All Stories

  1. Creating Videos from Text: A Review of AI Models Like OpenAI Sora and Stable Diffusion
  2. Generate Impressive Videos with Text Instructions: A Review of OpenAI Sora, Stable Diffusion, Lumiere and Comparable Models
  3. A RAG-based Question Answering System Proposal for Understanding Islam: MufassirQAS LLM
  4. A RAG-based Question Answering System Proposal for Understanding Islam: MufassirQAS LLM
  5. Improving AI Chatbots for Understanding Islam: The MufassirQAS System
  6. Towards A Reliable and Sustainable Question Answering System for Better Understanding of Atatürk's Principles: AtamQAS
  7. Generate Impressive Videos with Text Instructions: A Review of OpenAI Sora, Stable Diffusion, Lumiere and Comparable Models
  8. Secure Virtual Reality Login for the Metaverse: Using Memories and Blockchain
  9. Is ChatGPT Leading the Future of AI? Exploring the Potential and Challenges
  10. Artificial Intelligence, VR, AR and Metaverse Technologies for Human Resources Management
  11. Digital Twins and the Metaverse: A Guide to the Future of Intelligent Systems
  12. Is ChatGPT Leading Generative AI? What is Beyond Expectations?
  13. The Metaverse: How Decentralization is Building the Future of the Internet
  14. Your Avatar, Your Identity in the Metaverse; Use Case: Ready Player Me
  15. OpenAI ChatGPT for Smart Contract Security Testing: Discussion and Future Directions
  16. The Metaverse and Industry 4.0: A Look at the Potential and the Challenges
  17. SSI meets Metaverse for Industry 4.0 and Beyond
  18. SSI meets Metaverse for Industry 4.0 and Beyond
  19. Making the Metaverse Safer: How Decentralized Identity Can Protect You in Industry 4.0
  20. Can Machine-Learning Algorithms Predict the Volcanic Source of Tephra?
  21. DS4H: A Decentralized Network for Blockchain Research and Development
  22. Understanding Cybersecurity Philosophy and Ethics
  23. Can Artificial Intelligence Write Research Papers? Exploring the Potentials
  24. NGO-RMSD: Connecting NGOs and Disaster Relief with Blockchain
  25. Digital Twin Security Threats and Countermeasures: An Introduction
  26. Chainex: Your Easy-to-Use Blockchain App Testing
  27. Saving Our Heritage with NFTs: The Heirloom Project
  28. Using Blockchain and AI to Protect Health Data
  29. Artificial Intelligence for Data-Driven Medical Diagnosis
  30. Using AI and Blockchain to Fight Pandemics: A System for Making Decisions and Managing Resources
  31. Data Storage in Blockchain: Decentralized Solutions and Challenges
  32. Usage of Machine Learning Algorithms for Flow Based Anomaly Detection System in Software Defined Networks
  33. Securing the Skies: A Blockchain-Based System for NATO Air Command & Control
  34. Design and Implementation of SDN-Based Secure Architecture for IoT-Lab
  35. Using a Hybrid Approach to Improve Digital Forensic Investigations of Web Attacks
  36. Using Blockchain to Build Trust in Animal Shelters
  37. Empowering NGOs and Volunteers: NGO-TR, a Blockchain-Based Motivation and Management System
  38. Blockchain-Based Smart Electricity Metering and Billing System
  39. Real-Time Object Detection Application for Visually Impaired People: Third Eye
  40. Using Blockchain to Improve Internet Security: New Solutions for DNS and PKI
  41. Detecting citizen problems and their locations using twitter data
  42. Augmented reality application for smart tourism: GökovAR
  43. Can We Trust Blockchain for Online Voting?
  44. Detecting and Investigating Web Attacks: A Comprehensive Guide
  45. Secure Chat Revolutionized: Introducing Cryptouch, Your Blockchain-Powered Messaging App
  46. Elektronik Sağlık Kayıtlarının Veri Tabanında T-SQL ile Şifrelenmesi ve Başarım Deneyleri
  47. Blockchain-Based Cyber Security Systems
  48. A web technology based smart emergency room system recommendation: SmartER
  49. An augmented reality application for smart campus urbanization: MSKU campus prototype
  50. A Preliminary Survey on the Security of Software-Defined Networks
  51. Akıllı Telefonlarda Gizlilik ve Mahremiyet: Durum Saptaması ve Öneriler (Privacy and Secrecy in Smart Phones: A Case Study and Recommendations)
  52. Recreating a Large-Scale BGP Incident in a Realistic Environment
  53. P2P ile Yaşamak (Living with P2P)