Yüksek Lisans Tezleri
Permanent URI for this communityhttps://hdl.handle.net/20.500.12416/57
Browse
Browsing Yüksek Lisans Tezleri by WoS Q "N/A"
Now showing 1 - 11 of 11
- Results Per Page
- Sort Options
Article Citation - WoS: 0A model for adopting cloud computing in government sector: Case study in Iraq(Nadia, 2020) Hassanpour, Reza; Hassanpour, Reza; Yazılım MühendisliğiCloud computing is an on-demand delivery system of computing resources, such as servers, databases, storage, networking, software, and analytics, over the Internet on a pay-for-use basis. This technology is not currently widely utilized in government institutions, especially in the case of Iraq, for different factors. The main objective of this research is to identify the most critical factors that prevent the adoption of cloud computing, through developing a conceptual model that integrates the Technology Organization, and Environment (TOE) framework, Iacovou et al.' s model, and the Diffusion of Innovation (DOI) theory. The key factors influencing the adoption of cloud technology have been determined through literature review. The results show that the most significant concerns that can have a negative impact in the decision of adoption are as follows: feasibility, trust, regulatory concerns, IT readiness, privacy, compatibility, government support, availability and reliability, industry type, security, cost, complexity, organization size, organization culture, as well as direct benefits and indirect benefits have a positive impact in the decision of cloud adoption. Moreover, the researchers used the CloudAnalyst simulator to identify the real time performance of the cloud technology environment, and applied two algorithms via this tool, namely the Analytical Hierarchy Process (AHP) technique, which used to obtain the weight of variables depending on the questionnaire results, and the Elliptic Curve Digital Signature Algorithm (ECDSA), which used to identify the privacy and security of cloud technology. Finally, the researchers have proposed guidelines to help government institutions to move to the cloud environment in an effective manner.Article Citation - Scopus: 5Active defense strategy against jamming attack in wireless sensor networks(Modern Education and Computer Science Press, 2019) Al-Shai, N.F.A.; Hassanpour, R.Wireless Sensor Networks WSNs are being utilized increasingly nowadays due to their ability to collect data from stationary, moving, reachable or unreachable fields. Progressive developments in WSN techniques add efficiency, reliability and better power management possibility, but they are still vulnerable and sensitive to security threats. The most effective threat to WSN is DOS attacks, which are detectable but in many cases unpreventable yet. An authentication-based defensive approach against DOS attack combined with jamming attack that prevents transferring data between attacked nodes in a cluster and cluster head node is proposed in this study. The proposed method encompasses developing an algorithm with ability to bypass attacked path via alternative safe one under control of cluster head to mitigate the False Node Excluding DOS due to jamming attack. The proposed method has been experimentally tested against similar methods from the literature with arbitrary study cases. Our proposed algorithm shows promising results in mitigating False Node Exclusion DOS (FNEDOS) attack where a full recovery of the attacked node is achieved in case of isolated nodes, and improvement between 36% and 52% is obtained when the attack affects a group of nodes at proxim © 2019 MECS.Conference Object Citation - Scopus: 0Adoption of case tools & uml: A local study(Association for Computing Machinery, 2020) Ashour, O.I.A.; Pusatli, T.This research investigates the role of CASE tools in the software development process by considering importance of CASE in adopting a number of standards. A survey was conducted in six selected companies in Ankara in which semi-structured interviews are conducted with information system managers and developers as key informants. As results, CASE and UML are reported as being considerably used in Ankara with CASE tools being used for project members' communication and documentations. Furthermore, CASE tools have been used for some companies for documentation as parts of contracts and to follow standards such as ISO and CMMI. CASE tools are used to facilitate project developments, especially when enforced by the standards and methodologies required in the contracts. © 2020 ACM.Conference Object Citation - Scopus: 4Deep learning methods with pre-trained word embeddings and pre-trained transformers for extreme multi label text classification(Institute of Electrical and Electronics Engineers Inc., 2021) Erciyes, N.E.; Görür, A.K.In recent years, there has been a considerable increase in textual documents online. This increase requires the creation of highly improved machine learning methods to classify text in many different domains. The effectiveness of these machine learning methods depends on the model capacity to understand the complex nature of the unstructured data and the relations of features that exist. Many different machine learning methods were proposed for a long time to solve text classification problems, such as SVM, kNN, and Rocchio classification. These shallow learning methods have achieved doubtless success in many different domains. For big and unstructured data like text, deep learning methods which can learn representations and features from the input data wtihout using any feature extraction methods have shown to be one of the major solutions. In this study, we explore the accuracy of recent recommended deep learning methods for multi-label text classification starting with simple RNN, CNN models to pretrained transformer models. We evaluated these methods' performances by computing multi-label evaluation metrics and compared the results with the previous studies. © 2021 IEEEBook Part Citation - Scopus: 0Efficient decoding of polar codes(Springer Science and Business Media B.V., 2019) Gazi, O.As we explained in Chap. 1, polar encoder structures can be constructed in a recursive manner. This leads to recursive decoding structures. In [1], Arıkan proposed successive cancellation decoding algorithm for the decoding of polar codes and derived recursive expression for the decoding operations. © Springer Nature Singapore Pte Ltd. 2019.Conference Object Citation - Scopus: 0Expert systems in access telecommunication networks(2009) Şahin, S.; Tolun, M.R.; Baykal, Y.Access telecommunication systems are categorized as digital subscriber line (xDSL), fiber-to-the-home (FTTH), hybrid fiber-coaxial (HFC), power line systems, local multipoint distribution system (LMDS), free space optics (FSO), satellite and worldwide interoperability for microwave access (WIMAX) systems. Basic specifications, such as the rate of information for upstream and downstream, access link length, frequency licence requirement for these access telecommunication networks are defined. Expert system analysis is applied to find out the possible systems that can be employed among the abovementioned choices of access telecommunication within the user defined inputs describing the requirements of the end user. The rule-based structure of the expert system is formed by using the Exsys expert system development tool. © 2008 IEEE.Conference Object Citation - Scopus: 5Investigating end user errors in oil and gas critical control systems(Association for Computing Machinery, 2020) Alrawi, L.N.; Pusatli, T.; 51704System availability and efficiency are critical in the petroleum sector as any fault affecting those systems may negatively impact operations resources, such as money, human resources and time. Therefore, it has become important to investigate the reasons for such errors. In this study, human error has been targeted since a number of these errors is projected to increase in the sector. The factors that affect end user behavior are investigated in addition to an evaluation of the relation between system availability and human behavior. An investigation has been performed following the descriptive methodology in order to gain insights into human error factors. Questionnaires related to software/hardware errors and errors due to the end user were collected from 81 site workers. The findings indicate a potential relation between end user behavior and system availability. Training, experience, education, work shifts, system interface, usage of memory sticks and I/O devices were identified as factors affecting end user behavior, hence system availability and efficiency. © 2020 ACM.Book Part Citation - Scopus: 0Maintaining cybersecurity awareness in large-scale organizations: A pilot study in a public institution(IGI Global, 2023) Aslan, M.; Pusatli, T.Research was conducted to increase the awareness of employees with regard to cyber security to fill the gap in the literature where few studies on how effective the measures implemented in organizations were reported. This research uses the outcome of the phishing drills that a public institution applied to its personnel, participation of said personnel in awareness training, and the reading statistics of regularly published information security bulletins. This has been beneficial in determining the methods to increase the cyber security awareness of personnel in organizations with 1,000 or more personnel; users were considered as a whole, and not individually evaluated. Findings report that organizations can increase users' cybersecurity awareness by systematically conducting phishing exercises, providing awareness training, and regularly publishing information security bulletins. The awareness of reading bulletins rapidly increased after phishing exercises and training and decreased in the following months; however, an increase was observed in the long term. © 2023, IGI Global. All rights reserved.Conference Object Citation - Scopus: 4Nonuniform currents flowing on a perfectly conducting cylinder(2011) Başdemir, H.D.; Başdemir, Hüsnü Deniz; Elektronik ve Haberleşme MühendisliğiIn this paper, we applied physical theory of diffraction (PTD) method to the perfectly electric conducting (PEC) cylinder for investigation of the scattering fields. Physical optics (PO) method was used to gain the uniform scattering field which is produced by the induced current from the incident wave on the tangential plane of the perfectly electric conducting cylinder. Nonuniform current and scattered field will be obtained by applying PTD method to the problem. As a last step of solution, nonuniform currents and nonuniform scattering fields were obtained with the assistance of the exact solution of the scattering waves from the cylinder. The scattering fields and currents are plotted numerically. © 2011 IEEE.Conference Object Citation - Scopus: 4Plagiarism detection in learning management system(Institute of Electrical and Electronics Engineers Inc., 2017) Sabonchi, A.K.S.; Görür, A.K.Learning Management Systems has become one of the teaching tool same as the pen, pencil, blackboard, book, and notebook. Learning Management System (LMS) is defined and types that are derived from this system such as those focused only on the curriculum and those focuses on the management of the education system, and the combination of both are explained. The properties and features that must exist are identified and showed so that it can be called a learning management system. The name and the experiences of countries in terms of the use of this system as well as the benefits resulting from the user experiences have motivated schools and educational institutions to start the establishment of such systems. The main purpose of this study is, an online plagiarism detection system will be developed and integrated into Moodle so that it can be used by teachers to detect cheating and plagiarism cases in students submitted answers. © 2017 IEEE.Article Citation - WoS: 14Citation - Scopus: 18Using containers as astorage facilities in humanitarian logistics(Emerald Group Publishing Ltd, 2014) Ertem, Mustafa Alp; Ertem, Mustafa Alp; Emur, Emel; Endüstri MühendisliğiPurpose - The purpose of this paper is to investigate the use of freight containers to store relief items instead of operating a permanent warehouse building. Design/methodology/approach - A mathematical model is developed to determine the location and quantity of containers as well as the type and amount of relief supplies to store in order to investigate the practicality of using freight containers for storage. The model is tested using earthquake risk data, estimates of population under risk, and the distances between cities. An experimental study is performed using Turkish Prime Ministry Disaster and Emergency Management Presidency (abbreviated as AFAD in Turkish) data for total number of relief supplies. Findings - Considering the earthquake risk of possible locations, the results of the study indicate the target locations for containers. The idea of using containers as storage facilities helped beneficiaries to be reached within a short distance and in an efficient way. Research limitations/implications - The presented model is not implemented in real life disaster relief operations even if it is tested with real earthquake risk, demand and distance data. Practical implications - To apply this model in practice, the container locations within cities should be determined and managerial operations such as maintenance, environmental, and security planning have to be considered. Originality/value - This study presents the first analysis of three sub-topics' intersection: warehousing, pre-positioning in disaster relief, and containerization. To the best of authors' knowledge, containers have not been considered for storage of relief items in humanitarian logistics before.