Bilgisayar Mühendisliği Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/58
Browse
Browsing Bilgisayar Mühendisliği Bölümü Tezleri by Title
Now showing 1 - 20 of 253
- Results Per Page
- Sort Options
Item Citation Count: BAL, M. (2004). 3D graphics engine design. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.3D graphics engine design(2004-08) Bal, Muammer; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThis thesis presents a 3D Graphics Engine design which includes geometrical methods, graphics pipeline, collision detection, animation of characters, geometric level of detail, terrain, and special effect parts. The quality and also the speed of the designed 3D Graphic Engine is very important. Because of this all methods that are used in designed 3D Graphic Engine are selected as to reach high quality and speed. Application of the designed 3D Graphic Engine shows that the Engine supports high quality and speedItem Citation Count: MOĞOL, A.C. (2011). 3D hand reconstruction with binocular view. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.3D hand reconstruction with binocular view(2011-12-01) Mogol, Ali Can; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüIn the field of Human Computer Interaction (HCI) one of the important goals is designing better interfaces for improving interactions between human beings and computers. There are lots of approaches to address this problem. One of these approaches is interfacing using human hand gestures. The capturing and modeling of the gestures and articulations of the human hand is a challenging problem. There exist hardware and software solutions proposed to solve this problem. In this thesis, an inexpensive fast and effective method to stereo capture and create 3D hand model is proposed. The setup used for this thesis is; five different color markers and commodity hardware consists of two web cameras and a low cost laptop computer. In this thesis, starting with the stereo calibration of the cameras, capturing and tracking the color markers attached to the finger tips, leading 2D points of the finger tips, converting the 2D points to 3D points and calculating the finger articulations according to these 3D points and modeling the 3D hand have been accomplished, so the user can see his/her own hand’s articulation on the screen as a 3D hand model.Item Citation Count: TAŞEL, F.S. (2008). 3D reconstruction of a scene using stereo images. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.3D reconstruction of a scene using stereo images(2008-06-20) Taşel, Faris Serdar; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüTwo-dimensional photographs do not have depth-information. One solution to determine the location of an object in three-dimensional environment is to use more than one photograph as exposed by the nature. Extracting the depth information using stereo images is purposed in this thesis. The thesis analyzes the steps and encountered problems in three-dimensional reconstruction process, explains the solutions exposed with the aid of epipolar geometry using some of the feature-based matching techniques. Stereo images which are taken from two calibrated cameras viewing the same scene are used to obtain estimated three-dimensional data. Pinhole camera model, epipolar geometry and its recovery are discussed; common stereo triangulation methods are explained in the chapters of the thesis. Besides, feature extraction and matching topics which are used for the reconstruction process are examined. Some of the methods used in the thesis are presented by algorithmic solutions and mathematical notations. Significant advantages and disadvantages of the methods are briefly discussed and encountered problems are tried to be challenged by fundamental approaches.Item Citation Count: GÜVENÇ, S.P. (2008). 3D visualization using data received from the processes of object recognition and object reconstruction. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.3D visualization using data received from the processes of object recognition and object reconstruction(2008-06-20) Güvenç, Seher Pelin; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThis thesis presents the demonstration of what two images or two video sequences can tell us about the situation and model of a third video sequence or image. The method bears ideas from projective geometry as it’s basis. The main purpose of the thesis is to be able to form a base line for tracking an object in a 3D environment not only by using two stereo cameras but also by using other cameras that may be located in various points of the environment. The method visualizes the object and gives the information to a third camera. This way it can be possible to track a moving object, along with it’s visualized model, in an environment without losing sight of it and without having to move the other two stereo cameras which we received data from.Item Citation Count: ÖDEMİR, S. (2013). A client-server architecture for live video streaming using object relational database. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A client-server architecture for live video streaming using object relational database(2013-06-18) Ödemir, Serkan; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThis thesis focuses on live video streaming and offers a new approach based on client-server architecture using relational database. The thesis also analyzes the traditional live video streaming concepts and challenges such as performance problems. On the other hand, this study aims to implement client-server architecture in order to gain performance and provides a faster retrieval and storing time, better download time with minimum metadata by using relational database. This architecture also provides multiple accesses on different domains like embedded devices, Internet based smart TVs etc. The study also covers a Windows desktop application which consists of two live video streaming approaches. Implementation tries to compare traditional video streaming using TCP sockets and client-server model using relational database. MySQL and Apache web server were used to support the thesis proposal. Implementation was tested with various amounts of clients and parameters such as frame rate, buffer size and picture quality. Test results and conditions were also included in the thesis text. Briefly, this thesis tries to provide a better client-server live video streaming solution using the abilities of web and database servers.Item Citation Count: SAPAN, İ. (2007). A comparative analysis of feature-oriented development (fod) with object-oriented development (ood) in software engineering. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A comparative analysis of feature-oriented development (fod) with object-oriented development (ood) in software engineering(2007-09) Sapan, İlker; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThe objective of this thesis is to compare the Feature-Oriented Development (FOD) with Object-Oriented Development (OOD) on a case problem. Employing the features in software engineering has become quite popular recently with the emerging tools and techniques. FOD is used within a context in this thesis as partitioning an application domain in terms of ?features? yielded by Feature-Oriented Domain Analysis, and then managing them through a relevant software process model known as Feature-Driven Development (FDD). The conventional FDD approach makes use of classical objects to implement features. Whereas, features can also be implemented by means of a dedicated programming model, i.e. Feature-Oriented Programming, to treat the features as first class entities. However, the FOD vision in this study proposes another model for expressing and implementing the features in terms of "business processes", "business rules", and "business services". The thesis will examine and evaluate the processes, analysis of the performance, time management, and other relevant issues of FOD in comparison specifically with OOD. Eventually, the advantages and disadvantages of FOD will be summarized with respect to other related development methodologies.Item Citation Count: Mıohanad Ali Gahot (2019). A comparative analysis of video summarization techniques / Video özet tekniklerinin karşılaştırmalı bir analizi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen bilimleri Enstitüsü.A comparative analysis of video summarization techniques(2019) Gashot, Mohanad Ali; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüWith the rapid evolution of the digital era, devices equipped with digital cameras are being more popular and widely used to capture digital videos. The huge number of frames in each video poses challenges toward processing these videos, as the result of the need for intensive processing to handle these frames. Hence, several techniques have been proposed to provide more efficient summaries for videos. An efficient summary is required to provide maximum information about the contents of the video using the minimum number of its selected frames. Such a summary can significantly reduce the complexity of the computations while maintaining high-quality results in the applications that rely on these summaries. Thus, more attention is being attracted by video summarization techniques to be employed in different fields of applications, such as predicting the genre of the video or measuring the similarity between two videos. Video summarization techniques rely on two main steps, finding the boundaries of the shots in the video and selecting the frame in each shot that holds the maximum information for that shot. A video shot is a sequence of frames that are collected without any cuts or transitions during the capturing of the video. However, recognizing the boundaries of these shots is a challenging process, due to the rapid development in digital video processing techniques that are used to merge the shots in videos. When these boundaries are recognized, a frame is selected to represent the information in that shot. However, the use of different techniques to find the boundaries of the shots and select the frames to represent them produce different summaries in different methods. Thus, it is important to compare the performance of these methods in order to select the one that is most appropriate for the application the method is required for. Moreover, recognizing the factors that can improve the performance of video summarization techniques can assist future researchers to propose video summarization methods with significantly improved performance. In this study, the methodologies of recent state-of-the-art methods are reviewed, and their performances are evaluated, so that, a comprehensive review and a reasonable comparison are presented. The evaluation results show that the use of a single pass over the frames of a video reduces the complexity of computations required to find the boundaries of the shots in that video. Such an approach has proven to provide high-quality summaries compared to methods that use multiple passes over the video frames. Moreover, the use of clustering techniques has also shown significant improvement to the quality of the produced summary. Thus, the methods that combine these approaches have shown relatively better performance.Item Citation Count: Hammood, Ali Hussein (2016). A comparison of NoSQL database systems: A study on MongoDB, apache HBase, and apache Cassandra / NoSQL veritabanı sistemlerinin karşılaştırılması: MongoDB, apache HBase, and apache Cassandra üzerine bir çalışma. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.A comparison of NoSQL database systems: A study on MongoDB, apache HBase, and apache Cassandra(2016) Hammood, Ali Hussein; Çankaya Üniversitesi,Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Ana Bilim DalıDue to their many useful features, database management systems have been used widely with relational data for over 20 years. However, such systems are not able to handle massive and complex data efficiently. New systems known as NoSQL database management systems have appeared to deal with massive and complex data that provide fast and high performance. In this thesis, we discussed and tested three kinds of NoSQL database system in order to reveal their capabilities and how they respond in different operations. For this purpose, we set up a novel testing environment for each workload and examine the responses for the three systems. The results of this study show the weaknesses and strengths of each database system used in the study. Due to the different architectures of each database that we tested, we have seen different responses for each with changed workload operations. In our work, we used the Yahoo Cloud Serving Benchmark (YCSB), which is a framework designed by Yahoo to test database performance. According to the results obtained, we can conclude that MongoDB performed very well with low throughput, but not as well with high throughput. Cassandra and HBase performed very well under heavy loads due to their optimized designs. In the read operation, HBase has poor performance as compared to other systems tested.Item Citation Count: EŞ, S. (2005). A computational analysis of a language structure in natural language text processing. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A computational analysis of a language structure in natural language text processing(2005-09) Eş, Sinan; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüText categorization or classification is a general task of classifying un-organized natural language texts according to specific subject matter or category. Electronic mail (e-mail) filtering is a binary text classification problem which the user emails can be classified as legitimate (non-spam) or un-wanted mail (spam). In this study, we tried to find a filtering solution that is able to automatically classify emails into spam and legitimate categories. In order to automatically and efficiently classify emails as spam or legitimate we took advantage of some Machine Learning methods and some novel ideas from Information RetrievalItem Citation Count: Yıldırım, Pınar (2018). A GIS-based decision support system for tourism planning and development / Turizm planlama ve geliştirme için CBS tabanlı bir karar destek sistemi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A GIS-based decision support system for tourism planning and development(Çankaya Üniversitesi, 2018) Yıldırım, Pınar; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Anabilim DalıIn the past twenty years, pioneering developments in information technology and communication systems worldwide have not only offered many opportunities in the fields of marketing, management and the promotion of tourism and recreational areas to businesses interested in tourism, but have also provided a sustainable advantage in competition with other businesses. Turkey has more potential for tourism and more resources than many countries, thanks both to its natural beauty and its historical and cultural wealth. The aim of this thesis is to build a web portal that is able to enhance its attractiveness through photographs or videos taken in all regions of Turkey, increase interest from domestic and foreign tourists through detailed articles about the country, and improve the accessibility of the country's resources through a system based on GIS. Developed within the scope of this thesis, the Turkey Tourist Portal can promote the country to tourists by presenting both its natural beauty and its historical and cultural wealth on a map, together with images and articles.Item Citation Count: Al-Bajjari, Faten Fayeq Salman (2017). A model for adopting cloud computing in government sector: Case study in Iraq / Hükümet sektöründe bulut bilişim teknolojilerini kullanmaya yönelik bir model: Irak'ta örnek-olay incelemesi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A model for adopting cloud computing in government sector: Case study in Iraq(Çankaya Üniversitesi, 2017) Al-Bajjari, Faten Fayeq Salman; Çankaya Üniversitesi ,Fen Bilimleri Enstitüsü , Bilgisayar Mühendisliği Anabilim Dalı / Bilgi Teknolojileri Bilim DalıCloud computing is a delivery of on-demand computing resources such as servers, databases, storage, networking, software, analytics and more over the Internet on a pay-for-use basis. The users can from anywhere at any time control these resources via a simple software interface which facilitates its usage, and helps in getting rid from many details and internal processes. This technology is not currently widely utilized in public sector institutions, especially in the case of Iraq for different factors and reasons. The main objective of this research is to identify the most critical factors preventing cloud computing adoption in government institutions in Iraq by developing a conceptual model for cloud technology adoption that integrates the theories of TOE, Iacovou et al. and DOI. The key factors influencing the adoption of cloud technology have been investigated and determined through literatures review. To achieve research objectives, this study used the methodologies of quantitative research, and a self–administered questionnaire has been used as an essential tool to collect primary data that has been analyzed through the statistical SPSS program. Moreover, CloudAnalyst simulator is used to identify the real time performance for cloud technology environment, and two algorithms have been applied via this tool, namely the AHP technique which used to obtain the weight of variables depending on the questionnaire results, and ECDSA algorithm which used to identify the privacy and security of cloud technology. Finally, a thorough set of guidelines have been proposed in order to help Iraqi government institutions to move to cloud environment in an effective manner.Item Citation Count: Canan Niyaze Soba (2018). A new data-centric authentication and authorization mechanism for multilayer systems / Çok katmanlı sistemler için veri merkezli yeni bir kimlik doğrulama ve yetkilendirme mekanizması. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A new data-centric authentication and authorization mechanism for multilayer systems(2018) Soba, Canan Niyaze; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüInternet ve bulut teknolojilerinin hızlı ilerlemesi ile hassas veriler üçüncü taraflar tarafından paylaşıldığından bu verilerin depolanması için şifrelemek bir ihtiyaç olacaktır. Hassas verilerin yetkisiz erişimini engellemek için literatürde, birçok yöntem bulunmaktadır. Bu çalışmada, erişim denetimini sağlamak için Rol Tabanlı ve Öznitelik Tabanlı Erişim Denetim modellerinin birlikte kullanıldığı yeni çok katmanlı erişim denetim modeli sunulmuştur. Önerilen sistem verilerin ağda güvenli paylaşımı ve saklanması planı üzerine kurulmuş bir yaklaşımdır. Kullanıcı kimlik doğrulama için kimlik tabanlı doğrulama (IBE) ve kimlik tabanlı imza (IBS) mekanizmaları kullanılmıştır. Aynı zamanda Şifreli Metin İlkesi Tabanlı Şifreleme (CP-ABE) mekanizması kullanıcıların sistemde belirlenmiş olan özniteliklerine bağlı yetkilendirme için kullanılmaktadır. Kimlik doğrulama ve yetkilendirme mekanizması sistemi sorunsuz başlatma, güvenli veri alımı ve güvenli veri paylaşımı için kullanılmaktadır. Bu tür sistemlerin en büyük sorunu olan yetki yönetimi için ise İptal Mekanizması kullanılmaktadır, bu mekanizma sistemde kullanıcının özniteliklerinin değişmesi ya da kullanıcının yetki iptali gibi durumlarda kontrolleri sağlamaktadır. Bununla birlikte, aynı verinin birçok kullanıcı tarafından birkaç kez şifrelenmesi depolama alanının gereksiz yere büyümesine neden olmaktadır, bunu engellemek için tekilleştirme, Yakınsak Şifreleme, yöntemi kullanılarak bütüncül bir mekanizma önerilmiştir. Böylece daha düşük bant genişliği maliyetiyle elde edilmiş bir sistem olduğu gösterilmektedir.Item Citation Count: ASLAN, A. (2014). A performance and functional analysis tool for testing and maintenance of web-based application from the user perspective. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A performance and functional analysis tool for testing and maintenance of web-based application from the user perspective(2014) Aslan, Alper; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThis thesis focuses on the performance stability score (PSS) of the Web-Based Application Workflow (WBAW) and gathers the automated virtual user response times, repeated with scheduled periods, to calculate the best successful response interval heuristically. The lack of server-side hardware, network and application resources can affect the end-user Internet browsing experience negatively. This kind of negative effects can be monitored only on the end-user web browser. The virtual user browser scripts can be used to monitor the problems. The name of the application, developed, is called "MyToolset". It is designed and implemented by using the open source technologies. The research on this subject aims to monitor the performance degradation and failures on WBAW weekly, raise appropriate alerts and calculate the performance stability score. Furthermore, MyToolset reports the WBAW failures by taking the snapshot of the end-user browser perspective as evidence. The entire mathematical model is based on the calculation of this idea. Live graphics and comparable charts are used to report the results. After custom consecutive performance degradations and failures occur, MyToolset will raise the alerts. The thesis concludes that the WBAW and PSS is used for monitoring, test automation and helping the capacity planning of server-side resources, WBAW works on, such as hardware, network and applicationsItem Citation Count: İBRAHİM, T. (2014). A road map to a successful application of e-government in Iraq. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A road map to a successful application of e-government in Iraq(2014-06) İbrahim, Thaer; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThe most important objective of the government is to provide services to citizens in easy and comfortable ways. The application of an e-government project is the best way to achieve this goal. Moreover, the widespread use of information and communication technology has facilitated the implementation of this project in various ways. The Iraqi government, like other governments, wants to provide these services to citizens through the application of an e-government project. E-government is a way to improve the government's performance to become more efficient and effective. In addition, e-government leads to increased transparency and efficiency in the administration of the state. Therefore, the adoption of e-government is a process of change that will help to expand the areas of citizens and businessmen to participate in the new economy based on knowledge, technology and modern applications. In addition, e-government provides the possibility of the involvement of citizens and civil society in the policy debate through direct dialogue, and support decision-making in a way to facilitate better understanding of the citizens and their needs.This thesis describes what an e-government project is and describes how it should be applied in Iraq as well as the experiences of many countries. This study also examines the challenges that will be encountered in the application of a successful e-government project. Information was collected for this thesis by extracting real data through interviews with people involved in the application of the e-government project in Iraq. In addition, many official documents related to this project was accessed to find out the challenges encountered during the implementation of the project and to find best solutions to remedy these problemsItem Citation Count: Shakir Shakir, Ahmed Nashaat (2016). A robust encryption and data hiding technique by using hybrid des and lsb algorithm / Hibrid des ve lsb algoritma kullanarak sağlam şifreleme ve veri gizleme tekniği. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.A robust encryption and data hiding technique by using hybrid des and lsb algorithm(2016-08) Shakir Shakir, Ahmed Nashaat; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüInformation hiding is the process of hiding the details of a function, object or both. On the other hand, information hiding represents an important method that is used in data security. Another name of information hiding is the steganography which hides data inside other data, such as embedding text inside an image or an image inside another image. Steganography techniques have been used from ancient times through the use of many different mechanical ways, such as writing in invisible ink in the Greek Testament. On the other hand, Cryptography is the process of hiding information by encrypting data using a complex algorithm. It is used when collaborating over an untrusted intermediary, such as the Internet. Steganography and cryptography work similarly but in different contexts. In this study, we have presented an integration of cryptography and steganography to produce an efficient and robust model. In terms of cryptography, the Data Encryption Standard (DES) algorithm has been implemented, whereas in steganography, the Least Significant Bit (LSB) algorithm has been used. Our results show efficient time implementation and a robust algorithm mechanism in terms of Peak Signal-to-Noise Ratio (PSNR), Signal-to-Noise Ratio (SNR), and Mean Square Error (MSE).Item Citation Count: FİDANBOY, C.Ö. (2009). A survey of artificial intelligence techniques for capability maturity model integration (CMMI). Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A survey of artificial intelligence techniques for capability maturity model integration (CMMI)(2009-09-03) Fidanboy, Cemalettin Öcal; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüOur purpose in this thesis is to investigate the current artificial intelligence applications in scope of the CMMI process areas. Firstly, research is made regarding the CMMI Model. Then, current studies about CMMI process areas by using artificial intelligence techniques were examined. The overall aim of the thesis is to perform a survey about artificial intelligence techniques conjunction with Capability Maturity Model Integration (CMMI) process areas. As a result, future work evaluation in artificial intelligence applications with CMMI was performed.Item Citation Count: ÖZTÜRK, H. (2003). A Survey on public-key infrastructures. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A Survey on public-key infrastructures(2003-09) Öztürk, Haluk; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüPublic-key cryptography is fast becoming the foundation for online commerce and other applications that require security and authentication in an open network. The widespread use of public-key cryptography requires a public-key infrastructure to publish and manage public-key values. Without a functioning infrastructure, public-key cryptography is only marginally more useful than traditional, secret-key cryptography. This thesis presents a set of characteristics that are common to all public-key infrastructures. These criteria are intended to encapsulate the fundamental issues that arise when dealing with such systems. They can be used both as a "shopping lisf for those who need to choose an infrastructure for a particular application, and as a guide for infrastructure developers, that they may be more aware of any compromises or tradeoffs they might make in their work. The characteristics are used to present a survey of current and some proposed infrastructure systems. The criteria reveal the strengths and weaknesses of each system, and indicate where improvements may be required.Item Citation Count: Olgun, Serhan (2018). A systematic review of gamification in the context of software development landscapes / Yazılım geliştirme mecralarında oyunlaştırma kavramının kullanımına yönelik bir sistematik gözden geçirme çalışması. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A systematic review of gamification in the context of software development landscapes(Çankaya Üniversitesi, 2018) Olgun, Serhan; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Anabilim DalıThe software development process is a complex activity that has interrelating steps to produce software products. Human related social factors such as user motivation, engagement, communication and collaboration issues affect the activities performed by software development organizations. In fact, software engineering researchers seek better ways to overcome the human related issues so as to improve the quality in software development. Consequently, research has been conducted to introduce new methodologies, techniques and concepts. As such, gamification has been introduced as a novel technique to enhance the software development process and ultimately resolve some of the identified obstacles that are related to human factors. However, there is a bias to adopt the gamification into the software development process because there are still insufficient evidences about its positive outcomes. In this study, a systematic literature review was rigorously conducted to investigate the application and to reveal the benefits of gamification in the software development landscapes. This study contributes to the area of software engineering research by proposing a classification approach to categorize gamification studies in software development landscapes. The results of this research suggest that there has been a significant increase in empirical and theoretical studies that were recently published and many positive steps being taken towards better integration of gamification in software development organizations.Item Citation Count: AL-HİLALİ, A.R.K. (2015). Accelerating stencil computation in multi-core architecture. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Accelerating stencil computation in multi-core architecture(2015-01-16) Al-Hilali, Amar Raeed Khorshid; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüStencil computations are common in linear systems of equations, numerical solutions of partial differential equations, molecular dynamics and many other scientific problems. For large structures, long computation times are an important problem. Increasingly higher number of cores are used in parallel for such computations, but still, the speedups are not sufficiently satisfactory. The main aim of this thesis is increasing the cache reuse and minimizing number of memory accesses by optimizing loop structures. We present and test several algorithms and improvements on them to get an optimal runtimeItem Citation Count: KÜÇÜKOĞLU, A. (2005). Access telecommunication systems. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Access telecommunication systems(2005-01) Küçükoğlu, Afşin; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği BölümüThis thesis studies the differences between xDSL, LMDS, Fiber and FSO. Cable access system XDSL is compared with the optical fiber access communication method. As wireless access communications, LMDS and FSO systems are compared. Finally, a full comparison of all the key points for all the access systems are made. Issues compared cover the state of the art, information rate, communication distance, security, commercial prices, and the system installation costs. The comparison is supported by a software which is running under Unix systems on the internet. In the second part, atmospheric structure and the atmospheric molecular effects on the light waves in different ranges are studied. Temperature, C02 and water molecular effects in the atmosphere and the effects on the intensity are also studied