Bilgisayar Mühendisliği Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/58
Browse
Browsing Bilgisayar Mühendisliği Bölümü Tezleri by Issue Date
Now showing 1 - 20 of 253
- Results Per Page
- Sort Options
Master Thesis Model based human face detection using skin color segmentation(2002) Özbay, EylemModel Based Human Face Detection Using Skin Color Segmentation Özbay, Eylem Ms, Department of Computer Engineering Supervisor: Dr. Reza Hassanpour January 2005, 85 pages For identification of the people easiest way using the faces. However, it requires determining the location of the faces in the images. Face Identification systems are generally preceded by face segmentation systems. The main goal of thesis is locating the human faces and segmentation regions belonging to them using skin color segmentation methods and facial features such as nose, eyes, mouth etc. The segmentation results may be used as input to other related systemsMaster Thesis Specifications of object oriented database systems and performance test of an object oriented database engine(2002) Can, Barbaros1990'ların başından bu yana nesne-yönelimli programlama bilgisayar dünyasında oldukça popüler hale gelmiştir. Bu eğilimin etkisiyle, geleneksel veri tabanı sistemlerinin eksikliklerini gidermek amacıyla nesne-yönelimli veri tabanı sistemleri ortaya çıkmıştır. Bu tez nesne-yönelimli veri tabanı sistemlerinin özelliklerini açıklamakta ve nesne-yönelimli veri tabanı sistemleri ile ilişkisel veri tabanı sistemleri arasında bazı karşılaştırmalar yapmaktadır. Tezin ilk iki bölümü çalışmanın teorik alt yapısını verirken, tezin üçüncü bölümü örnek bir uygulamaya dayanarak sistemleri karşılaştırmaktadır. Bu uygulamada nesne-yönelimli veri tabanı olarak db4o, büyüklük olarak her ikisi benzer ölçülerde olduklarından, ilişkisel veri tabanı olarak da MySql seçilmiştir. Uygulamanın programlanması için ise, tam bir nesne yönelimli programlama dili olan Java kullanılmıştırMaster Thesis Client-server communication in remote control(2002) Choupani, RoyaThe client server communication model has been used in remote controlling of devices. The main feature in this study is that the Internet has been used as the common media to transmit controlling data and receive information. Client server model on the Internet restricts the access to client computers and has the disadvantage of unknown platform on the client side. This problem has been solved by means of platform independent programming and Java applets. Socket interface available in application layer of TCP/IP protocol suit has been used to establish reliable connection between clients and server. Security issues have been dealt with in the server side by checking the IP addresses of requesting clients.Master Thesis Remote oracle database access, modify and control(2002) Uğurlu, TanerClient - based Remote Oracle Database Server can be accessed by configuring Oracle Client's and Server's Listeners by Net8 Assistant, ODBC (Open Database Connectivity) Driver and BDE (Borland Database Engine) Administrator. When connection is established and access is realized; modifying, controlling remote Oracle Database Server's tables, fields, records and their properties is very difficult also sometimes it is not possible if the client and server listener are not configured well. This project provides an efficient and easy to use environment for configuring, accessing and controlling a remote Oracle Database. The project provides a SQL command editor for advanced command typing that will be need in advanced usage. Guidelines for manual configuration and configuration using Net8 Assistant are introduced in this research. Also some guidelines for the configuration of ODBC and BDE are introduced as an aid for the user.Master Thesis Corba based management for distributed heterogeneous and multi database systems(2002) Uysal, Murat PaşaDistributed, Heterogenous and Multi Database Management Systems (DHMDBS) originated from the large organizations' needs for a centrally- controlled information management by special software and administrative procedures developed for that environment. They may be running on different machine and network architectures. Monitoring selected database user actions, investigating suspicious activity, auditing and gathering data about specific processes for this type of databases are allways great concern for database administrators. (DBAs)They have to use vendor specific applications as well as platform specific software or they might develop their own solutions. With this study, we propose a solution which is an integrated Distributed Object Computing Scheme (Object Request Broker (ORB) Mechanism, CORBA Specification) of Heterogenous Multidatabases. By this decentralised approach, Portable and Mobile Informative Agents (PMA) located on whether on the same host database or not, creates bidirectional communication channels with a Portable and Mobile Manager (PMM) as well. PMM would be on the local network or any other host which is connected to the other networks.With a user interface, DBAs will be able to audit, manipulate database actions. ORB Mechanism and CORBA specification are incorporated to increase reliability, iii portability, robustness and also facilitate integration of various database systems in the market. Keyword: Object Request Broker, Distributed, Heterogeneous, Multidatabases, Common Object Request Broker ArchitectureMaster Thesis PC and embedded web server based remote control(2002) Yılmaz, Erdem GökhanApplication fields of remote control is enlarging, as cost effective and compact solutions are provided. Embedded Web Servers are one of these solutions that is recently introduced. PCs can be found everywhere and with the software support, it is easy to use them as web servers in remote control. Embedded Web Servers, with their great performance compared to their small sizes, seems to be good candidates to replace PC based web servers in most of the remote control applications. This work is about interfacing a remote control applica tion to both of the web server types. A standard pentium is used for PC based system. Embedded web server was the eZ80 from Zilog Inc. Centronics on PC and UART on eZ80 are the interfaces I have worked with.. Remote control application is built into an embedded system, Z8 MCU, from Zilog Inc. The Z8 doesn't support special on chip solutions for both of the interfaces. There fore these interfaces are implemented by software. For PC based web server, I have developed a system driving two stepper motors in any direction and amount. With eZ80, I have developed a DC Motor ON-OFF control applica tion. Any client can control the application parameters using a standard web browser. The browser must support Java applets for PC based application and must support HTML-FORM for eZ80 based one. This project can be extended towards distributed control using the PC interface on the eZ80.Master Thesis Image compression using discrete cosine transform(2002) Buz, Ayşe NurdanIn today's world of computing, it is hardly possible to do without graphics, im ages and sound. Uncompressed data needs very large amount of physical storage space and transmission time. The availability of storage media and transmission channels are limited. Transmission of images requires high bandwidth or expen sive cables. JPEG is the current standard for compression and decompression of still, monochrome and color images. The purpose of this study is to develop a compression algorithm to reduce time in image transmission. The C/C++ lan guage is used for implementation. As in JPEG, Discrete Cosine Transform (DCT) is used as coding transformation. Static Huffman Tree is constituted for our re quirements. As a case study, Windows Bitmap (BMP) files are used. The encoded data is formed as binary file and after transmission it is stored as it was before.Master Thesis Design and implementation of a search engine supported bookmarking service(2003) Dilek, Mustafa HadiThe bookmarks are the tools used by the Web users for revisiting the Web pages that they have visited before. But, the bookmak management approaches are not sufficient yet to use efficiently most of the facilities offered by the bookmarks, especially fast access to information. In this work, & system that the Web users can easily access to their bookmarks from anywhere and any browser has been developed and implemented. This system includes a centralized server and visually rich bookmark agents which join to this server. This system has also a search engine component at the server side. So, the bookmarks of the users can be crawled and indexed regularly. This is a new approach for the classical usage of bookmarks, and with this work the bookmarks turns to shareable personal search assistants.Master Thesis A Survey on public-key infrastructures(2003) Öztürk, HalukPublic-key cryptography is fast becoming the foundation for online commerce and other applications that require security and authentication in an open network. The widespread use of public-key cryptography requires a public-key infrastructure to publish and manage public-key values. Without a functioning infrastructure, public-key cryptography is only marginally more useful than traditional, secret-key cryptography. This thesis presents a set of characteristics that are common to all public-key infrastructures. These criteria are intended to encapsulate the fundamental issues that arise when dealing with such systems. They can be used both as a "shopping lisf for those who need to choose an infrastructure for a particular application, and as a guide for infrastructure developers, that they may be more aware of any compromises or tradeoffs they might make in their work. The characteristics are used to present a survey of current and some proposed infrastructure systems. The criteria reveal the strengths and weaknesses of each system, and indicate where improvements may be required.Master Thesis Artificial intelligence and its application(2003) Karakoç, İlkayArtificial Intelligence applications have been started in order to design computer programs that have human abilities. It has been thought that Artificial Intelligence applications will improve programs' abilities in the future. In these applications, the first step should be the determination of the knowledge and the method followed by the selection of the data set, rules and the suitable method. Then the control mechanism must be determined. In this thesis, the definition methods and techniques of Artificial Intelligence are mentioned and the Natural Language Processing, one of the applications of Artificial Intelligence is implied. Also a NLP program is designed to be a source for future works. This program is based on English language grammar rules. It is designed with respect to some determined tenses, because of the wide structure of English language. Prolog programming language and its properties of syncronization, recursion and list applications are used for program. In Chapter 1, the importance of Artificial Intelligence in human life is mentioned. Chapter 2, which mentiones the historical development of Artificial Intelligence is followed by Chapter 3, in which the fundamental characteristics of Prolog programming language is explained. In Chapter 4 data structures, list and tree mechanism are mentioned. In Chapter 5, human language rules are explained and a NLP program is generated.Master Thesis Performance analysis of mobile IPv4 with and without route optimization(2003) Altay, SerapPerformance Analysis of Mobile IPv4 With and Without Route Optimization Altay, Serap Ms, Department of Computer Engineering Supervisor: Asst. Prof. Gülsün Töreci May 2003, 92 pages The support of mobility in the modern communications network is becoming essential and important with the development of mobile devices. Mobile Internet Protocol is built on IPv4. Mobile IP has been proposed by IETF (Internet Engineering Task Force) to support portable IP addresses on Internet. In the basic Mobile IP protocol, datagrams destined for the mobile node are sent from wired or wireless hosts. These datagrams have to travel through the home agent when mobile node is away from home. On the other hand, the datagrams sent from mobile hosts to wired host can be sent directly. This asymmetric routing, called "Triangle Routing". On the other hand, when the destination node is very close to mobile host, this creates a problem. Solving of the problem "Triangle Routing" is one appealing topic in mobile IP. IETF proposed extension part of the basic mobile IP, called "Route Optimization" to address this problem. IPv4 has already been widely deployed. Moreover, it will most probably dominate the Internet for a long time. Therefore, in this thesis implemented mobile IPv4 with and without route optimization in OMNeT++. Simulations have already been done to justify the modification.Master Thesis Medical diagnosis via artificial intelligence(2003) Akıllı, YücelAlthough machine learning may induce reliable diagnostic algorithms from the limited description of the patient, such diagnostic tools definitely cannot, and also are not intended to, replace the physicians, but should rather be considered as helpful tools that can improve the physicians' performance. The results in this study and from other experiments convincingly demonstrate that the physicians' diagnostic accuracy should be possible to improve with the aid of machine learning. When applying a machine learning system in medical diagnosis there are several specific requirements that the system must meet. This study several issues related to the use of machine learning in medical diagnosis and prognosis problems. In this study, we see a system for medical diagnosis by learning Bayesian networks and rules. Prababilities between disease and sempthoms are used. The Bayesian networks can provide an overall structure of the relationships among the attributes. The rules can capture detailed and interesting patterns in the database. The system is applied to real-life medical databases.Master Thesis Artificial intelligence search methods(2003) Güler, NamıkHere in this master thesis I am planning to explain and introduce artificial intelligence and search methods. You might be heard or read some papers or books about artificial intelligence, but also now you will have chance to refresh your mind and knowledge with this introduction to be familiar with artificial intelligence. Also you will find here artificial intelligence history and some definition of artificial intelligence. One of the main study and area of artificial intelligence is search methods. Actually we came across with search criteria everyday we never think how those methods functions. m Here you will find a few searching methods examples, which we use everyday and it will help us to understand and remember better. Many people now has pc or notebook at home or in the office and computer is widely used in our daily life. If you need to find a file, documents, pictures or music files in your hard disk, if it is not easy to remember exact location or name of the file. After we start running the search program after some time later depends upon the size of domain and also amount of information we have provided, we will have a result. Also if you are using internet, if you need to find out a file, documents, pictures or any kind or information, it is necessary to go to a search machine to and need to run it.Master Thesis Three tiered windows application(2003) Bozkurt, FeridunThe three-tier architecture is a high-level logical design model for enterprise application. It is introduced to overcome the deficiencies of the two-tier architecture. Three tiered Windows applications are component-based enterprise applications. This thesis is about three-tiered Windows applications and related technologies. The first two parts of the thesis gives theoretical background of the study. The third part demonstrates a three- tiered business application. Microsoft Visual Basic and Microsoft Component technologies are used to develop application.Master Thesis Computer network simulation(2004) Faraj, AqeelThis thesis discusses about simulation of collision rate in Ethernet (local area network) by using CSMA/CD (carrier sense multiple access /collision detection). We try to simulate this network by introducing five different types of protocols which are Pure Aloha, Slotted Aloha, 1 -persistent, Non- persistent and P-persistent protocols. These protocols are investigated to find out which protocol has less collision rate and more data sending rate (DSR) based on some parameters such as; file size, waiting time and so on. And also the effects of the file size and the size of data packet on collision rate, data sending rate and total time have been obtained for all protocols used. m In this thesis a simulation program is used. Simulation has been implemented by using VC++ User interface, where we use Ethernet network with 10 computers connected to the same line, in order to allow the user for controlling in the parameters of network. Choosing a proper protocol is significant and has effect on the overall performance of the network [1-2]Master Thesis Design and analysis of native XML databases in three-tier architectures(2004) Ergen, Mehmet TunçXML is rapidly emerging as a standard for exchanging business data on the World Wide Web. From management systems to e-business application providers to pure development tools, XML has gone from newly underground technology to integrated component standard. It is used as the file format of choice for Web development, document interchange, and date interchange, and presents a new world of opportunities and challenges to programmers. It is predicted that by at the end of 2004, more than 75% of e-business applications will include XML regardless of which language the application has been written in. As more and more applications starts using XML there wilt be a need to efficiently handle the XML data at the back-end. The need to efficiently store and process XML documents has created the new XML supported technologies and tools. One of these tools is the Native XML Databases. It is based on document-in, document-out architecture with capabilities for storage, retrieval, querying and updating the documents. While Native XML Databases are an important new technology, they should not be used without careful analysis and consideration. In this thesis Native XML Databases are investigated and analyzed in a 3-tier architecture to gain and ensure several advantages that three-tier systems offer to application developers and information technology industryMaster Thesis Software implementation of I2C bus into Zilog MCU(2004) Yüzbaşoğlu, FıratThis study describes the design and implementation of multi-master software PC bus on Zilog's z8 microcontrollers. PC bus is developed to support a com- munication integrated circuits (ICs) and microcontrollers on the same board. The bus is expanded from a single board to separated desks. During the data transmission, a fully software handshaking provides a synchronization between two asynchronized microcontrollers. There are many PC hardware integrated chips in the market. On these chips, start of the transmission is detected by polling. An interrupt based hardware start detection is designed to prevent waste of time and resources in this work. Testing results show that transmis sion speed of software PC bus on Z8 microcontrollers is reached to the PC bus standards of Philips Semiconductors CoMaster Thesis Developing a library for computer graphics application based on Direct X functions(2004) Rapaka, RajeshThe growing need for computer graphics applications demands flexible and powerful libraries. However, the available libraries are not easy - to - use software systems. The main reason is that these systems have been developed for general applications and a large number of different cases including error cases have been dealt with. My aim in this project is simplifying the use of these systems by developing a shell, which includes some library functions. These functions deal with the general cases and eliminate the need for considering them in the developed programs. Ill Some libraries were developed for "Moving in a 3D environment", "Auto texture generation", "Illumination" and "Texture blending". These libraries should reduce the strenuous manual coding and give accuracy and simplicity in debugging. Many untouched parts of OpenGL were revised and many undesired functionality were correctedMaster Thesis 3D graphics engine design(2004) Bal, MuammerThis thesis presents a 3D Graphics Engine design which includes geometrical methods, graphics pipeline, collision detection, animation of characters, geometric level of detail, terrain, and special effect parts. The quality and also the speed of the designed 3D Graphic Engine is very important. Because of this all methods that are used in designed 3D Graphic Engine are selected as to reach high quality and speed. Application of the designed 3D Graphic Engine shows that the Engine supports high quality and speedMaster Thesis Earthquake simulator(2004) Yeniaras, ErolAs a vibration of ground, earthquake results in a time-dependent displacement on the bases of the buildings and creates a dynamic effect. Especially, in the countries in which eartquakes take place more frequently and more violently, the investigation of these vibrations is one of the main problems of "Dynamics of Structures". The design process of an earthquake-resistant structure consists of two steps. The first one is to arrange the structure well and to use the material of good quality. The second step is to meet the eartquake-induced dynamic forces acting on cross-sections of structural members by determining them accurately. Eartquake effect, by forcing the structures more than usual loads, reveals the faults made in the design and application periods. Before erecting a building, it is, undouptedly, very important to know the effect of a probable earthquake on it. The goal of this thesis is to apply an eartquake, which is already taken place and whose time-dependent acceleration data of ground motion is recorded, to a building and to simulate the behaviour of the building on the computer screen. In order to do this, developing a software called EqSim is included in the scope of the thesis too. Consequently, it is aimed to produce a program that can be used by the structural engineers in the period of designing buildings