Now showing items 11-20 of 22
Son Kullanıcı Geliştirme için Otomatik Kod Üretim Aracının Tasarımı ve GerçeklenmesiDesign and Implementation of an Automatic Code Generation Tool for End-User Development
Son kullanıcı geliştirme yaklaşımları; yazılım mühendisi olmayan kullanıcıların, yazılım çıktılarını kendilerinin oluşturabileceği, değiştirebileceği ve uyarlayabileceği teknolojiler ve yöntemlere odaklanmaktadır. Bu ...
VinJect: Toolkit for Penetration Testing and Vulnerability ScanningVinJect: Sızma Testi ve Güvenlik Açığı Taraması Aracı
Penetration testing plays an important role in the development of secure software products and electronic systems. Sustainability of commercial systems is ensured through the regular scans of vulnerability. In this era ...
Code Generator Framework for Smart TV Platforms
(INST ENGINEERING TECHNOLOGY-IET, MICHAEL FARADAY HOUSE SIX HILLS WAY STEVENAGE, HERTFORD SG1 2AY, ENGLAND, 2019-08)
In recent years, smart TVs have become more common, making them need to be included as targets for the software industry. In this study, the authors developed a code generator framework and demonstrated it in an architectural ...
A Wearable Device for Virtual Cyber Therapy of Phantom Limb Pain
Phantom limb pain (PLP) is the condition most often occurs in people who have had a limb amputated and it is may affect their life severely. When the brain sends movement signals to the phantom limb, it returns and causes ...
Benchmarking of Regression Algorithms and Time Series Analysis Techniques for Sales Forecasting
— Predicting the sales amount as close as to the actual sales amount can provide many benefits to companies. Since the fashion industry is not easily predictable, it is not straightforward to make an accurate prediction ...
Software Versioning with Microservices through the API Gateway Desing Pattern
he microservices architecture is a relatively new approach in implementing service-oriented systems. This cloud native architectural style enables the implementation of loosely coupled, agile, reuse-oriented, and lightweight ...
Deep Learning Approaches for Phantom Movement Recognition
Phantom limb pain has a negative effect on the life of individuals as a frequent consequence of limb amputation. The movement ability on the lost extremity can still be maintained after the amputation or deafferentation, ...
Special issue: soft computing in software engineering preface
(Elsevier Science Bv, Po Box 211, 1000 AE Amsterdam, Netherlands, 2016-12)
Evaluation of augmented reality technology for the design of an evacuation training game
(SPRINGER LONDON LTD, 236 GRAYS INN RD, 6TH FLOOR, LONDON WC1X 8HL, ENGLAND, 2019-11)
Building evacuation training systems and training employees in an organization have a vital role in emergency cases in which people need to know what to do exactly. In every building, procedures, rules, and actions are ...
Development of a software vulnerability prediction web service based on artificial neural networks
Detecting vulnerable components of a web application is an important activity to allocate verification resources effectively. Most of the studies proposed several vulnerability prediction models based on private and public ...