Erişim şekli için "info:eu-repo/semantics/closedAccess" Bilgisayar Mühendisliği Bölümü Koleksiyonu listeleme
Toplam kayıt 33, listelenen: 1-20
-
ABRF Proteome Informatics Research Group (iPRG) 2015 Study: Detection of Differentially Abundant Proteins in Label-Free Quantitative LC-MS/MS Experiments
(Amer Chemical Soc, 2017)Detection of differentially abundant proteins in label-free quantitative shotgun liquid chromatography tandem mass spectrometry (LC-MS/MS) experiments requires a series of computational steps that identify and quantify ... -
Analysis of Popularity Degradation in P2P Overlay Topology
(Institute of Electrical and Electronics Engineers Inc., 2022)Unstructured Peer-to-Peer(P2P) networks can scale to very large number of peers. Therefore, the topology of the P2P networks affects the performance of searches to find items. Popularity based P2P overlay topologies are ... -
An Augmented Reality Application for Smart Campus Urbanization: MSKU Campus Prototype
(Ieee, 2017)Augmented Reality applications are used in almost every area of our lives. These applications have been started to use in the town planning and smart city applications. In this study, a prototype application was developed ... -
Augmented Reality Application for Smart Tourism: GokovAR
(Ieee, 2018)Usage of augmented reality technology in daily life is becoming more widespread. This technology is also being applied in the field of tourism. In this study, a prototype of mobile application for smart tourism has been ... -
Blockchain Based Secure Communication Application Proposal: Cryptouch
(Ieee, 2018)The convergence which brought with the globalizing world, highly affects the network and the communication sectors. Mostly closed source and centralized systems are used for network and communication. This contradicts with ... -
Blockchain Based Trusted Adoption and Fostering System Proposal for Turkish Animal Shelters
(Institute of Electrical and Electronics Engineers Inc., 2019)Animal shelters are known as safe places which are managed by governmental or nongovernmental organizations, however the way these establishments harboring animals is a controversial issue. Almost every country in the world ... -
Blockchain-Based Secure Recognized Air Picture System Proposal for NATO Air C2 Capabilities
(Springer, 2020)The command and control (C2) systems are of prime importance for leveraging the superiority of the air forces in combat operations. The key element for these systems is a single, coherent recognized air picture (RAP) which ... -
Comparison of protein expression profile of limb regeneration between neotenic and metamorphic axolotl
(Academic Press Inc Elsevier Science, 2020)The axolotl (Ambystoma mexicanum) salamander, a urodele amphibian, has an exceptional regenerative capacity to fully restore an amputated limb throughout the life-long lasting neoteny. By contrast, when axolotls are ... -
A computational morphological lexicon for Turkish: TrLex
(Elsevier Science Bv, 2018)A morphological lexicon that is a computational source should be considered together with derivational morphology especially for agglutinative languages. To the best of our knowledge, in the Turkish language there has been ... -
DASH-QoS: A scalable network layer service differentiation architecture for DASH over SDN
(Elsevier, 2019)As one of the key technologies residing in the future Internet concepts, Software Defined Networking (SDN) makes it possible to develop application-centric flow routing strategies. Thanks to the benefits offered by the SDN ... -
Design and Implementation of SDN-Based Secure Architecture for IoT-Lab
(Springer, 2020)There are various IoT devices with many different hardware environments and an ecosystem that will enable these various devices to work together is not yet existent. As IoT networks are becoming more widespread, the number ... -
Digital Twin Security Threats and Countermeasures: An Introduction
(Institute of Electrical and Electronics Engineers Inc., 2021)The digital twin is based on integrated technologies such as the Internet of Things (IoT), Cloud Computing, Machine Learning, and Artificial Intelligence. The digital twin has become an important method of the digital ... -
First case with RANBP2 biallelic mutation and severe acute necrotizing encephalopathy phenotype
(Elsevier B.V., 2022)Familial acute necrotizing encephalopathy (ANE) is a rapidly progressive encephalopathy that can occur after common viral infections at different stages of life. The clinical findings of 2 siblings diagnosed with ANE were ... -
A framework for investigating search engines’ stemming mechanisms: A case study on Bing
(John Wiley and Sons Ltd, 2021)Big data attracts the attention of governments and a lot of companies today. The developments in technology and the Internet make it one of the important sources of big data. It is easy to get lost in the enormous amount ... -
Machine Learning Methods for Virus–Host Protein–Protein Interaction Prediction
(Humana Press Inc., 2023)The attachment of a virion to a respective cellular receptor on the host organism occurring through the virus–host protein–protein interactions (PPIs) is a decisive step for viral pathogenicity and infectivity. Therefore, ... -
Merkezi Olmayan Uygulamalar için Geli ̧stirme ve Test Ortamı: Chainex
(Institute of Electrical and Electronics Engineers Inc., 2021)Decentralized services are increasingly being developed and their proper usage in different areas is being experimented with. Autonomous codes, which are also called smart contracts, can be developed with Integrated ... -
Minimizing Total Logistics Cost for Long-Haul Multi-Stop Truck Transportation
(SAGE PUBLICATIONS, 2021)Whenever there is sufficient demand, companies generally prefer the full truckload (TL) option for long-distance transport, resulting in large and less frequent shipment operations that can be costly if inventory carrying ... -
Model-based ideal testing of hardware description language (HDL) programs
(SPRINGER HEIDELBERG, 2021)An ideal test is supposed to show not only the presence of bugs but also their absence. Based on the Fundamental Test Theory of Goodenough and Gerhart (IEEE Trans Softw Eng SE-1(2):156-173, 1975), this paper proposes an ... -
Models in Graphical User Interface Testing: Study Design
(IEEE, 2020)Model-based GUI testing is an important concept in Software GUI testing. Manual testing is a time-consuming labor and heavily error-prone. It has several well-accepted models that Software Testing community has been working ... -
NFT based Fundraising System for Preserving Cultural Heritage: Heirloom
(IEEE, 17.09.2021)Cultural heritage assets are in danger of extinction or damage due to lack of publicity and financial problems. Technological advances can play a role in their preservation and promotion. This study aims to create a ...