Search
Now showing items 1-10 of 22
CAVE Sanal Gerçeklik Teknolojisinin Üniversite-Sanayi İşbirliği Açısından Değerlendirilmesi ve Örnek bir Durum ÇalışmasıThe Evaluation of CAVE Virtual Reality Technology for the University-Industry Collaboration and a Case Study
(2019-03)
CAVE (CAVE Automatic Virtual Environment) sanal gerçeklik teknoloji altyapısı, yurt dışındaki üniversiteler ve araştırma kurumları
tarafından, son dönemde farklı fonlarla kurulmaya başlanmış ancak Türkiye’de henüz bir ...
Son Kullanıcı Geliştirme için Otomatik Kod Üretim Aracının Tasarımı ve GerçeklenmesiDesign and Implementation of an Automatic Code Generation Tool for End-User Development
(2017)
Son kullanıcı geliştirme yaklaşımları; yazılım mühendisi
olmayan kullanıcıların, yazılım çıktılarını kendilerinin
oluşturabileceği, değiştirebileceği ve uyarlayabileceği teknolojiler
ve yöntemlere odaklanmaktadır. Bu ...
VinJect: Toolkit for Penetration Testing and Vulnerability ScanningVinJect: Sızma Testi ve Güvenlik Açığı Taraması Aracı
(2018)
Penetration testing plays an important role in the development of secure software products and electronic systems. Sustainability of commercial systems is ensured through the regular scans of vulnerability. In this era ...
Benchmarking of Regression Algorithms and Time Series Analysis Techniques for Sales Forecasting
(2019-01)
— Predicting the sales amount as close as to the actual
sales amount can provide many benefits to companies. Since the
fashion industry is not easily predictable, it is not
straightforward to make an accurate prediction ...
Software Versioning with Microservices through the API Gateway Desing Pattern
(2019-06)
he microservices architecture is a relatively new approach in implementing service-oriented systems. This cloud native architectural style enables the implementation of loosely coupled, agile, reuse-oriented, and lightweight ...
Development of a software vulnerability prediction web service based on artificial neural networks
(2017)
Detecting vulnerable components of a web application is an important activity to allocate verification resources effectively. Most of the studies proposed several vulnerability prediction models based on private and public ...
Deep Learning Approaches for Phantom Movement Recognition
(2019-11-03)
Phantom limb pain has a negative effect on the life of individuals as a frequent consequence of limb amputation. The movement ability on the lost extremity can still be maintained after the amputation or deafferentation, ...
Computer aided autism threapy system design
(IEEE, 345 E 47th St, New York, Ny 10017 USA, 2015)
Autism spectrum disorder is a developmental disorder such as Asperger's or Rett Syndrome, which damages social interaction and contact with the environment of individuals that prevents brain development. In Turkey, 600,000 ...
Deep Learning Approaches for Predictive Masquerade Detection
(Wiley-Hindawi, Adam House, 3rd Fl, 1 Fitzroy Sq, London, Wit 5He, England, 2018)
In computer security, masquerade detection is a special type of intrusion detection problem. Effective and early intrusion detection is a crucial factor for computer security. Although considerable work has been focused ...
Code Generator Framework for Smart TV Platforms
(INST ENGINEERING TECHNOLOGY-IET, MICHAEL FARADAY HOUSE SIX HILLS WAY STEVENAGE, HERTFORD SG1 2AY, ENGLAND, 2019-08)
In recent years, smart TVs have become more common, making them need to be included as targets for the software industry. In this study, the authors developed a code generator framework and demonstrated it in an architectural ...