Bilgisayar Mühendisliği Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/58
Browse
Browsing Bilgisayar Mühendisliği Bölümü Tezleri by Access Right "info:eu-repo/semantics/openAccess"
Now showing 1 - 20 of 209
- Results Per Page
- Sort Options
Item Citation Count: MOĞOL, A.C. (2011). 3D hand reconstruction with binocular view. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.3D hand reconstruction with binocular view(2011-12-01) Mogol, Ali Can; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüIn the field of Human Computer Interaction (HCI) one of the important goals is designing better interfaces for improving interactions between human beings and computers. There are lots of approaches to address this problem. One of these approaches is interfacing using human hand gestures. The capturing and modeling of the gestures and articulations of the human hand is a challenging problem. There exist hardware and software solutions proposed to solve this problem. In this thesis, an inexpensive fast and effective method to stereo capture and create 3D hand model is proposed. The setup used for this thesis is; five different color markers and commodity hardware consists of two web cameras and a low cost laptop computer. In this thesis, starting with the stereo calibration of the cameras, capturing and tracking the color markers attached to the finger tips, leading 2D points of the finger tips, converting the 2D points to 3D points and calculating the finger articulations according to these 3D points and modeling the 3D hand have been accomplished, so the user can see his/her own hand’s articulation on the screen as a 3D hand model.Item Citation Count: TAŞEL, F.S. (2008). 3D reconstruction of a scene using stereo images. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.3D reconstruction of a scene using stereo images(2008-06-20) Taşel, Faris Serdar; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüTwo-dimensional photographs do not have depth-information. One solution to determine the location of an object in three-dimensional environment is to use more than one photograph as exposed by the nature. Extracting the depth information using stereo images is purposed in this thesis. The thesis analyzes the steps and encountered problems in three-dimensional reconstruction process, explains the solutions exposed with the aid of epipolar geometry using some of the feature-based matching techniques. Stereo images which are taken from two calibrated cameras viewing the same scene are used to obtain estimated three-dimensional data. Pinhole camera model, epipolar geometry and its recovery are discussed; common stereo triangulation methods are explained in the chapters of the thesis. Besides, feature extraction and matching topics which are used for the reconstruction process are examined. Some of the methods used in the thesis are presented by algorithmic solutions and mathematical notations. Significant advantages and disadvantages of the methods are briefly discussed and encountered problems are tried to be challenged by fundamental approaches.Item Citation Count: GÜVENÇ, S.P. (2008). 3D visualization using data received from the processes of object recognition and object reconstruction. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.3D visualization using data received from the processes of object recognition and object reconstruction(2008-06-20) Güvenç, Seher Pelin; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThis thesis presents the demonstration of what two images or two video sequences can tell us about the situation and model of a third video sequence or image. The method bears ideas from projective geometry as it’s basis. The main purpose of the thesis is to be able to form a base line for tracking an object in a 3D environment not only by using two stereo cameras but also by using other cameras that may be located in various points of the environment. The method visualizes the object and gives the information to a third camera. This way it can be possible to track a moving object, along with it’s visualized model, in an environment without losing sight of it and without having to move the other two stereo cameras which we received data from.Item Citation Count: ÖDEMİR, S. (2013). A client-server architecture for live video streaming using object relational database. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A client-server architecture for live video streaming using object relational database(2013-06-18) Ödemir, Serkan; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThis thesis focuses on live video streaming and offers a new approach based on client-server architecture using relational database. The thesis also analyzes the traditional live video streaming concepts and challenges such as performance problems. On the other hand, this study aims to implement client-server architecture in order to gain performance and provides a faster retrieval and storing time, better download time with minimum metadata by using relational database. This architecture also provides multiple accesses on different domains like embedded devices, Internet based smart TVs etc. The study also covers a Windows desktop application which consists of two live video streaming approaches. Implementation tries to compare traditional video streaming using TCP sockets and client-server model using relational database. MySQL and Apache web server were used to support the thesis proposal. Implementation was tested with various amounts of clients and parameters such as frame rate, buffer size and picture quality. Test results and conditions were also included in the thesis text. Briefly, this thesis tries to provide a better client-server live video streaming solution using the abilities of web and database servers.Item Citation Count: SAPAN, İ. (2007). A comparative analysis of feature-oriented development (fod) with object-oriented development (ood) in software engineering. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A comparative analysis of feature-oriented development (fod) with object-oriented development (ood) in software engineering(2007-09) Sapan, İlker; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThe objective of this thesis is to compare the Feature-Oriented Development (FOD) with Object-Oriented Development (OOD) on a case problem. Employing the features in software engineering has become quite popular recently with the emerging tools and techniques. FOD is used within a context in this thesis as partitioning an application domain in terms of ?features? yielded by Feature-Oriented Domain Analysis, and then managing them through a relevant software process model known as Feature-Driven Development (FDD). The conventional FDD approach makes use of classical objects to implement features. Whereas, features can also be implemented by means of a dedicated programming model, i.e. Feature-Oriented Programming, to treat the features as first class entities. However, the FOD vision in this study proposes another model for expressing and implementing the features in terms of "business processes", "business rules", and "business services". The thesis will examine and evaluate the processes, analysis of the performance, time management, and other relevant issues of FOD in comparison specifically with OOD. Eventually, the advantages and disadvantages of FOD will be summarized with respect to other related development methodologies.Item Citation Count: Mıohanad Ali Gahot (2019). A comparative analysis of video summarization techniques / Video özet tekniklerinin karşılaştırmalı bir analizi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen bilimleri Enstitüsü.A comparative analysis of video summarization techniques(2019) Gashot, Mohanad Ali; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüWith the rapid evolution of the digital era, devices equipped with digital cameras are being more popular and widely used to capture digital videos. The huge number of frames in each video poses challenges toward processing these videos, as the result of the need for intensive processing to handle these frames. Hence, several techniques have been proposed to provide more efficient summaries for videos. An efficient summary is required to provide maximum information about the contents of the video using the minimum number of its selected frames. Such a summary can significantly reduce the complexity of the computations while maintaining high-quality results in the applications that rely on these summaries. Thus, more attention is being attracted by video summarization techniques to be employed in different fields of applications, such as predicting the genre of the video or measuring the similarity between two videos. Video summarization techniques rely on two main steps, finding the boundaries of the shots in the video and selecting the frame in each shot that holds the maximum information for that shot. A video shot is a sequence of frames that are collected without any cuts or transitions during the capturing of the video. However, recognizing the boundaries of these shots is a challenging process, due to the rapid development in digital video processing techniques that are used to merge the shots in videos. When these boundaries are recognized, a frame is selected to represent the information in that shot. However, the use of different techniques to find the boundaries of the shots and select the frames to represent them produce different summaries in different methods. Thus, it is important to compare the performance of these methods in order to select the one that is most appropriate for the application the method is required for. Moreover, recognizing the factors that can improve the performance of video summarization techniques can assist future researchers to propose video summarization methods with significantly improved performance. In this study, the methodologies of recent state-of-the-art methods are reviewed, and their performances are evaluated, so that, a comprehensive review and a reasonable comparison are presented. The evaluation results show that the use of a single pass over the frames of a video reduces the complexity of computations required to find the boundaries of the shots in that video. Such an approach has proven to provide high-quality summaries compared to methods that use multiple passes over the video frames. Moreover, the use of clustering techniques has also shown significant improvement to the quality of the produced summary. Thus, the methods that combine these approaches have shown relatively better performance.Item Citation Count: Hammood, Ali Hussein (2016). A comparison of NoSQL database systems: A study on MongoDB, apache HBase, and apache Cassandra / NoSQL veritabanı sistemlerinin karşılaştırılması: MongoDB, apache HBase, and apache Cassandra üzerine bir çalışma. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.A comparison of NoSQL database systems: A study on MongoDB, apache HBase, and apache Cassandra(2016) Hammood, Ali Hussein; Çankaya Üniversitesi,Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Ana Bilim DalıDue to their many useful features, database management systems have been used widely with relational data for over 20 years. However, such systems are not able to handle massive and complex data efficiently. New systems known as NoSQL database management systems have appeared to deal with massive and complex data that provide fast and high performance. In this thesis, we discussed and tested three kinds of NoSQL database system in order to reveal their capabilities and how they respond in different operations. For this purpose, we set up a novel testing environment for each workload and examine the responses for the three systems. The results of this study show the weaknesses and strengths of each database system used in the study. Due to the different architectures of each database that we tested, we have seen different responses for each with changed workload operations. In our work, we used the Yahoo Cloud Serving Benchmark (YCSB), which is a framework designed by Yahoo to test database performance. According to the results obtained, we can conclude that MongoDB performed very well with low throughput, but not as well with high throughput. Cassandra and HBase performed very well under heavy loads due to their optimized designs. In the read operation, HBase has poor performance as compared to other systems tested.Item Citation Count: EŞ, S. (2005). A computational analysis of a language structure in natural language text processing. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A computational analysis of a language structure in natural language text processing(2005-09) Eş, Sinan; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüText categorization or classification is a general task of classifying un-organized natural language texts according to specific subject matter or category. Electronic mail (e-mail) filtering is a binary text classification problem which the user emails can be classified as legitimate (non-spam) or un-wanted mail (spam). In this study, we tried to find a filtering solution that is able to automatically classify emails into spam and legitimate categories. In order to automatically and efficiently classify emails as spam or legitimate we took advantage of some Machine Learning methods and some novel ideas from Information RetrievalItem Citation Count: Yıldırım, Pınar (2018). A GIS-based decision support system for tourism planning and development / Turizm planlama ve geliştirme için CBS tabanlı bir karar destek sistemi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A GIS-based decision support system for tourism planning and development(Çankaya Üniversitesi, 2018) Yıldırım, Pınar; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Anabilim DalıIn the past twenty years, pioneering developments in information technology and communication systems worldwide have not only offered many opportunities in the fields of marketing, management and the promotion of tourism and recreational areas to businesses interested in tourism, but have also provided a sustainable advantage in competition with other businesses. Turkey has more potential for tourism and more resources than many countries, thanks both to its natural beauty and its historical and cultural wealth. The aim of this thesis is to build a web portal that is able to enhance its attractiveness through photographs or videos taken in all regions of Turkey, increase interest from domestic and foreign tourists through detailed articles about the country, and improve the accessibility of the country's resources through a system based on GIS. Developed within the scope of this thesis, the Turkey Tourist Portal can promote the country to tourists by presenting both its natural beauty and its historical and cultural wealth on a map, together with images and articles.Item Citation Count: Al-Bajjari, Faten Fayeq Salman (2017). A model for adopting cloud computing in government sector: Case study in Iraq / Hükümet sektöründe bulut bilişim teknolojilerini kullanmaya yönelik bir model: Irak'ta örnek-olay incelemesi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A model for adopting cloud computing in government sector: Case study in Iraq(Çankaya Üniversitesi, 2017) Al-Bajjari, Faten Fayeq Salman; Çankaya Üniversitesi ,Fen Bilimleri Enstitüsü , Bilgisayar Mühendisliği Anabilim Dalı / Bilgi Teknolojileri Bilim DalıCloud computing is a delivery of on-demand computing resources such as servers, databases, storage, networking, software, analytics and more over the Internet on a pay-for-use basis. The users can from anywhere at any time control these resources via a simple software interface which facilitates its usage, and helps in getting rid from many details and internal processes. This technology is not currently widely utilized in public sector institutions, especially in the case of Iraq for different factors and reasons. The main objective of this research is to identify the most critical factors preventing cloud computing adoption in government institutions in Iraq by developing a conceptual model for cloud technology adoption that integrates the theories of TOE, Iacovou et al. and DOI. The key factors influencing the adoption of cloud technology have been investigated and determined through literatures review. To achieve research objectives, this study used the methodologies of quantitative research, and a self–administered questionnaire has been used as an essential tool to collect primary data that has been analyzed through the statistical SPSS program. Moreover, CloudAnalyst simulator is used to identify the real time performance for cloud technology environment, and two algorithms have been applied via this tool, namely the AHP technique which used to obtain the weight of variables depending on the questionnaire results, and ECDSA algorithm which used to identify the privacy and security of cloud technology. Finally, a thorough set of guidelines have been proposed in order to help Iraqi government institutions to move to cloud environment in an effective manner.Item Citation Count: Canan Niyaze Soba (2018). A new data-centric authentication and authorization mechanism for multilayer systems / Çok katmanlı sistemler için veri merkezli yeni bir kimlik doğrulama ve yetkilendirme mekanizması. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A new data-centric authentication and authorization mechanism for multilayer systems(2018) Soba, Canan Niyaze; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüInternet ve bulut teknolojilerinin hızlı ilerlemesi ile hassas veriler üçüncü taraflar tarafından paylaşıldığından bu verilerin depolanması için şifrelemek bir ihtiyaç olacaktır. Hassas verilerin yetkisiz erişimini engellemek için literatürde, birçok yöntem bulunmaktadır. Bu çalışmada, erişim denetimini sağlamak için Rol Tabanlı ve Öznitelik Tabanlı Erişim Denetim modellerinin birlikte kullanıldığı yeni çok katmanlı erişim denetim modeli sunulmuştur. Önerilen sistem verilerin ağda güvenli paylaşımı ve saklanması planı üzerine kurulmuş bir yaklaşımdır. Kullanıcı kimlik doğrulama için kimlik tabanlı doğrulama (IBE) ve kimlik tabanlı imza (IBS) mekanizmaları kullanılmıştır. Aynı zamanda Şifreli Metin İlkesi Tabanlı Şifreleme (CP-ABE) mekanizması kullanıcıların sistemde belirlenmiş olan özniteliklerine bağlı yetkilendirme için kullanılmaktadır. Kimlik doğrulama ve yetkilendirme mekanizması sistemi sorunsuz başlatma, güvenli veri alımı ve güvenli veri paylaşımı için kullanılmaktadır. Bu tür sistemlerin en büyük sorunu olan yetki yönetimi için ise İptal Mekanizması kullanılmaktadır, bu mekanizma sistemde kullanıcının özniteliklerinin değişmesi ya da kullanıcının yetki iptali gibi durumlarda kontrolleri sağlamaktadır. Bununla birlikte, aynı verinin birçok kullanıcı tarafından birkaç kez şifrelenmesi depolama alanının gereksiz yere büyümesine neden olmaktadır, bunu engellemek için tekilleştirme, Yakınsak Şifreleme, yöntemi kullanılarak bütüncül bir mekanizma önerilmiştir. Böylece daha düşük bant genişliği maliyetiyle elde edilmiş bir sistem olduğu gösterilmektedir.Item Citation Count: İBRAHİM, T. (2014). A road map to a successful application of e-government in Iraq. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A road map to a successful application of e-government in Iraq(2014-06) İbrahim, Thaer; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThe most important objective of the government is to provide services to citizens in easy and comfortable ways. The application of an e-government project is the best way to achieve this goal. Moreover, the widespread use of information and communication technology has facilitated the implementation of this project in various ways. The Iraqi government, like other governments, wants to provide these services to citizens through the application of an e-government project. E-government is a way to improve the government's performance to become more efficient and effective. In addition, e-government leads to increased transparency and efficiency in the administration of the state. Therefore, the adoption of e-government is a process of change that will help to expand the areas of citizens and businessmen to participate in the new economy based on knowledge, technology and modern applications. In addition, e-government provides the possibility of the involvement of citizens and civil society in the policy debate through direct dialogue, and support decision-making in a way to facilitate better understanding of the citizens and their needs.This thesis describes what an e-government project is and describes how it should be applied in Iraq as well as the experiences of many countries. This study also examines the challenges that will be encountered in the application of a successful e-government project. Information was collected for this thesis by extracting real data through interviews with people involved in the application of the e-government project in Iraq. In addition, many official documents related to this project was accessed to find out the challenges encountered during the implementation of the project and to find best solutions to remedy these problemsItem Citation Count: Shakir Shakir, Ahmed Nashaat (2016). A robust encryption and data hiding technique by using hybrid des and lsb algorithm / Hibrid des ve lsb algoritma kullanarak sağlam şifreleme ve veri gizleme tekniği. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.A robust encryption and data hiding technique by using hybrid des and lsb algorithm(2016-08) Shakir Shakir, Ahmed Nashaat; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüInformation hiding is the process of hiding the details of a function, object or both. On the other hand, information hiding represents an important method that is used in data security. Another name of information hiding is the steganography which hides data inside other data, such as embedding text inside an image or an image inside another image. Steganography techniques have been used from ancient times through the use of many different mechanical ways, such as writing in invisible ink in the Greek Testament. On the other hand, Cryptography is the process of hiding information by encrypting data using a complex algorithm. It is used when collaborating over an untrusted intermediary, such as the Internet. Steganography and cryptography work similarly but in different contexts. In this study, we have presented an integration of cryptography and steganography to produce an efficient and robust model. In terms of cryptography, the Data Encryption Standard (DES) algorithm has been implemented, whereas in steganography, the Least Significant Bit (LSB) algorithm has been used. Our results show efficient time implementation and a robust algorithm mechanism in terms of Peak Signal-to-Noise Ratio (PSNR), Signal-to-Noise Ratio (SNR), and Mean Square Error (MSE).Item Citation Count: FİDANBOY, C.Ö. (2009). A survey of artificial intelligence techniques for capability maturity model integration (CMMI). Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A survey of artificial intelligence techniques for capability maturity model integration (CMMI)(2009-09-03) Fidanboy, Cemalettin Öcal; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüOur purpose in this thesis is to investigate the current artificial intelligence applications in scope of the CMMI process areas. Firstly, research is made regarding the CMMI Model. Then, current studies about CMMI process areas by using artificial intelligence techniques were examined. The overall aim of the thesis is to perform a survey about artificial intelligence techniques conjunction with Capability Maturity Model Integration (CMMI) process areas. As a result, future work evaluation in artificial intelligence applications with CMMI was performed.Item Citation Count: Olgun, Serhan (2018). A systematic review of gamification in the context of software development landscapes / Yazılım geliştirme mecralarında oyunlaştırma kavramının kullanımına yönelik bir sistematik gözden geçirme çalışması. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A systematic review of gamification in the context of software development landscapes(Çankaya Üniversitesi, 2018) Olgun, Serhan; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Anabilim DalıThe software development process is a complex activity that has interrelating steps to produce software products. Human related social factors such as user motivation, engagement, communication and collaboration issues affect the activities performed by software development organizations. In fact, software engineering researchers seek better ways to overcome the human related issues so as to improve the quality in software development. Consequently, research has been conducted to introduce new methodologies, techniques and concepts. As such, gamification has been introduced as a novel technique to enhance the software development process and ultimately resolve some of the identified obstacles that are related to human factors. However, there is a bias to adopt the gamification into the software development process because there are still insufficient evidences about its positive outcomes. In this study, a systematic literature review was rigorously conducted to investigate the application and to reveal the benefits of gamification in the software development landscapes. This study contributes to the area of software engineering research by proposing a classification approach to categorize gamification studies in software development landscapes. The results of this research suggest that there has been a significant increase in empirical and theoretical studies that were recently published and many positive steps being taken towards better integration of gamification in software development organizations.Item Citation Count: AL-HİLALİ, A.R.K. (2015). Accelerating stencil computation in multi-core architecture. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Accelerating stencil computation in multi-core architecture(2015-01-16) Al-Hilali, Amar Raeed Khorshid; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüStencil computations are common in linear systems of equations, numerical solutions of partial differential equations, molecular dynamics and many other scientific problems. For large structures, long computation times are an important problem. Increasingly higher number of cores are used in parallel for such computations, but still, the speedups are not sufficiently satisfactory. The main aim of this thesis is increasing the cache reuse and minimizing number of memory accesses by optimizing loop structures. We present and test several algorithms and improvements on them to get an optimal runtimeItem Citation Count: Elaf Ahmed Mahmood Al-Karkhı (2018). Adaptive energy consumption method for wireless sensor networks using optimization algorithms / Optimizasyon algoritmalarını kullanarak kablosuz sensör ağları için uyarlanabilir enerji tüketim yöntemi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Adaptive energy consumption method for wireless sensor networks using optimization algorithms(2018-02-05) Mahmood Al-Karkhı, Elaf Ahmed; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThe objective of this thesis is to save the nodes energy using optimization approach with Particle Swarm Optimization Algorithm. The network area is divided to several regions for parametric study. In the proposed method, the energy of the efficient routing is enhanced and the system used the Particle Swarm Optimization for eliminate the individual nodes in wireless sensor network. In this thesis the optimization method is used to find the best hop in wireless sensor network which use the Gravitational Search Algorithm. The proposed work compared with Low Energy Adaptive Clustering Hierarchy. In simulation result the total energy for proposed method is got 8 Joules, which the energy for the OEERP is got 10 Joules and for the LEACH the 20 Joules is got. That’s mean proposed method is 20% better than the energy consumption from optimized energy efficient routing protocol and 60% better than the Low Energy Adaptive Clustering Hierarchy method is reduced. In proposed method the packet delivery ratio is high than the optimized energy efficient routing protocol and Low Energy Adaptive Clustering Hierarchy method. As result the packet delivery is 100. This values only the base value and for 4000 bit packet that time 400,000 packet will send to the base station. The packet delivery for optimized energy efficient routing protocol is 60 and for Low Energy Adaptive Clustering Hierarchy this value is 64Item Citation Count: TAŞ, T. (2009). Adopting rup (rational unified process) on a software development project. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Adopting rup (rational unified process) on a software development project(2009-09-03) Taş, Tufan; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThis thesis analyzes the process of applying Rational Unified Process (RUP) successfully on a software development project step by step. Many software development projects today have a tendency to fail on some level. Even though they may not fail entirely, they might be completed with schedule delays, budget overrun or with poor quality that do not meet the requirements of customers because of poor management and lack of necessary documentation of the project. Applying RUP avoids these major problems in a project by developing set of work products which depict the essentials of the system from requirements to detailed design before the system could be implemented. However, software development teams have an overall attitude that RUP becomes less agile and too rigid as the size of projects get smaller. The thesis will also try to prove that this opinion is not true by using tools Rational Method Composer (RMC) and Rational Software Modeler (RSM) to successfully complete the project.Item Citation Count: HUSSEIN, T.D.H. (2015). Ambulance management system using GUI matlab. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Ambulance management system using GUI matlab(2015-08) Hussein, Taha Darwassh Hanawy; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüAn efficient emergency ambulance service must be provided in order to reach injured persons and transport them to the nearest hospital as rapidly as possible. To do so, the ambulance driver must select the shortest road network to reach the accident site, followed by the shortest path to the nearest hospital. Over the last few decades, a variety of different GIS-based systems have been developed to aid in the selection of such a path. This thesis aims to introduce an ambulance management system (AMS) to the city of Kirkuk, Iraq. A MATLAB graphical user interface (GUI) is used as a platform with which to manage a transportation path on the map by calculating all possible paths between accident and ambulance, and between accident and hospital. The shortest overall path can then be selected based on the obtained map coordinatesItem Citation Count: Gürcan, Tarık (2023). An autoML tool for software vulnerability prediction / Yazılım güvenlik açığı tahmini için autoML aracı. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.An autoML tool for software vulnerability prediction(2023) Gürcan, Tarık; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüÖzellikle son yıllarda büyük miktarda verinin daha erişilebilir hale gelmesi ve finans, sağlık, lojistik ve teknoloji gibi sektörlere önemli faydalar sağlaması nedeniyle makine öğreniminin yaygınlaşması kaçınılmaz olmuştur. Farklı sektörlerde kullanılmaya başlayan makine öğrenmesi uygulamalarının hayata geçirilmesi ihtiyacı hızlı ve verimli bir şekilde artmaktadır. Ancak geleneksel yöntemleri kullanarak bir makine öğrenimi modeli oluşturmak için gereken derin teknik bilgi ve kodlama becerilerine herkes yetkin olmayabilir. Bu nedenden dolayı kodsuz veya az kodlu platformlar daha fazla ilgi görmeye başlamıştır. Bu platformlar, kullanıcıların veri kümelerini yüklemesine, modeli oluşturmaya yönelik özellikleri tanımlamasına ve hatta teknik olmayan arayüzlerle modeli eğitmesine ve değerlendirmesine olanak tanır. Bu sayede karmaşık kod yazma ihtiyacını ortadan kaldırarak daha geniş bir kitlenin makine öğrenimi projelerine dahil olmasını mümkün kılar. Bu tezde, diğer kodsuz platformlara ek olarak çalışma zamanı sınırlama ve model bozulma analizi gibi temel özellikleri sunan, yazılım zafiyet analizi için kodsuz makine öğrenimi tahmin modellerinin gerçekleştirilmesine olanak sağlayan bir platform geliştirilmiştir. Bu platform, PPDaaS (Prediction Platform as a Service) olarak adlandırılmıştır ve "Yazılım Güvenlik Açığı" ve "OpenML" veri kümeleriyle tahmin modellerini eğitmek için kullanılmıştır. Başlangıçta platform, AutoML platformları için kullanılan kıyaslama verileriyle test edildi. Sınıflandırma algoritmalarının performansı, makine öğrenimi algoritmaları arasında adil bir karşılaştırma yapmak için "OpenML yetişkin" veri kümesine bir zaman sınırı konularak değerlendirildi. Platform, amaçlanan AutoML işlevleri açısından test edildikten sonra Yazılım Güvenlik Açığı verilerindeki model bozulmasını bulmak için kullanıldı. Son olarak geliştirilen PPDaaS platformuna ilişkin geri bildirimler son kullanıcılardan da toplandı. Sonuçlar geliştirilen PPDaaS platformunun yazılım sektöründe kendine yer bulabileceğini göstermektedir.