Browsing by Author "BOSTAN, Atila"
Now showing 1 - 18 of 18
Results Per Page
Sort Options
Item A SMART CLASSROOM APPLICATION: MONITORING AND REPORTING ATTENDANCE AUTOMATICALLY USING SMART DEVICES(International Journal of Scientific Research in Information Systems and Engineering, 2017-04-04) ŞENGÜL, Gökhan; KARAKAYA, Murat; BOSTAN, AtilaFor recording attendance in a classroom, generally instructors collect signatures of the attendees. Then, at the end of the semester, those signatures need to be counted and reported. This process causes waste of time and effort for both instructors and attendees. Besides this process is very error prone. Moreover, in crowded classes, there could be some misuses of this process. In this study, a smart classroom application is proposed and developed in order to monitor the attendance of the students in a classroom environment. In the design, a low-energy Bluetooth device is located at each classroom. Identification number (ID) of the low-energy Bluetooth device and the name/number of the classroom that the device is located are matched and stored in a central database. In addition to this information, the name of the courses given in that classroom and their time tables are also stored in the central database. Thus, in the database, the weekly course schedule of the classrooms is available. In addition to this central database infrastructure, a mobile application is developed that can run on both in mobile phones and smart watches. The users first install the application on their own smart devices. Whenever an attendee enters to a classroom, the smart device and its application interacts with the low-energy Bluetooth device. The student’s identification number (Student ID: SID), the identification number (ID) of the low-energy Bluetooth device located at the class, the day and time of the interaction are sent to the central database by the smart device. Using this information, the name of the attendee and the courses that he/she attended are matched using the SID of the attendee, the ID of the low-energy Bluetooth device, the day and time of the interaction. Those matching information are also stored in the central database. The records in the central database are used to create any automatic reports, i.e. the attendance status, the time and duration of the attendance, and the classroom (course) of the record. The advantage of the proposed system is that it is a fully automatic system that records the presence of the students, generates automatic attendance reports, does not require any extra device except installing a mobile application onto smart phones or smart watches of the student, and can be deployed with a low budget. The proposed system is tested in real classroom environment and it is proven to be operational.Item A WIRELESS CONTROL SYSTEM BASED ON SMART BLUETOOTH AND IBEACON TECHNOLOGY FOR AUDITING THE PATROLS(International Journal of Scientific Research in Information Systems and Engineering, 2016-12-04) KARAKAYA, Murat; ŞENGÜL, Gökhan; BOSTAN, AtilaPatrol systems are used as a method of ensuring security and protection of large areas and facilities such as university campuses, military zones, etc. In general, security personnel assigned to the patrol system visit the pre-determined checkpoints at regular intervals and are obliged to make the safety control of these locations. Security personnel (guards) are also audited to check if they covered all the essential control points on time or not. In recent years, considering energy efficiency, new Bluetooth devices and protocols are designed and produced. One of the most popular low-energy Bluetooth protocols is Smart Bluetooth (version 4.0). In this work, we integrated mobile devices (smart phone or tablet) with IBeacons. IBeacons are devices emitting beacons using Smart Bluetooth signals. Since Smart Bluetooth consumes low energy, these devices are small in size, have long life durations and very cheap. In this work, we propose and implement a new system to record the patrol officers’ movements in the subject areas. At the proposed system, IBeacons are first deployed in the monitoring areas. The location and the identification of the deployed IBeacon are stored in a central database. We developed a mobile application for Android devices which can scan the environment for IBeacon signals. The mobile application collects the sensed IBeacon IDs, stamps it with a time tag and uploads it along with the mobile device ID to the central database. Using these records, we can monitor the movements of the security guards. We have also developed a web application to generate an executive summary report from these records.Item Analyzing the Requirements for E-government Transition of Iraqi ICS Services(Computer Science and Engineering (UBMK), 2017-08-04) ALAMERİ, Mohammed Abdulbasit; BOSTAN, Atila; AKMAN, İbrahimIraqi Correction Sercives (ICS) is a department within the Ministry of Justice. Most services are provided through traditional paper and pen system. This system causes delays in service provision time and work over-load on ICS staff which translates into a high cost of service provision. E-government applications represent an opportunity to automate governmental services while improving both effectiveness and efficiency. This work presents the approach taken to determine the priority to automate ICS service from the perspective of service beneficiaries. The research is et to be completed, however, up to this point we developed four different questionnaire-sets in order to collect the requirements from the shareholders, verified them and implemented the actual survey in the field. The experience gained throughout these steps and the future analysis plan is reported in this paper.Item AUTOMATIC SPIRULINA DETECTION USING IMAGE PROCESSING TECHNIQUES(2022-02-14) SIDDIK, Othman; BOSTAN, AtilaIn this thesis, a study on automatic detection of spirulina is presented. Spirulina is an algae microorganism with 4 species which are quite useful for the determination and monitoring of water quality. Thesis contribution is to develop an automatic process for helping the diagnosis Spirulina in water, most of the Spirulina can be diagnosed by the size and shape from microscopic images, all algae detection that has to be diagnosed in a fast and accurate way is very critical for the water quality, manual methods are used to detect spirulina. This can give rise to inaccurate results. It is also very tedious effort to detect algae within water microscopic images. Automatic detection of spirulina is a challenging task due to factors such as change in size and shape with climatic changes, growth periods and water contamination. Nowadays, the automated detection of spirulina is one of the most fervent topics in applied biology. On the other hand, Deep-Learning and Convolutional Neural Networks (CNN) is yielding better results and is a judiciously used technique for image classification and for a variety of problems. This thesis introduces CNN into the automated spirulina detection problem in order to demonstrate whether it would succeed in solving the spirulina detection problem. A comprehensive dataset was specifically prepared using an artificial image generation method out of original images that are collected from rivers and lakes in Turkey. In this study, a spirulina image data set was prepared using a customized technique for artificial image generation. Consequently, a dataset covering different illumination conditions was computationally augmented to 1000 sample images. Original images were collected from rivers and lakes in Turkey. In this thesis, the background to the spirulina detection problem, the methodology used in the study and the results of image processing and feature extraction methods to locate and extract spirulina in a microscopic image are reported. Initially, the RGB image format with morphological operations were employed to detect spirulina in a microscopic image. As a result with a rate of 84% accuracy detection was observed. Afterwards, three different methods were experimented with for comparison purposes. The methods and their relative detection success rates were observed as follows: SURF 63%, FAST feature detection 67%, CNN 99% result accuracy rate, consequently, some future work is also suggested to improve the study further. In this thesis, we introduced CNNs into the automated spirulina detection problem. A CNN method used to solve 4 class spirulina detection problem. Observed results were discussed and compared with those of previous studies. To the best of our knowledge and survey results on the literature, this is the first study to employ CNNs in the automated spirulina detection problem.Item Biometric Verification on e-ID-Card Secure Access Devices: A Case Study on Turkish National e-ID Card Secure Access Device Specifications(International Journal of Information Security Science, 2017-08-04) BOSTAN, Atila; ŞENGÜL, Gökhan; KARAKAYA, MuratBiometric verification on e-ID cards requires clear procedures and standards be defined, especially when the access devices are anticipated to be produced commercial companies. Turkish national e-ID card project has reached the dissemination step. Now the commercial companies are expected to produce and market e-ID card access devices which will conduct secure electronic identity verification functions. However, published standards specifying e-ID card-access-device requirements are ambiguous on biometric verification procedures. In this study, we intended to attract scientific interest to the problems identified in the current design of biometric verification on Turkish national e-ID cards and proposed several verification alternatives which enables the production of e-ID card access devices in a commercial-competition environment.Item CLOUD COMPUTING SECURITY ISSUES AND SELECTION OF DEPLOYMENT MODEL AND SERVICE MODEL ACCORDING TO SECURITY REQUIREMENTS(2015-01-31) SEZEN, Arda; YAZICI, Ali; BOSTAN, AtilaThis thesis reviews the necessity of X.800 Recommendation service categories for different cloud service models and cloud deployment models together with some security solution approaches in cloud computing. The thesis evaluates the solution approaches to show that technical and non-technical approaches need to be handled together to produce comprehensive solutions. Six technical solution approach have been included to evaluate the fulfilment of X.800 Recommendation service categories. Eventually, twelve hypotheses have been formulated, tested, and accepted based on the survey data to understand the necessity of X.800 Recommendation service categories for different cloud service models and cloud deployment models.Item CONCEPTUAL DESIGN OF E- GOVERNANCE IN DISASTER MANAGEMENT SYSTEM(2022-01-25) IBRAHIM, Thaer; MISHRA, Alok; BOSTAN, AtilaDisasters pose a real threat to the lives and property of citizens; therefore, it is necessary to reduce their impact to the minimum possible. In order to achieve this goal, a framework for enhancing the current DMS was proposed, called Smart Disaster Management System (SDMS). The smart aspect of this system is due to the application of the principles of Information and Communication Technology (ICT), especially the Internet of Things (IoT). All participants and activities of the proposed system were clarified by preparing a conceptual design by using The Unified Modeling Language (UML) diagrams (both, use-case and activity diagrams). This effort was made to overcome the lack of citizens’ readiness towards the use of ICT as well as increase their readiness towards disasters. Iraq was chosen as a case study for this research. The lack of readiness on part of Iraqi citizen was inferred by using two different methods, interviews with experts in the field of disasters and experts in the field of ICT. The other method was based on distributing a questionnaire form to the target sample.Item Customizing SSL Certificate Extensions to Reduce False-Positive Certificate Error/Warning Messages(International Journal of Information Security Science, 2016-08-04) TARAZAN, Şafak; BOSTAN, AtilaIn today’s Internet world, X.509 certificates are commonly used in SSL protocol to provide security for web-based services by server/client authentication and secure communication. Although SSL protocol presents a technical basis, this web security largely depends on user awareness of security measures as well. There are significant number of scientific studies in the literature reporting that the count of invalid or self-signed certificate usage in today’s Internet can not be overlooked. At the same time, quite a number of studies place emphasis on the acquired indifference towards certificate warning messages which are popped up by web browsers when visiting web pages with invalid or self-signed certificates. In this study, with the importance of user’s daily practices in developing habits in mind, we studied a modification of X.509 certificates in order to reduce the number of false-positive certificate-warning pop ups in order to reduce gaining faulty usage habit of invalid certificates.Item DETERMINATION AND IDENTIFICATION OF DANGEROUSLY LANE CHANGING VEHICLES IN TRAFFIC BY IMAGE PROCESSING TECHNIQUES(International Journal of Scientific Research in Information Systems and Engineering, 2017-04-04) ŞENGÜL, Gökhan; KARAKAYA, Murat; BOSTAN, AtilaDue to increase of vehicle usage all around the world, the importance of safety driving in traffic is increasing. All of the countries around the world are taking actions to increase the safety driving habitats and decrease the number of traffic accidents. One of the applied precautions is to put necessary automatic auditing mechanisms into service for controlling the drivers as they drive since reckless drivers may not obey many traffic rules. In this study, image and video processing based methods are applied to identify the dangerously lane changing vehicles/drivers in the traffic. The proposed method focuses on to detect three different violations in traffic: the vehicles frequently changing traffic lanes, the vehicles changing lanes when it is forbidden, and the vehicles overtaking the other vehicles using the right lanes instead of left one. The proposed method is based on the image and video processing techniques. It first detects the vehicles in video sequences, then tracks the vehicles in the following frames and determines the lane changes of the vehicles. In the vehicle detection phase an image subtraction method is used. In the vehicle tracking phase, Kalman filtering tracking algorithm is used. After determining the lane changes of the vehicles/drivers, a rule based decision system is used to find out the vehicles/drivers improperly changing lanes and those vehicles are marked on the video. The proposed method is tested on the videos captured from real traffic environments and promising results are obtained.Item ENHANCEMENTS IN FINGERPRINT AUTHENTICATION(2017-06-02) Alsubaihawi, Mohammed Abdulraheem Taqi; BOSTAN, AtilaFingerprint identification and verification tasks are among the most challenging tasks in image processing and machine learning domains. Fingerprint processing presents a key issue in the biometric technologies and information security. According to the fraction of the people population based on the complete detection of the biometric fingerprint feature such as ridge structure, incomplete (portion) fingerprint image identification and verification task is very difficult to be accomplished. The main challenge in this problem is that the partial loss of the ridge structure in the incomplete fingerprint image. In this thesis, we studied the effectiveness of global feature approach in fingerprint identification and verification task that can deal with the partial image loss or incomplete fingerprint image. Global feature vector extraction is the main global approach that we contribute in this thesis. In this case, we implemented global geometrics based feature extraction for fingerprint identification and verification task. A set of global features (seven-moment values) were extracted from the partial fingerprint (incomplete fingerprint image). The study shows that global feature vector can more efficiently deal with incomplete fingerprint recognition problem when compared with the classical approach to the fingerprint identification and verification problem which is based on extracting minutia features from the fingerprint rides as well as the pores in different feature extraction levels. The studied system has been tested using a database that was randomly generated out of some random incomplete fingerprint images. Randomly generated incomplete fingerprint images were sorted into 10 groups according to the size of the missing part in each image. Then we randomly selected random images from each group to compose a new challenge dataset to be tested in two different approaches which are global, and Local feature extraction approaches. The experimental results show that global approach has about 87% while the local approach has 17% of identification and verification effectiveness. This means global approach improves the performance of the fingerprint identification and verification system on partial (incomplete) fingerprint images by 70% more than the classical approach.Item ICT USAGE CHARACTERISTICS AND COMPUTER SECURITY(PEOPLE: International Journal of Social Sciences, 2018-01-29) AKMAN, İbrahim; BOSTAN, AtilaAlthough acquired-user security habits and user security awareness are qualified as the feeblest components in assuring the information and communication technologies security, they are deemed to be inevitable as well. While the technology in information processing domain efforts its best in establishing the highest plausible security, user awareness is still referred as the key component. Human demographic factors, ICT usage frequency might have correlation with security related behavior routines, this dimension not to be known yet. Hence, in this study we examined the influence of ICT usage characteristics on secure computer usage behaviors. In order to investigate this relation, a survey was carried out with the participation of 466 individuals from diverse layers of the community. The results demonstrated that statistically noteworthy relations exist between several socio-demographic features, frequency and reason of ICT usage factors and secure computer usage.Item IMPACT OF EDUCATION ON SECURITY PRACTICES IN ICT(Tehnicki Vjesnik, 2015-02-04) BOSTAN, Atila; AKMAN, İbrahimIn assuring the security in information technology, user awareness and acquired-user habits are inevitable components, yet they may be qualified as the feeblest ones. As the information technology tries to put its best in providing maximum security, user awareness plays a key-role. Additionally, although the literature provides studies on approaches for teaching information security, there are not many evidences on the impact of education level. Therefore, this study investigates the impact of the education level on user security awareness in using the Information and Communication Technology (ICT) products. For this purpose, a survey was conducted among 433 citizens from different layers of the society. Interestingly, the results indicated that education level has significant impact on all security issues included in the analysis regarding computer usage, web usage and e-mail usage.Item Implicit learning with certificate warning messages on SSL web pages: what are they teaching?(SECURITY AND COMMUNICATION NETWORKS, 2016-08-25) BOSTAN, AtilaSSL-based web services are the most common technology in secure transactions on the Internet today. The security level of these services is inevitably related with that of digital certificates and user awareness. With the high number of nonconforming digital certificate usage, which eventually invokes warning messages on the Internet, users are implicitly forced to develop unsecure usage habits. In this study, we have studied the implicit learning effect of certificate warning messages on the SSL web pages. We have conducted two different experimental studies on university students and on instructors in IT departments. The results point to acquired indifference towards these warnings in users. Copyright © 2016 John Wiley & Sons, Ltd.Item Öğrenci Ders Devamının Sınavlarda Alınan Notlara Etkisi Üzerine Bir Durum Çalışması(Mersin Üniversitesi Eğitim Fakültesi Dergisi, 2016-08-04) BOSTAN, Atila; KARAKAYA, MuratÜniversite eğitimde öğrencilerin derslere devam mecburiyetinin olup olmaması, okuldan okula değişebileceği gibi aynı okul içinde verilen dersler arasında da farklılıklar göstermektedir. Öğrencilerin derse devam etmesiyle, dönem sonucu elde ettiği ders başarısı arasında olumlu bir ilişki olup olmadığı önemli bir araştırma konusu olmuştur. Bu konuda yapılan çalışmaların önemli bir bölümünde, dersteki başarı kriteri olarak dönem sonu başarı notu esas alınmış ve yapılan çalışmaların çoğunluğunda iki olgu arasında olumlu bir ilişki gözlemlenmiştir. Bunun sonucu olarak da, çalışmaların sonuç bölümlerinde öğrencilerin derslere devam etmelerinin sağlanması ve devamlarının artırılması tavsiye edilmiştir. Ancak, çok az çalışmada bu tedbirin gerçek hayata nasıl geçirilebileceği ile ilgili önerilerde bulunulmuştur. Diğer taraftan bu önerilerin ders devamını veya başarıyı artırmakta etkisi genellikle ölçülmemiştir. Derse devam durumunun artırılması için önerilen yöntemlerin çoğu, idari tedbirlerle öğrencileri derse devam etmeye zorlamayı içermektedir. Halbuki, ders devamından beklenen faydanın sağlanabilmesi için; öğrencinin bir zorunluluktan ziyade, öğrenme sürecinin bir parçası olarak derse devam etmeye teşvik edilmesi önemlidir. Bu çalışmada; ders devamı ile sınav notu arasındaki ilişki hem dönem sonu sınav notu hem de dönem içerisinde yapılan ara sınavlar dikkate alınarak incelenmiştir. Böylelikle öğrencinin devam durumu ile sınavlar arasında ilişkiyi gözlemlemek mümkün olmuştur. Ayrıca, ders işleme yönteminde yapılan bir değişikliğin, ders devamına ve öğrencinin notuna olan etkisi de bu kapsamda değerlendirilmiştir. Böylelikle, derse devam ile alınan notlar arasındaki ilişki üzerinde ders işleme yönteminin etkisi de izlenebilmiştir. Bu yönleriyle makalede sunulan çalışma, yazımda var olan yayınlardan farklılaşmaktadır.Item REMOTELY MONITORING ACTIVITIES OF THE ELDERS USING SMART WATCHES(International Journal of Scientific Research in Information Systems and Engineering, 2017-04-02) KARAKAYA, Murat; ŞENGÜL, Gökhan; BOSTAN, AtilaIn this paper, we propose a model for using smart watches as Internet of Things (IoT). IoT can be defined as a network of physical devices, vehicles, buildings and other items which have electronics, software, sensors, and network connectivity so that these “things” can collect and exchange data. In the proposed system, the purpose is to identify daily activities such as walking, sitting, falling, etc., by using the data acquired from the sensors of a smart watch. As smart watches have the necessary hardware and sensors, the implementation such an IoT application would not cost much. Moreover, analyzing the sensor data would yield useful information. Besides it would be a user-friendly system that does not make the elderly uncomfortable. As being a watch, this device can be always on the user. The proposed system is implemented and the results of initial experiments and user experiences are promising.Item UNIDIRECTIONAL DATA TRANSFER: A SECURE SYSTEM TO PUSH THE DATA FROM A HIGH SECURITY NETWORK TO A LOWER ONE OVER AN ACTUAL AIR-GAP(International Journal of Scientific Research in Information Systems and Engineering, 2017-04-02) ŞENGÜL, Gökhan; BOSTAN, Atila; KARAKAYA, MuratThe term “air-gap” is typically used to refer physical and logical separation of two computer networks. This type of a separation is generally preferred when the security levels of the networks are not identical. Although the security requirements entail parting the data networks, there is a growing need for fast and automatic transfer of data especially from high-security networks to low-security ones. To protect security sensitive system from the risks originating from low-security network, unidirectional connections that permit the data transfer only from high to low-security network, namely information-diodes, are in use. Nonetheless, each diode solution has its drawbacks either in performance or security viewpoints. In this study, we present a unidirectional data transfer system in which the primary focus is data and signal security in technical design and with a plausible and adaptable data transfer performance. Such that the networks do not touch each other either in physically or logically and the transfer is guaranteed to be unidirectional. Apart from avoiding the malicious transmissions from low to high-security network, we claim that the proposed data diode design is safe from emanation leakage with respect to the contemporary sniffing and spoofing techniques.Item Yazılım Mühendisliği Eğitiminde Bitirme Projesi Dersinin Öğrenci Bakış Açısıyla Değerlendirilmesi(Ulusal Yazılım Mühendisliği Sempozyumu, 2013-08-04) BOSTAN, Atila; KARAKAYA, MuratYazılım mühendisliği eğitiminin ayrılmaz bir parçası olarak bitirme projesi dersi Türkiye’deki ilgili tüm programların müfredatlarında yer almaktadır. Lisans eğitim sürecinin son aşamasında çeşitli isimlerle yer alan ve öğrencilerin proje geliştirme süreçlerini grup içerisindeki çalışmalar ile tecrübe etmelerine olanak sağlayan bu ders, üniversiteler tarafından değişik şekillerde ele alın makta ve yönetilmektedir. Yazılım mühendisliği lisans eğitimindeki diğer derslerden gerek işleniş ve gerekse beklentiler açısından farklı olan bu dersin verilme sürecinde çeşitli sorunlarla ve güçlüklerle karşılaşılmaktadır. Bu çalışmada; yazılım mühendisliği programlarında verilen bitirme projesi dersinin öğrenci bakış açısından irdelenmesi için bu dersi alan öğrencilere anket yapılmış, öğrencilerin yaşdıkları zorluklar ile karşılaştıkları sorunlar belirlenmiş ve dersin öğrenciler açısından daha etkin ve faydalı olması için alınabilecek tedbirler öneriler olarak çalışmanın sonunda sunulmuşturItem Yeni Teknoloji: Etkileşimli Oyun Yeleği(Bilim ve Teknoloji, 2014-05-13) TARAZAN, Şafak; BOSTAN, AtilaGünümüzde dünya çapında en çok yatırım alan sektörlerin üst sıralarında yer alan oyun sektörü, büyük bir hızla ilerlemeye devam etmektedir (Lehdonvirta, 2005). Bu ilerleme gerek oyunlarda kullanılan grafiklerin daha gerçekçi hale getirilmesi gerekse kullanıcıyı oyunun içine çekebilmek için oyun platformlarının teknolojinin elverdiği ölçüde geliştirilmesi ile sağlanmaktadır. Oyun ve benzetim sektöründeki benzer ilerleme ve geliştirme faaliyetleri, bu sektör için birçok yardımcı araç ve ekipmanın üretilmesini tetiklemiştir. Günümüzde, bu tür araçlardan en revaçta olanlar ise Dokunsal Cihaz (Haptic Devices)’lardır.