Erişim şekli için "info:eu-repo/semantics/closedAccess" Bilgisayar Mühendisliği Bölümü Koleksiyonu listeleme
Toplam kayıt 33, listelenen: 21-33
-
On constituent chunking for Turkish
(Elsevier Sci Ltd, 2018)Chunking is a task which divides a sentence into non-recursive structures. The primary aim is to specify chunk boundaries and classes. Although chunking generally refers to simple chunks, it is possible to customize the ... -
Opportunities and Challenges in Metaverse for Industry 4.0 and Beyond Applications
(Institute of Electrical and Electronics Engineers Inc., 2022)Metaverse is the next generation of Internet-based applications and social forms using various cutting-edge technologies, such as virtual reality, augmented reality, 3D holographic avatars, video, cloud computing, etc. It ... -
Preclinical Molecular Signatures of Spinal Cord Functional Restoration: Optimizing the Metamorphic Axolotl (Ambystoma mexicanum) Model in Regenerative Medicine
(Mary Ann Liebert, Inc, 2020)Regenerative medicine offers hope for patients with diseases of the central and peripheral nervous system. Urodele amphibians such as axolotl display an exceptional regenerative capacity and are considered as essential ... -
Random Test Generation from Regular Expressions for Graphical User Interface (GUI) Testing
(Institute of Electrical and Electronics Engineers Inc., 2019)Generation of test sequences, that is, (user) inputs - expected (system) outputs, is an important task of testing of graphical user interfaces (GUI). This work proposes an approach to randomly generate test sequences that ... -
Recreating a Large-Scale BGP Incident in a Realistic Environment
(Springer, 2013)The Internet has become a critical asset for both the economy and the society. Realistic experimentation environments are needed to study and improve the resilience and the stability of the Internet. In this paper, we ... -
Religion and the Construction of Ethnic Identity in Kyrgyzstan
(Slavica Publishers, 2017)With the introduction of new definitions of religion and religious actors, defining the relationship of Islam to national identity has been essential for the post-Soviet Central Asian states. This work, based on qualitative ... -
Segment-aware dynamic routing for DASH flows over software-defined networks
(Wiley, 2020)Most of the video streaming applications running over the Internet send video data over HTTP and provide an architecture for video clients to adapt video quality during streaming. In HTTP adaptive streaming, a raw video ... -
SSI meets Metaverse for Industry 4.0 and Beyond
(Institute of Electrical and Electronics Engineers Inc., 2022)As the global industrial complex gears toward fulfilling the tenets of Industry 4.0 and beyond, technologies such as distributed ledger technologies, digital twins, and artificial intelligence become pivotal enablers. In ... -
Statistical principal components analysis for retrieval experiments
(Wiley, 2007)In this article, the statistical principal components analysis (PCA) is proposed as a method for performance comparisons of different retrieval strategies. It is shown that the PCA method can reveal implicit performance ... -
Sustainable Member Motivation System Proposal for NGOs: NGO-TR
(Institute of Electrical and Electronics Engineers Inc., 2019)Non-governmental organizations (NGO) depend on their members to survive. They need to reach the potential volunteers. They also aspire to keep track of their members' effectiveness and to motivate those members to be more ... -
Twister2 Cross-platform resource scheduler for big data
(Wiley, 2021)Twister2 is an open-source big data hosting environment designed to process both batch and streaming data at scale. Twister2 runs jobs in both high-performance computing (HPC) and big data clusters. It provides a cross-platform ... -
Usage of Machine Learning Algorithms for Flow Based Anomaly Detection System in Software Defined Networks
(Springer, 2021)Computer networks are becoming more complex in the number of connected nodes and the amount of traffic. The growing number and increasing complexity of cyber-attacks makes network management and security a challenge. ... -
A Web Technology Based Smart hmergency Room System Recommendation: SmartER
(Ieee, 2017)This study aims to design a web technology based Emergency System (SmartER) system, which will enable the doctors and nurses to perform the patient related procedures more quickly and smoothly in the emergency departments. ...