Ara
Toplam kayıt 8, listelenen: 1-8
A mobile haemodialysis patient care expert system
(Işık Üniversitesi, 2005-10)
A mobile haemodialysis patient care expert system is explaining the situations and their treatments which required urgent enterprise during the interval of the two hemodialysis sessions. The user of this system is the adult ...
A matlab graphical user interface for simulation of medical ultrasonic imaging
(Işık Üniversitesi, 2004-09)
The aim of this study is to create a Graphical User Interface(GUI) fort he aquistic image simulation. To this date the simlations were hard to make as there were two separate prgrams to run , one to generate data other to ...
A semantic web application using ontology web language (OWL)
(Işık Üniversitesi, 2004-09)
With the web, accessing and using information between remote systems became easier for people in comparison to the years before the web, but web users are still limited in their ability to reach and use this information. ...
Ipcube personal firewall on linux
(Işık Üniversitesi, 2004-06)
The aim of this project is to developing a personal firewall which will have functionalities in a regular firewall also will have the missing functions like configuring firewall from any platform and any location via ...
Ipwall design and implementation of a gateway frewall on linux
(Işık Üniversitesi, 2004)
The aim of the this project is to develop a firewall which will have functionailities in a regular firewall also will have the missing functions like configuring firewall from any platform and any location via internet ...
Key exchange methods in ad hoc networking
(Işık Üniversitesi, 2005-04)
Ad hoc network is a networking structure, which does not require a previous configuration or adjustment. Such as a network can be established anywhere and anytime, when just two or more communication devices come across. ...
Risk scalable and modular security architectures
(Işık Üniversitesi, 2005-04)
Network security is ensuring the availability, the integrity and the confidentiality in the business activities. Network security is not only limiting acess to the resources; İt is mainly structring the acess to the match ...
A mobile agent platform and an example agent application
(Işık Üniversitesi, 2004-10)
Use and adaptation of software agents in a wide variety of applications are highly expected since they are particularly useful in distributed applications involving peer-to-peer processes. They tend to be applied in many ...