Bilgilendirme: Kurulum ve veri kapsamındaki çalışmalar devam etmektedir. Göstereceğiniz anlayış için teşekkür ederiz.
 

Özyer, Sibel

Loading...
Profile Picture
Name Variants
Özyer, S.T.
Ozyer, Sibel T.
Tarıyan Özyer, Sibel
Tarıyan, Sibel
Ozyer, S.T.
Ozyer, T.
Job Title
Dr. Öğr. Üyesi
Email Address
Main Affiliation
Bilgisayar Mühendisliği
Status
Former Staff
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

13

CLIMATE ACTION
CLIMATE ACTION Logo

0

Research Products

8

DECENT WORK AND ECONOMIC GROWTH
DECENT WORK AND ECONOMIC GROWTH Logo

0

Research Products

3

GOOD HEALTH AND WELL-BEING
GOOD HEALTH AND WELL-BEING Logo

1

Research Products

15

LIFE ON LAND
LIFE ON LAND Logo

0

Research Products

17

PARTNERSHIPS FOR THE GOALS
PARTNERSHIPS FOR THE GOALS Logo

0

Research Products

14

LIFE BELOW WATER
LIFE BELOW WATER Logo

0

Research Products

4

QUALITY EDUCATION
QUALITY EDUCATION Logo

0

Research Products

11

SUSTAINABLE CITIES AND COMMUNITIES
SUSTAINABLE CITIES AND COMMUNITIES Logo

0

Research Products

6

CLEAN WATER AND SANITATION
CLEAN WATER AND SANITATION Logo

0

Research Products

10

REDUCED INEQUALITIES
REDUCED INEQUALITIES Logo

0

Research Products

9

INDUSTRY, INNOVATION AND INFRASTRUCTURE
INDUSTRY, INNOVATION AND INFRASTRUCTURE Logo

2

Research Products

12

RESPONSIBLE CONSUMPTION AND PRODUCTION
RESPONSIBLE CONSUMPTION AND PRODUCTION Logo

0

Research Products

2

ZERO HUNGER
ZERO HUNGER Logo

0

Research Products

1

NO POVERTY
NO POVERTY Logo

0

Research Products

7

AFFORDABLE AND CLEAN ENERGY
AFFORDABLE AND CLEAN ENERGY Logo

0

Research Products

5

GENDER EQUALITY
GENDER EQUALITY Logo

0

Research Products

16

PEACE, JUSTICE AND STRONG INSTITUTIONS
PEACE, JUSTICE AND STRONG INSTITUTIONS Logo

0

Research Products
This researcher does not have a Scopus ID.
This researcher does not have a WoS ID.
Scholarly Output

12

Articles

6

Views / Downloads

4184/5884

Supervised MSc Theses

1

Supervised PhD Theses

0

WoS Citation Count

40

Scopus Citation Count

85

WoS h-index

3

Scopus h-index

4

Patents

0

Projects

0

WoS Citations per Publication

3.33

Scopus Citations per Publication

7.08

Open Access Source

4

Supervised Theses

1

Google Analytics Visitor Traffic

JournalCount
Universal Journal of Engineering Science2
9th International Conference on Communications (COMM) -- JUN 21-23, 2012 -- Bucharest, ROMANIA1
ACM International Conference Proceeding Series -- 3rd International Symposium on Computer Science and Intelligent Control, ISCSIC 2019 -- 25 September 2019 through 27 September 2019 -- Amsterdam -- 1606731
Computer Standards & Interfaces1
International Workshop on Modeling and Applied Simulation, MAS 2009, Held at the International Mediterranean and Latin American Modeling Multiconference, I3M 2009 -- 8th International Workshop on Modeling and Applied Simulation, MAS 2009, Held at the International Mediterranean and Latin American Modeling Multiconference, I3M 2009 -- 23 September 2009 through 25 September 2009 -- Puerto de la Cruz -- 1045681
Current Page: 1 / 2

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 10 of 12
  • Master Thesis
    IP traffic modeling
    (2007) Tarıyan, Sibel
    RSVP allows Internet real-time applications to request a specific end-to-end QoS for data stream before they start transmitting data. In this report firstly an overview of RSVP is presented. After that the different quality of services available and the relation between QoS and RSVP are explained. Then the fundamentals of RSVP as a protocol are discussed. The performance issues and benchmarking are given next. The experimental results and discussions conclude this thesis
  • Conference Object
    Citation - Scopus: 33
    A Collaborative and Content Based Event Recommendation System Integrated With Data Collection Scrapers and Services at a Social Networking Site
    (IEEE Computer Society, 2009) Kayaalp, M.; Ozyer, T.; Ozyer, S.T.
    There are many activities that people prefer/opt out attending and these events are announced for attracting people. An intelligent recommendation system can be used in a social networking site in order to recommend people according to content and collaboration assessment. This study is an effort to recommend events to users within a social networking site. It can be any networking environment. We have used social environment that has been designed as a facebook1 application. Our application has also been integrated with several web sites. System collects event data from several related web sites either by using web services or web scraping. It also permits users rating events they have attended or planned. Given the social network between people, system tries to recommend upcoming events to users. For this purpose a combination of content based and collaborative filtering has been used. We have also taken geographical location info and social concept of an event. © 2009 IEEE.
  • Article
    Integration between Cryptography and Steganography to Hide Secret Message inside an Image
    (2017) Nashaat, Ahmed; Tarıyan, Sibel
    The information hiding is progression of hiding the details of a function or object or both of them. On the other hand it represents an important way that used in data security. Another name for information hiding is the steganography, which hides the data inside another data such as embed text inside image or image inside another one. The steganography techniques were used from ancient times and through uses of many mechanics and different ways, such as writing in invisible ink in the Greek Testament, while Cryptography is the process of hiding information by encrypt this data using a complex algorithms. Cryptography is used when collaborating over an untrusted intermediate such as internet. The steganography and cryptography work similarly but in different contexts. In this study, an integration of cryptography and steganography to produce an efficient and robust model has been presented. In terms of cryptography, the Data Encryption Standard (DES) algorithm is implemented, whereas in steganography, the Least Significant Bit (LSB) algorithm is used. Our results show efficient time implementation and a robust algorithm mechanism in terms of peak signal-to-noise ratio (PSNR), signal-to-noise ratio (SNR) and mean square error (MSE).
  • Conference Object
    Citation - Scopus: 1
    Unmanned Surface Vehicle With Drown Map System
    (Institute of Electrical and Electronics Engineers Inc., 2019) Al-Dakheel, S.; Ozyer, S.T.; Can Ozdemir, F.; Karadag, A.; Al-Tekreeti, M.
    The drowning cases that are happened whether in sea or ocean specially increasing cases among refugees requires to employ the advanced technology and tools to encounter this problem. Internet of Things (IoT) and cloud computing techniques will be applied in marine sector to address the problems of drowning. Internet of things that represented in sensors, actuators...etc. generate a vast number of data that globally known as a Big data, due to the limited storage and processing of the physical units with the big number of data, a cloud computing is adopted to solve this problem. In this paper, an Unmanned Surface Vehicle (USV) contains GPS and Force Sensitive Resistor (FSR) sensors will be built to discover the location and approximate number of people exposed to drowning. In addition to USV, a real-time map system will be carried out to display this information. All the data and information that generating from the sensors and map system will be stored in a cloud in real-time. This work is a part of the research and development project which is accepted in Turkey Government with the collaboration of the University and Industry. © 2019 IEEE.
  • Conference Object
    Citation - WoS: 1
    Citation - Scopus: 1
    Optimal Energy Efficient Routing in Wireless Sensor Networks With Link Asymmetry
    (Ieee, 2012) Ozyer, Sibel T.; Tavli, Bulent; Koyuncu, Murat
    In Wireless Sensor Networks (WSNs), link unidirectionality is an unavoidable phenomenon. The existence of unidirectional links can be attributed to several physical factors induced by the transceiver characteristics as well as other environmental phenomena. Transmission power heterogeneity is the dominant paradigm that leads to unidirectionality. In this study, we investigate the effects of transmission power heterogeneity on the lifetime of WSNs through a novel Linear Programming (LP) framework both for networks that utilize only bidirectional links and for those that can use unidirectional links in addition to bidirectional links. Our results show that transmission power heterogeneity can lead to more than 25 % decrease in network lifetime for protocols that can operate only on bidirectional links when compared to a network without any heterogeneity. However, if the use of unidirectional links is also enabled then, the decrease in network lifetime is at most 12 %.
  • Article
    Implementation of the Human Resources Information Systems and Comparative Study of Various Platforms
    (2016) Abdulhakeem Majeed, Zubaidah; Tarıyan Özyer, Sibel
    We are living in an epoch of changes during which highly competitive advantages are always required for quick and effective reactions in any organization. It is expected that the rate of change will increase greatly in the upcoming future along with the high development rate of new technologies. Today’s businesses need either to adapt to these changes or be more innovative to meet these new necessities. In this research, the Human Resources Management (HRM) has been aim to study and especially Human Resources Information System (HRIS) has been studied. In addition, the benefits and constraints of the implementation of a Human Resources Information System (HRIS) on an institution have been discussed in this study. Moreover, HRIS open source software platforms have been investigated and comparative study has been proposed. Selected open source software platform has been designed to implement HRIS to the University of Kirkuk
  • Article
    Remote and Autonomous Controlled Robotic Car based on Arduino with Real Time Obstacle Detection and Avoidance
    (2019) Yılmaz, Esra; Tarıyan Özyer, Sibel
    In robotic car, real time obstacle detection and obstacle avoidance are significant issues. In this study, design and implementation of a robotic car have been presented with regards to hardware, software and communication environments with real time obstacle detection and obstacle avoidance. Arduino platform, android application and Bluetooth technology have been used to implementation of the system. In this paper, robotic car design and application with using sensor programming on a platform has been presented. This robotic device has been developed with the interaction of Android-based device. Arduino Uno has been used as the robot's brain. The robot has many hardware components such as Bluetooth module, PIR sensor, ultrasonic sensor, and buzzers. It also consists of the software component that uses a mobile application. The desired direction or mode by mobile application can be selected by the user of the robotic car to control the movement of the car. The user can control the robot movements from his/her own intelligent device or take the robot in automatic mode and let the car drive its own way. Thus, the robot can flee from the obstacle and also detect live objects. The purpose of this article is to alert the civilian and military personnel to potential terrorist attacks especially in military areas with live detectable sensors.
  • Conference Object
    Unmanned Surface Vehicle Prototype With Obstacle Avoidance System Area: Applications and Evaluation of Real-Time Big Data Systems
    (Association for Computing Machinery, 2019) Al-Tekreeti, M.; Özyer, S.T.; Özdemir, C.; Karadag, A.; Al-Dakheel, S.
    In this paper, Unmanned Surface Vehicles (USV) prototype and system design have been presented for the rescue of human life at sea. The USV will be protected from obstacles that may cause a crash to the USV by avoiding the obstacles using many kinds of detection sensors. All of these sensors send results to Crash Avoidance System (CAS) and to the main computer to control the USV direction depends on the obstacle shape, size or if it is a moving obstacle or not. The sensors that will be used for this purpose are Light Detection and Ranging (LIDAR) sensor, LIDAR-Lite sensors and ultrasonic sensors. All the information that will be collected from all these types of sensors will be used to direct the USV to the safe path. This work is a part of the research and development project which is accepted in Turkey Government with the collaboration of the University and Industry. © 2019 ACM.
  • Article
    Citation - WoS: 5
    Citation - Scopus: 6
    Systematic Investigation of the Effects of Unidirectional Links on the Lifetime of Wireless Sensor Networks
    (Elsevier, 2013) Tavli, Bulent; Dursun, Kayhan; Koyuncu, Murat; Ozyer, Sibel T.
    Link unidirectionality is a commonly encountered phenomenon in wireless sensor networks (WSNs), which is a natural result of various properties of wireless transceivers as well as the environment. Transmission power heterogeneity and random irregularities are important factors that create unidirectional links. Majority of the internode data transfer mechanisms are designed to work on bidirectional links (i.e., due to the lack of a direct reverse path, handshaking cannot be performed between a transmitter and receiver) which render the use of unidirectional links infeasible. Yet, there are some data transfer mechanisms designed specifically to operate on unidirectional links which employ distributed handshaking mechanisms (i.e., instead of using a direct reverse path, a multi-hop reverse path is used for the handshake). In this study, we investigate the impact of both transmission power heterogeneity and random irregularities on the lifetime of WSNs through a novel linear programming (LP) framework both for networks that utilize only bidirectional links and for those that can use bidirectional links as well as unidirectional links. (C) 2013 Elsevier B.V. All rights reserved.
  • Conference Object
    An Rsvp Model for Opnet Simulator With an Integrated Qos Architecture
    (Caltek s.r.l., 2009) Özyer, S.T.; Hassanpour, Reza; Hassanpour, R.; Özyer, Sibel; Yazılım Mühendisliği; Bilgisayar Mühendisliği
    Resource Reservation Protocol (RSVP) allows Internet real-time applications to request a specific end-to-end Quality of service (QoS) for data stream before they start transmitting data. In this paper firstly an overview of RSVP is presented. After that the different quality of services available and the relation between QoS and RSVP have been explained. The fundamentals of RSVP as a protocol is discussed. The performance issues and benchmarking for planned portion architecture at the department of Computer Engineering, Çankaya University has been given next. The experimental results and discussions conclude this paper. In this paper, OPNET network simulation tool has been used. Under given architecture and protocol, performance of quality of service implications has been carried out.