Matematik ve Bilgisayar Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/222
Browse
Browsing Matematik ve Bilgisayar Bölümü Tezleri by Title
Now showing 1 - 20 of 100
- Results Per Page
- Sort Options
Item Citation Count: Taha, İhsan Ahmed (2017). A comprehensive comparison of NOSQL and relational database management systems / NOSQL ve ilişkisel veritabanı yönetim sistemlerinin kapsamlı karşılaştırılması. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A comprehensive comparison of NOSQL and relational database management systems(Çankaya Üniversitesi, 2017) Taha, İhsan Ahmed; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar Anabilim DalıIn the last four 'decades, relational database management systems have been used widely to manage structured data in different disciplines. Nowadays, data resources increase rapidly in different forms (including structured, semi-structured and even unstructured data), requiring us to find another way to manage data. NoSQL database management systems previously were exhibited a few years ago, to meet the requirements of a variety of data forms. Many papers, and blogs have claimed that there is a trade-off between using relational database systems and non-relational database systems (NoSQL). In this study, we propose a novel investigation of the performance of relational and non-relational database systems in terms of the main operations that every database performs, such as insertion, reading, updating, and deleting by using the recent version of Yahoo Cloud Serving Benchmark (YCSB-0.9.0) in order to evaluate the performance of MySQL (RDBM) versus Mongo DB and Apache Cassandra (NoSQL). A testing environment is set up for each workload and the responses for each database management system used in the study are examined for each workload. It is worth mentioning that, although we use the latest version of Yahoo Cloud Serving Benchmark, it does not support the latest release of most database management systems, be they relational or non-relational. The results of this study show that the performance of each system differs due to the differences in their respective data storing mechanisms. In addition, the results of this study present the weaknesses and strengths of each database system used in the study.Item Citation Count: ACAR, A. (2015). A genuine origin and language for the universal principles of architecture. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri EnstitüsüA genuine origin and language for the universal principles of architecture(2015-08) Acar, Aktan; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik ve Bilgisayar BölümüToday, architectural theories are replaced by instant discoursive positions, which are mainly overwhelmed by a crisis of meaning and legitimacy. The examination of the history of architectural theories showed that those instant positions are based on the architectural theories of the 18th century. The reverse-chronological investigation of the theories of the 18th century has revealed the emancipation of architecture from its metaphysic knowledge, which distanced the theory from its origins dissociatively, in the 17th century as the reason that crisis. That knowledge was defining the particulars of architectural theory, such as origin, meaning, character, taste, and form from antiquity to the late 17th century. The research showed that those particulars constitute the universals of architecture. Their genuine origin and language defining them were structured by Vitruvius in the 1st century BC on the basis of six essential concepts: order, arrangement, symmetry, eurhythmy, propriety and economy. Those concepts have been revisited and redefined in order to reflect upon the domain itself by means of its own terminology, rather than imported concepts. This reflection, considered as a further study, would proceed towards solid and valid architectural theories corresponding the crisis of meaning and legitimacy.Item Citation Count: Naji, Hayder Faris (2017). A GIS-based decision support system for locating new train stations in Iraq / Irak'ta yeni̇ tren i̇stasyonu yerleri̇ni̇n beli̇rlenmesi̇ i̇çi̇n CBS destekli̇ bi̇r karar destek si̇stemi̇. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A GIS-based decision support system for locating new train stations in Iraq(Çankaya Üniversitesi, 2017) Naji, Hayder Faris; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar Anabilim DalıRailway networks are one of the most necessary infrastructures all around the world. Today, to manage these networks, Geographic Information System (GIS) techniques should be used in order to study and analyze the railway network and its stations. It is very difficult to deal with railway systems by using traditional methods and the results may become inaccurate because of the huge amount of data related to them. In addition, by using GIS techniques in the development of the rail networks, the decision-making process will be improved and supported. Moreover, the results will be accurate because they result from using specific criteria to achieve a defined aim. In this study, the train stations in all of Iraq's provinces were studied and analyzed by using network analysis, which is one of the most powerful techniques within GIS. A GIS-based system was built by using the free trial copy of ArcGIS® software, PYTHON™ programming language, and ASP.Net (C#) programming language in order to develop a full decision-making environment to manage and locate train stations in the country of Iraq. The main methodology for this study is divided into two parts. v The first part identifies the problems in the current stations through the analysis of those stations by using network analysis. The second part determines the best candidate locations for new train stations depending on the number of people around those locations and the distance between those people and the new candidate locations according to the existing road network. In addition, the new locations should be accessible by people who are within a walking time of 20 minutes from the new locations as an accessibility value. The results will be presented as spatial maps, which portray the best locations for new train stations, and tabular data of the areas and the number of people to be served by the new stations.Item Citation Count: SOSA, A.S. (2011). A modified securtiy approach for web application used for the registration of the student at Çankaya University. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri EnstitüsüA modified securtiy approach for web application used for the registration of the student at Çankaya University(Çankaya Üniversitesi, 2014-12) Sosa, Ali Sami; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar BölümüThis thesis goal is to design and implement a modified security approach for web-based system for student's registration in Natural and Applied Science Institute of Çankaya University Web application that help students to register by using the Internet..The employee can also use this application to track follow student status by monitoring the student information and give a report for each user, this proposed application can reduce time and effort for the users.The proposed application system can also be applied on smart devices (Iphone and Ipad)Item Citation Count: Ameen, Kameran Ali (2015). A node authentication mechanism on wireless sensor networks / Telsiz sensör şebekelerinde düğüm onaylama mekanizması. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A node authentication mechanism on wireless sensor networks(2015) Ameen, Kameran Ali; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik ve Bilgisayar Bilimleri Ana Bilim DalıA wireless sensor network (WSNs) is a network that consists of a large number of ultra-small autonomous devices which are resource-constrained called sensor nodes. Sensor networks may be deployed for a wide range of applications, including military sensing, environment monitoring and patient monitoring, etc. Sensors can collect, process and transmit data in a distributed and cooperative manner. They are usually deployed in an unattended environment (open area) and communicate with each other through wireless channels. Therefore, security is necessary to protect data from various types of attacks. The authentication process is one of the important ways to achieve security in WSNs. In this thesis, the pros of both symmetric and asymmetric key cryptography are used to achieve security. The proposed scheme secures communication by distributing the public key securely to both the base station and cluster head; as a result, this yields security of the message. The proposed scheme is efficient due to the application of data sequence over ECC, which in turn depends on the ECDLP. Therefore, it provides far more security and resistance against a number of attacks when compared with other existing schemes.Item Citation Count: KOCAMUSTAFAOĞULLARI, M. (2013). A prototype for assessment of information security awareness and implementation level. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri EnstitüsüA prototype for assessment of information security awareness and implementation level(2013-06) Kocamustafaoğulları, Meltem; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar BölümüInformation is one of the most valuable assets for any organization and it should always be appropriately protected. Information security is the protection of information against threats to ensure the business continuity. Relying only on the technology is not sufficient and the human factor is the weakest cycle which needs to be strengthened for effective and sustainable information security management. Information security is not only related with technology but it is rather harmonization of people processes and technology. Organizations have the tendency to take action after security incident occurs instead of proactively. There is lack of awareness concerning the information security concepts and its necessity. Awareness and understanding at management level is utmost important to establish and maintain security culture in the organization. Organizations should be aware of information security aspects, understand their own security requirements and implement countermeasures accordingly. There are good practices and internationally accepted security standards such as ISO/IEC 27001 and ISO/IEC 27002 that can be taken as reference point and guidance. Organizations should establish and implement, sustain and improve information security management taking into account the proven good practices tailored for their own requirements. In this thesis it has been aimed; i. To provide a prototype model and tool for self assessment of information security awareness and implementation level of organizations, ii. To provide a tool to utilize as reference point for organization in building own security requirements and objectives as well as monitoring own overall progress, iii. To facilitate a self explanatory web-based tool addressing wide range of users without the need for prior training or in-depth technical knowledge on information security based on ISO/IEC 27001 and ISO/IEC 27002 international security standards and covering essential and common practice security topics, iv. To provide comparable values with other organizations who have similar information security requirements, v. To prepare tool in Turkish for contributing to improvement of information security awareness and implementation among organizations. The model is designed in eight sections for assessment of; IS Corporate Approach, Information Assets Security, Human Resources Security, Physical and Environmental Security, Communications and Information Systems Operations, Information Systems Access Control, Development and Maintenance Management, IS Incident Management and Business Continuity, IS Compliance and Monitoring Management. The tool is implemented in line with the designed model and tested by experts having solid professional background on information security as well as selective users in Turkey from various sectors such as finance, public authorities, consulting companies and education. The feedback and results verified that the objectives of the thesis are achieved and the tool can serve to improve information security awareness and implementation level of the target users with its web based, self explanatory and user friendly tool environmentItem Citation Count: AL-SALIHI, A.A.M. (2015). A robust key management scheme for hierarchical wireless sensor networks. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri EnstitüsüA robust key management scheme for hierarchical wireless sensor networks(2015-05) Al-Salihi, Aso Ahmed Majeed; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik ve Bilgisayar BölümüWireless Sensor Networks (WSNs) are used in many applications such as monitoring, target tracking and military applications, etc. A network is comprised of a large number of small, cheap, computational, limited energy devices which are called sensor nodes. These nodes are randomly deployed in open area to gather information. They communicate with each other via wireless media which are, however, vulnerable to being attacked by malicious nodes that may impersonate legitimate nodes. This makes the whole network liable to being hacked. Thus, security for WSNs is needed to keep any gathered data safe and to protect the communication links between sensor nodes. Key management plays a critical role in achieving security in a WSN. In this thesis, a robust key management scheme for hierarchical WSNs depends on, and exploits, the advantage of symmetric and asymmetric key cryptography. The proposed scheme uses the SHA-1 in HMAC not unlike a symmetric key for cluster formation and encryption of the private key via ECC, such as asymmetric key cryptography. Ultimately, the proposed scheme should be used to solve all these problems mentioned above.Item Citation Count: Ahmed, Ali (2015).A study on human capital index in closing the digital divide and raising e-government performance in middle east countries / Ortadoğu ülkelerinde sayısal uçurumun kapatılmasında ve e-devlet başarımının yükseltilmesinde beşeri sermaye endeksi üzerine çalışma. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A study on human capital index in closing the digital divide and raising e-government performance in middle east countries(2015) Ahmed, Ali; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik ve Bilgisayar Bilimleri Ana Bilim DalıE-government initiatives aim to employ information and communications technology (ICT) to provide better services to citizens and businesses while challenging the digital divide, which leads to closing the divide so as to promote e-government performance. This thesis takes related works already reported in the literature and addresses major factors that played a main role in achieving digitized governments, especially in the Middle East and Arab countries. As the case study, performance indices of Iraq, Bahrain and the KSA from 2002 to 2014 are studied in depth. The problem has been identified as the steady decline in the Human Capital Index (HCI) in the region. Therefore, the nature of the HCI measurement has been investigated. Major findings demonstrate a relationship between the HCI and ICT skills index of the International Telecommunication Union with a considerable digital divide in ICT skills in the Arab countries in addition to poor performance in the HCI. This finding is also supported by interpreting the differences between the indices of the HCI versus the telecommunication infrastructure index (TII) and online services index (OSI). This quick tool reveals that a poor HCI prevents these countries from promoting higher ranks. Another finding emerging from the statistics shows that the HCI exhibits unique behavior that differs from the TII and OSI and that it (the HCI) needs more time to improve. It is therefore necessary to focus on investing in HCI and ICT skills and to develop policies and strategies by those governments in charge. Among the limitations of this thesis are information sources that include only previous studies in addition to websites and in-situ surveys that were not conducted. The legal, economic and cultural aspects of the HCI are not studied. The HCI and ICT skills indices are found to play unique roles in closing the digital divide and this effect can be observed even in rich Arab countries not found in the list of world e-government leadersItem Citation Count: Alyaseen, HAider Ali Hasan (2017). A systematic review of interactive information retrieval evaluation studies, 2007-2016 / Etkileşimli bilgi erişimi değerlendirme çalışmalarının sistematik incelenmesi, 2007-2016. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.A systematic review of interactive information retrieval evaluation studies, 2007-2016(Çankaya Üniversitesi, 2017) Alyaseen, Haider Ali Hasan; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar Anabilim DalıSince the last mid-century researchers start investigate in the performance of IIR (interactive information retrieval). Many methods and measures were innovated and used in this field studies. To ensure the replication of maturation researches there are several factors that effect on the maturation of researches such as introducing standards for measurement and analysis, and understand past endeavors. In this study, we analyzed a vast range of papers within the period (2007-2016), where 1110 papers were examined manually and only 78 articles were included. Based on the achieved results in our study, we found that the researchers increased their concentration on IIR evaluation. Due this expansion of researching in this topic, we noticed that researches used some new techniques and datasets for evaluation of IIR systems. Most of the included papers were conducted based on the help of participants and questionnaires.Item Citation Count: KOTHER, S.H. (2015). A Web-Based system to enhance students’ abilities in English education. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri EnstitüsüA Web-Based system to enhance students’ abilities in English education(2015-06) Kother, Safaa Hadi; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik ve Bilgisayar BölümüThe research deals with enhancing the students' abilities to learn English language. The enhancement will be in the form of web-based computer system hosted in the root establishment of education that the students can access using their own computers at homes or school computers. The proposed system will use the computer digital media like movies, dictionaries, and speech facilities to simplify the reading, writing, listening, speaking and the vocabulary of the English language. The system is instructors' assistance system uses all attractive facilities to be students' favorite and beloved system and portable to give students the longest period of education with ability to share knowledge between them. It is an integrated multimedia system the override students motivations to enhance education facilities. The system will be implemented using the Microsoft Visual Studio development tool with aid of Visual C#.net integrated with Asp.Net tools to build the website according to the latest technologies in web-based application development. The designed system deals with analysis of the benefits of using it and questioners to show its intended application results and its abilities to reduce education costs and increase education effectiveness.Item Citation Count: Ürgüp, Edanur (2016). (alpha-psi) Type contractive mappings and related fixed point theorems / (alpha-psi) Tipinden büzülme dönüşümleri ve ilgili sabit nokta teoremleri. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.(alpha-psi) Type contractive mappings and related fixed point theorems(2016) Ürgüp, Edanur; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik ve Bilgisayar BölümüThis thesis consists of three sections. The first section is reserved for introduction, some basic definitions and declaration of literature about alpha-psi type contractive mappings and related fixed point theorems have been presented. The second section deals with the main results. We have applied definition of alpha-admissible for two different functions of f and T. Furthermore, we have investigated their results. Finally, the third section includes discussion and conclusion.Item Citation Count: Saleem, Ahmed M. (2015). An efficient energy scheme for hybrid clustering wireless sensor networks / Hibrit kümelenme kablosuz algılayıcı ağları için verimli enerji programı. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri Enstitüsü.An efficient energy scheme for hybrid clustering wireless sensor networks(2015) Saleem, Ahmed M.; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik ve Bilgisayar BölümüKablosuz algılayıcı ağlarda kümeleme, enerji optimizasyonu için birçok uygulamalarda kullanılmakta olan önemli yöntemlerden biridir. Ağlarda birçok düğüm olduğundan, kümeleme yöntemleri ile uyarlanabilir enerji tüketimini sağlamak amaçlanmaktadır. LEACH rastgele kümelenme metoduna dayanan en popüler kümeleme algoritmalarından biridir. Bu algoritmada küme başı ve küme üyeleri olmak üzere iki farklı düğüm tipi bulunmaktadır. Ġletişim bu küme başları ile sağlanır. Bu nedenle LEACH algoritması, dinamik kümeleme ve uyarlanabilir enerji tüketimi sağlayarak ana amacına ulaşır. Bu tezde yeni bir melez kümeleme algoritması ağ alanında tanıtılmış, analiz edilmiş ve uygulanmıştır. Önerilen yöntemin enerji performansı LEACH (Düşük Enerji Uyarlanabilir Kümelenme Hiyerarşi) ve SEP (Stabil Seçim Protokolü) ile karşılaştırılmıştır. Farklı kısıtlamaları ve yöntemleri ile küme baş seçimi enerji tüketimi konusunda daha iyi sonuçlar ortaya çıkartırItem An evaluation of three search engines (google, yahoo, bing) based on arabic user perception(Çankaya Üniversitesi, 2017) Azeez, Suad Shatti; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar Anabilim DalıWith the rapid increase of Arabic users around the world, a need of understanding the preferences of this wide Stratum of society is important. To do so we designed a questionnaire to evaluate three search engines (Google, Yahoo, and Bing) to reveal the Arabic user's perception of these three search engines. Each engine has its own features and it is own search methods to achieve the main purpose of search engines which is retrieving relevant results. This study exposes the pros and cons of the three tested search engines which give the opportunities to search engine developers to enhance their products. The results showed that Google performs very well comparing with Yahoo and Bing in some kind of data (text and video search) whereas image and advertisements Yahoo seems to be more accurate, Bing captivated many participants with its attractive homepage and useful features except supporting Arabic language in Bing map. Our results will help engineers and designers to improve their search engines in term of the design of homepages and result, improving their search engines algorithms for Arabic queries.Item Citation Count: JAMEL, A.A.M. (2013). An investigation of electronic government transition case study in health: Hospitals in Erbil. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri EnstitüsüAn investigation of electronic government transition case study in health: Hospitals in Erbil(2013-07) Jamel, Ahmed Abdulrahman M.; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar BölümüElectronic government initiatives and public participation to them are among the indicators of today's development criteria of the countries. After consequent two wars, Iraq's current position in, for example, UN's e-government ranking is quite concerning and did not improve in recent years, either. In the preparation of this work, we are motivated with the fact that handling geographic data of the public facilities and resources are needed in most of the e-government projects; such examples are reported to the literature. Geographical information systems (GIS) provide most common tools not only to manage spatial data but also to integrate such type of data with nonspatial attributes of the features. With this background, this thesis proposes that establishing a working GIS in the health sector of Iraq would improve e-government applications. As the case study, investigating hospital locations in Erbil is chosen. The results show that setting up a GIS in Erbil does not require extreme technical knowledge; however, a strong limitation that obtaining clean and up-to-date data is an important concern. Although it is possible to establish a GIS in this sector, the starting point should not be acquiring hardware and software but to collect clean data from the field and to ensure that the data gets updated timely. Keywords: e-government, Iraq, Erbil, GIS, spatial data, hospital locationsItem Citation Count: Tahar, Noura A. Abdulrazaq (2017). Analysis of hybrid dynamical systems with an application in biological systems / Biyoloik sistemlerde bir uygulama ile hibrit dinamik sistemlerin analizi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Analysis of hybrid dynamical systems with an application in biological systems(Çankaya Üniversitesi, 2017) Tahar, Noura A. Abdulrazaq; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar Anabilim DalıThere are many complex dynamics appearing in nature science and technology one of the most useful approaches to model these phenomena is hybrid dynamical systems hybrid dynamic systems describe the interactions of continuous and discrete variables regulating each other ın this work we have looked at different types of hybrid systems that have been used in the modeling of biological systems we have also looked at the stability analysis of these systemsandhave given an example of a subclass of hybrid piecewise linear systems and checked the stability of these systems through an exampleItem Citation Count: Majeed, Sinan Nazar (2015). Analyzing digital image manipulation detection algorithms / Dijital görüntü manipülasyonu algılama algoritmaları analizi. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Analyzing digital image manipulation detection algorithms(2015) Majeed, Sinan Nazar; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik ve Bilgisayar Bilimleri Ana Bilim DalıIn recent years tampering in digital image is becoming very widespread and more interesting. With powerful Image software, editing tools make a tampered image easy, thus the field of image forensic has become very important and crucial. In this thesis, investigation is made on the image by depending on the traces that occur when the soft correlation between rows and columns are divested in altered images, in term of linear dependency and exploitation of these traces in image forensic, depending on the properties of singular value decomposition and derived features which can be helpful and accurate sufficiently to reveal the tampering that is done on the genuine digital image.Item Citation Count: MARAHA, H.E.J. (2014). Audio watermarking using DWT of second level decomposition of low frequency and using RMS on approximation coefficients. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri EnstitüsüAudio watermarking using DWT of second level decomposition of low frequency and using RMS on approximation coefficients(Çankaya Üniversitesi, 2014-08-06) Maraha, Heyam Essam Jibrael; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar BölümüDigital media are distributed through the internet system in a magnificent manner due to the efficiency and inexpensiveness of such a system. Audio clips and other digital signals are transmitted, shared and used easily. This causes a real security problem. Solving this problem leads to finding authentication techniques to provide security for these digital media. Digital watermarking is a suggested solution technique to offer such security for these distributed digital signals. Digital watermarking is the art of embedding information (a watermark) in the original signal, taking into consideration preserving the quality of the host digital signal. There are different types of watermarking media such as image, video and audio; our thesis focuses on audio watermarking techniques. Also, there are a variety of techniques using the watermarking algorithm that depends on the type of algorithm that is used to embed the watermark in the original signal. In our thesis, we have used DWT (Discrete Wavelet Transform) of second level decomposition of the approximation coefficients of each frame. These frames are resulted from segmenting the original audio clips into frames, each one equal to 10 seconds. Also, we have applied the RMS (Root Mean Square) to these approximation coefficients which represent the low frequency of each frame. The aim of using the RMS is to find the higher magnitude approximation coefficients among the segmented frames; then to embed the watermark in a quarter of the selected frames according to the magnitude order. A watermark of 256 x 256 pixels was embedded in two tested audio clips (Pop and Classic) according to the former algorithm. We have applied 17 attacks that try to remove or modify the watermark that is hidden in the original audio clips. Also variety of models such as subjective and objective models were applied to evaluate the efficiency of the proposed algorithm results. The results of the proposed watermarking technique show an effective robustness against most of the applied attacks, especially in MP3 Compression, Quantization, Additive Noise, Resample and Low Pass Filter; however, it shows fragile robustness in Time Stretch and Pitch Shift attacksItem Citation Count: Hoshi, Alaa (2016). Barriers and opportunities for e-commerce in Iraq: Perception of citizens / Irak'da e-ticaret için engeller ve fırsatlar: Vatandaşların algıları. ayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Barriers and opportunities for e-commerce in Iraq: Perception of citizens(2016) Hoshi, Alaa; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik ve Bilgisayar Bilimleri Ana Bilim DalıThe internet is a fashionable medium that both changes our lives and impact the behavior of Labor and consumer in both business and commerce. Several studies of e-commerce in developing countries have emphasized the barriers and opportunities of e-commerce associated with Information and communication Technology (ICT), regulatory environment, economic infrastructure and culture as most important factors of successful e-commerce. ICT has transformed the approach of many companies to conduct business around the globe, currently business is conducted online wider than traditional methods. Majority of the developing countries face limitations on the development of e-commerce, a numerous studies categorize the factors of e-commerce adoption in developing countries into two factors as external and internal factors. These factors are the main barriers for e-commerce adoption. While Middle-East is a fast growing and evolving region for e-commerce,e-commerce is still in its infancy in Iraq. Iraq's economy mostly relies on oil revenues and it is essential to diversify economic activity, e-commerce is one of the ways to realize this. Within this frame, the main aim of this research is to understand the barriers and opportunities of e-commerce and adoption level of e-commerce in Iraq as a developing country. In order to understand the main perceptional barriers of Iraqi citizens, a research was conducted with 110 participants. The findings of the research indicate that the most important barrier for e-commerce adoption in Iraq is related with Organizational, Governmental/ Legal and Financial Barriers. Due to the lack of comprehensive research for e-commerce in Iraq, this study will contribute to the literature with its findings related with barriers which form opportunities for e-commerce development.Item Citation Count: Murad, Zainab (2015). Basin's fractal via complex newton's method / Newtonun karmaşık metoduyla havzalar fraktalı. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi, Fen Bilimleri EnstitüsüBasin's fractal via complex newton's method(2015-04) Murad, Zainab; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik ve Bilgisayar BölümüIn this thesis, we show that when we applied the Newton's method on the exponential function,f(z)=p(z)eQ(z) where p(z) and Q(z) are polynomials in the complex plane, the attraction basins of roots have finite area when n . With the help of MATLAB we obtained nice fractals in order to prove the finite basins area when n and infinite basins area when n<2Item Citation Count: RASHID, R.S. (2014). Binary image watermarking on audio signal using wavelet transform. Yayımlanmamış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri EnstitüsüBinary image watermarking on audio signal using wavelet transform(Çankaya Üniversitesi, 2014-12-23) Rashid, Rakan Saadallah; Çankaya Üniversitesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar BölümüDigital watermarking approaches have recently become an important field of study in a number of practical applications. Generally, digital watermarking is the process of embedding particular information data into other signal data in such a way that the quality of the original information data is maintained. Watermarking can be performed on images, video, text, or audio to protect them from copyright violation. Among all of these types of watermarking, audio watermarking is difficult since the quality of such signals is highly affected by the watermark code. This thesis introduces some approaches that have features and may be applicable for audio watermarking. Generally, the digital audio watermarking approaches may be performed in either the special domain or the transform domain. The approaches that are based on the transform domain are gaining more attention due to their robustness or resistance to attackers. The most commonly used transforms for achieving digital audio watermarking are discrete cosine transform (DCT), short-term Fourier transform (STFT), and digital wavelet transform (DWT). In this research work, the main attention is paid toward digital wavelet transforms such as Haar and Daubechies-4. In addition, this thesis investigates the process of embedding a binary image into various audio signals such as speech and music signals. The values of the pixels in the binary images are either 1 or 0. These pixels are inserted into samples of the speech signal in such a way that the quality of the speech signal is preserved. One main reason to consider the audio watermarking approaches in the wavelet domain is that many modern multimedia standards such as JPEG2000 and MPEG-4 are based on the discrete wavelet transform. These common standards have brought new requirements such as low bit-rate transmission, coding, and many other advantages. Finally, experimental results are presented to validate the performance of the proposed watermarking approach and to compare its performance with other related watermarking approaches. The results show that the performance, in terms of signal-to-noise ratio (SNR) and normalized correlation (NC), of the proposed watermarking approach outperforms other approaches based on DCT. In addition, the results show that the extraction process of the hidden code becomes complex when considering any signal processing operations such as MP3 compression and high pass filtering. The worst case is when using a high pass filter where the recovered binary image is not satisfactory