Matematik ve Bilgisayar Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/222
Browse
Browsing Matematik ve Bilgisayar Bölümü Tezleri by Department "Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar Bölümü"
Now showing 1 - 20 of 29
- Results Per Page
- Sort Options
Master Thesis A modified securtiy approach for web application used for the registration of the student at Çankaya University(Çankaya Üniversitesi, 2014) Sosa, Ali SamiThis thesis goal is to design and implement a modified security approach for web-based system for student's registration in Natural and Applied Science Institute of Çankaya University Web application that help students to register by using the Internet..The employee can also use this application to track follow student status by monitoring the student information and give a report for each user, this proposed application can reduce time and effort for the users.The proposed application system can also be applied on smart devices (Iphone and Ipad)Master Thesis A prototype for assessment of information security awareness and implementation level(2013) Kocamustafaoğulları, MeltemInformation is one of the most valuable assets for any organization and it should always be appropriately protected. Information security is the protection of information against threats to ensure the business continuity. Relying only on the technology is not sufficient and the human factor is the weakest cycle which needs to be strengthened for effective and sustainable information security management. Information security is not only related with technology but it is rather harmonization of people processes and technology. Organizations have the tendency to take action after security incident occurs instead of proactively. There is lack of awareness concerning the information security concepts and its necessity. Awareness and understanding at management level is utmost important to establish and maintain security culture in the organization. Organizations should be aware of information security aspects, understand their own security requirements and implement countermeasures accordingly. There are good practices and internationally accepted security standards such as ISO/IEC 27001 and ISO/IEC 27002 that can be taken as reference point and guidance. Organizations should establish and implement, sustain and improve information security management taking into account the proven good practices tailored for their own requirements. In this thesis it has been aimed; i. To provide a prototype model and tool for self assessment of information security awareness and implementation level of organizations, ii. To provide a tool to utilize as reference point for organization in building own security requirements and objectives as well as monitoring own overall progress, iii. To facilitate a self explanatory web-based tool addressing wide range of users without the need for prior training or in-depth technical knowledge on information security based on ISO/IEC 27001 and ISO/IEC 27002 international security standards and covering essential and common practice security topics, iv. To provide comparable values with other organizations who have similar information security requirements, v. To prepare tool in Turkish for contributing to improvement of information security awareness and implementation among organizations. The model is designed in eight sections for assessment of; IS Corporate Approach, Information Assets Security, Human Resources Security, Physical and Environmental Security, Communications and Information Systems Operations, Information Systems Access Control, Development and Maintenance Management, IS Incident Management and Business Continuity, IS Compliance and Monitoring Management. The tool is implemented in line with the designed model and tested by experts having solid professional background on information security as well as selective users in Turkey from various sectors such as finance, public authorities, consulting companies and education. The feedback and results verified that the objectives of the thesis are achieved and the tool can serve to improve information security awareness and implementation level of the target users with its web based, self explanatory and user friendly tool environmentMaster Thesis An investigation of electronic government transition case study in health: Hospitals in Erbil(2013) Jamel, Ahmed Abdulrahman M.Electronic government initiatives and public participation to them are among the indicators of today's development criteria of the countries. After consequent two wars, Iraq's current position in, for example, UN's e-government ranking is quite concerning and did not improve in recent years, either. In the preparation of this work, we are motivated with the fact that handling geographic data of the public facilities and resources are needed in most of the e-government projects; such examples are reported to the literature. Geographical information systems (GIS) provide most common tools not only to manage spatial data but also to integrate such type of data with nonspatial attributes of the features. With this background, this thesis proposes that establishing a working GIS in the health sector of Iraq would improve e-government applications. As the case study, investigating hospital locations in Erbil is chosen. The results show that setting up a GIS in Erbil does not require extreme technical knowledge; however, a strong limitation that obtaining clean and up-to-date data is an important concern. Although it is possible to establish a GIS in this sector, the starting point should not be acquiring hardware and software but to collect clean data from the field and to ensure that the data gets updated timely. Keywords: e-government, Iraq, Erbil, GIS, spatial data, hospital locationsMaster Thesis Audio watermarking using DWT of second level decomposition of low frequency and using RMS on approximation coefficients(Çankaya Üniversitesi, 2014) Maraha, Heyam Essam JibraelDigital media are distributed through the internet system in a magnificent manner due to the efficiency and inexpensiveness of such a system. Audio clips and other digital signals are transmitted, shared and used easily. This causes a real security problem. Solving this problem leads to finding authentication techniques to provide security for these digital media. Digital watermarking is a suggested solution technique to offer such security for these distributed digital signals. Digital watermarking is the art of embedding information (a watermark) in the original signal, taking into consideration preserving the quality of the host digital signal. There are different types of watermarking media such as image, video and audio; our thesis focuses on audio watermarking techniques. Also, there are a variety of techniques using the watermarking algorithm that depends on the type of algorithm that is used to embed the watermark in the original signal. In our thesis, we have used DWT (Discrete Wavelet Transform) of second level decomposition of the approximation coefficients of each frame. These frames are resulted from segmenting the original audio clips into frames, each one equal to 10 seconds. Also, we have applied the RMS (Root Mean Square) to these approximation coefficients which represent the low frequency of each frame. The aim of using the RMS is to find the higher magnitude approximation coefficients among the segmented frames; then to embed the watermark in a quarter of the selected frames according to the magnitude order. A watermark of 256 x 256 pixels was embedded in two tested audio clips (Pop and Classic) according to the former algorithm. We have applied 17 attacks that try to remove or modify the watermark that is hidden in the original audio clips. Also variety of models such as subjective and objective models were applied to evaluate the efficiency of the proposed algorithm results. The results of the proposed watermarking technique show an effective robustness against most of the applied attacks, especially in MP3 Compression, Quantization, Additive Noise, Resample and Low Pass Filter; however, it shows fragile robustness in Time Stretch and Pitch Shift attacksMaster Thesis Binary image watermarking on audio signal using wavelet transform(Çankaya Üniversitesi, 2014) Rashid, Rakan SaadallahDigital watermarking approaches have recently become an important field of study in a number of practical applications. Generally, digital watermarking is the process of embedding particular information data into other signal data in such a way that the quality of the original information data is maintained. Watermarking can be performed on images, video, text, or audio to protect them from copyright violation. Among all of these types of watermarking, audio watermarking is difficult since the quality of such signals is highly affected by the watermark code. This thesis introduces some approaches that have features and may be applicable for audio watermarking. Generally, the digital audio watermarking approaches may be performed in either the special domain or the transform domain. The approaches that are based on the transform domain are gaining more attention due to their robustness or resistance to attackers. The most commonly used transforms for achieving digital audio watermarking are discrete cosine transform (DCT), short-term Fourier transform (STFT), and digital wavelet transform (DWT). In this research work, the main attention is paid toward digital wavelet transforms such as Haar and Daubechies-4. In addition, this thesis investigates the process of embedding a binary image into various audio signals such as speech and music signals. The values of the pixels in the binary images are either 1 or 0. These pixels are inserted into samples of the speech signal in such a way that the quality of the speech signal is preserved. One main reason to consider the audio watermarking approaches in the wavelet domain is that many modern multimedia standards such as JPEG2000 and MPEG-4 are based on the discrete wavelet transform. These common standards have brought new requirements such as low bit-rate transmission, coding, and many other advantages. Finally, experimental results are presented to validate the performance of the proposed watermarking approach and to compare its performance with other related watermarking approaches. The results show that the performance, in terms of signal-to-noise ratio (SNR) and normalized correlation (NC), of the proposed watermarking approach outperforms other approaches based on DCT. In addition, the results show that the extraction process of the hidden code becomes complex when considering any signal processing operations such as MP3 compression and high pass filtering. The worst case is when using a high pass filter where the recovered binary image is not satisfactoryMaster Thesis Crawling the web using Apache Nutch and Lucene(Çankaya Üniversitesi, 2014) Abdulwahid, NibrasThe availability of information in large quantities on the Web makes it difficult for user selects resources about their information needs. The good link between the internet users and this information is Search engine. Search engine is kind of Information Retrieval (IR). It works on data collection from the Web by software program is called crawler, bot or spider. Most of Search Engines users don't know the mechanism of action the Search Engine, like how Search Engine works and how it catch information in the Web and how it rank the results to users. For this reason in this thesis used the open-source Search Engine is researched in detail. In this study, we used each of (Apache Nutch and Lucene) to clarify work of Web crawling open source. They are released under the Apache Software Foundation. Nutch is a web Search Engine working to search and index Web Pages from the World Wide Web (WWW). Nutch is based or built on top of Lucene. It uses in the information retrieval technology. It has more software libraries to indexing of large-size data. Lucene doesn't care about information existing in the Web, like PDF, TEXT, and MS Word. It is working to indexing these documents and convert them to the data can be utilized. The benefit of using both Nutch and Lucene in this study, they are free and we can their development. The Nutch and Lucene are written by Java language, it is a computer programming language. Furthermore, we used Tag Cloud Technology to analysis and view the Lucene content or its indexMaster Thesis Cyber security in the national protection of Turkey(2012) Aydın, FarukCyber attacks supported by individuals and states are increased by the prevalence of information technologies and usage of these technologies at the critical infrastructure of the states. In this study, these cyber attacks and associated impacts are researched. In connection with this issue, evolution of cyber threats from malware such as viruses to weapons is studied by examples. In addition, within this thesis, precautions against these threats are mentioned. Usage of anti-malware applications as prevalent precautions is assessed within this context. National and international standards of information security, information security strategies of EU, USA and some other countries and precautions for cyber security of Turkey are studied. In the 9th Development Plan of Turkey, building information society is targeted. In this thesis, requirements to reach this target securely are researched. Under this information, it is considered that educated citizens and companies along with public institutions should cooperate to provide a nationwide cyber security. Consequently, it is defended that government should play an affective role to protect, educate, and guide governmental and private companies and citizens about cyber security. Accordingly, this thesis advises that cyber security should be put into the next development planMaster Thesis Developing an efficient stream control transmission protocol (SCTP) multi-streaming using pluggable priority algorithm for network optimization(Çankaya Üniversitesi, 2014) Al-Hadeethi, Abdulbaqi KhasheaThis thesis introduces a pluggable priorities algorithm for the SCTP protocol(PP-SCTP) as a method of reducing delay in the transmission of main data during periods of low bandwidth access. The SCTP protocol in the transport layer uses a Round-Robin or First-Come, First-Served method to transfer the data. These methods do not provide efficient and flexible choices. We set the priority of the streams in accordance with client demand. The PP-SCTP is useful for applications that send different types of data, such as still images, video, text, and documents. The goal of this thesis is to obtain a more flexible and more efficient choice for the end user or customer. The problem germane to this thesis lies in the transport layer, examples of which include the SCTP protocol with multi-streaming. Coding was written to test the various combinations and permutations of algorithms and protocols. In Chapter 5, we discuss the results of our work with the PP-SCTP priority algorithm, most notably its greater efficiency and the reduction of average latency in comparison to other algorithms and protocols in various combinations and permutations, including the First-Come, First-Serve data transfer methodMaster Thesis Discrete Mittag-Leffler functions in fractional calculus(2011) Benli, BetülA specific type of Caputo q?fractional differential equations has been solved. The solutions have been expressed via the generalized q- Mittag Leffler func- tions which were comprised a while ago. The method of successive approxi- mation has been used to reach the solutions. Mittag-Leffler function makes q-analog, which was proposed by Kilbas and Saigo before, generalized. In addition to this, discrete Mittag-Leffler functions and q-analog Mittag- Leffler functions, concluded by T. Abdeljawad and D.Baleanu recently, have been discussed in the content of this thesisMaster Thesis Effects of e-government and GIS technology for developing services in education sector case study: Schools in Kirkuk City center(Çankaya Üniversitesi, 2014) Abdulrahman, Bashar AdnanThe field of e-government has become an important subject around the globe because it refers to the delivery of government services by means of technology to save resources and bring governments closer to their citizens and to the private sector. This study underlines how most e-government projects require spatial datasets to improve public services. Pertinent examples already found/extant in the literature are examined, and investigating schools locations in Kirkuk city are selected for the case study. In parallel to the literature review, a study of the geographical distribution of schools is shown to be necessary such that land use for educational facilities occupies an unobjectionable part of the Kirkuk urban area, which in turn makes decision makers take this (land) use into account when the government is to establish city master plans. This thesis presents how establishing a working GIS in the education services would improve e-government applications due to the fact that GIS tools and facilities improve flexibility and accuracy in the management of both spatial and non-spatial datasets. As the measurements recognized by the EU and UN show, e-government initiatives need to be prepared above accurate, clean, timely and controlled shared datasets. Therefore, establishing strong databases and making legislative changes to enable data sharing among government agencies are found to be the primary targets of both central and local governments. The thesis shows that establishing a working GIS to provide services to students, teachers, citizens and decision makers in the education sector is technically feasible. However, the starting point ought to be collecting raw data from the field and ensuring that the data is updated in a timely manner, and not acquiring hardware and software. In so doing, Iraq can rank higher in international e-government measurement reportsMaster Thesis Fixed point theorems for cyclic contraction mappings(2013) Balpetek, GüzinIn this thesis we do a survey about cyclic contractıon mappıngs on some special metric spaces and also we examine fixed point theorems for the cyclic contraction mappingsMaster Thesis Fractional differential equations and their applications(2004) Avkar, TanselThe Laplace transform method for solving fractional differential equations is pre sented. The fractional diffusion and fractional Schrödinger equations together with their properties are investigated. The Lagrangians linear in velocities are analyzed using the fractional calculus, and the fractional Euler-Lagrange equations are derivedMaster Thesis Hamilton-Jacobi formulation of interacting fields(2003) Gül, Yusufİki bağıl sistem kanonik yöntem ile incelendi. Toplam diferansiyel denklemler Proca Model için elde edildi. Kuantalaştırılmış alanların etkileşimleri incelendi ve n-alana genelleştirildi. Elektromanyetik alan uygulamasında, etkileşimlerin bağıl ifadesinin Feynman diyagram ve S-Matriks ile uygun olduğu gözlendiMaster Thesis Investigation of resource usage and video quality with different formats in video broadcasting(Çankaya Üniversitesi, 2014) Shamaya, Hazar Jalal YaqoTransfer of video through an Internet network is one of the greatest challenges faced by the users, especially when dealing with broadcasting e.g. online broadcasting, and large video sizes. Video codecs make this operation easier. In this thesis, we submit the video compression issue to bring us closer to a better outcome/solution by asking the question: "Does compressing videos before sending to the client have considerable benefit?" The experiment methodology we follow is to capture video from multiple web cameras, encoding this video in one server in order to transfer it to another server, and from the second server we can transfer this video to all users wirelessly. Moreover, we can apply this operation to send more than one video to multiple users. The literature surveyed has helped the researcher to view ideas such as using the MVC (Multi-View Video Coding) and UDMVT (User Dependent Multi-View Video Transmission) codecs to compress video, and how to carry out multi-video, in addition to see the effectiveness of wired and wireless modes of video transfer. The researcher used the MVC codec to transfer video, and we can see the effectiveness of transferring video via wired and the effectiveness is reduced in the wireless mode. UDMVT was not used due to the fact that a number of algorithms required for this codec and they could not be obtained. However, the UDMVT codec may be an avenue of exploration in future studiesMaster Thesis Management of electronic commerce and website application in electronic products marketing in Iraq(Çankaya Üniversitesi, 2014) Ibrahem, AhmedThe consumer -to- consumer is one of electronic commerce (e- commerce) types. The primary aim of an e- commerce site is to buy and sell goods and services online. The purpose of this study is to design a web based interface for online shopping in Iraq. It is an open market between consumers to consumer shows us how to market electronic products. This system designed by using PHP language and MySQL server for database. The finding of this research is the application enables consumers to sell their product online. Also, the website facilitates buying and selling on the Internet, saving time, search for a product, saving the cost of transportation, as well as the possibility of adding a product by the customer. Further, in this website can post buying and selling through social media and sharing information with (Facebook and Twitter). Also, shopping cart is important for every online shopping, it facilitates to add and delete a product with shopping. Finally, customer should participate in the website as a member registering by username and password number for each customer to be able shoppingMaster Thesis Mathematical aspects of superintgrable systems(2004) Defterli, ÖzlemSuperintegrallenebilir SistemlerMaster Thesis New geometrical aspects of constrained system(2003) Cenk, MuratBağıl sistemler yeni bir geometrik bakışla incelendi ve integrallenebilir geometrilerin yüzey terimlerinin önemi vurgulandı. Klasik mekaniğin geometrik formülasyonu ve simplektik geometri kısaca sunulduMaster Thesis Numerical computation of integrals in higher dimensions(2006) Baydar, HakanQuadrature refers to any method for numerically approximating the value of definite integral a f (x)dx. The goal is to attain a given level of precision with the fewest function evaluations. The factors that control the diffi culty of a numerical integration problem are the dimension of the integral and the smoothness of the integrand f . Any quadrature method relies on evaluating the integrand f on a ï¬ nite set of points (called the abscissas or quadrature points), and after processing these evaluations to produce an approximation to the integral. Usually this involves taking a weighted average. The goal is to determine which points to evaluate and what weight to use so as to maximize performance over a broad class of integrands. This study reviews Monte Carlo and Newton-Cotes methods of numerical approximation of integrals on both rectangular and non rectangular regions and contains new routines that can evaluate integrals up to 7 dimensions over arbitrary regions in MATLAB. The work aims to compare the methods and give some approximation results using our self-written codeMaster Thesis Numerical solutions of ordinary differential equations(2003) Çevik, SibelDiferensiyel denklemler, birçok fiziksel olayı modellemede kullanıldıgmdan, bu denklemlerin çözüm metotları fizik ve mühendislik gibi alanlarda çalışan lar için büyük önem taşımaktadır. Bilinen analitik tekniklerle birçok denklem çözülebilmesine rağmen, önemli sayıda fiziksel uygulamalar için bu metotlar yetersiz kalmaktadır. Böyle denklemler ancak nümerik metotlarla çözülebilir ler. Diferensiyel denklemlerde yaklaşık sonuç bulan birçok metot bulunmaktadır. Bu tezde, tüm bu nümerik metotlar ele alınmıştır. Birinci bölümde, tezde kul lanılacak temel kavramlar, ikinci bölümde ise; denklemlerin kesin sonuçlarını değil, ancak yaklaşık sonuçlarınıveren nümerik metotlar verilmiştir. Son bölümde ise Runge-Kutta metot baz alınarak geliştirilmiş başlangıç değer problemlerini çözen yeni bir metot incelenmiştir. Bu metot, Runge-Kutta metoduna, işlem sayısını arttırmadan, yüksek mertebeden türevler eklenerek elde edilmiştirMaster Thesis On caputo modification of the hadamard fractional derivative(Çankaya Üniversitesi, 2014) Gambo, Yusuf Ya'uIn this thesis, more properties of the Caputo modification of the Hadamard fractional derivatives are studied. The fundamental theorem of fractional calculus (FTFC) in the Caputo-Hadamard setting is presented. The theorem is then used in formulating several original results