Now showing items 1-6 of 6
Automated testing for distributed databases with fuzzy fragment reallocation
(TUBİTAK Scientific & Technical Research Council Turkey, Ataturk Bulvarı No 221, Kavaklıdere, Ankara, 00000, Turkey, 2018)
As the Internet and big data become more widespread, relational database management systems (RDBMSs) become increasingly inadequate for web applications. To provide what RDBMSs cannot, during the past 15 years distributed ...
Fetal health status prediction based on maternal clinical history using machine learning techniques
(Elsevier Ireland Ltd, Elsevier House, Brookvale Plaza, East Park Shannon, Co, Clare, 00000, Ireland, 2018)
Background and Objective: Congenital anomalies are seen at 1-3% of the population, probabilities of which are tried to be found out primarily through double, triple and quad tests during pregnancy. Also, ultra-sonographical ...
Automatic energy expenditure measurement for health science
(Elsevier Ireland Ltd, Elsevier House, Brookvale Plaza, East Park Shannon, Co, Clare, 00000, Ireland, 2018-04)
Background and objective: It is crucial to predict the human energy expenditure in any sports activity and health science application accurately to investigate the impact of the activity. However, measurement of the real ...
On the effectiveness of virtual reality in the education of software engineering
(Wiley, 111 River St, Hoboken 07030-5774, NJ USA, 2018-07)
The popularity of virtual reality headsets have been rapidly increasing. With this technology, students can efficiently interact with the course content and learn the material faster than the traditional methodologies. In ...
Deep Learning Approaches for Predictive Masquerade Detection
(Wiley-Hindawi, Adam House, 3rd Fl, 1 Fitzroy Sq, London, Wit 5He, England, 2018)
In computer security, masquerade detection is a special type of intrusion detection problem. Effective and early intrusion detection is a crucial factor for computer security. Although considerable work has been focused ...
VinJect: Toolkit for Penetration Testing and Vulnerability ScanningVinJect: Sızma Testi ve Güvenlik Açığı Taraması Aracı
Penetration testing plays an important role in the development of secure software products and electronic systems. Sustainability of commercial systems is ensured through the regular scans of vulnerability. In this era ...