Institutional Repository

Browsing Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering by Issue Date

Browsing Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering by Issue Date

Sort by: Order: Results:

  • Önkol, Mert (TOBB Ekonomi ve Teknoloji Üniversitesi - Fen Bilimleri Enstitüsü - Elektrik-Elektronik Mühendisliği Anabilim Dalı - Kontrol ve Otomasyon Mühendisliği Bilim Dalı, 2010)
    Bu tez çalışması dönerkanat tipinde bir insansız hava aracının modellenmesini, tasarımını ve kontrolünü ele almaktadır. Dönerkanat dinamik modeli Newton-Euler yöntemi yardımıyla türetilmiş ve model katsayıları gerçek zamanlı ...
  • Tekin, Salih; Andradottir, Sigrun; Down, Douglas G. (Springer, 2012-01)
    This paper is concerned with the dynamic assignment of servers to tasks in queueing networks where demand may exceed the capacity for service. The objective is to maximize the system throughput. We use fluid limit analysis ...
  • Sae-Bae, Napa; Sun, Xiaoxi; Sencar, Hüsrev Taha; Memon, Nasir D. (IEEE, 2014)
    This paper presents a child pornographic image detection system that identifies human skin tones in digital images, extracts features to detect explicit images and performs facial image based age classification. The novelty ...
  • Cotuk, Huseyin; Tavlı, Bülent; Bıçakçı, Kemal; Akgun, Mehmet Burak (IEEE, 2014)
    Optimization of flows to maximize Wireless Sensor Network (WSN) lifetime is a problem already investigated in various aspects. However, most studies ignored the effects of finite bandwidth. As source data rate of sensor ...
  • Yildiz, Huseyin Ugur; Bıçakçı, Kemal; Tavlı, Bülent (IEEE, 2014)
    In wireless sensor networks, nodes having limited battery resources convey data to an energy-unconstrained base station. The amount of data transmitted by a node usually depends on how much local processing is performed. ...
  • Sirin, Yahya; Demirci, Muhammed Fatih (IEEE Computer SOC, 2014)
    As an increasing number of digital images are generated, a demand for an efficient and effective image retrieval mechanisms grows. In this work, we present a new skeleton-based shape retrieval algorithm, which starts by ...
  • Tan, Mehmet (IEEE, 2014)
    Cancer cell lines comprise an important tool to design and evaluate new drug candidates. Prediction of in vivo drug response for cancer cell lines has become attractive due to recently issued large scale drug screen ...
  • Uzunay, Yusuf; Bıçakçı, Kemal (IEEE, 2014)
    The main goal in the design of ThreeBallot system was to provide an end-to-end auditable voting system in a simple way without use of cryptography to bolster voter confidence in the system. However, later it was shown that ...
  • Sahin, Ugur; Özbayoğlu, Ahmet Murat (ELSEVIER Science BV, 2014)
    RSI is a commonly used indicator preferred by stock traders. However, even though it works well when the market is trendless, during bull or bear market conditions (when there is a clear trend) its performance degrades. ...
  • Cavus, Mustafa; Sumerkan, Hakki Doganer; Simsek, Osman Seckin; Hassan, Hasan; Yaglikci, Abdullah Giray; Ergin, Oğuz (IEEE, 2014)
    Embedded image processing systems have many challenges, due to large computational requirements and other physical, power, and environmental constraints. However recent contemporary mobile devices include a graphical ...
  • Sadigh, B. Lotfi; Arikan, F.; Özbayoğlu, Ahmet Murat; Ünver, Hakkı Özgür; Kilic, S. E. (ELSEVIER Science BV, 2014)
    Virtual Enterprise (VE) is a collaboration model between multiple business partners in a value chain. VE information system deals with highly dynamic information from heterogeneous data sources. In order to manage and store ...
  • Dogdu, Erdogan; Özbayoğlu, Ahmet Murat; Benli, Okan; Akinc, Hulya Erdener; Erol, Erdeniz; Atasoy, Tugrul; Gurec, Ozan; Ercin, Ozden (IEEE, 2014)
    Conventional electricity distribution grids are getting smarter by coupling operation technologies with advanced information and communication technologies (ICT). This provides a better, reliable, cost effective and efficient ...
  • Çaşkurlu, Buğra; Mkrtchyan, V.; Parekh, O; Subramani, K. (Springer Verlag, 2014)
    Graphs are often used to model risk management in various systems. Particularly, Caskurlu et al. in [6] have considered a system which essentially represents a tripartite graph. The goal in this model is to reduce the ...
  • Bıçakçı, Kemal; Unal, Devrim; Ascioglu, Nadir; Adalier, Oktay (ELSEVIER Science BV, 2014)
    Current mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle ...
  • Sirin, Yahya; Demirci, Muhammed Fatih (IEEE, 2014)
    As an increasing number of digital images are generated, a demand for an efficient and effective image retrieval mechanisms grows. In this work, we present a new skeleton-based shape retrieval algorithm, which starts by ...
  • Yalcin, Gulay; Islek, Emrah; Tozu, Oyku; Reviriego, Pedro; Crista, Adrian; Unsall, Osman S.; Ergin, Oğuz (IEEE, 2014)
    Scaling supply voltage to near-threshold is a very effective approach in reducing the energy consumption of computer systems. However, executing below the safe operation margin of supply voltage introduces high number of ...
  • Abul, Osman (SPRINGER, 2014)
    In this paper we study the problem of anonymity in multi-instance (MI) micro-data publication. The classical k-anonymity approach is shown to be insufficient and/or inappropriate for MI databases. Thus, it is extended to ...
  • Kul, Gokhan; Özyer, Tansel; Tavlı, Bülent (ELSEVIER Science BV, 2014)
    Indoor positioning has emerged as a hot topic that gained gradual interest from both academia and industry. Accurate estimation is necessitated in a variety of location-based services such as healthcare, repository tracking, ...
  • Pancaroglu, Doruk; Tan, Mehmet (SPRINGER-Verlag Berlin, 2014)
    In binary classification, it is sometimes difficult to label two training samples as negative. The aforementioned difficulty in obtaining true negative samples created a need for learning algorithms which does not use ...
  • Adalı, Selim Ferruh; Demirci, Muhammed Fatih; Özbayoğlu, Ahmet Murat; Ergin, Oğuz (2014)
    This article is a study of the ancient Mesopotamian literary text known as the 'Cuthaean Legend'. This Naram-Sin legend is known from several versions in the extant cuneiform corpus of texts (Westenholz 1997). The names ...