Search
Now showing items 1-10 of 27
A Comparative Study of Smoothing a Vehicle s Trajectory which is Calculated by an Evolutionary Algorithm
(2016-06)
Determining a vehicle’s trajectory is a complex and
hard to solve type problem in the literature and it is identified
as a NP-Hard optimization problem which is studied in different
engineering disciplines such as ...
CAVE Sanal Gerçeklik Teknolojisinin Üniversite-Sanayi İşbirliği Açısından Değerlendirilmesi ve Örnek bir Durum ÇalışmasıThe Evaluation of CAVE Virtual Reality Technology for the University-Industry Collaboration and a Case Study
(2019-03)
CAVE (CAVE Automatic Virtual Environment) sanal gerçeklik teknoloji altyapısı, yurt dışındaki üniversiteler ve araştırma kurumları
tarafından, son dönemde farklı fonlarla kurulmaya başlanmış ancak Türkiye’de henüz bir ...
Son Kullanıcı Geliştirme için Otomatik Kod Üretim Aracının Tasarımı ve GerçeklenmesiDesign and Implementation of an Automatic Code Generation Tool for End-User Development
(2017)
Son kullanıcı geliştirme yaklaşımları; yazılım mühendisi
olmayan kullanıcıların, yazılım çıktılarını kendilerinin
oluşturabileceği, değiştirebileceği ve uyarlayabileceği teknolojiler
ve yöntemlere odaklanmaktadır. Bu ...
VinJect: Toolkit for Penetration Testing and Vulnerability ScanningVinJect: Sızma Testi ve Güvenlik Açığı Taraması Aracı
(2018)
Penetration testing plays an important role in the development of secure software products and electronic systems. Sustainability of commercial systems is ensured through the regular scans of vulnerability. In this era ...
Benchmarking of Regression Algorithms and Time Series Analysis Techniques for Sales Forecasting
(2019-01)
— Predicting the sales amount as close as to the actual
sales amount can provide many benefits to companies. Since the
fashion industry is not easily predictable, it is not
straightforward to make an accurate prediction ...
Bimodal affect recognition based on autoregressive hidden Markov models from physiological signals
(2020-10)
Background and objective: Affect provides contextual information about the emotional state of a person as he/she communicates in both verbal and/or non-verbal forms. While human's are great at determining the emotional ...
Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic
(2020-02-26)
The prevention of intrusion is deemed to be a cornerstone of network security. Although excessive work has been introduced on network intrusion detection in the last decade, finding an Intrusion Detection Systems (IDS) ...
Content-based publish/subscribe communication model between Iot devices in smart city environment
(2019-04)
In recent years the population of the cities has been increasing the getting over half of the whole world population. These peoples are facing with some security and infrastructural needs. Some of these needs can be met ...
Deep Learning Approaches for Predictive Masquerade Detection
(Wiley-Hindawi, Adam House, 3rd Fl, 1 Fitzroy Sq, London, Wit 5He, England, 2018)
In computer security, masquerade detection is a special type of intrusion detection problem. Effective and early intrusion detection is a crucial factor for computer security. Although considerable work has been focused ...
Interactive Data Mining for Molecular Graphs
(Hindawi Publishing Corp, 410 Park Avenue, 15Th Floor, #287 Pmb, New York, Ny 10022 Usa, 2009)
Designing new medical drugs for a specific disease requires extensive analysis of many molecules that have an activity for the disease. The main goal of these extensive analyses is to discover substructures (fragments) ...