Yüksek Lisans Tezleri
Permanent URI for this communityhttps://hdl.handle.net/20.500.12416/57
Browse
Browsing Yüksek Lisans Tezleri by Access Right "info:eu-repo/semantics/openAccess"
Now showing 1 - 9 of 9
- Results Per Page
- Sort Options
Article A GIS-based decision support system for tourism planning and development(Çankaya Üniversitesi, 2018) Yıldırım, PınarIn the past twenty years, pioneering developments in information technology and communication systems worldwide have not only offered many opportunities in the fields of marketing, management and the promotion of tourism and recreational areas to businesses interested in tourism, but have also provided a sustainable advantage in competition with other businesses. Turkey has more potential for tourism and more resources than many countries, thanks both to its natural beauty and its historical and cultural wealth. The aim of this thesis is to build a web portal that is able to enhance its attractiveness through photographs or videos taken in all regions of Turkey, increase interest from domestic and foreign tourists through detailed articles about the country, and improve the accessibility of the country's resources through a system based on GIS. Developed within the scope of this thesis, the Turkey Tourist Portal can promote the country to tourists by presenting both its natural beauty and its historical and cultural wealth on a map, together with images and articles.Article Citation - Scopus: 5Active Defense Strategy Against Jamming Attack in Wireless Sensor Networks(Modern Education and Computer Science Press, 2019) Al-Shai, N.F.A.; Hassanpour, R.Wireless Sensor Networks WSNs are being utilized increasingly nowadays due to their ability to collect data from stationary, moving, reachable or unreachable fields. Progressive developments in WSN techniques add efficiency, reliability and better power management possibility, but they are still vulnerable and sensitive to security threats. The most effective threat to WSN is DOS attacks, which are detectable but in many cases unpreventable yet. An authentication-based defensive approach against DOS attack combined with jamming attack that prevents transferring data between attacked nodes in a cluster and cluster head node is proposed in this study. The proposed method encompasses developing an algorithm with ability to bypass attacked path via alternative safe one under control of cluster head to mitigate the False Node Excluding DOS due to jamming attack. The proposed method has been experimentally tested against similar methods from the literature with arbitrary study cases. Our proposed algorithm shows promising results in mitigating False Node Exclusion DOS (FNEDOS) attack where a full recovery of the attacked node is achieved in case of isolated nodes, and improvement between 36% and 52% is obtained when the attack affects a group of nodes at proxim © 2019 MECS.Master Thesis Cloud computing impact on communication and service sector: Iraq case study(Çankaya Üniversitesi, 2018) Almafrchi, Sabah Salam HusseinRapid advancements in technology have enhanced the significance of the use of cloud technology. The deployment of cloud computing as effective technology integration has been successful, particularly across the developed states of the world. However, there have been certain behavioural issues regarding the cloud technology activation in certain developing regions, rather than the technical limitations. In the context, the current research aims to evaluate the impact of deployment of cloud computing on the communication and service sector of Iraq. Even though the cloud computing approach seems appealing, yet certain challenges of adverse extent are encountered across the states where internet penetration and technology acceptance is not considerable. Similar is the case with Iraq; hence, the researcher has targeted the communication and service sector of Iraq with respect to assessing the deployment of cloud computing. In this regard, the constructs of UTAUT model as identified dependent and independent variables of the study have been employed, in terms of conducting a multiple-item 5-point scale online survey across 251 IT experts of the targeted domain. Resultantly, it has been established that there have been certain challenges of disregarding cloud computing as an effective measure of enhancing productivity, and efficiency of the employees in a secure and feasible manner. Therefore, the study has recommended training and awareness programs that must present the credibility and integrity of cloud computing as an effective technological deployment. These programs assist accepting the cloud computing technology by the employees in the communication sector, which enables the employees, as well as the organizations, providing more efficient tasks by reducing the costs and efforts needed to perform the exact same tasks without the use of cloud computing technologies. This improvement also assists other employees and organization to accept that technology, which eventually leads to more and more acceptance to the cloud computing technology in the communication and service sector.Article Criteria for the selection of eco-friendly materials in interior architecture(Çankaya Üniversitesi, 2017) Abdelslam, Wesam Awad AliEnvironmentally responsible or sustainable design has become a fundamental issue in the field of Interior Architecture, as well as other disciplines. However, the implementation of sustainability in the practice of Interior Architecture is still limited, especially regarding the selection of eco–friendly materials. In this thesis, in order to achieve a higher level of sustainability in the construction industry, a classification system for the usage of eco-friendly materials in Interior Architecture was developed. The study also includes developed guidelines, derived from the analysis of LEED Green Building Rating System and various studies in literature, regarding choosing eco-friendly materials. The criteria set out and the developed classification system for materials will be benefitted for providing a cleaner and healthier environment. By the use of these guidelines, excessive consumption of natural resources, as well as possible harmful emissions are aimed to be reduced.Master Thesis Emoji usage in twitter data: Analyzing users' interpretations of emoji ideograms(Çankaya Üniversitesi, 2017) Marzoog, Dheyauldeen AbedIn conjunction with the significant growth in the use of social media, emojis have become a trending topic in informational technology related studies. New writing and communication styles using emojis are being used by people as a new language in different social media channels. This study adopts a quantitative research approach regarding emoji interpretations of users in order to evaluate the research problem using collected data from Twitter which is combined using the R program. These collected data are used in a survey questionnaire administered to 201 participants (students, staff and employees) from Çankaya University using Google Forms and shared by visiting the classes of students and by sending the survey using social media channels. This study aims to evaluate the interpretation of emojis by users. The methodology of the study depends on two parts, the first of which is the collection of data and the second using these data in a survey. The survey included questions related to the demographics of the respondents and questions about using social media and emojis. Then the remaining questions about the interpretation of the 201 participants for each of the top 100 emojis were collected from the R program as 'negative,' 'neutral' and 'positive.' Later, the study analyzed the results, which revealed that some of the emojis have different interpretations for different users.Master Thesis Expanding m-commerce possibilities through technology enabled devices(2013) Özbey, EnginPopular payment systems including asynchronous, online and mobile payments are investigated. Mobile phone payment systems are targeted after finding that mcommerce is projected to rise. With this increase in the market share, mobile devices are found-out to share physical wallets’ load as they can merge credit and ATM cards. The possibilities increase with the adoption of new technologies, such as NFC (Near Field Communication), so that the handsets can house loyalty, mass transport cards as well as electronically held money transfer ability. On the other side, the security issues including identity and money theft remain important although the expectations on converging physical wallets into the handsets are strong. However, this is not a definite obstacle and big service providers and vendors give signals to adopt such a technology in their services and products. As the conclusion, the thesis argues that e-commerce can expand more through additional technologies on the mobile devices.Article Madenlerde yaşam odalarının iş sağlığı ve güvenliği üzerine etkilerinin analizi(Çankaya Üniversitesi, 2017) Doğan, OnurMadencilik, tarihi eskilere dayanan önemli bir uğraş alanıdır. Özellikle Sanayi Devrimiyle önemli hale gelmiştir. Buna bağlı olarak üretim miktarında ve çalışan sayısında hızlı bir artış yaşanmıştır. Bilimsel ve Teknolojik gelişme maden araçlarını kaliteli hale getirse de iş ve işçi kazalarının önüne geçmekte yetersiz kalmıştır. Bu nedenledir ki dünyada en fazla insan kaybının yaşandığı sektörlerden biri olmuştur. İş ve işçi kazalarını önleme adına ILO gibi uluslararası kuruluşlar çeşitli kriterler belirlemişlerdir. ILO'nun amacı uluslararası standartların belirlenerek sözleşmeye taraf olan ülkelerdeki çalışma ve yaşam şartlarını düzeltmektir. Bu standartlar evrensel çalışma sözleşmeleri ve tavsiye kararlarından oluşmaktadır. Çoğu ülke gibi Türkiye'de bu kriterleri referans alarak kendi yasal düzenlemelerini gerçekleştirmektedir. Ülkemizde yaşanan maden kazalarından sonra sıkça gündeme gelen ve iş güvenlik önlemlerinden biri olan yaşam odaları tez kapsamında detaylı olarak ele alınmıştır. Bu kapsamda önce yaşam odaları ile ilgili uluslararası standartlar incelenmiş, dünyadaki uygulamaları, araştırılmıştır. Ülkemizde faaliyet gösteren bir maden işletmesinde yaşam odası uygulaması kritik edilmiştir.Master Thesis Obstacles to activating e-learning at Iraqi universities(Çankaya Üniversitesi, 2016) Shahoodh, GailanThis study adopts a quantitative research approach to evaluate the research problem using collected data from a survey questionnaire administered to 124 respondents (professors, instructors, employee and students) from different Iraqi universities. Using both online and hardcopy questionnaires that were based on the TAM framework, it included questions related to the demographics of the respondents and any obstacles in activating e-learning. The reliability of the questionnaire was tested and a high degree of internal consistency was found. Our study provides an analysis of each variable using descriptive statistics. Using factor analysis, we extracted four factors (Perceived Ease of Use (PEU), Perceived Usefulness (PU), Attitude toward Using and Actual System Use (ATU), and Behavioral Intention to Use (BIU) which were used in the correlation and regression analysis. Per the results of the regression test, the impact of PEU and PU were shown to be statistically significant in predicting and explaining both ATU and BIU. The results revealed that the impact of Perceived Ease of Use and Perceived Usefulness is significantly positive in affecting the attitude and behavioral intention of Iraqi universities' users towards LMS/e-learning, which is consistent with the TAM theory. Moreover, it shows that the two factors play a significant role in the acceptance of the new technology; i.e. the LMS at Iraqi universities can help to reduce any obstacles to e-learning implementation. In addition, conclusions and suggestions for future work are highlightedMaster Thesis Use of content management systems in business: A comparison of open source content management systems(Çankaya Üniversitesi, 2017) Al-Tameemi, Ahmed Abdulmahdi HusseinThere are many Content Management Systems (CMSs) that have appeared and were adopted in the mid-1990s to satisfy the needs of providing optimal solutions in organizing business website content. Due to the many controversial arguments about what CMS is appropriate for a business website, this study aims to help decision makers and IT managers in businesses to decide on the best open source CMS. In this study, the latest versions of three widely used CMSs, namely WordPress, Joomla and Drupal, have been selected according to their market share. Our methodology has four steps. In the first step, while developing comparison criteria, we published an online survey that represents a pool of 76 candidate criteria to be determined according to IT experts' opinion according to their importance. We installed CMSs on online servers and we tested these systems according to absolutely essential and important criteria determined by experts in the field. We performed a functional analysis for each system, i.e., whether a system performs a specific criterion depending on a core feature "Built-in," or the system needs to be extended with a third-party extension "Plug-in." Our criteria covered the complexity of installation, social media integration, security, performance and usability features. Lastly, usability tests were conducted using the Post-Study-System-Usability-Questionnaire tool to discover which CMS offers the easiest learning curve. We concluded that Joomla is the best among its competitors because this system outperformed the other two systems and supported most of our criteria as core features. Furthermore, Joomla combines the flexibility of Drupal and the intuitive "User Friendliness" of WordPress as it allows the creation of high-quality websites by non-technical users. Joomla also offers a moderate learning curve based on final usability test results.

