Institutional Repository

Browsing Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering by Submit Date

Browsing Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering by Submit Date

Sort by: Order: Results:

  • Önkol, Mert (TOBB Ekonomi ve Teknoloji Üniversitesi - Fen Bilimleri Enstitüsü - Elektrik-Elektronik Mühendisliği Anabilim Dalı - Kontrol ve Otomasyon Mühendisliği Bilim Dalı, 2010)
    Bu tez çalışması dönerkanat tipinde bir insansız hava aracının modellenmesini, tasarımını ve kontrolünü ele almaktadır. Dönerkanat dinamik modeli Newton-Euler yöntemi yardımıyla türetilmiş ve model katsayıları gerçek zamanlı ...
  • Abul, Osman; Bayrak, Cansın (Springer London, 2018-09-01)
    Location privacy is extensively studied in the context of location-based services (LBSs). Typically, users are assigned a location privacy profile and the precise locations are cloaked so that the privacy profile is not ...
  • Kim, Jeremie S.; Senol Cali, Damla; Xin, Hongyi; Lee, Donghyuk; Ghose, Saugata; Alser, Mohammed; Hassan, Hasan; Ergin, Oğuz; Alkan, Can; Mutlu, Onur (BioMed Central Ltd., 2018-05-09)
    Background: Seed location filtering is critical in DNA read mapping, a process where billions of DNA fragments (reads) sampled from a donor are mapped onto a reference genome to identify genomic variants of the donor. ...
  • Martinez, Jorge A.; Atamaner, Mert; Reviriego, Pedro; Ergin, Oğuz; Ottavi, Marco (Elsevier Ltd., 2018-07)
    Bit flips on instructions may affect the execution of the processor depending on the Instruction Set Architecture (ISA) and the location of the flipped bits. Intrinsically, ISAs may detect bit upsets if the errors on the ...
  • Balli, Muhammed Faith; Uludağ, Süleyman; Selçuk, Ali Aydın; Tavlı, Bülent (Institute of Electrical and Electronics Engineers Inc., 2018-09)
    The stringent requirement of the demand-supply equilibrium for delivering electricity has traditionally been dealt with a supply-side perspective, assuming that the demand is not alterable. With the promises of the smart ...
  • Özsoy, Makbule Gülçin; Özyer, Tansel; Polat, Faruk; Alhajj, Reda (BioMed Central Ltd., 2018-04-12)
    Background: Drug repositioning is the process of identifying new targets for known drugs. It can be used to overcome problems associated with traditional drug discovery by adapting existing drugs to treat new discovered ...
  • Çaşkurlu, Buğra; Williamson, Matthew; Subramani, Kiruba Sankaran; Mkrtchyan, Vahan (Springer New York LLC, 2018-07-01)
    This paper is concerned with the design and analysis of approximation algorithms for the problem of determining the least weight refutation in a weighted difference constraint system. Recall that a difference constraint ...
  • Ciftler, Bekir Sait; Yıldız, Hüseyin Uğur; Tavlı, Bülent; Bıçakçı, Kemal; Incebacak, Davut (Institute of Electrical and Electronics Engineers Inc., 2018-03)
    Key predistribution schemes accommodate secure connectivity by establishing pairwise keys between nodes. However, ensuring security for all communication links of a wireless sensor network (WSN) is nontrivial due to the ...
  • Yüce, Emre; Selçuk, Ali Aydın (Institution of Engineering and Technology, 2018-09-01)
    Secure socket layer/transport layer security (TLS) is the de facto protocol for providing secure communications over the Internet. It relies on the web PKI model for authentication and secure key exchange. Despite its ...
  • Sezer, Ömer Berat; Özbayoglu, Ahmet Murat (Elsevier Ltd, 2018-09)
    Computational intelligence techniques for financial trading systems have always been quite popular. In the last decade, deep learning models start getting more attention, especially within the image processing community. ...
  • Seyfioğlu, Mehmet Saygın; Özbayoğlu, Ahmet Murat; Gürbüz, Sevgi Zübeyde (IEEE, 2018-08)
    Radar-based activity recognition is a problem that has been of great interest due to applications such as border control and security, pedestrian identification for automotive safety, and remote health monitoring. This ...
  • Özbayoǧlu, Mehmet Evren; Erge, Oney; Özbayoǧlu, Ahmet Murat (Elsevier Sci Ltd, 2018-08)
    The prediction of equivalent circulating density in realistic conditions is complex due to many parameters in effect. Drillstring configuration and motion can play a significant role on the pressure profile in the annulus. ...
  • Sezer, Ömer Berat; Doǧdu, Erdoǧan; Özbayoǧlu, Ahmet Murat (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2018-02)
    Internet of Things (IoT) has been growing rapidly due to recent advancements in communications and sensor technologies. Meanwhile, with this revolutionary transformation, researchers, implementers, deployers, and users are ...
  • Gerede, Çağdaş Evren; Mazan, Zeki (Turkiye Klinikleri Journal of Medical Sciences, 2018-05-30)
    It has been observed that allowing source code changes to be made only after source code reviews has a positive impact on the quality and lifetime of the resulting software. In some cases, code review processes take quite ...
  • Ceylan, Doğa; Güdelek, Mehmet Uğur; Keyşan, Ozan (Institute of Electrical and Electronics Engineers Inc., 2018-10)
    Barrel and pulsed power supply modules are two crucial parts of an electromagnetic launcher (EML), in terms of overall efficiency. One of the most important features of the barrel side is the armature geometry. In this ...
  • Yılmaz, Murat; Tasel, Faris Serdar; Güleç, Ulaş; Sopaoǧlu, Uǧur (Public Library of Science, 2018-11)
    Graduation projects play an important role in computer engineering careers in which students are expected to draw upon their knowledge and skills that were acquired since admission. To manage the activities of graduation ...
  • Ersoy, Oguzhan; Pedersen, Thomas Brochmann; Kaya, Kamer; Selçuk, Ali Aydın; Anarim, Emin (Wiley-blackwell, 2016-11-25)
    For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret or when the secret domain is small enough for a brute-force attack by a powerful adversary. Unfortunately, all the Chinese ...
  • Narang, Pratik; Hota, Chittaranjan; Sencar, Hüsrev Taha (Elsevier, 2016-12-15)
    The problem of detection of malicious network traffic is adversarial in nature. Accurate detection of stealthy Peer-to-Peer botnets is an ongoing research problem. Past research on detection of P2P botnets has frequently ...
  • Bayram, Sevinc; Sencar, Hüsrev Taha; Memon, Nasir (IEEE-INST Electrical Electronics Engineers Inc., 2015-03)
    The photo response non-uniformity noise associated with an imaging sensor has been shown to be a unique and persistent identifier that can be treated as the sensor's digital fingerprint. The method for attributing an image ...
  • Bıçakçı, Kemal; Kiziloz, Hakan Ezgi (Academic press ltd.Elsevier Science ltd., 2016-08)
    Even though purely text-based Human Interaction Proofs (HIPS) have desirable usability and accessibility attributes; they could not overcome the security problems yet. Given the fact that fully automated techniques to ...