72 sonuçlar
Arama Sonuçları
Listeleniyor 1 - 10 / 72
Yayın Author identification of newspaper columns using style and semantic features(Işık Üniversitesi, 2016-05-17) Yıldız, Ergin Doğan; Solak, Ercan; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıThis study has two major purposes : to implement and compare the author classification results of di erent Naive Bayes Classi ers, and to investigate whether merging individual methods will increase classi cation success or not. The subjects of this study were newspaper columnists. Data was collected from well known public newspapers. This study first investigates Numeric, Nominal, Multinominal NBC, and their various merged versions. We then address each method using cross-validation. The results of the experiments show that merging multiple classi cation methods can increase classifi cation success. Additionally, it depends on how well individual classifi cation models are constructed.Yayın SMS distribution and information system(Işık Üniversitesi, 2003-07) Yüzücü, Haluk; Yarman, Bekir Sıddık Binboğa; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıIn this master's thesis, a web based application software package is developed using a mobile terminal (Siemens M20), for sending SMS message to individuals or groups to disseminate information to cellular-phones. Employing utilizing the S/W developed in this thesis, SMS messages are sent to cell-phones via internet and users will get information using their cell-phone (Eg: for attendance, exam results, seminar days, etc..). Microsoft SQL Server Database is used for storing the user information, incoming and outgoing messages. ASP (Active Server Page) programming language is utilized for web based interface coding. The application software is developed on Siemens M20 mobile terminal device. Mobile communication has become an indispensable parts of everyone's daily life. This project, which has been developed by using SMS service, a branch of mobile communication, aims to enable people to access information with their cell-phones, when there is no internet. With this package institutions will be able to send announcements to groups of individuals as short messages at the same time. Besides these, with the developed web interface, SMS message will be sent only through cell-phones, but through internet as well.Yayın Data access layer code generator(Işık Üniversitesi, 2006) Küçükeren, Gökçe; Kuru, Selahattin; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıLayering techniques are commonly used in order to supply the operational requirements of today's complex enterprise applications. The codes developed for the Data Access Layer (DAL), which is the foundation of most layered applications, increases the time of projects' development phases, and the bugs in these manually written codes makes the data access unreliable. In this thesis, a tool is developed to generate the required codes for DAL. The automatically generated codes using this tool, Data Access Layer Code Generator, decreases the time wasted for DAL development and makes the data access reliable due to their uniform structure. Data Access Layer Code Generator is able to build the foundation of the layered architectures with its user-friendly interfaces integrated on the development platform and with the functionalities provided to the developers.Yayın Graph clustering approach to sentiment analysis(Işık Üniversitesi, 2018-01-24) Kanburoğlu, Ali Buğra; Solak, Ercan; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıIn this thesis, we aim at automatically predicting Turkish movie review scores using adjective clustering. We also measured the reliability of the two popular sentiment lexicons. In order to measure the agreement between these sentiment exicons and human judgments, we designed a ranking experiment using pairwise comparisons. Then, we compared these sentiment lexicons and human judgments, and we gave results that show a moderate level of agreement between lexicons and human judgments. Furthermore, we performed adjective clustering task and singleton scoring to automatically assign scores to Turkish movie reviews. Adjective clustering reached an accuracy of 76%, singleton scoring reached an accuracy of 79%.Yayın Visual obstacle detection and avoidance for indoor mobile robots(Işık Üniversitesi, 2012-09-19) İyidir, İbrahim Kamil; Tek, Faik Boray; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıThis study is a part of a joint team effort to transform a small-scale model car into an autonomous moving robot. This transformation includes several routines that are essential and attached together. Integration of various equipment on the model car is the first step of that routine which is shared among different thesis studies conducted at RAVLAB (Robotics and Autonomous Vehicles Laboratory) of Işık University. Hence. The resulting hardware system which is explained in this thesis is mostly the co-produce of RAVLAB team. The integration is followed by implementing the software required to establish control and communication links between different units. During this thesis, the author has developed a multi-threaded main control software to facilitate obstacle avoiding movements of the robot while reading and analyzing sensory inputs. This thesis study mainly focuses on detection of the obstacles with visual information collected from an ordinary color camera. The main obstacle detection algorithm that is proposed in this thesis is adapted from a powerful background subtraction algorithm ViBe [1] (Visual Background Extractor). The proposed algorithm uses the model of the ground plane in order to detect obstacles. A different ground plane model is kept for each pixel location as in ViBe. The proposed algorithm is robust against illumination differences, shadows and the changes in the appearance of the ground plane. A comparison is provided (using ground trurh data) with another obstacle detection algorithm [2] which also uses a ground plane based model to detect obstacles. The results of the proposed algorithm under different conditions compared to a counterpart. In addition to the obstacle detection, during this study two obstacle avoidance algorithms are developed to facilitate navigation of the robot in indoor environments. The experiments show that the robot is able to move while avoiding obstacles by using ultrasonic sensors as well as using the visual camera input.Yayın Data collection and analysis on vanet(Işık Üniversitesi, 2009-02-01) Karatoy, Hilal; Solak, Ercan; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıThe communication between devices is provided by wireless networks and it is growing rapidly, dependent on the needs. Wireless networks strike the attention of people throughout the world, and the ad hoc network is part of this attention. Ad hoc networks do not need structural mechanisms and are mostly used by the mobile nodes. In ad hoc networks the nodes act as a router and communicate with the other nodes. Ad hoc networks can be used in various places such as campus, shopping centers, buildings and vehicles. Ad hoc network systems without any infrastructure have two kinds of nodes which are mobile and fixed. Actually, node mobility is not taken into account. The aim of this thesis is to find the cheapest way to provide the practical statistical data that will be saved after communication between vehicles depend on road constructing, renewing, development and time schedule of the drivers etc. The data used in the analysis were the route and schedule information of the local city buses. Istanbul Metropolitan Municipality provided the coordinates of the bus stops and time tables for the data collection part. We used MATLAB to edit the data in data analysis part. We used 802.11 standards for the communication of the buses and C++ to create the protocol of data transmission. We wrote Google Earth scripts to observe the data correctness and coded TCL scripts for simulation in NS2 to see and analyze the data transfer between nodes, i.e., the buses. Different ranges of communication are used and analyzed, and their results are shown in this project. To collect more data, thousands of nodes are used, which represent more than 40 bus lines and their paths from different continents including Asia and Europe, which constitute the two sides of Istanbul.Yayın Weighted bipartite crossing minimization applications on biclustering and graph unions(Işık Üniversitesi, 2009-02-03) Sözdinler, Melih; Erten, Cesim; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıBiclustering gene expression data is the problem of extracting submatrices of genes and conditions exhibiting significant correlation across both the rows and the columns of a data matrix of expression values. We provide a method, LEB (Localize-and-Extract Biclusters) which reduces the search space in to local neighborhoods within the matrix by first localizing correlated structures. The localization procedure takes its roots from effective use of graph-theoretical methods applied to problems exhibiting a similar structure to that of biblustering. Once interesting structures are localized the search space reduces to small neighborhoods and the biclusters are extracted from these localities. we evaluate the effectiveness of our method with extensive experiments both using artificial and real datasets. Finally, We also used our crossing minimization heuristics for graph visualization in a layered fashion.Yayın An infrastructure and a methodology for business process management(Işık Üniversitesi, 2006-03) Güçlü, Tuncay Kamil; Kuru, Selahattin; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıThis thesis explains in detail an infrastructure and a methodology for business process management as BPM requires much more of a partnership between business and IT. With the proper methodology the business will get the strategy defined so that IT can create the best infrastructure for the situation. The Infrastructure has been created utilizing the 5 step approach defined in the methodology explained in detail further down in the document. The Infrastructure has been includes a network of Microsoft products such as operating systems, applications and tools. The network is a fully operating small domain of servers and client machines. Once the environment was deployed and ready, an application is created using the Visual Studio .net 2003, as a sample implementation. This infrastructre demonstrates how to implement a BPM solution to any organization using the processes defined in this thesis.Yayın Security analysis of coap and dtls protocols for internet of things applications(Işık Üniversitesi, 2019-08-26) Gürkan, Ali Tunca; Tüysüz Erman, Ayşegül; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıInternet of Things is a very fast growing area. Its requirements and related technologies are changing from day to day. In Internet of Things, devices can communicate with each other with different messaging protocols. The latest messaging protocols are well developed, but they are too heavy to be run on devices developed with old technology. Therefore, these devices have to be operated with old-fashioned protocols. This makes devices vulnerable to security risks. CoAP is a newly developed messaging protocol for constrained devices used in Internet of Things applications. The protocol is a variant of HTTP, so it has similar speci cations. CoAP does not have an embedded security mechanism. Therefore, another protocol called DTLS is used on top of it to provide security. DTLS has powerful functions like handshaking and session processes; however, it is weak against DoS attacks. In this study, we develop a security extension for Internet of Things devices using CoAP with DTLS for secure messaging. DTLS applies handshaking process for every received request. The handshaking process is the most time and resource consuming part of the communication. We propose a security extension to prevent unnecessary messaging during handshaking process of an attacker device that sends a lot of unauthenticated requests. When a client sends requests to a server that has the proposed security extension, the server counts unsuccessful handshaking processes for each client. If the count passes a limit of suspicious requests, the security extension on server adds the client's IP address into a banned IPs list. Until the expiration time, the server does not accept any request from the banned IP address. Our proposed security extension is tested in different scenarios to examine the effects on the network. The results of the experiments show that the enhanced security extension decreases delays on the network and it is helpful for communication between authenticated devices.Yayın Modeling a mobile value added services platform(Işık Üniversitesi, 2002-06) Okutan, Ahmet; Yarman, Bekir Sıddık Binboğa; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans ProgramıMobility is one of the new concepts has changed the way that people are accessing information. It is known that mobile phones can be used for more than just making phone calls. With the new generation mobile phones, mobile users can access a lot of Mobile Value Added Services (VAS). The term Value Added Services incorporates a lot of services ranging from popular information services like currency or weather information to entertainment services like multimedia messaging, logo, melody and picture message services. That is to say, a cellular phone owner can both request daily news, weather or horoscope information and can download multimedia messages, melodies, logos and picture messages to his mobile phone by sending a specific request message via SMS. In the meantime, Value Added Services Platforms utilize the GSM Operator's Short Message Service Centers, to provide Value Added Services to mobile phone users via SMS. Although the majority of Value Added Services are being provided via SMS, WAP and GPRS are other technologies that are utilized by VAS platforms. On the other hand, as the internet is making is possible to publish information content vie World Wide Web (www), mobile phones are becoming more and more popular to provide this information content to people who are mobile. So, in this context, VAS platforms are acting as mediums to provide infotainment to mobile subscribes from the web. This study models the technical features of sample Value Added Services Platform that works over SMS. The main system components of this modeled Value Added Service Platform are explained in detail. The important issues that needs special handling are described for each system component. Moreover, a research is made regarding the smart messaging which is one of the most important parts of VAS. For this, Nokia Smart Messaging Speciation, Nokia Multimedia Messaging Specifiation (MMS) and Enhanced Messaging Specifiation (EMS) are examined in detail. The modeled VAS Platform supports Nokia Smart Messaging Specification. Additionally it can support MMS and EMS if necessary software modules are implemented. So, the implemented software platform can send melodies, logos and picture messages can be requested by sending corresponding keywords for each service via SMS. In the remaining parts of the document, the word Platform will be used in stead of Value Added Services Platform (VASP) modeled in this study.












