Now showing items 1-10 of 15
Automated testing for distributed databases with fuzzy fragment reallocation
(TUBİTAK Scientific & Technical Research Council Turkey, Ataturk Bulvarı No 221, Kavaklıdere, Ankara, 00000, Turkey, 2018)
As the Internet and big data become more widespread, relational database management systems (RDBMSs) become increasingly inadequate for web applications. To provide what RDBMSs cannot, during the past 15 years distributed ...
Computer aided autism threapy system design
(IEEE, 345 E 47th St, New York, Ny 10017 USA, 2015)
Autism spectrum disorder is a developmental disorder such as Asperger's or Rett Syndrome, which damages social interaction and contact with the environment of individuals that prevents brain development. In Turkey, 600,000 ...
Special issue: soft computing in software engineering preface
(Elsevier Science Bv, Po Box 211, 1000 AE Amsterdam, Netherlands, 2016-12)
Fetal health status prediction based on maternal clinical history using machine learning techniques
(Elsevier Ireland Ltd, Elsevier House, Brookvale Plaza, East Park Shannon, Co, Clare, 00000, Ireland, 2018)
Background and Objective: Congenital anomalies are seen at 1-3% of the population, probabilities of which are tried to be found out primarily through double, triple and quad tests during pregnancy. Also, ultra-sonographical ...
Automatic energy expenditure measurement for health science
(Elsevier Ireland Ltd, Elsevier House, Brookvale Plaza, East Park Shannon, Co, Clare, 00000, Ireland, 2018-04)
Background and objective: It is crucial to predict the human energy expenditure in any sports activity and health science application accurately to investigate the impact of the activity. However, measurement of the real ...
On the effectiveness of virtual reality in the education of software engineering
(Wiley, 111 River St, Hoboken 07030-5774, NJ USA, 2018-07)
The popularity of virtual reality headsets have been rapidly increasing. With this technology, students can efficiently interact with the course content and learn the material faster than the traditional methodologies. In ...
Deep Learning Approaches for Predictive Masquerade Detection
(Wiley-Hindawi, Adam House, 3rd Fl, 1 Fitzroy Sq, London, Wit 5He, England, 2018)
In computer security, masquerade detection is a special type of intrusion detection problem. Effective and early intrusion detection is a crucial factor for computer security. Although considerable work has been focused ...
Control in networked systems with fuzzy logic
(Tubitak Scientific & Technical Research Council Turkey, Ataturk Bulvarı No 221, Kavaklıdere, Ankara, 00000, Turkey, 2013)
Recently, the development of control systems based on network-based architecture is getting very high attention. Because of its fast data communication, network-based control is in high demand. However, there are some ...
Son Kullanıcı Geliştirme için Otomatik Kod Üretim Aracının Tasarımı ve GerçeklenmesiDesign and Implementation of an Automatic Code Generation Tool for End-User Development
Son kullanıcı geliştirme yaklaşımları; yazılım mühendisi olmayan kullanıcıların, yazılım çıktılarını kendilerinin oluşturabileceği, değiştirebileceği ve uyarlayabileceği teknolojiler ve yöntemlere odaklanmaktadır. Bu ...
VinJect: Toolkit for Penetration Testing and Vulnerability ScanningVinJect: Sızma Testi ve Güvenlik Açığı Taraması Aracı
Penetration testing plays an important role in the development of secure software products and electronic systems. Sustainability of commercial systems is ensured through the regular scans of vulnerability. In this era ...