nodes. Simulation works have shown that our preemptive channel scheduling algorithms give better results compared to the other studied algorithms while considering QoS.
Bookmarks Related papers MentionsView impact
Polyhedron, 2011
Bookmarks Related papers MentionsView impact
2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI), 2013
Cloud computing has recently emerged and gained momentum to implement existing networks and data ... more Cloud computing has recently emerged and gained momentum to implement existing networks and data centers in a new architecture to enable services in a timely manner. Although it offers tremendous opportunities, there are some major challenges, such as security, that must be solved for efficient usage. Confidentiality is one of the most important points of information security especially in financial, governmental and military usage. In this paper, we propose a hybrid approach for cloud computing to protect cloud users from the untrusted cloud providers and untrusted employees. The proposed approach is built as an improvement on an existing model, which is called AdjointVM. In this model, it is aimed to overcome one of the weakest points of AdjointVM model, the defenselessness of the protection architecture, and to build a more secure cloud environment for users. In AdjointVM, to protect the VM, there have to be two configured VMs: the protected VM and the protector VM. These VMs are connected in a circular chain to monitor intrusions. Unlike AdjointVM, in which the number of running VMs is proportional to the number of VMs that have to be protected, in the proposed model, this number remains the same, and this results in a decrease in the capital expenditure (capex).
Bookmarks Related papers MentionsView impact
Optical Switching and Networking, 2015
Bookmarks Related papers MentionsView impact
International Journal of Computer Network and Information Security, 2014
Bookmarks Related papers MentionsView impact
2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M), 2013
ABSTRACT Wireless communication has become a very interesting sector for the provision of wireles... more ABSTRACT Wireless communication has become a very interesting sector for the provision of wireless access network, and available almost anytime and anywhere and the popularity is high. As wireless devices are used in offices, houses and universities, the need for strong and secure transport protocols seems to be one of the most important issues in wireless standards. Many organizations today are faced with all kinds of challenges related to security and privacy of their wireless network. In this case, IIUM community wireless access is not an exception, having thousands of subscribers from both staffs and students. Therefore, this paper discusses the current challenges faced by IIUM community wireless network. Specifically, issues that affects the security and privacy of student's data. The target of the study is to examine the awareness and usage of wireless security policy among IIUM students. The results of the in-depth interview and survey revealed that there several wireless security challenges to IIUM wireless security and low student's awareness. Other findings and recommendations were also highlighted in this paper.
Bookmarks Related papers MentionsView impact
2014 11th International Symposium on Wireless Communications Systems (ISWCS), 2014
Access Point (AP) selection in WiFi hotspots is driven by stations and it is based on the measure... more Access Point (AP) selection in WiFi hotspots is driven by stations and it is based on the measured strongest RSSI (Received Signal Strength Indicator) level: any station connects to the AP that provides the higher physical data rate. Although simple and effective in low crowded scenarios with low-medium traffic load, this strategy performs inefficiently when the number of mobile users is high and their distribution among APs is unbalanced, i.e. when network congestion becomes an issue. Load Balancing (LB) solutions aim at solving this problem by enforcing the connection of stations to the AP having either the smallest number of associated stations or the lowest traffic load. However, LB solutions do not account for traffic priorities or, when they consider them, they do not deal with the joint configuration of QoS (Quality of Service) and LB parameters. In this study we present a framework for modeling, analyzing and designing QoS-aware LB solutions. The proposed framework assumes that stations implement the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. Moreover, in order to make the framework concrete, we assume that the QoS goal is the weighted fair allocation of wireless resources. However, the framework is not restricted to this goal and can be easily extended in order to deal with a different cost function. The proposed framework is validated through simulations in a typical indoor LB scenario. The results show that the model is effective in capturing network performance and in designing LB solutions that account for traffic priorities and the configuration of QoS parameters.
Bookmarks Related papers MentionsView impact
2008 Fourth Advanced International Conference on Telecommunications, 2008
Abstract This paper presents a comparison of reservation protocols used in optical burst switches... more Abstract This paper presents a comparison of reservation protocols used in optical burst switches (OBS) with quality of service (QoS). In terms of performance criteria, byte loss rate, end-to-end delay and access delay are considered. A 2-state MMPP (Markov modulated ...
Bookmarks Related papers MentionsView impact
Journal of Polymer Science Part A: Polymer Chemistry, 2013
Bookmarks Related papers MentionsView impact
Uploads
Papers by Muhammed Mehmet Aydin