2024-03-29T06:45:09Zhttp://i-rep.emu.edu.tr:8080/oai/request
oai:i-rep.emu.edu.tr:11129/562013-02-22T06:51:49Zhdl_11129_11
EMU I-REP
author
Azhari, Mohammad
2012-11-29T12:09:22Z
2012-11-29T12:09:22Z
2011
Azhari, Mohammad. (2011). A CUDA based Parallel Implementation of Speaker Verification System. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/56
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2011. Supervisor: Assist. Prof. Dr. Cem Ergün.
ABSTRACT: Speaker Verification (SV) is a type of speaker recognition that validates the identity of a claimed person by his/her voice. Training the models from large speech data requires a significant amount of memory and computational load. In this thesis we present a parallel implementation of speaker verification system based on Gaussian Mixture Modeling – Universal Background Modeling (GMM – UBM) designed for many-core architecture of NVIDIA’s Graphics Processing Units (GPU) using CUDA single instruction multiple threads (SIMT) model. CUDA implementation of these algorithms is designed in such a way that the speed of computation of the algorithm increases with number of GPU cores. In our experiments we have achieved 30 times speedup for k-means clustering and 65 times speedup for Expectation Maximization (EM) for an input of about 350K frames of 16 dimensions and 1024-2048 mixtures on GeForce GTX 570 (NVIDIA Fermi Series) with 480 cores when compared to a single threaded implementation on the traditional CPU. Keywords: Speaker Verification, Gaussian Mixture Models, Parallel Computing, Compute Unified Device Architecture, General-purpose computing on graphics processing units. ……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Konuşmacı tanıma işlemlerinden olan konuşmacı doğrulama sisteminde iddia edilen konuşmacının sesinin doğruluğu onaylanır. Konuşmacıların modelleri eğitilirken önemli miktarda bellek ve işlem yükü gerektirir. Bu tezde biz konuşmacı dogrulama sistemini Gauss Karışım Modeli- Evrensel Arkaplan Modelleme tekniği (UBM-GMM) kullanılarak eğittik. Eğitim aşmasını hızlandırmak için seçilen paralel uygulama modeli CUDA teknolojili, tek komutlu çok izgeli (SIMT) işlemci sistemini destekleyen ve çoklu çekirdek desteği olan NVIDIA Grafik İşleme Üniteleri (GPU) kullanılarak gerçekleştirilmiştir. CUDA kullanılarak tasarlanan uygulamarın hesaplama hızı, GPU daki çekirdek sayısına bağlı olarak artmaktadır. Deneysel sonuçlara göre, 350K penceresi ve 16 boyutu olan öznitelik vektörleri k-ortalamala kümeleme algoritmasının paralelleştirilmesi ile elde edilen hızlanma faktörü 65 kat, aynı sayıda öznitelik vektörlerinin 2048 karışımlı GMM datasının Enbüyütme Beklentisi Algoritmasına sokulmasıyla elde edilen hızlanma faktörü 65 kat olarak gerçekleşmiştir.
Anahtar Kelimeler: Konuşmacı Doğrulama, Gauss Karışım Modelleri, Paralel Hesaplama, Hesap Birleşik Aygıt Mimarisi, Grafik İşleme Ünitelerinde Genel-Amaçlı Hesapla.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Automatic speech recognition
Speaker Identification
Speaker Verification - Gaussian Mixture Models - Parallel Computing
Compute Unified Device Architecture
General Purpose Computing on Graphics Processing Units
A CUDA based Parallel Implementation of Speaker Verification System
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F56/3/Azhari.pdf.txt
File
MD5
f5d42e56d24323fe3e0dc2476899aed7
68465
text/plain
Azhari.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F56/1/Azhari.pdf
File
MD5
d06da0819e0caf5d0d7b79b069e4fcff
888313
application/pdf
Azhari.pdf
oai:i-rep.emu.edu.tr:11129/722012-12-25T13:38:43Zhdl_11129_11
EMU I-REP
author
Ibrahim, Abdullahi Abdu
2012-11-30T07:24:26Z
2012-11-30T07:24:26Z
2011
Ibrahim, Abdullahi Abdu. (2011). Adaptive Energy-Aware Transmission Scheme for Wireless Sensor Networks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/72
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2011. Supervisor: Assoc. Prof. Dr. Muhammed Salamah.
A Wireless Sensor Network is composed of a large number of sensor nodes that are
densely deployed either inside a phenomenon or very close to it [1]. A WSN enables
wide range of applications; as a result it is receiving increasing research interest. The
main challenge to researchers in the field of WSNs is to maintain a useful network
lifetime under constrains imposed on the limited energy reserves that are inherent in
the small, locally-powered sensor nodes. This research addresses this challenge
through the development and evaluation of an information control, energy
management and, transmission range adaptation algorithm which leads to an
increased network lifetime.
The contribution of this research is the development of an AIRT (Adaptive
Information managed energy-aware algorithm for sensor networks with Rule
managed reporting and Transmission Range Adjustments) or AIRT. The AIRT
scheme increases the network lifetime at the possible sacrifices of often trivial data
and further increase network lifetime through adapting transmission ranges based on
nodes energy reserve level and message importance. The wireless sensor network
environment was simulated using C Programming Language, where several runs of
the simulation were performed in other to get reliable performance results. The
performance results showed the advantage of the proposed AIRT scheme. Two
different set of network statistics were measured; nodes energy resource depletion
time and network connectivity. The results of each statistics of our technique were
compared to the results of the statistics of similar works of recent researchers and our
results show a significant improvement in network lifetime and connectivity (though
not the focus of this research)
en
Eastern Mediterranean University (EMU)
Computer Engineering
Sensor networks
Wireless communication systems
Energy-Aware - Wireless Sensor Networks - Adaptive Transmission Ranges - Priority Balancing
Adaptive Energy-Aware Transmission Scheme for Wireless Sensor Networks
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F72/3/Abdu.pdf.txt
File
MD5
a43490f7592ae6558bffd5cf4aee31e4
136708
text/plain
Abdu.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F72/1/Abdu.pdf
File
MD5
c3d7be253dc38cbb2f63b338411181d7
5423433
application/pdf
Abdu.pdf
oai:i-rep.emu.edu.tr:11129/742012-12-25T13:41:03Zhdl_11129_11
EMU I-REP
author
Mirzaei, Fatemeh
2012-11-30T08:07:29Z
2012-11-30T08:07:29Z
2011
Mirzaei, Fatemeh. (2011). Age classification using Facial Feature Extraction. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/74
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2011. Supervisor: Assist. Prof. Dr. Önsen Toygar.
This thesis presents age classification on facial images using Local Binary Patterns
(LBP) and modular Principal Component Analysis (mPCA) as subpattern-based
approaches and holistic Principal Component Analysis (PCA) and holistic subspace
Linear Discriminant Analysis (ssLDA) methods. Classification of age intervals are
conducted separately on female and male facial images since the aging process for
female and male is different for human beings in real life. The age classification
performance of the holistic approaches is compared with the performance of
subpattern-based LBP and mPCA approaches in order to demonstrate the
performance differences between these two types of approaches. Our work has been
tested on two aging databases namely FGNET and MORPH. The experiments are
performed on these aging databases to demonstrate the age classification
performance on female and male facial images of human beings using subpatternbased
LBP method with several parameter settings. The results are then compared
with the results of age classification using mPCA method, holistic PCA and subspace
LDA methods.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Age Classification - Local Binary Patterns - Modular Principal Principal Component Analysis
Subspace Linear Discriminant
Human Face Recognition (Computer Science)
Face Recognition - Computer Vision
Age Classification using Facial Feature Extraction
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F74/3/Mirzaei.pdf.txt
File
MD5
6ef1da63134002338a69efdecd29fb06
101322
text/plain
Mirzaei.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F74/1/Mirzaei.pdf
File
MD5
f2ef8563db8ab1a118499630299fe3f3
6183167
application/pdf
Mirzaei.pdf
oai:i-rep.emu.edu.tr:11129/842012-12-25T13:46:56Zhdl_11129_11
EMU I-REP
author
Sherinov, Zhavat
2012-11-30T11:10:02Z
2012-11-30T11:10:02Z
2011
Sherinov, Zhavat. (2011). An Evolutionary Multi-Objective Approach for Fuzzy Vehicle Routing Problem. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/84
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2011. Supervisor: Assist. Prof. Dr. Ahmet Ünveren.
In this thesis, Evolutionary Multi-objective Optimization Algorithm for
solving Fuzzy Vehicle Routing Problem (FVRP) is described. FVRP is an extension
of VRP with Time Windows, which is one of the variants of VRP. In addition to
FVRP, Multiple Depot VRP (MDVRP) is used in solving the problem. So, the
proposed work and the solution approach is a Fuzzy Multiple Depot VRP
(FMDVRP). The objectives that are to be optimized in this solution approach are the
minimization of: total travelled distance by vehicles, waiting time of vehicles and
customers, and maximization of: load capacity of vehicles and service satisfaction of
customers.
NSGA-II is a multi-objective optimization algorithm that is used for
problems with several objectives to be optimized. In NSGA-II, there is population,
which is initialized randomly, and then through several generations a new population
is generated from the previous one, and the best of these populations are chosen. The
typical genetic operators are applied for generating new population. In addition,
NSGA-II uses a new parameter called crowding distance, which is used for better
divergence.
In experimental results, benchmark problem instances classified by
geographical distribution of customers are used in order to compare the results
obtained with others. From the results, it is observed that the proposed solution
minimizes the waiting time of vehicles by 30% more than the proposed solutions of
other researchers.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Fuzzy Logic - Multi-objective Evolutionary Algorithms - Vehicle Routing Problems
An Evolutionary Multi-Objective Approach for Fuzzy Vehicle Routing Problem
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F84/3/Sherinov.pdf.txt
File
MD5
ef84baeaf126ec36036e2e2b7f21d990
106351
text/plain
Sherinov.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F84/1/Sherinov.pdf
File
MD5
b6a939ba2fbac6e68f575865b600de9f
840317
application/pdf
Sherinov.pdf
oai:i-rep.emu.edu.tr:11129/872012-12-25T13:49:09Zhdl_11129_11
EMU I-REP
author
Almassian, Amin
2012-11-30T11:44:50Z
2012-11-30T11:44:50Z
2010
Almassian, Amin. (2010). An Investigation into the Dissipative Stochastic Mechanics Based Neuron Model under Time Varying Input Currents. Thesis (M.S.)--Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/87
Master of Science in Computer Engineering. Thesis (M.S.), Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2010. Supervisor: Prof. Dr. Marifi Güler.
Led by the presence of a multiple number of gates in an ion channel, it was recently predicted that the equations of activity for the neuronal dynamics acquire some renormalization terms which play a significant role in the dynamics for smaller membrane sizes (Güler 2006, 2007, 2008). In this Thesis, we examine the resultant computational neuron model, from the above approach, in the case of time varying input currents. In particular, we focus on what role the renormalization terms might be playing in the signal-to-noise ratio values. Our investigation reveals that the presence of renormalization terms somehow enhances the signal-to-noise ratio.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Ion Channel Noise - Stochastic Ion Channels - Neuronal Dynamic - Signal-to-Noise Ratio
Stochastic Resonance - Rose-Hindmarsh Model
An Investigation into the Dissipative Stochastic Mechanics Based Neuron Model under Time Varying Input Currents
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F87/3/Almassian.pdf.txt
File
MD5
8c12fbb893145becd1eac159f96c0d2b
57556
text/plain
Almassian.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F87/1/Almassian.pdf
File
MD5
4de7fd92cf4711fcacd23e7c18973594
1128869
application/pdf
Almassian.pdf
oai:i-rep.emu.edu.tr:11129/902012-12-25T13:51:41Zhdl_11129_11
EMU I-REP
author
Dalgıçoğlu, Selin
2012-11-30T12:15:29Z
2012-11-30T12:15:29Z
2011
Dalgicoglu, Selin. (2011). An Online Automation System based on Windows Sidebar Gadget for Local Market in Turkish Republic of Northern Cyprus. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/90
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2011. Supervisor: Assist. Prof. Dr. Yıltam Bitirim.
In Turkish Republic of Northern Cyprus, there are some difficulties on effective communication between local companies and potential customers. Therefore, a complete online automation system is developed to have economical contribution for the local companies (which are one of the main economic resources) and to help customers for having new information about companies‟ products with less effort.
Our system is working over Internet and can be establish a bridge between the companies and potential customers by using Windows Sidebar Gadget. Windows Sidebar Gadget is a very popular and default tool in Microsoft Windows Vista and Microsoft Windows 7 operating systems which are mostly using in Turkish Republic of Northern Cyprus.
With our system, increasing local companies' sale performance, economical contribution, making company known, and attracting more customers can be provided.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Windows Sidebar Gadget - Local Company - Economical Contribution
An Online Automation System based on Windows Sidebar Gadget for Local Market in Turkish Republic of Northern Cyprus
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F90/3/Dalgicoglu.pdf.txt
File
MD5
a73069af97b60b75851e3ff7e434e278
68452
text/plain
Dalgicoglu.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F90/1/Dalgicoglu.pdf
File
MD5
dfd1994aa41f9679d6bbd41fc3c0a20d
1927111
application/pdf
Dalgicoglu.pdf
oai:i-rep.emu.edu.tr:11129/1172012-12-25T14:24:19Zhdl_11129_11
EMU I-REP
author
Azizi, Reza
2012-12-03T07:08:49Z
2012-12-03T07:08:49Z
2011
Azizi, Reza. (2011). Design and implementation of an anycast protocol for wireless mobile ad hoc networks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/117
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2011. Supervisor: Assist. Prof. Dr. Gürcu Öz.
This thesis conducts a detailed simulation study of stateless anycast routing in a mobile wireless ad hoc network. The developed model covers all the fundamental aspects of such networks with a routing mechanism using a scheme of orientation-dependent inter-node communication links. Using a flooding anycast mechanism, the thesis addresses another issue of locating the nearest server from a group of contents-equivalent servers in the network. The simulation model was developed in terms of a class of extended Petri nets and the simulation system Winsim is used in development and simulation to explicitly represent parallelism of events and processes in the network. The purpose of these simulations is to investigate the effect of node’s probability of changing direction, maximum speed of the node, and different TTL over the network performance under three different scenarios. In addition, the thesis provides extensive real-world experimental investigation of wireless ad hoc networks with stationary nodes in outdoor environments. The performance of wireless ad hoc networks is measured under various scenarios. For the experimental investigations, more than one network configuration and different parameters were used in real-world outdoor environment. Different sets of experiments was done to investigate the effect of inter-packet transmission time and position of laptop from the ground level to the network performance. Conducting such experiments and gathering information will provide very valuable information about wireless ad hoc networks.
Thesis investigates five practically important performance metrics of a wireless mobile ad hoc network and shows the dependence of this metrics on the transmission radius, link availability, maximal possible node speed and different mobility models.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Ad hoc networks (Computer networks)
Wireless communication systems
Mobile wireless ad hoc networks - Anycast - Simulation - Extended Petri Nets
Outdoor Experimental Study - Performance Evaluation
Design and implementation of an anycast protocol for wireless mobile ad hoc networks
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F117/3/Azizi.pdf.txt
File
MD5
167241d61926ddb10271d6f96cff1438
197626
text/plain
Azizi.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F117/1/Azizi.pdf
File
MD5
caa859084c7b9c7667ad23d2037adce5
2374083
application/pdf
Azizi.pdf
oai:i-rep.emu.edu.tr:11129/1202012-12-25T14:26:16Zhdl_11129_11
EMU I-REP
author
Mahmoud, Ahmed Yehya Ahmed
2012-12-03T07:34:01Z
2012-12-03T07:34:01Z
2012
Mahmoud, Ahmed Yehya Ahmed. (2012). Development of Matrix Cipher Modifications and Key Exchange Protocol. Thesis (Ph.D.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/120
Doctor of Philosophy in Computer Engineering. Thesis (Ph.D.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assoc. Prof. Dr. Alexander Chefranov.
In modern cryptographic methods, keys are the basis for secure communication channels and the establishment of secret keys is a challenging problem for the large-scale deployment of symmetric cryptography to control encryption and decryption. Key establishment protocols provide exchanging secret information between two or more parties, typically for subsequent use as symmetric keys for a variety of information security services including encryption, message authentication, and entity authentication. They may be broadly subdivided into key transport and key exchange. Notably, key exchange is one of the difficulties when using symmetric algorithms, the key exchange particularly useful from a security viewpoint, for each of the key-sharing parties can have its own control and a high confidence on the quality of the key output. Beside encryption, key exchange is one of the most basic problems in cryptography; it becomes another challenge in cryptography.
This thesis is concerned with the modifications of the Hill cipher (HC), extension of Diffie Hellman and ElGamal key exchange protocols. The HC is one of the most popular symmetric key algorithms; it is resistant to brute-force and statistical attacks, but it can be broken with a known plaintext-ciphertext attack (KPCA). To overcome this vulnerability, several researchers tried to propose modifications of the Hill cipher and make it secure. However in the literature, most of these modifications are found to be either insecure or ineffective for image encryption.
The Diffie-Hellman Key Exchange (DH) is known as one of the public key algorithms, its aim is to distribute the keys over insecure channels. It is based on the
iv
complexity of discrete logarithm problem (DLP) solving over a finite fieldGF(p) ,
where p is prime which considered as an advantage from the security viewpoint due to
the challenging and difficulties for solving the discrete logarithm. But DH has
drawbacks including the fact that there are heavy and expensive exponential operations
in both sides (sender and receiver) which affect its efficiency; it can be used for
exchanging secret keys. To overcome this drawback, DH protocol matrix oriented
modifications based on DLP are proposed by several researchers. Moreover, in the
literatures, most of the modifications still rely on the DLP.
The ElGamal Public Key Cryptosystem and Signature (EPKCS) also rely on the
computational complexity of finding discrete logarithms based on some publicly known
primitive root (base element), GF(p) , where p is a large prime. Similar to DH
protocol, the EPKCS has a drawback; it has a slow speed especially for signing in
addition to the ciphertext is twice as long as the plaintext.
In this thesis, we proposed two modifications of the Hill cipher, HCM-EE and
HCM-PRE. A matrix-based Diffie-Hellman-like key exchange protocol is also
proposed. ElGamal public key cryptosystem and signature scheme is extended to the
group GU(m, p, n) of numbers co-prime to mpn.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Computer security - Cryptography
Matrix Cipher - Dynamic Key - Image Encryption - Diffie-Hellman Key exchange Protocol
Secure Key-exchange Protocol - ElGamal Public Key Cryptosystem
Development of Matrix Cipher Modifications and Key Exchange Protocol
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F120/3/Mahmoud.pdf.txt
File
MD5
29a0d89f2056dccd241f40fb678c7315
120877
text/plain
Mahmoud.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F120/1/Mahmoud.pdf
File
MD5
ddc910b9f542d83ec70e7440e1a19114
2025012
application/pdf
Mahmoud.pdf
oai:i-rep.emu.edu.tr:11129/1282012-12-25T14:30:59Zhdl_11129_11
EMU I-REP
author
Al Qaraleh, Saed
2012-12-03T09:33:32Z
2012-12-03T09:33:32Z
2011
Al Qaraleh, Saed. (2011). Elimination of Repeated Occurrences in Image Search Engines. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/128
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2011. Supervisor: Assoc. Prof. Dr. Hadi Işık Aybay.
We propose a new method for elimination of repeated occurrences in image search engines. We have built software that: Compares images in a database, and marks only one copy of repeating files using a hashing technique. Marking one of the repeating images will lead to faster access and will eliminate the repetition of the same images more than once. The software can work periodically, for dealing with any updates on the image database. We have developed another version of the software to be multipurpose, making use of the query by example tool, and it can also find images which are similar to each other within some percentages limits.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Human Face Recognition (Computer Science)
Image Processing - Digital Techniques
Image Search Engines - Query by Example - Hash Algorithm - Information Retrieval
Elimination of Repeated Occurrences in Image Search Engines
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F128/3/Qaraleh.pdf.txt
File
MD5
e0ace2b9694f936686a22c160b6bb033
101844
text/plain
Qaraleh.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F128/1/Qaraleh.pdf
File
MD5
56b6a3a6dd87b6b09997b65d4870404a
1589375
application/pdf
Qaraleh.pdf
oai:i-rep.emu.edu.tr:11129/1552012-12-26T06:23:04Zhdl_11129_11
EMU I-REP
author
Bina, Nima
2012-12-04T14:42:42Z
2012-12-04T14:42:42Z
2012
Bina, Nima. (2012). Implementation of VoD P2P System Based on the LCBBS Module. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/155
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assoc. Prof. Dr. Işık Aybay.
In a common VoD system, a large bandwidth is required for the distribution of videos over the Internet. One promising solution is to use a “peer to peer” Video on Demand (VoD) system, in which peers cooperate in the distribution of videos. This solution decreases the server traffic; so the system works faster in a peer to peer VoD architecture. Video Locality Based Buffering Mechanism (LCBBS) is using this idea in an efficient methodology to get better performance in peer to peer VoD systems. In this thesis, a modified version of a LCBBS module is implemented and tested over a real test bed VoD application. The details of this implementation and the results of related experiments are also provided. This implementation has two major modules; TCP and UDP. The TCP module is implemented to work as a standalone video server on the Internet to distribute video segments to all clients. The TCP module has a buffer to store video segments on the local machine of each client. The UDP module helps system to distribute video segments over a high speed LAN connection without any interaction with server.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Information display systems
Video Streaming - Video on Demand - Client Side Buffering - Peer to Peer VoD - Distributed VoD - LCBBS
Implementation of VoD P2P System Based on the LCBBS Module
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F155/3/Bina.pdf.txt
File
MD5
d0cbc58d8a6f2141a59c22db3a71afbe
60158
text/plain
Bina.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F155/1/Bina.pdf
File
MD5
4e4b8b8607ce65c2250c133a67a3e401
647496
application/pdf
Bina.pdf
oai:i-rep.emu.edu.tr:11129/1622012-12-26T06:33:50Zhdl_11129_11
EMU I-REP
author
Kafkas, Şenay
2012-12-05T09:38:15Z
2012-12-05T09:38:15Z
2012
Kafkas, Senay. (2012). Interaction Variability of Human Protein Isoforms Identified through Biomedical Literature Mining. Thesis (Ph.D.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/162
Doctor of Philosophy in Computer Engineering. Thesis (Ph.D.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assist. Prof. Dr. Ekrem Varoğlu.
ABSTRACT : Over the last decade, advances achieved in genomic technologies have led to uncover vast amount of protein-protein interaction data. Nevertheless, the existing protein-protein interaction databases cover the interactions related only to a part of the proteome and protein isoform interaction databases are sparsely populated. Such isoforms are generated through transcript diversity mechanisms (e.g. alternative splicing) and could exhibit functional differences. Protein-protein interaction data on isoforms is necessary for analysing their functional similarities and understanding the effects of transcript diversity on protein-protein interaction networks. Biomedical literature is an invaluable complementary resource to experimental data. Automated tools are required to gather, view and analyse the isoform interactions from the biomedical literature. This study presents a comprehensive automated text mining based analysis, which extracts protein interactions from the biomedical literature for human protein isoforms linked to the transcripts clustered in HumanSDB3 (an alternative splicing database of the human transcriptome). Extracted protein-protein interaction data is delivered to public through a new database called TBIID which stands for Transcript Based Isoform Interactions Database. TBIID contains a total number of 31,819 interactions between 7,161 unique proteins. The interaction data is automatically gathered from a subset of 205,207 interaction abstracts, which are selected from about 4 million Medline abstracts belonging to the isoforms in HumanSDB3. The automatic extraction methods achieve state-of-the-art performance (53.22% precision, 68.94% recall, 60.07% F1-score). TBIID is utilised to quantify the variability in the isoform interactions based on their shared and unique interactions. Results reveal that almost all clusters analysed (99%) contain isoforms interacting with unique protein partners, with an average unique to shared interaction rate of ~5. Similar results are obtained by analysing the data from public protein-protein interaction databases. These findings are significant in that they demonstrate that isoforms tend to interact with unique partners, indicating that they could be involved in different interaction networks potentially for performing different functions. Hence, it can be concluded that transcript diversity has a potential to generate a significantly diverse interactome.
The literature analysis presented here gives access to protein interactions that are not yet contained in public resources and in particular, that are linked to transcript isoforms generated by alternative splicing and stored in HumanSDB3. TBIID is accessible at http://tbiid.emu.edu.tr serving as an up to date and comprehensive resource for future experiments on isoform interactions.
Keywords: alternative splicing, protein isoforms, biomedical text mining, abstract retrieval, interaction abstract selection, protein-protein interaction extraction, machine learning, interaction variability analysis.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Son on yılda, genomik teknolojilerde elde edilen gelişmeler, büyük miktarda protein-protein etkileşimi verisinin ortaya çıkarmasına yol açmıştır. Yine de, mevcut protein-protein etkileşimi veritabanları proteomun sadece bir kısmı ile ilgili etkileşim bilgisini kapsamakta ve protein izoformu etkileşimleri bilgisini de seyrek olarak içermektedirler. Bu izoformlar, transkript çeşitliliği mekanizmaları (örneğin alternatif sıplays) tarafından üretilirler ve işlevsel farklılıklar gösterebilirler. İzoformların protein-protein etkileşim verileri, fonksiyonel benzerliklerini analiz etmek ve transkript çeşitliliğinin, protein-protein etkileşim ağlarına etkilerini anlamak için gereklidir. Biyomedikal literatür, izoform etkileşim bilgisini, bilgisayara dayalı yöntemler ile toplamak, görüntülemek ve analiz etmek için deneysel yöntemlere paha biçilmez bir tamamlayıcı kaynak oluşturur. Bu çalışmada, HumanSDB3‟de (insan transkriptomu alternatif sıplays veritabanı) kümelenmiş transkriptler ile bağlantılı insan proteini izoformlarına ait protein etkileşimlerini biyomedikal literatürden çıkaran, kapsamlı bir otomatik metin madenciliği tabanlı analiz sunulmaktadır. Çıkarılan protein-protein etkileşimi verileri, transkript tabanlı izoform etkileşimleri veritabanı (ingilizce kısaltması TBIID) adı verilen yeni bir veritabanı üzerinden erişime ve kullanıma sunulmuştur.
TBIID 7,161 değişik proteine ait, toplam 31,819 etkileşim bilgisi içerir. Etkileşim verileri, otomatik olarak, HumanSDB3‟deki izoformlara ait yaklaşık 4 milyon Medline kayıtından seçilen 205,207 etkileşim özetinden toplanmıştır. Kullanılan, otomatik ekstraksiyon yöntemleri, bu alanda ulaşılan en son gelişmeleri yansıtan yüksek bir performans sergilemektedir (53.22% Duyarlık, 68.94% Geri Çağırım, 60.07% F1-skor). TBIID, izoformların ortak ve özgün etkileşim ortaklarına dayalı olarak, izoform etkileşimleri değişkenliğini ölçmek için kullanılmıştır. Sonuçlar, hemen hemen tüm transkript kümelerinin (%99), özgün etkileşimin ortak etkileşime oranı ~5 olan izoformlar içerdiğini ortaya koymaktadır. Kamuya açık protein-protein etkileşimi veritabanlarının içeriği analiz edilerek benzer sonuçlar elde edilmiştir. Bu bulgular, izoformların, potansiyel farklı işlevleri yerine getirmek için, farklı etkileşim ağlarında görev alıp, farklı ortaklar ile etkileşim eğiliminde olabileceklerini gösterdiğinden önem taşımaktadır. Bu nedenle transcript çeşitliliğinin, önemli ölçüde çeşitlilik gösteren bir interaktom oluşturmak için potansiyele sahip olduğu söylenebilir. Burada sunulan literatür analizi, var olan protein-protein etkileşimi veritabanlarında henüz bulunmayan ve özellikle HumanSDB3‟de bulunan ve alternatif sıplays mekanizması ile ortaya çıkmış insan transkript izoformlarına ait proteinlerin etkileşimlerine erişim sağlamaktadır. TBIID, http://tbiid.emu.edu.tr adresinden erişilebilen, gelecekte yapılabilecek deneyler için güncel ve kapsamlı bir kaynak olarak hizmet vermektedir.
Anahtar Kelimeler: Alternatif Sıplays, protein izoformları, biyomedikal metin madenciliği, öz erişimi, etkileşim bilgisi içeren özlerin seçimi, proteinler arasındaki etkileşimlerin çıkarımı , otomatik öğrenme, etkileşim değişkenligi analizi.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Information storage and retrieval systems.
Genomics - Medical informatics
Data processing
Alternative Splicing - Protein Isoforms--Biomedical Text Mining
Abstract Retrival - Interaction Abstract Selection
Protein-Protein Interaction Extraction - Machine Learning - Interaction Variability - Analysis
Interaction Variability of Human Protein Isoforms Identified through Biomedical Literature Mining
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F162/3/Kafkas.pdf.txt
File
MD5
e4ebf3b06d12bc01439d27bfac09e7ce
271146
text/plain
Kafkas.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F162/1/Kafkas.pdf
File
MD5
aedefe03ba2ffda08d8ffe8ac2f3fbc1
1777606
application/pdf
Kafkas.pdf
oai:i-rep.emu.edu.tr:11129/1672012-12-26T06:40:41Zhdl_11129_11
EMU I-REP
author
Farmanbar, Mina
2012-12-05T12:06:40Z
2012-12-05T12:06:40Z
2012
Farmanbar, Mina. (2012). Investigation of Matrix Encryption Algorithms. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/167
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assoc. Prof. Dr. Alexander Chefranov.
ABSTRACT: There are many applications that have been developed in order to protect information from any public network attacks. One of the important aspects for secure transformation of information is cryptography, which is the focus of this thesis. We only focus on the Hill cipher algorithm. The Hill cipher can be broken by known plaintext-ciphertext attack due to its linearity. There are several Hill cipher modifications, which have been proposed in the literature of cryptography to make it stronger. In this study, we deal with two different kinds of Hill cipher modifications which use interweaving, interlacing and 16 iterations. Both proposed ciphers have a substantial avalanche effect and are supposed to resist any cryptanalytic attack. However, it is not discussed why interweaving and interlacing with the iteration strengthen the Hill cipher and why the number of iterations is taken to be 16. We show that strength of proposed ciphers is due to non-linear transformation used in bit-level permutations and investigate effect of number of iterations on the avalanche effect. We modify Hill cipher modifications [7, 8] by introducing columns swapping HC (CSHC) that uses swapping of columns of the binary bits of the plaintext characters instead of interlacing and interweaving as in [7, 8]. Another modification is arbitrary permutation Hill cipher (APHC) that uses an arbitrary permutation not known to an opponent instead of a fixed permutation (interweaving, interlacing and etc.). In these ciphers 1 or 2 iterations are used instead of 16 iterations as in [7, 8]. The test results obtained by comparison analysis of two new proposed ciphers indicate that any bit-level permutations can provide a considerable avalanche effect and two iterations can be used instead of 16.
Keyword: Hill cipher, linear transformation, Iteration, permutation, Avalanche effect v
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Kamuya açık ağlarda veri güvenliğini sağlamak için bir çok uygulama geliştirilmiştir. Veri dönüşüm güvenliğinin en önemli parçalarından biri şifrelemedir. Biz de bu tezde şifreleme konusuyla ilgili olarak, Hill Şifreleme Algoritması üzerinde durduk. Hill şifreleme yöntemi doğrusal olduğu için bilinen salt metin-şifreleme yöntemiyle kırılabilir. Literatürde, Hill şifrelemesini güçlendirmek için yapılmış çalışmalar mevcuttur. Bu çalışmada, Hill şifrelemesini güçlendirmeyi amaçlayan iki yöntem [7 ve 8] üzerinde durduk. Bu yöntemler birlikte dokuma, birbirine dolama tekniklerini 16 kere tekrarlayarak kullanmaktadır. Ancak birlikte dokuma ve birbirine dolama tekniklerinin neden Hill şifrelemeyi güçlendirdiğinden veya tekrar sayısının neden 16 olduğundan bahsedilmemektedir.
Biz, öne sürülen şifrelemelerin gücünün, bit-seviyesi karıştırmalarındaki doğrusal olmayan dönüşümlerden kaynaklandığını gösterdik. Ek olarak da tekrar sayısının çığ etkisi üzerindeki etkisini araştırdık. Biz, Hill şifreleme üzerinde yapılan yeni değişiklikler olan [7 ve 8] in sahip olduğu birlikte dokuma ve birbirine dolama yöntemleri yerine, salt metindeki karakterlerin bitlerinin oluşturduğu sütunlarda yer değiştirme (CSHC) yöntemini öne sürdük. Diğer bir değişiklik ise sabit ve bilinen bir karıştırma yöntemi (birlikte dokuma, birbirine dolama, vs...) yerine, rastgele karıştırma yönteminin kullanımıdır. Bu yöntemlerde, 16 kere tekrarlama yerine 1 veya 2 defa tekrarlama kullanılmaktadır. Öne sürülen yeni şifreleme yöntemlerinin karşılaştırma sonuçları, herhangi bir bit-seviyesi karıştırmanın önemli derecede çığ etkisi yarattığını ve 16 kere tekrarlama yerine 2 kere tekrarlamanın da kullanılabileceğini göstermiştir.
Anahtar Kelimeler: Hill şifreleme, doğrusal dönüşüm, tekrarlama, karıştırma, çığ etkisi.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Algorithms
Hill Cipher - Linear Transformation--Iteration - Permutation - Avalanche Effect
Investigation of Matrix Encryption Algorithms
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F167/3/Farmanbar.pdf.txt
File
MD5
590774862f915a58814de62d664e5ee4
58180
text/plain
Farmanbar.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F167/1/Farmanbar.pdf
File
MD5
c36ef7740a2f78b75106e9ac366bd8ef
874898
application/pdf
Farmanbar.pdf
oai:i-rep.emu.edu.tr:11129/1922012-12-26T07:30:48Zhdl_11129_11
EMU I-REP
author
Hacı, Hüseyin
2012-12-11T06:22:15Z
2012-12-11T06:22:15Z
2010
Haci, Huseyin. (2010). Performance Investigation of Simulation Models of Wireless Mobile Ad Hoc Networks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/192
Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2010. Supervisor: Prof. Dr. Alexander Kostin.
ABSTRACT: Wireless ad hoc networks have attracted great interest in last few years, due to
envisioning of their great potential in military and commercial applications. Being a wireless network of mobile computing devices that doesn’t rely on any pre-established infrastructure, they eliminate the complexity of infrastructure setup. Accordingly become popular in several application areas, such as battlefields, emergency areas, wireless sensor networks and hybrid wireless networks and can be deployed anywhere at anytime. This thesis provides a Petri-net-based model of a wireless ad hoc network, where all fundamental aspects with the proposed, a general and more realistic, inter-node communication scheme are implemented. The model is implemented in terms of extended Petri nets and the simulation system Winsim is used in development and simulation. There are two types of modules in the model, namely node and switching module, that is, the model is organized in a multi-module system. Three fundamental performance metrics of an ad hoc network – packet delivery ratio, average number of hops and relative network traffic – were investigated under different transmission radius, model
parameters and conditions of mobility model and inter-node communication scheme. The entire model, together with the proposed inter-node communication scheme can be used for study of routing protocols as well as other aspects of information transmission in wireless ad hoc networks. The further study of this thesis can be the development of an efficient routing protocol that results in reduced network load and energy usage at mobile nodes as well as increasing the security of the network. The thesis is organized as follows. Chapter 1 introduces the era of computer and wireless networks, with the problem and statement of the work goal of the thesis.
Chapter 2 provides a survey of the existing methods and tools for modeling and simulation of wireless ad hoc networks. Chapter 3 is devoted to the specification of system assumptions and the chosen mobility model. Chapter 4 explains the proposed scheme of inter-node communication. In Chapter 5, the organization and components of the entire model is considered. Chapter 6 describes the simulation setup and results of simulation. Chapter 7 concludes the thesis.
Keywords: Mobile wireless ad hoc networks, oriented links, simulation, extended Petri nets, mobility models.
ÖZ: Son yıllarda, kablosuz ve alt yapısız ağlar insanlar arasında büyük bir ilgi uyandırmıştır. Bunu da bu ağların askeri ve ticari alanda kullanılan uygulamalardaki görülen büyük potansiyeline bağlayabiliriz. Hiçbir alt yapıya dayanmayan kablosuz ağlar olmakla birlikte, mobil hesaplama cihazlarının kurulumundaki bütün alt yapı güçlüklerini ortadan kaldırması; bu ağların popülaritesini birçok alanda artırmıştır. Buna örnek olarak da; savaş alanları, acil-olağanüstü durum alanları, kablosuz alıcı ağları ve hibrit kablosuz ağlarda artırdıklarını söyleyebiliriz. Ayrıca her an, her yerde kurulabilecek bir ağ türü yaratmıştır. Yapılan bu tez çalışmasında Petri-net esaslı bir kablosuz alt yapısız ağ modeli sağlanmaktadır. Modelde bahsedilen ağların bütün ana konularıyla birlikte genel ve daha gerçekçi bir devre-arası iletişim taslağı da uygulanmıştır. Simulasyon için kullanılan Winsim sistemi, bu genişletilmiş Petri-net cinsinden yapılmış modelin geliştirilmesinde ve simule edilmesinde kullanılmıştır. Bu model birden çok modüllü bir sistem olarak düzenlenmiştir. İlk modül tipi node (devre) ve ikinci modül tipi ise switching (anahtarlama) modülüdür. Alt yapısız ağlar üç ana performans ölçü birimini ile incelenmektedir. Bunlardan bir tanesi paket teslim oranı, ikincisi; ortalama sekme sayısı ve, son olarak ta göreceli trafik’tir. Bu ölçü birimleri değişen aktarım yarıçapı, model parametreleri ve hareketlilik modeli ile devre-arası iletişim taslağı koşulları altında incelenmiştir. Bütün model, önerilen devre-arası iletişim taslağı ile birlikte kablosuz altyapısız ağlarda yönlendirme protokolleri ve diğer bilgi iletişimi/dağılması ile ilgili konulardaki çalışmalarda da kullanılabilir. Bu tez çalışmasının daha ileride ki çalışması ise, ağdaki yükü ve mobil devrelerdeki güç kullanımını azaltıp, aynı anda ağın güvenliğini artıracak olan verimli bir yönlendirme protokolü üzerinde olabilir. Bu tez çalışmasının organizasyonu şu şekildedir: 1. bölümde, bilgisayar ve
kablosuz ağların devrimiyle birlikte tezin ele aldığı problem ve amacı açıklanmaktadır. Kablosuz altyapısız ağların modelleme ve simulasyonlarında kullanılan metodların ve araçların araştırması 2. bölümde açıklanmıştır. 3. bölümde ise, geliştirilen bu sistemdeki varsayımların ve seçilen hareketlilik modeli belirtilmiştir. Bütün modelin düzenlemesini ve parçaları 5. bölümde ele alınmıştır. 6. bölümde ise simulasyon düzeni ve sonuçları açıklanmıştır. Son bölümde de tez sonuçlandırılmıştır.
Anahtar kelimeler: Mobil kablosuz alt yapısız ağlar, yönlü bağlantılar, simulasyon, genişletilmiş Petri-net’ler, hareketlilik modelleri.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Computer Networks - Wireless Networks
Wireless Communication Systems
Mobile Wireless ad hoc networks - Orientedlinks--Simulation - Extended Petri Nets - Mobility Models
Performance Investigation of Simulation Models of Wireless Mobile Ad Hoc Networks
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F192/3/Haci.pdf.txt
File
MD5
18edb43aa160e7be9b9953741bc2a482
318444
text/plain
Haci.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F192/1/Haci.pdf
File
MD5
a5dc4bfce57b463c2bc96754452f42a4
496771
application/pdf
Haci.pdf
oai:i-rep.emu.edu.tr:11129/1932012-12-26T07:31:13Zhdl_11129_11
EMU I-REP
author
Özen, Yağız
2012-12-11T08:54:39Z
2012-12-11T08:54:39Z
2010
Ozen, Yagiz. (2010). Performance Study of Real-World Wireless Mobile Ad Hoc Networks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/193
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2010. Supervisor: Assist. Prof. Dr. Gürcü Öz.
ABSTRACT: Wireless ad hoc network is one of the most popular network types these days. The reason for this is the advantages that wireless ad hoc networks provide for users or group of users. The most important characteristic of wireless ad hoc networks that make them more popular when compared with any other network type is that they do not need any infrastructure to be setup in advance. This characteristic of wireless ad hoc networks make the research on this topic more valuable due to increasing number of people using wireless ad hoc networks. The fact that no fixed router is used in the network ensures that network nodes are adaptable to the topology changes in a mobile wireless ad hoc network. This advantage makes wireless ad hoc networks useful in battlefield areas where there is need for networks that have a dynamic working strategy, which does not increase the complexity of setting a network. Other possible application areas of wireless ad hoc networks are disaster areas, rescue emergency operations and in vehicles that satisfies the required mobility and fast deployment network need. This thesis provides extensive real-world experimental investigation of wireless ad hoc networks with mobile and stationary nodes in different outdoor environments. The performance of wireless ad hoc networks is measured under various scenarios. For the experimental investigations, more than one network configuration and different parameters were used in real-world outdoor environment. Conducting such experiments and gathering information regarding the results of these experiments will yield very valuable information since investigation of such networks requires two aspects to take into account. One of them is the simulation and modeling of these networks and the other is the conducting of real-world experiments by using testbed programs. The most popular performance metrics for wireless ad hoc networks, delivery ratio, average round trip time or average end to end delay, and average number of hops were investigated in this study. It is seen that delivery ratio decreases with the distance between the nodes. The average round trip time is not affected by the distance; hence it increases with respect to application data size and the number of intermediate nodes in the network. The average number of hops changes if the distance between the source and the destination decreases since there will be no need for intermediate nodes for forwarding the packets.
Keywords: Wireless Ad Hoc Networks, Outdoor Experimental Study, Performance Evaluation, Multithreaded Programs, Wireless Ad Hoc Protocols.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Son günlerde, kablosuz ve altyapısız ağ bağlantıları en popular ağ bağlantılarının birtanesi olmayı başarmıştır. Bunun sebebi ise kablosuz altyapısız ağ bağlantılarının kullanıcılara sağladığı avantajlardır. Kablosuz ve alt yapısız ağ bağlantılarının popular olmasını sağlayan en önemli etken onların en önemli özelliklerinden biri olan, hiçbir alt yapıya dayalı olmamasıdır. Bu özellik sayesinde, bu ağların kullanım alanları günden güne artmakta ve bu ise bu konu altında yapılan araştırmalarda ulaşılan sonuçların çok değerli olmasına sebeb olmaktadır. Bu tür ağ bağlantılarında herhangi bir yönlendiricinin kullanımına ihtiyaç duyulmaması, bu ağ bağlantılarının kullanıcıların hareketli olduğu ortamlarda kullanılmasını mümkün kılmıştır. Kablosuz ve alt yapısız ağ bağlantılarının hareketli ortamlara kolay uyum sağlamasının getirdiği avantajla, bu tür ağ bağlantılarının savaş alanlarında kullanılabileceği akla geliyor. Diğer kullanım alanları ise, acil kurtarma operasyonları, felaket alanları, araçlar arası kullanım ve daha bir çok alan listelenebilir. Bu tez çalışmasında, geniş kapsamlı gerçek dünyada yapılan deneysel çalışmalar sunuluyor. Bu çalışmalarda, bina dışında hareketsiz veya kullanıcılar tarafından taşınarak hareketli hale getirilmiş bilgisayarlar kullanılmıştır. Bu deneysel çalışmaların amaçı, kablosuz ve altyapısız ağ bağlantılarının birçok senaryo altındaki performansını ölçmektir. Birden fazla ağ konfigurasyonu ve parametreleri kullanılmıştır. Bu tür ağ bağlantılarının performans değerlendirilmesi iki farklı açı ile ele alınmalıdır. Birincisi simulasyon ve modelleme yapılmasıdır, ikincisi ise, önceden tasarlanmış program yardımı ile deneysel çalışmaların yapılmasıdır. Bu tez çalışmasında en önemli ve en çok kullanılan ölçü birimleri ele alınmıştır. Bunlar ise, ortalama paket teslim oranı, ortalama sekme sayısı, göreçeli trafik ve bir paketin hedefine ulaşmak için harcadığı süredir.
Anahtar kelimeler: Kablosuz ve Altyapısız Ağ Bağlantıları, Deneysel Çalışma, Performans Değerlendirmesi, Çoklu İşlemli Programlar, Kablosuz ve Altyapısız Ağ Bağlantı Protokolleri.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Wireless Ad Hoc Networks - Outdoor Experimental Study
Programs - Wireless Ad Hoc Protocols
Performance Study of Real-World Wireless Mobile Ad Hoc Networks
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F193/3/Ozen.pdf.txt
File
MD5
17f87b28fd0345779bb17387a6df7404
239351
text/plain
Ozen.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F193/1/Ozen.pdf
File
MD5
44d47d6be5a73bb0b3769c7db3fc56e9
1352871
application/pdf
Ozen.pdf
oai:i-rep.emu.edu.tr:11129/2052012-12-26T07:36:55Zhdl_11129_11
EMU I-REP
author
Mayboudi, Seyed Mohammad Hossein
2012-12-12T13:37:23Z
2012-12-12T13:37:23Z
2011
Mayboudi, Seyed Mohammad Hossein. (2011). Rational versus Emotional Reasoning in a Realistic Multi-Objective Environment. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/205
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2011. Supervisor: Assist. Prof. Dr. Adnan Acan.
ABSTRACT: Emotional intelligence and its associated with models have recently become one of new active studies in the field of artificial intelligence. Several works have been performed on modelling of emotional behaviours such as love, hate, happiness and sadness. This study presents a comparative evaluation of rational and emotional behaviours and the effects of emotions on the decision making process of agents in a realistic multi-objective environment. NetLogo simulation environment is used to model a realistic multi-objective environment, where an agent is in continuous interaction with a set of objects in its surrounding. The agent living and acting in its environment employs reasoning procedures which combine a series of inferences, evaluation, evolution processes, adaptation, learning and rule based emotions. Experimental evaluations showed that agents with the rational and emotional models in their decision to making processes achieve better performance compared to those with the rational decision model only.
Keywords: Artificial Intelligence, Agent-Based Modelling, Rational Agent, Emotional Intelligence, NetLogo.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Duygusal zeka ve onunla ilişkili modeller son zamanlarda yapay zeka alanında yeni aktif araştırma konularından biri haline gelmiştir. Sevgi, nefret, mutluluk ve öfke gibi duygusal davranışların modellenmesi üzerine çeşitli çalışmalar yapılmıştır. Bu çalışmada rasyonel ve duygusal davranışların karşılaştırmalı değerlendirilmeleri ve çok amaçlı gerçekçi bir ortamda ajanların karar alma süreci üzerinde duyguların etkisi sunulmuştur. NetLogo benzetim ortamı kullanılarak bir ajanın çevresindeki nesnelerle sürekli etkileşimi çok amaçlı bir ortam için modellenmiştir. Ajan yaşadığı çevrede etkili öğrenme, çıkarımlar yapma, değerlendirmelerde bulunmayı geliştirme ve uyum gibi bir dizi duygusal kural ve akıl süreci kullanır. Deneysel değerlendirmeler rasyonel ve duygusal karar alma sürelerinin birlikte kullanımının daha etkili olduğunu göstermiştir.
Anahtar Kelimeler: Yapay Zeka, Ajan Tabanlı Modelleme, Rasyonel Ajan, Duygusal Zeka, NetLogo.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Artificial Intelligence - Agent-Based Modelling - Rational Agent - Emotional Intelligence - NetLogo
Rational versus Emotional Reasoning in a Realistic Multi-Objective Environment
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F205/3/Mayboudi.pdf.txt
File
MD5
272ae4ad020d5d658801eacb6117343b
151192
text/plain
Mayboudi.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F205/1/Mayboudi.pdf
File
MD5
4a37ecb55c5a3e1272704c14b4c5df9c
1484461
application/pdf
Mayboudi.pdf
oai:i-rep.emu.edu.tr:11129/2392012-12-26T07:53:27Zhdl_11129_11
EMU I-REP
author
Sarışın, Gözde
2012-12-20T08:12:37Z
2012-12-20T08:12:37Z
2011
Sarisin, Gozde. (2011). The Cone Tessellation Model for Three-Dimensional Networks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/239
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2011. Supervisor: Assoc. Prof. Dr. Muhammed Salamah.
ABSTRACT: Wireless terrestrial networks are usually designed in two dimensional plane, but in real life they form three dimensional space. For navy, air force and under water
applications, full connectivity and coverage are necessary to achieve good
surveillance. Coverage and connectivity issues become more important to achieve
full connectivity with less number of nodes. In three dimensional networks, node
placement strategy is one of the most important design problems.
In this thesis, main aim is to deploy the minimum number of nodes in an effective
way to get communication among nodes over a multi-hop path. Sensing range and
transmission range values are main factors for our calculations. The volumetric
quotient, which is the ratio of the transmission range (represented as the volume of
the shape) to the sensing range (represented as the volume of the shape’s
circumsphere) of each node, is used as the main measure of the placement strategy.
Researchers use polyhedrons to model three dimensional networks. As the
volumetric quotient increases, we need less number of nodes for full coverage.
The contribution of this research is finding a cone model which gives a higher
volumetric quotient than polyhedrons. The inspiration comes from satellite footprint.
The cone model was tessellated using 3Ds Max which is a modelling, animation and
rendering software. Cones are deployed in special manner that has no empty space
between nodes. So we can achieve full connectivity with cone model. We compared
our results with previous researches and we achieve better results in terms of
volumetric quotient and number of nodes needed compared to other models. Our
result achieved the minimum of transmission ranges for both axes. Best results found
in terms of maximum of minimum transmission ranges for u and v axes. This
research shows us we can achieve full coverage with using a shape rather than
polyhedrons.
Keywords: Modelling, three dimensional networks, tessellation, Wireless Sensor
Networks, satellite foot-print.
……………………………………………………………………………………………………………………………………………………………………………………………………………………ÖZ: Yeryüzündeki kablosuz ağlar genellikle 2 boyutlu olarak dizayn edilir ama gerçek hayatta 3 boyutlu bir alan oluştururlar. Askeri, hava ve su altı uygulamalarında iyi bir
gözlem yapabilmek için tam kapsama ve bağlantıya ihtiyaç vardır. Az sayıda sensör
kullanarak tam bağlantı sağlamada kapsama ve bağlantı önemli bir rol oynamaktadır.
3 boyutlu ağlarda en önemli dizayn problemlerinden biri sensörü yerleştirme
stratejisidir.
Bu tezdeki asıl amaç çoklu-sıçrama yolundaki bağlantıyı sağlamak için en az sayıda
sensörü en uygun şekilde yerleştirmektir. Algılama ve transfer alanı bizim
hesaplamalarımızın ana faktörleridir. Volumetrik katsayı her bir sensörün transfer
alanının algılama alanına bölümüyle bulunur, ki bu da yerleştirme stratejisinin ana
hesaplamasıdır. Araştırmacılar 3 boyutlu ağları modellemek için çok yüzlü olan 3
boyutlu şekilleri kullanmışlardır. Volumetrik katsayı arttıkça tam kapsamayı elde
etmek için daha az bağlantı noktasına ihtiyacımız olur.
Bu araştırmanın katkısı, koni modellinin çok yüzlü 3 boyutlu şekillerden daha
yüksek volumetrik katsayıya sahip olmasıdır. Fikir uydu ayak izinden ortaya
çıkmıştır. Koni modeli, bir modelleme, animasyon ve şekil çevirme programı olan
3Ds Max ile 3 boyutlu düzleme yerleştirilmiştir. Koniler özel bir strateji ile
yerleştirilmiş olup bağlantı noktaları arasında boşluk yoktur. Böylelikle tam
bağlantıyı koni modeliyle elde ettik. Sonuçlarımızı önceki araştırmalarla
karşılaştırdık ve volumetrik katsayı, gerekli olan bağlantı noktası sayısı, tüm eksenler
için minimum transfer alanı ve u ve w eksenlerinde minimum transfer alanında en iyi
sonuçları elde ettik. Bu araştırma bize tam bağlantıyı elde etmek için çok yüzlü 3
boyutlu şekiller yerine başka şekiller kullanılabileceğini gösterdi.
Anahtar kelimeler: modelleme, 3 boyutlu ağlar, kablosuz sensör ağları, uydu ayak
izi, Kelvin varsayımı, Kepler varsayımı
en
Eastern Mediterranean University (EMU)
Computer Engineering
Wireless communication Systems
Computer Networks
Modelling - Three Dimensional Networks - Tessellation - Wireless Sensor Networks - Satellite Foot-Print
The cone tessellation model for three-dimensional networks
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F239/3/Sarisin.pdf.txt
File
MD5
57d71a4a0643d2905254bb9719f82b14
70681
text/plain
Sarisin.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F239/1/Sarisin.pdf
File
MD5
819021b4273bf7cd768897f6498a2ab2
2279538
application/pdf
Sarisin.pdf
oai:i-rep.emu.edu.tr:11129/3092013-01-10T00:00:29Zhdl_11129_11
EMU I-REP
author
Luay, Huthaifa M.
2013-01-09T11:47:54Z
2013-01-09T11:47:54Z
2012
Luay, Huthaifa M. (2012). Design and Implementation of a Wireless Bulletin Board. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/309
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assoc. Prof. Dr. Muhammed Salamah.
ABSTRACT: Bluetooth is an important mean for wireless communication between multiple devic-es. Bluetooth is intended to support an open-ended list of wireless applications, in-cluding data, audio, graphics, and even video transmission between different devices. Therefore demand on Bluetooth will be high since most mobile devices nowadays are Bluetooth enabled. Besides Bluetooth enabled information provision system can be a solution to access information database server and can handle user’s data re-quest. This thesis is developed to enable information provision system for data trans-fer between the laptop and LED screen. The LED screen is used to show the data that the user wants to display in a fixed or motional manner. The system is designed in such a way that the KC Bluetooth mod-ule at the screen side can only receive data from one specific sender.
The operation of transferring data depends on the protocol used in finding the specif-ic device and making the contact between the transmitter and the receiver. The fun-damental protocol used in this work is the Radio Frequency Communication (RFCOMM). This protocol is based on a serial communication between the two Bluetooth devices. The software part of the system is concerned with programming the Bluetooth with KC wireless in addition to another user-interface program that is designed for sending messages to be displayed on the LED screen.
Keywords: Wireless Communication, Bluetooth, BX-4A1, Bulletin board.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: İki farklı cihaz arasında bilgi, işitsel, grafik ve video formatındaki veri aktarımını içeren bir dizi kablosuz uygulamayı destekleyen Bluetooth, birden fazla cihaz arasın-da kablosuz iletişimi sağlaması bakımından önem taşıyan bir araçtır. Günümüzün birçok taşınabilir cihazlarının Bluetooth uyumlu olmasından dolayı Bluetooth uygu-lamalarına olan talep yüksektir. Buna ek olarak Bluetooth uyumlu bilgi sağlama sis-temi bilgi veritabanı sunucusuyla bağlantıya geçme ve kullanıcının veri taleplerini karşılama açısından bir çözüm olanağı sunabilir. Bu araştırma dizüstü bigisayar ve LED ekran arasındaki veri transferini sağlamayı hedef alan bir bilgi sistemi geliştirme amacını taşımaktadır. LED ekran, kullanıcının sabit veya hareketli bir tarz kullanarak veriyi dilediği şekil-de göstermesini sağlar. Sistem, ekran tarafında yer alan KC Bluetooth modülünün sadece belirgin bir göndericiden data almasını sağlayacak biçimde tasarlanmıştır. Veri aktarımı işlemi belirgin bir cihazı bulma ve verici ve alıcı cihaz arasındaki bağlantıyı kurma işleminde kullanılan protokole bağlıdır. Bu araştırmada kullanılan temel protokol Radyo Frekans İletişimi’dir (RFCOMM). Bu protokol iki Bluetooth cihazı arasında gerçekleşecek bir dizi iletişime dayandırılmıştır. Sistemin yazılım bölümü, Bluetooth cihazını KC kablosuz ve LED ekran üzerinde görüntülenecek mesajları gönderme amaçlı tasarlanan diğer bir kullanıcı arabirimi programı ile pro-gramlamayla ilişkilidir.
Anahtar Kelimeler: Kablosuz İletişim, Bluetooth, BX-4A1, Duyuru Panosu.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Wireless Communication Systems
Bluetooth Technology
Wireless Communication - Bluetooth - BX-4A1 - Bulletin Board
Design and Implementation of a Wireless Bulletin Board
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F309/3/Luay.pdf.txt
File
MD5
9f714c233aeb654c5d0ca99168f6f0cf
62107
text/plain
Luay.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F309/1/Luay.pdf
File
MD5
3d81d1280a25b6faee7debd5925098b2
3080838
application/pdf
Luay.pdf
oai:i-rep.emu.edu.tr:11129/3152013-01-11T00:00:26Zhdl_11129_11
EMU I-REP
author
Shahabi, Jalil
2013-01-10T07:22:27Z
2013-01-10T07:22:27Z
2012
Shahabi, Jalil. (2012). A Multi-Set Artificial Immune System for Searching Optima in Dynamic Environments. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/315
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assist. Prof. Dr. Ahmet Ünveren.
ABSTRACT: Artificial Immune Systems (AIS) are computational methods that belong to the computational intelligence family and are inspired by the biological immune system. Many researchers developed immune based models to solve complex computational or engineering problems by using fast exploration ability of the AIS. The proposed method uses multi-set search mechanisms within AIS to solve the dynamic optimization problems, i.e. moving peak benchmarks. In the moving peak benchmark problems the optimum and environment changes in time. For this reason it is difficult to find optimum. In this thesis distributed detection and fast exploration ability of AIS are combined with multi-set search mechanisms to find optimum solutions of the given dynamic optimization problems. The given method was compared with different algorithms that solve dynamic optimization problems and the results showed that the proposed method outperforms almost all other methods.
Keywords: dynamic environments, optimization problems, artificial immune systems, moving peaks benchmarks.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Yapay Bağışıklık Sistemleri (YBS) hesaplama yöntemleri olup yapay zeka ailesindendir ve biyolojik bağışıklık sistemi ilham alınarak üretilmiş yöntemlerdir. Birçok araştırmacı YBS hızlı keşfetmek yeteneğini kullanarak karmaşık hesaplama veya mühendislik problemlerini çözmek için bağışıklık tabanlı modeller geliştirdi. Önerilen yöntemde dinamik en iyileme problemlerini çözmek için YBS içinde çoklu-grup arama mekanizmaları kullanıldı. Dinamik problemlere örnek olarak hareketli tepe denektaşları verilebilir. Zaman içinde hareketli tepe denektaşları problemlerinde en iyi ve çevre değişime uğrar. Bu nedenle, en iyiyi bulmak zordur. Bu tez çalışmasında YBS’nin dağıtık algılama ve hızlı keşfetmek yeteneği çoklu-set arama mekanizmaları ile birleştirilerek mevcut dinamik en iyileme problemlerinin en iyi çözümlerini bulmak için kullanıldı. Verilen yöntem dinamik en iyileme problemlerini çözen farklı algoritmalar ile karşılaştırılmış ve elde edilen sonuçlar doğrultusunda önerilen yöntemin hemen hemen tüm diğer yöntemlerden daha iyi performans gösterdiği ortaya konulmuştur.
Anahtar Kelimeler: dinamik ortamlar, en iyileme problemler, yapay bağışıklık sistemler, hareketli tepe denektaşlar.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Immune System
A Multi-Set Artificial Immune System for Searching Optima in Dynamic Environments
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F315/3/Shahabi.pdf.txt
File
MD5
0f7a64d7cfd0d840ede73122726f2ddd
148870
text/plain
Shahabi.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F315/1/Shahabi.pdf
File
MD5
b5d2aadb2ec36f833a0bf354c0ca4ffb
3961003
application/pdf
Shahabi.pdf
oai:i-rep.emu.edu.tr:11129/3172013-01-11T00:00:31Zhdl_11129_11
EMU I-REP
author
Doborjeh, Maryam Gholami
2013-01-10T07:55:39Z
2013-01-10T07:55:39Z
2012
Doborjeh, Maryam Gholami. (2012). Genetic Optimization for Image Segmentation. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/317
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assist. Prof. Dr. Adnan Acan.
ABSTRACT: The present study is concerned with optimization of image segmentation using Genetic Algorithms. The developed implementation utilizes the Split/Merge approach for image segmentation. The split portion involves K-means clustering algorithm and then a Genetic Algorithm (GA) with a proficient chromosome encoding model is applied in the merge procedure.
The goals of this study are as follows: a) To study different image segmentation approaches in the literature, b) To review the objectives of optimization in image segmentation, c) To conduct and implement a genetic algorithm optimization for image segmentation. Experimental studies have shown that the above mentioned objectives are all achieved with the developed implementation.
Keywords: Image segmentation, genetic algorithms, genetic optimization.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Bu çalışma görüntü ayrıştırma işleminde genetik algoritmalar kullanılarak en iyileme yapmayı içerir. Geliştirilen uygulama parçala / birleştir yaklaşımına dayalı bir ayrıştırma yöntemidir. Parçalama işlemi için k-merkezli gruplama yöntemi kullanılırken, birleştirme yöntemi ve bununla ilgili en iyileme süreci verimli bir kromozom gösterimine sahip bir genetik algoritma ile yapılır.
Bu çalışmanın temel amacları şu sekilde sıralanabilir: a) Literatürde varolan çeşitli görüntü ayrıştırma yöntemlerini tanımak b) Görüntü ayrıştırmada temel amaçları belirlemek
c) Görüntü ayrıştırma işleminde en iyileme problemini bir genetik algoritma kullanarak çözmeye yönelik bir uygulama geliştirmek. Deneysel çalışmaların sonuçları geliştirilen uygulamanın yukarıda belirtilen amaçlara ulaşıldığını göstermiştir.
Anahtar Kelimeler: Görüntü bölütleme, genetik algoritma, genetik eniyileme.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Image Processing
Computer Vision
Image Segmentation - Genetic Algorithms - Genetic Optimization
Genetic Optimization for Image Segmentation
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F317/3/Doborjeh.pdf.txt
File
MD5
8d1e4797acf3ee25d09d76d16187eb09
98381
text/plain
Doborjeh.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F317/1/Doborjeh.pdf
File
MD5
302bbdbecbd155e5a62557b15282a9f3
2190599
application/pdf
Doborjeh.pdf
oai:i-rep.emu.edu.tr:11129/3412013-01-12T00:00:40Zhdl_11129_11
EMU I-REP
author
Musa, Aliyu Kabir
2013-01-11T12:23:52Z
2013-01-11T12:23:52Z
2012
Musa, Aliyu Kabir. (2012). The Role of Neurotransmitter Receptors in Mental and Behavioral Disorders: a Biomedical Text Mining Approach. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/341
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assoc. Prof. Dr. Ekrem Varoğlu.
ABSTRACT: Genetic variation in neurotransmitter receptors have been shown to be implicated both in behavioral variations across individuals in a given population and in various behavioral disorders. There are two aspects of synaptic neurotransmission in terms of its implications in behavioral disorders, both of which are important in healthcare management for such conditions. Firstly, particular allelic variations lead to an increased susceptibility to certain behavioral disorders. Secondly, specific allelic variations determine the response of affected individuals to available drug treatment options. Studies linking genetic variation and behavioral disorders are in general done on a single gene level and are focused on a single or a few disorders at a time. In this study, we aim to approach the relationship of neurotransmitter receptors to behavioral disorders from a different, more global perspective. We employ state-of-the-art text mining methods to put together a comprehensive database linking neurotransmitter receptors with specific mental and behavioral disorders. This study is unique in the sense that it provides this specific subset of gene-disease data. In addition, this tool is publicly accessible and enables researchers and healthcare professionals in the field to have easy access to a large amount of neurotransmission and disease data. This would facilitate analysis of the molecular bases of these conditions within a larger scope.
Keywords: biomedical text mining, machine learning, neurotransmitter receptors, mental disorders, behavioral disorders, gene-disease association, support vector machines.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Nörotransmiter reseptörlerindeki genetik varyasyonların kişilerin davranışlarına olan etkileri ve çeşitli davranışsal bozukluklarla bağlantıları gösterilmiştir. Sinaptik nörotransmisyonun davranışsal bozukluklara olan etkisi ve bu bozuklukların tedavisine yönelik önemi iki açıdan vurgulanabilir. Birincisi, çeşitli allelerdeki varyasyonlar, bazı davranışsal bozukluklar için risk faktörü oluşturabilir. İkincisi ise allelerdeki özgül varyasyonlar kişinin ilaç tedavisine nasıl yanıt vereceği konusunda belirleyicidir. Bu çalışmalar genelde tek bir gen düzeyinde olup, tek veya birkaç hastalığa odaklı olarak rapor edilmektedir. Bu çalışmada, nörotransmitter reseptörleri ve onların davranışsal bozukluklarla olan bağlantılarına farklı ve daha global bir açıdan yaklaştık. En güncel metin madenciliği yöntemlerini kullanarak, geniş kapsamlı bir veritabanı oluşturduk. Bu veritabanı reseptörleri, zihinsel ve davranışsal bozukluklarla birleştirmektedir. Kamuya açık olan bir veritabanı, araştırmacıların yüksek miktardaki nörotransmiter ve hastalık verisine kolayca ulaşıp, geniş kapsamlı analizler yapmalarını sağlamaktadır.
Anahtar kelimeler: biomedikal metin madenciliği, makineye dayalı öğrenme, vector destek makinaleri, nörotransmiter reseptör, zihinsel davranış bozuklukları.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Life Sciences - Data Processing
Text Processing (Computer Science)
Data Mining
Biomedical Text Mining - Machine Learning - Neurotransmitter Receptors - Mental Disorders - Behavioral Disorders - Gene-Disease Association - Support Vector Machines
The Role of Neurotransmitter Receptors in Mental and Behavioral Disorders: a Biomedical Text Mining Approach
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F341/3/Musa.pdf.txt
File
MD5
f6c9fc4d2a005c49554305c3b87ed9d1
129638
text/plain
Musa.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F341/1/Musa.pdf
File
MD5
ec7f971d093e04791fbac9bb804e7ab7
1803280
application/pdf
Musa.pdf
oai:i-rep.emu.edu.tr:11129/3432013-01-18T00:00:17Zhdl_11129_11
EMU I-REP
author
Rad, Javad Mohammadi
2013-01-17T06:11:20Z
2013-01-17T06:11:20Z
2012
Rad, Javad Mohammadi. (2012). Improving LSB Algorithm Using Filtering and Matching. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/343
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assoc. Prof. Dr. Alexander Chefranov.
ABSTRACT: In the age of computers and communications, different techniques are developed in order to protect the information against illegal accesses and attacks. Steganography is one of these techniques which embeds secret information in a media such as image, sound, video, and etc. in a way that it is not detectable by others. Focusing on the image, Least Significant Bit (LSB) method is one of basic methods of image steganography in which the least significant bit of pixel colors are replaced with the bits of secret message simply. Selected Least Significant Bits (SLSB) method improves simple LSB method by embedding secret message bits to one of red, green, or blue color along filtering and matching approaches [1]. In the present thesis, a new filtering method which improves LSB method has been proposed. The filtering method selects a color or colors of pixel for embedding according to their most significant bits (MSB; the bits of color which do not participate in embedding) value. The colors whose most significant bits value are greater than a particular threshold will participate in embedding and the other ones will be skipped. This mechanism makes the recovery of hidden message possible. More, a matching technique ensures the most possible closeness of new generated color in the embedding process to its original color. In other words, first bit next to the least significant bits would change in favor of closing new generated color to its origin and lead to less visibility of stego image degrading. Quality of embedding is measured by some statistical metrics namely AAD, MSE, LP-Norm, LMSE, SNR, PSNR, NCC. Applying the same cover images and secret messages to forenamed methods, the new proposed method offers up to %50 better results in some metrics in comparison to LSB and SLSB methods.
Keywords: LSB (Least Significant Bit), Filtering, Matching, Statistical Metrics.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Bilgisayar ve iletişim çağında, farklı teknikler yasadışı girişler ve saldırılara karşı bilgileri korumak amacıyla geliştirilmiştir. Steganografi bu tekniklerden biridir ki resim, ses, video gibi bir ortam içine başkalarının anlayamayacağı şeekilde gizli bilgileri gömer. Görüntü üzerinde yoğunlaşırken, ‘en önemsiz bit’ (LSB) steganografinin en önemli temel yöntemlerinden biridir ki pikselin en az anlamlı bitini gizli mesaj ile değiştirir. Seçilen en önemsiz biti (SLSB) filtreleme yöntemi boyunca kırmızı, yeşil veya mavi renklerden birine gizli mesaj bit gömme ve yaklaşımlar [1] ‘eşleştirerek basit’ ( LSB) yöntemi geliştirir. Bu tez çalışmasında, LSB yöntemi geliştirilmiş ve yeni bir filtreleme yöntemi önerilmiştir. Filtreleme yöntemi, en önemli biti (MSB; gömme işlemine katıılmayan renk biti) değerine göre gömmek için bir renk veya piksel renkleri seçer. Belli bir threshold değerinden yüksek olan en önemli bitin renkleri gömmeye katılacak, fakat diğerleri atlanacaktır. Bu mekanizma, gizli mesaj geri kazanımını mümkün kılar. Buna ek olarak eşleştirme tekniği, gömme işleminde üretilen yeni rengin orjinal renge mümkün olan en yakın renk olmasını sağlar. Diğer bir deyişle, en az önemli bitlerin yanındaki ilk bit orjinaline en yakın olabilecek şekilde yeni bir renge dönüşür ve stego görüntüsünü en aza indirir. Gömme Kalitesi bazı istatistiksel ölçümler yani AAD, MSE, LP-Norm, LMSE, SNR, PSNR, NCC tarafından ölçülür. Önerilen yöntem, bahsedilen ölçümlerle aynı resimler ve gizli mesajlar kullanılarak, diğer iki metotla karşılaştırıldığında %50 daha iyi sonuç vermektedir.
Anahtar kelimeler: En önemsiz bit (LSB), Filtreleme, Eşleştirme, İstatistiksel ölçümler.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Computer Security - Data Protection
LSB (Least Significant Bit) - Filtering - Matching - Statistical Metrics
Improving LSB Algorithm Using Filtering and Matching
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F343/3/JavadRad.pdf.txt
File
MD5
cdbe84dc3a33540d4ce9de98514d38c7
94900
text/plain
JavadRad.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F343/1/JavadRad.pdf
File
MD5
ec5bb0c1ae028d4dfc089337b8b5864f
1353334
application/pdf
JavadRad.pdf
oai:i-rep.emu.edu.tr:11129/3542013-01-18T00:00:38Zhdl_11129_11
EMU I-REP
author
Zawaideh, Firas
2013-01-17T14:17:15Z
2013-01-17T14:17:15Z
2012
Zawaideh, Firas. (2012). An Energy Efficient Clustering Algorithm for Wireless Sensor Networks (EECA). Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/354
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assoc. Prof. Dr. Muhammed Salamah.
ABSTRACT: Energy conservation has a main priority in all technology and engineering field. Most current applications that consume energy can be customized or optimized in a process resulting less energy consumption. During the rise of wireless sensors field applications, and also, the critical situation of energy consumption, the optimization of energy dispatch becomes a critical and important field of research. Hence, the wireless sensor depends on its internal battery to work its total life time, extending the life time by minimizing the consumption of power is also very important field in current researches. This research aims to optimize the energy consumption of wide scale wireless sensor networks by deploying a novel and adaptive improvement and modification on the traditional clustering of the cells of the network. In this thesis we work on load balancing of each cell in the network, introduce the “Potential” concept which is a measurement of node and cells overall availability and it is related to energy, distance and data transfer, deal with the nodes in between two clusters and finallymake all nodes die almost at the same time by using an adaptive system for solving these problems. This research improves the energy conservation with 93% regards to the original LEACH Algorithm. The results are shown and compared to the old LEACH, LEACH-M, and LEACH-L approaches, and this proposed algorithm will be named Energy Efficient Clustering Algorithm “EECA”.
Keywords: Wireless sensors networks, sensors clustering, LEACH, fuzzy logic.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Enerji tasarrufu tüm teknoloji ve mühendislik alanlarında öncelikli bir konu olarak karşımıza çıkmaktadır. Güncel uygulamaların birçoğu ihtiyaca göre uyarlanan, en iyi şekilde kullanılabilen ve daha az enerji tüketimi sağlayacak enerji harcama öğelerini içerir. Kablosuz algılayıcıların alan uygulamalarında olan artış süresince, hassas bir konu olan enerji tüketimi ve enerji dağılımını en iyi şekilde sağlamak önemli ve öncelikli bir araştırma konusu olarak karşımıza çıkmaktadır. Kablosuz algılayıcıların çalışma süresinin içte olan piline bağlı olmasından dolayı, bu algılayıcıların yaşam süresini harcadıkları enerji miktarını azaltarak daha etkili çalışmasını sağlamak güncel araştırma konuları içinde çok önemli bir alanı kapsamaktadır. Bu araştırma her hücrenin yük dengeleme üzerinde çalışmak, düğüm ve hücrelerin genel durumu bir ölçüsüdür "Potansiyel" kavramının tanıtılması ve enerji, mesafe ve veri transferi, iki küme arasında ve nihayet düğümleri ile anlaşma ile ilgilidir bu sorunların çözümü için bir adaptif sistem kullanılarak en iyi duruma getirmeyi amaçlamaktadır. Enerji korumasını yüzde 93 oranında iyileştirmeyi amaçlayan bu araştırma, aynı zamanda ağın farklı hücrelerinin iletişimsel olarak aktarılmasının dengesizliği sorununa da değinmekte ve bu sorunun çözümü için bir sistem önermektedir. Araştırma bulguları önceki LEACH, LEACH-M ve LEACH-L yaklaşımlarıyla karşılaştırılmıştır.
Anahtar Kelimeler: Kablosuz algılayıcı ağları, algılayıcı kümeleri, LEACH, bulanık mantık.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Computer Networks
Wireless Sensor Networks
Wireless Sensors Networks - Sensors Clustering - LEACH - Fuzzy Logic
An Energy Efficient Clustering Algorithm for Wireless Sensor Networks (EECA)
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F354/3/Zawaideh.pdf.txt
File
MD5
168aefbd088a7aebab651f44a741f96f
92677
text/plain
Zawaideh.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F354/1/Zawaideh.pdf
File
MD5
858096345e5e7d265a13f96dbe6482e9
977680
application/pdf
Zawaideh.pdf
oai:i-rep.emu.edu.tr:11129/5972013-08-12T23:00:24Zhdl_11129_11
EMU I-REP
author
Jassim, Humam M.
2013-08-12T06:20:42Z
2013-08-12T06:20:42Z
2013
Jassim, Humam M. (2013). An Investigation into the Dissipative Stochastic Mechanics Based Neuron Model under Noisy Input Currents. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/597
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Marifi Güler.
ABSTRACT: Guided by the existence of a multiple number of gates in each ion channel, it was recently expected that the activity equations of the neuronal dynamics obtain a number of renormalization terms, which play important role in the membranes that are small in size (Güler 2006, 2007, 2008, 2011, 2013). In this thesis, it is attempted to look into the dissipative stochastic mechanics based neuron model under noisy input currents. Specifically, it is concentrated on the role of input noise with reference to the renormalization terms in the model. The investigation shows that the use of noise in the inputs can improve the spiking rates and the spike coherence values, especially in the presence of the renormalization terms.
Keywords: Ion Channel Noise, Stochastic Ion Channels, Neuronal Dynamic, Hindmarsh-Rose Model, Dissipative Stochastic Mechanism Model.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Nöron zarlarındaki ion kanallarının çoklu geçit içermesinden dolayı, küçük boyutlu sinir hücresi dinamiğinin renormalizasyon terimleri içermesi gerektiği son yıllarda ileri sürülmüştür (Güler 2006, 2007, 2008, 2011, 2013). Bu tezde, yukarıdaki kapsamda ortaya konulan disipatif stokastik mekanik nöron modeli gürültülü girdi akımları altında incelenmiştir. Renormalizasyon terimlerinin varlığının etkisi özellikle bu kapsamda irdelenmiştir. Ateşleme oranlarının ve uyumluluğunun renormalizasyon ile arttığı gözlenmiştir.
Keywords: İon kanal gürültüsü, Stokastik ion kanalı, Nöron dinamiği, Hindmarsh-Rose modeli, Disipatif stokastik mekanik nöron modeli.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Ion Channel Noise - Stochastic Ion Channels - Neuronal Dynamic - Hindmarsh - Rose Model
Dissipative Stochastic Mechanism Model
An Investigation into the Dissipative Stochastic Mechanics Based Neuron Model under Noisy Input Currents
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F597/3/Jassim.pdf.txt
File
MD5
766160519ce5f87971aca33b1c374774
56656
text/plain
Jassim.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F597/1/Jassim.pdf
File
MD5
6384b94dc04158116c74b84ad7e4d236
1883033
application/pdf
Jassim.pdf
oai:i-rep.emu.edu.tr:11129/6042013-08-12T23:00:44Zhdl_11129_11
EMU I-REP
author
Fereidouni, Arash
2013-08-12T07:52:16Z
2013-08-12T07:52:16Z
2013
Fereidouni, Arash. (2013). Analysis of Connectivity in Diffusion-Based Molecular Nano Communication Networks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/604
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assoc. Prof. Dr. Doğu Arifler.
ABSTRACT: A nanonetwork is an interconnection of nano devices that are made up of nano-scale components. Several approaches for designing and implementing nanonetworks have been presented in recent years. Diffusion-based molecular communication is one of these approaches that use molecules as means of transmitting information in network. In diffusion-based molecular communication, molecules or particles diffuse in an aqueous environment under Fick’s laws of diffusion to move from transmitter to receiver. In order to have full cooperation among nano devices, there must exist a communication path between every communicating pair. Hence, the primary aim of this study is to employ methods used for analyzing random networks to evaluate connectivity properties of nanonetworks that employ diffusion-based molecular communication techniques. Extensive simulations have been performed to investigate the effects of varying node density, number of particles released per node, and concentration threshold for detection at the nodes. The corresponding results in two and three-dimensional environments have been presented.
Keywords: Connectivity, diffusion, molecular communication, nanonetwork.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Nano-ağlar, nano-ölçekte bileşenleri olan nano-aygıtların birbiriyle bağlanmasıyla oluşur. Son yıllarda, nano-ağların tasarım ve oluşturulması için çeşitli yaklaşımlar önerilmiştir. Difüzyona dayalı moleküler iletişim, yani ağda bilginin moleküller kullanarak taşınması, bu yaklaşımlardan bir tanesidir. Difüzyona dayalı moleküler iletişimde moleküller sıvı ortamda Fick’in difuzyon kanunu ile vericiden alıcıya hareket eder. Nano-aygıtlar arasında tam işbirliği için her verici-alıcı çifti arasında bir iletişim yolunun olması gerekir. Dolayısıyla, bu çalışmanın esas amacı, rasgele ağların analizinde kullanılan metodları kullanarak difüzyona dayalı moleküler iletişim kullanan nano-ağların bağlantısallık özelliklerini analiz etmektir. Aygıt sıklığı, aygıt başına yayılan parçacık sayısı, aygıtların yoğunluk algılama eşiği değerlerinin bağlantısallıktaki etkilerini incelemek için simulasyonlar yapılmıştır. Hem iki hem de üç boyutlu ortamlarda elde edilen sonuçlar değerlendirilmiştir.
Anahtar Kelimeler: Bağlantısallık, difüzyona, moleküler iletişim, nano-ağlar.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Computer Networks - Nanotechnology
Connectivity - Diffusion - Molecular Communication - Nanonetwork
Analysis of Connectivity in Diffusion-Based Molecular Nano Communication Networks
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F604/3/Fereidouni.pdf.txt
File
MD5
acd0190892506eda0454045b15a4118e
137383
text/plain
Fereidouni.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F604/1/Fereidouni.pdf
File
MD5
5d20cead89619cd09d3374d2dcd5bb4e
4391760
application/pdf
Fereidouni.pdf
oai:i-rep.emu.edu.tr:11129/6062013-08-12T23:00:33Zhdl_11129_11
EMU I-REP
author
Murtadha, Zainab
2013-08-12T08:23:13Z
2013-08-12T08:23:13Z
2013
Murtadha, Zainab. (2013). Dentist Web Based Patient Information System and Services in Cloud. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/606
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Erden Başar.
ABSTRACT: Context: Cloud Computing is the new field that was invented and developed during period not so long ago. It has a lot of benefit like decreasing the cost that the user need, process the operation faster, and memory and storage requirements are satisfied. The security of cloud is the most important issue for several sensitive occupation, for Dentist using this kind of computing does not need more than computer and good internet to use application which is developed by cloud computing. Objective: The goal this thesis is finding the benefit of using cloud computing for software application as Dentist development environment for dentist patient system and save their information on one database which is available in cloud. Then expect the future of Cloud Computing.
Methods: The environment that we use is EC2 on AWS (Amazon Web Services) as host for dentist web application which has several services to allow each dentist, and patient used the application separately and securely. SQL server is used for creating the database. This database is saved on server that is generated by a database management system on EC2. Results: Preparing web site for dentist allow each dentist to keep his patients’ information in database on cloud computing. Conclusion: Drought knowledge about cloud computing, precarious cost, and finding trust host are the Challenges that facing cloud computing now but I believe these problems will be solved in the near future. Keywords: Cloud computing, dentist application, Amazon Web Service(AWS),e-Heath.
…………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Kaynak : Bulut Bilgi İşlem , bilgisayar kullanımında yeni bir kavram ve çalışma sahası olup, gerçekleştirilecek yeni buluşlar ve gerçekleştirilecek yeni yazılımlarla her geçen gün zenginleşmektedir. Bu ortamda geliştirilen yazılımlar kullanıcılara bir çok avantajlar sağlamaktadır. Bu ortamlarda daha az maaliyetli bilgisayar olanaklarından yararlanılarak, işlemler daha hızlı yapılmakta, güvenilir ortamlarda işlenmekte ve daha büyük bellekler kullanılarak saklanabilmektedir. Bütün bu özellikleri kullanarak sağlık sektöründe yazılımlar geliştirilebilmektedir. Amaç : Dis hekimi Hasta takip sisitemi de Bulut Bilgi İşlem ortamı kullanılarak Web üzerinde bir sunucu üzerinde oluşturulan veri tabanında kayıtlı olan hastalara ait bilgilerin diş doktoru denetimindeki kullanımını hedef alıp geliştirilmiştir. Gerçekleştirilen sistemde ayrıca hastaların aynı veri tabanına ulaşarak randevu talepleri de karşılınabilmektedir. Bulut Bilgi İşlem olanakları olarak Amazon Web Servisi hizmetinden yararlanılmıştır. Hazırlanan sistemde bir çok metod tanımlanarak hastalara ilişkin her türlü veritabanı işlemleri ilgili diş hekimi tarafından güvenli olarak yapılabilmektedir. Sonuç: Bulut Bilgi İşlem günümüzde oldukça yaygın kullanım olanağı bulabileck bir servis, bir yazılım ortamı olup,diş hekimi hasta takip sisitemi de bu olanaklar kullanılarak gerçekleştirilmiş bir sistemdir ve diş hekimlerinin kullanımına sunulabilir özelliklere sahiptir. Ayrıca üzerinde yapılabilecek olan yeni değişikliklerle mobil uygulamaları ile bütünleştirilebilir alt yapına da sahiptir.
Anahtar Kelimeler: Bulut Bilgi işlem, Diş hekimi hasta Kayıt sistemi, Amazon Web Sevisi, e-Saglik.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Cloud Computing
Data Protection
Cloud Computing - Dentist Application - Amazon Web Service (AWS) - E-Health
Dentist Web Based Patient Information System and Services in Cloud
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F606/3/Murtadha.pdf.txt
File
MD5
9c69d75d6d94711e12d28c268d69d195
102925
text/plain
Murtadha.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F606/1/Murtadha.pdf
File
MD5
5247b0c204d49bf463c307a6dc8d955f
4229527
application/pdf
Murtadha.pdf
oai:i-rep.emu.edu.tr:11129/6112013-08-12T23:00:32Zhdl_11129_11
EMU I-REP
author
Uluçınar, Şerife
2013-08-12T11:34:28Z
2013-08-12T11:34:28Z
2013
Ulucinar, Serife. (2013). Coevolutionary Memetic Algorithms for Solving Traveling Salesman Problem (TSP). Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/611
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assist. Prof. Dr. Ahmet Ünveren.
ABSTRACT: In this thesis, Coevolutionary Memetic Algorithms are used for solving the well-known Traveling Salesman Problem (TSP). Traveling Salesman Problem is NP-Complete which means no algorithm can solve this problem in a computing time that increases polynomially with respect to the problem size. The proposed solution approach to TSP is the combination of Coevolutionary Algorithms and Memetic Algorithms. The objective solution to TSP is to find the minimum tour length that the Traveling Salesman can make under some restrictions. Coevolutionary Algorithms belong to the class of Evolutionary Algorithms. The main difference of Coevolutionary Algorithms from Evolutionary Algorithms is the way of interaction of individuals in the population. The individuals of the population should interact with each other to form a complete solution to the problem. Moreover, Memetic Algorithms are hybridized algorithms which combine the Evolutionary Algorithms with a local search method. Local search algorithms are the algorithms that refine the solutions by searching within the neighbourhood of promising solutions to find the better ones.
In experimental results, the proposed algorithm is tested with several test datas by different parameter values of the algorithm.
Keywords: Coevolutionary Algorithms, Memetic Algorithms, Traveling Salesman Problem.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Bu tezde, Birlikte Evrimleşen Memetik Algoritmaları iyi bilinen bir problem olan Gezici Satıcı Problemi’nin çözümü için kullanılmıştır. Gezici Satıcı Problemi, üzerinde çok çalışılan bir problem olması ile birlikte, bu problem hiçbir algoritma tarafından belirli bir hesaplama zamanında çözülebilecek bir problem olmaması ile de bilinir. Gezici Satıcı Problemi’ni çözme yaklaşımımız Birlikte Evrimleşen Algoritmalar ile Memetik Algoritmaları’nın birleşimi ile gerçekleşecektir. Bu problemdeki amacımız Gezici Satıcı’nın dolaşacağı şehirlerden oluşacak olan turdan bazı sınırlamalara uygun olarak en kısa tur mesafesini bulabilmektir. Birlikte Evrimleşen Algoritmalar, Evrimsel Algoritmaların bir sınıfıdır. Birlikte Evrimleşen Algoritmalar ile Evrimsel Algoritmalar arasındaki esas fark, Birlikte Evrimleşen Algoritmaların nüfustaki bireylerin arasındaki etkileşim yoludur. Bu algoritmalarda üzerinde çalışılan problemde bütün bir çözüm elde edebilmek için, nüfustaki bireylerin birbirleriyle bir etkileşim içinde olmaları gerekir. Memetik Algoritmaları ise, Evrimsel Algoritmaların ve bir Bölgesel Arama Algoritması’nın birlikte kullanımı ile oluşan algoritmalardır. Bölgesel Arama Algoritmaları, Evrimsel Algoritmalar tarafından bulunan çözümün etrafında, bu çözümü daha iyi bir çözüm haline getirecek aramalar yapan algoritmalardır. Birlikte Evrimleşen Memetik Algoritmaları, algoritma parametrelerinin farklı değerlerine göre birkaç test verileri ile test edilmiştir.
Anahtar Kelimeler: Birlikte Evrimleşen Algoritmalar, Memetik Algoritmaları, Gezici Satıcı Problemi.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Traveling Salesman Problem - Algorithms
Coevolutionary Algorithms - Algorithms - Memetic Algorithms - Traveling Salesman Problem
Coevolutionary Memetic Algorithms for Solving Traveling Salesman Problem (TSP)
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F611/3/Ulucinar.pdf.txt
File
MD5
c0e18ab22ce095f54b48695a79513e7a
78100
text/plain
Ulucinar.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F611/1/Ulucinar.pdf
File
MD5
0cf86b5c97cdb7cbd962a6c168b5fd49
857574
application/pdf
Ulucinar.pdf
oai:i-rep.emu.edu.tr:11129/6152013-08-16T08:15:10Zhdl_11129_11
EMU I-REP
author
Kalan, Reza Shokri
2013-08-12T12:21:07Z
2013-08-12T12:21:07Z
2013
Kalan, Reza Shokri. (2013). Improving Video-on-Demand Performance by Multi-channel/Multicast Approach in Wireless Networks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/615
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assoc. Prof. Dr. Işık Aybay.
ABSTRACT: Video on-demand (VoD) services and applications have become popular in wireless networks. VoD refers to requesting video which is stored on remote media servers. Many commercial products (e.g. PPLive and PPStream) are developed to support VoD applications. Two popular approaches in VoD area are peer-to-peer (P2P) and clientserver models. In a network (WAN, LAN, WWAN, or WLAN) when a client initiates a video request, it can stream the video from the servers on the network or from peer clients. Many networks use P2P technology to improve the VoD performance. In P2P
models, users store watched videos in their own local storages and can distribute them through the network to other peers when other users want to watch the same video. In this manner clients can download video from suitable neighbors. There are two ways for accessing a video stream: (a) over wired networks, (b) over wireless networks. Video on-demand streaming has been applied in wired networks with success. However, it remains a challenging task in wireless networks due to bandwidth problems and the effect of wireless interference and client mobility. This study aims at improving VoD performance in wireless networks based on multicasting and patching in clients. The simulation results show that the suggested methods improve VoD
performance. Keywords: Video on demand, Wireless networks, Cellular networks, Frequency band, and Buffer management.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Video on-demand (VoD) hizmetleri ve uygulamaları kablosuz aglarda popüler olarak kullanılmaktadır. VoD uzaktan medya sunucuları üzerinde depolanan bir videoyu talep etmek anlamına gelir. VoD alanında iki popüler yaklasım peer-to-peer (P2P) ve istemcisunucu modelleridir. WAN,LAN,WWAN,veya WLAN türü bir agda bir istemci bir video talep ettiginde, ilgili videonun bölümlerini uzak sunuculardan veya “komsulardan” indirebilir. P2P modelinde kullanıcılar izledikleri videoları kendi yerel bellekerinde tutarak, aynı ag içinde baska istemcilerden gelecek istekleri cevaplamak üzere devreye girebilirler. Böylece bir istemci, izlemek istedigi videonun bölümlerini “komsusundan” indirebilir. Bir videoyu kablolu veya kablosuz aglardan indirmek mümkündür. Kablolu aglar için bu konuda yeterli çalısma yapılmıstır. Ancak, kablosuz aglarda baglantı hızı, kullanıcının hareketliligi ve girisini sorunları nedeniyle etkin video transferi halen önemli bir arastırma konusudur. Bu çalısmada, kablosuz aglarda video transfer performansını arttırmak içın çoklu iletim (multicasting) ve yamalama (patching) yöntemleri önerilmis ve modellenerek simülasyonu gerçeklestirilmistir. Bulunan sonuçlar, önerilen yöntemlerin performansı arttırabildigini göstermektedir. Anahtar Kelimeler: Talep edilen video, Kablosuz aglar, Hücresel aglar, Frekans bandı ve Tampon bellek yönetimi.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Multimedia Systems
Video on Demand - Wireless Networks - Cellular Networks - Frequency Band and Buffer Management
Improving Video-on-Demand Performance by Multi-channel/Multicast Approach in Wireless Networks
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F615/3/Kalan.pdf.txt
File
MD5
b390e33b9b587562ef1c4e8ef945884a
112611
text/plain
Kalan.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F615/1/Kalan.pdf
File
MD5
7d0bc1aa503c60f55e70f2e3f53dd344
1010360
application/pdf
Kalan.pdf
oai:i-rep.emu.edu.tr:11129/6222013-08-13T23:00:25Zhdl_11129_11
EMU I-REP
author
Salh, Ahmad S.
2013-08-13T07:18:44Z
2013-08-13T07:18:44Z
2013
Salh, Ahmad S. (2013). Efficient Parallel Finite Difference Time Domain Algorithm for Modeling Electromagnetic Wave Interactions with Dispersive Objects. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/622
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Omar Ramadan.
ABSTRACT: The finite difference time domain (FDTD) method is the most wide spread time domain numerical simulation technique for solving Maxwell equations. The advantages of this method is that it is conceptually simple, and it is simple to be implemented for solving complicated electromagnetic problems. This method, however, is computationally expensive in terms of computational time and memory storage requirement. In this thesis, parallel finite difference time domain (FDTD) algorithm is presented for modeling open region dispersive electromagnetic applications. The algorithm is based on spatial partitioning of the problem geometry into adjacent non-overlapping sub-domains using the two-dimensional topology. The communication among the neighboring processors is carried out by using the message-passing-interface (MРI) library. The performance of the proposed algorithm parallel system, which is composed of (1-16) PCs interconnected through 100Mbps Ethernet, was illustrated for a point source radiating in three-dimensional Lorentz dispersive domain. It has been shown that with eight processors, a speedup factor of 5.6348 is obtained. On the other hand when the problem is distributed among many processors, the speedup decreases. This is because the communication time between neighboring processors becomes comparable to the computation time. Also, it has been found that the algorithm not only speed up the computations but also increases the maximum solvable problem size.
Keywords: Finite Difference Time Domain (FDTD), Message Passing Interface (MPI), Maxwell equations, Electromagnetic Applications.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Zamanda Sonlu Farklar Alanı Yöntemi (FDTD), Maxwell denklemlerinin çözümünde kullanılan en popüler sayısal simulasyon zaman alanı yöntemlerden birisidir. Bu yöntemin avantajları kavramsal olarak basit olması ve karışık elektromagnetik problemlerin çözümünde uygulanmasının kolay ve basit olmasıdır. Fakat, aynı zamanda bu yöntem hesaplama için harcanan zaman ve hafıza depolama koşulları bakımından pahalı bir yöntem olarak bilinmektedir. Bu tezde parallel sonlu farklar zaman alanı algoritmasının (FDTD) açık alanlı dağıtımcı elektromagnetik uygulamaların modellenmesinde kullanımı sunulmaktadır. Adı geçen algoritma iki boyutlu topoloji yöntemi kullanılarak geometrik problemlerin birbiriyle örtüşmeyen, bitişik alt alanlara bölünmesine dayanmaktadır. Bitişik işlemcilerin arasındaki iletişim ise mesaj iletme (MРI) kütüphanesi tarafından sağlanmaktadır. 100Mbps Ethernet aracılığıyle bağlanan (1-16) bilgisayarlardan oluşan algoritmik paralel sistemin performansı, üç boyutlu Lorentz dağıtıcı alanı aracılığıyla yayılan nokta kaynak olarak gösterilmiş ve sekiz adet işlemci aracılığıyle (5.6348) değerine sahip hızlanma faktörü elde edilmiştir. Diğer taraftan problem birçok işlemci arasında dağıtıldığı zaman iletişim zamanının hesaplanma zamanı ile kıyaslanabilir olmasından dolayı hızlanma faktörünün düştüğü ortaya çıkmıştır. Bütün bu bulgulara ek olarak adı geçen algoritma hesaplamayı hızlandırmakta ve aynı zamanda çözülebilecek problem büyüklüğünü de artırmaktadır.
Anahtar kelimeler: Zamanda Sonlu Farklar Alanı Yöntemi (FDTD), Message Passing Interface (MPI), Maxwell denklemleri, Elektromanyetik Uygulamalar.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Maxwell Equations - Numerical Solutions
Maxwell Equations - Data Processing
Electromagnetism - Data processing
Finite Difference Time Domain (FDTD) - Message Passing Interface (MPI) - Naxwell Equations - Electromagnetic Applications
Efficient Parallel Finite Difference Time Domain Algorithm for Modeling Electromagnetic Wave Interactions with Dispersive Objects
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F622/3/Salh.pdf.txt
File
MD5
913ffe1ee41be6ca0779afaaa145bcad
64659
text/plain
Salh.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F622/1/Salh.pdf
File
MD5
fc3aa6ce371a4a5085ac77c38c6b4c8f
1595872
application/pdf
Salh.pdf
oai:i-rep.emu.edu.tr:11129/6282013-08-13T23:00:45Zhdl_11129_11
EMU I-REP
author
Çobanoğlu, Sengül
2013-08-13T10:07:11Z
2013-08-13T10:07:11Z
2013
Cobanoglu, Sengul. (2013). A Critical Evaluation of Web Service Modeling Language. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/628
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assoc. Prof. Dr. Zeki Bayram.
ABSTRACT: The aim of this thesis is to analyze and evaluate the Web service Modeling Language (WSML) as the formal language of Web service Modeling Ontology (WSMO) and
then provide a number of improvement recommendations for obtained deficiencies in WSML. In order to facilitate understanding of our work, this thesis also briefly provides background information about web services, semantic web, semantic web ontology languages, Web Service Modeling Ontology and conceptual syntax of Web Service Modeling Language as well as logical formalism used by WSML. In this thesis, WSML has been critically analyzed and evaluated in detail by developing semantic web service for “University Course Registration” using the WSML rule variant and first order logic. At the end of the thesis the weak and missing parts of WSML were defined and possible suggestions were made for improvement.
Keywords: Web service modeling language, web service modeling ontology, web services,
semantic web, ontology.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Bu tezin amacı, web servisi gelistirmek için, Web Servisleri Modelleme Ontolojisi tarafandan, formal bir dil olarak kullanılan Web Servisi Modelleme dilini detaylı olarak inceleyerek değerlendirmek ve WSML’in eksik yönlerinini ortaya çıkartıp, gelistirici bazı tavsiyerde bulanmaktır. Ayrıca tezde, yaptığımız çalısmanın daha iyi anlasılması için web servisleri, anlamsal ağ, anlamsal ağ ontoloji dilleri, web servisi modelleme ontolojisi ve web servisi modelleme dili hakkında kısa açıklamalar verilmektedir. Bu tez de , WSML rule ve first order logic kullanılarak tanımladığımız “üniversite ders kayıt” web servisi üzerinden Web Servisi Modelleme dilini elestrisel olarak inceleyip ve sonucunda Web Servisi Modelleme dilinin güçsüz ve eksik yönlerini bularak, WSML’in gelistirilmesi için mümkün olan önerilerde bulunduk. Anahtar Kelimeler: Web servisi modelleme dili, web servisleri modelleme ontolojisi, web servisi, anlamsal ağ, ontoloji.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Web Services
Web Service Modeling Language (WSML)
Web Service Modeling Language - Web Service Modeling Ontology - Web Services - Semantic Web - Ontology
A Critical Evaluation of Web Service Modeling Language
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F628/3/Cobanoglu.pdf.txt
File
MD5
f288188f8d153e43346b3e1b24327fb2
141689
text/plain
Cobanoglu.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F628/1/Cobanoglu.pdf
File
MD5
c0d0fbfef2931f06f75ef47c9d82468b
1990930
application/pdf
Cobanoglu.pdf
oai:i-rep.emu.edu.tr:11129/6352013-08-13T23:00:25Zhdl_11129_11
EMU I-REP
author
Kamaei, Kamran
2013-08-13T11:45:38Z
2013-08-13T11:45:38Z
2013
Kamaei, Kamran. (2013). Editing the Nearest Feature Line Classifier. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/635
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Hakan Altınçay.
ABSTRACT: The main drawbacks in Nearest Feature Line classifier are the extrapolation and interpolation inaccuracies. The former can easily be counteracted by considering segment rather than lines. However, the solution of the latter problem is more challenging. Recently developed techniques tackle with this drawback by selecting a subset of the feature line segments either during training or testing. In this study, a novel framework is developed that involves a discriminative component. The proposed approach is based on editing the feature line segments. It involves three
major steps namely, error-based deletion, intersection-based deletion and pruning. The first step compares the benefit and cost of deleting each feature line segment and deletes those that contribute more to the classification error. For the implementation of the second step, a novel measure of intersection is defined and used for line segments in high dimensions to delete the longest of two intersecting segments. The pruning step re-evaluates the retained segments by considering their distances from the samples belonging to the other classes. The proposed approach is evaluated on
fifteen real datasets from different domains. Experimental results have shown that the proposed scheme achieves better accuracies on majority of these datasets compared to two recently developed extensions of the nearest feature line approach, namely the rectified nearest feature line segment and shortest feature line segment on majority of these datasets. Keywords: Pattern classification; nearest feature line; line segment editing; interpolation inaccuracy; extrapolation inaccuracy.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Enyakın öznitelik çizgisi sınıflandırıcısının en önemli zayıflıkları ekstrapolasyon ve interpolasyon hatalarıdır. İlki çizgiler yerine çizgi parçaları kullanılarak kolaylıkla telafi edilebilir. Ancak, sonraki problemin çözümü daha zorludur. Son dönemde önerilen yöntemler bu sorunla eğitme veya sınama aşamalarında öznitelik çizgi parçalarının altkümelerini seçerek başa çıkmaya çalışmaktadırlar. Bu çalışmada, ayırt edici bileşen de içeren yeni bir çerçeve geliştirilmiştir. Önerilen yöntem öznitelik çizgi parçalarını azaltmaya dayanmaktadır. Bu yaklaşım hataya-dayalı silme, kesmeye-dayalı silme ve budama olmak üzere toplam üç basamak içermektedir. Birinci aşama, her öznitelik çizgi parçasını silmenin kazanım ve bedelini karşılaştırır ve sınıflandırma hatasına katkı yapanları siler. İkinci basamağın uygulanması için yeni bir kesişme tanımı yapılmış ve yüksek boyutlu öznitelik uzayında kesişen öznitelik parçalarının uzun olanını silmek için kullanılmıştır. Budama aşamasında, geriye kalan öznitelik çizgi parçaları diğer sınıflara ait eğitme verisine olan
uzaklıkları dikkate alınarak yeniden değerlendirilmiştir. Önerilen yöntem, farklı alanlardaki onbeş gerçek veri kümesi üzerinde denenmiştir. Deneysel sonuçlar, önerilen yöntemin son yıllarda enyakın öznitelik çizgisi yaklaşımının uzantısı olarak geliştirilen düzeltilmiş en yakın öznitelik çizgi parçası ve en kısa öznitelik çizgi parçası isimli yaklaşımlara göre, veri kümelerinin çoğunda daha iyi başarım elde ettiğini göstermiştir. Anahtar Kelimeler: Örüntü sınıflandırma; en yakın öznitelik çizgisi; çizgi parçası seçme; interpolasyon hatası; ekstrapolasyon hatası.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Pattern Recognition Systems
Pattern Classification - Nearest Feature Line - Line Segment Editing - Interpolation Inaccuracy - Extrapolation Inaccuracy
Editing the Nearest Feature Line Classifier
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F635/3/Kamaei.pdf.txt
File
MD5
1b0e360de5791242d22aacb67d91ba23
82557
text/plain
Kamaei.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F635/1/Kamaei.pdf
File
MD5
c0622682e420801bd01922ba69ba002d
1343391
application/pdf
Kamaei.pdf
oai:i-rep.emu.edu.tr:11129/6572013-08-14T23:01:04Zhdl_11129_11
EMU I-REP
author
Kaplan, Alparslan
2013-08-14T08:41:26Z
2013-08-14T08:41:26Z
2012
Kaplan, Alparslan. (2012). Evolutionary Design of Radial Basis Function Neural Network for Data Modelling. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/657
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assist. Prof. Dr. Adnan Acan.
ABSTRACT: In this thesis, implementation of Radial Basis a Function Neural Network (RBFNN) using genetic algorithm is described. The developed algorithm is used to model a certain dataset by training a RBFNN using some part of it, and then testing the performance of this RBFNN using the rest of data. The objective function of the proposed algorithm is to minimize the error between the computed output by the model and the target output given in the dataset. The genetic algorithm used in this thesis is an evolutionary algorithm that uses natural evolutionary process for selection and reproduction. An individual is constructed from the RBFNN parameters, which are hidden units, centers, weights, widths and bias associated with hidden units and output of RBFNN. Therefore, the fitness values are also assigned to all chromosomes as a result of getting the difference between the target output and the computed output by the RBFNN, in which a Gaussian function was used as an activation function. In experimental results, different tests were conducted in order to see the performance and correctness of the developed model. Since the number of hidden units plays an important role as well as weights, the intervals of weight values were adjusted accordingly and the number of hidden units was changed for different tests. As a result of conducted experiments, it is observed that the developed algorithm is successful in obtaining good results by minimizing the error. Keywords: Evolutionary algorithms, Radial Basis Functions, Data Modeling.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Bu tezde Radyal Tabanlı Fonksiyonlar Ağı (RTFA), genetik algoritması kullanılarak tasarımlanmıştır. Geliştirilen algoritma modellenmesi hedeflenen belirli bir veri kümesinin bir kısmını öğretme geri kalan kısmını test için kullanmaktadır. Geliştirilen algoritmanın amaç fonksiyonu bulunan model ile verilen hedef çıktı arasındaki hatayı en aza indirmektir. Bu tezde kullanılan genetik algoritma bir evrimsel algoritmadır. Bu genetik algoritmadaki bireyler RTFA parametrelerinden oluşturulmuştur: gizli birimler, merkezler, ağırlıklar, genişlikleri ve sapma. Bireylere verilen uygunluk değeri olarak, bulunan model ile verilen hedef çıktı arasındaki fark kullanılmaktadır. RTFA’nın gizli birimlerinde aktivasyon işleri olarak Gauss işleri kullanılmıştır.
Deney sonuçlarında, geliştirilen modelin performans ve doğruluğunu kontrol etme amaçlı farklı testler uygulanmıştır. Deneysel sonuçları elde ederken RTFA parametrelerinden en önemli iki parametre olan gizli birimlerin sayısı ve ağırlıkların değerleri değiştirilmiş ve sonuçlar gözlemlenmiştir. Deneysel sonuçlar neticesinde geliştirilen uygulamanın, iyi sonuçlar bulma ve hatayı en aza indirmede başarılı bir yöntem olduğu tespit edilmiştir. Anahtar Kelimeler: Evrimsel algoritmalar, Radyal Tabanlı Fonksiyonlar Ağı, Veri Modelleme.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Neural Networks (Computer Science)
Evolutionary Computation
Evolutionary Algorithms - Radial Basis Functions - Data Modeling
Evolutionary Design of Radial Basis Function Neural Network for Data Modelling
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F657/3/Kaplan.pdf.txt
File
MD5
0f790e2f543ad5557aaefa37d626c6a2
72644
text/plain
Kaplan.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F657/1/Kaplan.pdf
File
MD5
030b327f44b8f8d9e7cef6d30dfd8adb
907835
application/pdf
Kaplan.pdf
oai:i-rep.emu.edu.tr:11129/6602013-08-14T23:00:28Zhdl_11129_11
EMU I-REP
author
Alagha, Sharif
2013-08-14T10:12:09Z
2013-08-14T10:12:09Z
2013
Alagha, Sharif. (2013). Queuing-Based Dynamic Multi-Guard Channel Scheme for Voice/Data Integrated Cellular Wireless Networks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/660
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assoc. Prof. Dr. Muhammed Salamah.
ABSTRACT: In voice/data integrated cellular wireless networks where handoffs occur more often than earlier mobile networks, it’s important to introduce a scheme that gives priority to handoff calls over new calls. From the user’s perspective dropping a handoff call is less desirable than blocking a new one. Furthermore, from the service provider’s point of view the objective is to improve the utilization of the wireless channel. Motivated with these arguments, a new scheme named as (QDCRS) is proposed which combines the features of Dynamic Channel Reservation Scheme (DCRS) and Handoff Queuing Scheme (HQS). The design goal is to maintain a low dropping probability while decreasing the blocking probability and improving the system performance. Traffic is divided into four classes and priority is given in the following order: (1. handoff voice calls, 2. handoff data calls, 3. new voice calls, 4. new data calls). The boundary between traffic classes is dynamically adjusted according to the mobility of calls and status of the network. Moreover, there is a queue (Q) with capacity (K) for handoff data calls. There is no similar queue for other classes of traffic. The proposed scheme is modeled by a two-dimensional Markov chain in order to obtain the steady state probabilities of the system. Performance of the proposed scheme is investigated in terms of blocking/dropping probabilities and channel utilization. Results obtained analytically and through simulation indicate that the proposed scheme exhibits the best Grade of Service (GoS) cost function and performance/cost (Z) function values, compared to the well-known Fully Shared Scheme (FSS) and the Guard Channel Scheme (GCS) and it maintains its superiority under heavy load and variant mobility.
Keywords: Voice/data integrated cellular networks, Dynamic channel reservation, Handoff queuing, Quality of Service (QoS).
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Entegre ses/veri hücresel kablosuz ağlarda, hücreler arası transferi daha sık oluştuğu için, hücreler arası transfer çağrıları yeni çağrılardan daha öncelik veren bir tasarı önermek çok önemlidir. Kullanıcı açısından devam eden bir çağrı kesmek yeni bir çağrı engellemekten daha az tercih edilmektedir. Ayrıca, hizmet sağlayıcının açısından bakıldığında kablosuz kanallar kullanımını artırmak en önemli amacı olduğunu belinmektedir. Yukarıdaki düşüncelerden motive edilerek, dinamik kanal ayırma yöntemi (DCRS) ve hücreler arası transfer çağrıları sıralama yonteminin (HQS) birleştiren yeni bir yöntem (QDCRS ) önerilmiştir. Bu yöntemin ana hedefi düşük çağrı bırakma olasılığı korumakla birlikte yeni çağrı engelleme olasılığı azaltmak ve sistem performansını iyileştirmektir. Bu yontemede trafik dört sınıfa ayrılmıştır ve aşağıdaki sıraya göre öncelik verilir: 1. hücreler arası transfer ses çağrıları, 2. hücreler arası transfer veri çağrıları, 3. yeni ses çağrıları, 4. yeni veri çağrıları. Trafik sınıfları arasındaki sınır arama hareketliliği ve ağ durumunu göre dinamik olarak ayarlanılmaktadır. Ayrıca, hücreler arası transfer veri çağrıları için (K) kapasiteli bir kuyruk (Q) vardır. Diğer trafik sınıflar için öyle bir sıra yoktur. Önerilen tasarı, sistemin kararlı-durum olasıkları değerlerini elde etmek için, iki boyutlu bir Markov zinciri ile modellenmiştir. Önerilen QDCRS yönteni performans engelleme/bırakma olasılıklar ve kanal kullanımı açısından incelenmiştir. Kapsamlı benzetim ve analitik çalışmaları sonucunda elde edilen performans değerlendirme sonuçları, önerilen tasarının, literatürde önerilen diğer yöntemlerden (FSS ve GCS) daha iyi olduğunu göstermektedir, ve bu üstünlüğü değişken hareketlilik ve ağır yük altında sürdürmektedir.
Anahtar Kelimeler: Ses/veri bütenleşmiş hücresel ağları, Dinamik kanal ayırma, hücreler arası transfer sıralama, hizmet kalitesi (QoS).
en
Eastern Mediterranean University (EMU)
Computer Engineering
Voice/data Integrated Cellular Networks - Dynamic Channel Reservation - Handoff Queuing - Quality of Service (QoS)
Queuing-Based Dynamic Multi-Guard Channel Scheme for Voice/Data Integrated Cellular Wireless Networks
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F660/3/Alagha.pdf.txt
File
MD5
3599f376d8d9ac1a84590279a1015ddd
85673
text/plain
Alagha.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F660/1/Alagha.pdf
File
MD5
b365b296f1536b5053061dd90b9f5287
677224
application/pdf
Alagha.pdf
oai:i-rep.emu.edu.tr:11129/6702013-08-15T23:00:25Zhdl_11129_11
EMU I-REP
author
Fadhil, Omar Hayman
2013-08-15T05:04:48Z
2013-08-15T05:04:48Z
2013
Fadhil, Omar Hayman. (2013). An Investigation into the Colored Stochastic Hodgkin-Huxley Equations Under Time Varying Input Currents. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/670
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Marifi Güler.
ABSTRACT: In recent years, it has been argued and shown experimentally that ion channel noise in neurons can cause fundamental effects on the neuron’s dynamical behavior. Most profoundly, ion channel noise was seen to be able to cause spontaneous firing and stochastic resonance. It was recently found by Güler (2011) that a non-trivially persistent cross correlation regard position among thе transmembrane voltage fluctuations and the element of open channel fluctuations attributed to the gate multiplicity. This non-trivial phenomenon was found to be playacting an essential important role for the elevation of excitability and spontaneous firing in the small size cell. Furthermore, the same phenomenon was found to be enhancing thе spike coherence significantly. More recently, thе effects of thе above cross correlation persistency was modeled; by thе same author M. Güler (2013), through inserting some colored noise terms inside thе conductances in thе stochastic Hodgkin Huxley equation. In this thesis, we study the above colored stochastic equations under time varying periodic input currents. Our investigation reveals that above a critical value of the input frequency and also below a certain amplitude value, the colored terms play a very prominent role on the firing statistics.
Keywords: colored noise, channel gate, Ion channel, small size membrane, channel noise, Stochastic Hodgkin-Huxley equations.
……………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Son yıllarda, nöronlardaki ion kanal gürültüsünün sinir hücresinin dinamiği üzerinde hayati bir etki yapabileceği ileri sürülmüş ve deneysel olarak da kanıtlanmıştır. İon kanal gürültüsünün, çarpıcı bir şekilde, kendi kendine ateşlemeye ve stokastik resonansa sebep olabildiği bulunmuştur. İon kanallarında çoklu geçit bulunmasının, voltage dalgalanmaları ve açık kanal dalgalanmaları arasında ilk bakışta gözükmeyen bir daimi çapraz ilişkiye neden olduğu yakın zamanda Güler (2011) tarafından ortaya çıkartılmıştır. Bu ilk bakışta gözükmeyen olgunun, küçük boyutlu hücrelerde yüksek uyarılıma ve kendi kendine ateşlemeye neden olduğu bulunmuştur. Daha yakın zamanda, sözkonusu olgunun etkileri, stokastik Hodgkin-Huxley denklemlerinde geçirgenliklere renkli gürültü terimleri ekleyerek, Güler (2013) tarafından modellenmiştir. Bu tezde, yukarıdaki reklendirilmiş Hodgkin-Huxley denklemleri zaman değişmeli periyodik girdi akımları altında incelenmiştir. Girdilerin kritik bir frekans değerinin üzerinde olması ya da belirli bir genlik değerinin altında olması durumlarında, renkli gürültü terimlerinin çok hayati bir önem arz ettiği gözlenmiştir.
Anahtar Kelimeler: Renkli gürültü, kanal geçiti, ion kanalı, küçük boyutlu zar, stokastik Hodgkin-Huxley denklemleri.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Stochastic Control Theory
Colored Noise - Channel Gate - Ion Channel - Small Size Membrane - Channel Noise - Stochastic Hodgkin-Huxley Equations
An Investigation into the Colored Stochastic Hodgkin-Huxley Equations Under Time Varying Input Currents
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F670/3/Fadhil.pdf.txt
File
MD5
9f076929bda1377848c8f6e9416b7820
54220
text/plain
Fadhil.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F670/1/Fadhil.pdf
File
MD5
243fbf8f5d38dddedf09fc49efed9c79
1637104
application/pdf
Fadhil.pdf
oai:i-rep.emu.edu.tr:11129/6852013-08-16T23:00:35Zhdl_11129_11
EMU I-REP
author
Okoli, Anurika
2013-08-16T10:53:05Z
2013-08-16T10:53:05Z
2012
Okoli, Anurika. (2012). Investigation of the Effect of Mobility Models on Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/685
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assist. Prof. Dr. Gürcü Öz.
ABSTRACT: Mobile ad hoc networks are made up of wireless mobile nodes. In this mobile ad hoc network, wireless mobile nodes convey messages to each other without any pre-established infrastructure or centralized control. Wireless ad hoc networks eradicate the complications which may arise while setting up the infrastructure. The mobility model is crucial when evaluating routing protocols performance in ad hoc mobile networks. Two parameters are very important when dealing with the mobility behavior of mobile nodes, these parameters are pause time and maximum speed.
The aim of this study is to investigate the effect of mobility models on proactive and reactive routing protocols for mobile ad hoc networks. Ad Hoc on Demand Distance Vector and Destination Sequenced Distance Vector are used in our simulation as the proactive and reactive routing protocols respectively. Reference Point Group Mobility model and Random Way Point Mobility model are the group and entity mobility model used in our simulation to compare and analyze the performance of the routing protocols. In this study, the behavior analysis and comparison of the routing protocols under different mobility scenarios are evaluated using Network Simulator 2 and results of the simulations are presented. The results presented depend on four important performance metrics of ad hoc networks, which are average end-to-end delay, packet delivery ratio, normalized routing load or overhead and average number of hops. Keywords: Mobile ad hoc networks (MANETs), Routing protocols, Mobility models, Simulation, Performance evaluation, and Network simulator (NS-2).
…………………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Gezgin özel amaca yönelik ağlar kablosuz gezgin düğümlerden oluşmaktadır. Bu ağlarda gezgin noktalar birbirleriyle önceden kurulmuş herhangi bir yapı ya da merkezi kontrol olmaksızın mesajlaşabilmektedirler. Kablosuz gezgin ağlar altyapı kurulumlarında ortaya çıkan sorunları kaldırmaktadır. Devingenlik modelleri gezgin özel amaca yönelik ağlarda yönlendirme protokollerinin performansını ölçmede çok önemlidir. Gezgin düğümlerin devingenlik durumlarının üstesinden gelirken azami hız ve duraklama zamanı iki önemli parametredir. Bu tezin amacı devingenlik modellerinin gezgin özel amaca yönelik ağlarda kullanılan önceden etkin (proactive) ve tepkin (reactive) protokollerine olan etkisini incelemektedir. Simulasyonlarda, önceden etkin protokollerinden Birbirini İzleyen Hedef Uzaklık Vektörü (DSDV) protokolü, Özel Amaca Yönelik Talepli Uzaklık Vektörü (AODV) protokolü kullanılmıştır. Yönlendirme, protokollerinin performanslarını karşılaştırmak ve analiz etmek için Dayanak Noktası Grup Devingenlik (RPGM) modeli ve Rasgele yol Noktası Devingenlik (RWPM) modeli kullanılmıştır. Bu çalışmada yönlendirme protokollerinin performanslarını farklı devingenlik senaryolarında analiz etmek, karşılatırmak ve ölçmek için Ağ Simulatorü 2 (NS-2) kullanılmış ve simulasyon sonuçları sunulmuştur. Sonuçlar özel amaca yönelik ağlarda kullanılan dört önemli performans ölçütüyle verilmiştir. Kullanılan performans ölçütleri paket dağıtım oranı, normalize edilmiş yönlendirme yükü, ortalama sekme sayısı ve ortalama uçtan uca gecikmedir. Anahtar Kelimeler: Gezgin özel amaca yönelik kablosuz ağlar (MANETS), Yönlendirme protokolleri (AODV ve DSDV), Devingenlik modelleri (RWPM ve RPGM), Performans değerlendirme, Ağ simulatörü 2 (NS-2).
en
Eastern Mediterranean University (EMU)
Computer Engineering
Mobile Communication Systems
Ad Hoc Networks (Computer Networks)
Mobile Ad Hoc Networks (MANETs) - Routing Protocols - Mobility Models - Simulation - Perormance Evaluation - and Network Simulator (NS-2)
Investigation of the Effect of Mobility Models on Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F685/3/Okoli.pdf.txt
File
MD5
42963bc85ef45a4a125db879830eca9c
105761
text/plain
Okoli.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F685/1/Okoli.pdf
File
MD5
01dc1fe69308db359b9fc977ce22c79d
805452
application/pdf
Okoli.pdf
oai:i-rep.emu.edu.tr:11129/12222013-11-13T00:00:31Zhdl_11129_11
EMU I-REP
author
Hameed, Alaa Ali
2013-11-12T11:18:30Z
2013-11-12T11:18:30Z
2012
Hameed, Alaa Ali. (2012). Real-Time Noise Cancellation Using Adaptive Algorithms. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1222
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Prof. Dr. Hasan Kömürcügil.
ABSTRACT: The contamination of a signal of interest by other undesired signals (noise) is a problem encountered in many applications. The conventional linear digital filters with fixed coefficients exhibit a satisfactory performance in extracting the desired signal when the signal and noise occupy fixed and separate frequency bands. However, in most applications, the desired signal has changing characteristics which requires an update in the filter coefficients for a good performance in the signal extraction. Since the conventional digital filters with fixed coefficients do not have the ability to update their coefficients, adaptive digital filters are used to cancel the noise. The mean square error (MSE) technique is used as a measure of the noise reduction. The adaptive filter generally uses finite impulse response (FIR) least-mean-square (LMS) and normalized LMS (NLMS) algorithms in signal processing or infinite impulse response (IIR) recursive-least-squares (RLS) algorithm in adaptive control for the noise cancellation applications. The main aim of this thesis is to investigate the implementation of a real time noise cancellation application. The real time implementation is carried out by a Texas Instruments (TI) TMS320C6416T Digital Signal Processor (DSP). First, the LMS, NLMS and RLS algorithms are simulated using SIMULINK of MATLAB. Then, these algorithms have been transferred to the DSP board which let, them to work alone in real time independent of MATLAB. Furthermore, the performance of the aforementioned algorithms has been compared in different problem settings.
Keywords: Adaptive Filters, FIR Filters, IIR Filters, LMS Algorithm, NLMS Algorithm, RLS Algorithm.
…………………………………………………………………………………………………………
ÖZ: Bir sinyalin, istenmeyen sinyal (gürültü) tarafından kirlenmesi birçok uygulamada karşı karşıya kalınan bir problemdir. Geleneksel sabit katsayılı doğrusal sayısal süzgeçler, sinyal ve gürültü sabit ve ayrı frekans bandlarını işgal ettiği zaman, istenen sinyalin elde edilmesi için yeterli bir performans sergilerler. Bununla birlikte, birçok uygulamada, istenen sinyalin değişen karakteristikerinden dolayı sinyal elde işleminde iyi bir performans elde etmek için süzgeç katsayılarında bir güncellemeye ihtiyaç duyulmaktadır. Geleneksel sabit katsayılı sayısal süzgeçlerin katsayılarını güncelleme yeteneği olmadığı için gürültüyü yok etmek için uyarlanabilir sayısal süzgeçler kullanılmaktadır. Ortalama–kare-hata tekniği gürültü azaltma ölçümü olarak kullanılır.
Uyarlanabilen sayısal süzgeç, genellikle sonlu-dürtü-cevabı (FIR) enaz-ortalama-kare (LMS) ve normalize olmuş LMS (NLMS) algoritmalarını sayısal sinyal işleme alanında veya sonsuz-dürtü-cevabı (IIR) tekrarlanan-enaz-kare (RLS) algortimasını gürültü yoketme uygulamalarında kullanır.
Bu tezin esas amacı gerçek zamanda bir gürültü yoketme uygulamasını araştırmaktır. Gerçek zaman uygulaması, Texas Instruments TMS320C6416T sayısal sinyal işlemcisi ile MATLAB‘ın Simulink ortamında yapılmıştır. İlk olarak, LMS, NLMS ve RLS algoritmalarının benzetimi yapılmıştır. Daha sonra, bu algoritmalar sayısal sinyal işlemcisine transfer edilerek sayısal sinyal işlemcisinin MATLAB’dan bağımsız olarak gerçek zamanda kendi başına çalışması sağlanmıştır. Ayrıca, adı geçen algoritmaların performansı farklı problemler için karışlaştırılmıştır.
Anahtar kelimeler: Uyaranabilir süzgeçler, FIR süzgeçler, IIR süzgeçler, LMS algoritması, NLMS algoritması, RLS algoritması, EDICATION.
en
Eastern Mediterranean University (EMU)
Computer Engineering
Speech Processing Systems - Automatic Control
Adaptive Filters - FIR Filters - IIR Filters - LMS Algorithm - NLMS Algorithm - RLS Algorithm
Real-Time Noise Cancellation Using Adaptive Algorithms
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1222/3/Hameed.pdf.txt
File
MD5
87563557b1ae0035da89c059b1d384cf
66330
text/plain
Hameed.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1222/1/Hameed.pdf
File
MD5
a0ce12bb9c6a286dc72d8e9a5d59edbf
1880460
application/pdf
Hameed.pdf
oai:i-rep.emu.edu.tr:11129/13162014-09-15T23:00:40Zhdl_11129_11
EMU I-REP
author
Shah, Mohammad Ahmed
2014-09-15T13:26:00Z
2014-09-15T13:26:00Z
2014-01
Shah, Mohammad Ahmed. (2014). Distributed continuous media streaming - Using redundant hierarchy (RED-Hi) servers. Thesis (Ph.D.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1316
Doctor of Philosophy in Computer Engineering. Thesis (Ph.D.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Işık Aybay.
ABSTRACT: The first part of this thesis provides a survey of continuous media serves, including discussions on streaming protocols, models and techniques. In the second part, a novel distributed media streaming system is introduced. In order to manage the traffic in a fault tolerant and effective manner a hierarchical topology, so called redundant hierarchy (RED-Hi) is used. The proposed system works in three steps, namely, object location, path reservation and object delivery. Simulations are used to show that the scheme, proposed here, performs better than the traditionally used multimedia transmission models in terms of various parameters. Results show that this scheme gives better transmission rates and much lower blocking rates. Furthermore it exhibits higher fault tolerance and greater load balancing of the streaming tasks among the servers of the streaming system. Keywords: Distributed Multimedia, Video Streaming Object Location, Object Delivery, Load Balancing, Fault Tolerance.
…………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Bu tezin ilk kısmında sürekli medya içerik sağlayıcıları ile ilgili çalışmalar ile akış protokolleri, model ve teknikleri üzerine tartışmalaryer almaktadır. İkinci kısımda ise yeni bir dağılımlı medya akış modeli tanıtılmıştır. Bu modeled hata toleranslı ve etkili bir trafik yönetimi için “fazlalık hiyerarşisi” olarak adlandırılan bir hiyerarşik topoloji kullanılmıştır. Önerilen sistem içerik yer belirlemesi,, yol belirlemesi ve içerik dağıtımı olmak üzere üç adımda çalışır. Tezde yapılan simülasyonlar, sunulan yeni modelin çeşitli parametreler açısından geleneksel multimedya iletim modellerinden daha iyi işlediğini göstermektedir. Elde edilen sonuçlar, bu modelin daha yüksek hata toleransı ve çok daha düşük engelleme hızlarıyla daha yüksek iletim hızları sağladığını göstermiştir. Ayrıca akış sistemlerinin sunucuları üzerinde akış görevlerinde daha büyük yük dengeleme sağlanmıştır. Anahtar Kelimeler: Dağılımlı multimedya, video akış sistemi, içerik belirleme, içerik dağıtımı, yük dengeleme, hata toleransı.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Multimedia systems
Distributed multimedia, video streaming object location, object delivery, load balancing, fault tolerance
Distributed continuous media streaming - Using redundant hierarchy (RED-Hi) servers
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1316/3/ShahMohammad.pdf.txt
File
MD5
eee886e56f2ac82cb31f39267f6c765c
179072
text/plain
ShahMohammad.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1316/1/ShahMohammad.pdf
File
MD5
a51ab9d7d9c626f6a0024c2331b2421a
2081083
application/pdf
ShahMohammad.pdf
oai:i-rep.emu.edu.tr:11129/13342014-09-17T23:00:45Zhdl_11129_11
EMU I-REP
author
Faravar, Arian
2014-09-17T12:15:47Z
2014-09-17T12:15:47Z
2014-02
Faravar, Arian. (2014). Design, implementation and control of a robotic arm using PIC 16F877A microcontroller. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1334
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Prof. Dr. Hasan Kömürcügil.
ABSTRACT: This thesis focuses on design, implementation and control of a five degree of freedom (DoF) robotic arm using servo motors. The control of robotic arm is achieved by a PIC 16F877A microcontroller. The main duty of microcontroller is to generate pulse width modulation (PWM) signals which are applied to servo motors for achieving the desired rotation. Each servo has a different specification. Therefore, a PWM pulse could have a different effect on servos. Most of the time, it is crucial to apply the exact PWM pulses for achieving the desired rotation. The main advantage of controlling the servo motors with PWM signals is that they can be programmed to have an initial position and to rotate with an exact degree with respect to the requirements. In this study, six servo motors are employed to realize the robotic arm. Four servos are utilized to control the body motion including base, shoulder and elbow and two smaller servos are employed for the motion of end effector.
In this thesis, a general formula is derived for finding the pulse duration (pulse width) so as to achieve the desired rotation in each servo motor. The main advantage of this formula is that it can be used for any servo motor with different specification. The operation of designed robotic arm has been experimentally verified. Simulation and experimental results are presented and discussed. Keywords: Microcontroller, Servo Motor, PWM, Roboticiv.
…………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Bu tez serbestlik derecesi beş olan robot kolunun servo motorlar kullanılmak suretiyle tasarımı, uygulaması ve denetimi üzerine odaklanmıştır. Robot kolunun denetimi PIC 16F877A mikroişlemcisi tarafından başarılmıştır. Mikroişlemcinin esas görevi istenen dönme hareketinin gerçekleştirilmesi için servo motorlara uygulanacak olan darbe genişlik modülasyonlu (DGM) sinyalleri üretmektir. Her servo motorun farklı bir çalışması vardır. Dolayısıyla, bir DGM darbesinin servo motorun üzerinde farklı bir etkisi olabilir. Çoğu zaman, istenen dönme hareketini gerçekleştirmek için, doğru DGM darbelerini uygulamak çok önemlidir. Servo motorların DGM sinyalleri ile control edilmesinin esas avantajı, servo motorların programlama yardımıyla başlangıç pozisyonunu elde etmesi ve istenen açı ile dönmelerinin gerçekleştirebilmesidir. Bu çalışmada, robot kolunun gerçekleştirilmesinde toplam altı servo motor kullanılmıştır. Bunlardan, dört servo motor taban, omuz ve dirsek hareketlerini içeren gövde hareketinin kontrolünü sağlamak için kullanılmıştır. Geriye kalan iki küçük servo motor ise sondaki efektör hareketinin denetimi için kullanılmıştır.
Bu tezde, servo motorlar için istenen dönme hareketini yapacak olan darbe süresinin bulunmasını sağlayan genel bir formül türetilmiştir. Bu formülün esas avantajı, farklı özelliklere sahip servo motorlara uygulanabilir olmasıdır. Tasarlanan robot kolunun çalışması deneysel olarak yapılmıştır. Benzetim ve deneysel sonuçlar sunulmuş ve tartışılmıştır.
Anahtar Kelimeler: Mikroişlemci, Servo Motor, DGM, Robotik.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Microcontrollers - Programming
Electric motors - Electronic control
Microprocessors
Microcontroller, Servo Motor, PWM, Robotic
Design, implementation and control of a robotic arm using PIC 16F877A microcontroller
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1334/3/FaravarArian.pdf.txt
File
MD5
994c66dc30763f20af9aa0233a65201e
69416
text/plain
FaravarArian.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1334/1/FaravarArian.pdf
File
MD5
780a38559074395623f62295308c0590
3081125
application/pdf
FaravarArian.pdf
oai:i-rep.emu.edu.tr:11129/13392014-09-19T23:00:47Zhdl_11129_11
EMU I-REP
author
Kouchaksaraei, Hadi Razzaghi
2014-09-19T07:13:40Z
2014-09-19T07:13:40Z
2013-07
Kouchaksaraei, Hadi Razzaghi. (2013). Vulnerability in cloud computing. Securing SOAP message using SESoap method. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1339
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assoc. Prof. Dr. Alexander G. Chefranov.
ABSTRACT: Cloud computing is a concept based on Internet, which delivers large scalable computing resources, as services over the Internet. The main benefit of this technology is the decrease of capital and operational costs, which has caused industrial companies and research communities pay attention to this technology, increasingly. A typical cloud computing systems has special characteristics. According to, five major characteristics have been considered for a typical cloud system. Having those characteristics, there are also three major service models, for each system, which are namely, Cloud Software as a Service (SaaS), Cloud Platform as a Service (PaaS), Cloud Infrastructure as a Service (IaaS). It should be added here that although there are a lot of positive features counted for cloud systems, there are also some problems that slacken this technology’s development. One of the most critical issues, is security, which threatens the successfulness of cloud computing. It is known that the exchange of information between web applications is done by means of the SOAP protocol. Securing this protocol is obviously a vital issue for any computer network. However, when it comes to cloud computing systems, the sensitivity of this issue rises, as the clients of system, release their data to the cloud. XML signature is employed to secure SOAP messages. However, there are also some weak points that have been identified, named as XML signature wrapping attacks, which have been categorized into four major groups; Simple Ancestry Context Attack, Optional element context attacks, Sibling Value Context Attack, Sibling Order Context. In this study, two existing methods, for referencing the signed part of SOAP Message to counter the mentioned attacks, named as ID and XPath method, are analyzed and examined. In addition, a new method is proposed and also tested, to secure the SOAP message. In the new method, the XML signature wrapping attack is prevented by employing the concept of XML digital signature on the SOAP message. In this study a different way for signing is used, which is more efficient than the current methods .The results of conducted experiments show that the proposed method is approximately three times faster than the best method, which is currently available. Keywords: Cloud computing, SOAP message, XML digital signature, Wrapping attack
…………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Bulut bilişim internete dayanmakta olup internette geniş ölçeklenebilir programlama veri kaynağını ve hizmetleri sunan bir konsepttir. Bu sistemin başlıca faydaları sermayenin ve işletim maliyetinin düşürmesidir. Dolaysıyla sanayi kuruluşları ve araştırma topluluklarının bu sisteme gösterdiği ilgi gittikçe artmaktadır. Bulut bilişim sistemlerinin kendine özgü özellikleri vardır. Bir bulut bilişim sistemi genel olarak beş özelliğe sahiptir. Bu özelliklerin yanı sıra, her sistemin üç ana hizmet modeli de mevcuttur; Hizmet Olarak Yazılım (SaaS), Hizmet Olarak Platform (PaaS), Hizmet Olarak Altyapı (IaaS). Unutulmaması gerekir ki bu sistemin birçok faydaya sahip olmasının yanı sıra, bu teknolojinin geliştirilmesine ilişkin bazı sorunlar da bulunmaktadır. En kritik konulardan birisi bu sistemin başarı oranının olumsuz bir şekilde etkileyebilen güvenliktir.
Bilindiği üzere, web uygulamaları arasında veri değişimi SOAP protokolü (Basit Nesne Erişim Protokolü) aracılığıyla gerçekleşmektedir. Bu protokolün güvenliği her bilişim ağı için hayati önem taşımaktadır. Fakat bulut bilişim sistemlerine gelindiğinde, sistem müşterileri kendi verilerinin buluta sürdükleri için güvenliğin önemi daha da artmaktadır. XML imzası SOAP mesajlarının güvenliğinin sağlanması için kullanılır. Ancak XML imzasının bazı zayıf yönleri da tespit edilmiştir. Bunlar XML imzası saldırı paketi olarak adlandırılmakta olup dört kategoriye bölünür; Basit Geçmiş İçerik Saldırısı (Simple Ancestry Context Attack), Seçimli Bileşen İçerik Saldırısı (Optional Element Context Attacks), Benzer Değer İçerik Saldırısı (Sibling Value Context Attack), Benzer Düzen İçerik Saldırısı (Sibling Order Context). Bu çalışmada, SOAP mesajının imzalanmış kısmına yönelik sözü gecen saldırıları önlenmek için kullanılmakta olan URI ve XPath olmak üzere, iki kullanılmakta olan yöntem analiz edilmiş ve değerlendirilmiştir. Ayrıca SOAP mesajlarının güvenliğinin sağlanması için yeni bir yöntem önerilmeye ve test edilmeye çalışılmıştır. Yeni yöntemde, XML imza sarma saldırısı SOAP mesajı uzerine XML sayısal imza yöntemlere söre daha fahli ve daha verimli bir ımzalame yüntemi kullanılmıştır. Deneyler göstermiştir ki öneilen yöntem varolan yüntemlere göre üç misli hızlıdır.
Anahtar Kelimeler: Bulut bilişim, SOAP mesajı, XML sayısal imza, Sarma saldırısı.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Computer networks - Security
Cloud Computing, SOAP Message, XML Digital Signature, Wrapping Attack
Vulnerability in cloud computing. Securing SOAP message using SESoap method
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1339/3/Kouchaksaraei.pdf.txt
File
MD5
b75ae9b6953219e9d6505a5627b8e846
84655
text/plain
Kouchaksaraei.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1339/1/Kouchaksaraei.pdf
File
MD5
4b7d6234f452e643c0603352db296be2
1139083
application/pdf
Kouchaksaraei.pdf
oai:i-rep.emu.edu.tr:11129/13432014-09-19T23:00:41Zhdl_11129_11
EMU I-REP
author
Naife, Sinan Hazim
2014-09-19T11:02:32Z
2014-09-19T11:02:32Z
2013-08
Naife, Sinan Hazim. (2013). An investigation of the coefficient of variation using the dissipative stochastic mechanics based neuron model. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1343
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Marifi Güler.
ABSTRACT: In recent years, it has been argued and shown experimentally that ion channel noise in neurons can have profound effects on the neuron’s dynamical behavior. Most profoundly, ion channel noise was seen to be able to cause spontaneous firing and stochastic resonance.
A physical approach for the description of neuronal dynamics under the influence of ion channel noise was proposed recently through the use of dissipative stochastic mechanics by Guler in a series of papers. He consequently introduced a computational neuron model incorporating channel noise. The most distinctive feature of the model is the presence of so-called the renormalization terms therein. This model exhibits experimentally compatible noise induced transitions among its dynamical states, and gives the rose-Hindmarash model of the neuron in the deterministic limit.
In this thesis, statistics of coefficient of variation will be investigated using the dissipative stochastic mechanics based neuron model.
Keywords: Ion Channel Noise, Stochastic Ion Channels, Neuronal Dynamic, Hindmarsh-Rose Model, Dissipative Stochastic Mechanism Model.
…………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Son yıllarda, nöronlardaki ion kanal gürültüsünün nöron dinamiği üzerinde hayati etki yapabildiği deneysel olarak da kanıtlanmıştır. Bu kapsamda, kendi kendine ateşleme ve stokastik rezonans en çarpıcı bulgulardır.
İyon kanal gürültüsü altındaki nöron dinamiği, fiziksel bir yaklaşım olan disipatif stokastik mekanik kullanarak Güler (2006, 2007, 2008) tarafından çalışılmış ve modellenmiştir. Sonsuz zar büyüklüğü limitinde Rose-Hindmarsh modeline dönüşen bu disipatif stokastik mekaniğe dayalı modelin en önemli özelliği renormalizasyon terimleri içermesidir. Bu tezde, Rose-Hindmarsh tipi zarlarda iyon kanal gürültüsü için geliştirilmiş olan yukarıdaki model kullanılarak ateşleme dinamiği üzerinden değişkenlik katsayısı hesaplamaları yapılmıştır.
Anahtar Kelimeler: İyon kanal gürültüsü, Stokastik iyon kanalları, Nöronal Dinamik, Rose-Hindmarsh Modeli, Disipatif stokastik mekanik modeli.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Stochastic systems
Speech processing systems
Ion Channel Noise, Stochastic Ion Channels, Neuronal Dynamic, Hindmarsh-Rose Model, Dissipative Stochastic Mechanism Model
An investigation of the coefficient of variation using the dissipative stochastic mechanics based neuron model
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1343/3/NaifeSinan.pdf.txt
File
MD5
110f2ceeafa21666e6712ac6926c90ca
60149
text/plain
NaifeSinan.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1343/1/NaifeSinan.pdf
File
MD5
8843f2ec608806218fb847f4d2977397
995054
application/pdf
NaifeSinan.pdf
oai:i-rep.emu.edu.tr:11129/13592014-09-26T23:00:43Zhdl_11129_11
EMU I-REP
author
Polisciuc, Alexandr
2014-09-26T08:24:21Z
2014-09-26T08:24:21Z
2013-07
Polisciuc, Alexandr. (2013). Performance of deferred and forward shading under different lighting conditions. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1359
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Hakan Altınçay.
ABSTRACT: The field of 3D computer graphics deals with ways of generating 2D images from 3D scene representations. This process is called rendering and its performance is one of the central problems in the field. Understanding performance implications of 3D graphics algorithms and testing them in different scenarios enables professionals in game, film, scientific and military industries to make informed decisions on which algorithms are best suited for their problem. In this thesis a close look was taken at performance of two most popular rendering approaches in real-time 3D graphics – deferred shading and forward shading. We investigated four different scenarios: many small lights, many big lights, many big lights with shadows and a mixed case of many small lights along with several big shadow-casting lights. Deferred shading showed better performance than forward shading in all tests, with the biggest gain obtained in case of having high numbers of small lights. When shadow-casting lights were present, the difference in performance, although significant, was not as hugely different as in case of small lights alone.
Keywords: 3D Computer Graphics, Rendering, Deferred Shading, Forward Shading
…………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: 3B bilgisayar grafik çalışmaları, 3B görüntülerden 2B imgeler üretme yöntemleri üzerindedir. Bu işlem imge oluşturma olarak bilinmekte ve başarımı bu alandaki esas problemlerden birisi olarak kabul edilmektedir. 3B grafik algoritmalarının başarımlarının etkilerini anlamak ve farklı senaryolar için onları test etmek, oyun, film, bilimsel ve askeri endüstrilerde hangi algoritmanın en uygun olacağı konusunda daha bilinçli karar almaya olanak sağlamaktadır. Bu tezde gerçek zamanlı 3B grafik alanında iki popüler imge oluşturma yöntemi - erteleme tabanlı gölgelendirme ve ileri gölgelendirme yakından incelenmiştir. Dört farklı senaryo üzerinde çalışılmıştır: çoklu küçük ışık, çoklu büyük ışık, gölgeli çoklu büyük ışık ve çoklu küçük ışık ile birkaç gölge oluşturan ışık karışımı. Erteleme tabanlı gölgelendirme, tüm testlerde ileri gölgelendirme yöntemine göre daha iyi başarım göstermiş, en yüksek kazanımı da çoklu küçük ışık durumunda sağlamıştır. Gölge oluşturan ışıkların olduğu durumda, belirgin bir başarım farkı olmakla birlikte yalnızca küçük ışıkların kullanıldığı durumdaki gibi büyük olmamıştır.
Anahtar Kelimeler: 3B Bilgisayar Grafiği, Imge Oluşturma, Erteleme Tabanlı Gölgelendirme, Ileri Gölgelendirme.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Computer vision
Image processing
3D Computer Graphics, Rendering, Deferred Shading, Forward Shading
Performance of deferred and forward shading under different lighting conditions
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1359/3/PolisciucAlexandr.pdf.txt
File
MD5
d59197678812fd06ce9d6acdb5999d23
88269
text/plain
PolisciucAlexandr.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1359/1/PolisciucAlexandr.pdf
File
MD5
fdf81bb8f8f5c32229a973e83bdc07b9
1741221
application/pdf
PolisciucAlexandr.pdf
oai:i-rep.emu.edu.tr:11129/13662014-09-26T23:00:59Zhdl_11129_11
EMU I-REP
author
Haji-Zada, Teymur
2014-09-26T12:27:57Z
2014-09-26T12:27:57Z
2013-06
Haji-Zada, Teymur. (2013). Object oriented business architecture on online-exam and assignment system. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1366
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Erden Başar.
ABSTRACT: Business object architecture is a technology that was designed and developed during recent period. This architecture has a lot of benefits like scalability, flexibility and security. It helps create and develop maintainable, secure and reusable applications for further development. In business object architecture the logical architecture is separated into layers that give more scalability and reusability. Also using business object architecture developers must not write different programs for different platforms. Once created business objects can be accessible from different platforms. The goal of this thesis is implementing computer assisted exam system with business object architecture. The object is to create desktop, web and mobile applications that will use the same business objects for doing operations.
The framework that is used is CSLA.NET. The library created with this framework is used by desktop, web and mobile application. For client applications only user interface is developed which uses business objects from the library. SQL Server is used for creating database. SQL Server and File server are in separate server that is accessible from all client applications. The network connection between client computers during exam is controlled by firewall. It disables all incoming and outgoing connections to the computer for holding the exam in safe environment. The implementation of the system is realized by using Microsoft .NET technology. As the development environment Microsoft Visual C# .NET is used. IPhone and IPad applications are part of the system. These applications are designed for students getting information about their grades by mobile phones and notifications about exams or assignments from instructors. As mobile application iOS application is developed using Objective-C programming language.
Keywords: Business object architecture, computer assisted exam system, assignment system, iOS course manager application.
…………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: İşletme Nesne Mimarisi Teknolojisi’nin icat edilmesi ve geliştirilmesi dönemi uzun bir geçmişe dayanmamaktadır. Ölçünebilirlik, esneklik ve güvenlik gibi birçok avantajı bulunmaktadır. Bu mimari geliştirilebilir, güvenli ve yeniden kullanılabilir uygulamaların yaratılıp geliştirilmesine yardımcı olur. Daha fazla ölçünebilirlik ve yeniden kullanılabilirlik sağlamak amacı ile Nesne İşletme Mimarisi’nin mantıksal mimarisi bir takım katmanlara ayrılmıştır. İşletme Nesne Mimarisini kullanan geliştiriciler çeşitli platformlar için program yazabilirler ve bu programlar çeşitli platformlardan erişilebilmektedir.
Bu tezin hedefi Nesne İşletme Mimarisini kullanarak bilgisayar destekli sınav sistemi geliştirmektir. Projede bir takım işlemleri yapmak için aynı işletme objeleri kullanan masaüstü, web ve mobil uygulamalar geliştirmektir.
CSLA.NET kullanılarak yaratılan kütüphaneler masaüstü, web ve mobil uygulamalar tarafından kullanılmıştır. Kullanıcılar için geliştirilmiş olan ara yüz bu kütüphanenin işletme objelerini kullanmaktadır. Veritabanı yönetim sistemi olarak SQL Server kullanılmıştır. SQL Server ve Dosya Sunucusu farklı sunucular olup kullanıcı uygulamaları tarafından erişilebilmektedir. Sınav süresince bilgisayar arasındaki ağ bağlantısı güvenlik duvarı tarafından kontrol edilmektedir. Güvenli bir ortam oluşturmak için güvenlik duvarı sayesinde gelen ve giden bağlantılar devre dışı bırakılmıştır. Bu sistemin geliştirilmesi Microsoft .NET teknoloji ile yapılmıştır. Microsoft Visual C#NET kullanılmış, bununla birlikte, iOS mobil uygulamaların geliştirilmesi için Objective-C programlama dili tercih edilmiştir.
Anahtar Kelimeler: Nesne işletme mimarisi, bilgisayar destekli sınav sistemi, ödev sistemi, iOS ders yöneticisi uygulaması.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Online Processing
Business Object Architecture, Computer Assisted Exam System, Assignment System, IOS Course Manager Application
Object oriented business architecture on online-exam and assignment system
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1366/3/HajiZadaTeymur.pdf.txt
File
MD5
bf0d9dd514061f742bdb993a392cf962
110552
text/plain
HajiZadaTeymur.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1366/1/HajiZadaTeymur.pdf
File
MD5
7960f1c9bc238f1d117d0efa23f4ed41
3961708
application/pdf
HajiZadaTeymur.pdf
oai:i-rep.emu.edu.tr:11129/13922014-10-08T23:00:41Zhdl_11129_11
EMU I-REP
author
Mollahasani, Shahram
2014-10-08T08:33:23Z
2014-10-08T08:33:23Z
2013-08
Mollahasani, Shahram. (2013). Energy aware routing protocol for wireless sensor networks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1392
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assoc. Prof. Dr. Muhammed Salamah.
ABSTRACT: Energy conservation has a main priority in all technology and engineering fields. During the rise of wireless sensor networks (WSNs) field applications and the critical situation of energy consumption, the optimization of energy dispatch becomes a critical and important field of research. LEACH (Low Energy Adaptive Clustering Hierarchy) is one of the most popular routing protocols in WSNs. However, in LEACH nodes energy are drained quickly and it decreases the network lifespan due to cluster heads that are selected randomly without taking into consideration the residual energy and position of nodes. The goal of this thesis is to introduce a novel routing algorithm named D-LEACH (Decentralized LEACH) to enhance network lifetime by selecting optimum number of cluster heads according to their residual energy and position. This is achieved by decreasing the amount of communication which is needed for selecting cluster heads. The simulation results indicate that the proposed scheme can prolong network’s lifespan and also increase the average residual energy of nodes 150%.
Keywords: Wireless Sensors Networks, Sensors Clustering, LEACH.
…………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Enerji tasarrufu tüm teknoloji ve mühendislik alanlarında ana önceliğe sahiptir. Kablosuz algılayıcı ağların (WSN) saha uygulamalarının yükselişi ve enerji tüketiminin kritik durumu nedenleriyle, enerji yollama optimizasyonu en kritik ve önemli araştırma alanı haline gelmiştir. LEACH (Düşük Enerji Adaptif Kümeleme Hiyerarşisi), WSN’in en popüler yönlendirme protokollerinden biridir. Ancak, LEACH’da küme başları rastgele seçildiği ve nodların pozisyonu dikkate alınmadığından dolayı, nodların enerjisi hızlı bir şekilde tüketilmekte ve ağın ömrü azalmaktadır. Bu tezin amacı D-LEACH adlı yeni bir yönlendirme algoritması (Merkezi olmayan LEACH) önermektir. Önerilen yeni algoritmada, küme başlarının kalan enerjileri ve pozisyonlarına göre seçilmesinden dolayı ağın ömrü uzamaktadır. Bu hedefe küme başlarının seçilmesi için gerekli olan iletişim miktarı azaltılarak ulaşılmaktadır. Simülasyon sonuçlarına göre, önerilen algoritma normal LEACH algoritmasıyla karşılaştırıldığı zaman, ağın ömrünü uzatmakta ve yaklaşık %150 oranında nodların kalan enerjisini artırmaktadır.
Anahtar Kelimeler: Kablosuz Algılayıcı Ağları, Kümeleme, LEACH.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Wireless sensor networks
Sensors Clustering LEACH
Energy aware routing protocol for wireless sensor networks
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1392/3/MollahasaniShahram.pdf.txt
File
MD5
10fdb140ced242c3246c91656734903b
73496
text/plain
MollahasaniShahram.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1392/1/MollahasaniShahram.pdf
File
MD5
de4a47fc61aefc32f6a5c36686b4cda6
1276208
application/pdf
MollahasaniShahram.pdf
oai:i-rep.emu.edu.tr:11129/13962014-10-09T23:00:40Zhdl_11129_11
EMU I-REP
author
Alfaisal, Ali Abdulnasser
2014-10-09T07:18:24Z
2014-10-09T07:18:24Z
2014-01
Alfaisal, Ali Abdulnasser. (2014). An online automatic survey maker for computer engineering department at EMU. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1396
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assist. Prof. Dr. Yıltan Bitirim.
ABSTRACT: In this study, we have developed a survey system to help the Department of Computer Engineering to overcome the difficulties that a surveyor can face with, such as finding surveyees and updating his/her information. The survey system provides the Department of Computer Engineering to create a line of communication between the department and the surveyee. The division of labor in our survey system provides a powerful control of the system. In addition, the survey system is going to support the department since it requires less effort and is an easy-to-use system. Our system is designed for the Department of Computer Engineering at Eastern Mediterranean University, yet the system can be used by other organizations or institutes as well.
Keywords: Web application, Survey, Computer Engineering.
…………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Bu çalışmada, Bilgisayar Mühendisliği Bölümü'ne yardımcı olmak için anketörlerin ve karşılaştıkları zorlukları (örneğin; anketi dolduracak ilgili kişilei bulmak ve bu kişilerin bilgilerini güncellemek gibi) aşabilmelerini sağlamak amacıyla bir anket sistemi geliştirilmiştir. Bu sistem Bilgisayar Mühendisliği Bölümü‟nün anketi dolduracak ilgili kişilerle arasında bir iletişim hattı oluşturmasını sağlar. Bu anket sisteminde iş bölümü olması sistemin güçlü bir kontrol mekanizması olmasını sağlar. Buna ek olarak sistem az çaba gerektirdiği ve kolay kullanım özelliğine sahip olduğu için bölümün destekçisi olacaktır. Bu sistem Doğu Akdeniz Üniversitesi Bilgisayar Mühendisliği Bölümü için tasarlanmış olsa da diğer kurum ya da kuruluşlar tarafından da kullanılabilir.
Anahtar Kelimeler: Web uygulaması, Anket,Bilgisayar Mühendisliği.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Surveys - Computer Engineering
Web Application, Survey, Computer Engineering
An online automatic survey maker for computer engineering department at EMU
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1396/3/AlfaisalAli.pdf.txt
File
MD5
38a741fc4e6d483db44554e2cbe57e55
122484
text/plain
AlfaisalAli.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1396/1/AlfaisalAli.pdf
File
MD5
bed0ea812fd45d9e260abb96a47d02f1
3629081
application/pdf
AlfaisalAli.pdf
oai:i-rep.emu.edu.tr:11129/14042014-10-09T23:00:53Zhdl_11129_11
EMU I-REP
author
Mahdi, Anas Qasim
2014-10-09T11:17:04Z
2014-10-09T11:17:04Z
2014-01
Mahdi, Anas Qasim. (2014). Comparison of the edge detection methods to detect, identify and locate the obstacles for agricultural robotic vehicles. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1404
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assist. Prof. Dr. Mehmet Bodur.
ABSTRACT: The obstacle detection in an agricultural field is an important step of the automation of the plantation. There are already developed autonomous agricultural vehicles that can track a path, and perform the specified processes on the plantation fields. These autonomous agricultural robotic machines need an upper level of control, which is mostly performed manually, for the design of the reference paths. Detection of the agricultural obstacles is necessary to accomplish these manual tasks in an automatic manner. In this study, statistical methods are employed to determine which of the five well-known edge-detection methods is best, for the high-level path planning in an agricultural automation of autonomous agricultural vehicles depending on field and image properties. Keywords: agricultural robotic, edge detection techniques, Canny, Prewitt, Robert, Sobel, obstacle detection.
…………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ:Tarım alanlarında engel tesbiti tarımsal otomasyonu önemli bir basamağıdır. Tarım arazilerinde verilen bir yolu takip ederek belirtilen işlemleri uygulamak üzere geliştirilmiş tarım aracları şimdiden mevcuttur. Bu otonom tarım robotları şimdilik elle gerçekleştirilen üst düzeyde bir yol tasarımına gerek duyarlar. İşin tümüyle otomasyonu için tarımsal engellerin tesbitini otomatik olarak yapabilmek gerekir. Bu çalışmada, tarımsal üst düzey yol planlaması açısından en iyi kenar belirleme yöntemi araştırılmış, istatistiksel yöntemler ile yaygın bilinen beş yöntemin arazi ve resim özelliklerine bağlı olarak hangisinin iyi sonuç verdiği belirlenmiştir.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Architecture - Vehicles, Robotic
Agricultural Robotic, Edge Detection Techniques, Canny, Prewitt, Robert, Sobel, Obstacle Detection
Comparison of the edge detection methods to detect, identify and locate the obstacles for agricultural robotic vehicles
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1404/3/MahdiAnas.pdf.txt
File
MD5
e7155b061d6bb363c8eec80138c707c6
60980
text/plain
MahdiAnas.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1404/1/MahdiAnas.pdf
File
MD5
34ed1752db220c41da4ed6a9170963c6
2787326
application/pdf
MahdiAnas.pdf
oai:i-rep.emu.edu.tr:11129/14102014-10-16T23:00:34Zhdl_11129_11
EMU I-REP
author
Ibrahim, Ahmed Salih
2014-10-16T08:33:01Z
2014-10-16T08:33:01Z
2014-01
Ibrahim, Ahmed Salih. (2014). Model based multi criteria decision making methods for prediction of time series data. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1410
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assist. Prof. Dr. Mehmet Bodur.
ABSTRACT: Financial forecasting is a difficult task due to the intrinsic complexity of the financial system, in this research the estimation of the stock exchange prices is targeted using the five-year time series data of prices. The objective of this work is to use an intelligence techniques and mathematical techniques to create a model, that has the ability to predict the future price of a stock market index, then decide throughout the k-means clustering with majority voting, which one of those prediction techniques is the best. It is a multi-decision making in order to find the best predictive method. The proposed method combines multiple methods to have higher prediction accuracy and higher profit/risk ratio. The forecasting techniques, namely, Radial Basis Function (RBF) combined with Self-organizing map, Nearest Neighbour (K-Nearest Neighbour) methods, and Autoregressive Fractionally Integrated Moving Average (ARFIMA) are implemented in forecasting the future price of a stock market index based on its historical price information, and the best forecast of these three methods is decided by majority voting after k-means clustering. The experimentation was performed on data obtained from the London Stock Exchange. The data used was a series of past closing prices of the Share Index. The results showed that the proposed decision method provides better prediction than forecasts of the three techniques.
Keywords: Forecasting, SOM-RBF, K-Nearest Neighbour, ARFIMA, Decision-making.
…………………………………………………………………………………………………………………………………………………………………………………………………………
ÖZ: Finansal sistemlerin iç karmaşası nedeniyle finansal tahmin zor bir iştir. Bu araştırmada beş yıllık zaman serisi verisini kullanarak hisse senedi fiyatlarının tahmini amaçlanmaktadır. Çalışmanın amacı hisse senetlerinin gelecekte fiyatını çeşitli matematiksel ve yapay ussal tahmin yöntemleri kullanarak bulup, ardından, k-ortalama öbekleme yöntemi ile hangi tahmin yönteminin daha başarılı olduğuna karar vermektir. Böylece oluşturulan çoklu karar verme mekanizması her durum için en iyi tahmin yöntemini bulur. Tahmin yöntemleri olarak Kendinden Düzenli Radyal Baz Fonksiyonu (RBF) en yakın komşu (K-Nearest Neighbour) metodu, ve Atoregressif Oranlı Tümlevsel Gezer Ortalama (ARFIMA) metodları kullanılarak beş yıllık zaman serisinden gelecekteki değer tahmin edilmiş ve üçü arasında en iyi tahmin eden metoda k-ortalama öbekleyici ve çoğunluk oyu kullanarak karar verilmiştir. Deneyler Londra Hisse Senetleri Borsasından alınan beş yıllık günluk kapanış veri üzerinde denenmiştir. Sonuçlar önerilen yöntemin seçtiği tahminin, kullanılan her üç yöntemin tahminden daha başarılı olduğunu.göstermektedir.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Economics - Statistical methods
Computer science - Decision Making
Decision making - Mathematical models
Mathematical statistics - Computer programs
Statistics - Computer programs
Forecasting, SOM-RBF, K-Nearest Neighbour, ARFIMA, Decision-making
Model based multi criteria decision making methods for prediction of time series data
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1410/3/IbrahimAhmed.pdf.txt
File
MD5
aeaa2525115ef71c60993482f6301b19
211862
text/plain
IbrahimAhmed.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1410/1/IbrahimAhmed.pdf
File
MD5
dd4df64ad1a36b2462621588da235cd6
1303565
application/pdf
IbrahimAhmed.pdf
oai:i-rep.emu.edu.tr:11129/14432014-10-31T00:00:49Zhdl_11129_11
EMU I-REP
author
Zanjani, Maryam Farajzadeh
2014-10-30T11:27:44Z
2014-10-30T11:27:44Z
2014-01
Zanjani, Maryam Farajzadeh. (2014). Group key exchange protocol based on diffie hellman technique in Ad hoc Network. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1443
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assoc. Prof. Dr. Alexander G. Chefranov.
ABSTRACT: During last decade, wireless ad hoc networks have been widely used for communication, transferring data or sharing some information for specific members. Nowadays security protocols play a fundamental role to provide a level of security for wireless local area networks (WLAN). Moreover, one of the most important issues to improve security by help of cryptography algorithms is generating a common key among participants to intercommunicate securely. The aim of thesis is creating a common secret key by means of Diffie Hellman (DH) technique, so the contributory group key exchange protocol is established in order to perform efficiently in context of ad hoc. To this aim, some analysis on Biswas’s protocol (G. Biswas, IET Information Security, March 2008) and Tseng’s protocol (Y.-M. TSENG and T.-Y. WU, INFORMATICA International Journal, April 2010) are done. Tseng’s protocol fails to establish a common key in some situations, when the key generated by DH technique is not invertible. Thus, it is modified in order to fix the problem and achieve better performance in view of the computational cost for the proposed Tseng’s modified protocol. Furthermore, theoretical analysis shows that computational cost in Tseng’s modified protocol for each participant and the controller is decreased about 1.5 and 3 times in comparison with Tseng’s protocol respectively. Tseng modified protocol is implemented and is tested for ad hoc WLAN with 3, 4, and 5 nodes.
Keywords: ad hoc, Wireless Local Area Network (WLAN), Network Security, Diffie Hellman Key Exchange (DH Key Exchange), Group Key Exchange (GKE), Tseng’s protocol.
…………………………………………………………………………………………………………………………
ÖZ: Son yıllarda, kablosuz özel amaca yönelik ağlar iletişim, veri aktarımı veya bilgi paylaşımı için belirli kullanıcılar tarafından yaygın olarak kullanılmaktadır. Günümüzde güvenlik protokolleri, kablosuz yerel ağlarda (WLAN) güvenliği sağlamak için temel bir rol oynamaktadırlar. Ayrıca, şifreleme algoritmaları yardımıyla iletişimde güvenliğini artırmak için, kullanıcılar arasında ortak bir anahtar oluşturmak önemli konulardan biridir. Bu tezin amacı, Diffie Hellman(DH) tekniğini kullanarak gizli ortak bir anahtar yaratılmasıdır, böylece ad hoc ağlarda verimi artırmak için grup anahtar değiştirme protokolü oluşturulmuştur. Bu amaç için, Biswas protokolüne ve Tseng protokolüne bazı analizler yapılmıştır. DH tekniği ile üretilen anahtar tersi alınabilir olmadığı için, bazı durumlarda, Tseng protokolü ortak anahtar oluşturmada başarısız olur. Bu sorunu çözmek ve hesaplama maliyetini iyileştirmek için, Tseng protokolünün modifiyesi yapılmıştır. Ayrıca teorik analizler göstermiştir ki, modifiyi edilen Tseng protokolü original Tseng protokolü ile karşılaştırıldığında, her bir katılımcı ve kontrolcü için, hesaplama maliyetinde 1.5 ve 3 kez azalma olduğu görülmüştür. Modifiye edilen Tseng protokolü 3, 4, ve 5 düğümden oluşan özel amaca yönelik kablosuz ağlarda test edilmiştir.
Anahtar Kelimeler: Özel amaca yönelik ağlar, Kablosuz Yerel Alan Ağı (WLAN), Ağ Güvenliği, Diffie Hellman Anahtar Değişimi (DH Key Exchange), Grup Anahtar Değişimi (GKE), Tseng Protokolü.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Computer Networks - Security
Ad Hoc, Wireless Local Area Network (WLAN), Network Security, Diffie Hellman Key Exchange (DH Key Exchange), Group Key Exchange (GKE), Tseng's Protocol
Group key exchange protocol based on diffie hellman technique in Ad hoc Network
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1443/3/ZanjaniMaryam.pdf.txt
File
MD5
671a5145dbc1f25fa198249d5acefd5f
84555
text/plain
ZanjaniMaryam.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1443/1/ZanjaniMaryam.pdf
File
MD5
64eb3e29d7fc98625dc5e8ad0b17cbad
1465397
application/pdf
ZanjaniMaryam.pdf
oai:i-rep.emu.edu.tr:11129/14492014-10-31T00:00:38Zhdl_11129_11
EMU I-REP
author
Salmasi, Amir Hossein Akhavan
2014-10-30T13:43:31Z
2014-10-30T13:43:31Z
2011-09
Salmasi, Amir Hossein Akhavan. (2011). A low-cost, high-speed algorithm for mobile positioning. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1449
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2011. Supervisor: Assoc. Prof. Dr. Muhammed Salamah.
ABSTRACT: Location determination in cellular networks is one of the most important features of current 3rd generation (3G) wireless communication systems and is important criteria in Federal Communications Commission (FCC) ruling regarding the wireless emergency calling system (E911) in United States. This technology empowers many location based services namely Intelligent Transportation Systems (ITS) and electronic warfare positioning. Using the received signal strength measurement, several methods can be applied to estimate the cellular mobile station position. As an example, Angle of Arrival (AOA) and Time of Arrival (TOA) can be named. To estimate the MS location using these methods two smart antennas need to be implemented, although using more than two antennas lead to higher accuracy and the estimated location will be more precise. The used estimation methods so far, are trigonometric equation based methods, which are software based and sophisticated to be implemented in location determination aims. In this thesis, we presented a low-cost, high speed hybrid TOA/AOA method that combines TOA and AOA methods and use the both method’s advantages. In traditional hybrid AOA/TOA method which is software-oriented, trigonometric equations are used that makes the total computational cost to be increased, hence, is improper to be implemented in hardware. In our proposed method, we used simple add, subtract and shift operations that makes this method proper to be implemented in hardware e.g. FPGA. The comparison between the Traditional software-oriented hybrid AOA/TOA and our proposed method will be carried out in the chapters.
For these methods analysis and simulation, we used Matlab 7 package. Simulation results demonstrate that our proposed algorithm outperforms the AOA, TOA and software-oriented hybrid AOA/TOA methods in terms of total computation cost, derived accuracy and implementation simplicity. Keywords: Wireless routing, Signal processing, TOA, TOA, Hybrid positioning, Localization.
…………………………………………………………………………………………………………………………
ÖZ: Hücresel şebekeler konum belirleme, 3. nesil (3G) kablosuz haberleşme sistemlerinin en önemli özelliklerinden biridir ve Federal İletişim Komisyonu (FCC), Amerika Birleşik
Devletleri kablosuz acil çağrı sistemi (E911) ile ilgili yönetici önemli kriterdir. Bu teknoloji, yani pek çok konum tabanlı servisler, Akıllı Ulaşım Sistemleri (ITS) ve elektronik harp konumlandırma güçlendirir. , Alınan sinyalin gücünü ölçme kullanarak, hücresel mobil istasyon konumunu tahmin etmek için çeşitli yöntemler uygulanabilir. Bir örnek olarak, Varış Varış (AOA) ve Zaman (TOD) Açısı adlandırılabilir. Ikiden fazla anten kullanarak yüksek doğruluk ve tahmini konumu daha hassas olacak yol olsa da, iki akıllı antenler uygulanması gerekir, bu yöntemleri kullanarak MS konumu tahmin etmek için. Şimdiye kadar kullanılan tahmin yöntemleri, yazılım tabanlı ve konum belirleme uygulanmak üzere gelişmiş hedefliyor trigonometrik denklem tabanlı yöntemler. Bu tezde, ÖY ve AOA yöntemleri birleştirir ve ÖY / AOA yöntemi hibrit yöntemi hem avantajları kullanmak, düşük maliyetli, yüksek hızlı sundu. Yazılım odaklı geleneksel hibrid AOA / ÖY yöntemi, trigonometrik denklemler, toplam maliyet hesaplama donanım uygulanmak üzere uygunsuz, bu nedenle, artan olması yaptığı kullanılır. Önerilen yöntem, toplama, çıkarma ve işlemleri yapar bu yöntem uygun donanım örneğin uygulanacak vardiya basit kullandı FPGA. Geleneksel yazılım odaklı hibrid
AOA / TOA ve önerilen yöntem arasında karşılaştırma bölümlerde yapılacaktır. Bu yöntemlerin analiz ve simülasyon için, Matlab 7 paketi kullanıldı. Simülasyon sonuçları önerilen algoritma AOA, TOD ve yazılım odaklı hibrid AOA / TOA yöntemleri, toplam hesaplama maliyet, elde edilen doğruluk ve uygulama basitliği açısından daha iyi performans gösteriyor. Anahtar Kelimeler: Kablosuz yönlendirme, sinyal isleme, TOD, AOA,
Hibrid konumlandırma, Yerellestirme.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Wireless Networks
Wireless Routing Signal Processing TOA Hybrid Positioning Localization
A low-cost, high-speed algorithm for mobile positioning
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1449/3/Salmasi.pdf.txt
File
MD5
84e75b3708108450be80adb5821215e9
64142
text/plain
Salmasi.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1449/1/Salmasi.pdf
File
MD5
4434afe44d9ae6d11e39ff9663b460d8
528910
application/pdf
Salmasi.pdf
oai:i-rep.emu.edu.tr:11129/14682014-11-05T00:01:19Zhdl_11129_11
EMU I-REP
author
Darghaoth, Ahmed
2014-11-04T12:48:34Z
2014-11-04T12:48:34Z
2013-06
Darghaoth, Ahmed. (2013). Real time implementation of adaptive line enhancer. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1468
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Hasan Kömürcügil.
ABSTRACT: The contamination of a desired signal by noise (undesired signal) is a main problem encountered in many applications. The digital filters with fixed coefficients exhibit
satisfactory performance in cancelling the noise when the desired signal has stationary characteristics. However, when the desired signal has changing characteristics, there may be a performance degradation in eliminating the noise by a digital filter with fixed coefficients. As a remedy to this, adaptive noise cancellation method is used. In the adaptive noise cancellation method, the coefficients of the digital filter are updated by using an adaptive algorithm, until a minimum error is obtained. In this thesis, the principles of adaptive noise cancellation have been studied by using an adaptive line enhancer (ALE) configuration. The ALE configuration is simulated by using Simulink of Matlab and is implemented by using a digital signal processor (TI TMS320C6416T) in real time. The performance of ALE under different signal to noise ratio, number of filter coefficients, and step size of the adaptive algorithm has been studied extensively. When step size is small it leads to a good estimation of the sinusoidal signal, but the convergence speed slows down. The ALE output becomes more accurate when more coefficients are used in the filter. When SNR value is increased the estimation becomes more successful resulting in a small error at the ALE output.
Keywords: Adaptive Filters, Adaptive Noise Cancellation, Least Mean Square Algorithm, Adaptive Line Enhancer, Signal to Noise Ratio.
…………………………………………………………………………………………………………………………
ÖZ: Birçok uygulamada, istenen bir sinyalin gürültü tarafından kirlenmesi karşı karşıya
kalınan bir problemdir. İstenen sinyalin durağan bir yapısı olduğu durumda, sabit katsayılı sayısal süzgeçler gürültüyü yok etmek için yeterli bir performans sergilerler. Bununla birlikte, istenen sinyalin durağan bir yapısı olmadıgı durumda, sabit katsayılı sayısal süzgeçler gürültüyü yok etme işleminde bir performans azalması ortaya çıkmaktadır. Bu probleme çare olarak, uyarlanabilir gürültü yoketme metodu kullanılır. Uyarlanabilir gürültü yoketme metodunda, sayısal süzgeçin katsayıları uyarlanabilir bir algoritma vasıtasıyla hata sinyalinin değeri minimum olana kadar güncellenmektedir. Bu tezde, uyarlanabilir gürültü yoketme metodunun prensipleri uyarlanabilir kanal yükselticisi kullanarak çalışılmıştır. Uyarlanabilir kanal yükselticisinin Matlab'ın Simulink ortamında benzetimi yapılmış ve buradaki Simulink modeli sayısal sinyal işlemcisine (TI TMS320C6416T) yüklenerek, gerçek zamanda Matlab'dan bağımsız olarak kendi başına çalışması sağlanmıştır. Uyarlanabilir kanal yükselticisinin farklı sinyal gürültü oranı, süzgeç katsayı sayısı, ve uyarlanabilir algoritmanın adım büyüklüğü altındaki performansı ayrıntılı olarak çalışılmıştır. Adım büyüklüğü küçük olduğu zaman, istenen sinüs sinyalinin kestirimi iyi olur, fakat yakınsama hızı yavaşlar. Süzgeçteki katsayıların sayısı artırıldıkça, ALE çıkışı (istenen sinüs sinyali) daha doğru olar. Sinyal gürültü oranı artırıldıkça, sinyal kestirimi daha başarılı olur ve ALE çıkışındaki hata sinyalinin küçülmesine neden olur.
Anahtar Kelimeler: Uyarlanabilir Süzgeçler, Uyarlanabilir Gürültü Yoketme, Enaz Ortalama Kare Algoritması, Uyarlanabilir Kanal Yükselticisi, Sinyal Gürültü Oranı.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Signal Processing
Speech Recognition
Adaptive Filters, Adaptive Noise Cancellation, Least Mean Square Algorithm, Adaptive Line Enhancer, Signal to Noise Ratio
Real time implementation of adaptive line enhancer
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1468/3/DarghaothAhmed.pdf.txt
File
MD5
1f8eb597667bbacc6d85f537a05a2d30
74369
text/plain
DarghaothAhmed.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1468/1/DarghaothAhmed.pdf
File
MD5
0a4e4ed969ec416b3e1ad839a79b294d
1478294
application/pdf
DarghaothAhmed.pdf
oai:i-rep.emu.edu.tr:11129/14702014-11-06T00:00:47Zhdl_11129_11
EMU I-REP
author
Alavizadeh, Hooman
2014-11-05T11:15:45Z
2014-11-05T11:15:45Z
2013-06
Alavizadeh, Hooman. (2013). Secure true random number generator in a distributed system via wireless LAN (Distributed-RNG protocol). Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1470
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assoc. Prof. Dr. Alexander Chefranov.
ABSTRACT: In computer network and cryptography era, the necessity of generating true random numbers (TRNG), in the security directions and cryptography algorithms which require random numbers as nonce, public keys, private keys, session keys, secret keys, seeds, salts and etc. is inevitable. Cryptography algorithms are widely used in various networks; among them, Wireless networks need more security in comparison to the other networks due to their intrinsic vulnerabilities against possible attacks. In the most of recently studies, it is proven that an acceptable random number will not be generated unless using a distributed method for random number generator. This thesis firstly analyses a protocol for generation of secure true random number (Scatter) which used distributed method via a wireless network. Secondly, after making some changes on the mentioned protocol in regard to protocol structure and entropy of randomness source, the enhanced Distributed-RNG protocol is introduced; it provides more security and flexibility. Then, the quality of randomness of obtained random numbers using National Institute of Standards and Technology (NIST) tests is evaluated. Finally, after analyzing the results of both studies, it can be conducted that 60 percent of obtained results in this thesis are better than the existing protocol (Scatter).
Keywords: Cryptography, True Random Numbers Generator (TRNG), Network Security, Nonce, Key Generations.
…………………………………………………………………………………………………………………………
ÖZ: Bilgisayar ağları ve kriptografi çağında, güvenlik konusunda ve kriptografi algoritmalarında gerçek rasgele numaralar yaratmak kaçınılmazdır. Kriptografi algoritmaları değişik ağlarda kullanılmaktadır. Bu ağlar arasında bulunan kablosuz ağlar, kablolu ağlara kıyasla daha fazla güvenlik gerektirmektedirler. Bu tezde, önce gerçek rasgele numaralar yaratma protokolu (Scatter protokolu) incelenmiştir. Daha sonra, yapısında ve rasgele numaralar kaynağı entropisinde bazı değişiklikler yapılmıştır. Geliştirilmiş olan protokol (Distributed-RNG) güvenlik ve esneklik sağlamaktadır. Rasgele numaraların kalitesi Ulusal Standartlar ve Teknoloji Enstitüsü (NIST) testleri tarafından değerlendirilmiştir. En sonunda iki algoritma karşılaştırıldığında, bu tezde önerilen algoritmanın sonuçları scatter algoritmalarından %60 daha iyi olduğu gözlemlenmiştir.
Anahtar Kelimeler: Kriptografi, Gerçek Rasgele Numaralar Yaratma (TRNG), Ağ güvenliği, NIST Testi.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Computer networks - Security measures
Computer security
Cryptography, True Random Numbers Generator (TRNC), Network Security, Nonce, Key Generations
Secure true random number generator in a distributed system via wireless LAN (Distributed-RNG protocol)
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1470/3/AlavizadehHooman.pdf.txt
File
MD5
3ab05a887d2fbb96752bd90845cada28
125407
text/plain
AlavizadehHooman.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1470/1/AlavizadehHooman.pdf
File
MD5
2e3dd463a4d1d1311649580d16c079f6
1032105
application/pdf
AlavizadehHooman.pdf
oai:i-rep.emu.edu.tr:11129/14732014-11-16T00:00:36Zhdl_11129_11
EMU I-REP
author
Ojukwu, Chukwudi James
2014-11-15T13:07:44Z
2014-11-15T13:07:44Z
2013-07
Ojukwu, Chukwudi James. (2013). Propagation delay models in bio-inspired nanonetworks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1473
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assoc. Prof. Dr. Doğu Arifler.
ABSTRACT: Nanomachines are devices that are made up of nanoscale components. By themselves, nanomachines can perform only simple tasks. To achieve more complex tasks, networks of manomachines or nanonetworks are formed. Molecular communication is a biocompatible, bio-inspired alternative to traditional electromagnetic communication in nanonetworks. In molecular communication, molecules can be considered as information packets. Free diffusion based molecular communication requires no external energy and is the most basic information transport mechanism being considered for nanonetworks. This form of communication however is slow due to the random walk of the particles and the information packets can also be delivered out of order to the destination. These issues present challenges to design and implementation of molecular communication based nanonetworking protocols. While there are significant studies that address physical layer aspects of molecular communication, there is relatively less work in the link layer. In particular, modeling of channel delays or sojourn times of molecule-packets that arrive at a nanomachine is required for queueing theoretic analyses. To this end, simulations are performed to measure the propagation times of molecules between a given source and a destination in both bounded one- and twodimensional spaces and unbounded one-dimensional spaces. Here, one-dimensional settings correspond to molecular communication that take place in very thin capillaries and two-dimensional settings correspond to communication in junctions with small widths, negligible heights or on membranes. There are no closed-form formulas for the delay distribution of freely diffusing particles in arbitrary, bounded environments. The delay measurements in bounded settings are fitted to well-known distributions that are commonly used in modeling time to complete a task. The fits can be used to generate arrival times of molecule-packets at a node. This study is expected to contribute to the analysis of link layer protocols and workload models being considered for nano communication networks.
Keywords: Distribution Fitting, Free Diffusion, Molecular Communication,
Nanonetworks.
…………………………………………………………………………………………………………………………
ÖZ: Nanomakineler nano ölçekte bileşenlerden oluşan cihazlardır. Nanomakineler kendi
başlarına sadece basit işlemler yapabilirler. Daha karmaşık işlemler için nanomakinelerden ağlar, yani nano ağlar, oluşturulabilir. Moleküler iletişim biyolojiden ilham alınmış, biyo-uygun, geleneksel elektromagnetik iletişime alternatif bir iletişim şeklidir. Moleküler iletişimde paketler moleküllerdir. Serbest difüzyona dayalı moleküler iletişimde, harici enerji gereksinimi yoktur ve nano ağlar için düşünülen en temel veri taşıma mekanizmasıdır. Ancak bu mekanizma, parçacıkların rasgele yürüyüşünden dolayı yavaştır. Ayrıca, parçacıklar gönderilme sırasından farklı olarak hedefe ulaşabilirler. Bunlar, moleküler iletişim protokollerini tasarlamayı zorlaştırmaktadır. Moleküler iletişimin fiziksel katmanıyla ilgili birçok çalışma olmasına rağmen, bağlantı katmanıyla ilgili çalışmalar çok azdır. Özellikle,
iletişim kanalında paketin yayılma zamanı kuyruklama teorisi açısından önemlidir. Bu bağlamda, yayılım zamanlarını ölçmek için bir ve iki boyutlu, sınırsız ve sınırlı ortamlarda difüzyon simulasyonları yapılmıştır. Bir boyutlu simulasyonlar kılcal damarlardaki iletişime karşılık gelebilir. İki boyutlu simulasyonlar ise kavşak ve zar üzerindeki iletişime karşılıktır. Sınırlı ortamlarda, serbest difüzyonla hareket eden parçacıkların gecikme zaman dağılımlarının formülü bulunmamaktadır. Sınırlı ortamlardaki yayılım zamanları, bilinen dağılımlara eşleştirilmiştir. Eşleştirmeler, molekül-paketlerin bir nanomakineye varma zamanlarını modellemek için kullanılabilecektir. Dolayısıyla, bu çalışma nano ağların bağlantı katmanı analizlerine katkı koyacak niteliktedir. Anahtar Kelimeler: Dağılımlara Eşleştirme, Serbest Difüzyon, Moleküler İletişim, Nano Ağlar.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Molecular communication (Telecommunication)
Distribution Fitting, Free Diffusion, Molecular Communication, Nanonetworks
Propagation delay models in bio-inspired nanonetworks
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1473/3/OjukwuJames.pdf.txt
File
MD5
0cbc449775048e5b828190e982848246
153082
text/plain
OjukwuJames.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1473/1/OjukwuJames.pdf
File
MD5
42924e9818ac1d7ef4e8593bd5818cad
4843008
application/pdf
OjukwuJames.pdf
oai:i-rep.emu.edu.tr:11129/14802014-11-16T00:00:41Zhdl_11129_11
EMU I-REP
author
Falahatraftar, Farnoosh
2014-11-15T14:02:32Z
2014-11-15T14:02:32Z
2013-06
Falahatraftar, Farnoosh. (2013). Improving video-on-demand performance with prefetching. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1480
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assoc. Prof. Dr. Işık Aybay.
ABSTRACT: Over the past few years multimedia communications has become essential parts of people’s daily life. In this context, video streaming is attracting extensive attention and is becoming one of the most popular activities over the Internet. However, video streaming supports a large number of simultaneous users and consumes more network bandwidth as compared to other internet applications. So, implementations that can improve video streaming efficiency are of particular importance. On the other hand, the spectacular development in Peer-to-Peer (P2P) technologies presents scalability and support for large number of users worldwide.
In this work, we consider a prefetching mechanism in a P2P Video-on-Demand (VoD) system and study performance of using this prefetching method on our model. We compute the prefetching time for one video segment and then divide our idle time into several slices of prefetch activities. The prefetched segments are the segments which are not available on other peers in the network, therefore those must be prefetched from the server directly.
With using this prefetching mechanism, the idle time of the system is reduced and consequently, the efficiency of the system will be improved.
Keywords: Prefetching, VoD Systems, Peer-to-Peer Networks, Efficiency.
…………………………………………………………………………………………………………………………
ÖZ: Son yıllarda multimedia iletişim konusu insan yaşamında vazgeçilmez bir yer tutmaktadır. Bu bağlamda, akan video uygulamaları, Internet üzerindeki en yaygın uygulamalar arasında yer almaktadır. Ancak akan video, aynı anda bır çok kullanıcıya ulaşması gereken ve dığer internet uygulamalarına göre daha büyük bant genişliğine ihtiyaç duyan bır uygulamadır. Bu nedenle, akan video uygulamalarında etkinlik ve hızı artırabilen yaklaşımlar önem kazanmaktadır. Aynı ağ üzerindeki bilgisayarların birbirine destek olmasını sağlayan P2P (Peer-to-Peer) tekniği de bu konuda yararlı olmaktadır.
Bu çalışmada, P2P akan video uygulamaları için önceden-getirme (Prefetching) yöntemini kullanarak sistem etkinliginin arttırılması amaçlanmıştır. Önceden-getirme işlemi, sistemin boş (Idle) zamanlarında yapılmaktadır. Aynı ağdaki diğer bilgisayarlarda bölümler (segment) için önceden-getirme işlemi uygulamaktadır.
Önceden-getirme yöntemi ile sistemin boş geçirdigi zaman azaltılmakta ve böylece sistem etkinligi artırılmaktadır.
Anahtar kelimeler: Önceden-getirme, Akan Video Sistemleri, Peer-to-Peer Ağlar, Sistem Etkinliği
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Multimedia systems
Prefetching, VoD Systems, Peer-to-Peer Networks, Efficiency
Improving video-on-demand performance with prefetching
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1480/3/Falahatraftar.pdf.txt
File
MD5
b3699fea0e68b1a0d7c0623321fc9bb3
82740
text/plain
Falahatraftar.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1480/1/Falahatraftar.pdf
File
MD5
10501f285d419ab4c6df3c70c2499861
1054156
application/pdf
Falahatraftar.pdf
oai:i-rep.emu.edu.tr:11129/14982014-11-20T00:00:37Zhdl_11129_11
EMU I-REP
author
Shehab, Aws Nabeel
2014-11-19T07:55:42Z
2014-11-19T07:55:42Z
2013-07
Shehab, Aws Nabeel. (2013). An automation on interactive advertisement for companies on local street in TRNC. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1498
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assist. Prof. Dr. Yıltan Bitirim.
ABSTRACT: In this thesis, an online interactive Web application is developed to reduce the difficulties of communication between the customers and the companies on a local street, be a bridge between the customers and the companies and contribute in economic growth.
The developed application has a friendly user interface for tablet PCs and mobile phones. In order to let the customers to navigate the companies freely, visual representation is used in the application.
Our system is developed as a prototype and applicable for using in any local street of any city.
Keywords: Web application, prototype, local street.
…………………………………………………………………………………………………………………………
ÖZ: Bu tez, tüketiciler ve yerel caddedeki iş yerleri arasındaki iletişim zorluklarını azaltmak, tüketiciler ve caddedeki iş yerleri arasında bir köprü oluşturmak ve ekonomik büyümeye katkıda bulunmak amacıyla geliştirilmiş bir interaktif Web uygulamasını içermektedir.
Geliştirilen uygulama, tablet bilgisayarlar ve mobil telefonlar için kullanıcı dostu bir arayüze sahiptir. Tüketicilerin iş yerlerini rahat bir şekilde gezebilmelerini sağlamak için uygulamada görsel tasarım kullanılmıştır.
Bizim sistemimiz bir prototip olarak geliştirilmiş ve herhangi bir şehrin herhangi bir yerel caddesinde kullanılmak üzere uygulanabilirdir.
Anahtar Kelimeler: Web uygulaması, prototip, yerel cadde.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Internet marketing - Web site
Web Application, Prototype, Local Street
Internet advertising--Computer network resources
An automation on interactive advertisement for companies on local street in TRNC
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1498/3/ShehabAws.pdf.txt
File
MD5
97c48ab3927075c44e1dd2aa946e5d05
90071
text/plain
ShehabAws.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1498/1/ShehabAws.pdf
File
MD5
46ff1f410bfc931e339e79a2478aeea0
3704114
application/pdf
ShehabAws.pdf
oai:i-rep.emu.edu.tr:11129/15002014-11-20T00:00:46Zhdl_11129_11
EMU I-REP
author
Alobaidi, Liwaa Hussein
2014-11-19T08:34:33Z
2014-11-19T08:34:33Z
2013-08
Alobaidi, Liwaa Hussein. (2013). A comparative study on the fox and lu equations versus the colored stochastic hodgkin - Huxley equations. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1500
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Marifi Güler.
ABSTRACT: In recent years, it has been argued and experimentally shown that ion channel noise in neurons can cause fundamental effects on the neuron’s dynamical behavior. Most profoundly, ion channel noise was seen to be able to cause spontaneous firing and stochastic resonance. It was recently found by Güler (2011) that a non-trivially persistent cross correlation regarding position among the trans-membrane voltage fluctuations, and the element of open channel fluctuations is attributed to gate multiplicity. This non-trivial phenomenon was found to play an essential role in the elevation of excitability and spontaneous firing in the small size cell. Furthermore, the phenomenon was found to significantly enhance the spike coherence. More recently, the effect of the above cross correlation persistency was modeled by the same author Güler (2013), through inserting some colored noise terms inside the conductance's in the stochastic Hodgkin Huxley equation.
In this thesis, the broadly used stochastic of Hodgkin-Huxley equation, proposed by Fox and Lu, and the colored stochastic Hodgkin-Huxley equation, proposed by Güler recently, will be investigated in a comparative manner. The performance analysis of the two models will be performed with respect to the microscopic Markovain channel simulations. The statistic will be obtained using different membrane size and different input current values. Our investigation reveals that the performance of the Güler model is more effective than the Fox and Lu equations and gives better agreement with the microscopic simulation results. Keywords: Channel Gate, Ion Channel, Small Size Membrane, Channel Noise, Stochastic Hodgkin-Huxley Equations.
…………………………………………………………………………………………………………………………
ÖZ: Son yıllarda, nöronlardaki ion kanal gürültüsünün nöron dinamiği üzerinde hayati etki yapabildiği deneysel olarak da kanıtlanmıştır. Bu kapsamda, kendi kendine ateşleme ve stokastik rezonans en çarpıcı bulgulardır.
İyon kanallarında çoklu geçit bulunmasının, voltage dalgalanmaları ve açık kanal dalgalanmaları arasında ilk bakışta gözükmeyen bir daimi çapraz ilişkiye neden olduğu Güler (2011) tarafından ortaya çıkartılmıştır. Bu ilk bakışta gözükmeyen olgunun, küçük boyutlu hücrelerde yüksek uyarılma ve kendi kendine ateşlemeye neden olduğu bulunmuştur. Bu olgunun ateşlemede uyum artışı sağladığıda gözlenmiştir. Daha yakın zamanda, daimi çapraz ilişki, Hodgkin-Huxley denklemlerinde geçirgenliklere renkli gürültü terimleri ekleyerek modellenmiştir (Güler, 2013).
Bu tezde, yaygın olarak kullanılan Fox ve Lu’nun stokastik Hodgkin-Huxley denklemleri ve yukarıdaki renklendirilmiş stokastik Hodgkin-Huxley denklemleri karşılaştırmalı olarak incelenmiştir. Mikroskopik Markov benzeşim sonuçları referans alındığında, Güler modeli bulgularının Fox ve Lu bulgularından daha uyumlu olduğu gözlenmiştir.
Anahtar Kelimeler: Renkli Gürültü, Kanal Geçiti, İyon Kanalı, Küçük Boyutlu Zar, Kanal Gürültüsü, Stokastik Hodgkin-Huxley Denklemleri.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Stochastic Systems
Channel Gate, Ion Channel, Small Size Membrane, Channel Noise, Stochastic Hodgkin - Huxley Equations
A comparative study on the fox and lu equations versus the colored stochastic hodgkin - Huxley equations
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1500/3/AlObaidiLiwaa.pdf.txt
File
MD5
c54ebadd50d45c98a96db7c2e1e68938
59546
text/plain
AlObaidiLiwaa.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1500/1/AlObaidiLiwaa.pdf
File
MD5
e28990d15f98897f0b6c5f206a9629be
1292379
application/pdf
AlObaidiLiwaa.pdf
oai:i-rep.emu.edu.tr:11129/16072015-03-07T00:01:09Zhdl_11129_11
EMU I-REP
author
Şıker, Fatma
2015-03-06T09:20:56Z
2015-03-06T09:20:56Z
2014-06
Şıker, Fatma. (2014). Face Recognition using Localized Facial Features. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1607
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assist. Prof. Dr. Cem Ergün.
ABSTRACT: Face is a complex multi-dimensional structure and needs good computing biometric techniques for recognition. The aim of this study is to understand the role of each localized facial feature component in face recognition system and treat it as a one-dimensional recognition problem. In this context, face recognition is performed by using Principal Component Analysis (PCA) method. Face images are stored in a face database that encodes best variation among face images. Instead of recognizing human characteristic from full face data, identifying the facial feature components seperately might be alternative classification method to get successful recognition performance face is defined by eigenface which are eigenvectors of the set of face components. Each face feature is extracted by using automatic/manual segmentation techniques to have facial features such as left eyes, right eyes, nostrils and mouth. Finally, each segmented facial feature can be one classifier and combination of each may help to form multi-classifier problem to achieve improved recognition results. Proposed face recognizion system, which is using localized facial features along with global face, improves PCA-based face system by average of 4.5 %.
Keywords: Face Recognition, Principal Component Analysis, Segmentation Techniques, Multi-Classifier Problem.
…………………………………………………………………………………………………………………………
ÖZ: Yüz karmaşık çok boyutlu bir yapı olarak tanınmasından dolayı iyi bir biyometrik hesaplama tekniğine ihtiyacı vardır. Yüz tanıma sisteminde amacı belirlemek için her bir bileşenin rolünü anlamak ve tek boyutlu tanıma sorunu olarak tanımlamak gerekir. Bu şekilde yüz tanıma sistemi Temel Bileşen Analizi (PCA) yöntemi kullanılarak yapılır. Yüz görüntüleri arasındaki en iyi varyasyon kodlar bir yüz veritabanı üzerine tahmin edilerek yüz görüntüleri ile bulunur. Buna bağlı olarak başarılı tanıma test sonuçları elde etmek için alternatif sınıflandırma yönteminin belirlenmesi ve yüz bileşenlerinin tanıma özelliği yerine yüzün bütün verileri ve insanın karakterleri tanımlanır. Yüzün her bir öznitelik parçası olan sol göz, sağ göz, burun delikleri ve ağız gibi yan yüz özellikleri kullanılarak bazı bölütleme teknikleri ile ayıklanması özvektörler olan özyüz ile tanımlanır. Yani, bu özyüz yaklaşım görüntülerinin tanınması için Temel Bileşen Analizi (PCA) yöntemi kullanılarak net bir görünüm elde edilir. En sonda başarılı tanıma sonuçları elde etmek için çoklu sınıflandırıcı kullanılarak her kombinasyon ve sınıflandırma ile yüz özelliği modellenir.
Anahtar Kelimeler: Yüz Tanıma, Temel Bileşenler Analizi, Çoklu Sınıflandırıcı sorunu, Bölütleme teknikleri.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Image Processing
Face Recognition, Principal Component Analysis, Segmentation Techniques, Multi-Classifier Problem
Face Recognition using Localized Facial Features
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1607/3/SikerFatma.pdf.txt
File
MD5
2cc535d5b924cfc1630ad4c33778f2de
75739
text/plain
SikerFatma.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1607/1/SikerFatma.pdf
File
MD5
c984b51632429675b14b6c5d5c9c8029
847038
application/pdf
SikerFatma.pdf
oai:i-rep.emu.edu.tr:11129/16192015-03-10T00:01:16Zhdl_11129_11
EMU I-REP
author
Asaad, Renas Rajab
2015-03-09T08:54:28Z
2015-03-09T08:54:28Z
2014-06
Asaad, Renas Rajab. (2014). An Investigation of the Neuronal Dynamics Under Noisy Rate Functions. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1619
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Prof. Dr. Marifi Güler.
ABSTRACT: In latest years, it has been argued theoretically both by experiments and by numerical simulations that noise of ion channel in neurons effect on the dynamical behavior of neuron when the size of membrane area is limited. Different models that extend the Hodgkin-Huxley equations into stochastic differential equations to capture the effects of ion channel noise analytically have been put forward: the Fox-Lu model, the Linaro-Storace-Giugliano model, and the Güler model. Moreover, very recently it has been argued by Güler that the rate functions for the opening and closing of gates are under the influence of noise in small size neurons.
In this thesis, the neuronal dynamics with subject to noise in the rate functions will be investigated thoroughly. The investigation will employ the exact Markov simulations and the above analytical models. Results from these models will be presented comparatively. The study aims at presenting a more detailed account on the phenomenon already outlined by Güler recently.
Keywords: Ion Channels, Channel Noise, Colored Noise, The Channel Crossing, Small-sized Dice, Stochastic Hodgkin-Huxley.
…………………………………………………………………………………………………………………………
ÖZ: Son yıllarda, nöronlardaki ion kanal gürültüsünün küçük boyutlu nöron dinamiği üzerinde hayati etki yapabildiği deneysel olarak ve sayısal benzetim yöntemleri kullanarak kanıtlanmıştır. Sözkonusu etkinin analitik olarak ifade edilmesine yönelik olarak farklı gruplar Hodgkin-Huxley denklemlerini stokastik diferansiyel denklem haline dönüştürmüştür: Fox-Lu (1994); Linaro, Storace ve Giugliano (2011); Güler (2013a). Daha yakın zamanda, Güler (2013b) tarafından geçit kapanım-açılım oran fonksiyonlarının gürültülü olabildiği öne sürülmüştür.
Bu tezde, yukarıdaki stokastik Hodgkin-Huxley modelleri gürültülü oran fonksiyonları altında çalışılmıştır. Güler (2013a) modelinin diğer modellere göre mikroskopik benzeşim sonuçlarıyla çok daha uyumlu olduğu gözlenmiştir.
Anahtar Kelimeler: İyon kanalı, Kanal gürültüsü, Renkli gürültü, Kanal geçiti, Küçük boyutlu zar, Stokastik Hodgkin-Huxley.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Ion Channels, Channel Noise, Colored Noise, The Channel Crossing, Small-Sized Dice, Stochastic Hodgkin-Huxley
An Investigation of the Neuronal Dynamics Under Noisy Rate Functions
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1619/3/AsaadRenas.pdf.txt
File
MD5
9ac8bb95008442c12812f49f540016f3
60169
text/plain
AsaadRenas.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1619/1/AsaadRenas.pdf
File
MD5
9b40581e0108255944e7229e1c3f78ad
1262116
application/pdf
AsaadRenas.pdf
oai:i-rep.emu.edu.tr:11129/16292015-03-11T00:01:14Zhdl_11129_11
EMU I-REP
author
Mahdizadeh, Hamed
2015-03-10T13:21:40Z
2015-03-10T13:21:40Z
2014-03
Mahdizadeh, Hamed. (2014). Multi Objective Optimization of Control Parameters for Auto-Steering of Off-Road Vehicles. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1629
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assist. Prof. Dr. Mehmet Bodur.
ABSTRACT: In this thesis, the lateral controller parameters of an agricultural tractor vehicle were optimized to reduce both the root mean square error (ERMS), and the peak error (Epeak), by using two evolutionary multi-objective optimization algorithms. The lateral controller of a tractor provides tracking of a desired path with minimum lateral error, which enhances the efficiency of agricultural plantation since many processes in agriculture require tracking a desired path.
The evolutionary multi-objective optimization algorithms: NSGA-II and MODE are commonly used search algorithms to find the Pareto-front of the optimal solutions for multiple fitness functions. In parameter optimization of the lateral controller, two fitness functions, ERMS and Epeak, were evaluated along a predefined reference path of tracking through the simulation of the tractor motion in an agricultural field.
Results of the optimization by both methods supported each other closely, and the optimization reduced the error figures down to 0.0016 m Epeak, and 0.0004 m ERMS. The obtained Pareto-front can be used to compromise between the Epeak and ERMS in setting the controller parameters best way for the conditions of the application.
Keywords: NSGA-II - MODE - Lateral Error – Auto-Steering Control.
…………………………………………………………………………………………………………………………
ÖZ: Bu tezde, otomatik sürüş denetimli bir tarım aracının sürüş denetleç parametreleri, evrimsel çok-amaçlı optimizasyon algoritması kullanarak, hem hatanın karesinin ortalamasının kökünu (ERMS) hem de hatanın tepe değerini azaltmak üzere optimize edildi. Traktörün sürüş denetleci takip edilecek yolun en az yanal hata ile izlenmesini sağlar. Tarımda takip edilecek bir yolun izlenmesini gerektiren bir çok süreç bulunduğundan yanal hata azalınca tarımda ekim verimi de artar.
Çok amaçlı evrimsel optimizasyon algoritmaları olan NSGA-II ve MODE genellikle birden fazla uygunluk fonksiyonlu problemler için optimum çözümlerdeki Pareto-önü elde etmek için kullanılan arama algoritmalarıdır. Yanal denetim parametrelerinin optimizasyonunda, uygunluk fonksiyonları olarak kullanılan rmse ve tepe hata, traktörün önceden seçilmiş bir izlenecek yol boyunca simülasyonu yoluyla elde edilmiştir.
Her iki yöntemle optimizasyon sonuçları birbirlerini yakından desteklemektedir. Optimizasyon sonucu bulunan parametrelerden elde edilen yanal hatanın rmse değeri 0.0004 m’ye, tepe değeri 0.0016 m’ye kadar düşmüştür. Pareto-önden elde edilen parametrelerden uygulama koşullarına bağlı olarak tepe ve rmse hatalar arasında en iyi uzlaşma sağlayacak olanını kullanmak mümkündür.
Anahtar Kelimeler: NSGA-II - MODE - Yanal hata – Otomatik sürüş denetimi.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Motor Vehicles - Automatic Control
NSGA-II, MODE, Lateral Error, Auto Steering Control
Multi Objective Optimization of Control Parameters for Auto-Steering of Off-Road Vehicles
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1629/3/Mahdizadeh.pdf.txt
File
MD5
da9bc7c5bfbad6c1a64609376015ba4c
100480
text/plain
Mahdizadeh.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1629/1/Mahdizadeh.pdf
File
MD5
efcfed9ce98005c4db038cd2603fe2f6
1385807
application/pdf
Mahdizadeh.pdf
oai:i-rep.emu.edu.tr:11129/16332015-03-12T00:01:45Zhdl_11129_11
EMU I-REP
author
Sefidgari, Bahram Lavi
2015-03-11T08:03:14Z
2015-03-11T08:03:14Z
2014-07
Sefidgari, Bahram Lavi. (2014). Online Multiple Face Detection and Tracking from Video. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1633
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assist. Prof. Dr. Adnan Acan.
ABSTRACT: Online face detection and tracking systems have received increasing interest in the last decade. Face detection and tracking are subfield of biometric information processing and object tracking, respectively. Recent advances in theory and practical implementations made the online detection and tracking systems work in real time. Face detection and tracking system designed and implemented in this thesis exploits a combination of techniques in two topics; face detection and tracking. Face detection is performed on live achieved images from video. Processes exploited in the system are color balance, skin segmentation, and facial image extraction on face candidates. Then a face classification method that uses a Haar classifier is employed in the system. Finally, the result from detection part is engaged with a Kalman filter for tracking candidate faces in reasonable speed of change.
The system is tested in practice and has shown to have acceptable performance for tracking faces within the proposed limits. The developed system also gave satisfactory results for multiple faces in live achieved images within each video frame.
Keywords: Face detection, object tracking, facial feature extraction, Haar classifier, Kalman filter.
…………………………………………………………………………………………………………………………
ÖZ: Son yıllarda, çevrimiçi yüz tespit ve takip sistemleri artan bir ilgi çekmişlerdir. Yüz tespit ve takibi biyometrik bilgi işleme ve nesne takibi konularının alt alanlarıdır. Teorik ve pratik uygulamalardaki gelişmeler çevrimiçi tespit ve takip sistemlerinin gerçek zamanlı olarak çalışmasını olanaklı kılmıştır. Bu çalışmada tasarımı ve uygulaması yapılan yüz tespit ve takip sistemi her iki alanda varolan yöntemlerin bileşiminden yararlanılarak oluşturulmuştur. Yüz tespiti canlı elde edilen görüntüler üzerinde yapılmıştır. Bu süreçte yararlanılan yöntemler şunlardır: renk dengesi, deri bölünmesi, yüz özelliklerinin çıkanlması ve yüzsel aday bölgelerin elde edilmesi. Bundan sonra Haar tabanlı bir sınıflandırma yöntemi kullanılarak yüzler tespit edilir ve bir dörtgen içine alınırlar. Son olarak, yüz tespiti sürecinden elde edilen yüz görüntüleri takip işlemi için bir Kalman süzgeci ile işlenerek kabul edilebilir bır değişim hızında takıp edilirler.
Tasarımlanan sistemin pratik olarak test edilip, yüz tespiti ve takibi için kabul edilir bir başarım sağladığı görülmüştür. Geliştirilen sistemle canlı görüntüler üzerinden çoklu yüzlerin tespit ve takibi için de yeterli başarıma ulaşılmıştır.
Anahtar Kelimeler: Yüz tespiti, nesne takibi, yüzsel özellik çıkarımı, Haar sınıflayıcı, Kalman süzgeci.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Computer Vision
Image Processing
Face Detection, Object Tracking, Facial Feature Extraction, Haar Classifier, Kalman Filter
Online Multiple Face Detection and Tracking from Video
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1633/3/SefidgariLavi.pdf.txt
File
MD5
27ae37c4fe2f4257ba947396b53b132d
69326
text/plain
SefidgariLavi.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1633/1/SefidgariLavi.pdf
File
MD5
2f781e38a94b717368ff8120ad661c33
1050177
application/pdf
SefidgariLavi.pdf
oai:i-rep.emu.edu.tr:11129/16622015-03-21T00:00:59Zhdl_11129_11
EMU I-REP
author
Hasan, Marwan
2015-03-20T11:54:01Z
2015-03-20T11:54:01Z
2014-06
Hasan, Marwan. (2014). A Hardware Oriented Algorithm for 3D AOA Mobile Positioning. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1662
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assoc. Prof. Dr. Mustafa İlkan.
ABSTRACT: The determination of a mobile object’s location in a cellular network becomes very important with the new US Federal Communication Commission (FCC) standards regarding the wireless Enhanced 911 (E911) emergency calling systems. Most commonly used methods for location can be addressed as Time of Arrival (TOA), Time difference of Arrival (TDOA) and Angle of Arrival (AOA). The importance of finding the location of a mobile object in 3D becomes much more important especially after Federal Communication Commission’s announcement which asks about the vertical position estimation of a mobile object.
There exist general approaches to simple algorithms for 2D positioning techniques in cellular networks and adhoc networks. Such an approach is missing for 3D positioning. The aim of this project is via using AOA signal measurement technique to form a simple algorithm for 3D positioning that could be implemented both as hardware and software.
Four new 3D AOA algorithms; MEM-1, MEM-2, DMEM-1 and DMEM-2 are proposed in this study. At the end of simulation from the results it is clear that our proposed algorithms outperform the traditional algorithm in terms of computational cost and execution simplicity.
Keywords : Positioning algorithm, Angle of Arrival, 3D positioning.
…………………………………………………………………………………………………………………………
ÖZ: ABD Federal İletişim Komisyonunun (FİK) kablosuz genişletilmiş acil çağrı (E911) standartlarında değişikliğe gitmesi ile mobil cihazların hücresel ağlar içerisindeki yerlerinin belirlenmesi çok önemli bir hal almıştır. Konum bulmak için yaygın olarak kullanılan yöntemler; varış zamanı (VZ), varış zamanı farkı (VZF) ve varış açısı (VA) olarak listelenebilir. Mobil cihazların konumunu üç boyutlu olarak bulma, FİK’nun mobil cihazların dikey konum tahmininin gerekli olduğunu açıklamasından sonra önem kazanmıştır.
Halihazırda hücresel ağlar içerisindeki mobil cihazların yerlerinin iki boyutlu olarak belirlenmesini sağlayan algoritmalar mevcuttur. Fakat üç boyutlu yer belirlemede kullanılabilecek algoritmalar yoktur. Bu çalışmanın amacı, VA yöntemini kullanarak üç boyutlu yer belirlemede kullanılabilecek bir algoritma geliştirmektir.
Bu çalışmada MEM-1, MEM-2, DMEM-1 ve DMEM-2 adlarında dört tane yeni algoritma geliştirilmiştir. Bu algoritmalar VA yöntemini kullanarak mobil cihazların yerlerinin üç boyutlu olarak bulunmasını sağlamaktadırlar. Simülasyon sonuçları geliştirilen algoritmaların geleneksel olandan daha verimli çalıştığını göstermektedir.
Anahtar kelimeler : konum bulma algoritması, varış açısı, üç boyutlu yer belirleme.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Mobile Communication - Computer Networks
Positioning Algorithm, Angle of Arrival, 3D Positioning
A Hardware Oriented Algorithm for 3D AOA Mobile Positioning
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1662/3/HasanMarwan.pdf.txt
File
MD5
47758ef1f69a0038a773121386db276d
104196
text/plain
HasanMarwan.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1662/1/HasanMarwan.pdf
File
MD5
5971f7125b28fe6b8286312caa2a94a5
1469879
application/pdf
HasanMarwan.pdf
oai:i-rep.emu.edu.tr:11129/16712015-03-25T00:01:19Zhdl_11129_11
EMU I-REP
author
Hussein, Naseer Alwan
2015-03-24T11:44:18Z
2015-03-24T11:44:18Z
2014-05
Hussein, Naseer Alwan. (2014). Design of a Network-Based Anomaly Detection System Using VFDT Algorithm. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1671
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assoc. Prof. Dr. Mohammed Salamah.
ABSTRACT: Despite the rapid progress in information technology, the problem of protecting computer and network security remained a major challenge for most researchers,
especially after the expansion of networks and evolution of technology and the
increasing number of network users and the internet. Networks need some tools for
protection, such as firewall, Intrusion Detection Systems (IDSs) and Intrusion
Prevention System (IPS). The aim of this thesis is to build a Network-based
Anomaly Detection System (NADS). This system depends on the normal behavior of
the network, in that it can distinguish each abnormal behavior. This system can work
in two modes, online and offline modes. Very Fast Decision Tree (VFDT) algorithm
was used to build the classifier for intrusions. VFDT is one of the data mining
algorithms that deal with high data streams in a very short time. Experimental results
demonstrated that NADS system is highly successful in detecting known and
unknown attacks by 93%.
Keywords: Network Security, Intrusion Detection, Very Fast Decision Tree
Algorithm, KKD CUP99 dataset.
…………………………………………………………………………………………………………………………
ÖZ: Bilgi teknolojilerindeki hızlı gelişmelere rağmen bilgisayar ve ağ güvenliğinin
sağlanması birçok araştırmacı için, özellikle ağ sayılarının çoğalması, teknolojinin
değişmesi, sayıları artmakta olan ağ kullanıcıları ve İnternet gibi nedenlerle,
çözülmesi zor bir konu olarak kalmıştır. Var olan ağların korunma için güvenlik
duvarı, güvenlik ihlali tespit ve önleme sistemleri gibi çeşitli araçlara ihtiyacı
bulunmaktadır. Bu tez çalışmasının amacı ağ merkezli bir anormal saldırı tespit
sistemi geliştirmektir (NADS). Adı geçen sistems ağın normal davranışına bağlı
olarak anormal davranış biçimini tespit etme görevini sürdürüp çevirimiçi ve
çevirimdışı olmak üzere iki biçimde çalışmaktadır. Ağ ihlallerinin sınıflandırılması
için Çok Hızlı Karar Verme Ağacı (VFDT) algoritması kullanılmıştır. Çok Hızlı
Karar Verme Ağacı kısa sürede gerçekleşen yüksek veri akışı ile ilgilenen veri
madenciliği algoritmalarından biridir. Deneysel sonuçlar,ağ, ağ merkezli anormal
saldırı tespit sisteminin bilinen (NADS) ve bilinmeyen saldırıları tespit etmekte % 93
başarılı olduğunu göstermiştir.
Anahtar Kelimeler: Ağ Güvenliği, İhlal Tespiti,Çok Hızlı Karar Verme Ağacı
Algoritması, KKD CUP99 veri grubu.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Network Security - Computer Engineering
Network Security, Intrusion Detection, Very Fast Decision Tree Algorithm, KKD CUP99 dataset
Design of a Network-Based Anomaly Detection System Using VFDT Algorithm
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1671/3/HusseinNaseer.pdf.txt
File
MD5
4da4f4575d77b4b5f7a5ea7c9b995dfb
93073
text/plain
HusseinNaseer.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1671/1/HusseinNaseer.pdf
File
MD5
4a085eda1fe79af6c02c3b8878c0f030
981914
application/pdf
HusseinNaseer.pdf
oai:i-rep.emu.edu.tr:11129/16762015-03-25T00:01:14Zhdl_11129_11
EMU I-REP
author
Korkmaz, Zahit
2015-03-24T13:50:15Z
2015-03-24T13:50:15Z
2014-06
Korkmaz, Zahit. (2014). Analysis of a Propagation Model for Molecular Communication in Nanonetworks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1676
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assoc. Prof. Dr. Muhammed Salamah.
ABSTRACT: Nano-communication is a new technological invention that is achieved by the use of nanomachines with nanoscale functional components, with extremely limited workspaces. It provides numerous new solutions in the fields of biomedical sciences, industry, and the military by enabling communication among nano-devices in a scale ranging from one to a hundred nanometers. Single nanomachines are able to collaborate with each other through communication and two primary methods for communication among the nano-devices are based on molecular communication or electromagnetic communication. The former uses molecules instead of electromagnetic waves and involves some important processes – encoding, transmission, propagation, reception, and decoding. One significant subject in molecular communication is to analyze how molecules propagate through a fluid medium. In this thesis; we propose a new analytical model for the propagation process of molecules based on the random walk mechanism by formulating the probability density of latency in blood and water. The proposed model takes into account crucial parameters such as the radius of the propagating molecules, viscosity, drift velocity, and the temperature of the fluid medium with respect to different shear rates and thereupon can be used as a general propagation model for nano-communication. The main aim of this thesis is to determine the probability density of latency for the propagating molecules in blood and water that show different viscosity values in different temperatures. Based on the simulation results, latency is highly affected by the distance between source and destination, temperature, shear rate, viscosity, and radius of the propagating molecules through the blood medium. We also evaluate the probability density function (PDF) of latency for different temperatures with different nanomachine distances through the water medium.
Keywords: Molecular Communication, Propagation, Latency, Viscosity, Shear Rate.
…………………………………………………………………………………………………………………………
ÖZ: Nano iletişim yeni bir teknoloji olup, nanometrik boyutlarda oldukça sınırlı çalışma alanları olan nanometrik cihazlar ile yapılır. Biyomedikal, endüstriyel ve askeri alanlarda nanocihazlar arasında yeni çözümler sağlayan bu teknoloji çok küçük parçacıklardan oluşur. Nano teknolojisi, bir ile yüz nanometre arasında değişen bir ölçekte nano cihazlar arasındaki iletişimi sağlar. Nano cihazları arasındaki iletişim için iki temel yöntem vardır: moleküler ve nano-elektromanyetik iletişim. Moleküler iletişimde elektromanyetik dalgalar yerine moleküller kullanılır. Moleküler iletişimdeki aşamalar sırasıyla kodlama, iletim, yayılım, kabul ve kod çözmedir. Moleküler haberleşmedeki en önemli konu sıvı ortam içerisindeki moleküllerin yayılım aşamasındaki analizidir. Bu tezde, rasgele yürüyüş mekanizmasına dayalı moleküllerin yayılma süreci için bir analitik model önerilmiştir. Amaç kan ortamı için gecikme süresinin olası yoğunluk fonksiyonunu formüle etmektir. Önerilen bu model, farklı kayma hızı oranlarıyla birlikte yayılım aşamasındaki moleküllerin yarıçapı, akışkanlıkları, sürüklenme hızı ve sıvı ortamın sıcaklığı gibi önemli parametreleri göz önünde bulundurarak, nano iletişim için genel bir yayılma modeli olarak kullanılabilir bir analiz yapmak. Bu tezin temel amacı, kan ve suyun farklı sıcaklık ve akışkanlık değerlerinde yayılım aşaması sırasındaki moleküllerin gecikme süresini hesaplamaktır. Kanın akışkanlığı kayma hızı oranı ile sıcaklığa bağlıdır. Elde edilen sonuçlara göre, kandaki gecikme süresi nano parçacıkların mesafesine, sıcaklık, kayma hızı oranı, akışkanlık ve yayılım aşamasındaki moleküllerin yarıçapına bağlı olarak etkileşim göstermişlerdir. Su ortamında ise gecikme süresi olasılık oranlarını farklı sıcaklık ve nano parçacık mesafelerine göre değerlendirdik. Anahtar Kelimeler: Moleküler Haberleşme, Yayılım, Gecikme, Viskozite, Kayma Hızı Oranı.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Molecular communication (Telecommunication)
Nanonetworks
Molecular Communication, Propagation, Latency, Viscosity, Shear Rate
Analysis of a Propagation Model for Molecular Communication in Nanonetworks
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1676/3/KorkmazZahit.pdf.txt
File
MD5
0952287df689f23f5484aef21c078de1
93243
text/plain
KorkmazZahit.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1676/1/KorkmazZahit.pdf
File
MD5
809fa95df134d5409063adc2cde8f932
1138706
application/pdf
KorkmazZahit.pdf
oai:i-rep.emu.edu.tr:11129/16792015-03-26T00:00:58Zhdl_11129_11
EMU I-REP
author
Abejide, Adebayo Emmanuel
2015-03-25T13:04:49Z
2015-03-25T13:04:49Z
2014-07
Abejide, Adebayo Emmanuel. (2014). Performance Analysis of an LTE-4G Network Running Multimedia Applications. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1679
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assoc. Prof. Dr. Muhammed Salamah.
ABSTRACT: An increase in the demand for very low latency and QoS satisfaction of the current bandwidth greedy multimedia applications over cellular and mobile devices is on the rise, which brought about the latest step in the UMTS family to develop LTE by the 3GPP. LTE is a new wave of frequency for the current 4G network that is an All-IP based radio frequency. Meaning that, all applications contending the network have to share the same narrow band IP-based network.
In this thesis, we are interested in performances of LTE-4G Network running multimedia applications based on some QoS parameters. Our research was conducted using OPNET Network Simulator. We study the behavior of VoIP and Video Conferencing applications over LTE at static position of the nodes and when the nodes are moving at speed of 30 m/s using a standard Random Waypoint Mobility Model from OPNET
We went further in our study to investigate how these multimedia applications respond to different degree of congestions most especially when NGBR applications like Ftp and Http are contending the channel with the GBR bearers. We finally study the various class of ToS defined in the LTE network to see how this can aid the QoS performance of multimedia applications on the network.
Our results show that sometimes, mobile nodes give better packet end-to-end delay and Mean Opinion Score than the corresponding static nodes because of the HARQ retransmission given up in the mobile node case for VoIP application. Furthermore, our simulation showed that Video Conferencing application sometimes gives less delay at mobile nodes that static nodes because of accumulation of traffics at the static nodes that lead to poor end-to-end performance and high delay variation.
We also found out in our study that the present of best effort traffics in the narrow band LTE network caused VoIP and Video Conferencing applications to give low QoS performances while the LTE traffic classes’ standard in 3GPP improve the QoS of these multimedia applications over LTE network.
Keywords: LTE, QoS, GBR, NGBR, VoIP, Video Conferencing.
…………………………………………………………………………………………………………………………
OZ: Çok düşük gecikme ve hücresel ve mobil cihazlar üzerinden mevcut bant genişliği açgözlü multimedya uygulamaları QoS memnuniyeti için talep artışı 3GPP tarafından LTE geliştirmek için UMTS ailesinin üzerinde son adımı getirildi. LTE All-IP tabanlı radyo frekans akımı 4G ağ için frekansı yeni bir dalgadır.Ağ yarışma tüm uygulamaları aynı dar bant IP tabanlı ağ paylaşmak zorunda anlamına gelir.
Bu tezde, bazı QoS parametrelerine dayalı multimedya uygulamaları çalıştıran LTE-4G Ağı performansları ilgilendirir. Bizim araştırma OPNET Ağ Simülatörü kullanılarak gerçekleştirilmiştir. Biz düğüm statik pozisyonda LTE üzerinden VoIP ve Video Konferans uygulamaları davranışlarını incelemek ve düğümleri OPNET bir standart Rastgele Noktası Hareketlilik Modeli kullanılarak 30 m / s hızında hareket ettirmek için çalıima yaptık.
Biz bu multimedya uygulamaları FTP ve HTTP gibi NGBR uygulamalar GBR taşıyıcıları ile kanal yarışma çoğu özellikle tıkanıklığı farklı derecesi nasıl yanıt araştırmak için bizim çalışmamızda da ileri gitti. Biz nihayet bu ağda multimedya uygulamaları QoS performansını nasıl yardımcı olduğunu görmek için LTE ağı tanımlanan ToS çeşitli sınıfını çalışmasını yaptık
Bizim sonuçlarımız, mobil düğümler çünkü VoIP uygulaması için mobil düğüm durumda vazgeçmiş HARQ yeniden iletimin daha iyi paket uçtan uca gecikme ve ilgili statik düğümler daha Mean Opinion Score verdiklerini göstermektedir. Ayrıca, simülasyon Video Konferans uygulama bazen mobil düğümleri biraz gecikme.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Wireless communication systems
Wireless Internet
LTE, QoS, GBR, NGBR, VoIP, Video Conferencing
Performance Analysis of an LTE-4G Network Running Multimedia Applications
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1679/3/AbejideAdebayo.pdf.txt
File
MD5
16837b9fe6f405916893e64063690ac9
124708
text/plain
AbejideAdebayo.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1679/1/AbejideAdebayo.pdf
File
MD5
b7f6f101b43b2c42f826791e44eb38a4
2574916
application/pdf
AbejideAdebayo.pdf
oai:i-rep.emu.edu.tr:11129/16852015-04-03T23:01:04Zhdl_11129_11
EMU I-REP
author
Hussein, Kilan Muhammed
2015-04-03T08:09:28Z
2015-04-03T08:09:28Z
2014-06
Hussein, Kilan Muhammed. (2014). Design and Implementation of a Mobile Network Management Tool for Wireless Site Surveying. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1685
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assoc. Prof. Dr. Doğu Arifler.
ABSTRACT: “Everywhere Wi-Fi” across the campus of Eastern Mediterranean University (EMU) is a very positive and exciting experience for faculty, staff, students, and visitors. Having instant access to web sites, email, the Internet, and other IT services regardless of location can dramatically change the way of study and learning.
The increasing utilization of networks, especially wireless local area networks (WLANs), for different applications and in aspects of modern life, has resulted in a lot of studies towards the analysis and optimal design of WLANs. Deploying a large-scale, campus-wide Wi-Fi system presents many challenges that affect delivery of internet services. These challenges are managing, monitoring, coverage, capacity and density evaluation and security assessment.
In this study, we focus on the managing and monitoring aspects of the WLANs by designing and developing a software framework “EMUWiFiManager” as a mobile network management application on the Android platform. The application stores and displays basic information about the access points by using Simple Network Management Protocol (SNMP) and displays their locations on Google maps.
With the developed application, we conducted a measurement study and collected data for reporting and visualizing the network utilization of a campus wireless network.
Keywords: Wi-Fi access points, mobile networks, Android OS, network management.
…………………………………………………………………………………………………………………………
ÖZ: Doğu Akdeniz Üniversitesi'nde kampüs genelinde her yerde Wi-Fi bağlantısı olması, personel, öğrenciler ve ziyaretçiler için çok olumlu bir deneyimdir. Her yerde ve anında web sitelerine, e-posta, internet ve diğer bilgi teknoloji hizmetlerine erişim, çalışmanın ve öğrenmenin biçimini dramatik olarak değiştirebilmektedir.
Ağların, özellikle WLANların, artan kullanımı, farklı uygulamalar ve modern yaşamın özellikleri, WLANların analiz ve optimal tasarımına yönelik çalışmaları arttırmıştır. Büyük ölçekli yerleşke genelinde Wi-Fi sistemi dağıtma ve internet hizmetleri sunma birtakım sorunları ortaya çıkarmaktadır. Bu sorunlar arasında, ağ gözlemi, kapsama alanı, kapasite, yoğunluk değerlendirmesi ve güvenlik yönetimi vardır .
Bu çalışmada WLAN erişim noktalarının yönetim ve gözlemlemesi için “EMUWiFiManager” adında Android platformunda bir ağ yönetim yazılımı tasarlanıp geliştirilmiştir. Uygulama, erişim noktalarıyla ilgili temel bilgileri SNMP kullanarak sorgulayıp saklamakta ve coğrafi yerlerini ise Google Maps’ta göstermektedir.
Ayrıca, geliştirilen yazılımla bir ölçüm çalışması yapılmış ve örnek kampüs kablosuz ağ kullanımı raporlanıp ve görselleştirilmiştir.
Anahtar Kelimeler: Wi-Fi erişim noktaları, mobil ağlar, Android işletim sistemi, ağ yönetimi.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Wireless communication systems - Mobile communication systems - Wireless LANs
Wireless Networks - Management
Wi-Fi Access Points, Mobile Networks, Android OS, Network Management
Design and Implementation of a Mobile Network Management Tool for Wireless Site Surveying
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1685/3/HusseinKilan.pdf.txt
File
MD5
29bceecadfba667767cee062e0c01d0f
144817
text/plain
HusseinKilan.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1685/1/HusseinKilan.pdf
File
MD5
04bda394eab4d54e6c2b6c77e828a624
3373550
application/pdf
HusseinKilan.pdf
oai:i-rep.emu.edu.tr:11129/17202015-06-23T23:00:47Zhdl_11129_11
EMU I-REP
author
Namk, Mohamad Yahya J.
2015-06-23T10:42:12Z
2015-06-23T10:42:12Z
2015-02
Namk, Mohamad Yahya J. (2015). A Study on Performance Evaluation of International Web Search Engines Based on English, Arabic, and Turkish Languages in Various Categories. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1720
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Yıltan Bitirim.
ABSTRACT: This study illustrates the performance evaluation of the three international Web search engines Google, Bing, and Yahoo based on the three languages English, Arabic, and Turkish in six various categories, i.e., “business”, “culture”, “health”, “sports”, “technology”, and “travel”. A total of 30 categorised queries (five per category) were determined and each of them was run in English, in Arabic, and in Turkish languages separately on each of the three Web search engines. At each run, every document retrieved in the first 10 was classified as “relevant” or “non-relevant” and, in each category, precision ratios and normalized recall ratios were calculated for each of the five queries at every Web search engine and language pair. Then, they were used in the evaluation. In all categories, generally, the Web search engines performed better performances in English document retrieval compared to Arabic document retrieval and Turkish document retrieval.
Keywords: Web Search Engine, English Language, Arabic Language, Turkish Language, Information Retrieval.
…………………………………………………………………………………………………………………………
ÖZ: Bu çalışma üç uluslararası Web arama motoru Google, Bing, ve Yahoo’nun, altı farklı kategorideki, “ekonomi”, “kültür”, “sağlık”, “spor”, “teknoloji”, ve “seyahat”, olmak üzere üç dile dayalı, İngilizce, Arapça, ve Türkçe, performans değerlendirmesini göstermektedir. Toplamda kategorize edilmiş 30 sorgu (her kategori için 5 tane) belirlenmiştir ve her biri İngilizce, Arapça, ve Türkçe olarak üç Web arama motorunda ayrı ayrı çalıştırılmıştır. Her çalıştırmada, ilk 10’ da alınan her belge “ilgili” yada “ilgisiz” olarak sınıflandırılmıştır ve her kategorideki her 5 sorgu için, her Web arama motoru ve dil çiftinin duyarlılık oranları ve normalize sıralama oranları hesaplanmıştır. Daha sonra, bunlar değerlendirmelerde kullanılmıştır. Tüm kategorilerde, Web arama motorları Arapça dokümana erişim ve Türkçe dokümana erişim performanslarına kıyasla genelde İngilizce dokümana erişimde daha iyi performans göstermiştir.
Anahtar Kelimeler: Web Arama Motoru, İngilizce Dili, Arapça Dili, Türkçe Dili, Bilgi Erişim.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
World Wide Web
Web search engines
Information retrieval
Web Search Engine, English Language, Arabic Language, Turkish Language, Information Retrieval
A Study on Performance Evaluation of International Web Search Engines Based on English, Arabic, and Turkish Languages in Various Categories
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1720/3/NamkYahya.pdf.txt
File
MD5
96f9c536f6464a0fbd7306b74828feea
61656
text/plain
NamkYahya.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1720/1/NamkYahya.pdf
File
MD5
0c546b7ce3bd7fa7ce4d0df3dba86dec
957106
application/pdf
NamkYahya.pdf
oai:i-rep.emu.edu.tr:11129/17222015-06-24T23:00:39Zhdl_11129_11
EMU I-REP
author
Anaekwe, Jane Chioma
2015-06-24T04:16:03Z
2015-06-24T04:16:03Z
2015-02
Anaekwe , Jane Chioma. (2015). Intelligent Multi-Agent Online Examination System. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1722
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assoc. Prof. Dr. Zeki Bayram.
ABSTRACT: Examinations are essential tools in an education system and are used to test the knowledge, learning capabilities, and progress of a student in a specific domain. Due to its importance in an academic system, it is therefore vital to have an examination system that is fair and efficient. The traditional paper-based examinations are known to have various constraints such as, their time consuming nature, delays in declaration of results, human errors and tedious evaluation/management of large amounts of paper which are prone to security risks and exam malpractice. Due to these limitations the paper based systems have received various criticisms about its efficiency and fairness.
This thesis is aimed at solving the problem of the traditional paper-based exams by the introduction of an intelligent multi-agent online examination system. The system is a paperless exam integrated with intelligent agents. Each agent introduced in the system has specific duties that they perform and are capable of communicating with each other thereby forming an interconnected network. The duties of the agents include monitoring exams, providing various services during exams e.g. extra time requests, teacher requests, instant calculation and display of results, performance analysis, speed analysis, and suggestions to students and teachers on topics students need to improve in. Simulation exams (practice exams) are also provided to help students improve their performance and become familiar with the system. This approach provides a fair and efficient way of handling exams with reduced cost, workload, errors and risks thereby providing assistance and convenience to both teachers and students.
Keywords: Multi-agent system, online examination system, efficient services.
…………………………………………………………………………………………………………………………
ÖZ: Sınavlar, bir öğrencinin belli bir alandaki bilgisini, öğrenme becerilerini, ve ilerlemesini test etmeye yarayan elzem araçlardır. Akademik sistemdeki öneminden dolayı, adil ve verimli bir sınav sistemi önemlidir. Geleneksel kağıt tabanlı sınavlarda çeşitli kısıtlamalar olduğu bilinmektedir. Bunlar arasında zamanın boşa harcanması, sonuçların bildiriminde oluşan gecikmeler, insan hataları, büyük miktarda kağıdın değerlendirilmesi/idaresi’nin sıkıcı ve güvenlik yönünden riskler taşıması sayılabilir. Bu sorunlardan ötürü kağıda dayalı sistemler verimlilik ve adaletlilik yönünden eleştiriler almışlardır.
Bu tezin amacı, akıllı, çok etmenli, çevrimiçi bır sınav sistemi ile geleneksel kağıt tabanlı sınvaların yol açtığı sorunlara çözüm getirmektir. Sistem akıllı etmenlerle entegre olmuş kağıtsız sınavlardan oluşur. Sistemdeki her etmenin kendine has görevleri vardır ve etmenler birbirleri ile konuşabilmeleri sayesinde bağlantılı bir ağ oluştururlar. Etmenlerin görevleri arasında sınavları gözetleme, sınav esnasında bazı hizmetler sunma (örneğin ek süre taleplerini değerlendirme), öğretmen talepleri, sonuçların anında hesaplanıp gösterilmesi, performans analizi, hız analizi, ve öğrenciler ile öğretmenleri öğrencinin gelişim göstermesi gereken konularda bilgilendirmesi vardır. Sistemde var olan deneme sınavları da öğrencilerin perrformansını arttırmaya ve sisteme aşinalık kazanmaya yardımcı olur. Bu yaklaşım sayesinde sınavların adaletli, verimli, azaltılmış maliyet, iş, hata ve risk ile yapılması mümkün hale gelmektedir.
Anahtar kelimeler: Çok etmenli sistem, çevrimiçi sınav sistemi, verimli hizmetler.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Intelligent agents (Computer software)
Computational intelligence
Multi-agent system, online examination system, efficient services
Intelligent Multi-Agent Online Examination System
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1722/3/AnaekweJane.pdf.txt
File
MD5
8830c5b1c86156c10e57b1b5c7b1b58f
167839
text/plain
AnaekweJane.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1722/1/AnaekweJane.pdf
File
MD5
cdb87cc59b3ea1f7fc99b0128542dcb4
1975490
application/pdf
AnaekweJane.pdf
oai:i-rep.emu.edu.tr:11129/17292015-06-24T23:00:57Zhdl_11129_11
EMU I-REP
author
Kamkar, Kaveh
2015-06-24T07:35:46Z
2015-06-24T07:35:46Z
2015-02
Kamkar, Kaveh. (2015). A Comparison of Pedestrian Mobility Prediction Schemes in Wireless Cellular Networks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1729
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assoc. Prof. Dr. Işık Aybay.
ABSTRACT: As the number of mobile technology users in wireless cellular communication increases everyday, the quality of service (QoS) concerns are not totally satisfied. Mobile users are not limited to a fixed location and can move around to other places. Mobility model is a method which is used to predict future location of a mobile user using different techniques. Mobility model is one approach for solving the mobility problem to guarantee the QoS. In this thesis, we compare two different mobility models for pedestrian movements through simulation using two actual trajectory datasets in the same area with different arrival rates. The first model is called current mobility parameters method, which predicts the future position of mobile user based on current parameters such as current location information, speed and direction. This information is mostly gathered using a positioning system such as GPS. Gauss-Markov mobility model predicts next location using current speed, direction and location information of the user. The second method is called observation histories method, in which prediction is performed based on the historical movement pattern of the user. For this model, a simple second order Markov-Mobility model predicts next position using current and one previous location information of that user. The simulation result shows that the observation histories method has a better performance than the current mobility parameters method for pedestrian movement. The precision rate for current mobility parameters was 99.74 % for first and second dataset, respectively and 99.88 % and 99.87% for observation histories method. Keywords: Wireless Cellular Network, QoS, Mobility Prediction, Path Prediction, Mobility Model, User Mobility, Next Location Prediction.
…………………………………………………………………………………………………………………………
ÖZ: Kablosuz hücresel iletişim mobil teknoloji kullanıcılarının sayısı her gün arttıkça, hizmet kalitesi (QoS) endişeleri tamamen karşılanamıyor. Öte yandan mobil kullanıcılar sabit bir konumla sınırlı değillerdir ve yer değiştirebilirler. Bir hareket modeli, mobil kullanıcının farklı teknikler kullanılarak gelecekteki bir konumunun tahmin edilmesidir. Hareketlilik modeli, kaliteli servisi güvence altına almak için hareketlilik probleminin çözüldüğü bir yaklaşımdır.
Bu tezde, aynı bölgede olup farklı varış tanımları olan iki gerçek yörüngeli veri kümesi kullanarak, iki farklı hareket modelini yaya hareketi simülasyonu aracılığıyla karşılaştırdık. İlk model, şimdiki hareketlilik değişkenleri yöntemi, hareketli kullanıcının gelecekteki konumunu, konum bilgileri, hız ve yön gibi güncel değişkenlere göre tahmin eder. Bu bilgiler genellikle GPS gibi bir konumlandırma sistemi kullanılarak toplanır. Gauss-Markov hareketlilik modeli, kullanıcının güncel hız, yön ve konum bilgilerini kullanarak bir sonraki konumunu tahmin eder. İkinci model ise gözlem geçmişleri yöntemidir, tahmin kullanıcının geçmiş hareket yapısı baz alınarak gerçekleştirilir. Bu model için, ikinci dereceden bir basit Markov-Hareketlilik modeli kullanıcının şimdiki ve bir önceki konum bilgilerini kullanarak bir sonraki konumunu tahmin eder. Simülasyon sonucuna göre yaya hareketi için gözlem geçmişleri yöntemi, şimdiki hareketlilik değişkenleri yönteminden daha iyi bir performansa sahiptir. Birinci ve ikinci veri kümeleri için doğruluk oranları güncel hareketlilik değişkenleri yöntemi için her ikisi için de %99.74 iken gözlem geçmişleri yöntemi için birinci oran %99.88 ve ikinci oran %99.87’dir. vi
Anahtar kelimeler : Bağlantısız hücresel ağlar, Qos, Hareket kestirimi, Hareket modeli, kullanıcı hareketliliği, sonraki konum kestirimi.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Wireless communication systems
Local area networks (Computer networks) - Wireless communication systems
Wireless Cellular Network, QoS, Mobility Prediction, Path Prediction, Mobility Model, User Mobility, Next Location Prediction
A Comparison of Pedestrian Mobility Prediction Schemes in Wireless Cellular Networks
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1729/3/KamkarKaveh.pdf.txt
File
MD5
8898e5592349b644ba6c24f2adb6ba47
104795
text/plain
KamkarKaveh.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1729/1/KamkarKaveh.pdf
File
MD5
f6e01f50d5bd0b3559901be3f2036b71
3399752
application/pdf
KamkarKaveh.pdf
oai:i-rep.emu.edu.tr:11129/17342015-06-24T23:00:45Zhdl_11129_11
EMU I-REP
author
Almufti, Saman Mohammed
2015-06-24T10:27:56Z
2015-06-24T10:27:56Z
2015-02
Almufti, Saman Mohammed. (2015). U-Turning Ant Colony Algorithm powered by Great Deluge Algorithm for the solution of TSP Problem. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1734
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Ahmet Ünveren.
ABSTRACT: In latest years, Optimization Algorithms have been one of the most interesting applications that can be used in order to solve tough real life problems. Real life problems could be either single or multi objective. In general Optimization techniques try to minimize an objective function for any real life problem. One of the most interesting real life problems is Traveling Salesman Problem (TSP) that is NP-hard which cannot be solved straightforwardly. Swarm Intelligence that is a field of Artificial Intelligence, uses the behaviors of real swarms to solve Optimization problems. Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), and Artificial Bee Colony Algorithm (ABC) are the well-known Swarm Intelligence algorithms that are generally used in solving NP-hard problems.
In this thesis, TSP problems are solved by using ACO algorithm which uses the behavior of real ants. For the betterment of the solutions found by ACO, a local search, Greate Deluge Algorithm (GDA) is used, also a new type of Ant defined as U-Turning Ant (UAnt) which returns back without completing its route guides the remainders in finding the shortest route. In this thesis it is shown that by hybridizing ACO with local search and using U-Turning Ants in ACO (U-TACO), the solutions of the given TSP problems will be improved.
Keywords: Traveling Salesman Problem (TSP), Ant Colony Optimization (ACO), Great Deluge Algorithm (GDA), and U-Turning Ant Colony Algorithm (U-TACO).
…………………………………………………………………………………………………………………………
ÖZ: Son yıllarda, En iyileme Algoritmaları gerçek hayat problemlerini çözmek için kullanılabilecek en ilginç uygulamalarından biri olmuştur. Gerçek hayat problemleri tek veya çok amaçlı olabilmektedir. Optimizasyon algoritmaları genellikle verilen gerçek hayat problemlerinin amaç fonksiyonlarını en aza indirmeye çalışmaktadır. En ilginç gerçek hayat problemlerinden biri polinomsal zamanda kolayca çözülemeyen Gezgin Satıcı Problemidir (GSP). Yapay Zekanın bir parçası olan Sürü Zekası gerçek hayat sürü davranışlarını kullanarak Optimizasyon problemlerine çözüm üretir. En iyi bilinen Sürü Zeka algoritmalarına örnek olarak, Karınca Koloni Optimizasyonu (KKO), Parçacık Sürü Optimizasyonu (PSO), ve Yapay Arı Koloni algoritması (YAK) gösterilebilir. Bu tezde, GSP problemleri gerçek karınca davranışlarını kullanan KKO algoritması ile çözülmüşlerdir. Elde edilen çözümlerin iyileştirilmesi için de yerel arama algoritması olan Büyük Tufan Algoritması (BTA) kullanıldı. Ayrıca kendi rotasını tamamlamadan geri dönen yeni bir tür karınca olan U-Dönüşü yapan karıncalar (UKarınca), geriye kalan karıncaların rotalarını enkısa yoldan tamamlamalarına yardımcı olmak amacıyle, tanımlanmıştır. Bu tezde U-Dönüşü yapan karıncaları kullanan KKO algoritmsı ile birleştirilen BTA algoritmasının GSP problemlerinin çözümlerini iyleştirdiği gösterilmiştir. Anahtar Kelimeler: Gezgin Satıcı Problemi (GSP), Karınca Koloni Optimizasyonu (KKO), Büyük Tufan Algoritması (BTA), ve U-Dönüş yapan Karınca Koloni Optimizasyonu (U-TACO).
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Computer science Algorithms
Traveling - salesman problem
Traveling Salesman Problem (TSP), Ant Colony Optimization (ACO), Great Deluge Algorithm (GDA), and U-Turning Ant Colony Algorithm (U-TACO)
U-Turning Ant Colony Algorithm powered by Great Deluge Algorithm for the solution of TSP Problem
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1734/3/AlmuftiSaman.pdf.txt
File
MD5
968b064b1d73879d562f8d2ec5584558
89956
text/plain
AlmuftiSaman.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1734/1/AlmuftiSaman.pdf
File
MD5
56c83da48a3392e891eafe3bd995b3b4
1347347
application/pdf
AlmuftiSaman.pdf
oai:i-rep.emu.edu.tr:11129/17452015-06-25T23:00:52Zhdl_11129_11
EMU I-REP
author
Kariminasab, Amirhamzeh
2015-06-25T10:12:03Z
2015-06-25T10:12:03Z
2014-12
Kariminasab, Amirhamzeh. (2014). A Simulation Study on Performance of Video-On-Demand Systems. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1745
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assoc. Prof. Dr. Işık Aybay.
ABSTRACT: Within the scope of this study, three implementation techniques in the field of Videoon-Demand systems (LCBBS, Patchpeer and network aware) are chosen. Then, three common parameters (throughput, number of stops and acceptance ratio) for each
technique have been selected. Simulation results are used for comparing these three
techniques with regards to efficiency. NS software is used for implementing these
simulations. Results show that, the Patchpeer technique exhibits the best performance, and the
LCBBS technique has the second best performance. Keywords: Video-on-Demand, Patchpeer, LCBBS, Network-Aware, Peer to Peer.
…………………………………………………………………………………………………………………………
ÖZ: Bu çalışmanın kapsamı içerisinde, isteğe bağle video izleme sistemleri (VoD) için üç
teknik uygulama (LCBBS, Patchpeer ve Network-aware) seçildi. Sonra üç parameter
ile (birim zamanda iş miktarı, duraklama sayısı ve kabul oranı) her seçilen teknik için,
simülasyonlar yapılarak, üç tekniğin etkinlik bakımından karşılaştırılması yapıldı. Bu
simülasyonların uygulamasında NS yazılım kulanıldı.
Sonuç olarak, üç metod içinde Patchpeer tekniği en iyi performansı, LCBBS ikinci en
iyi performansı sergiledi. Anahtar kelimeler: isteğe bağle video izleme sistemleri, Patchpeer, LCBBS, Network-Aware, komşudan-komşuya.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Computer communication networks
Multimedia systems
Video-on-demand - Buffer storage (Computer science) - Video compression
Interactive multimedia - Information resources management
Video-on-Demand, Patchpeer, LCBBS, Network-Aware, Peer to Peer
A Simulation Study on Performance of Video-On-Demand Systems
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1745/3/Kariminasab.pdf.txt
File
MD5
8c60bd57367c3f06eea810d0b0c6d712
100961
text/plain
Kariminasab.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1745/1/Kariminasab.pdf
File
MD5
a5987799641f8503e07e2f14f5fee773
788973
application/pdf
Kariminasab.pdf
oai:i-rep.emu.edu.tr:11129/17462015-06-25T23:00:57Zhdl_11129_11
EMU I-REP
author
Golrizkhatami, Zahra
2015-06-25T10:21:17Z
2015-06-25T10:21:17Z
2015-02
Golrizkhatami, Zahra. (2015). Classification of ECG Signal by Using Wavelet Transform and SVM. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1746
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Adnan Acan.
ABSTRACT: Advances in computing have resulted in many engineering processes being automated. Electrocardiogram (ECG) classification is one such process. The analysis and classification of ECGs can benefit from the wide availability and power of modern computers.
This study presents a method on the usage of computer technology in the field of computerized ECG classification. Computerized electrocardiogram classification can help to reduce healthcare costs by enabling suitably equipped general practitioners to refer to hospital only those people with serious heart problems. Computerized ECG classification can also be very useful in shortening hospital waiting lists and saving life by discovering heart diseases early.
This thesis investigates the automatic classification of ECGs into different disease categories using Discrete Wavelet Transform (DWT) and Support Vector Machine (SVM) techniques. The ECG data is taken from standard MIT-BIH database. The model is developed over 20 records of MIT arrhythmia database signals of which is 30 minutes of recording time. A comparison of the use of different feature sets and SVM classifiers is presented. The feature sets include wavelet features, as well as temporal features which taken directly from time domain samples of an ECG.
Keywords: ECG, Discrete Wavelet Transform, Support Vector Machine, Arrhythmia.
…………………………………………………………………………………………………………………………
ÖZ: Bilgisayar ve hesaplama alanlarındaki gelişmeler birçok mühendislik sürecinin otomasyonu sonucunu doğurmuştur. Elektrokardiyogram sınıflandınlması bu süreçlerden birisidir. Elektrokardiyogram analizi ve sınıflandırılması için modern bilgisayar ve hesaplama teknolojilerinin geniş anlamda kullanımı önemli yararlar sağlamaktadır.
Bu çalışma Elektrokardiyogram sınıflandırılması için bilgisayar teknolojisi ve tanımlama yöntemlerinin kullanımına yönelik bir içerik sunmaktadır . Bilgisayarlı elektrokardiyogram sınıflandırılması, tanıma süreçlerinin kısalması ve sadece ciddi sağlik problemleri olan hastaların hastahanelere başvurması yoluyla, sağlık harcamalarında ciddi azalmalar sağlayabilir. Ayrıca, hastahanelerde bekleme süreleninin azaltılması ve erken tanı ile hayat kurtarılması da elde edilebilecek diğer önemli kazanımlar olarak sıralanabilir. Bu tezde otomatik elektrokardiyogram sınıflandırılması için ayrık dalgacık dönüşümü ve destek vektör makinaları yöntemleri üzerinde çalışılmıştır. Elektrokardiyogram sinyalleri MIT/BIH veri tabanından alınmıştır. Model geliştirmek amacıyla her biri 30 dakikalık 20 kayıt kullanılmıştır . Özellik kümeleri dalgacık ve zaman ekseninde çıkarılan özellikleri içerir. Tanıma başarımı için destek vektör makinaları üç farklı özellik kümesi kıllanılarak sınanmıştır. Anahtar kelimeleri: Elektrokardiyogram, destek vektör makinaları, ritm bozukluğu.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Electrocardiography
ECG, Discrete Wavelet Transform, Support Vector Machine, Arrhythmia
Classification of ECG Signal by Using Wavelet Transform and SVM
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1746/3/GolrizkhatamiZahra.pdf.txt
File
MD5
69b75538d006f49df4bdc57d793138cc
107977
text/plain
GolrizkhatamiZahra.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1746/1/GolrizkhatamiZahra.pdf
File
MD5
2b5a0b9203eb6c4ba0c9024fea5c4f65
2367882
application/pdf
GolrizkhatamiZahra.pdf
oai:i-rep.emu.edu.tr:11129/17552015-06-29T23:00:38Zhdl_11129_11
EMU I-REP
author
Şeyda, Türker
2015-06-29T06:33:31Z
2015-06-29T06:33:31Z
2015-02
Turker, Seyda. (2015). An Experimental Study on the Effect of Using the Wrongly Spelled and/or Pronounced Turkish Words on Web Search Engines. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1755
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Yıltan Bitirim.
ABSTRACT: This study investigates how the Web search engines handle Turkish words which are frequently wrongly spelled and/or pronounced with their own particular wrong form(s). First of all, the three most popular international Web search engines Google, Bing, and Yahoo were selected, and a query list consisted of a set of such words with their incorrect forms was formed. All queries were run on the Web search engines separately and, at each run, every document retrieved in the first twenty was classified as “relevant” or “non-relevant”. Precision ratios and normalized recall ratios were calculated at various cut-off points. It seems that using incorrect forms affected the information retrieval effectiveness of the Web search engines in a negative way. Keywords: Web Search Engine, Turkish Language, Evaluation, Precision Ratio, Normalized Recall Ratio.
…………………………………………………………………………………………………………………………
ÖZ: Bu çalışma, Web arama motorlarının, Türkçede kendilerine özgü yanlış formlarıyla sıklıkla yanlış yazılan ve/veya yanlış telafuz edilen kelimeleri nasıl ele aldığını araştırır. İlk olarak, en popular üç uluslararası Web arama motoru, Google, Bing, ve Yahoo seçildi ve bu tür kelimelerin bir kümesini yanlış formları ile birlikte içeren bir sorgu listesi oluşturuldu. Bütün sorgular, seçilen arama motorları üzerinde ayrı ayrı çalıştırıldı ve her çalıştırmada, ilk 20’ de erişilen her belge “ilgili” veya “ilgisiz” olarak sınıflandırıldı. Çeşitli kesme-noktalarında duyarlılık oranları ve normalize sıralama oranları hesaplandı. Yanlış formların kullanımının Web arama motorlarının bilgi erişim etkinliğini olumsuz yönde etkilediği görülmektedir.
Anahtar Kelimeler: Web Arama Motoru, Türkçe Dili, Değerlendirme, Duyarlılık Oranı, Normalize Sıralama Oranı.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Search Engines - Turkish Words
Information retrieval
Web Search Engine, Turkish Language, Evaluation, Precision Ratio, Normalized Recall Ratio
An Experimental Study on the Effect of Using the Wrongly Spelled and/or Pronounced Turkish Words on Web Search Engines
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1755/3/TurkerSeyda.pdf.txt
File
MD5
57ba22e742742ade6cf085656f21c2a7
50576
text/plain
TurkerSeyda.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1755/1/TurkerSeyda.pdf
File
MD5
54c2b11c761a67af2ab441b90a9fabc0
2546297
application/pdf
TurkerSeyda.pdf
oai:i-rep.emu.edu.tr:11129/17562015-06-29T23:00:39Zhdl_11129_11
EMU I-REP
author
Ebadi, Milad
2015-06-29T06:57:35Z
2015-06-29T06:57:35Z
2015-02
Ebadi, Milad. (2015). An Online Game-Based Learning System for Pre-school Children. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1756
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Yıltan Bitirim.
ABSTRACT: In this thesis, the practical comprehensive system ―online game-based learning‖ system for pre-school children has been developed in order to have a mobile game-based learning system which is able to conduct the children‘s skill and/or knowledge development as well as being fun to be played by the children. This system meets all the aspects of mobile game-based learning beside of parent involvement in the procedure of learning. Key features of this system include: children‘s playing and activity monitoring; evaluation of the games to detect the usability problems for developers; expert supporting system for parents; and internal messaging system. Our system also contains a dynamic Web service to let the third-party game developers to integrate a game into the system. Therefore, any educational tablet and/or smartphone game for pre-school children will be able to integrate into the system.
Keywords. Web application, Web service, mobile game-based learning.
…………………………………………………………………………………………………………………………
ÖZ: Bu tezde, okul öncesi çocukların hem beceri ve/veya bilgi gelişimini sağlayacak hem de onlara eğlenceli gelecek bir mobil oyun tabanlı öğrenme sistemi için okul öncesi çocuklar için pratik geniş kapsamlı bir sistem olan ―çevrimiçi oyun tabanlı öğrenme‖ sistemi geliştirilmiştir. Bu sistem mobil oyun tabanlı öğrenmenin tüm yönlerini içermenin yanında öğrenme prosedürüne ebeveyni de dahil etmektedir. Bu sistemin temel özellikleri şunlardır. çocukların oyun ve aktivitelerini izleme; geliştiriciler için kullanılabilirlik sorunların tespit amaçlı oyunların değerlendirilmesi; ebeveyinler için uzman destek sistemi; ve iç mesajlaşma sistemi. bizim sistemimiz ayrıca üçüncü parti oyun geliştiricilerinin sistem içerisine oyun entegre edebilmesi için bir dinamik Web Servisi içerir. Bunda dolay, okul öncesi çocuklar için herhangi bir eğitimsel tablet ve/veya akıllı telefon oyun sistem içerisine entegre edile bilecektir.
Keywords. Web uygulaması, Web service, mobil oyun tabanlı öğrenme.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Educational games - Design and construction
Education - Computer - assisted instruction
Mobile learning
Games in teaching and learning
Educational technology
Web application, Web service, mobile game-based learning
An Online Game-Based Learning System for Pre-school Children
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1756/3/EbadiMilad.pdf.txt
File
MD5
168db8cc48362159e587256368461a34
150633
text/plain
EbadiMilad.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1756/1/EbadiMilad.pdf
File
MD5
6c01b071bdc886a34e6a4555529028dd
9196730
application/pdf
EbadiMilad.pdf
oai:i-rep.emu.edu.tr:11129/17572015-06-29T23:00:40Zhdl_11129_11
EMU I-REP
author
Mashak, Marzieh Vahabi
2015-06-29T10:54:43Z
2015-06-29T10:54:43Z
2015-02
Mashak, Marzieh Vahabi. (2015). Feature Selection Using Co-occurrence of Terms for Binary Text Classification. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1757
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Prof. Dr. Hakan Altınçay.
ABSTRACT: In this thesis, term selection for text categorization is addressed. Three widely used schemes are employed for this purpose, namely Chi-square (x2), Gini_index and Discriminative Power Measure (DPM). The performances of these schemes are evaluated on Reuters-21578 separately for document frequencies and term frequencies. In summary, utilizing the term frequencies leads to better macro and micro F1 score when compared to using only document frequencies. As an extension to the conventionally used term selection schemes, we studied the use of co-occurrence statistics of different terms for feature selection. More specifically, the idea is to evaluate the discriminative power of having two different terms in the selected list at the same time. In order to achieve this, an iterative scheme is designed where the next term to be included in the selected list is determined by pairwise evaluation of the already selected terms and the candidate terms. For the pairwise evaluation of different terms, novel metrics based on the existing selection schemes are developed. Experimental results have shown that the proposed iterative scheme has the potential to improve the existing schemes.
Keywords: Term Selection, Text Classification, x2, Gini-index, DPM, Bag-of-Words.
…………………………………………………………………………………………………………………………
ÖZ: Bu tezde metin sınıflandırma için kelime seçme konusu ele alınmıştır. Bu amaçla sıklıkla kullanılan Chi-kare ( x2),Gini-indisi ve Ayırıcı Güç Ölçütü (AGÖ) isimli üç kelime seçme yöntemi kullanılmıştır. Bu metodların başarımları Reuters-21578 verisi üzerinde döküman frekansları ve kelime frekansları kullanılarak incelenmiştir. Kelime frekansları kullanımının döküman frekanslarına göre daha iyi makro ve mikro F1 skorları sağladığı gözlenmiştir.
Geleneksel olarak kullanılan kelime seçme yöntemlerine iyileştirme olarak, kelimelerin ayni anda bulunma istatistiklerinin kullanımı üzerinde çalışılmıştır. Daha özel olarak belirtecek olursak esas fikir, iki kelimenin ayni anda seçilmiş listede olmasının öneminin dikkate alınmasıdır. Bunu sağlamak için, daha önce seçilen kelimeler ile seçilmeye aday kelimeleri ikili olarak değerlendiren yinelemeli bir yöntem geliştirilmiştir. Farklı kelimelerin ikili değerlendirilmesi için, mevcut seçme yöntemlerini temel alan yeni metrikler geliştirilmiştir. Deneysel sonuçlar, önerilen yinelemeli yaklaşımın mevcut yöntemleri iyileştirme potansiyeline sahip olduğunu göstermiştir.
Anahtar kelimeler: Kelime Seçme, Metin sınıflandırma, x2, Gini-indisi , AGÖ, Kelime-sepeti.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Database management - Data mining
Information storage and retrieval systems
Text processing (Computer science)
Term Selection, Text Classification, X2, Gini-index, DPM, Bag-of-Words
Feature Selection Using Co-occurrence of Terms for Binary Text Classification
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1757/3/MashakMarzieh.pdf.txt
File
MD5
1719245a854a3d85441d5a1ae916af13
81315
text/plain
MashakMarzieh.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1757/1/MashakMarzieh.pdf
File
MD5
7cbc2221015565391b6e30be6e7b0080
1781897
application/pdf
MashakMarzieh.pdf
oai:i-rep.emu.edu.tr:11129/17582015-06-29T23:00:41Zhdl_11129_11
EMU I-REP
author
Ghamsari, Mohammad Khosheghbal
2015-06-29T11:10:50Z
2015-06-29T11:10:50Z
2015-02
Ghamsari, Mohammad Khosheghbal. (2015). Android Service Security: Victimized Android Device by Transferring Malicious Service via Near Field Communication Using Social Engineering. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1758
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Gürcü Öz.
ABSTRACT: The purpose of this thesis is to investigate on vulnerabilities of the Android operating system and security breaches which would be harmful and could be misused for destructive purposes. In this thesis the whole idea of social engineering would be investigated and the relevance of implemented system would be explained. The implemented system includes client and server architecture which allows attacker to spy on the device’s owner as a target and obtain full access of target device remotely. Example can be listed as listening to his or her voice calls, checking his or her messages, finding victim’s location, accessing to all stored files and checking victim’s call logs. The system would make the attacker able to get a kind of remote access from the target device. This system is implemented for spying on Android operating system and shows that how legitimated application can be turned to malicious software by adding services. The main benefit of this service is that service will run on the background of target’s device and stick to device even target’s device is restarted. The interface of this malicious application can be changed easily based on information that attacker is gathered from victim’ interest. Transferring this malicious application to Android device can be done by using Near Field Communication (NFC). This application has been implemented on Eclipse environment and coded with Java programming language.
Keywords: Android, Malicious service, Security breach, Near Field Communication, Social Engineering, Hacking.
…………………………………………………………………………………………………………………………
ÖZ: Bu tezin amacı Android işletim sisteminin güvenlik açıkları üzerinde araştırma yapmak, güvenliğin ihlal edilmesi durumunda sistemin nasıl zararlı, yıkıcı ve kötü amaçlar için kullanılabileceğini göstermektir. Bu çalışmada, sosyal mühendislik fikri araştırılıp, uygulanan sistemde kullanılmış olup önemi belirtilmiştir. Uygulanan sistem, bir istemci/sunucu mimarisi olup, saldırgana hedef cihazdan casusluk imkanı sağlamakta ve hedef cihaza uzaktan tam giriş vermektedir. Saldırgan kurbanın sesli aramalarını dinlerken mesajlarını da kontrol edebilmektedir. Ayrıca, kurbanın yerinin tespiti, saklanan bütün dosyalarına girişi, çağrı listelerinin takibi de mümkün olmaktadır. Tasarlanan sistemle saldırgan hedefi uzaktan kontrol etme imkanı elde edebilmektedir. Bu sistem, Android işletim sistemi üzerinden casusluk yapmak için yaratılmış olup, meşru uygulama hizmetleri eklenirken, meşru olmayan bir yazılım cihaza nasıl eklenebilir onu göstermektedir. Bu servisin en büyük avantajı , hedef cihaz kapatılıp açılsa bile arka planda yeniden çalışabilir olmasıdır. Bu kötü niyetli uygulamanın ara yüzü hedefin ilgi alanına göre kolayca değiştirilebilmektedir. Oluşturulan bu uygulamanın Android cihazına aktarımı Yakın Alan İletişimi (NFC) kullanılarak yapılabilir. Bu uygulama, Eclips ortamında oluşturulmuş olup, Java programlama dili kullanılarak kodlanmıştır.
Anahtar Kelimeler: Android, Kötü Amaçlı hizmet, Güvenlik ihlali, Yakın Alan İletişimi, Sosyal Mühendislik, Hacking.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Computer security - Data protection
Android (Electronic resource) - Security
Android, Malicious service, Security breach, Near Field Communication, Social Engineering, Hacking
Android Service Security: Victimized Android Device by Transferring Malicious Service via Near Field Communication Using Social Engineering
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1758/3/GhamsariMohammad.pdf.txt
File
MD5
fe70fb69adfc1630ac9edaaed774ebac
57419
text/plain
GhamsariMohammad.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1758/1/GhamsariMohammad.pdf
File
MD5
b84bfb196e9a1d27fc0266850fb3e978
1654822
application/pdf
GhamsariMohammad.pdf
oai:i-rep.emu.edu.tr:11129/17592015-06-29T23:00:47Zhdl_11129_11
EMU I-REP
author
Ekrani, Minoo
2015-06-29T11:24:47Z
2015-06-29T11:24:47Z
2015-02
Ekrani, Minoo. (2015). Design, Development, and Prototyping of an Intelligent Volumetric Measurement System for Water Containers. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1759
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Mehmet Bodur.
ABSTRACT: The aim of this thesis is to build an intelligent water volume measurement device that calculates the water volume for any shape of tank precisely by measuring the water level with an ultrasonic sensor and using a look-up-table to calculate the volume. It generates alarm signals at any desired volume. For any shape of tank, the look-up-table is entered to the processors memory using five buttons, and LCD display. The prototype gets power from mains through a USB socket even if it is not connected to a computer. The system is designed at a system-level using basic building blocks for Arduino from a Arduino Uno processor board, a keypad + LCD display shield with a LED, an ultrasonic HC-SR04 sensor unit, and an external buzzer. The prototype is tested successfully for a horizontally placed cylindrical container to have maximum 1.3%, average 0.7% error on distance and percent volume measurements.
Keywords: Percent volume meter, Ultrasonic volume measurement, system level design.
…………………………………………………………………………………………………………………………
ÖZ: Bu tez herhangi biçimli bir tanktaki su seviyesini ultrasonik algılayıcı ile hassaslıkla ölçerek bir tablo aracılığıyla su hacmini hesaplayan akıllı bir su hacmi ölçüm sistemi tasarlamayı ve prototipini üretmeyi amaçlamaktadır. Aygıt istenen bir hacimda alarm sinyali üretmektedir. Hacim hesap tablosu tankın biçimine göre işlemcinin belleğine bir LCD ve beş düğme aracılığıyla girilebilmektedir. Prototip, gücünü bilgisayara bağlı olmasa bile USB soket aracılığı ile şebekeden almaktadır. Aygıt Arduino-Uno işlemci kartı, LCD gösterge kartı, bir ultrasonik HC-SR04 algılayıcı birim ile bir harici alarm-sesi üretecinden oluşmaktadır. Prototip yapılan testte yatay yerleştirilmiş bir silindirik kaptaki kalan su hacmini en yüksek 1.3%, ortalama 0.7% hata ile ölçmeyi başarmıştır.
Anahtar Kelimeler: Hacım yüzdesi ölçer, Ultrasonik hacım ölçümü, Sistem düzeyinde tasarım.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Digital Measurement (Computer Engineering)
Percent volume meter, Ultrasonic volume measurement, system level design
Design, Development, and Prototyping of an Intelligent Volumetric Measurement System for Water Containers
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1759/3/EkraniMinoo.pdf.txt
File
MD5
06a3b3c14547cde199e5f88c1ec5a419
62324
text/plain
EkraniMinoo.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1759/1/EkraniMinoo.pdf
File
MD5
c94eaa69a05b01e8f76863f50b542e43
1532334
application/pdf
EkraniMinoo.pdf
oai:i-rep.emu.edu.tr:11129/17672015-06-30T23:00:48Zhdl_11129_11
EMU I-REP
author
Alsandi, Nashat Salih Abdulkarim
2015-06-30T06:51:25Z
2015-06-30T06:51:25Z
2015-02
Alsandi, Nashat Salih Abdulkarim. (2015). Maze Router: Collected Techniques. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1767
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Ahmet Ünveren.
ABSTRACT: In this thesis, Maze Router Problem (MRP) solved by using Connected Component Labeling, Depth First Search, Lee and A* Algorithms. The main goal of this research is to find a complete set of path which directs an agent to move from the Source node in the Maze towards a Target node in a Single-layer routing environment. In experiments different sized Maze Router Problem (MRP) instances are solved by using different Algorithms. From the results obtained we can conclude that Lee and A* Algorithms finds the shortest path for all the problem instances. It can also be concluded that A* Algorithm is the fastest Algorithm that finds the shortest path. Keywords: Maze, Maze Router, Maze Router Problem, Connected Component Labeling Algorithm, Depth First Search Algorithm, Lee Algorithm, A* Algorithm.
…………………………………………………………………………………………………………………………
ÖZ: Bu tezde, Labirent Yönlendirici Problemi (LYP) Bağlı Bileşen Etiketleme, Derin Öncelikli Arama, Lee ve A* Algoritmaları kullanılarak çözülmüştür. Bu araştırmanın temel amacı, tek katmanlı Labirent yönlendirme ortamında başlangıç düğümünden hedef düğümüne ulaşılabilecek tam bir yolun bulunmasıdır. Farklı boyutlarda bulunan Labirent Yönlendirme problemlemi örnekleri farklı algoritmalar kullanılarak çözüldü. Elde edilen sonuçlara göre Lee ve A* algoritmaları kullanılan örnekler için en kısa youlu veren algoritmalar olmuşlardır. Aynı zamanda A* algoritmasının en kısa youlu en hızlı zamanda bulduğu tesbit edilmiştir.
Anahtar Kelimeler: Labirent, Labirent Yönlendirme, Labirent Yönlendirme Problemi, Bağlı Bileşen Etiketleme Algoritması, Derin Öncelikli Arama Algoritması, Lee Algoritması, A* Algoritması.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Maze, Maze Router, Maze Router Problem, Connected Component Labeling Algorithm, Depth First Search Algorithm, Lee Algorithm, A* Algorithm
Maze Router: Collected Techniques
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1767/3/AlsandiNashat.pdf.txt
File
MD5
ca10a3639f9e7d3c5891096ce67f5af5
64226
text/plain
AlsandiNashat.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1767/1/AlsandiNashat.pdf
File
MD5
8e1c8ee36cac4525f34c2ab56ef97e4f
1495109
application/pdf
AlsandiNashat.pdf
oai:i-rep.emu.edu.tr:11129/17742015-06-30T23:01:05Zhdl_11129_11
EMU I-REP
author
Inalegwu, Ogbole Collins
2015-06-30T11:16:47Z
2015-06-30T11:16:47Z
2015-02
Inalegwu, Ogbole Collins. (2015). Predicting Time Lag between Primary and Secondary Waves for Earthquakes Using Artificial Neural Network (ANN). Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1774
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assoc. Prof. Dr. Muhammed Salamah.
ABSTRACT: This thesis work investigates the possibility of predicting the arrival time of the secondary seismic earthquake waves. Seismic waves are low frequency acoustic waves that are experienced prior to earthquake, they are basically two types: the primary wave (p-wave) and the destructive secondary wave (s-wave). These waves‟ approaches a destination at different times, with the p-wave experienced earlier since it travels at higher speed as compared to the s-wave. Knowledge of the time lag between this two waves recorded by a seismometer from previous earthquakes were used together with other parameters suspected to also influence the arrival of the secondary (destructive) earthquake waves which are; the magnitude from the propagating wave, the epicenter distance from the hypocenter, the seismic station‟s distance from the epicenter and the direction (in azimuths), were used for this prediction. The prediction model was carried out using neural network on MATLAB; the artificial neural network (ANN) design makes it possible to develop the correlation between the various parameters for the study. First, the network was trained with earthquake data of magnitude 6.0-7.0 Richter, validation and testing was carried out to measure the performance of the model. The result gave satisfactory performance, with regression values greater than 0.9, and the root mean square error (RMSE) computed were of the range of 0.1003 to 0.1148 for the most satisfactory network architecture. Secondly, the trained network was also tested with external values of magnitude range outside the values the network was earlier trained with. This network gave results that were not as good as the first case, so it was concluded that it‟s better to train the network with data from earthquake of all magnitude range. In general, from the experiment we concluded that the design and parameters
considered is possible for predicting the time-lag of these two seismic waveforms using artificial neural networks.
Keywords: Earthquake, Seismic waves, P-wave, S-wave, Seismometer, Atificial Neural Network, Hypocenter, Epicenter, Magnitude.
…………………………………………………………………………………………………………………………
ÖZ: Bu çalışma, ikincil sismik deprem dalgalarının geliş zamanını tahmin etme olasılığını araştırmaktadır. Sismik dalgalar, depremden önce gerçekleşen düşük frekanslı akustik dalgalardır. Sismik dalgaların iki temel türü mevcuttur: birincil dalga (p-dalgası) ve tahrip edici olan ikincil dalga (s-dalgası). Bu dalgalar hedefe farklı zamanlarda yaklaşır; p-dalgası, s-dalgasından daha hızlı bir şekilde hareket ettiğinden daha önce gerçekleşir. Bir sismograf aracılığıyla kaydedilen iki dalga arasındaki zaman farkına ek olarak, ikincil dalganın gelişini etkilemesi beklenen farklı parametreler de kullanılmıştır. Tahmin için kullanılan parametreler şunlardır: yayılmakta olan dalganın boyutu, iç merkezden merkez üssü uzaklığı, sismik istasyonun merkez üssünden uzaklığı ve yönü (azimuth değerinde). Tahmin modeli MATLAB sinir ağı kullanılarak gerçekleştirilmiştir; sinir ağı (ANN) modeli sayesinde çalışmadaki çeşitli parametreler arasında bir korelasyon geliştirilebilmiştir. Öncelikle ağ, 6.0-7.0 Richter boyutundaki deprem verileri ve doğrulama ile donanmıştır ve ardından modelin performansını ölçümlemek üzere bir test yürütülmüştür. Testin sonunda 0.9 değerinden yüksek regresyon değerleri ile tatmin edici sonuçlar sağlanmıştır. En etkili ağ yapısında ise, işlenen ortalama karekök hatası (RMSE) 0.1003 ve 0.1148 aralığında bulunmuştur. Ardından geliştirilmiş olan ağ, daha önce test edildiği aralık dahilindeki değerlerin dışında olan büyüklük değerleri ile yeniden test edilmiştir. Genel olarak, tasarım ve parametreler ile yürütülen deneyin sonucunda, sinir ağları kullanılarak, iki sismik dalga türü arasındaki zaman farkının önceden tahmin edilebildiği görülmüştür. vi
Anahtar Sözcükler: Deprem, Sismik dalgalar, P-dalgası, S-dalgası, Sismograf, Yapay Sinir Ağı, İç merkez, Merkez üssü, Büyüklük.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Subject Seismology - Data processing
Artificial Neural Networks
Earthquake, Seismic waves, P-wave, S-wave, Seismometer, Atificial Neural Network, Hypocenter, Epicenter, Magnitude
Predicting Time Lag between Primary and Secondary Waves for Earthquakes Using Artificial Neural Network (ANN)
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1774/3/InalegwuOgbole.pdf.txt
File
MD5
21a8e92a9d014f878c778510eb1f5ac7
70800
text/plain
InalegwuOgbole.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1774/1/InalegwuOgbole.pdf
File
MD5
404ed70b6ee6192684c136052185ca6d
1187964
application/pdf
InalegwuOgbole.pdf
oai:i-rep.emu.edu.tr:11129/17822015-07-01T23:00:35Zhdl_11129_11
EMU I-REP
author
Ahmed, Zanear Shwan
2015-07-01T05:49:16Z
2015-07-01T05:49:16Z
2015-02
Ahmed, Zanear Shwan. (2015). Palmprint Recognition with Statistical, Wavelet and Local Feature Extraction Methods. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1782
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Adnan Acan.
ABSTRACT: Palmprint recognition has gained significant importance in biometric and multi- biometric identification systems and it has been widely used in most of the security projects. The reason behind this is that a palmprint is a unique sample for each individual person. It is a biometric signature of fix shape; a born baby holds the same shape up to death.
Nowadays most of the studies focus on enhancing the recognition rate and determining the age and gender of palmprint images. In this thesis, three different feature extraction techniques have been applied on images of a well know palmprint database. The three methods can be characterized as a statistical method namely principle component analysis (PCA), a transformation method namely Haar wavelets and a texture method namely local binary pattern (LBP). The aim of applying different feature extraction methods is to compare their relative performance and determine the best method for palmprint recognition.
Moreover, hybrid methods combining the algorithms mentioned above have been created in order to take the advantage of two or more feature extraction methods. Outputs individual method are fused using voting techniques. Keywords: Palmprint recognition, Principal Component Analysis, Local Binary Patterns, Haar Wavelets.
…………………………………………………………………………………………………………………………
ÖZ: Avuç içi tanıma biyometrik ve çoklu biyometrik tanıma sistemlerinde önem kazanmış ve pek çok güvenlik projesinde de yaygın olarak kullanılmıştır. Bu önem kazanmasının arkasında avuç içinin her bireye özel eşsiz bir özellik olmasıdır. Avuç içi değişmez bir biyometrik özelliktir ve doğumdan ölüme kadar aynı şeklini korur.
Şimdilerde, avuç içini tanımaya yönelik çalışmalar tanıma oranını iyileştirmeye ve avuç içi görüntüsünde yaş ve cinsiyetini belirlemeye odaklanmıştır.
Bu tezde bilinen bir avuç içi veritabanındaki görüntüler için üç farklı özellik çıkarma yöntemi uygulanmıştır. Bu üç farklı yöntem karakteristik olarak, bir istatistiksel algoritma olan Ana Bileşenler Analizi (PCA), bir dönüşüm gösterimi olan Haar Dalgacıkları, ve bir desen yöntemi olan Yerel İkili Örüntüler (LBP) olarak adlandırılır. Bu üç farklı özellik çıkarma yönteminin kullanılmasında, bu yöntemleri birbirleriyle karşılaştırarak başarımı en iyi olanı belirlemektir.
Ayrıca, bu üç yöntem kullanılarak hibrid algoritmalar da oluşturulmuş, sonuçlar oylama yoluyla birleştirilmiş ve avuç içi tanımaya yönelik sınanmışlardır.
Anahtar Kelimeler: Avuç İçi Tanıma, Ana Bileşenler Analizi, Yerel İkili Görüntüler, Haar Dalgacıkları.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Pattern recognition systems
Computer vision
Palmprint recognition, Principal Component Analysis, Local Binary Patterns, Haar Wavelets
Palmprint Recognition with Statistical, Wavelet and Local Feature Extraction Methods
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1782/3/AhmedZanear.pdf.txt
File
MD5
faf580b658214d360a88d41852f06433
53927
text/plain
AhmedZanear.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1782/1/AhmedZanear.pdf
File
MD5
e31b73a6843465f2d2ef1d27bcc3e40d
651010
application/pdf
AhmedZanear.pdf
oai:i-rep.emu.edu.tr:11129/17862015-07-01T23:00:45Zhdl_11129_11
EMU I-REP
author
Eleyan, Haytham Mohammed
2015-07-01T06:51:51Z
2015-07-01T06:51:51Z
2015-02
Eleyan, Haytham Mohammed. (2015). Artificial Bee Colony Optimization for Multiobjective Quadratic Assignment Problem. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1786
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Adnan Acan.
ABSTRACT: Excellent ability of swarm intelligence can be used to solve multi-objective combinatorial optimization problems. Bee colony algorithms are new swarm intelligence techniques inspired from the smart behaviors of real honeybees in their foraging behavior. Artificial bee colony optimization algorithm has recently been applied for difficult real-valued and combinational optimization problems. Multiobjective quadratic assignment problem (mQAP) is a well-known and hard combinational optimization problem which is used in modeling of several assignment and scheduling problems. Benchmark mQAP instances are already solved near optimally using competitive metaheuristics and dedicated local search algorithms, but there is no absolute winner of these competitions in the sense that while a particular algorithm is quite successful for a kind of mQAP instance, it exhibits poor performance on the others. In this study, we test the performance of artificial bee colony optimization algorithm over multiobjective quadratic assignment problem. Experiments have shown that the new heuristic was effective and efficient to solve hard mQAP instances.
Keywords: Multi-objective optimization, Artificial Bee Colony, Bees Algorithm, Multiobjective Quadratic Assignment Problem.
…………………………………………………………………………………………………………………………
ÖZ: Çok amaçlı bileşimsel en iyileme problemleri sürü zekasına dayalı yöntemlerle çözülebilir. Arı kolonisi algoritmaları son zamanlarda geliştirilen ve bal arılarının yiyecek ararken sergiledikleri zeki davranışlardan ilham alınan sürü zekası teknikleridir.
Çok amaçlı ikinci derece atama problemi iyi bilinen ve zor bir bilişimsel en iyileme problemidir.Bu problem bir çok atama ve listeleme probleminin modellenmesinde de yaygın olarak kullanılır. Çok amaçlı ikinci derece atama problemi için kıyas oluşturan örnekler metaheuristikler ve yerel araştırma yakın kalitede algoritmalar kullanılarak en iyi düzeyde çözülmüşlerdir. Ancak bu çözüm yaklaşımlarının kesin bir kazananı yoktur, bir yöntem bazı problemleri başarıyla çözerken, başka bir problem kümesi için zayıf bir başarım gösterebilmektedir. Bu çalışmada yapay arı kolonisi en iyileme algonitmasının çok amaçlı ikinci derece atama probleminin çözümündeki başarımı test edilmiştir. Yapılan deneysel çalışmalar, bu yöntemin etkili ve hesaplama karmaşıklığı bakımından verimli olduğunu göstermiştir.
Anahtar Kelimeler: Çok Amaçlı Optimizasyon, Yapay Arı Kolonisi, Arı Algoritması, Çok amaçlı ikinci derece atama problemi.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Multi-objective optimization, Artificial Bee Colony, Bees Algorithm, Multiobjective Quadratic Assignment Problem
Artificial Bee Colony Optimization for Multiobjective Quadratic Assignment Problem
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1786/3/EleyanHaytham.pdf.txt
File
MD5
26c54a5aafda1c0a6df56ee5263df03b
70938
text/plain
EleyanHaytham.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1786/1/EleyanHaytham.pdf
File
MD5
aee2d61580adb39e9a8baba50952d245
2204533
application/pdf
EleyanHaytham.pdf
oai:i-rep.emu.edu.tr:11129/17882015-07-01T23:00:47Zhdl_11129_11
EMU I-REP
author
Abdulrahman, Ahmad A.
2015-07-01T07:09:30Z
2015-07-01T07:09:30Z
2015-02
Abdulrahman, Ahmad A. (2015). An Online Automation System for Research and Publication Activities in Eastern Mediterranean University. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1788
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Yıltan Bitirim.
ABSTRACT: In this study, an online automation system for research and publication activities is developed in order to collect, keep, organize and process all activities of every academic staff in Eastern Mediterranean University dynamically in reliable, faster, up-to-date archiving, and easier way. The developed system has various features such as: review mechanism; real-time statistics; advance search; reporting; academic point assignment; duplication detection mechanism; independent messaging system; and user friendly interface. Our system can be a solution to overcome the difficulties faced by the university administration regarding research and publication activities. Although current system is developed for Eastern Mediterranean University, it can be used by some other Universities or Institutes as well.
…………………………………………………………………………………………………………………………
ÖZ: Bu çalışmada, Doğu Akdeniz Üniversitesi’ndeki her akademik personelin tüm aktivitelerini güvenilir, daha hızlı, güncel arşivleme ve daha kolay yolla toplamak, tutmak, organize etme, ve işlemek için araştırma ve yayın aktiviteleri icin bir çevrimiçi otomasyon geliştirilmiştir. Geliştirilen sistem çeşitli özelliklere sahiptir, örneğin: denetim mekanizması; gerçek zamanlı istatistik; gelişmiş arama; raporlarma; akademik puan atama, tekrarlama keşif mekanizması, bağımsız mesajlaşma sistemi, ve kullanıcı dostu arayüz. Bizim sistemimiz üniversite yönetiminin araştırma ve yayın aktiviteleri ile ilgili zorlukları aşmak için bir çözüm olabilir. Bu sistem Doğu Akdeniz Üniversitesi için geliştirilmiş olmasına rağmen, diğer bazı üniversiteler ve enstitüler tarafindan da kullanabilir.
Anahtar Kelimeler: Web uygulaması, akademik değerlendirme, akademik aktivite.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Automation
Software engineering - Automation
An Online Automation System for Research and Publication Activities in Eastern Mediterranean University
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1788/3/AbdulrahmanAhmad.pdf.txt
File
MD5
edf98b4375e82bab2b9923fbf2df3295
148545
text/plain
AbdulrahmanAhmad.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1788/1/AbdulrahmanAhmad.pdf
File
MD5
e1574e376431a92cf757a6372e553719
3894410
application/pdf
AbdulrahmanAhmad.pdf
oai:i-rep.emu.edu.tr:11129/17892015-07-01T23:00:42Zhdl_11129_11
EMU I-REP
author
Mazaheri, Shirin
2015-07-01T07:15:45Z
2015-07-01T07:15:45Z
2015-02
Mazaheri, Shirin. (2015). Network Monitoring System. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1789
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Gürcü Öz.
ABSTRACT: Network monitoring system plays a significant role in the network security and management. Network monitoring refers to the observation on the events, happening through the network with the aim of providing a secure and persistent network. However, many small and medium sized companies and organizations prefer to escape from this fact. The most important reason for such companies is that they do not have professional network administrators to be able to use the available network monitoring system in the market. This avoidance would cost them a lot of funds or even failure in capital, in case of network failure. The proposed network monitoring in this thesis, will solve this problem because of its ease of use as well as providing all the required functionalities for monitoring a network. So, the advantage of using the proposed system, would be ability of being used by even novice users who have just basic understanding of using computer applications. According to this fact, this application could be used for small and medium sized organizations, in case of not having professional network administrators.
Keywords: Network monitoring, Remote Access, Network Security, Network Management.
…………………………………………………………………………………………………………………………
ÖZ: Ağ izleme sistemi ağ güvenliği ve yönetiminde önemli bir rol oynamaktadır. Ağ izleme sistemi, güvenli ve kalıcı bir ağ sağlama amacıyla, ağ üzerinde olan, olaylar üzerinden gözlem ifade eder. Ancak, birçok küçük ve orta ölçekli şirketler ve kuruluşlar bu gerçekten kaçmayı tercih eder. Bu tür şirketlerin en önemli kaçma nedeni ise piyasada ağ izleme sistemini kullanabilen profesyonel ağ yöneticilerinin olmamasıdır. Bu kaçınma, ağ arızası durumunda, sermaye ve iş kaybına neden olacaktır. Bu tezde önerilen ağ izleme sisteminin kullanım kolaylığı sağlamasının yanı sıra, ağ izleme için gerekli tüm işlevleri de sağlayarak bu sorunu çözecektir. Önerilen sistemi kullanmanın avantajı, bilgisayar uygulamalarını kullanmak için sadece temel bir anlayışa sahip acemi kullanıcılar tarafından da kullanılabilir olması olacaktır. Bu gerçeğe göre, bu uygulama, küçük ve orta ölçekli kuruluşlar tarafından, profesyonel ağ yöneticileri olmaması durumunda bile kullanılabilir bir uygulamadır.
Anahtar Kelimeler: Ağ izleme, Uzaktan Erişim, Ağ Güvenliği, Ağ Yönetimi.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Computer networks - Security measures
Computer security
Network monitoring, Remote Access, Network Security, Network Management
Network Monitoring System
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1789/3/MazaheriShirin.pdf.txt
File
MD5
c77732c4908a3143245670fa53502a0e
68619
text/plain
MazaheriShirin.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1789/1/MazaheriShirin.pdf
File
MD5
e0dbd8015f8c1b356b6ed1c5ef734575
1067559
application/pdf
MazaheriShirin.pdf
oai:i-rep.emu.edu.tr:11129/17942015-07-01T23:00:48Zhdl_11129_11
EMU I-REP
author
Parchami, Shaghayegh
2015-07-01T08:18:01Z
2015-07-01T08:18:01Z
2015-02
Parchami, Shaghayegh. (2015). Experimental Evaluation of Feature Extraction Schemes for Face Recognition. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1794
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Prof. Dr. Hakan Altınçay.
ABSTRACT: In this thesis, we studied the use of Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA) and Gabor wavelets for face recognition. Both PCA and LDA are applied for the extraction of features from the raw pixel values. Then, their use for the extraction of features from the outputs of Gabor wavelets is considered. Lattice-based selection of a subset of Gabor outputs is considered for this purpose. A rectangular grid of various sizes is considered and the Gabor filter outputs extracted from the grid points are employed for feature extraction using PCA and LDA. As an alternative approach, Best Individual Selection (BIS) and Sequential Forward Selection (SFS) are employed for feature subset selection. The k nearest neighbor classifier is employed as the classification scheme. The experiments have been carried out on FERET database. It is observed that the accuracies achieved using Gabor wavelets are superior when compared to the features derived from the raw pixel values. Moreover, superior scores are generally achieved using BIS and SFS approaches when compared to PCA and LDA.
Keywords: Face recognition, sequential feature selection, best individual selection, Gabor wavelets, principal component analysis, linear discriminant analysis .
…………………………………………………………………………………………………………………………
ÖZ: Bu tezde, Ana Bileşenler Analizi (ABA), Doğrusal Ayırtaç Analizi (DAA) ve Gabor dalgacıklarının yüz tanımada kullanımı üzerinde çalışılmıştır. Hem ABA hem de DAA, yüz resimlerindeki ham piksel değerlerinden öznitelik çıkarımı için uygulanmıştır. Daha sonra, Gabor dalgacıklarının çıktılarından öznitelik çıkarımı için kullanımları değerlendirilmiştir. Gabor çıktılarının alt kümelerinin örgü-tabanlı seçimi bu amaçla kullanılmıştır. Değişik boyutlardaki dikdörtgen örgüler kullanılmış ve örgü noktalarında hesaplanan Gabor çıktılarından ABA ve DAA kullanılarak öznitelikler çıkarılmıştır. Alternatif yaklaşım olarak, Eniyi Bireysel Seçimi (EBS) ve Sıradan İleri Seçimi (SİS) de öznitelik altkümesi seçimi için değerlendirilmiştir. k en yakın komşu sınıflandırma yöntemi olarak kullanılmıştır. Deneysel çalışmalar FERET veri kümesinde yapılmıştır. Gabor dalgacıkları kullanıldığında, ham piksel değerleri kullanımına göre daha iyi sonuçlar elde edildiği gözlenmiştir. Ayrıca, EBS ve SİS yaklaşımları ile genelde ABA ve DAA’ya göre daha iyi sonuçlar elde edilmiştir.
Anahtar sözcükler: Yüza tanıma, sıradan ileri seçimi, eniyi bireysel seçimi, Gabor dalgacıkları, doğrusal bileşenler analizi, doğrusal ayırtaç analizi.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Face Recognition (Computer science)
Computer Vision
Image processing - Digital techniques
Face recognition, sequential feature selection, best individual selection, Gabor wavelets, principal component analysis, linear discriminant analysis
Experimental Evaluation of Feature Extraction Schemes for Face Recognition
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1794/3/ParchamiShaghayegh.pdf.txt
File
MD5
2a0b5bb0963d478af0a66020e1bde9dd
72944
text/plain
ParchamiShaghayegh.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1794/1/ParchamiShaghayegh.pdf
File
MD5
802376c223fab060f6c6fd12e46ff0a9
901215
application/pdf
ParchamiShaghayegh.pdf
oai:i-rep.emu.edu.tr:11129/18272015-10-29T00:00:27Zhdl_11129_11
EMU I-REP
author
Seyedi, Behnam
2015-10-28T06:18:30Z
2015-10-28T06:18:30Z
2014-10
Seyedi, behnam. (2014). Multi-objective Optimization of LARP Parameters using Weighted Sum DE Method. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1827
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assist. Prof. Dr. Mehmet Bodur.
ABSTRACT: This thesis employed the single-objective differential evolution (DE) algorithm to search the multi-objective solutions to obtain lateral controller (LARP) settings for an auto-steered tractor by combining two fitness functions, lateral peak and RMS errors, to a single objective using the weighted-sum-method. Compared to the multi-objective differential algorithm, weighted-sum DE algorithm covered a larger range of the Pareto-front. After modifying DE to set the search space adaptively, the modified method finds better non-dominated solutions than MODE by less number of fitness evaluations. Weighted Sum DE algorithm obtained better non-dominated solutions than MODE algorithm although weighted sum DE uses 20 000 fitness evaluation while MODE used 500 000 evaluations.
Keywords: Weighted sum optimization, LARP control, Automatic steering agricultural vehicle.
…………………………………………………………………………………………………………………………
ÖZ: Bu tezde otomatik sürüşlü bir traktörün tepe ve RMS hata olmak üzere iki objektifli en iyi LARP denetleci ayarlarını bulmak için tek-objektifli farksal evrim algoritması, iki objektifi ağırlıklı toplam yöntemiyle tek objektife indirerek kullanıldı. Çok objektifli farksal evrim algoritması MODE ile karşılaştırıldığında ağırlıklı toplamlı DE algoritmasının Pareto-önde daha geniş bir aralığı doldurduğu görülmüştür. Ağırlıklı toplamlı DE yönteminde arama uzayını adaptif olarak ayarlayacak değişikliklerden sonra oluşturulan yöntem MODE nin bulduğu çözümlerden daha iyi baskın olmayan çözümleri daha az uyum değerlendirmesi ile bulabilmektedir. Ağırlıklı toplamlı DE’nin 2000 uyum değerlendirmesiyle bulduğu çözümlerin MODE’nin 500000 uyum değerlendirmesiyle bulduklarından daha iyi olduğu gözlenmiştir.
Anahtar Kelimeler: Ağırlıklı toplamlı optimizasyon, LARP kontrol, Otomatik sürüşlü tarımsal araç.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Weighted sum optimization, LARP control, Automatic steering agricultural vehicle
Multi-objective Optimization of LARP Parameters using Weighted Sum DE Method
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1827/3/SeyediBehnam.pdf.txt
File
MD5
e29a15086f1481c03c3677f8565680e6
117347
text/plain
SeyediBehnam.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1827/1/SeyediBehnam.pdf
File
MD5
e2ffe495d423fe2755d138bb544699aa
1205891
application/pdf
SeyediBehnam.pdf
oai:i-rep.emu.edu.tr:11129/18282015-10-29T00:00:27Zhdl_11129_11
EMU I-REP
author
Jasim, Hayder M.
2015-10-28T07:30:20Z
2015-10-28T07:30:20Z
2013-06
Jasim, Hayder M. (2013). Investigate Performance of IEEE 802.11b Using OPNET. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1828
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assist. Prof. Dr. Gürcü Öz.
ABSTRACT: In recent years, the research community interest has increased about wireless ad hoc networks. IEEE 802.11b standard is one of the wireless network standards which is used in such network these groups’ standards. The IEEE 802.11b standard defines the protocol and proper interconnections of data communication tools wireless local area network (LAN). It includes the physical and media access control (MAC) layers of the ISO seven-layer network model. Therefore, investigating its performance with different ad hoc network configurations is necessary. Routing protocols like AODV, DSR, TORA and OLSR are famous studies that discourse the performance evaluation of routing protocols via different evaluation methods. Various methods and simulation environments grant different outcomes. Thus, there is a need to broaden the spectrum to account for effects not taken into consideration in a particular environment. There is a need to expand the spectrum to take into consideration the effects of file size, numbers of nodes and mobility that were neglected in a specific environment. During the time of the thesis, the performance of AODV, ad hoc routing protocol in OPNET was evaluated using several scenarios. Effectiveness of this approach with 802.11b standard in various wireless ad hoc network configurations was investigated. The simulation results were analyzed and compared. In our simulation work, FTP traffic is used between a client and FTP server through other entire nodes with AODV protocol and 802.11b wireless standard. Our simulation results would also represent a situation where a MANET node can receive traffic from another node in the network. Furthermore, the nodes are randomly scattered in the network to provide the possibility of multi hop routes from the client to the server.
Keywords: Mobile Wireless ad Hoc Networks, Routing Protocol, Performance Evaluation, OPNIT simulator, AODV.
…………………………………………………………………………………………………………………………
ÖZ:Son yıllarda, araştırma topluluğunun ilgisi kablosuz özele amaca yönelik (ad hoc) ağlar hakkında artmıştır. IEEE 802.11b standardı, bu ağlarda kullanılan kablosuz ağ standartlarından biridir. IEEE 802.11b standardı very iletişim için gerekli kablosuz yerel alan ağında (LAN) protokolü ve uygun bağlantıları tanımlar. Standart, yedi katmanlı ISO ağ modelinde fiziksel ve ortam erişim denetimi (MAC) katmanlarını içerir. Bu nedenle, farklı ad hoc ağ yapılandırmalarında bu standartın performans araştırmak gereklidir.
AODV, DSR, TORA ve OLSR gibi yönlendirme protokollerinin farklı değerlendirme yöntemleri ile yönlendirme protokolleri performansın değerlendirme de kullanılan ünlü çalışmalardır. Çeşitli yönlendirme yöntemleri ve simülasyon ortamları farklı sonuçlar vermek. Bu yüzden performans ölçülerinde belirli bir ortam dikkate alınmak yerine farklı ortamlarda göz önünde bulundurmak gerekir. Farklı ortamlarda, dosya boyutu, düğüm sayısı ve düğümlerin hareketliliğinin etkilerini incelemeye gerek vardır. Bu tezde bilinen bir yönlerdirme protokolü olan AODVi, OPNET simulatörü kullanılarak farklı ağ senaryolarında değerlendirilmiştir. Çeşitli kablosuz ad hoc ağ yapılandırmalarında 802.11b standardının etkinliği araştırılmıştır. Elde edilen simülasyon sonuçları analiz edilip karşılaştırılmıştır.
Simülasyon çalışmalarında, AODV protokolü ve 802.11b kablosuz standart kullanarak işlemci ve sonucu düğümler arasında FTP trafiği oluşturulmuştur. Ayrıca simülasyonlarda kablosusun bir ad hoc güğümünün başka bir düğümün erişim alanında olmadığı durumlar da göz önüne alınmıştır. Ayrıca, düğümler ağda rasgele yerleştirilerde istemciden sunucuya çok hop yollarınoluşması sağlanmıştır.
Anahtar Kelimeler: Mobil Kablosuz Özel Amaca Yönekli Ağlar, Yönlendirme Protokolü, Performans Değerlendirme, OPNET simülatörü, AODV Yönlerdirme Protokolü.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Wireless communication systems
Mobile Wireless ad Hoc Networks, Routing Protocol, Performance Evaluation, OPNIT Simulator, AODV
Investigate Performance of IEEE 802.11b Using OPNET
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1828/3/JasimHayder.pdf.txt
File
MD5
142a308abfbc4a55e9cd9735651dff29
124076
text/plain
JasimHayder.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1828/1/JasimHayder.pdf
File
MD5
f0da4ac24ba7d0c7337802cae577e7ba
1997833
application/pdf
JasimHayder.pdf
oai:i-rep.emu.edu.tr:11129/18332015-11-03T00:00:20Zhdl_11129_11
EMU I-REP
author
Khorsheed, Mohammed Dalshad
2015-11-02T07:48:55Z
2015-11-02T07:48:55Z
2013-06
Khorsheed, Mohammed Dalshad. (2013). Investigate Performance of 802.11b and 802.11g Standards with DSR Protocol using OPNET. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1833
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assist. Prof. Dr. Gürcü Öz.
ABSTRACT: MANETs stands for mobile ad-hoc networks. They are a collection of mobile devices that do not require any infrastructure or centralized control. Additionally, they do not contain any central coordinator like a router or an access point. This network has a lot of features that are different from other networks such as ease of movement between networks and the ability of mobile devices to leave the network. Because, there is no router in this network, the routing process is done by the nodes themselves. There are more than one routing protocols proposed for this network, each working under different strategies. A routing protocol is used to discover routes between stations. It plays an important role for the overall performance of MANETs. MANET routing protocols include Optimized Link State Routing protocol (OLSR), Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Temporary Ordered Routing algorithm (TORA). A good understanding of the effect of each of these routing protocols on a typical IEEE 802.11 network will cater for an efficient design and deployment of an appropriate MANETs.
In this thesis, we used an FTP application to investigate and analyze the performance of wireless standards 802.11b and 802.11g with the different data rates. The routing protocol that is used is a dynamic source routing protocol. The performance metrics used are number of hops per route, media access delay, retransmission attempts, download response time, upload response time and throughput. OPNET version 17.1 is used as a simulation tool to model and simulate ad-hoc network. The simulation results conclude that the average media access delay of 802.11g is decreased when the data rate is increasing. The throughput of 802.11g standard is increasing when the data rate is increased. Additionally, the throughput of 802.11g is greater compared with 802.11b when they are used with the same data rate. Data traffic ratio of 802.11g standard is increased with increasing data rate.
Keywords: Mobile ad-hoc Network, Wireless Standards, DSR, FTP, OPNET Simulator.
…………………………………………………………………………………………………………………………
ÖZ: MANET (Mobile Ad-hoc Networks) mobil özel amaca yönelik (ad-hoc) ağların kısaltılmışıdır. Herhangi bir altyapı veya merkezi kontrol gerektirmeyen bir grup mobil cihazın birleşmesinden oluşur. Buna ek olarak yönlendirici ve giriş ( Access Point) gibi merkezi bir dönemi içermez. Bu ağlar diğer ağlardan farklı olarak mobil cihazların bir ağdan diğer ağa hareket edebilmelerini ve ağdan ayrılmaları gibi farklı özellikler içerirler. Bu ağlarda yönlendirici olmadığından, yönlendirme işlemi ağı oluşturan düğümler tarafından yapılır.
Bu ağlar için, her biri farklı stratejilerde çalışan, yönlendirme protokolleri vardır. Bir yönlendirme protokolü istasyonlar arasında yön bulma maksadıyla kullanılır ve MANET’lerin genel performanslarında önemli rol oynar. MANET yönlendirme protokollerine örnek olarak Optimized Link State Routing ( OLSR), Ad-hoc On demand Distance Vector (AODV), Dynamic Source Routing (DSR) ve Temporary Ordered Routing Algorithm (TORA) verilebilir.
Bu yönlendirme protokollerinin tipik IEEE 802.11 ağlarına olan etkisini en iyi şekilde anlamak MANET’lerin etkili tasarımlarını ve kullanımlarını sağlayacaktır.
Bu tezde FTP protokolü ile gerçekleştirilen veri transferinde 802.11b ve 802.11g standartlarının farklı veri hızlarında performansları incelenmiştir. DSR protokolü yönlendirme protokolü olarak kullanılmıştır. Performans ölçmek için yön boyunca sekme sayısı ( number of hops per route) ortam giriş gecikmesi (Media Access Delay ), geri gönderim girişimi (Retranmission Attempts), indirme yanıt zamanı ( Download Response Time), yükleme yanıt zamanı (Upload Response Time) ve çıkan iş oranı (Throughput) ölçüt birimleri kullanılmıştır. Ad- hoc ağların modellenmesi ve simülasyonu için OPNET’in 17.1 versiyonu benzetim aleti olarak kullanılmıştır.
Simülasyon sonuçları şöyle özetlenebilir: 802.11g’de ortalama ortam giriş gecikmesi veri hızı arttıkça azalmaktadır. Aynı zamanda bu çıkan iş oranı standartta veri hızı arttıkça da artmaktadır.
Buna ek olarak, aynı veri boyutlarında 802.11g’de ölçülen iş oranı 802.11b’den daha yüksektir. 802.11g’de veri trafik oranı veri hızı arttığı zaman artmaktadır.
Anahtar Kelimeler: MANETS Mobil Ad-hoc Ağ, Kablosuz Standartlar (802.11), DSR, FTP, OPNET Simulator.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Wireless communication systems
Mobile computing
Wireless LANs - Standards
Mobile ad-hoc Network, Wireless Standards, DSR, FTP, OPNET Simulator
IEEE 802.11 (Standard)
Investigate Performance of 802.11b and 802.11g Standards with DSR Protocol using OPNET
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1833/3/KhorsheedMohammed.pdf.txt
File
MD5
a8135f8d347a9975d1a058b4319dcbd1
107082
text/plain
KhorsheedMohammed.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1833/1/KhorsheedMohammed.pdf
File
MD5
759e56db206d469e6f1fb84157f8ef4d
2710089
application/pdf
KhorsheedMohammed.pdf
oai:i-rep.emu.edu.tr:11129/18402015-11-07T00:00:25Zhdl_11129_11
EMU I-REP
author
Jawad, Thakwan Akram
2015-11-06T11:57:49Z
2015-11-06T11:57:49Z
2014-02
Jawad, Thakwan Akram. (2014). Modifying of Hill Cipher using Randomized Approach. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1840
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assoc. Prof. Dr. Ersun İşçioğlu.
ABSTRACT: In the modern technological communication networks, where data or image transfer through the communication devices has acquired significance security of the data or image transfer has become a major issue. By means of cryptography, they convert plaintext into ciphertext, or into data that must be unreadable to the attacker. Another approach is to encrypt data of image and then send it to the receiver. Various approaches of modifying Hill Cipher have been discovered earlier, which includes advanced and complicated strategies to overcome the problems faced by using Hill image cipher. This thesis is concerned with a rather simple modification on Hill Cipher using randomized permutation of pixel locations approach and comparing the results with Hill image cipher. The Hill Cipher has advantages in encryption of symmetric data. However, it is insufficient to known plaintext attack. For this reason, the plain image should be processed first to hide its pattern that has the main information. Many researchers used complicated approaches that sometimes depend on matrix mathematics and sometimes on information manipulations. The aim of these complication strategies is to make the encryption approaches in thwart order to any known plaintext and ciphertext attacks. The main object of this thesis is to adjust the original Hill Cipher to decrease the susceptibility to known plaintext attacks and known ciphertext attack. This is achieved by randomizing the information locations for the whole image. So, even if the attacker can guess the key, the decryption still gives false information. Both of Hill image cipher and the proposed modification on it (termed MHill in this thesis) are convenient for all images plaintext block encryption. Results from statistical analysis and comparative studies have shown that Hill Cipher with randomized approach has a correlation coefficient value which is closed to zero and has the maximum deviation value. According to these results Hill Cipher with randomized approach proved that it has better encryption quality compared to Hill image cipher.
Keywords: Hill Cipher, randomized approach, modified Hill image cipher, encryption, decryption, Hill Cipher with randomized approach.
…………………………………………………………………………………………………………………………
ÖZ: Modern teknolojik iletişim ağlarında, iletişim araçları vasıtasıyla gerçekleştirilen veri ve resim transferlerinde önemli güvenlik sorunları olmuştur. Kriptografi ile düz bir metin kodlanmış bir hale getirilebilir ya da bir veri saldırganlara karşı okunamaz hale dönüştürülebilir. Bir diğer korunma yöntemi de bir resmin verisini kodlama ve göndermedir. Bu çalışmada, Hill Cipher kullanılarak basit bir şekilde pixel yerlerinde rastgele değişimler yapılmış ve elde edilen sonuçlar standart Hill Cipher sonuçları ile karşılaştırılmıştır. Hill kodlama yöntemi simetrik verilerin kodlanmasında bir çok avantaj sağlamaktadır.Fakat bu yöntem bilinen saldırılara karşı yetersizdir. Bu nedenle resim öncelikle gizli bir örüntü ile işlenmelidir. Birçok araştırmacı bazen matris matematiği, bazen de manipule edilmiş bilgiler üzerinde karışık kodlamalar kullanmaktadır. Bu stratejilerin amacı bilinen düz metin ya da şifreli metin saldırılarını önlemek için kodlama yapmaktır. Bu tezin amacı da, bilinen düz metin ve şifreli metin saldırılarına karşı duyarlılığı azaltmak için yeni bir Hill Cipher yapılandırmaktır. Bu yeni yapılandırmada, görüntü içerisindeki tüm piksellerin yerleri rastgele değiştirilir. Böylece saldırgan şifreyi tahmin edebilse bile, çözümleme de yanlış bilgi elde edecektir. Hill Cipher ve yeniden tasarlanmış hali (MHill Cipher) tüm şifresiz resimler için blok kodlama kullanmaktadır. İstatiksel analiz ve karşılaştırma çalışmalarının sonuçları göstermektedir ki, MHill Cipher’ın korelasyon katsayısı sıfıra yakındır ve yüksek sapma değerindedir. Bu sonuçlara göre bu çalışmada üretilen MHill Cipher’ın kodlama kalitesinin orjinal Hill Cipher’a göre daha iyi olduğu belirlenmiştir. Anahtar Kelimeler: Hill Cipher, RastlantısalYaklaşım, modifiye edilmiş Hill Cipher, Kodlama, Kod çözme, Rastlantısal Yaklaşımına göre Hill Cipher.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Data encryption (Computer science)
Wireless Communication Systems
Hill Cipher, randomized approach, modified Hill image cipher, encryption, decryption, Hill Cipher with randomized approach
Modifying of Hill Cipher using Randomized Approach
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1840/3/JawadThakwan.pdf.txt
File
MD5
e3f63d68f86b95ff4e581933d5a0a44c
86046
text/plain
JawadThakwan.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1840/1/JawadThakwan.pdf
File
MD5
ce992ac1368241dea05d6cf4c5962c67
2212464
application/pdf
JawadThakwan.pdf
oai:i-rep.emu.edu.tr:11129/18452015-11-11T00:00:25Zhdl_11129_11
EMU I-REP
author
Rezaei, Atoosa Mohammad
2015-11-10T07:25:38Z
2015-11-10T07:25:38Z
2014-07
Rezaei, Atoosa Mohammad. (2014). Author Gender Identification from Text. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1845
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assist. Prof. Dr. Cem Ergün.
ABSTRACT: The identification of an author's gender from a text has become a popular research area within the scope of text categorization. The number of users of social network applications based on text, such as Twitter, Facebook and text messaging services, has grown rapidly over the past few decades. As a result, text has become one of the most important and prevalent media types on the Internet. This thesis aims to determine the gender of an author from an arbitrary piece of text such as, for example a journal article or email. This field of research has garnered the interest of the researchers for the reason that some people fake their gender in text-based Internet forensics. The psychology of linguistic indicates how closely the words and writing styles people use correlate with their gender. Various feature sets have been used by researchers in recent decades to identify the gender of an author; however, identifying feature sets remains a research obstacle. In this dissertation, five feature sets were selected to prepare a feature space for the gender identification problem. The features in these sets included character-based features, word-based features, syntactic-based features, structure-based features and the function words that an author used in a text. Two state-of-the-art machine learning algorithms were considered for the author gender identification problem, based on the proposed feature space in this thesis. Weka (data mining software) was used to design a support vector machine classifier and a Bayesian logistic regression classifier. The reason for choosing these two classifiers was that support vector machine and Bayesian logistic regression are the most powerful classifiers for text mining. An Enron email dataset, which is available to researchers on the Internet, was used in the training and testing phases during experiments to provide sufficient data for the classification process. Keywords: Machine Learning, classifier, psychology linguistic, Support Vector Machine, Bayesian logistic regression, gender identification.
…………………………………………………………………………………………………………………………
ÖZ: Metinden yazar cinsiyetinin belirlenmesi, metin sınıflama kapsamında yaygın bir araştırma konusu olmuştur.Metin tabanlı sosyal medya uygulamalarındaki kullanı sayısı son yıllarda hızla artmıştır.Sonuç olarak metin, internet üzerindeki en önemli ve yaygın medya haline gelmiştir.Bu çalışmada, rastgele seçilmiş metin parçalarından, örneğin makale veya e-posta yazarının cinsiyeti belirlenmiştir.Bu çalışma alanı, araştırmacıların ilgisini çekmiştir çünkü bazı kişiler metin tabanlı internet ortamında cinsiyetlerini saklamaktadırlar. Dil psikolojisi, yazarın cinsiyeti ile kullandığı kelimelerin ve yazım şeklinin çok yakından ilişkili olduğunu göstermektedir.Geçtiğimiz on yılda, araştırmacılar yazar cinsiyetini belirlemek için çeşitli özellik kümeleri kullanmışlardır.Bununla beraber özellik kümelerinin belirlenmesi zorluğunu korumaktadır. Bu çalışmada, cinsiyet belirleme problemi için hazırlanan özellik uzayı; beş özellik kümesi seçilerek oluşturulmuştur. Kümelerdeki özellikler karakter tabanlı özellikler, kelime tabanlı özellikler, sözdizimsel özellikler, yapısal özellikler ve bir yazarın metinde kullandığı işlev kelimelerden oluşmaktadır.
Bu çalışmada, yazar cinisiyeti belirleme problem için, sunulan özellik uzayında, iki en yeni makine öğrenmesi algoritması kullanılmıştır. Bir Destek Vektör Makinası sınıflayıcı ve bir Bayes lojistik regresyon sınıflayıcısı tasarlamak için Weka (veri madenleme yazılımı) kullanılmıştır. Bu iki sınıflayıcının seçilmesinin nedeni, metin madenciliği için destek vektör makinası ve Bayes lojistik regresyonun en güçlü sınıflayıcılardan olmasıdır. Sınıflama sürecinde kullanılan veriler internetten sağlanmıştır.Araştırmacılar için bağışlanan Enron e-posta veri kümesi, denemeler sırasında eğitim ve test fazlarında kullanılmıştır. Anahtar Kelimeler: Makine öğrenme, sınıflandırıcı, dilsel psikoloji, Destek Vektör Makinesi, Bayes lojistik regresyon, cinsiyet belirleme.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Artificial intelligence
Human-computer interaction
Machine Learning
Machine Learning, classifier, psychology linguistic, Support Vector Machine, Bayesian logistic regression, gender identification
Author Gender Identification from Text
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1845/3/RezaeiAtoosa.pdf.txt
File
MD5
237ec26b400aa705c967f6fa3acb6a05
99034
text/plain
RezaeiAtoosa.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1845/1/RezaeiAtoosa.pdf
File
MD5
405fac4ee67ea3a0c0dd2949b8e1b878
1366379
application/pdf
RezaeiAtoosa.pdf
oai:i-rep.emu.edu.tr:11129/18532015-11-18T00:00:21Zhdl_11129_11
EMU I-REP
author
Roshanasan, Mohammadamin
2015-11-17T11:38:01Z
2015-11-17T11:38:01Z
2012-06
Roshanasan, Mohammadamin. (2012). Performance Evaluation of Routing Protocols in Wireless Mobile Ad Hoc Networks (MANETS) using OPNET Simulator. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1853
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assist. Prof. Dr. Gürcü Öz.
ABSTRACT: Mobile ad hoc networks (MANETs) have already opened a new point of view in the field of wireless networks which includes hundreds and thousands of nodes. The wireless nodes are communicating without the need of any kind of neither infrastructure like the base stations or routers, nor centralized administration. Wireless nodes are free of moving anytime, anywhere. Therefore, mobile ad hoc networks need to have dynamic routing protocols. Mobile Ad hoc network routing protocols are divided into several different categories such as Proactive, Reactive and Hybrid Routing Protocols. Also there are a lot of performance metrics to compare the routing protocols. Each of them has its own attributes and well for specific area, such as: throughput, jitter, packet delivery ratio, average number of hops, route discovery time and end-to-end delay, which are some important ones.
In this thesis three well known routing protocols; Optimized Link State Routing (OLSR), Ad-hoc On-demand Distance Vector (AODV) and Temporary Ordered Routing Algorithm (TORA) were evaluated using the OPNET simulator under the medium load traffic size in FTP protocol. The first one (OLSR) is a proactive protocol depending on routing tables which are maintained at each node. The second one (AODV) is a reactive protocol, that finds a route to a destination on-demand. And the third ones‘ TORA which works in both categories as reactive and proactive. The random waypoint mobility model is used as pattern of mobility. As performance metrics average throughput, average network load and average end-to-end delay are examined in different number of nodes, file sizes and node speeds. The result from the simulations of this study reveals that different protocols have different qualities; some of the protocols perform better than others in one metric when using them in a specific scenario and worse in other metrics. After analyzing performances of some well-known reactive and proactive routing protocols, in case of average throughput, average end-to-end delay and average network load, the superiority of proactive protocols, over reactive ones is observed in different network scenarios. From the simulation results it is observed that the average end-to-end delay increases slightly when the number of nodes increases in OLSR. Also average throughput shown in OLSR was the highest comparing to AODV and TORA. Among the reactive protocols, AODV performs better than TORA when file sizes, speed of nodes and number of nodes are changed. On the other hand, TORA gives a highest end-to-end delay and lowest throughput compared to AODV and OLSR. Keywords: Mobile wireless ad hoc networks, simulation, routing protocols, performance evaluation, OPNET simulator.
…………………………………………………………………………………………………………………………
ÖZ: Gezgin özel amaca yönelik ağlar (MANETs), kablosuz ağlar alanında yeni bir oluşum olup yüzlerce veya binlerce düğümün herhangi bir altyapı veya kontrol merkezi olmaksızın haberleşebilme imkanını sağlamaktadır. Kablosuz düğümlerin (dizüstü bilgisayarlar, kişisel digital yardımcılar ve gezgin telefonlar) özel amaca yönelik senoryolarda hareketleri serbesttir. Buna bağlı olarak, bu tip ağlarda dinamik olarak değişebilen yönlendirme protokollerine gereksinim vardır. Gezgin özel amaca yönelik ağlarda kullanılan yönlendirme protokolleri önceden etkin (proactive), teptin (reactive) ve karma (hybrid) olarak sınıflandırılabilmektedirler. Yönlendirme protokollerinin performanslarını ölçmek ve karşılaştırmak için kullanılan birçok performans ölçü birimleri vardır. Her birinin kendine özgü özellikleri ve iyi olduğu kullanım alanları vardır. Bazı bilinen ölçü birimleri, çıkış is oranı (throughput), seğirme (jitter), paket dağıtım oranı (packet delivery ratio), ortalama sekme sayısı (average number of hops), yön bulma zamanı (route discovery time), ve bir yönden bir yöne gecikmedir (end-to-end delay)
Bu tezin bir amacı özel amaca yönelik ağlarda kullanılan ve var olan protokolleri incelemek ve anlamaktır. Diğer bir amacı da OPNET simulatörü kullanarak iyi bilinen OLSR, AODV ve TORA protokollerinin performansını özel amaca yönelik ağlarda orta hızdaki dosya transfer (FTP) protokolünün performansını incelemektedir. OLSR protokolü önceden etkin protokoller sınıfında olup yönlendirme tabloları her sekme üzerinde yapılandırılmaktadır. AODV tepkin protokoller sınıfında olup alıcıya olan rota talep üzerine bulunmantadır. TORA protokolü her iki kategoriye göre çalışabilmektedir. Bu tezde tepkin protokolü olarak kullanılmıştır. Bu çalışmada rastgele ara nokta hareketlilik modeli hareketliliği sağlamak için kullanılmıştır. Performans ölçme birimi olarak, ortalama çıkan iş oranı (average throughput), ortalama ağ yükü (average network load) ve ortalama bir uçtan bir uca gecikme (average end-to end delay) farklı boyutlardaki veri, farklı sekme hızları ve farklı sekme sayıları kullanılarak incelenmiştir. Simulasyon sonuçları seçilen protokollerin farklılıklarını göstermiştir. Protokoller ayni senaryolarda kullanılan ölçü birimlerinde farklı sonuçlar üretmiştir. Genel olarak seçilen ölçü birimlerinde önceden etkin protokoller tepkin protokollerden daha iyi sonuc vermiştir. Simulasyon sonuçlarına göre OLSR protokolü kullanırken sekme sayısını artırdığımız zaman ortalama bir uçtan bir uca gecikme az miktarda yükselmiştir. Buna ek olarak OLSR protokolünde ortalama çıkan iş oranı AODV ve TORA protokollerinden daha fazla çıkmıştır. Dosya boyutu, sekme hızı ve sekme sayısı artırıldığı zaman, etkin protokollerden olan AODV‘nin performsı TORA dan daha iyi çıkmıştır. Ayni zamanda TORA, AODV ve OLSR ile karşılaştırıldığında en yüksek bir uçtan bir uca gecikme ve en düşük çıkan ortalama çıkan iş oranı değerleri vermiştir.
Anahtar Kelimeler: Gezgin kablosuz özel amaca yönelik ağlar, simulasyon, yönlendirme protokolleri, performans ölçme / değerlendirme, OPNET simulasyon programı.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Mobile communication systems
Ad hoc networks (Computer networks)
Mobile Wireless Ad Hoc Networks Simulation Routing Protocols Perofrmance Evaluation OPNET Simulator
Performance Evaluation of Routing Protocols in Wireless Mobile Ad Hoc Networks (MANETS) using OPNET Simulator
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1853/3/Roshanasan.pdf.txt
File
MD5
7e532aeaf9088370d64d2d76594d3c2c
116554
text/plain
Roshanasan.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1853/1/Roshanasan.pdf
File
MD5
dbc40f2f5ffdb83099e0db248125746c
3677114
application/pdf
Roshanasan.pdf
oai:i-rep.emu.edu.tr:11129/18572015-11-18T00:00:30Zhdl_11129_11
EMU I-REP
author
Qasim, Araz Jameel
2015-11-17T15:30:56Z
2015-11-17T15:30:56Z
2013-06
Qasim, Araz Jameel. (2013). Performance Evaluation of Wireless Standards 802.11g and 802.11b on HTTP Application over AODV Protocol using OPNET. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1857
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assist. Prof. Dr. Gürcü Öz.
ABSTRACT: Mobile ad hoc network (MANET) is a wireless network that does not contain an infrastructure. Nodes in this network are mobile and can join or leave out from the network in time. This feature can be used in many applications like collecting data. In addition to this mobile devices associated with stations are subject to change and continuity, which has led to many changes in the network topology. However, the problem with this network is that it is easily penetrated by hackers trying to break in, and therefore it should increase its efficiency using routing protocols. It is used to find the path between stations or update existing ones. Routing protocols are classified, as a proactive protocols (e.g., OLSR), reactive protocols (e.g., AODV and DSR), and hybrid protocol (e.g., TORA). The IEEE 802.11 wireless LAN, also known as Wi-Fi, has been classified into several standards including 802.11a, 802.11b and 802.11g. In this thesis, we used HTTP application to compare between IEEE 802.11b and 802.11g with different data rates. The routing protocol is used ad hoc on demand distance vector (AODV) protocol in this simulation. Performance of these routing protocols is analyzedby metrics; number of hops per route, HTTP page response time, HTTP object response time, route discovery time, media access delay, retransmission attempts(packet) and throughput.OPNET Modeler version 17.1 is used for modeling and simulatingad hoc network. It is demonstrated from the simulation results that; the media access delay of 802.11b with 11Mbps is greater than 802.11g in all used network cases of clients number. Average retransmission attempts of 802.11g is decreased by increasing the data rates (11Mbps, 24Mbps, and 54Mbps) of network, additionally, the peak value of retransmission attempts is where 24 clients are communicating with server for both standards 802.11b and 802.11g. Throughput of the network for 802.11g is greater than 802.11b for 11Mbps data rate. Additionally, throughput of both standards are increased by increasing the number of nodes that are communicating with the server. Keyword: MANET, AODV, HTTP, IEEE 802.11, OPNET.
…………………………………………………………………………………………………………………………
ÖZ: Mobil özel amaca yönelik (ad hoc) ağ (MANET) altyapısı olmayan kablosuz bir ağdır. Bu ağdaki düğümler mobil olup zaman içerisinde ağa katılıp ağdan ayrılabilirler. Bu özellik veri toplama gibi birçok uygulamada kullanabilirler. Mobil cihazların hareketliliğinden dolayı zaman içerisinde ağın topolojisinde de değişikliler olmaktadır. Bu ağlardaki başlıca problem ağı yıkmak için dış saldırılara açık olması ve verimliliği artırmak için etkili yönlendirme protokollerine gerek duyulmasıdır. Yönlendirme protokolleri, istasyonlar arasında yolu bulmak ve var olanı güncellenmek için kullanılırlar. Yönlendirme protokolleri proaktif(ör. OLSR), reaktif (ör. AODV) ve karma (ör. TORA) olmak üzere sınıflara ayrılırlar. IEEE 802.11 veya WI-FI olarak da bilinen kablosuz LAN standardının 802.11a, 802.11b ve 802.11 gibi farklı varyasyonlar vardır. Bu tezde, HTTP Protokolü’nün kullandığı web uygulaması kullanılarak 802.11b ve 802.11g standartları farklı veri oranlarında karşılaştırılmıştır. Simülasyonlarda kullanılan yönlendirme protokolü Ad hoc on- demand Distance Vector (AODV) Protokolü’dür. Sistemin performansı, her yönde seçilen sekme sayısı ( number of hopsperroute), HTTP sayfa yanıt zamanı (HTTP page response time), HTTP nesne yanıt zamanı ( HTTP objectresponse time ), ortam giriş gecikmesi (media Access delay ), paketlerin yeniden gönderim girişi (retransmission attempts) (packet) ve üretilmiştir (throughput) ölçütleri kullanılarak analiz edilmiştir. OPNET simülatör versiyon 17.1 ad hoc ağlarının modellenmesi ve simülasyonu için kullanılmıştır. vi
Simülasyon sonuçlarından elde edilen sonuçlar ortama giriş gecikmez sistemde olan bütün kullanım saflarında 802.11b’de 802.11g’den daha fazladır. 802.11g’de veri hızı arttırıldığı zaman yeniden gönderim girişimi azalıyor. Ağda üretilen iş arası 11Mbps veri hızında 802.11g’de 802,11b’den daha fazladır. Buna ek olarak her iki standartta da üretilen iş oranı sunucuyla iletişime geçen düğüm sayısı arttıkça artıyor. Anahtar Kelimeler: MANET, AODV, HTTP, IEEE 802.11, OPNET.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Wireless sensor networks
Wireless communication systems
Wireless LANs - Standards
MANET, AODV, HTTP, IEEE 802.11, OPNET
Performance Evaluation of Wireless Standards 802.11g and 802.11b on HTTP Application over AODV Protocol using OPNET
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1857/3/QasimAraz.pdf.txt
File
MD5
edbdf40b8aa96345b8c2ec0fb495d8fc
124697
text/plain
QasimAraz.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1857/1/QasimAraz.pdf
File
MD5
6c42752c80efae1d6b8a12efaa3628db
3160824
application/pdf
QasimAraz.pdf
oai:i-rep.emu.edu.tr:11129/18622015-11-19T00:00:35Zhdl_11129_11
EMU I-REP
author
Al Sabah, Mays Kareem Jabbar
2015-11-18T10:54:13Z
2015-11-18T10:54:13Z
2014-06
Al Sabah, Mays Kareem Jabbae. (2014). An Efficient Handoff Scheme for WiMAX Networks with Load Balancing. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1862
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2014. Supervisor: Assoc. Prof. Dr. Muhammed Salamah.
ABSTRACT: The IEEE 802.16e-2005 standard Mobile WiMAX is the technology which provides wireless access to hundreds of users over long distances with high data rates. The Mobile users may have high mobility; to support this mobility and guarantee continuous connection in Mobile WiMAX when the mobile station travels far from the coverage area of its servicing base station, WiMAX must support handoff. Handoff is the process of switching between the base stations. During the period of the handoff process, the mobile station leaves the connection with the serving base station and hence leads to temporarily stopping running services. The efficiency of the mobile wireless network is affected by the handoff latency which occurs during the handoff process, as a result of scanning, ranging with the neighbor base stations and authentication, and registration with the target base station. In this thesis, we propose a new handoff scheme for Mobile WiMAX using the handoff prediction table in order to minimize the handoff latency and also balance the load between base stations. The handoff prediction table is used to expect the next base station, so the mobile station does not need to scan all neighboring base stations.”
Performance analyses of the proposed scheme were carried out and the results show that our proposed scheme can decrease the latency compared with the standard WiMAX and other previously proposed schemes. Also, the results show that load balancing can be achieved between base stations by using the proposed scheme. Keywords: WiMAX, Handoff, Handoff prediction table, Handoff latency.
…………………………………………………………………………………………………………………………
ÖZ: IEEE 802.16e-2005 standard "Mobil WiMAX", yüzlerce kullanıcıya yüksek veri oranları ile uzak mesafelere kablosuz erişim sağlayan bir teknolojidir. Mobil kullanıcıları yüksek hareketliliğe sahip olabilir; mobil istasyonu baz istasyonunun kapsama alanından bir diğerine hareket ederken bu hareketliliği desteklemek ve Mobil WiMAX ile sürekli bağlantıyı garantilemek için, WiMAX transferini desteklemesi gerekir. Transfers baz istasyonları arasında geçiş yapma işlemidir. Transfer işlemi sırasında, mobil istasyon hizmet veren ana istasyon ile bağlantıyı koparır ve dolayısıyla geçici olarak sağlanan hizmetin durdurulmasına yol açar. Mobil telsiz ağının verimliliği, transfer işlemi sırasında ortaya çıkan gecikmeden etkilenir. Bu gecikmeler, tarama, komşu baz istasyonla kimlik doğrulama, ve hedef baz istasyon ile kayıt yapma işlemlerden dolayı ortaya çıkmaktadır.
Bu tezde, geciden dolayı ortaya çıkan gecikmeyi en aza indirgemek ve geçis tahmin tablosunu kullanarak baz istasyonları arasındaki yükü dengeleme amacıyla Mobil WiMAX için yeni bir geçis düzeni önerilmektedir. Geçis tahmin tablosu bir sonraki ana istasyonu belirlemek için kullanılmakta ve bu nedenle mobil istasyonun tüm komşu baz istasyonlarını taramasına gerek olmamaktadır. Önerilen düzenin performans analizleri yapılmış ve elde edilen sonuçlara gore, tez çalışmasında önerilen düzenin standart WiMAX ve daha once varolan diğer düzenlerle karşılaştırılması sonucu, önerilen düzenin gecikmeyi azaltmakta etkili olduğunu göstermektedir. Ayrıca, sonuçlar, önerilen düzen kullanılmasının, baz istasyonları arasında yük dengelemesinde olumlu etki yapacağını göstermektedir. Anahtar Kelimeler: WiMAX, Geçis, Geçis tahmin tablosunu, Geçis gecikmesi.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Wireless communication systems - Mobile computing
Computer Networks
WiMAX, Handoff Prediction Table, Handoff Latency
An Efficient Handoff Scheme for WiMAX Networks with Load Balancing
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1862/3/SabahMays.pdf.txt
File
MD5
10be6d7cbbbbfe32f9f0bcf7145085e3
81669
text/plain
SabahMays.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1862/1/SabahMays.pdf
File
MD5
4a8f83443a445cde5da5b7e94ecd807d
1413386
application/pdf
SabahMays.pdf
oai:i-rep.emu.edu.tr:11129/18632015-11-19T00:00:21Zhdl_11129_11
EMU I-REP
author
Kako, Najdavan A.
2015-11-18T11:07:25Z
2015-11-18T11:07:25Z
2013-06
Kako, Najdavan A. (2013). An Investigation of the Coefficient of Variation Using the Colored Stochastic Hodgkin-Huxley Equations. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1863
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Marifi Güler.
ABSTRACT: In recent years, it has been argued and experimentally shown that ion channel noise in neurons can have profound effects on the neuron’s dynamical behavior. Most profoundly, ion channel noise was seen to be able to cause spontaneous firing and stochastic resonance. It was recently found by (Güler, 2011) that a non-trivially persistent cross correlation takes place between the transmembrane voltage fluctuations and the component of open channel fluctuations attributed to the gate multiplicity. This non-trivial phenomenon was found to play a major augmentative role for the elevation of excitability and spontaneous firing in the small size cell. In addition, the same phenomenon was found to significantly enhance the spike coherence. More recently, Fox and Lu’s stochastic Hodgkin-Huxley equations were extended by incorporating colored noise terms into the conductances therein, to obtain formalism capable of capturing the addressed cross correlations (Güler, 2013).
In this thesis, statistics of the coefficient of variation, obtained from the colored stochastic Hodgkin-Huxley equations, was studied. Our investigation reveals that the colored noise term enhances the agreement with the microscopic simulation results.
Keywords: Colored Noise, Channel Noise, Stochastic Ion Channel, Small Size Membrane, Stochastic Hodgkin-Huxley Equations.
…………………………………………………………………………………………………………………………
ÖZ: Son yıllarda, nöronlardaki ion kanal gürültüsünün nöron dinamiği üzerinde hayati etki yapabildiği deneysel olarak da kanıtlanmıştır. Bu kapsamda, kendi kendine ateşleme ve stokastik rezonans en çarpıcı bulgulardır.
İyon kanallarında çoklu geçit bulunmasının, voltage dalgalanmaları ve açık kanal dalgalanmaları arasında ilk bakışta gözükmeyen bir daimi çapraz ilişkiye neden olduğu (Güler, 2011) ortaya çıkartılmıştır. Bu ilk bakışta gözükmeyen olgunun, küçük boyutlu hücrelerde yüksek uyarılma ve kendi kendine ateşlemeye neden olduğu bulunmuştur. Daha yakın zamanda, Fox ve Lu’nun stokastik Hodgkin-Huxley denklemleri geçirgenliklere renkli gürültü terimleri ekleyerek genişletilmiştir (Güler, 2013)
Bu tezde, yukarıdaki model renklendirilmiş stokastik Hodgkin-Huxley denklemleri kullanılarak varyasyon katsayısı istatistiği incelenmiştir. Renkli gürültü terimlerinin mikroskopik benzeşim sonuçlarıyla uyumu arttırdığı gözlenmiştir.
Anahtar Kelimeler: Renkli Gürültü, Kanal Gürültüsü, Stokastik Iyon Kanalları, Küçük Boyutlu Zar, Stokastik Hodgkin-Huxley Denklemleri.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Stochastic Systems
Colored Noise, Channel Noise, Stochastic Ion Channel, Small Size Membrane, Stochastic Hodgkin-Huxley Equations
An Investigation of the Coefficient of Variation Using the Colored Stochastic Hodgkin-Huxley Equations
Thesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1863/3/KakoNajdavan.pdf.txt
File
MD5
1244bc15afc99d7c97ccb3484583f2c2
62081
text/plain
KakoNajdavan.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1863/1/KakoNajdavan.pdf
File
MD5
948f51ab0f8d50f017ebe0c892c37f2e
1224342
application/pdf
KakoNajdavan.pdf
oai:i-rep.emu.edu.tr:11129/18652015-11-19T00:00:33Zhdl_11129_11
EMU I-REP
author
Abdulrahman, Abdullah Ahmed
2015-11-18T11:28:45Z
2015-11-18T11:28:45Z
2013-06
Abdulrahman, Abdullah Ahmed. (2013). Performance Analysis and Comparison of Ad Hoc Routing Protocols AODV and OLSR on Video Conferencing using OPNET Simulator. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1865
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assist. Prof. Dr. Gürcü Öz.
ABSTRACT: The use of devices with wireless technologies such as Laptops and mobile phones are very popular. These devices influence the use of wireless networks such as ad hoc networks. Mobile ad hoc network (MANET) is a group of devices that are connected to each other by wireless links without any centralized controlling or infrastructure. Nodes (devices) of this network are changing their locations, and also the number of nodes may change during the time. Therefore, the topology type of this network is known as dynamic. Nodes in a dynamic topology communicate with each other using routing protocols. Routing protocols are responsible for finding a path between nodes. These protocols have a significant role for the total performance of the ad hoc networks. Routing protocols of ad hoc networks are divided into the following; proactive, reactive and hybrid routing protocols. Different types of routing protocols for ad hoc networks were improved by network designers and researchers to enhance the performance of ad hoc networks by finding the shortest and efficient route establishment between two nodes for message delivery. To evaluate and compare the performance of routing protocols, a number of performance metrics are used. Each of these methods has its own properties and is suitable for a specific application type. In this study, two well-known ad hoc routing protocols, Ad hoc On-demand Distance Vector (AODV) and Optimized Link State Routing (OLSR), were analysed and compared according to their performance using a video conference application. Interactive video conferencing was chosen as an application in this study because of the increasing popularity of multimedia and real time applications by the users of ad hoc networks recently. Routing protocols are analysed with respect to the following metrics; number of hops per route, route discovery time, routing traffic sent and routing traffic received. For comparison among the mentioned protocols, metrics were used that are important for video conference applications, namely which are packet delay variation, packet end-to-end delay and normalized routing load. OPNET simulator version 17.1 is used to model and simulate ad hoc networks. The results of experimental simulations show that OLSR has better performance in packet delay variation. With OLSR protocol, the time that is required to transfer a packet from source to destination is less than the time taken by AODV. AODV has less (better) normalized routing load than OLSR in high density networks. In low density network, AODV is again better when a few nodes are communicating. On the other hand, Normalized routing load of OLSR is getting down compared with AODV when the number of communicating nodes are increasing.
Keywords: Ad hoc networks, routing protocols, AODV, OLSR, simulation, performance metrics, OPNET simulator.
…………………………………………………………………………………………………………………………
ÖZ: Kablosuz teknolojilerin kullanıldığı laptop ve cep telefonu gibi cihazlar gününüzde popüler hale gelmiştir. Bu tür cihazlar özel amaca yönelik (ad hoc) ağlar gibi kablosuz ağların kullanımını da etkilemektedir. Mobil özel amaca yönelik ağ (MANET), herhengi bir merkezi kontrol ve altyapı almaksızın birbirine bağlı bir grup cihazdan oluşur. Bu ağın düğümleri (cihazlar) konumları değiştirebileceği gibi, düğün sayısı da zamanla değişebilir. Bu nedenle, bu ağın dinamik bir topolojisi vardır. Bu dinamik topolojideki düğümler, yönlendirme protokollerini kullanarak birbirleriyle iletişim kurarlar. Yönlendirme protokolleri düğümler arasında yol bulmada kullanılır ve özel amaca yönelik ağların performansında önemli bir role sahiptirler. Özel amanca yönelik ağlarda kullanılan yönlerdirme protokolleri, proaktif, reaktif ve karma olmak üzere üç katagoriye ayrılır. Mesaj iletiminde, ad hoc network performansını artırmak amacıyla, iki düğüm arasınde en kısa ve etkili yolun kurulmasında kullanılan farklı tipteki yönlendirme protokolleri, ağ tasarımcıları ve araştırmacılar tarafından iyileştirilmiştir. Yönlendirme protokollerinin performanslarını değerlendirme ve karşılaştırmada kullanılan performans ölçümlerinin her birinin kendi özellikleri ve kullanıldığı belirli uygulama alanları vardır.
Bu tezde, iki iyi bilinen yönlendirme prototolü, Ad hoc On-demand Distance Vektör (AODV) ve Optimized Link State Routing (OLSR), video konferans uygulaması ile kullanılmış ve performans karşılaştırması yapılmıştır. Son zamanlarda, ad hoc ağ kullanıcıları tarafından multimedya ve gerçek zamanlı uygulamaların kullanımının artması nedeniyle, bu tezde interaktif video konferansı uygulaması seçilmiştir. Seçilen protokoller her yoldaki sekme sayısı (number of hops per route), yol keşif zamanı (route discovery time), gönderilen yönlendirme trafiği (routing traffic sent) ve alınan yönlendirme trafiği (routing traffic received) performas ölçütleri kullanılarak analiz edilmiştir. Protokoller arasında karşılaştırma yapmak için, video konferans uygulamasında önemli olan, paket gecikme değişimi (packet delay variation), paketlerin uçtan uca gecikmesi (packet end to end delay) ve normalize edilmiş yönlendirme yükü (normalized routing load) ölçütleri kullanılmıştır. OPNET simulator versiyon 17.1 ad hoc ağlarının modellenmesi ve simulasyonu için kullanılmıştır.
Deneysel simulasyon sonuçları, OLSR protokolünün paket gecikmesi değişimi performansının daha iyi olduğunu göstermiştir. OLSR protokolünün, kaynaktan hedefe olan paket iletim süresinin AODV protokolünden daha az olduğu tespit edilmiştir. Diğer yandan, yüksek yoğunluklu ağlarda, AODV’nin normalize edilmiş yönlendirme yükü, yüksek ve düşük yoğunluktaki ağlarda OLSR’a göre daha iyidir. Ayni zamanda, OLSR kullanılırken iletişim kuran düğüm sayısı arttığı zaman, normalize yönlendirme yükünde, AODV ile karşılaştırıldığında, azalma görülmektedir.
Anahtar kelimeler: Özel amaca yönelik ağlar, yönlendirme protokolleri, AODV, OLSR, simulasyon, performans ölçütleri, OPNET simulatörü.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Ad hoc networks (Computer networks)
Internet videoconferencing
Ad Hoc Networks, Routing Protocols, AODV, OLSR, Simulation, Performance Metrics, OPNET Simulator
Performance Analysis and Comparison of Ad Hoc Routing Protocols AODV and OLSR on Video Conferencing using OPNET Simulator
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1865/3/AbdulrahmanAhmed.pdf.txt
File
MD5
31d7e48a9e664b9283d514aebec8b137
106587
text/plain
AbdulrahmanAhmed.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1865/1/AbdulrahmanAhmed.pdf
File
MD5
def338791a4de6d60ac5ab1d88a68c78
2422770
application/pdf
AbdulrahmanAhmed.pdf
oai:i-rep.emu.edu.tr:11129/18772015-11-21T00:00:31Zhdl_11129_11
EMU I-REP
author
Mahmod, Abdullah S.
2015-11-20T08:52:01Z
2015-11-20T08:52:01Z
2012-09
Mahmod, Abdullah S. (2012). Design and Implementation of a Virtual Smart Board. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1877
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assoc. Prof. Dr. Mohammed Salamah.
ABSTRACT: The Virtual Smart Board implementation is an issue of artificial intelligence to implement most of the functions of the real Smart Board. In this study the functions implemented are mouse actions (left & right click). These actions depend on the hand’s position compared with the site of view and the gesture of the hand. Hand tracking and gesture recognition are implemented in three different approaches. The first approach depends on a single camera where the hand is tracked in two dimensional space using a neural network and hand gesture recognition by another network. The second approach depends on two cameras which create a three dimensional space in order to store the position of the view surface and compare the position of skin spots with it. The third approach depends on infrared sensor to detect the infrared LED marker fixed on a glove with switches and a transmitter in order to interact with human action.
Keywords: Smart Board, Skin Detection, Stereo Vision.
…………………………………………………………………………………………………………………………
ÖZ: Sanal Akıllı Tahta uygulaması gerçek Akıllı Tahta’nın içerdiği fonksiyon ve özelliklerin birçoğunu uygulamayı kapsar. Bu araştırmada uygulanan fonksiyonlar fare hareketleridir (sağ ve sol tuşlar). Bu tür hareketler izlenen sayfa ve el hareketiyle oluşan elin pozisyonuna bağlı olmaktadır. El takibi ve hareketi tanımlanması üç farklı yaklaşımla uygulanmaktadır. Birinci yaklaşım el takibini iki boyutlu olarak sinir ağı kullanarak ve el hareketlerini ise farklı bir ağ kullanarak tanımlayan bir adet kameraya bağlıdır. İkinci yaklaşım ise görünüş pozisyonunu kaydedip bununla deri noktalarını karşılaştıran üç boyutlu alan yaratan iki kamerayla desteklenmektedir. Üçüncü yaklaşım insan hareketleriyle etkileşime geçmek amacıyla bir eldivenin üzerine monte edilmiş fiş ve verici cihazlarla kızılötesi LED işaretleyicisini tanımlayan kızılötesi bir alıcıya bağlı olmaktadır.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Image Processing - Pattern Recognition - Smart Boards
Smart Board Skin Detection Stereo Vision
Design and Implementation of a Virtual Smart Board
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1877/3/Mahmod.pdf.txt
File
MD5
68d42b99fcb57e4d0a18ddc71216a17d
88708
text/plain
Mahmod.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1877/1/Mahmod.pdf
File
MD5
47ef51823c61cb252fec7977fb6add42
2143641
application/pdf
Mahmod.pdf
oai:i-rep.emu.edu.tr:11129/18822015-11-21T00:00:28Zhdl_11129_11
EMU I-REP
author
Kazemirazi, Seyedreza
2015-11-20T11:37:16Z
2015-11-20T11:37:16Z
2013-07
Kazemirazi, Seyedreza. (2013). Multi-objective Artificial Bee Colony for Multi-objective Quadratic Assignment Problem. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1882
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Assist. Prof. Dr. Ahmet Ünveren.
ABSTRACT: Optimization problems are interesting applications in engineering and they are mostly interdisciplinary in nature. This is due to their applications to real life problems. In some real life problems one objective function should be optimized and the aim is detecting the best solution from all possible solutions. These problems are known as Single- objective Optimization Problems (SO). In some other real life problems there is more than one objective function so called Multi-objective Optimization (MO) Problems. In MO Problems the objectives are mostly contradicting with each other. Hence, the aim is finding a class of fittest solutions regarding to all objective functions. Solutions to MO Problems appear in the form of a Pareto-front. The Quadratic Assignment Problem (QAP) is to allocate a set of facilities to a set of locations. There are two issues to consider in QAP. The first is the interaction between facilities which is indicated with a matrix called a flow matrix and the second is the distance between facilities indicated by a distance matrix. There is a new QAP model so called multi-objective Quadratic Assignment Problem (mQAP). In mQAP there are multiple flow matrices but still only one distance matrix. The desired goal of QAP is to assign the facilities to the locations so that, the summation of products between facilities becomes minimal. It follows that, the QAP is a Single-objective Optimization (SO) Problem and the mQAP is a Multi-objective Optimization (MO) Problem. The Artificial Bee Colony (ABC) Algorithm is inspired from honey bees. The ABC is an algorithm basically created to solve the SO Problems. It is a collection of family agents of honey bees that work together to get the job done. There are three kinds of bees and each is responsible for a different job. In this thesis ABC and MOABC have been used for the solution of QAP and mQAP respectively. ABC and MOABC are modified for the solution of QAP and mQAP by using some different crossover and mutation techniques with Tabu Search method. The performance of different updating methods on ABC and MOABC Algorithms is analyzed.
Keywords: Single-objective Optimization (SO), Multi-objective Optimization (MO), Artificial Bee Colony Optimization (ABC), Quadratic Assignment Problem (QAP).
…………………………………………………………………………………………………………………………
ÖZ: En iyileme problemleri mühendislikte ilginç uygulamalar olmalarına rağmen, doğal olarak farklı disiplinler arası kullanılan problemlerdir. Bunun sebeplerinden biri gerçek yaşam problemlerine uygulanmasıdır. Bazı gerçek yaşam problemlerinde sadece bir amaç fonksiyonu en iyilenmek istenmektedir. Buradaki amaç mevcut problem çözümlerinden en iyisine ulaşmaktır. Bu tip problemlere tek-amaçlı (TA) en iyileme problemleri denilmektedir. Bazı gerçek yaşam problemleri birden çok amaçlı olabilmektedir bunlara çok-amaçlı (ÇA) en iyileme problemleri denilmektedir. ÇA problemlerinde hedefleri çoğunlukla birbiriyle çelişmektedir. Bundan dolayı tüm amaç fonksiyonlarını kullanarak tek çözüm yerine en iyi olan çözümlerden oluşan bir çözüm sınıfı oluşturmaktadır. Bu sınıfa pareto-ön denmektedir. Karesel atama problemi (KAP) bir dizi aracı bir dizi lokasyona verilen lokasyonlar arası uzaklıklar ve araçlar arası akış bilgileri kullanılarak atama yapma problemi olarak tanımlanır. Ayrıca çoklu karesel atama problemlerinde mevcut olup birden çok akış bilgisi kullanılarak yapılan KAP problemleridir. Yapay arı kolonisi (YAK) algoritması gerçek bal arılarından ilham alınarak tek-amaçlı problemleri çözmek için tasarlanmışlardır. YAK algoritması popülasyon tabanlı bir arama algoritması olup sürü zekasına dayalı metasezgisel yöntemlerden birisidir. Algoritma gerçek bal arılarının yiyecek arama davranışlarını modellemeye dayanmaktadır. Bu çalışmada YAK ve MYAK, KAP ve MYAK algoritlamarında KAP ve MKAP problemlerinin çözümü için farklı çaprazlama ve mutasyon teknikleri ile birlikte tabu arama algoritması kullanarak performansları incelenmiştir. Anahtar Kelimeler: Tek-amaçlı en iyileme, çok-amaçlı en iyileme, yapay arı kolonisi en iyileme, karasal atama problemi.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Quadratic assignment problem
Quadratic programming
Single-objective Optimization (SO), Multi-objective Optimization (MO), Artificial Bee Colony Optimization (ABC), Quadratic Assignment Problem (QAP)
Multi-objective Artificial Bee Colony for Multi-objective Quadratic Assignment Problem
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1882/3/Kazemirazi.pdf.txt
File
MD5
0c007b08e8ee5f46ad47578083a45de9
102133
text/plain
Kazemirazi.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1882/1/Kazemirazi.pdf
File
MD5
847788492279765a31622cb1f7e14025
2184808
application/pdf
Kazemirazi.pdf
oai:i-rep.emu.edu.tr:11129/18842015-11-21T00:00:30Zhdl_11129_11
EMU I-REP
author
Abdulmonim, Mohamed N.
2015-11-20T11:52:41Z
2015-11-20T11:52:41Z
2013-04
Abdulmonim, Mohamed N. (2013). An Investigation into the Dissipative Stochastic Mechanics Based Neuron Model under input Current Pulses. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/1884
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Marifi Güler.
ABSTRACT: It has been recently argued and experimentally shown that ion channel noise in neurons can have profound effects on the neuron's dynamical behavior. Most profoundly, ion channel noise was seen to be able to cause spontaneous firing and stochastic resonance.
A physical approach for the description of neuronal dynamics under the influence of ion channel noise has been proposed through the use of dissipative stochastic mechanics by Güler in a series of papers (Güler, 2006, 2007, 2008). He consequently introduced a computational neuron model incorporating channel noise for a special membrane that gives the Rose-Hindmarsh model of the neuron in the deterministic limit. The most distinctive feature of the dissipative stochastic mechanics based model is the presence of so-called the renormalization terms therein. More recently, the model was generalized to the Hodgkin-Huxley type of membranes (Güler, 2011, 2013). In this thesis, the dissipative stochastic mechanics based neuron model was studied when the input current to the neuron is an input pulse. Statistics of firing efficiency, latency, and jitter were examined for various stimulus pulses. In particular, the role played by the presence of the renormalization terms was focused on in the examination.
Keywords: Ion Channel Noise, Stochastic Ion Channels, Neuronal Dynamic, Rose-Hindmarsh Model.
…………………………………………………………………………………………………………………………
ÖZ: Gerek deneysel, gerekse kuramsal ve benzeşim çalışmaları iyon kanal gürültüsünün nöron dinamiği üzerinde hayati etki yapabildiği kanıtlanmıştır. Bu kapsamda, kendi kendine ateşleme ve stokastik rezonans en önemli bulgulardır.
İyon kanal gürültüsü altındaki nöron dinamiği, fiziksel bir yaklaşım olan disipatif stokastik mekanik kullanarak çalışılmış ve modellenmiştir (Güler, 2006, 2007, 2008). Sonsuz zar büyüklüğü limitinde Rose-Hindmarsh modeline dönüşen bu disipatif stokastik mekaniğe dayalı modelin en önemli özelliği renormalizasyon terimleri içermesidir. Model, daha sonra, Hodgkin-Huxley tipi zarlara uyarlanmıştır (Güler, 2011, 2013).
Bu tezde, Rose-Hindmarsh tipi zarlarda iyon kanal gürültüsü için geliştirilmiş olan yukarıdaki model, basamaklı girdi akımları kullanılarak çalışılmıştır. Ateşleme etkinliği, gecikme ve jitter istatistikleri elde edilmiş ve renormalizasyon terimlerinin rolü incelenmiştir.
Anahtar Kelimeler: İyon kanal gürültüsü, Stokastik iyon kanalları, Nöronal Dinamik, Rose-Hindmarsh Modeli.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
Computer Engineering
Stochastic systems
Speech processing systems
Ion Channel Noise, Stochastic Ion Channels, Neuronal Dynamic, Rose-Hindmarsh Model
An Investigation into the Dissipative Stochastic Mechanics Based Neuron Model under input Current Pulses
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1884/3/Abdulmonim.pdf.txt
File
MD5
c288ffa38b2cbf1fa0baee30f6f9c77f
52721
text/plain
Abdulmonim.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1884/1/Abdulmonim.pdf
File
MD5
875e0a1c4cc51dce7b9528c3030adae9
1730102
application/pdf
Abdulmonim.pdf
oai:i-rep.emu.edu.tr:11129/18872015-12-01T00:00:20Zhdl_11129_382
EMU I-REP
author
Unveren, Ahmet
author
Acan, Adnan
2015-11-30T12:34:07Z
2015-11-30T12:34:07Z
2005-09
"Evolutionary Multiobjective Optimization with a Segment-Based External Memory Support for the Multiobjective Quadratic Assignment Problem", Adnan Acan & Ahmet Unveren, 2005 IEEE Congress on Evolutionary Computation, 2-5 September 2005, Edinburg. (Presented by A. Ünveren)
http://hdl.handle.net/11129/1887
Eastern Mediterranean University
en
2005 IEEE Congress on Evolutionary Computation
Optimization
Evolutionary Multiobjective Optimization with a Segment-Based External Memory Support for the Multiobjective Quadratic Assignment Problem
Presentation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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1887/3/acan05.pdf.txt
File
MD5
bb9510e14f7dd1347b00a7f0ac347631
26193
text/plain
acan05.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F1887/1/acan05.pdf
File
MD5
3cb83ae4ecaf34cd9d52aaba550f150d
253924
application/pdf
acan05.pdf
oai:i-rep.emu.edu.tr:11129/18882016-01-08T03:41:26Zhdl_11129_814
EMU I-REP
author
Acan, Adnan
author
Ünveren, Ahmet
2015-12-01T13:04:15Z
2015-12-01T13:04:15Z
2014
"A two-stage memory powered Great Deluge algorithm for global optimization", Adnan Acan and Ahmet Ünveren, Soft Computing, DOI 10.1007/s00500-014-1423-5, Springer-Verlag Berlin Heidelberg 2014
Print ISSN: 1432-7643
Online ISSN: 1433-7479
http://hdl.handle.net/11129/1888
http://dx.doi.org/10.1007/s00500-014-1423-5
Due to copyright restrictions, the access to the publisher version (published version) of this article is only available via subscription. You may click URI (with DOI: 10.1007/s00500-014-1423-5) and have access to the Publisher Version of this article through the publisher web site or online databases, if your Library or institution has subscription to the related journal or publication.
A two-stage memory architecture and search operators exploiting the accumulated experience in memory are maintained within the framework of a Great DeLuge algorithm for real-valued global optimization. The level-based acceptance criterion of the Great DeLuge algorithm is applied for each best solution extracted in a particular iteration. The use of memory-based search supported by effective move operators results in a powerful optimization algorithm. The success of the presented approach is illustrated using three sets of well-known benchmark functions including problems of varying sizes and difficulties. Performance of the presented approach is evaluated and in comparison to well-known algorithms and their published results. Except for a few large-scale optimization problems, experimental evaluations demonstrated that the presented approach performs at least as good as its competitors.
en
Springer Berlin Heidelberg
Computational Intelligence
Artificial Intelligence (incl. Robotics)
Mathematical Logic and Foundations
Control, Robotics, Mechatronics
Metaheuristics
Great Deluge algorithm
Memory-based search
Global optimization
A two-stage memory powered Great Deluge algorithm for global optimization
Article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:i-rep.emu.edu.tr:11129/20252016-01-21T00:00:34Zhdl_11129_11
EMU I-REP
author
Far, Mehran Sahandi
2016-01-20T12:42:23Z
2016-01-20T12:42:23Z
2013-07
Far, Mehran Sahandi. (2013). Functional Magnetic Resonance Image (FMRI) Based Brain Activity Classification. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/2025
Master of Science in Computer Engineering. Thesis (M.S.) - Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2013. Supervisor: Prof. Dr. Hakan Altınçay.
Functional Magnetic Resonance Imaging (FMRI) is a powerful tool to predict the current activity in the human brain. With the help of machine learning tools, the cognitive function of the human brain can be automatically classified into two or more states by analyzing the FMRI images. In this thesis, the main goal is to design an automated system to predict whether a given subject is viewing a picture or a sentence. A dataset of six subjects is considered for this purpose. Two classification schemes, namely support vector machines (SVM) and nearest neighbor classifier (NN) are used. Due to the high dimensionality of the FMRI data, feature selection is generally considered. In order to reduce the feature dimensionality, four reduction methods, namely region of interest (ROI), N-most active voxels, ROI average and N-most active voxels within ROI are studied. Both subject dependent and subject independent experiments are conducted where the former studies the categorization problem separately for each subject and the latter does not use the tested subject during training.
Experimental results have shown that SVM provides better scores compared to NN approach and selecting N-most active voxels within the ROI provided the best scores, verifying the importance of applying feature selection in this domain.…………………………………………………………………………… ÖZ: Fonksiyonel Manyetik Rezonans Görüntüleme (FMRG) insan beyninde şu andaki aktiviteyi tahmin etmek için güçlü bir araçtır. Makineye dayalı öğrenme araçları yardımıyla insan beyninin bilişsel fonksiyonu iki veya daha fazla durumdan birine FMRG görüntüleri incelenerek otomatik olarak sınıfladırılabilmektedir. Bu tezde, esas amaç bir kişinin bir resime veya bir cümleye bakmakta olduğunu ayırt edecek otomatik bir sistem tasarlamaktır. Bu amaçla altı kişi içeren bir verikümesi kullanılmıştır. Destek vectör makinaları (DVM) ve enyakın komşu (EK) olmak üzere iki sınıflandırıcı kullanılmıştır. FMGR verisinin yüksek boyutlu olmasından dolayı genellikle öznitelik seçimi uygulanmaktadır. Öznitelik boyunun azaltılması için İlgi Alanı (İA), N-En aktif voxel, İA ortalama ve İA içerisindeki N-En aktif voxel olmak üzere dört farklı yöntem denenmiştir. Kişiye bağlı ve kişiden bağımsız deneyler yapılmış olup, ilkinde sınıflandırma promlemi her kişi için ayrı olarak çalışılmış, ikincisinde ise test edilen kişi eğitme verisi içinde yer almamıştır.
Deneysel sonuçlar DVM yaklaşımının EK'ya göre daha başarılı sonuçlar verdiğini, İA içerisindeki N-En aktif voxel seçiminin de eniyi başarımı sağladığını göstermiş ve bu alanda öznitelik seçmenin önemini onaylamıştır.
en
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ).
Computer Engineering
Brain - Magnetic resonance imaging - Cognitive neuroscience
Magnetic Resonance Imaging - Brain Mapping
Biomedical Engineering
Medical instruments and apparatus
Functional Magnetic Resonance Imaging, Cognitive State Decoding, Feature Selection, Support Vector Machines, Nearest Neighbor Classifier
Functional Magnetic Resonance Image (FMRI) Based Brain Activity Classification
Thesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F2025/3/FarMehranSahandi.pdf.txt
File
MD5
58687a750ff417f1fde435af6ac8a95f
79073
text/plain
FarMehranSahandi.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F2025/1/FarMehranSahandi.pdf
File
MD5
2f28016cb7da9ae5a8a64fc94c0e714d
1493746
application/pdf
FarMehranSahandi.pdf
oai:i-rep.emu.edu.tr:11129/23272016-03-23T00:00:48Zhdl_11129_11
EMU I-REP
advisor
Rıza, Mustafa
author
Abdullah, Alharith Abdulkareem
2016-03-22T19:44:15Z
2016-03-22T19:44:15Z
2015-07
2015
Abdullah, Alharith Abdulkareem. (2015). Modified Quantum Three Pass Protocol Based on Hybrid Cryptosystem . Thesis (Ph.D.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/2327
Doctor of Philosophy in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Mustafa Rıza.
In this thesis we propose an enhancement to the Quantum Three-Pass Protocol (QTPP) by adding quantum authentication. After detailed analysis of all possible classical as well as quantum attack methods of the original Quantum Three-Pass Protocol, we identified, that the original Quantum Three-Pass Protocol is only vulnerable against the man-in-the-middle attack. By adding authentication and an agent called the Quantum Distribution Centre, the man-in-the-middle attack is eliminated. All communication between the parties is established over quantum channels with non-orthogonal superposition states that are subject to the no-cloning theorem. The security analysis shows that the modified Quantum Three Pass Protocol is unconditionally secure in the sense that the key is random, the protocol is authenticated, and all communication channels are subject to quantum physics. Furthermore, the bit error rate as a function of the noise on the channel is discussed.Using the enhanced QTPP a complete encryption process is designed exploiting also classical algorithms.
ÖZ:
Bu tezde kuantum kimlik doğrulama yöntemini ekli Kuantum Üç Geçişli Protokolü (QTPP) öneriyoruz. Tüm olası klasik ve kuantum saldırı yöntemlerini Kuantum Üç Geçişli Protokolünün analizinde, sadece araya giren adam saldırısına (man-in-the-middle attack) karşı saldırıya maruz kalabileceğini tespit edilmiştir. Kimlik doğrulama yönteimini ve bir Kuantum Dağıtım Merkezin ekleyerek araya giren adam saldırısını elimine edilebileceğini gösterilecektir. Taraflar arasındaki tüm iletişim kanalları süperpozisyon halinde olan bilgiler klonlamama teoremine tabi kuantum kanalları üzerinden kurulur. Güvenlik analizi, kimlik doğrulamalı modifiye Kuantum Üç Geçişli Protokolünün, şifresi rastgele olması, protokolün doğrulanmış olması, ve tüm iletişim kanallarının kuantum fiziğine tabii olması halinde, koşulsuz güvenilirdir. Bunun dışında iletişim kanalının üzerindeki gürültü ile bit hata oranı arasındaki ilişki tartışılmıştır. Gelişmiş QTPP klasik algoritmalarla birlikte kullanarak komple bir şifreleme işlemi tasarlanmıştır.
eng
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
info:eu-repo/semantics/openAccess
Computer Engineering
Quantum computers - Cryptography
Quantum Computation
Quantum Cryptography
Quantum Encryption Algorithm
Quantum Three-Pass protocol
Authentication
BB84
Modified Quantum Three Pass Protocol Based on Hybrid Cryptosystem
doctoralThesis
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRToNCkJ5IHNpZ25pbmcgYW5kIHN1
Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3IgKHMpIG9yIGNvcHlyaWdodCBv
d25lcikgZ3JhbnRzIHRvIEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSBub24t
ZXhjbHVzaXZlIHJpZ2h0IHRvIHJlcHJvZHVjZSwgdHJhbnNsYXRlIChhcyBkZWZpbmVkIGJlbG93
KSwgYW5kL29yIGRpc3RyaWJ1dGUgeW91ciBzdWJtaXNzaW9uIChpbmNsdWRpbmcgdGhlIGFic3Ry
YWN0KSB3b3JsZHdpZGUgaW4gcHJpbnQgYW5kIGVsZWN0cm9uaWMgZm9ybWF0IGFuZCBpbiBhbnkg
bWVkaXVtLCBpbmNsdWRpbmcgYnV0IG5vdCBsaW1pdGVkIHRvIGF1ZGlvIG9yIHZpZGVvLg0KWW91
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5LCB3aXRob3V0
IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlIHN1Ym1pc3Npb24gdG8gYW55IG1l
ZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4NCllvdSBhbHNv
IGFncmVlIHRoYXQgRWFzdGVybiBNZWRpdGVycmFuZWFuIFVuaXZlcnNpdHkgbWF5IGtlZXAgbW9y
ZSB0aGFuIG9uZSBjb3B5IG9mIHRoaXMgc3VibWlzc2lvbiBmb3IgcHVycG9zZXMgb2Ygc2VjdXJp
dHksIGJhY2stdXAgYW5kIHByZXNlcnZhdGlvbi4NCllvdSByZXByZXNlbnQgdGhhdCB0aGUgc3Vi
bWlzc2lvbiBpcyB5b3VyIG9yaWdpbmFsIHdvcmssIGFuZCB0aGF0IHlvdSBoYXZlIHRoZSByaWdo
dCB0byBncmFudCB0aGUgcmlnaHRzIGNvbnRhaW5lZCBpbiB0aGlzIGxpY2Vuc2UuIFlvdSBhbHNv
IHJlcHJlc2VudCB0aGF0IHlvdXIgc3VibWlzc2lvbiBkb2VzIG5vdCwgdG8gdGhlIGJlc3Qgb2Yg
eW91ciBrbm93bGVkZ2UsIGluZnJpbmdlIHVwb24gYW55b25l4oCZcyBjb3B5cmlnaHQuICAgICAg
DQpJZiB0aGUgc3VibWlzc2lvbiBjb250YWlucyBtYXRlcmlhbCBmb3Igd2hpY2ggeW91IGRvIG5v
dCBob2xkIGNvcHlyaWdodCwgeW91IHJlcHJlc2VudCB0aGF0IHlvdSBoYXZlIG9idGFpbmVkIHRo
ZSB1bnJlc3RyaWN0ZWQgcGVybWlzc2lvbiBvZiB0aGUgY29weXJpZ2h0IG93bmVyIHRvIGdyYW50
IEVhc3Rlcm4gTWVkaXRlcnJhbmVhbiBVbml2ZXJzaXR5IHRoZSByaWdodHMgcmVxdWlyZWQgYnkg
dGhpcyBsaWNlbnNlLCBhbmQgdGhhdCBzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlz
IGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkIHdpdGhpbiB0aGUgdGV4dCBvciBj
b250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLiANCklGIFRIRSBTVUJNSVNTSU9OIElTIEJBU0VEIFVQ
T04gV09SSyBUSEFUIEhBUyBCRUVOIFNQT05TT1JFRCBPUiBTVVBQT1JURUQgQlkgQU4gQUdFTkNZ
IE9SIE9SR0FOSVpBVElPTiBPVEhFUiBUSEFOIEVBU1RFUk4gTUVESVRFUlJBTkVBTiBVTklWRVJT
SVRZLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUgRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBS
RVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSCBDT05UUkFDVCBPUiBB
R1JFRU1FTlQuDQpFYXN0ZXJuIE1lZGl0ZXJyYW5lYW4gVW5pdmVyc2l0eSB3aWxsIGNsZWFybHkg
aWRlbnRpZnkgeW91ciBuYW1lKHMpIGFzIHRoZSBhdXRob3Iocykgb3Igb3duZXIocykgb2YgdGhl
IHN1Ym1pc3Npb24sIGFuZCB3aWxsIG5vdCBtYWtlIGFueSBhbHRlcmF0aW9uLCBvdGhlciB0aGFu
IGFzIGFsbG93ZWQgYnkgdGhpcyBsaWNlbnNlLCB0byB5b3VyIHN1Ym1pc3Npb24u
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F2327/3/abdullahalharith.pdf.txt
File
MD5
b845b0e37d572a347be05b780825a7cc
129584
text/plain
abdullahalharith.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F2327/1/abdullahalharith.pdf
File
MD5
3b67a6c25db6fd8091fe077699365d8b
1539457
application/pdf
abdullahalharith.pdf
oai:i-rep.emu.edu.tr:11129/27292016-06-13T23:00:30Zhdl_11129_11
EMU I-REP
advisor
Bodur, Mehmet
author
Badr, Zuhir Younes A.
2016-06-13T04:53:04Z
2016-06-13T04:53:04Z
2015-07
2015
Badr Zuhir Younes A.. (2015).Visualization of 3D Object on Planar Screen Using View Angle. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/2729
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assist. Prof. Dr. Mehmet Bodur.
The aim of this thesis is to develop and demonstrate a practical method to support 3D
perception of stationary objects in a virtual space through the motion of a two
dimensional projection image. The structure of a human eye is naturally equipped by
some tools to perceive the depth from several hints such as the size of image
compared to the its expected size, and the sharpness of the image at different focal
lengths of the lens, the parallax difference in the images from the left and right eyes,
and, if the image moves, by comparing the images at different view angles.
In this thesis, the movement of the observer is detected by a software using the video
camera frames, and the expected 2D projection of the virtual objects is transformed
for the detected position of the observer to support a depth feeling of the observer.
The developed program is coded in MATLAB, to determine the position of a red
marker that is attached to the head of the observer, to compose the transformation
matrix that converts 3D corner points of the virtual objects to expected perspective
projection for the determined view-angle, and to draw the projection on the screen
for the observation. The code is written in a flexible form to work with any PC with a
web-cam, and graphical screen. The implemented system is tested successfully
comparing the views of a set of virtual geometric objects on a platform with respect
to the view of similar objects physically on a test platform.
Keywords: Depth perception, Colour detection and tracking, 3D-visualization.
ÖZ: Bu tezin amacı sanal uzaydaki duran nesnelerin 3D algısını iki boyutlu
izdüşümlerindeki hareket aracılığıyla destekleyen bir yöntem geliştirmek ve
göstermektir. Insan gözü doğal olarak görüntünün büyüklüğüyle beklenen
büyüklüğünü karşılaştırmak, görüntünün değişik odak derinliklerindeki keskinlik ve
bulanıklığı, sağ ve sol göz görüntülerindeki fark, ve görüntü hareket ederse değişik
gözlem açılarından görünüşünü analiz gibi derinlik algılamaya elverişli bir takım
araçlarla donatılmıştır. Bu tezde, gözlemcinin hareketleri bir yazılım sayesinde bir video kameranın yolladığı çerçevelerden algılanarak sanal nesnelerin belirlenen gözlemci yerine karşılık beklenen 2D izdüşümlerine dönüştürülerek, bu yolla, gözlemcinin nesneler hakkında bir derinlik duygusu oluşturulması sağlanmaktadır. MATLAB’da
kodlanmak üzere geliştirilen program gözlemcinin başına iliştirilmiş kırmızı bir
işaretin yerini belirlemekte, ve gözlemcinin bakış açılarını tayin ederek sanal
nesnelerin 3D köşe noktalarının perspektif izdüşümü için gereken dönüştürme
matrisini hesaplayıp ekrana 2D izdüşümünü çizmektedir. Kod, video kamera ve
grafik ekran donanımlı herhangi bir PC de çalışacak esneklikte yazılmıştır.
Uygulanan sistem sanal geometrik nesnelerin görünümlerini benzer nesnelerin
fiziksel bir test platformundaki görüntüsüyle karşılaştırılarak başarıyla sınanmıştır.
Anahtar kelimeler: Derinlik algısı, Renk tespit ve izleme, Üç boyutlu-görüntüleme,
eng
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
info:eu-repo/semantics/openAccess
Computer Engineering
Three - dimensional imaging - Image processing
Image processing - Digital techniques
Visualization - Data processing
Depth perception
3D-visualization
Colour detection and tracking
Visualization of 3D Object on Planar Screen Using View Angle
masterThesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F2729/3/BadrZuhir+Badr+A..pdf.txt
File
MD5
592e3ae1e64e930d587f543a4d13cb22
62447
text/plain
BadrZuhir Badr A..pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F2729/1/BadrZuhir+Badr+A..pdf
File
MD5
b2a3363c984396d0650f4e55aa1f369d
776485
application/pdf
BadrZuhir Badr A..pdf
oai:i-rep.emu.edu.tr:11129/27312016-06-13T23:00:31Zhdl_11129_11
EMU I-REP
advisor
Ramadan, Omar (Supervisor)
advisor
Salamah, Muhammed (Co-Supervisor)
author
Enad, Saif Abdullah
2016-06-13T05:04:19Z
2016-06-13T05:04:19Z
2015-06
2015
Enad, Saif Abdullah. (2015). A Hardware-Oriented Hybrid TDOA/AOA Mobile Positioning Estimation Scheme. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/2731
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Co-Supervisor: Assoc. Prof. Dr. Muhammed Salamah, Supervisor: Prof. Dr. Omar Ramadan.
Location based services have fascinated many researchers and initiatives. One of the important characteristics of location based service is positioning technology. In view of a broader and more complex field like universal computing, position is the vital section. This work emphasizes on a new algorithm that can be used to estimate the position location of the target efficiently. Wireless LAN is one of the utmost prevalent schemes that are used for positioning for indoor locations and civic places. The angle of arrival and time difference of arrival are the primary position location techniques that are studied in this thesis and a novel based algorithm is developed by combining these two techniques. This new algorithm proposed is a low cost, high speed and high accuracy method. The new algorithm works in two cases ( , and the computational cost and error for each angle are approximately possess same amount. The proposed algorithm utilizes simple addition, subtraction and shift operators and it totally avoids trigonometric functions or complex calculation which makes speed higher for the algorithm. The total cost that is used in implementing the algorithm into FPGA is cost effective and it is superior when compared to angle of arrival and time difference of arrival techniques. The comparison with respect to cost and errors in estimating the location are done for the proposed algorithm is done. MATLAB 7 is the used for simulation and analysis of the proposed algorithm. The simulation results depict and demonstrate that the proposed algorithm is superior to angle of arrival and time difference of arrival methods. Keywords: Wireless communication, Signal processing, Time difference of arrival, Angle of arrival, Hybrid positioning.
ÖZ: Konum tabanlı hizmetler çoğu araştırmacıyı ve girişimciyi etkilemiştir. Konum tabanlı.hizmetlerin.önemli.özelliklerinden.biri.konumlandırma.teknolojisidir.Evrens.l hesaplama gibi daha karışık alanların geniş bakış açısından bakıldığında konum bölümü hayati önem taşımaktadır. Bu çalışma hedefin yer konumunu verimli bir şekilde ölçmek için kullanılan yeni algoritmada vurgulanmıştır. Kablosuz yerel alan ağı son derece yaygın olan, kapalı konumlar ve sivil yerler için konumlandırmada kullanılan şemalardan biridir. Bu tezde üzerinde çalışılan varış açısı ve varış zaman farkı, konum yerini belirleyen temel tekniklerdir. Bu teknikler birleştirilerek yeni bir algoritma geliştirilmiştir. Önerilen bu yeni algoritma düşük maliyete, yüksek hıza ve yüksek hassasiyete sahip bir yöntemdir. Bu yeni algoritma iki durumda çalışır ( , ve her bir açı için hesaplanan maliyet ve hata yaklaşık olarak aynı miktara sahiptir. Önerilen algoritma basit toplama, çıkarma ve kaydırma operatörleri kullanır ve algoritma için hızı yüksek yapan trigonometrik fonksiyonlardan ve karışık hesaplamalardan tamamen kaçınır. Algoritmayı APLD(Alan Programlanabilir Lcapi Dizini)‟nın içine uygulamak için uygun maliyet kullanıldı ve varış açısı ve varış zaman farkı teknikleri ile önerilen algoritma karşılaştırıldığı zaman önerilen algoritma üstün olmuştur. Konum ölçmek için yapılan maliyet ve hatalar ile ilgili karşılaştırma önerilen algoritma için yapılmıştır. Önerilen algoritmanın analiz ve simulasyonu için MATLAB 7 kullanılmıştır. Simulasyon sonuçları önerilen algoritmanın varış açısı ve varış zaman farkı yöntemlerinden üstün olduğunu betimliyor ve gösteriyor. Anahtar Kelimeler: Kablosuz iletişim, Sinyal işleme, varış zamanı farkı, geliş açısı, Hibrit konumlandırma DEDICATION.
eng
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
info:eu-repo/semantics/openAccess
Computer Engineering
Wireless Communication
Signal processing
Time difference of arrival
Angle of arrival
Hybrid positioning
A Hardware-Oriented Hybrid TDOA/AOA Mobile Positioning Estimation Scheme
masterThesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F2731/3/EnadSaif+Abdullah.pdf.txt
File
MD5
08a91a79bc07b43351f25cb6613ed886
116542
text/plain
EnadSaif Abdullah.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F2731/1/EnadSaif+Abdullah.pdf
File
MD5
f50bd84ea3603d94456dedec7b1fb217
1986159
application/pdf
EnadSaif Abdullah.pdf
oai:i-rep.emu.edu.tr:11129/28772016-08-18T23:00:41Zhdl_11129_11
EMU I-REP
advisor
Salamah, Muhammed
author
Samarji, Nivine Mahmoud
2016-08-18T11:35:34Z
2016-08-18T11:35:34Z
2015-07
2015
Samarji, Nivine Mahmoud. (2015). A Connectivity Preservation Scheme for Randomly Deployed Wireless Sensor Networks. Thesis (M.S.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
http://hdl.handle.net/11129/2877
Master of Science in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2015. Supervisor: Assoc. Prof. Dr. Muhammed Salamah.
A wireless sensor network (WSN) consists of spatially distributed low-power sensors
for the purpose of monitoring an area of interest such as battle field or environmental
conditions such as weather, earthquakes, pressure, etc. These sensor nodes monitor
the field, sense and process the monitored data, then deliver the processed data to the
sink in a multi-hop fashion. To achieve communication between nodes, network
connectivity should be maintained, which is not always the case especially when
sensor nodes are randomly deployed. This will result in the appearance of
unreachable nodes or isolated nodes. In most of these cases, network will be
partitioned and disconnected. Therefore, connectivity is an essential key factor for
determining network quality of service (QoS).
This thesis focuses on achieving high connectivity for randomly deployed wireless
sensors by referring to the concept of building a network virtual backbone approach.
Although the concept of connected dominating set (CDS) is used as a method to
achieve this purpose; however, this method has limitations in presence of isolated or
unreachable nodes. Therefore, this thesis contributes to the CDS approach by adding
few anchor nodes at calculated distance to gain high network connectivity.
Using MATLAB, extensive simulations have been carried out and the results showed
that connectivity has been gained by activating few anchor nodes or spare nodes to
random WSNs. Our algorithm had approximately twice the Fiedler value
enhancement of Random Addition algorithm.
Keywords: Wireless Sensor Networks, Network Connectivity, Anchor Nodes, QoS
ÖZ:
Kablosuz duyarga ağı (WSN) dağınık ve düşük güç sensörlerden oluşmaktadır. Bu
tür ağlar savaş alanı veya hava, deprem ve basınç gibi çevre koşullarının
izlenmesinde kullanılmatadır. Bu sensör düğümleri alan duygusu izler, ve izlenen
verileri işler, sonra da bir multi-hop metodla işlenmiş verileri belirli bir düğüm
istasyonuna iletir. Algılayıcı düğümleri rastgele dağıtıldığı göz önünde bulundurarak,
düğümler arasındaki iletişimi sağlamak için, ağ bağlantısı sağlam bir şekilde
tutulmalıdır. Ayrıca düğümleri rastgele dağıtıldığından dolayı, bazı düğümler ya da
izole edilmiş veya ulaşılamayan duruma gelir. Bu durumların çoğunda, ağ
bölümlenmiş ve kopmuş hale gelir. Bu nedenle, bağlantı, ağ hizmeti kalitesinin
(QoS) saptanması için önemli bir anahtar faktördür.
Bu tezde sanal ağ omurgası yaklaşımı kavramını kullanarak rastgele dağıtılan
kablosuz sensörler için yüksek bağlantı sağlanması üzerinde duruluyor. Bağlı
görünen set (CDS) kavramı bu amaca ulaşmak için bir yöntem olarak kullanılmasına
rağmen; bu yöntemde, izole edilmiş ya da ulaşılamaz düğüm mevcudiyetinde
sınırlamalar vardır. Bu nedenle, bu tez, yüksek ağ bağlantısı elde etmek için
hesaplanmış mesafeden birkaç çapa düğümler ekleyerek CDS yaklaşımına katkıda
bulunmaktadır.
MATLAB kullanarak, geniş simülasyonlar yapılmıştır ve sonuçlar birkaç çapa
düğümler ekleyerek yüksek bağlantı elde edildiğini göstermiştir. Bizim algoritma
Rastgele İlavesi Algoritmasının yaklaşık iki Fiedler değer artışı vardır.
Anahtar Kelimeler: Kablosuz Sensör Ağları, Ağ Bağlantısı, Çapa Düğümler, QoS
eng
Eastern Mediterranean University (EMU) - Doğu Akdeniz Üniversitesi (DAÜ)
info:eu-repo/semantics/openAccess
Computer Engineering
Sensor networks - Wireless communication systems
Wireless Sensor Networks
Network Connectivity
Anchor Nodes
QoS
A Connectivity Preservation Scheme for Randomly Deployed Wireless Sensor Networks
masterThesis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http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F2877/3/samarjinivine.pdf.txt
File
MD5
c35c4d8ce0090f06983bf2ff812a7ca0
90645
text/plain
samarjinivine.pdf.txt
URL
http://i-rep.emu.edu.tr:8080/xmlui/bitstream/11129%2F2877/1/samarjinivine.pdf
File
MD5
33b365b6850c4047f38dd2f7f93fcd00
1200934
application/pdf
samarjinivine.pdf
0001-01-01T00:00:00Z/9999-12-31T23:59:59Z/hdl_11129_10/mets/100