90 research outputs found

    Improved Presentation and Facade Layer Operations for Software Engineering Projects

    Get PDF
    Nowadays, one of the most challenging situations for software developers is the presence of a mismatch between relational database systems and programming codes. In the literature, this problem is defined as "impedance mismatch". This study is to develop a framework built on innovations based on the existing Object Relational Mapping technique to solve these problems. In the study, users can perform operations for three different database systems such as MsSQL, MySql and Oracle. In addition, these operations can be done within the framework of C# and Java programming languages. In this framework, while the developers can define database tables in the interface automatically, they can create relations between tables by defining a foreign key. When the system performs these operations, it creates tables, views, and stored procedures automatically. In addition, entity classes in C# and Java for tables and views, and operation classes for stored procedures are created automatically. The summary of the transactions can be taken as pdf file by the framework. In addition, the project can automatically create Windows Communication Foundation classes to facilitate the handling of database elements created and the interfacing operations, as well. This framework, which supports distributed systems, can be downloaded at this link

    The protective effects of red ginseng and amifostine against renal damage caused by ionizing radiation

    Get PDF
    This study aimed to elucidate the effects of amifostine (ethyol) (AM), a synthetic radioprotector, and red ginseng (RG), a natural radioprotective agent, against the toxic effect of ionizing radiation (IR) on kidney tissues through changes in biochemical and histopathological parameters in addition to contributions to the use of amifostine and RG in clinical studies. Five groups were established: Group I (control, receiving only saline by gavage), Group II (IR only), and Group III (IR+AM, 200 mg/kg intraperitoneally (i.p.). Group IV (IR + RG, 200 mg/kg orally once a day for 4 weeks), and Group V (IR+RG+AM, 200 mg/kg orally once/day for 4 weeks before IR and 200 mg/kg AM administered (i.p.) 30 min before IR). All groups, except for the control group, were subject to 6-Gy whole-body IR in a single fraction. 24 h after irradiation, all animals were sacrificed under anesthesia. IR enhanced MDA, 8-OHdG, and caspase-3 expression while decreasing renal tissue GSH levels (p < .05). Significant numbers of necrotic tubules together with diffuse vacuolization in proximal and distal tubule epithelial cells were also observed. The examination also revealed substantial brush boundary loss in proximal tubules as well as relatively unusual glomerular structures. While GSH levels significantly increased in the AM, RG, and AM+RG groups, a decrease in KHDS, MDA, 8-OHdG, and caspase-3 expression was observed, compared to the group subject to IR only (p < .05). Therefore, reactive oxygen species-scavenging antioxidants may represent a promising treatment for avoiding kidney damage in patients receiving radiation

    INVESTIGATION OF OPINIONS OF TEACHERS OF THE HEARING-IMPAIRED CHILDREN ABOUT SERVING AS A SPECIAL EDUCATION TEACHER

    Get PDF
    The aim of this study was to investigate the opinions of teachers of the hearing-impaired children about serving as a special education teacher. The research was designed as a descriptive case study within the framework of qualitative research methods. Two criteria that the participants to be included in the study should have were determined as follows: graduating from universities’ hearing-impaired teaching programs and serving as a special education classroom teacher in schools affiliated to the MNE. The participants consist of 51 teachers meeting the specified criteria. Semi-structured interviews were held with 5 of the participants, and data were collected from 46 of them through an open-ended questionnaire. Given the pandemic period conditions we currently experience, the e-interviews were conducted using Zoom, while open-ended questionnaires were collected via Google Forms. Descriptive analysis technique was used in the analysis of the research data. The descriptive analysis process consists of four stages: creating a thematic framework, processing of data according to the thematic framework, identification of findings, and interpretation of findings. Study findings revealed that the fact that teachers serve out-of-field they graduated from led them to feel insufficient in terms of professional knowledge and competency. Besides, it was observed that they failed to provide sufficient benefit to the students, they had difficulties communicating with families, they failed to cooperate with the school administrators or other colleagues and could not find the necessary support. Article visualizations

    The platelet indices in pediatric patients with acute appendicitis

    Get PDF
    Background: The diagnosis of Acute Appendicitis (AA) remains a problem in pediatric population. It has been suggested that Mean Platelet Volume (MPV) is lower in the patients with AA. The purpose of this study was to investigate the diagnostic value of platelet indices in pediatric AA cases.Methods: A retrospective case-controlled study was designed: 224 subjects were included in this study. All patients had been operated on in division of pediatric surgery at the Kars Government Hospital with the preliminary diagnosis of AA. 204 and 20 of these patients were pathologically diagnosed as AA (group 1) and normal appendix vermiformis (group 2), respectively. Platelet indices had been studied in the biochemistry laboratory of the hospital, before the surgery.  Results: In group 1, platelet count, mean platelet volume, plateletcrit and platelet distribution width were 305 ± 94x103/µL; 7.37 ± 0.90 fL; 0,220 ± 0.057 % and 16.3 ± 0.5%, respectively. In group 2, platelet count, mean platelet volume, plateletcrit and platelet distribution width were 283 ± 85 103/µL; 7.60 ± 1.24 fL; 0.208 ± 0.045 % and 16.4 ± 0.7%, respectively. There was no statistically significant difference between the groups studied with regard to platelet indices (P&gt;0.05).Conclusions: Our study showed that platelet indices have no diagnostic value in the diagnosis of AA at pediatric age group.  

    DETERMINATION OF THE EDUCATION TECHNOLOGY COMPETENCIES OF SPECIAL EDUCATION TEACHERS

    Get PDF
    The novel coronavirus (COVID-19) pandemic that started in December 2019 led to the closure of schools on a global level, and implementation of strict social distancing measures has led to rapid and prevalent changes in conventional forms of education and instruction. In this period where distance education is preferred in education processes, the education technology competencies of teachers have gained importance. In this context, this study aimed to determine the education technology competencies of special education teachers. The descriptive study included 114 special education teachers. The data were collected by using the “Education Technology Competencies Scale for Teachers” and analyzed by using the SPSS 25 package software. The maximum total score that could be obtained in the scale that was used in the study is 190. It was determined that, with the mean score of 155.27, the participants of this study had an education technology competency level of 81.72%. In this study which investigated the technological competencies of special education teachers, no significant difference was found based on the participants’ gender, professional experience or areas of teaching. Considering the items in the dimensions of the scale, it was found that the male teachers were more competent in terms of technical knowledge on technology, while the female teachers used the technological knowledge they had more effectively in classes, instruction and materials, as well as in communication with both students and parents. Article visualizations

    A Gradual Approach for Multimodel Journey Planning: A Case Study in Izmir, Turkey

    Get PDF
    Planning a journey by integrating route and timetable information from diverse sources of transportation agencies such as bus, ferry, and train can be complicated. A user-friendly, informative journey planning system may simplify a plan by providing assistance in making better use of public transportation. In this study, we presented the service-oriented, multimodel Intelligent Journey Planning System, which we developed to assist travelers in journey planning. We selected Izmir, Turkey, as the pilot city for this system. The multicriteria problem is one of the well-known problems in transportation networks. Our study proposes a gradual path-finding algorithm to solve this problem by considering transfer count and travel time. The algorithm utilizes the techniques of efficient algorithms including round based public transit optimized router, transit node routing, and contraction hierarchies on transportation graph. We employed Dijkstra’s algorithm after the first stage of the path-finding algorithm by applying stage specific rules to reduce search space and runtime. The experimental results show that our path-finding algorithm takes 0.63 seconds of processing time on average, which is acceptable for the user experience

    The Inflation Dynamics of the Turkish Economy in 1990-2011 Period

    Get PDF
    In 2004, Turkey managed to reduce the chronic high inflation rates that characterized its economy over the period 1975-2001 to single digits, thanks to economic policies implemented in the aftermath of the 2001 financial crisis. This paper analyzes inflation dynamics in the Turkish economy both in the short- and the long-run, over the period from January 1990 to December 2011 by using the Johansen Cointegration Test and the Vector Error Correction model (VEC). Empirical results show that the inflation rates in Turkey are mainly related to changes in money supply, economic growth, nominal exchange rates, dollarization and real wages

    Blood Pressure Percentiles for School Children

    Get PDF
    Objective: The prevalence of hypertension in childhood and adolescence is gradually increasing. We aimed to in­vestigate the blood pressure (BP) values of children aged 7-18 years. Methods: This study was conducted in a total of 3375 (1777 females, 1598 males) children from 27 schools. Blood pressures of children were measured using sphyg­momanometer appropriate to arm circumference. Results: A positive relationship was found between sys­tolic blood pressure (SBP) and diastolic blood pressure (DBP) and the body weight, height, age and body mass index (BMI) in male and female children. SBP was high­er in males than females after the age of 13. DBP was higher in males than the females after the age of 14. The mean annual increase of SBP was 2.06 mmHg in males and 1.54 mmHg in females. The mean annual increase of DBP was 1.52 mmHg in males and 1.38 mmHg in fe­males. Conclusion: In this study, we identified the threshold val­ues for blood pressure in children between the age of 7 and 18 years in Erzurum province. It is necessary to com­bine and evaluate data obtained from various regions for the identification of BP percentiles according to the age, gender and height percentiles of Turkish children

    Siber Suç Korkusu ve Önlem Alma Stratejileri: Ankara'daki Teknokentler Örneği

    No full text
    Cybercrimes are becoming increasingly widespread in today's emerging science and technology world and are becoming one of the most important issues that may pose serious threats not only to individuals but also to communities, organizations and states. In the face of such a serious threat affecting almost every segment of society, from individuals to groups and from organizations to governments, it is also natural and possible for individuals to be afraid and develop certain strategies to take precautions. In this context, this study focuses on fear of cybercrime and precaution taking strategies. At the study, a survey was conducted with the employees of four Teknoparks (ODTÜ Teknokent, Bilkent Cyberpark, Hacettepe Teknokent and Gazi Technopark) located in Ankara, Turkey. Quantitative data obtained at the survey were analyzed using SPSS package program and hypotheses were tested. At the end of the study, it is reached that there is a fear of cybercrime on Teknopark employees in Ankara and majority of the participants developed middle and upper level precaution taking strategies. At the study a significant relationship is found between fear of certain types of cybercrime and the participants' gender, educational status, previous cybercrime victimization, finding the precautions taken enough and perceptions about legal regulations, law enforcement and judicial units related to cybercrimes. It is also concluded at the study that there is a significant relationship between the participants' some precaution taking strategies in the electronic devices they used at work and out of work.KABUL VE ONAY .......................................................................................................... i BİLDİRİM ....................................................................................................................... ii YAYIMLAMA VE FİKRİ MÜLKİYET HAKLARI BEYANI................................. iii ETİK BEYAN ................................................................................................................. iv TEŞEKKÜR ................................................................................................................... vi ÖZET .............................................................................................................................. vii ABSTRACT .................................................................................................................. viii İÇİNDEKİLER .............................................................................................................. ix TABLOLAR DİZİNİ .................................................................................................... xii ŞEKİLLER DİZİNİ ..................................................................................................... xvi GRAFİKLER DİZİNİ ................................................................................................. xvi GİRİŞ ............................................................................................................................... 1 1. BÖLÜM ARAŞTIRMANIN KAPSAMI VE YÖNTEMİ ........................................ 3 1.1. ARAŞTIRMANIN KONUSU, AMACI VE ÖNEMİ ........................................ 3 1.1.1. Araştırmanın Konusu ....................................................................................... 3 1.1.2. Araştırmanın Amacı ....................................................................................... 10 1.1.3. Araştırmanın Önemi ...................................................................................... 10 1.2. ARAŞTIRMANIN YÖNTEMİ ......................................................................... 11 1.2.1. Araştırmanın Hipotezleri ............................................................................... 13 1.2.2. Araştırmanın Evren ve Örneklemi ................................................................. 13 1.2.3. Araştırmanın Veri Toplama Teknikleri ......................................................... 15 1.2.4. Araştırmanın Veri Analizi ............................................................................. 17 1.2.5. Operasyonel Tanımlar.................................................................................... 18 1.3. ARAŞTIRMANIN SINIRLILIKLARI ............................................................ 19 2. BÖLÜM ARAŞTIRMANIN KAVRAMSAL ÇERÇEVESİ ................................. 20 2.1. SİBER SUÇLAR ................................................................................................. 20 2.1.1. Geleneksel Suçlar ve Siber Suçlar ................................................................. 20 2.1.2. Akıllanan Eşyalar, Nesnelerin İnterneti, Kripto Paralar, Robotik Teknolojiler ve Yapay Zeka ......................................................................................................... 24 2.1.3. Kavram Sorunu – Siber Suçlar mı? Bilişim Suçları mı? İnternet Suçları mı?... ................................................................................................................................. 27 2.1.4. Siber Suç Tanımlaması .................................................................................. 30 2.2. SİBER SUÇ KORKUSU .................................................................................... 34 2.2.1. Suç Korkusu ve Siber Suç Korkusu ............................................................... 34 2.2.2. Siber Suç Korkusunun Belirleyicileri ............................................................ 37 2.3. ÖNLEM ALMA STRATEJİLERİ ................................................................... 44 3. BÖLÜM ARAŞTIRMANIN KURAMSAL ÇERÇEVESİ .................................... 47 3.1. RUTİN AKTİVİTELER TEORİSİ .................................................................. 48 3.1.1. Motive Olmuş Suçlu ...................................................................................... 52 3.1.2. Uygun Hedef .................................................................................................. 54 3.1.3. Koruyucunun Yokluğu .................................................................................. 55 3.1.4. Rutin Aktiviteler Teorisine Sonradan Eklenen Faktör: Tutucular ................. 57 4. BÖLÜM ANKARA’DAKİ TEKNOKENTLERDE YAPILAN ARAŞTIRMANIN BULGULARI ............................................................................... 59 4.1. BETİMSEL VERİLERİN ANALİZİ ............................................................... 59 4.1.1. Teknokent Çalışanlarının Sosyo-Demografik ve Genel Özellikleri .............. 59 4.1.2. Teknokent Çalışanlarının Siber Suç Korkusu Düzeyleri ............................... 64 4.1.3. Teknokent Çalışanlarının Geçmiş Siber Suç Mağduriyeti Düzeyleri ............ 68 4.1.4. Teknokent Çalışanlarının Yasal Düzenlemeler ve İşlemlere İlişkin Algıları 70 4.1.5. Teknokent Çalışanlarının Siber Suç Korkusuna İlişkin Önlem Alma/Başa Çıkma Stratejileri ..................................................................................................... 75 4.2. HİPOTEZLERİN ANALİZİ ............................................................................. 94 4.2.1. Katılımcıların Yaşları, Cinsiyetleri, Eğitim Durumları ve Gelir Düzeyleri ile Siber Suç Korkusu Arasındaki İlişki ....................................................................... 94 4.2.2. Geçmiş Siber Suç Mağduriyeti ile Siber Suç Korkusu Arasındaki İlişki .... 113 4.2.3. Alınan Önlemleri Yeterli Bulma İle Siber Suç Korkusu Arasındaki İlişki . 119 4.2.4. Siber Suçlara İlişkin Yasal Düzenlemeleri, Kolluk Ve Yargı Birimlerini Siber Suçlarla Mücadele Noktasında Yeterli Bulma İle Siber Suç Korkusu Arasındaki İlişki ..................................................................................................... 123 4.2.5. İş Yerinde ve İş Yeri Dışında Kullanılan Elektronik Cihazlardaki Önlem Alma/Başa Çıkma Stratejileri ................................................................................ 133 SONUÇ VE DEĞERLENDİRME ............................................................................. 136 KAYNAKÇA ............................................................................................................... 142 EK 1: ARAŞTIRMADA KULLANILAN ANKET FORMU .................................. 151 EK 2: ORİJİNALLİK RAPORU ............................................................................... 165 EK 3: ETİK KOMİSYON ONAYI ............................................................................ 166Siber suçlar günümüzün gelişen bilim ve teknoloji dünyasında giderek daha da yaygınlaşmakta ve yalnızca bireyler için değil topluluklar, kuruluşlar ve devletler için dahi ciddi tehditler oluşturabilecek en önemli konulardan biri haline gelmektedir. Bireylerden gruplara, örgütlerden devletlere kadar toplumun hemen her kesimini etkileyen bu denli ciddi bir tehdit karşısında bireylerin korku duymaları ve önlem alabilmek için belirli stratejiler geliştirmeleri de son derece doğal ve olasıdır. Bu bağlamda bu çalışmada siber suç korkusu ve önlem alma stratejileri ele alınmaktadır. Çalışmada Ankara’da bulunan 4 adet Teknokent’in (ODTÜ Teknokent, Bilkent Cyberpark, Hacettepe Teknokent ve Gazi Teknopark) çalışanları ile anket uygulaması gerçekleştirilmiştir. Yapılan anket sonucunda ulaşılan nicel veriler SPSS paket programı kullanılarak analiz edilmiş ve hipotezler test edilmiştir. Çalışma sonucunda Ankara’daki Teknokent çalışanları üzerinde siber suç korkusu bulunduğu ve katılımcıların çoğunluğunun orta ve üst düzeyde önlem alma stratejileri geliştirdikleri görülmüştür. Çalışmada ayrıca belirli siber suç türleri açısından korku ile katılımcıların cinsiyetleri, eğitim durumları, geçmiş siber suç mağduriyetleri, aldıkları önlemleri yeterli bulmaları ve siber suçlara ilişkin yasal düzenlemeler, kolluk ve yargı birimlerine ilişkin algıları arasında anlamlı bir ilişki bulunduğu görülmüştür. Yine çalışmada katılımcıların iş yerlerinde ve dışında kullandıkları elektronik cihazlarındaki bazı önlem alma stratejileri arasında da anlamlı bir ilişki bulunduğu sonucuna ulaşılmıştır
    corecore