Bilgisayar Mühendisliği Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/58
Browse
Browsing Bilgisayar Mühendisliği Bölümü Tezleri by Department "Çankaya Üniversitesi,Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Ana Bilim Dalı"
Now showing 1 - 18 of 18
- Results Per Page
- Sort Options
Master Thesis A comparison of NoSQL database systems: A study on MongoDB, apache HBase, and apache Cassandra(2016) Hammood, Ali HusseinDue to their many useful features, database management systems have been used widely with relational data for over 20 years. However, such systems are not able to handle massive and complex data efficiently. New systems known as NoSQL database management systems have appeared to deal with massive and complex data that provide fast and high performance. In this thesis, we discussed and tested three kinds of NoSQL database system in order to reveal their capabilities and how they respond in different operations. For this purpose, we set up a novel testing environment for each workload and examine the responses for the three systems. The results of this study show the weaknesses and strengths of each database system used in the study. Due to the different architectures of each database that we tested, we have seen different responses for each with changed workload operations. In our work, we used the Yahoo Cloud Serving Benchmark (YCSB), which is a framework designed by Yahoo to test database performance. According to the results obtained, we can conclude that MongoDB performed very well with low throughput, but not as well with high throughput. Cassandra and HBase performed very well under heavy loads due to their optimized designs. In the read operation, HBase has poor performance as compared to other systems tested.Master Thesis An exploratory study to assess analytical and logical thinking skills of the software practitioners using a gamification perspective(2015) Kayalı, ŞahinThe link between analytical and logical thinking skills and success of software practitioners attracted an increasing attention in the last decade. Several studies report that the ability to think logically is a requirement for improving software development skills, which exhibits a strong reasoning. Additionally, analytical thinking is a vital part of software development for example while dividing a task into elemental parts with respect to basic rules and principles. Using the basic essence of gamification, this study proposes a mobile testing platform for assessing analytical and logical thinking skills of software practitioners as well as computer engineering students. The assessment questions were taken from the literature and transformed into a gamified tool based on the software requirements. A focus group study was conducted to capture the requirements. Using the Delphi method, these requirements were discussed by a group of experts to reach a multidisciplinary understanding where a level of moderate agreement has been achieved. In light of these, an assessment tool was developed, which was tested on both software practitioners from the industry and senior computer engineering students. Preliminary results suggest that individuals who exhibit skills in analytical and logical thinking are also more inclined to be successful in software development.Master Thesis Analysis of mammography images for cancer detection(2016) Alshana, GhassanMammography is the best available technique for early detection of breast cancer. The most common breast abnormalities that may indicate breast cancer are masses. Also, there are some signs that can lead to breast cancer diagnosis, such as architectural distortion and bilateral asymmetry. In this study, an algorithm is used to detect breast cancer in mammography images. Four stages are presented: (1) preprocessing, (2) segmentations of regions of interest (ROI), (3) feature selection and extraction, and (4) classification. In the preprocessing stage, the digital mammogram is pruned, 2D-median filter is used to filter the image and unnecessary labels are removed from the breast. In the segmentation stage, global thresholding is used for segmenting the breast. Morphological operations like erosion, dilation, opening and closing are used to enhance the breast. Seeded region growing is used for removing the pectoral muscle and for segmenting the mass in the breast. In the feature selection and extraction stage, intensity features are selected and extracted from the ROI. In the classification stage, the extracted features are fed into artificial neural network (ANN) classifier to classify the mass as malignant or benign. The output of the proposed method would assist radiologists to examine images containing unusual masses more closely and to help them minimize misinterpretation. The method achieved 91.30% sensitivity, 91.30% specificity and 91.30% accuracy resulting from the confusion matrix which is a performance evaluation metric.Master Thesis Architecture of new generation networks(2004) Arpalı, ÇağlarArchitecture of New Generation Networks Arpali, Çağlar Ms, Department of Computer Engineering Supervisor: Asst. Prof. Dr. Halil T. Eyyuboğlu June 2004, 64 pages In this thesis, two macro cell propagation models for network architecture of Universal Mobile Communication System (UMTS), namely, UMTS vehicular ITU-R model [1] and extended Okumura Hata model [2] are compared using digital map and field measured data collected from a particular site in Ankara, Turkey. Comparison is made on the basis of different environment of vegetations, terrains, buildings types and morphology structures. To overcome the inadequacy of the second propagation model, we have proposed different topography and morphology corrections. For this purpose, sample calculations are performed for path lengths of 2700 m while the general results are plotted for a range of 6000 m. We have also investigated radio network planning with related link budgets for comparing the cell ranges of both models according to the difference service type of 12.2 kbps voice and 384 kbps real-time data. Our findings indicate that in the determination of signal path loss, average buildings height {Amr) is more decisive than others in UMTS vehicular ITU-R model, whereas for extended Okumura Hata model, topographic structure of the terrain (Q) and effective antenna height (heff) are most dominant factors and UMTS vehicular ITU-R model predicts shorter cell ranges with respect to extended Okumura model.Master Thesis Assessing the maturity of software testing services: A model and its industrial evaluation(2016) Arkan, SeyfettinWhile many companies conduct their software testing activities in-house, many other companies outsource their software testing needs to other firms who act as software testing service providers. In the context of software testing services, there could be various challenges and as a result the quality of services is not always as expected. Thus, it is important, for both providers and also customers of services, to assess the quality and maturity of test services and subsequently improve them. This thesis proposes a maturity model for software testing services (called MM-TSVC) which has been developed based on the principles of the 'CMMI for Services' (CMMI-SVC) model and in close collaboration with several industry partners offering software testing services. To assess the applicability and usefulness of the model, the model was evaluated in two industrial settings by applying it in two companies who provide software testing services in Turkey. The quantitative and qualitative results of the case study have shown that the proposed model has been helpful for both of the companies and their managers by helping them objectively assess the maturity of their testing services and also to pinpoint potential improvement areas.Master Thesis Authentication mechanism of Electronic Health Record (EHR) in the cloud(2015) Hurmuzlu, MineElectronic health record (EHR) is a system that contains patients' complete medical related records from birth to death. These records consist of diagnoses, medications, laboratory tests, and results. The records are created by the patients and accessed by health providers such as doctors, nurses, pharmacies, etc. The advantages of using cloud computing has helped the health organizations to dispense the local servers and shift all their data to the cloud, which helped them save space, energy, and cost, as well as provide the benefit of accessing the data by patients and healthcare providers from anywhere at any time. Exchanging medical records in the cloud, however, has threatened the security and privacy of e-health systems where the authentication, access control, and integrity of the medical records are the main challenges in e-health clouds. In this thesis, we study the authentication mechanism of an EHR system and investigate an improved version using attribute based encryption ABE. Patients have full control over their medical records which are stored in a semi trusted servers. The system also works on access policies in case of emergency.Master Thesis Constructing low diameter topic-based Pub/Sub overlay network with minimum maximum node degree(2016) Layazalı, SİnaPublish/subscribe communication systems, where a large number of nodes (publishers and subscribers) are interested in variety of topics, have received more attention in recent years. Constructing an efficient overlay network that connects the nodes interested in several topics is an important issue in these systems. In constructing effective and scalable overlay networks, pub/sub network designers prefer to keep the diameter and maximum degree of the network low. This is in addition to lower running time cost and higher scalability. However, the existing algorithms seem to fail in decreasing maximum node degree and reducing diameter. To address these issues for a given set of nodes with variety of topics, we present a heuristic algorithm known as Constant Diameter Minimum Maximum Degree (CD-MAX) which decreases the maximum node degree and maintains the diameter of the overlay at most at two. The new algorithm improves the maximum node degree, by 64 percent. The CD-MAX algorithm selects the node with the lowest node degree and connects it to its neighbors. For more than two nodes with an equal highest node degree, this algorithm selects the node with the highest density. The CD-MAX algorithm has a refinement version that decreases the maximum node degree even further. The algorithm is validated and analyzed through simulations.Master Thesis Designing and evaluating a context-aware recommender system for mobile devices(2016) Al-Azzwi, Aws Nazar AhmedTavsiye SistemleriMaster Thesis Development of a face recognition system for e-government in Iraq(2014) Hassan, MoradInnovations of technology build important effects on the world wide. Technological developments influence economy, social life, business and the way public services delivered. Public services are provided in associate degree electronic format to scale back time and value and to boost service quality. These innovations also cause a social transformation. Governments are required to adopt such changes and to be a related of "Information Society". This thesis proposes e-government model based on the citizen's participation and improvements in the delivery of governmental services by using a qualitative case study strategy considering the Kirkuk region in Iraq. Regarding the proposal a Graphical User Interface (GUI) has been developed in order to compare the input face image with existing database images to display the citizen information such as (name, surname, birth date, etc.) This e-government model can also be used to detect the cases of forgeryMaster Thesis E-recruitment perceptions: Importance,processes and requirements(2016) Alsabonji, QasimNowadays, the old-style methodology of recruitment has been transformed with the concept of on-line recruitment, or what we can abbreviate to e-recruitment. Because of the increasing number of end users of the Internet globally, e-recruitment has developed rapidly in recent years. E-recruitment has opened the way for new concepts in employment with easy to access to information, easy management and savings in time for both workers and employers. The main objective of this research is to demonstrate the importance of e-recruitment to any enterprise and to discuss the impact of using the medium of the Internet as a channel for the recruitment process. In addition, this study endeavors to show how we can decrease the overall cost of the recruitment process, and how to provide a more integrated functionality to the recruitment process in addition to identifying the benefits of e-recruitment for both employers and applicants. Moreover, this study suggests e-recruitment for the University of Kirkuk as a case study. An e-recruitment system implementation at the University of Kirkuk is also discussed in addition to identifying the benefits of using an e-recruitment system to jobseekers and stating the impact of e-recruitment in improving the human resources management mechanism. Finally, a number of recommendations by the researcher are presented regarding financial and administrative issuesMaster Thesis Fingerprint detection in digital images(2004) Fakılı, DefnePerson identification from fingerprints is one of the most reliable techniques in identification systems the reason is that every person has got a unique fingerprint and it does not change with age. It preserves the same pattern characteristics from birth to death. Person identification from fingerprints goes back to early China. This thesis subject is mainly fingerprint detection and processing, but to mention it in detail; concerning a digital image with fingerprints and some other background (background with text) one part of the thesis is to detect and separate the fingerprints into another file. Another part of the thesis is to let fingerprints go through a preprocessing stage and pre-identification stages to make the fingerprint ready for identification stages. So the first three stages of fingerprint identification 111are discussed. These three stages are preprocessing, binarisation and thinning. All these two parts of this thesis will be discussed later in detail. The stages that the fingerprint has to go through are preprocessing, binarisation and thinning stages. In preprocessing noise is eliminated and the image is smoothed if needed. In binarisation the fingerprint image turns into an image consisting of only black and white colors. This means with no colors in the grayscale range, but only black and white colors. In thinning on the other hand, the lines in the fingerprint pattern go through a thinning process which makes the lines thinner but still visible.Master Thesis Multi-word expression detection for turkish(2016) Hürmeydan Ersoy, NazlıIn this thesis, I performed text analytics on Turkish academic articles about four science subjects and detected collocations according to statistical measures and tried to benchmark the results of each method in these subjects. The main purpose of my thesis is to create a terminology dictionary using only example journal articles. In accordance with this purpose, I applied some machine learning methods on Weka to test if my scores and Weka results can get more reliable results.Master Thesis Obstacles to applying e management in Libya(2019) Hussin, RamziE-management can eliminate the obstacles faced by traditional management by the use of information and communication technologies (ICT). ICT is widely used by government, public and private institutions in order to facilitate the life of people. The current study uses a survey research method in order to obtain opinions of the participants on obstacles of applying e-management in Libya. An online survey was presented to 120 participants to get self-reported quantitative data. Descriptive statistics were used to evaluate the perceptions of the participants on the obstacles of e-management. The overall driver assessment shows that e-management project in Libya is possible to fail at current time. The mean of responses on the strategy assessment is 3.18, suggesting that there is not enough strategy to apply this assessment at current time. The overall management assessment showed that the mean value was 3.34, which is less than 5. This result was expected due to the lack of successful management in governmental institutions. The analysis of the design assessment showed that it was close to the failure. In spite of the overall competencies assessment, the existence of one factor seems to succeed where it has a mean value of 5.28. This factor is the education of information and communication technology by system managers, developers, operators and users. The overall assessment of this section has a mean value of 4.81. The overall technology assessment has a mean value of 3.61, which is less than 5 and indicate that the technology assessment would fail if applied at current time. The final assessment of our study is the other assessments which have a mean value less than 5. This assessment has a one statement in which mean value of the assessment is greater than 5. This statement is about perseverance by implementers where the mean value of responses is 5.02.Master Thesis Performance analysis of mobile IPv4 with and without route optimization(2003) Altay, SerapPerformance Analysis of Mobile IPv4 With and Without Route Optimization Altay, Serap Ms, Department of Computer Engineering Supervisor: Asst. Prof. Gülsün Töreci May 2003, 92 pages The support of mobility in the modern communications network is becoming essential and important with the development of mobile devices. Mobile Internet Protocol is built on IPv4. Mobile IP has been proposed by IETF (Internet Engineering Task Force) to support portable IP addresses on Internet. In the basic Mobile IP protocol, datagrams destined for the mobile node are sent from wired or wireless hosts. These datagrams have to travel through the home agent when mobile node is away from home. On the other hand, the datagrams sent from mobile hosts to wired host can be sent directly. This asymmetric routing, called "Triangle Routing". On the other hand, when the destination node is very close to mobile host, this creates a problem. Solving of the problem "Triangle Routing" is one appealing topic in mobile IP. IETF proposed extension part of the basic mobile IP, called "Route Optimization" to address this problem. IPv4 has already been widely deployed. Moreover, it will most probably dominate the Internet for a long time. Therefore, in this thesis implemented mobile IPv4 with and without route optimization in OMNeT++. Simulations have already been done to justify the modification.Master Thesis Scalable, secure and interoperable design for the Internet of Things(2016) Albayati, Ammar Jameel HusseinA vast number of "things" have been used to meet innumerable commitments of ICT in our contemporary world. Most of these "things" are placed in different locations and regularly work to serve individual users or groups and give them the ability to access them by using their own networking, applications and/or individual databases. Most of these applications run these data exclusively. For these reasons, it will not be easy to integrate a third party application within them or ensure the security and privacy of collected data. Moreover, end users face difficulties in accessing these data from anywhere in a unified form. At the present moment, the adoption of delivering this technology in new ways is growing rapidly. In this thesis, a new design for the Internet of Things is proposed, which we call "Web IoT." The new design can play a role between things and stakeholders by virtualizing these entities and making them available to end users from anywhere. It also offers a wide range of tools and options for stakeholders to host many types of entities in one place, thereby giving them the ability to control and manage content, share this content in social networks, apply more personalization, dynamically update, and much more. Our design was tested in terms of scalability, functionality and flexibility. Web IoT will help to overcome the limitation of collected data in a secure and scalable manner.Master Thesis Sentiment analysis and gender prediction in twitter data(2015) Balaban, ErtuğrulIn this thesis, tweets from Twitter that have been sent by users will be considered on a preferential basis in accordance with determined or requested specific key word(s). Also the interpretation of these tweets, by the computer, will be examined in a way as they are "Positive", "Negative" or "Neutral". In this context, under the heading 'Twitter Sentiment Analysis', studies were conducted and the success rates of achieved results were compared. In addition to this, on the basis of the usernames(of users) who send tweets, tweets was compared with Turkish Special Names which is shared by the Turkish Language Association (TDK) and also achieved results and gender determinations of users in terms of "Female", "Male" or "Not Determined," were examined. Under the heading of 'Gender Prediction in Twitter' studies were conducted and the success rates of achieved results were compared. On the basis of this study, the related topics of 'Sentiment Analysis' and 'Gender Prediction' were examined for Turkish Language and all of these studies were carried out through Turkish language.Master Thesis Smart home design with IoT (Home automation)(2018) Hadi Al-Samarraei, Yasser SamirSmart home's conception has been growing topic in our modern community. The content of smart automated items, such as home electronic devices, communicate together with users. These devices are quite expensive when compared to non-intelligent devices. In this thesis, a Home Automation system has been studied and developed to automate existing appliances by supporting them with modern smart technology. In this effective way, the cost can be lowered with upgrading the automating system instead of replacing entire the items. A Home Automation System has been implemented and designed to solve several common issues in this thesis. IoT security items have been investigated with the smart house (Home Automation) and clarified to become a basic stage of the Home Automation system. Smart home (Home Automation) application is designed to monitor and secure the home security sensors. An application has been performed to monitor and control the smart home system. The system is based on hardware and software components (such as Arduino Mega 2560) and can be acted as a security guard of the home. The system has been designed to monitor the humidity, temperature, light, gas, fire, burglar alarm in the house and has a passive-infrared sensor to make sure that the family in safe. Sensors have used on windows and doors to monitoring any an unauthorized intruder or in case of forgetting to close it. In addition, the system is also connected with GSM system (Global System for Mobile communication) to send notification SMS message (Short Message Service) to specific destinations in case of detecting something from sensors while "the system activated" mode on. The system (equipment of the home design) also has been controlled by using android application via BluetoothMaster Thesis Structure from motion using a single camera(2016) Isawi, Muthana Yaseen Nawaf.This thesis introduces a general survey of conversion algorithms, their advantages and disadvantages and a thorough explanation of the basic concepts in the field of 3D model reconstruction. The thesis concentrates, step by step, on the structures of motion technique and reconstruction of three-dimensional models from image pairs. The reconstruction process is carried out using a single calibrated camera and an algorithm based on only two views of a scene, the SFM technique based on detecting the correspondence points between the two images, and the epipolar inliers. All the experimental results have been computed using MATLAB (R2015b). By using the KLT algorithm we figure out the incompatibility of it with the widely-spaced images. Also, the ability of reducing the rate of reprojection error by removing the images that have the biggest rate of error. The experimental results are consisting from three stages. The first stage is done by using a scene with soft surfaces, the performance of the algorithm shows some deficiencies with the soft surfaces which are have few details. The second stage is done by using different scene with objects which have more details and rough surfaces, the algorithm results become more accurate than the first scene. The third stage is done by using the first scene of the first stage but after adding more details for surface of the ball in order to motivate the algorithm to detect more points, the results become more accurate than the results of the first stage. The experiments are showing the performance of the algorithm with different scenes and demonstrate the way of improving the algorithm. At last, we would like to mention that the aim of thesis is to figure out the depth information from two 2D images, and not to create 3D image from two 2D images.