Bilgisayar Mühendisliği Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/58
Browse
Browsing Bilgisayar Mühendisliği Bölümü Tezleri by Language "eng"
Now showing 1 - 20 of 187
- Results Per Page
- Sort Options
Item Citation Count: BAL, M. (2004). 3D graphics engine design. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.3D graphics engine design(2004-08) Bal, Muammer; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThis thesis presents a 3D Graphics Engine design which includes geometrical methods, graphics pipeline, collision detection, animation of characters, geometric level of detail, terrain, and special effect parts. The quality and also the speed of the designed 3D Graphic Engine is very important. Because of this all methods that are used in designed 3D Graphic Engine are selected as to reach high quality and speed. Application of the designed 3D Graphic Engine shows that the Engine supports high quality and speedItem Citation Count: SAPAN, İ. (2007). A comparative analysis of feature-oriented development (fod) with object-oriented development (ood) in software engineering. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A comparative analysis of feature-oriented development (fod) with object-oriented development (ood) in software engineering(2007-09) Sapan, İlker; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThe objective of this thesis is to compare the Feature-Oriented Development (FOD) with Object-Oriented Development (OOD) on a case problem. Employing the features in software engineering has become quite popular recently with the emerging tools and techniques. FOD is used within a context in this thesis as partitioning an application domain in terms of ?features? yielded by Feature-Oriented Domain Analysis, and then managing them through a relevant software process model known as Feature-Driven Development (FDD). The conventional FDD approach makes use of classical objects to implement features. Whereas, features can also be implemented by means of a dedicated programming model, i.e. Feature-Oriented Programming, to treat the features as first class entities. However, the FOD vision in this study proposes another model for expressing and implementing the features in terms of "business processes", "business rules", and "business services". The thesis will examine and evaluate the processes, analysis of the performance, time management, and other relevant issues of FOD in comparison specifically with OOD. Eventually, the advantages and disadvantages of FOD will be summarized with respect to other related development methodologies.Item Citation Count: Mıohanad Ali Gahot (2019). A comparative analysis of video summarization techniques / Video özet tekniklerinin karşılaştırmalı bir analizi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen bilimleri Enstitüsü.A comparative analysis of video summarization techniques(2019) Gashot, Mohanad Ali; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüWith the rapid evolution of the digital era, devices equipped with digital cameras are being more popular and widely used to capture digital videos. The huge number of frames in each video poses challenges toward processing these videos, as the result of the need for intensive processing to handle these frames. Hence, several techniques have been proposed to provide more efficient summaries for videos. An efficient summary is required to provide maximum information about the contents of the video using the minimum number of its selected frames. Such a summary can significantly reduce the complexity of the computations while maintaining high-quality results in the applications that rely on these summaries. Thus, more attention is being attracted by video summarization techniques to be employed in different fields of applications, such as predicting the genre of the video or measuring the similarity between two videos. Video summarization techniques rely on two main steps, finding the boundaries of the shots in the video and selecting the frame in each shot that holds the maximum information for that shot. A video shot is a sequence of frames that are collected without any cuts or transitions during the capturing of the video. However, recognizing the boundaries of these shots is a challenging process, due to the rapid development in digital video processing techniques that are used to merge the shots in videos. When these boundaries are recognized, a frame is selected to represent the information in that shot. However, the use of different techniques to find the boundaries of the shots and select the frames to represent them produce different summaries in different methods. Thus, it is important to compare the performance of these methods in order to select the one that is most appropriate for the application the method is required for. Moreover, recognizing the factors that can improve the performance of video summarization techniques can assist future researchers to propose video summarization methods with significantly improved performance. In this study, the methodologies of recent state-of-the-art methods are reviewed, and their performances are evaluated, so that, a comprehensive review and a reasonable comparison are presented. The evaluation results show that the use of a single pass over the frames of a video reduces the complexity of computations required to find the boundaries of the shots in that video. Such an approach has proven to provide high-quality summaries compared to methods that use multiple passes over the video frames. Moreover, the use of clustering techniques has also shown significant improvement to the quality of the produced summary. Thus, the methods that combine these approaches have shown relatively better performance.Item Citation Count: Hammood, Ali Hussein (2016). A comparison of NoSQL database systems: A study on MongoDB, apache HBase, and apache Cassandra / NoSQL veritabanı sistemlerinin karşılaştırılması: MongoDB, apache HBase, and apache Cassandra üzerine bir çalışma. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.A comparison of NoSQL database systems: A study on MongoDB, apache HBase, and apache Cassandra(2016) Hammood, Ali Hussein; Çankaya Üniversitesi,Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Ana Bilim DalıDue to their many useful features, database management systems have been used widely with relational data for over 20 years. However, such systems are not able to handle massive and complex data efficiently. New systems known as NoSQL database management systems have appeared to deal with massive and complex data that provide fast and high performance. In this thesis, we discussed and tested three kinds of NoSQL database system in order to reveal their capabilities and how they respond in different operations. For this purpose, we set up a novel testing environment for each workload and examine the responses for the three systems. The results of this study show the weaknesses and strengths of each database system used in the study. Due to the different architectures of each database that we tested, we have seen different responses for each with changed workload operations. In our work, we used the Yahoo Cloud Serving Benchmark (YCSB), which is a framework designed by Yahoo to test database performance. According to the results obtained, we can conclude that MongoDB performed very well with low throughput, but not as well with high throughput. Cassandra and HBase performed very well under heavy loads due to their optimized designs. In the read operation, HBase has poor performance as compared to other systems tested.Item Citation Count: EŞ, S. (2005). A computational analysis of a language structure in natural language text processing. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A computational analysis of a language structure in natural language text processing(2005-09) Eş, Sinan; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüText categorization or classification is a general task of classifying un-organized natural language texts according to specific subject matter or category. Electronic mail (e-mail) filtering is a binary text classification problem which the user emails can be classified as legitimate (non-spam) or un-wanted mail (spam). In this study, we tried to find a filtering solution that is able to automatically classify emails into spam and legitimate categories. In order to automatically and efficiently classify emails as spam or legitimate we took advantage of some Machine Learning methods and some novel ideas from Information RetrievalItem Citation Count: Yıldırım, Pınar (2018). A GIS-based decision support system for tourism planning and development / Turizm planlama ve geliştirme için CBS tabanlı bir karar destek sistemi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A GIS-based decision support system for tourism planning and development(Çankaya Üniversitesi, 2018) Yıldırım, Pınar; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Anabilim DalıIn the past twenty years, pioneering developments in information technology and communication systems worldwide have not only offered many opportunities in the fields of marketing, management and the promotion of tourism and recreational areas to businesses interested in tourism, but have also provided a sustainable advantage in competition with other businesses. Turkey has more potential for tourism and more resources than many countries, thanks both to its natural beauty and its historical and cultural wealth. The aim of this thesis is to build a web portal that is able to enhance its attractiveness through photographs or videos taken in all regions of Turkey, increase interest from domestic and foreign tourists through detailed articles about the country, and improve the accessibility of the country's resources through a system based on GIS. Developed within the scope of this thesis, the Turkey Tourist Portal can promote the country to tourists by presenting both its natural beauty and its historical and cultural wealth on a map, together with images and articles.Item Citation Count: Al-Bajjari, Faten Fayeq Salman (2017). A model for adopting cloud computing in government sector: Case study in Iraq / Hükümet sektöründe bulut bilişim teknolojilerini kullanmaya yönelik bir model: Irak'ta örnek-olay incelemesi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A model for adopting cloud computing in government sector: Case study in Iraq(Çankaya Üniversitesi, 2017) Al-Bajjari, Faten Fayeq Salman; Çankaya Üniversitesi ,Fen Bilimleri Enstitüsü , Bilgisayar Mühendisliği Anabilim Dalı / Bilgi Teknolojileri Bilim DalıCloud computing is a delivery of on-demand computing resources such as servers, databases, storage, networking, software, analytics and more over the Internet on a pay-for-use basis. The users can from anywhere at any time control these resources via a simple software interface which facilitates its usage, and helps in getting rid from many details and internal processes. This technology is not currently widely utilized in public sector institutions, especially in the case of Iraq for different factors and reasons. The main objective of this research is to identify the most critical factors preventing cloud computing adoption in government institutions in Iraq by developing a conceptual model for cloud technology adoption that integrates the theories of TOE, Iacovou et al. and DOI. The key factors influencing the adoption of cloud technology have been investigated and determined through literatures review. To achieve research objectives, this study used the methodologies of quantitative research, and a self–administered questionnaire has been used as an essential tool to collect primary data that has been analyzed through the statistical SPSS program. Moreover, CloudAnalyst simulator is used to identify the real time performance for cloud technology environment, and two algorithms have been applied via this tool, namely the AHP technique which used to obtain the weight of variables depending on the questionnaire results, and ECDSA algorithm which used to identify the privacy and security of cloud technology. Finally, a thorough set of guidelines have been proposed in order to help Iraqi government institutions to move to cloud environment in an effective manner.Item Citation Count: Canan Niyaze Soba (2018). A new data-centric authentication and authorization mechanism for multilayer systems / Çok katmanlı sistemler için veri merkezli yeni bir kimlik doğrulama ve yetkilendirme mekanizması. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A new data-centric authentication and authorization mechanism for multilayer systems(2018) Soba, Canan Niyaze; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüInternet ve bulut teknolojilerinin hızlı ilerlemesi ile hassas veriler üçüncü taraflar tarafından paylaşıldığından bu verilerin depolanması için şifrelemek bir ihtiyaç olacaktır. Hassas verilerin yetkisiz erişimini engellemek için literatürde, birçok yöntem bulunmaktadır. Bu çalışmada, erişim denetimini sağlamak için Rol Tabanlı ve Öznitelik Tabanlı Erişim Denetim modellerinin birlikte kullanıldığı yeni çok katmanlı erişim denetim modeli sunulmuştur. Önerilen sistem verilerin ağda güvenli paylaşımı ve saklanması planı üzerine kurulmuş bir yaklaşımdır. Kullanıcı kimlik doğrulama için kimlik tabanlı doğrulama (IBE) ve kimlik tabanlı imza (IBS) mekanizmaları kullanılmıştır. Aynı zamanda Şifreli Metin İlkesi Tabanlı Şifreleme (CP-ABE) mekanizması kullanıcıların sistemde belirlenmiş olan özniteliklerine bağlı yetkilendirme için kullanılmaktadır. Kimlik doğrulama ve yetkilendirme mekanizması sistemi sorunsuz başlatma, güvenli veri alımı ve güvenli veri paylaşımı için kullanılmaktadır. Bu tür sistemlerin en büyük sorunu olan yetki yönetimi için ise İptal Mekanizması kullanılmaktadır, bu mekanizma sistemde kullanıcının özniteliklerinin değişmesi ya da kullanıcının yetki iptali gibi durumlarda kontrolleri sağlamaktadır. Bununla birlikte, aynı verinin birçok kullanıcı tarafından birkaç kez şifrelenmesi depolama alanının gereksiz yere büyümesine neden olmaktadır, bunu engellemek için tekilleştirme, Yakınsak Şifreleme, yöntemi kullanılarak bütüncül bir mekanizma önerilmiştir. Böylece daha düşük bant genişliği maliyetiyle elde edilmiş bir sistem olduğu gösterilmektedir.Item Citation Count: ASLAN, A. (2014). A performance and functional analysis tool for testing and maintenance of web-based application from the user perspective. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A performance and functional analysis tool for testing and maintenance of web-based application from the user perspective(2014) Aslan, Alper; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThis thesis focuses on the performance stability score (PSS) of the Web-Based Application Workflow (WBAW) and gathers the automated virtual user response times, repeated with scheduled periods, to calculate the best successful response interval heuristically. The lack of server-side hardware, network and application resources can affect the end-user Internet browsing experience negatively. This kind of negative effects can be monitored only on the end-user web browser. The virtual user browser scripts can be used to monitor the problems. The name of the application, developed, is called "MyToolset". It is designed and implemented by using the open source technologies. The research on this subject aims to monitor the performance degradation and failures on WBAW weekly, raise appropriate alerts and calculate the performance stability score. Furthermore, MyToolset reports the WBAW failures by taking the snapshot of the end-user browser perspective as evidence. The entire mathematical model is based on the calculation of this idea. Live graphics and comparable charts are used to report the results. After custom consecutive performance degradations and failures occur, MyToolset will raise the alerts. The thesis concludes that the WBAW and PSS is used for monitoring, test automation and helping the capacity planning of server-side resources, WBAW works on, such as hardware, network and applicationsItem Citation Count: Shakir Shakir, Ahmed Nashaat (2016). A robust encryption and data hiding technique by using hybrid des and lsb algorithm / Hibrid des ve lsb algoritma kullanarak sağlam şifreleme ve veri gizleme tekniği. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.A robust encryption and data hiding technique by using hybrid des and lsb algorithm(2016-08) Shakir Shakir, Ahmed Nashaat; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüInformation hiding is the process of hiding the details of a function, object or both. On the other hand, information hiding represents an important method that is used in data security. Another name of information hiding is the steganography which hides data inside other data, such as embedding text inside an image or an image inside another image. Steganography techniques have been used from ancient times through the use of many different mechanical ways, such as writing in invisible ink in the Greek Testament. On the other hand, Cryptography is the process of hiding information by encrypting data using a complex algorithm. It is used when collaborating over an untrusted intermediary, such as the Internet. Steganography and cryptography work similarly but in different contexts. In this study, we have presented an integration of cryptography and steganography to produce an efficient and robust model. In terms of cryptography, the Data Encryption Standard (DES) algorithm has been implemented, whereas in steganography, the Least Significant Bit (LSB) algorithm has been used. Our results show efficient time implementation and a robust algorithm mechanism in terms of Peak Signal-to-Noise Ratio (PSNR), Signal-to-Noise Ratio (SNR), and Mean Square Error (MSE).Item Citation Count: ÖZTÜRK, H. (2003). A Survey on public-key infrastructures. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A Survey on public-key infrastructures(2003-09) Öztürk, Haluk; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüPublic-key cryptography is fast becoming the foundation for online commerce and other applications that require security and authentication in an open network. The widespread use of public-key cryptography requires a public-key infrastructure to publish and manage public-key values. Without a functioning infrastructure, public-key cryptography is only marginally more useful than traditional, secret-key cryptography. This thesis presents a set of characteristics that are common to all public-key infrastructures. These criteria are intended to encapsulate the fundamental issues that arise when dealing with such systems. They can be used both as a "shopping lisf for those who need to choose an infrastructure for a particular application, and as a guide for infrastructure developers, that they may be more aware of any compromises or tradeoffs they might make in their work. The characteristics are used to present a survey of current and some proposed infrastructure systems. The criteria reveal the strengths and weaknesses of each system, and indicate where improvements may be required.Item Citation Count: Olgun, Serhan (2018). A systematic review of gamification in the context of software development landscapes / Yazılım geliştirme mecralarında oyunlaştırma kavramının kullanımına yönelik bir sistematik gözden geçirme çalışması. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A systematic review of gamification in the context of software development landscapes(Çankaya Üniversitesi, 2018) Olgun, Serhan; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Anabilim DalıThe software development process is a complex activity that has interrelating steps to produce software products. Human related social factors such as user motivation, engagement, communication and collaboration issues affect the activities performed by software development organizations. In fact, software engineering researchers seek better ways to overcome the human related issues so as to improve the quality in software development. Consequently, research has been conducted to introduce new methodologies, techniques and concepts. As such, gamification has been introduced as a novel technique to enhance the software development process and ultimately resolve some of the identified obstacles that are related to human factors. However, there is a bias to adopt the gamification into the software development process because there are still insufficient evidences about its positive outcomes. In this study, a systematic literature review was rigorously conducted to investigate the application and to reveal the benefits of gamification in the software development landscapes. This study contributes to the area of software engineering research by proposing a classification approach to categorize gamification studies in software development landscapes. The results of this research suggest that there has been a significant increase in empirical and theoretical studies that were recently published and many positive steps being taken towards better integration of gamification in software development organizations.Item Citation Count: AL-HİLALİ, A.R.K. (2015). Accelerating stencil computation in multi-core architecture. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Accelerating stencil computation in multi-core architecture(2015-01-16) Al-Hilali, Amar Raeed Khorshid; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüStencil computations are common in linear systems of equations, numerical solutions of partial differential equations, molecular dynamics and many other scientific problems. For large structures, long computation times are an important problem. Increasingly higher number of cores are used in parallel for such computations, but still, the speedups are not sufficiently satisfactory. The main aim of this thesis is increasing the cache reuse and minimizing number of memory accesses by optimizing loop structures. We present and test several algorithms and improvements on them to get an optimal runtimeItem Citation Count: KÜÇÜKOĞLU, A. (2005). Access telecommunication systems. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Access telecommunication systems(2005-01) Küçükoğlu, Afşin; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThis thesis studies the differences between xDSL, LMDS, Fiber and FSO. Cable access system XDSL is compared with the optical fiber access communication method. As wireless access communications, LMDS and FSO systems are compared. Finally, a full comparison of all the key points for all the access systems are made. Issues compared cover the state of the art, information rate, communication distance, security, commercial prices, and the system installation costs. The comparison is supported by a software which is running under Unix systems on the internet. In the second part, atmospheric structure and the atmospheric molecular effects on the light waves in different ranges are studied. Temperature, C02 and water molecular effects in the atmosphere and the effects on the intensity are also studiedItem Citation Count: Al-Shaikh, Nawfal Fathi Abdulqader (2018). Active defense strategy against jamming attack in wireless sensor networks / Kablosuz sensör ağlarında karıştırma saldırılarına karşı aktif savunma stratejisi. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Active defense strategy against jamming attack in wireless sensor networks(Çankaya Üniversitesi, 2018) Al-Shaikh, Nawfal Fathi Abdulqader; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Anabilim DalıWireless Sensor Network WSN been utilized increasingly nowadays due to its benefits and its ability of collecting data from reachable or unreachable fields also if fields fixed or movable. Progressive developments in WSN techniques adds efficiency, reliability and better power management but it still vulnerable and sensitive to some kinds security threats. The most effective threat to WSN is DOS attacks which is detectable but unpreventable yet. An authentication defense approach against DOS attack with additional Jamming attack that prevents transferring data between attacked node in a cluster and cluster head node is considered as a base to develop an algorithm with ability of bypassing attacked path via alternative safe one under control of cluster head to mitigate the False Node Excluding DOS due to jamming attack. Both original and enhanced methods implemented using MATLAB and tested by comparing both results and behavior with arbitrary study case. Enhanced algorithm shows good response in mitigating FNEDOS attack.Item Citation Count: Elaf Ahmed Mahmood Al-Karkhı (2018). Adaptive energy consumption method for wireless sensor networks using optimization algorithms / Optimizasyon algoritmalarını kullanarak kablosuz sensör ağları için uyarlanabilir enerji tüketim yöntemi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Adaptive energy consumption method for wireless sensor networks using optimization algorithms(2018-02-05) Mahmood Al-Karkhı, Elaf Ahmed; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThe objective of this thesis is to save the nodes energy using optimization approach with Particle Swarm Optimization Algorithm. The network area is divided to several regions for parametric study. In the proposed method, the energy of the efficient routing is enhanced and the system used the Particle Swarm Optimization for eliminate the individual nodes in wireless sensor network. In this thesis the optimization method is used to find the best hop in wireless sensor network which use the Gravitational Search Algorithm. The proposed work compared with Low Energy Adaptive Clustering Hierarchy. In simulation result the total energy for proposed method is got 8 Joules, which the energy for the OEERP is got 10 Joules and for the LEACH the 20 Joules is got. That’s mean proposed method is 20% better than the energy consumption from optimized energy efficient routing protocol and 60% better than the Low Energy Adaptive Clustering Hierarchy method is reduced. In proposed method the packet delivery ratio is high than the optimized energy efficient routing protocol and Low Energy Adaptive Clustering Hierarchy method. As result the packet delivery is 100. This values only the base value and for 4000 bit packet that time 400,000 packet will send to the base station. The packet delivery for optimized energy efficient routing protocol is 60 and for Low Energy Adaptive Clustering Hierarchy this value is 64Item Citation Count: HUSSEIN, T.D.H. (2015). Ambulance management system using GUI matlab. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Ambulance management system using GUI matlab(2015-08) Hussein, Taha Darwassh Hanawy; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüAn efficient emergency ambulance service must be provided in order to reach injured persons and transport them to the nearest hospital as rapidly as possible. To do so, the ambulance driver must select the shortest road network to reach the accident site, followed by the shortest path to the nearest hospital. Over the last few decades, a variety of different GIS-based systems have been developed to aid in the selection of such a path. This thesis aims to introduce an ambulance management system (AMS) to the city of Kirkuk, Iraq. A MATLAB graphical user interface (GUI) is used as a platform with which to manage a transportation path on the map by calculating all possible paths between accident and ambulance, and between accident and hospital. The shortest overall path can then be selected based on the obtained map coordinatesItem Citation Count: Hawi, Mohammed Kadhim (2016). An approach to improve the time complexity of dynamic provable data possession / Dinamik kanıtlanabilir veri depolanmasında zaman karmaşıklığını geliştirmek için bir yaklaşım. Yayımlanmamış yüksek lisans tezi. Ankara. Çankaya Üniversitesi Fen Bilimleri Enstitüsü.An approach to improve the time complexity of dynamic provable data possession(Çankaya Üniversitesi, 2016) Hawi, Mohammed Kadhim; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Anabilim DalıIn this thesis, we aim to take some actions for alleviating the fears when the data storage over outsourcing, and guarantee the integrity of the files in cloud computing. In this study, we have suggested some ideas to improve FlexDPDP scheme [13]. Particularly, proposed scheme successfully reduces the time complexity for verifying operations between the client and the server. The proposed scheme is a fully dynamic model. We involved some parameters to ensure the integrity of the metadata. In spite of the fact that auxiliary storage expenditure by Client-side (the client stores approximately 0.025% size of the raw file). The remarkable enhancement in this proposed scheme is reducing the complexity. The complexity of the communications and the computations decreased to O(1) in both Client-side and Server-side during the dynamically update (insertion, modification and deletion operations) and challenge operations.Item Citation Count: Gürcan, Tarık (2023). An autoML tool for software vulnerability prediction / Yazılım güvenlik açığı tahmini için autoML aracı. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.An autoML tool for software vulnerability prediction(2023) Gürcan, Tarık; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüÖzellikle son yıllarda büyük miktarda verinin daha erişilebilir hale gelmesi ve finans, sağlık, lojistik ve teknoloji gibi sektörlere önemli faydalar sağlaması nedeniyle makine öğreniminin yaygınlaşması kaçınılmaz olmuştur. Farklı sektörlerde kullanılmaya başlayan makine öğrenmesi uygulamalarının hayata geçirilmesi ihtiyacı hızlı ve verimli bir şekilde artmaktadır. Ancak geleneksel yöntemleri kullanarak bir makine öğrenimi modeli oluşturmak için gereken derin teknik bilgi ve kodlama becerilerine herkes yetkin olmayabilir. Bu nedenden dolayı kodsuz veya az kodlu platformlar daha fazla ilgi görmeye başlamıştır. Bu platformlar, kullanıcıların veri kümelerini yüklemesine, modeli oluşturmaya yönelik özellikleri tanımlamasına ve hatta teknik olmayan arayüzlerle modeli eğitmesine ve değerlendirmesine olanak tanır. Bu sayede karmaşık kod yazma ihtiyacını ortadan kaldırarak daha geniş bir kitlenin makine öğrenimi projelerine dahil olmasını mümkün kılar. Bu tezde, diğer kodsuz platformlara ek olarak çalışma zamanı sınırlama ve model bozulma analizi gibi temel özellikleri sunan, yazılım zafiyet analizi için kodsuz makine öğrenimi tahmin modellerinin gerçekleştirilmesine olanak sağlayan bir platform geliştirilmiştir. Bu platform, PPDaaS (Prediction Platform as a Service) olarak adlandırılmıştır ve "Yazılım Güvenlik Açığı" ve "OpenML" veri kümeleriyle tahmin modellerini eğitmek için kullanılmıştır. Başlangıçta platform, AutoML platformları için kullanılan kıyaslama verileriyle test edildi. Sınıflandırma algoritmalarının performansı, makine öğrenimi algoritmaları arasında adil bir karşılaştırma yapmak için "OpenML yetişkin" veri kümesine bir zaman sınırı konularak değerlendirildi. Platform, amaçlanan AutoML işlevleri açısından test edildikten sonra Yazılım Güvenlik Açığı verilerindeki model bozulmasını bulmak için kullanıldı. Son olarak geliştirilen PPDaaS platformuna ilişkin geri bildirimler son kullanıcılardan da toplandı. Sonuçlar geliştirilen PPDaaS platformunun yazılım sektöründe kendine yer bulabileceğini göstermektedir.Item Citation Count: KHALAF, A.Z. (2014). An energy-efficient clustering based communication protocol with dividing the overall network area for wireless sensor networks. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.An energy-efficient clustering based communication protocol with dividing the overall network area for wireless sensor networks(2014-09) Khalaf, Abdulrahman Zaidan; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüIn this thesis, the energy efficient and connectivity problem in wireless sensor networks (WSNs) is presented. There are more difference between energy levels of near nodes and far nodes of cluster heads. This problem compensated by dividing the entire network (sensor field) into equal area and applies different clustering policies to each section. The results compared with results of LEACH (Low Energy Adaptive Clustering Hierarchy). The performance of proposal system overcomed the previous studies. Also this protocol guaranted transmitting data and transmission in high traffic networks to reduce energy consumption and packet failure