Now showing items 72-86 of 86

    • Simulating Retrieval From A Highly Clustered Network: Implications For Spoken Word Recognition 

      Vitevitch, Michael S.; Ercal, Güneş; Adagarla, Bhargav (Frontiers Research Foundation, Po Box 110, Lausanne, 1015, Switzerland, 2011)
      Network science describes how entities in complex systems interact, and argues that the structure of the network influences processing. Clustering coefficient, C one measure of network structure refers to the extent to ...
    • Sintering effect on mechanical properties of composites of bovine hydroxyapatite (BHA) and Li2O 

      Oktar, Faik Nüzhet; Demirer, M. R.; Gündüz, Oğuzhan; Agathopoulos, S.; Peker, I.; Özyeğin, L. S.; Salman, Serdar (Trans Tech Publications Ltd, Brandrain 6, Ch-8707 Zurich-Uetikon, Switzerland, 2006)
      In this study, hydroxyapatite (HA) material, obtained from calcinated bovine bone (BHA), was mixed with 0.25, 0.50, 1.00, and 2.00 wt% Li2CO3. The pressed pellets were sintered at various sintering temperatures between 900 ...
    • Smart wearable patient tracking systems 

      Patlar Akbulut, Fatma; Akan, Aydın (IEEE, 345 E 47th St, New York, Ny 10017 USA, 2015)
      Nowadays Smart Wearable Systems (SWS) subject, emerges as one of the most popular research topic. Becouse of being comprimised from multiple disciplines, this area is favored by researchers of different areas. Devices of ...
    • Software mining and fault prediction 

      Çatal, Çağatay (Wiley Periodicals, Inc, One Montgomery St, Suite 1200, San Francisco, Ca 94104 Usa, 2012-10)
      Mining software repositories (MSRs) such as source control repositories, bug repositories, deployment logs, and code repositories provide useful patterns for practitioners. Instead of using these repositories as record-keeping ...
    • Solution of counter diffusion problem with position dependent diffusion coefficent by using variational methods 

      Yüksek, Kemal; Koca, Yeliz; Sadıkoğlu, Hasan (ELSEVIER SCIENCE BV, PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS, 2009-10-15)
      Unsteady state counter diffusion problem with position dependent diffusion coefficient can be modeled using Fick's second law. A mathematical model was constructed and solved to quantitatively describe the dynamic behavior ...
    • Son Kullanıcı Geliştirme için Otomatik Kod Üretim Aracının Tasarımı ve Gerçeklenmesi 

      Akbulut, Akhan (2017)
      Son kullanıcı geliştirme yaklaşımları; yazılım mühendisi olmayan kullanıcıların, yazılım çıktılarını kendilerinin oluşturabileceği, değiştirebileceği ve uyarlayabileceği teknolojiler ve yöntemlere odaklanmaktadır. Bu ...
    • Special issue: soft computing in software engineering preface 

      Çatal, Çağatay; Bayrak, Coşkun; Nassif, Ali Bou; Polat, Kemal; Akbulut, Akhan (Elsevier Science Bv, Po Box 211, 1000 AE Amsterdam, Netherlands, 2016-12)
    • Structure-Preserving And Query-Biased Document Summarisation For Web Searching 

      Pembe, F. Canan; Güngör, Tunga (Emerald Group Publishing Limited, Howard House, Wagon Lane, Bingley Bd16 1Wa, W Yorkshire, England, 2009)
      Purpose - The purpose of this paper is to develop a new summarisation approach, namely structure-preserving and query-biased summarisation, to improve the effectiveness of web searching. During web searching, one aid for ...
    • Test Case Prioritization: a Systematic Mapping Study 

      Çatal, Çağatay; Mishra, Deepti (Springer, Van Godewijckstraat 30, 3311 Gz Dordrecht, Netherlands, 2013-09)
      Test case prioritization techniques, which are used to improve the cost-effectiveness of regression testing, order test cases in such a way that those cases that are expected to outperform others in detecting software ...
    • The role of search engine optimization on keeping the user on the site 

      Eğri, Gökhan; Bayrak, Coşkun (Elsevier Science Bv, Sara Burgerhartstraat 25, Po Box 211, 1000 Ae Amsterdam, Netherlands, 2014)
      In today's technology, the role of internet is rapidly increasing and will continue to do so in the future. In this rapid increase, the right data access and integration has become a challenge. Since 93% of internet traffic ...
    • The Ten Best Practices for Test Case Prioritization 

      Çatal, Çağatay (Springer-Verlag Berlin, Heidelberger Platz 3, D-14197 Berlin, Germany, 2012)
      In this study, test case prioritization approaches that are used to execute the regression testing in a cost-effective manner were investigated. We discussed the critical issues and best practices that a software company ...
    • The use of cross-company fault data for the software fault prediction problem 

      Çatal, Çağatay (TUBİTAK Scientific & Technical Research Council Turkey, Ataturk Bulvarı No 221, Kavaklıdere, Ankara, 00000, Turkey, 2016)
      We investigated how to use cross-company (CC) data in software fault prediction and in predicting the fault labels of software modules when there are not enough fault data. This paper involves case studies of NASA projects ...
    • VinJect: Toolkit for Penetration Testing and Vulnerability Scanning 

      Akbulut, Akhan (2018)
      Penetration testing plays an important role in the development of secure software products and electronic systems. Sustainability of commercial systems is ensured through the regular scans of vulnerability. In this era ...
    • Virtual reality based rehabilitation system for Parkinson and multiple sclerosis patients 

      Kihe, Maria Merve; Muratlı, Ömer Can; Çatal, Çağatay (IEEE, 345 E 47Th St, New York, Ny 10017 USA, 2017)
      The aim of this study is to present a virtual reality based rehabilitation system for Parkinson and Multiple Sclerosis (MS) patients. In this study, physical rehabilitation software has been developed using Virtual Reality ...
    • Wavelength Division Multiplexing and Energy Efficiency 

      Aydın, Muhammed Ali (2016-10)
      Energy is hot topic in the improvements of the technology because energy efficiency topic is very important for future generations with the growing population in the world. Recently, hardware and functional structures ...