Arama Sonuçları

Listeleniyor 1 - 3 / 3
  • Yayın
    Discovering cis-regulatory modules by optimizing barbecues
    (Elsevier Science Bv, 2009-05-28) Mosig, Axel; Bıyıkoğlu, Türker; Prohaska, Sonja J.; Stadler, Peter F.
    Gene expression in eukaryotic cells is regulated by a complex network of interactions, in which transcription factors and their binding sites on the genomic DNA play a determining role. As transcription factors rarely, if ever, act in isolation, binding sites of interacting factors are typically arranged in close proximity forming so-called cis-regulatory modules. Even when the individual binding sites are known, module discovery remains a hard combinatorial problem, which we formalize here as the Best Barbecue Problem. It asks for simultaneously stabbing a maximum number of differently colored intervals from K arrangements of colored intervals. This geometric problem turns out to be an elementary, yet previously unstudied combinatorial optimization problem of detecting common edges in a family of hypergraphs, a decision version of which we show here to be NP-complete. Due to its relevance in biological applications, we propose algorithmic variations that are suitable for the analysis of real data sets comprising either many sequences or many binding sites. Being based on set systems induced by interval arrangements, our problem setting generalizes to discovering patterns of co-localized itemsets in non-sequential objects that consist of corresponding arrangements or induce set systems of co-localized items. In fact, our optimization problem is a generalization of the popular concept of frequent itemset mining.
  • Yayın
    Risk scalable and modular security architectures
    (Işık Üniversitesi, 2005-04) Kunter, Ünal; Koç, Çetin Kaya; Işık Üniversitesi, Fen Bilimleri Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans Programı
    Network security is ensuring the availability, the integrity and the confidentiality in the business activities. Network security is not only limiting acess to the resources; İt is mainly structring the acess to the match the business needs and ensure the availability of the resources. To demonstrate these principals, the deployment of a secure environment for different enterprises level companies will be examined. In this thesis, the acess requirement and restriction for the different group of security infrastructeres will be examined. The business operation will be detailed as well as the priority of the resources in terms of business interest in order to design a network that match the business model. An overview of the security layers will be shown. The intent is to demonstrate that no designs are perfect and may not resist to some type of attacks. In order to optimize the cost on security, the assets under risk should be taken into consideration. The case studies mentioned in the thesis vary from simple ones to more complicated ones. That is strongly related to what you store in databases. In all the cases it is considered that database is the core business and should be protected. Both inward and outward traffic should be under control in order to by-pass the attacks. There is never perfect security, but increasing the security for a small amount will result a bigger prevention against attacks
  • Yayın
    Computational design tools in architectural education
    (Get It Published, 2018-05) Karadağ, Derya; Bolca, Pelin
    Architecture is a discipline that continuously produces information through research in the field of education and professional practice. This process of ‘knowledge generation’ is also influenced significantly by the act of developing new technology and digital tools as well as by an interdisciplinary approach to architecture. In the framework of digital technologies, ‘Computational design’ provides an innovative alternative to design researches. This method makes it possible to design innovative forms and building systems based on environmental data and also helps us understand the architectural/historical outcomes within a different perspective by using digital tools. These tools are also useful for obtaining and processing the data gathered from direct and indirect sources. According to architectural design ontology, the cognitive process of design is defined by the interaction between the designer and the phenomenon or artefact that she is working on. This interaction is explained by a loop system consisting of the phases of designer’s perception and her decision of intervention. The loop system can be done in a logical way only if the data is processed correctly in a controllable way by the designer. Computational design methods make it possible to achieve this goal and to control the outcomes by different parameters provided by its dataset. Digital tools influence today’s architecture, from the design process to investigating materials and from collecting environmental data to understanding relevant sources. Thus, this method makes the designer think in a more integrated framework with simulation, visualization and the spatialization of outcomes. The reflection of this interaction in architectural education is inevitable. Besides, in architectural education, analysis-oriented design studies that are compatible with the built and natural environment are essential phases. But, such studies can only be possible with a holistic view. An architectural education based on this method allows us to understand the qualitative and quantitative results of a design process. In other words, such studies in architectural education give the future architects the possibility to design with a holistic view. In short, the aim of this paper is twofold; the first one is to introduce the ‘Computational Design’ as a methodology. And the second one is to investigate the pros and cons of this methodology on the architectural education.