Bilgisayar Mühendisliği Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/58
Browse
Browsing Bilgisayar Mühendisliği Bölümü Tezleri by Issue Date
Now showing 1 - 20 of 253
- Results Per Page
- Sort Options
Item Citation Count: YILMAZ, E.G. (2002). PC and embedded web server based remote control. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.PC and embedded web server based remote control(2002) Yılmaz, Erdem Gökhan; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüApplication fields of remote control is enlarging, as cost effective and compact solutions are provided. Embedded Web Servers are one of these solutions that is recently introduced. PCs can be found everywhere and with the software support, it is easy to use them as web servers in remote control. Embedded Web Servers, with their great performance compared to their small sizes, seems to be good candidates to replace PC based web servers in most of the remote control applications. This work is about interfacing a remote control applica tion to both of the web server types. A standard pentium is used for PC based system. Embedded web server was the eZ80 from Zilog Inc. Centronics on PC and UART on eZ80 are the interfaces I have worked with.. Remote control application is built into an embedded system, Z8 MCU, from Zilog Inc. The Z8 doesn't support special on chip solutions for both of the interfaces. There fore these interfaces are implemented by software. For PC based web server, I have developed a system driving two stepper motors in any direction and amount. With eZ80, I have developed a DC Motor ON-OFF control applica tion. Any client can control the application parameters using a standard web browser. The browser must support Java applets for PC based application and must support HTML-FORM for eZ80 based one. This project can be extended towards distributed control using the PC interface on the eZ80.Item Citation Count: Can, B. (2002). Specifications of object oriented database systems and performance test of an object oriented database engine. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri EnstitüsüSpecifications of object oriented database systems and performance test of an object oriented database engine(2002) Can, Barbaros; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Bölümü1990'ların başından bu yana nesne-yönelimli programlama bilgisayar dünyasında oldukça popüler hale gelmiştir. Bu eğilimin etkisiyle, geleneksel veri tabanı sistemlerinin eksikliklerini gidermek amacıyla nesne-yönelimli veri tabanı sistemleri ortaya çıkmıştır. Bu tez nesne-yönelimli veri tabanı sistemlerinin özelliklerini açıklamakta ve nesne-yönelimli veri tabanı sistemleri ile ilişkisel veri tabanı sistemleri arasında bazı karşılaştırmalar yapmaktadır. Tezin ilk iki bölümü çalışmanın teorik alt yapısını verirken, tezin üçüncü bölümü örnek bir uygulamaya dayanarak sistemleri karşılaştırmaktadır. Bu uygulamada nesne-yönelimli veri tabanı olarak db4o, büyüklük olarak her ikisi benzer ölçülerde olduklarından, ilişkisel veri tabanı olarak da MySql seçilmiştir. Uygulamanın programlanması için ise, tam bir nesne yönelimli programlama dili olan Java kullanılmıştırItem Citation Count: UĞURLU, T. (2002). Remote oracle database access, modify and control. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Remote oracle database access, modify and control(2002) Uğurlu, Taner; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüClient - based Remote Oracle Database Server can be accessed by configuring Oracle Client's and Server's Listeners by Net8 Assistant, ODBC (Open Database Connectivity) Driver and BDE (Borland Database Engine) Administrator. When connection is established and access is realized; modifying, controlling remote Oracle Database Server's tables, fields, records and their properties is very difficult also sometimes it is not possible if the client and server listener are not configured well. This project provides an efficient and easy to use environment for configuring, accessing and controlling a remote Oracle Database. The project provides a SQL command editor for advanced command typing that will be need in advanced usage. Guidelines for manual configuration and configuration using Net8 Assistant are introduced in this research. Also some guidelines for the configuration of ODBC and BDE are introduced as an aid for the user.Item Citation Count: ÖZBAY, E. (2002). Model based human face detection using skin color segmentation. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Model based human face detection using skin color segmentation(2002-01) Özbay, Eylem; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüModel Based Human Face Detection Using Skin Color Segmentation Özbay, Eylem Ms, Department of Computer Engineering Supervisor: Dr. Reza Hassanpour January 2005, 85 pages For identification of the people easiest way using the faces. However, it requires determining the location of the faces in the images. Face Identification systems are generally preceded by face segmentation systems. The main goal of thesis is locating the human faces and segmentation regions belonging to them using skin color segmentation methods and facial features such as nose, eyes, mouth etc. The segmentation results may be used as input to other related systemsItem Citation Count: UYSAL, M.P. (2002). Corba based management for distributed heterogeneous and multi database systems. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Corba based management for distributed heterogeneous and multi database systems(2002-05) Uysal, Murat Paşa; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüDistributed, Heterogenous and Multi Database Management Systems (DHMDBS) originated from the large organizations' needs for a centrally- controlled information management by special software and administrative procedures developed for that environment. They may be running on different machine and network architectures. Monitoring selected database user actions, investigating suspicious activity, auditing and gathering data about specific processes for this type of databases are allways great concern for database administrators. (DBAs)They have to use vendor specific applications as well as platform specific software or they might develop their own solutions. With this study, we propose a solution which is an integrated Distributed Object Computing Scheme (Object Request Broker (ORB) Mechanism, CORBA Specification) of Heterogenous Multidatabases. By this decentralised approach, Portable and Mobile Informative Agents (PMA) located on whether on the same host database or not, creates bidirectional communication channels with a Portable and Mobile Manager (PMM) as well. PMM would be on the local network or any other host which is connected to the other networks.With a user interface, DBAs will be able to audit, manipulate database actions. ORB Mechanism and CORBA specification are incorporated to increase reliability, iii portability, robustness and also facilitate integration of various database systems in the market. Keyword: Object Request Broker, Distributed, Heterogeneous, Multidatabases, Common Object Request Broker ArchitectureItem Citation Count: CHOUPANI, R. (2002). Client-server communication in remote control. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Client-server communication in remote control(2002-07) Choupani, Roya; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThe client server communication model has been used in remote controlling of devices. The main feature in this study is that the Internet has been used as the common media to transmit controlling data and receive information. Client server model on the Internet restricts the access to client computers and has the disadvantage of unknown platform on the client side. This problem has been solved by means of platform independent programming and Java applets. Socket interface available in application layer of TCP/IP protocol suit has been used to establish reliable connection between clients and server. Security issues have been dealt with in the server side by checking the IP addresses of requesting clients.Item Citation Count: BUZ, A.N. (2002). Image compression using discrete cosine transform. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Image compression using discrete cosine transform(2002-09) Buz, Ayşe Nurdan; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüIn today's world of computing, it is hardly possible to do without graphics, im ages and sound. Uncompressed data needs very large amount of physical storage space and transmission time. The availability of storage media and transmission channels are limited. Transmission of images requires high bandwidth or expen sive cables. JPEG is the current standard for compression and decompression of still, monochrome and color images. The purpose of this study is to develop a compression algorithm to reduce time in image transmission. The C/C++ lan guage is used for implementation. As in JPEG, Discrete Cosine Transform (DCT) is used as coding transformation. Static Huffman Tree is constituted for our re quirements. As a case study, Windows Bitmap (BMP) files are used. The encoded data is formed as binary file and after transmission it is stored as it was before.Item Citation Count: BOZKURT, F. (2003). Three tiered windows application. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Three tiered windows application(2003) Bozkurt, Feridun; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThe three-tier architecture is a high-level logical design model for enterprise application. It is introduced to overcome the deficiencies of the two-tier architecture. Three tiered Windows applications are component-based enterprise applications. This thesis is about three-tiered Windows applications and related technologies. The first two parts of the thesis gives theoretical background of the study. The third part demonstrates a three- tiered business application. Microsoft Visual Basic and Microsoft Component technologies are used to develop application.Item Citation Count: Altay, Serap (2003). Performance analysis of mobile IPv4 with and without route optimization / Mobil internet protokolü versiyon 4'de yönlendirme optimizasyonlu ve optimizasyonsuz performans analizi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.Performance analysis of mobile IPv4 with and without route optimization(2003) Altay, Serap; Çankaya Üniversitesi,Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Ana Bilim DalıPerformance Analysis of Mobile IPv4 With and Without Route Optimization Altay, Serap Ms, Department of Computer Engineering Supervisor: Asst. Prof. Gülsün Töreci May 2003, 92 pages The support of mobility in the modern communications network is becoming essential and important with the development of mobile devices. Mobile Internet Protocol is built on IPv4. Mobile IP has been proposed by IETF (Internet Engineering Task Force) to support portable IP addresses on Internet. In the basic Mobile IP protocol, datagrams destined for the mobile node are sent from wired or wireless hosts. These datagrams have to travel through the home agent when mobile node is away from home. On the other hand, the datagrams sent from mobile hosts to wired host can be sent directly. This asymmetric routing, called "Triangle Routing". On the other hand, when the destination node is very close to mobile host, this creates a problem. Solving of the problem "Triangle Routing" is one appealing topic in mobile IP. IETF proposed extension part of the basic mobile IP, called "Route Optimization" to address this problem. IPv4 has already been widely deployed. Moreover, it will most probably dominate the Internet for a long time. Therefore, in this thesis implemented mobile IPv4 with and without route optimization in OMNeT++. Simulations have already been done to justify the modification.Item Citation Count: DİLEK, M.H. (2003). Design and implementation of a search engine supported bookmarking service. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Design and implementation of a search engine supported bookmarking service(2003-05) Dilek, Mustafa Hadi; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThe bookmarks are the tools used by the Web users for revisiting the Web pages that they have visited before. But, the bookmak management approaches are not sufficient yet to use efficiently most of the facilities offered by the bookmarks, especially fast access to information. In this work, & system that the Web users can easily access to their bookmarks from anywhere and any browser has been developed and implemented. This system includes a centralized server and visually rich bookmark agents which join to this server. This system has also a search engine component at the server side. So, the bookmarks of the users can be crawled and indexed regularly. This is a new approach for the classical usage of bookmarks, and with this work the bookmarks turns to shareable personal search assistants.Item Citation Count: KARAKOÇ, İ. (2003). Artificial intelligence and its application. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Artificial intelligence and its application(2003-06) Karakoç, İlkay; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüArtificial Intelligence applications have been started in order to design computer programs that have human abilities. It has been thought that Artificial Intelligence applications will improve programs' abilities in the future. In these applications, the first step should be the determination of the knowledge and the method followed by the selection of the data set, rules and the suitable method. Then the control mechanism must be determined. In this thesis, the definition methods and techniques of Artificial Intelligence are mentioned and the Natural Language Processing, one of the applications of Artificial Intelligence is implied. Also a NLP program is designed to be a source for future works. This program is based on English language grammar rules. It is designed with respect to some determined tenses, because of the wide structure of English language. Prolog programming language and its properties of syncronization, recursion and list applications are used for program. In Chapter 1, the importance of Artificial Intelligence in human life is mentioned. Chapter 2, which mentiones the historical development of Artificial Intelligence is followed by Chapter 3, in which the fundamental characteristics of Prolog programming language is explained. In Chapter 4 data structures, list and tree mechanism are mentioned. In Chapter 5, human language rules are explained and a NLP program is generated.Item Citation Count: AKILLI, Y. (2003). Medical diagnosis via artificial intelligence. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Medical diagnosis via artificial intelligence(2003-06) Akıllı, Yücel; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüAlthough machine learning may induce reliable diagnostic algorithms from the limited description of the patient, such diagnostic tools definitely cannot, and also are not intended to, replace the physicians, but should rather be considered as helpful tools that can improve the physicians' performance. The results in this study and from other experiments convincingly demonstrate that the physicians' diagnostic accuracy should be possible to improve with the aid of machine learning. When applying a machine learning system in medical diagnosis there are several specific requirements that the system must meet. This study several issues related to the use of machine learning in medical diagnosis and prognosis problems. In this study, we see a system for medical diagnosis by learning Bayesian networks and rules. Prababilities between disease and sempthoms are used. The Bayesian networks can provide an overall structure of the relationships among the attributes. The rules can capture detailed and interesting patterns in the database. The system is applied to real-life medical databases.Item Citation Count: GÜLER, N. (2003). Artificial intelligence search methods. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Artificial intelligence search methods(2003-06) Güler, Namık; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüHere in this master thesis I am planning to explain and introduce artificial intelligence and search methods. You might be heard or read some papers or books about artificial intelligence, but also now you will have chance to refresh your mind and knowledge with this introduction to be familiar with artificial intelligence. Also you will find here artificial intelligence history and some definition of artificial intelligence. One of the main study and area of artificial intelligence is search methods. Actually we came across with search criteria everyday we never think how those methods functions. m Here you will find a few searching methods examples, which we use everyday and it will help us to understand and remember better. Many people now has pc or notebook at home or in the office and computer is widely used in our daily life. If you need to find a file, documents, pictures or music files in your hard disk, if it is not easy to remember exact location or name of the file. After we start running the search program after some time later depends upon the size of domain and also amount of information we have provided, we will have a result. Also if you are using internet, if you need to find out a file, documents, pictures or any kind or information, it is necessary to go to a search machine to and need to run it.Item Citation Count: ÖZTÜRK, H. (2003). A Survey on public-key infrastructures. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A Survey on public-key infrastructures(2003-09) Öztürk, Haluk; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüPublic-key cryptography is fast becoming the foundation for online commerce and other applications that require security and authentication in an open network. The widespread use of public-key cryptography requires a public-key infrastructure to publish and manage public-key values. Without a functioning infrastructure, public-key cryptography is only marginally more useful than traditional, secret-key cryptography. This thesis presents a set of characteristics that are common to all public-key infrastructures. These criteria are intended to encapsulate the fundamental issues that arise when dealing with such systems. They can be used both as a "shopping lisf for those who need to choose an infrastructure for a particular application, and as a guide for infrastructure developers, that they may be more aware of any compromises or tradeoffs they might make in their work. The characteristics are used to present a survey of current and some proposed infrastructure systems. The criteria reveal the strengths and weaknesses of each system, and indicate where improvements may be required.Item Citation Count: Çelik, Sezai Gökçe (2004). Component-oriented software engineering modeling tool / Bileşen yönelimli yazılım mühendisliği modelleme aracı. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.Component-oriented software engineering modeling tool(2004) Çelik, Sezai Gökçe; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Bölümüoz BİLEŞEN YÖNELİMLİ YAZILIM MÜHENDİSLİĞİ MODELLEME ARACI Çelik, Sezai Gökçe Yüksek Lisans, Bilgisayar Mühendisliği Bölümü Tez Yöneticisi: Yrd. Doç. Dr. Gülsün TÖRECİ Eylül 2004, 71 sayfa Bileşen Yönelimli geliştirme yeniden kullanımla yalandan ilgilidir. Temel fikir basittir. Yeni sistemler geliştirilirken önceden geliştirilmiş bileşenler kullanılır. Eğer bir sistem için özel bir fonksiyon geliştiriyorsanız, onu daha sonra başka sistemlerde de kullanılacak şekilde geliştirmek gerekmektedir. İlke olarak basit gibi görünse de geliştirmenin gerçekten zor oluğu görünmüştür. Bu çalışmada, bileşen yönelimli yazılım mühendisliğinin geçmişi ve esasları incelenmiştir. Bu esaslar doğrultusunda geliştirilmiş olan COSEML (Bileşen Yönelimli Yazılım Mühendisliği Modelleme Dili) temelleri esas alınarak, eksikliği hissedilen modelleme aracı tasarlanıp, geliştirilmiştir.Item Citation Count: Fakılı, Defne (2004). Fingerprint detection in digital images / Dijital resimlerde parmak izi saptanması. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.Fingerprint detection in digital images(2004) Fakılı, Defne; Çankaya Üniversitesi,Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Ana Bilim DalıPerson identification from fingerprints is one of the most reliable techniques in identification systems the reason is that every person has got a unique fingerprint and it does not change with age. It preserves the same pattern characteristics from birth to death. Person identification from fingerprints goes back to early China. This thesis subject is mainly fingerprint detection and processing, but to mention it in detail; concerning a digital image with fingerprints and some other background (background with text) one part of the thesis is to detect and separate the fingerprints into another file. Another part of the thesis is to let fingerprints go through a preprocessing stage and pre-identification stages to make the fingerprint ready for identification stages. So the first three stages of fingerprint identification 111are discussed. These three stages are preprocessing, binarisation and thinning. All these two parts of this thesis will be discussed later in detail. The stages that the fingerprint has to go through are preprocessing, binarisation and thinning stages. In preprocessing noise is eliminated and the image is smoothed if needed. In binarisation the fingerprint image turns into an image consisting of only black and white colors. This means with no colors in the grayscale range, but only black and white colors. In thinning on the other hand, the lines in the fingerprint pattern go through a thinning process which makes the lines thinner but still visible.Item Citation Count: Arpalı, Çağlar (2004). Architecture of new generation networks / Yeni nesil ağ mimarileri. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.Architecture of new generation networks(2004) Arpalı, Çağlar; Çankaya Üniversitesi,Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Ana Bilim DalıArchitecture of New Generation Networks Arpali, Çağlar Ms, Department of Computer Engineering Supervisor: Asst. Prof. Dr. Halil T. Eyyuboğlu June 2004, 64 pages In this thesis, two macro cell propagation models for network architecture of Universal Mobile Communication System (UMTS), namely, UMTS vehicular ITU-R model [1] and extended Okumura Hata model [2] are compared using digital map and field measured data collected from a particular site in Ankara, Turkey. Comparison is made on the basis of different environment of vegetations, terrains, buildings types and morphology structures. To overcome the inadequacy of the second propagation model, we have proposed different topography and morphology corrections. For this purpose, sample calculations are performed for path lengths of 2700 m while the general results are plotted for a range of 6000 m. We have also investigated radio network planning with related link budgets for comparing the cell ranges of both models according to the difference service type of 12.2 kbps voice and 384 kbps real-time data. Our findings indicate that in the determination of signal path loss, average buildings height {Amr) is more decisive than others in UMTS vehicular ITU-R model, whereas for extended Okumura Hata model, topographic structure of the terrain (Q) and effective antenna height (heff) are most dominant factors and UMTS vehicular ITU-R model predicts shorter cell ranges with respect to extended Okumura model.Item Citation Count: Fakılı, Defne (2004). Fingerprint detection in digital images / Dijital resimlerde parmak izi saptanması. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.Fingerprint detection in digital images(2004) Fakılı, Defne; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Bölümüöz Dijital resimlerde parmakizi saptanması Fakılı, Defne Yüksek Lisans, Bilgisayar Mühendisliği Tez Yöneticisi: Prof.Dr. Ziya Güvenç Haziran 2004, 65 sayfa Parmak izinden yola çıkarak kimlik belirlemesi, kimlik belirlemek için kullanılan yöntemlerden en güvenilir olanlarındandır. Çünkü her kişinin kendine özgü farklı bir parmak izi vardır ve bu yaş ilerledikçe değişmez. Doğumdan ölüme kadar aynı şekil özelliklerini korur. Parmak iziyle kimlik belirlemesi eski Çin devletinde ilk olarak uygulanmaya başlamıştır. Bu tezin birinci konusu parmak izinden kimlik belirlemede yapılacak gerekli işlemlerden oluşmaktadır. Bu tezde parmak izi kimlik belirlemesinde gerekli olan ilk üç aşama üzerinde durulmaktadır. Bu aşamalar sırasıyla; hatalardan arındırma (filtreleme yoluyla), keskinleştirme, bulanıklaştırarak keskin ve gereksiz detayları yumuşatma, imajı binary imaj formatma çevirme ve parmak izi çizgilerini inceltme aşamalarıdır. Bu tezde parmak izi algılaması için gerekli olan aşamalardan, bu aşamalar bahsedilmektedir.Bu tezin ikinci konusu ise bir dijital imajda parmak izini saptama için gerekli işlemlerden oluşuyor. Bir dijital imajda parmak izinin ve arka planda yazıların olduğu düşünülürse bu parmak izini saptamak ve ayırmak tezin ikinci konusudur.Item Citation Count: AYDIN, A. (2004). Smart sensors. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Smart sensors(2004-01) Aydın, Ayhan; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüSmart sensors are taking a large part in the growing world. They have lots of application fields that we are using in our daily life. For example lots of heater or cooler have sensors and lots of home or office have sensor systems. In this work a thermistor has been used to sense the temperature and an actuator has been used to change the temperature. Our aim was to develop a smart temperature sensor which will be able to give accurate results and hold the temperature at a desired range. Z8E086 microprocessors have been used in this work. First the temperature has been converted into an electrical signal. This electrical information has been converted into a digital signal using A/D Converters. Finally the temperature was displayed using this information. In this system sensor and actuator can talk each other via an I2C bus. One of them can be master and the other one slave. Thus, temperature can be hold in wanted rangeItem Citation Count: ERGEN, M.T. (2004). Design and analysis of native XML databases in three-tier architectures. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Design and analysis of native XML databases in three-tier architectures(2004-02-01) Ergen, Mehmet Tunç; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüXML is rapidly emerging as a standard for exchanging business data on the World Wide Web. From management systems to e-business application providers to pure development tools, XML has gone from newly underground technology to integrated component standard. It is used as the file format of choice for Web development, document interchange, and date interchange, and presents a new world of opportunities and challenges to programmers. It is predicted that by at the end of 2004, more than 75% of e-business applications will include XML regardless of which language the application has been written in. As more and more applications starts using XML there wilt be a need to efficiently handle the XML data at the back-end. The need to efficiently store and process XML documents has created the new XML supported technologies and tools. One of these tools is the Native XML Databases. It is based on document-in, document-out architecture with capabilities for storage, retrieval, querying and updating the documents. While Native XML Databases are an important new technology, they should not be used without careful analysis and consideration. In this thesis Native XML Databases are investigated and analyzed in a 3-tier architecture to gain and ensure several advantages that three-tier systems offer to application developers and information technology industry