Browsing by Department "İYTE, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü"
Now showing items 21-40 of 112
-
Comparison of group key establishment protocols
(TÜBİTAK, 2017)Recently group-oriented applications over unsecure open networks such as Internet or wireless networks have become very popular. Thus, group communication security over unsecure open networks has become a vital concern. ... -
Comparison of two association rule mining algorithms without candidate generation
(IASTED, 2010)Association rule mining techniques play an important role in data mining research where the aim is to find interesting correlations among sets of items in databases. Although the Apriori algorithm of association rule mining ... -
COMPSAC 2016 Symposium on Technologies and Applications of the Internet (TAIN): Message from the Program Co-chairs
(IEEE, 2016-08)It is our pleasure to welcome you to COMPSAC 2016 Symposium on Technologies and Applications of the Internet (TAIN). Our Symposium provides a forum to share latest innovations on Internet technologies and applications, ... -
Çevik yazılım geliştirmede BDD/TDD yöntemlerinin ve yazılım kalite araçlarının kullanılması: Bir yazılım mühendisliği dersindeki tecrübe
(CEUR Workshop Proceedings, 2016)Çevik yazılım geliştirme modeli iyi uygulandığında, yazılım proje yönetimini, yazılım takım elemanları arasındaki iletişimi ve yazılım geliştirme süreçlerini ve süresini iyileştirmektedir. Çevik yazılım geliştirme modelinde, ... -
Design of a secure microprocessor
(2010-05)This work presents the prototype design of a secure microprocessor that executes encrypted programs. The aim of such a secure processor is to prevent programs from being copied; otherwise the encrypted programs will not ... -
Detection and classification of vehicles from omnidirectional videos using multiple silhouettes
(Springer, 2017-08)To detect and classify vehicles in omnidirectional videos, we propose an approach based on the shape (silhouette) of the moving object obtained by background subtraction. Different from other shape-based classification ... -
Detection and classification of vehicles from omnidirectional videos using temporal average of silhouettes
(INSTICC, 2015)This paper describes an approach to detect and classify vehicles in omnidirectional videos. The proposed classification method is based on the shape (silhouette) of the detected moving object obtained by background ... -
Developing applications on-board of robots with becerik
(Trans Tech Publications, 2012)Robot applications are mostly first developed on a computer and thereafter loaded onto the robot. However, in many situations, developing applications directly on the robot may be more effective. For instance, children who ... -
A Direct approach for human detection with catadioptric omnidirectional cameras
(IEEE, 2014)This paper presents an omnidirectional vision based solution to detect human beings. We first go through the conventional sliding window approaches for human detection. Then, we describe how the feature extraction step of ... -
A direct approach for object detection with catadioptric omnidirectional cameras
(Springer, 2016-02-01)In this paper, we present an omnidirectional vision-based method for object detection. We first adopt the conventional camera approach that uses sliding windows and histogram of oriented gradients (HOG) features. Then, we ... -
A distributed wakening based target tracking protocol for wireless sensor networks
(IEEE, 2010)We propose a two layer protocol for tracking fast targets in sensor networks. At the lower layer, the Distributed Spanning Tree Algorithm (DSTA) [12] partitions the network into clusters with controllable diameter and ... -
Düşük sükroz derişimlerinin görünür bölge spektroskopisi ve yapay sinir ağları ile kestirimi
(IEEE, 2017)Çalışmamızda, immobilize altın nanoparçacıkların lokalize plazmon rezonans özelliği kullanılarak görünür bölge spektroskopisi ile düşük sükroz derişimli çözeltilerde hassas derişim kestirimi amaçlanmıştır. Elde edilen ... -
Dynamic replication strategies in data grid systems: a survey
(Springer, 2015-11)In data grid systems, data replication aims to increase availability, fault tolerance, load balancing and scalability while reducing bandwidth consumption, and job execution time. Several classification schemes for data ... -
Effect of bayesian student modeling on academic achievement in foreign language teaching (university level english preparatory school example)
(Educational Consultancy and Research Center, 2014)Considering the increasing importance of adaptive approaches in CALL systems, this study implemented a machine learning based student modeling middleware with Bayesian networks. The profiling approach of the student modeling ... -
Effort estimation for agile software development: Comparative case studies using COSMIC functional size measurement and story points
(Association for Computing Machinery, 2017)Agile methodologies have gained significant popularity among software development organizations during the last decade. Although agile methodologies are regarded as minimizing formal processes, they still utilize an ... -
Effort estimation methods for ERP projects based on function points: A case study
(Association for Computing Machinery, 2017)Enterprise Resource Planning (ERP) Systems evolve at a rapid pace based on customer and industry expectations. As a result, historic project data for these kinds of projects lose their value especially for analogy based ... -
Ensuring performance and provider profit through data replication in cloud systems
(Springer, 2017-12-14)Cloud computing is a relatively recent computing paradigm that is often the answer for dealing with large amounts of data. Tenants expect the cloud providers to keep supplying an agreed upon quality of service, while cloud ... -
Exploiting model morphology for event-based testing
(IEEE, 2015-02-01)Model-based testing employs models for testing. Model-based mutation testing (MBMT) additionally involves fault models, called mutants, by applying mutation operators to the original model. A problem encountered with MBMT ... -
An exploratory study on usage of process mining in agile software development
(Springer, 2017)Agile software development methods have become popular in the software development field during the last decade. Majority of software organizations develop or claim to develop software based on agile methods. Process mining ... -
Fault domain-based testing in imperfect situations: a heuristic approach and case studies
(Springer, 2015-09)Model-based testing (MBT) involves creating an abstraction, called a model, to represent the system and automatically deriving test cases from this model. MBT can be performed using various approaches that generally employ ...