An Effective Security Method Based on Combining 802.1x, DMZ and SSL-VPN for IoT Network Securityİlhan Fırat Kılınçer, Fatih Ertam, Orhan Yaman, Abdülkadir ŞengürDOI :10.26650/acin.779547Research ArticleenP. 65-76Measuring Financial Form Readability of Technology Companies with Text Mining TechniquesM. Fevzi Esen, Tutku Tuncalı YamanDOI :10.26650/acin.815945Research ArticletrP. 77-97The Parity Sequence Method Approach in Computing Collatz Conjecture via a Computer ProgramMert ÖzkenarDOI :10.26650/acin.843275Research ArticletrP. 97-121Investigating the Association between Employee Silence and Perceived Organizational Support via Data MiningVolkan Yüncü, Üzeyir FidanDOI :10.26650/acin.801398Research ArticletrP. 123-137A Survey on Image Super-Resolution with Generative Adversarial NetworksHürkal Hüsem, Zeynep OrmanDOI :10.26650/acin.765320Review ArticleenP. 139-154Fuzzy Logic: A Content Analysis For Thesis And Article Studies Between 2000-2020Oğuzhan Özdemir, Yusuf KalınkaraDOI :10.26650/acin.762872Review ArticletrP. 155-174