Browsing by Author "KARAKAYA, Murat"
Now showing 1 - 13 of 13
Results Per Page
Sort Options
Item A SMART CLASSROOM APPLICATION: MONITORING AND REPORTING ATTENDANCE AUTOMATICALLY USING SMART DEVICES(International Journal of Scientific Research in Information Systems and Engineering, 2017-04-04) ŞENGÜL, Gökhan; KARAKAYA, Murat; BOSTAN, AtilaFor recording attendance in a classroom, generally instructors collect signatures of the attendees. Then, at the end of the semester, those signatures need to be counted and reported. This process causes waste of time and effort for both instructors and attendees. Besides this process is very error prone. Moreover, in crowded classes, there could be some misuses of this process. In this study, a smart classroom application is proposed and developed in order to monitor the attendance of the students in a classroom environment. In the design, a low-energy Bluetooth device is located at each classroom. Identification number (ID) of the low-energy Bluetooth device and the name/number of the classroom that the device is located are matched and stored in a central database. In addition to this information, the name of the courses given in that classroom and their time tables are also stored in the central database. Thus, in the database, the weekly course schedule of the classrooms is available. In addition to this central database infrastructure, a mobile application is developed that can run on both in mobile phones and smart watches. The users first install the application on their own smart devices. Whenever an attendee enters to a classroom, the smart device and its application interacts with the low-energy Bluetooth device. The student’s identification number (Student ID: SID), the identification number (ID) of the low-energy Bluetooth device located at the class, the day and time of the interaction are sent to the central database by the smart device. Using this information, the name of the attendee and the courses that he/she attended are matched using the SID of the attendee, the ID of the low-energy Bluetooth device, the day and time of the interaction. Those matching information are also stored in the central database. The records in the central database are used to create any automatic reports, i.e. the attendance status, the time and duration of the attendance, and the classroom (course) of the record. The advantage of the proposed system is that it is a fully automatic system that records the presence of the students, generates automatic attendance reports, does not require any extra device except installing a mobile application onto smart phones or smart watches of the student, and can be deployed with a low budget. The proposed system is tested in real classroom environment and it is proven to be operational.Item A WIRELESS CONTROL SYSTEM BASED ON SMART BLUETOOTH AND IBEACON TECHNOLOGY FOR AUDITING THE PATROLS(International Journal of Scientific Research in Information Systems and Engineering, 2016-12-04) KARAKAYA, Murat; ŞENGÜL, Gökhan; BOSTAN, AtilaPatrol systems are used as a method of ensuring security and protection of large areas and facilities such as university campuses, military zones, etc. In general, security personnel assigned to the patrol system visit the pre-determined checkpoints at regular intervals and are obliged to make the safety control of these locations. Security personnel (guards) are also audited to check if they covered all the essential control points on time or not. In recent years, considering energy efficiency, new Bluetooth devices and protocols are designed and produced. One of the most popular low-energy Bluetooth protocols is Smart Bluetooth (version 4.0). In this work, we integrated mobile devices (smart phone or tablet) with IBeacons. IBeacons are devices emitting beacons using Smart Bluetooth signals. Since Smart Bluetooth consumes low energy, these devices are small in size, have long life durations and very cheap. In this work, we propose and implement a new system to record the patrol officers’ movements in the subject areas. At the proposed system, IBeacons are first deployed in the monitoring areas. The location and the identification of the deployed IBeacon are stored in a central database. We developed a mobile application for Android devices which can scan the environment for IBeacon signals. The mobile application collects the sensed IBeacon IDs, stamps it with a time tag and uploads it along with the mobile device ID to the central database. Using these records, we can monitor the movements of the security guards. We have also developed a web application to generate an executive summary report from these records.Item Biometric Verification on e-ID-Card Secure Access Devices: A Case Study on Turkish National e-ID Card Secure Access Device Specifications(International Journal of Information Security Science, 2017-08-04) BOSTAN, Atila; ŞENGÜL, Gökhan; KARAKAYA, MuratBiometric verification on e-ID cards requires clear procedures and standards be defined, especially when the access devices are anticipated to be produced commercial companies. Turkish national e-ID card project has reached the dissemination step. Now the commercial companies are expected to produce and market e-ID card access devices which will conduct secure electronic identity verification functions. However, published standards specifying e-ID card-access-device requirements are ambiguous on biometric verification procedures. In this study, we intended to attract scientific interest to the problems identified in the current design of biometric verification on Turkish national e-ID cards and proposed several verification alternatives which enables the production of e-ID card access devices in a commercial-competition environment.Item DETERMINATION AND IDENTIFICATION OF DANGEROUSLY LANE CHANGING VEHICLES IN TRAFFIC BY IMAGE PROCESSING TECHNIQUES(International Journal of Scientific Research in Information Systems and Engineering, 2017-04-04) ŞENGÜL, Gökhan; KARAKAYA, Murat; BOSTAN, AtilaDue to increase of vehicle usage all around the world, the importance of safety driving in traffic is increasing. All of the countries around the world are taking actions to increase the safety driving habitats and decrease the number of traffic accidents. One of the applied precautions is to put necessary automatic auditing mechanisms into service for controlling the drivers as they drive since reckless drivers may not obey many traffic rules. In this study, image and video processing based methods are applied to identify the dangerously lane changing vehicles/drivers in the traffic. The proposed method focuses on to detect three different violations in traffic: the vehicles frequently changing traffic lanes, the vehicles changing lanes when it is forbidden, and the vehicles overtaking the other vehicles using the right lanes instead of left one. The proposed method is based on the image and video processing techniques. It first detects the vehicles in video sequences, then tracks the vehicles in the following frames and determines the lane changes of the vehicles. In the vehicle detection phase an image subtraction method is used. In the vehicle tracking phase, Kalman filtering tracking algorithm is used. After determining the lane changes of the vehicles/drivers, a rule based decision system is used to find out the vehicles/drivers improperly changing lanes and those vehicles are marked on the video. The proposed method is tested on the videos captured from real traffic environments and promising results are obtained.Item MAXIMIZING TARGET COVERAGE OF UNMANNED AERIAL VEHICLE CARRIED ON MOBILE PLATFORM(2015-12) SAVURAN, Halil; KARAKAYA, MuratThis thesis proposes a solution approach for target mazimization problem for a range constrained unmanned aerial vehicle (UAV) carried on mobile platform. The problem is modeled with extending the Vehicle Routing Problem (VRP) with the constraints of range capacity and depot mobility and this novel extension is termed Capacitated Mobile Depot VRP (C-MoDVRP) throughout this study. Requirement of a novel solution approach dictated by the nature of this problem is satisfied by adapting a genetic algorithm (GA-CMoD) for the problem specific constraints. The motivation, problem definition, and development of the proposed solution along with its implementation are given in the thesis. Moreover, the performance of the proposed GA-CMoD is observed by extensive simulation tests under different problem constraints. The quality of the produced routes is compared with that of the alternative solution methods. The experiment test results indicate the success of the proposed solution over the alternative ones clearly.Item Öğrenci Ders Devamının Sınavlarda Alınan Notlara Etkisi Üzerine Bir Durum Çalışması(Mersin Üniversitesi Eğitim Fakültesi Dergisi, 2016-08-04) BOSTAN, Atila; KARAKAYA, MuratÜniversite eğitimde öğrencilerin derslere devam mecburiyetinin olup olmaması, okuldan okula değişebileceği gibi aynı okul içinde verilen dersler arasında da farklılıklar göstermektedir. Öğrencilerin derse devam etmesiyle, dönem sonucu elde ettiği ders başarısı arasında olumlu bir ilişki olup olmadığı önemli bir araştırma konusu olmuştur. Bu konuda yapılan çalışmaların önemli bir bölümünde, dersteki başarı kriteri olarak dönem sonu başarı notu esas alınmış ve yapılan çalışmaların çoğunluğunda iki olgu arasında olumlu bir ilişki gözlemlenmiştir. Bunun sonucu olarak da, çalışmaların sonuç bölümlerinde öğrencilerin derslere devam etmelerinin sağlanması ve devamlarının artırılması tavsiye edilmiştir. Ancak, çok az çalışmada bu tedbirin gerçek hayata nasıl geçirilebileceği ile ilgili önerilerde bulunulmuştur. Diğer taraftan bu önerilerin ders devamını veya başarıyı artırmakta etkisi genellikle ölçülmemiştir. Derse devam durumunun artırılması için önerilen yöntemlerin çoğu, idari tedbirlerle öğrencileri derse devam etmeye zorlamayı içermektedir. Halbuki, ders devamından beklenen faydanın sağlanabilmesi için; öğrencinin bir zorunluluktan ziyade, öğrenme sürecinin bir parçası olarak derse devam etmeye teşvik edilmesi önemlidir. Bu çalışmada; ders devamı ile sınav notu arasındaki ilişki hem dönem sonu sınav notu hem de dönem içerisinde yapılan ara sınavlar dikkate alınarak incelenmiştir. Böylelikle öğrencinin devam durumu ile sınavlar arasında ilişkiyi gözlemlemek mümkün olmuştur. Ayrıca, ders işleme yönteminde yapılan bir değişikliğin, ders devamına ve öğrencinin notuna olan etkisi de bu kapsamda değerlendirilmiştir. Böylelikle, derse devam ile alınan notlar arasındaki ilişki üzerinde ders işleme yönteminin etkisi de izlenebilmiştir. Bu yönleriyle makalede sunulan çalışma, yazımda var olan yayınlardan farklılaşmaktadır.Item PREDICTING STUDENT SUCCESS: A CASE STUDY BASED ON THE TRANSCRIPT AND PERSONAL DATA OF THE GRADUATED STUDENTS AT COMPUTER ENGINEERING DEPARTMENT, ATILIM UNIVERSITY, TURKEY(2022-02-15) CEYHAN, Ulaş Ozan; KARAKAYA, MuratIn recent years, Educational Data Mining (EDM) has become more popular in data analysis projects. Institutes try to improve their educational quality as well as to invest in analyzing educational data. Predicting student grades is a significant challenge in EDM, and also it has lots of benefits for improving quality in the education process. In this study, we aim at predicting the student success in the selected courses considering their transcript and personal data. For this reason, we applied various Machine Learn ing (ML) algorithms on the graduated student data. We developed several concepts for analyzing students success at the selected courses. First, we define three metrics to measure the student success. These student success metrics are grade letters, success groups and fail-pass state. Furthermore, we created four different data sets from the graduated student data as inputs to the selected ML algorithms. Results of this study indicate that high or low student grade letters can be predicted better when compared to the moderate grade letters. Similarly, according to the success group metric; lower and higher success groups of the students can be predicted with higher accuracy com pared to the average success group. For the last success metric, the prediction results are far better for the passed students than predicting the failed students. Considering the four input data sets, we could not locate considerable differences in prediction success. However, the data set created by the student personal data generates lower prediction success compared the rest of the data sets. The prediction success for the selected courses is observed to be increasing for the courses at the last two semesters of the curriculum. The details of the findings and their possible causes are analyzed and discussed in the related chapters. We believe that the results of this study can serve as a foundation to build a student recommendation system to predict their future course success.Item REMOTELY MONITORING ACTIVITIES OF THE ELDERS USING SMART WATCHES(International Journal of Scientific Research in Information Systems and Engineering, 2017-04-02) KARAKAYA, Murat; ŞENGÜL, Gökhan; BOSTAN, AtilaIn this paper, we propose a model for using smart watches as Internet of Things (IoT). IoT can be defined as a network of physical devices, vehicles, buildings and other items which have electronics, software, sensors, and network connectivity so that these “things” can collect and exchange data. In the proposed system, the purpose is to identify daily activities such as walking, sitting, falling, etc., by using the data acquired from the sensors of a smart watch. As smart watches have the necessary hardware and sensors, the implementation such an IoT application would not cost much. Moreover, analyzing the sensor data would yield useful information. Besides it would be a user-friendly system that does not make the elderly uncomfortable. As being a watch, this device can be always on the user. The proposed system is implemented and the results of initial experiments and user experiences are promising.Item SS-MLA: A Novel Solution for Multi-Label Classification of Remotely Sensed(2022-01-17) Üstünkök, Tolga; KARAKAYA, MuratMulti-label classification of remotely sensed images is a very important research area. It has many applications from tracking urban growth to military surveillance. Many algorithms and methods are proposed for multi-label annotation of remotely sensed images. In this thesis, two approaches are provided. The first one is a CNN-based straightforward model to show that in small datasets sophisticated methods have no advantage over simpler ones. The second one is a competitive Vector-Quantized Temporal Associative Memory (VQTAM) based method called Semi-Supervised Multi Label Annotizer (SS-MLA) for multi-label annotation of remotely sensed images. The first method is compared with SS-MLA along with other state-of-the-art methods from the literature according to their F1-Scores on four different remotely sensed datasets with SS-MLA. The experiment results show that SS-MLA, as a new approach, achieves better results than half of the comparisons as well as the proposed straightforward method. For all the implementations of the algorithms and methods, Tensorflow-GPU 2.4.0 and Numpy 1.19.5 frameworks are used in a Python 3.8 environment.Item UNIDIRECTIONAL DATA TRANSFER: A SECURE SYSTEM TO PUSH THE DATA FROM A HIGH SECURITY NETWORK TO A LOWER ONE OVER AN ACTUAL AIR-GAP(International Journal of Scientific Research in Information Systems and Engineering, 2017-04-02) ŞENGÜL, Gökhan; BOSTAN, Atila; KARAKAYA, MuratThe term “air-gap” is typically used to refer physical and logical separation of two computer networks. This type of a separation is generally preferred when the security levels of the networks are not identical. Although the security requirements entail parting the data networks, there is a growing need for fast and automatic transfer of data especially from high-security networks to low-security ones. To protect security sensitive system from the risks originating from low-security network, unidirectional connections that permit the data transfer only from high to low-security network, namely information-diodes, are in use. Nonetheless, each diode solution has its drawbacks either in performance or security viewpoints. In this study, we present a unidirectional data transfer system in which the primary focus is data and signal security in technical design and with a plausible and adaptable data transfer performance. Such that the networks do not touch each other either in physically or logically and the transfer is guaranteed to be unidirectional. Apart from avoiding the malicious transmissions from low to high-security network, we claim that the proposed data diode design is safe from emanation leakage with respect to the contemporary sniffing and spoofing techniques.Item Using Bluetooth Low Energy Beacons for Indoor Localization(International Journal of Intelligent Systems and Applications in Engineering, 2017-03-11) ŞENGÜL, Gökhan; KARAKAYA, MuratBluetooth Low Energy (BLE) Beacons gain high popularity due to their low consumption of energy and, thereby, long lifetime. Using the BLE protocol, these devices emit advertisement packets at fixed intervals for a short duration. Indoor localization solutions aim to provide an accurate, low cost estimate of sub-room indoor positioning. There are various techniques proposed for this purpose. BLE Beacons are good hardware candidates to assist the creation of such indoor localization solutions. Given the exact position of BLE Beacons, one can attempt to estimate a receiver position according to the received signal power. In this work, we investigated the success of such an indoor localization approach employing multiple BLE Beacons and two different estimation techniques. The results of the experiments indicate that employing multiple BLE Beacons increases the success of prediction techniques considerably.Item Yazılım Mühendisliği Eğitiminde Bitirme Projesi Dersinin Öğrenci Bakış Açısıyla Değerlendirilmesi(Ulusal Yazılım Mühendisliği Sempozyumu, 2013-08-04) BOSTAN, Atila; KARAKAYA, MuratYazılım mühendisliği eğitiminin ayrılmaz bir parçası olarak bitirme projesi dersi Türkiye’deki ilgili tüm programların müfredatlarında yer almaktadır. Lisans eğitim sürecinin son aşamasında çeşitli isimlerle yer alan ve öğrencilerin proje geliştirme süreçlerini grup içerisindeki çalışmalar ile tecrübe etmelerine olanak sağlayan bu ders, üniversiteler tarafından değişik şekillerde ele alın makta ve yönetilmektedir. Yazılım mühendisliği lisans eğitimindeki diğer derslerden gerek işleniş ve gerekse beklentiler açısından farklı olan bu dersin verilme sürecinde çeşitli sorunlarla ve güçlüklerle karşılaşılmaktadır. Bu çalışmada; yazılım mühendisliği programlarında verilen bitirme projesi dersinin öğrenci bakış açısından irdelenmesi için bu dersi alan öğrencilere anket yapılmış, öğrencilerin yaşdıkları zorluklar ile karşılaştıkları sorunlar belirlenmiş ve dersin öğrenciler açısından daha etkin ve faydalı olması için alınabilecek tedbirler öneriler olarak çalışmanın sonunda sunulmuşturItem Yollara Yerleştirilen El Yapımı Patlayıcılara Karşı Kablosuz Algılayıcı Ağların Kullanımı(Bilim ve Teknoloji, 2013-03-29) KARAKAYA, MuratGünümüzde dünyanın birçok farklı noktasında yaşanan asimetrik savaş ve çatışma koşullarında teröristler tarafından öldürücü bir silaha dönüştürülen El Yapımı Patlayıcılar (EYP) güvenlik kuvvetleri ile sivil halka verdikleri kayıplar nedeniyle küresel çapta giderek büyük bir tehdit oluşturmaktadırlar. Örneğin, yol kenarlarına yerleştirilen EYP 2001-2008 yılları arasında Irak’ta 3000’den, Afganistan’da ise 240’dan fazla Amerikan askerinin ölümüne neden olmuştur [1]. Başka bir deyişle Iraktaki tüm Amerikan kayıplarının %60’ı, Afganistanda ise %50’si EYP saldırıları ile olmuştur. Amerikan ordusu bu tehdite karşı istihbarat ağlarını kullanmak ve direnişçilerin EYP tetiklemek için kullandığı radyo frekans aralıklarını karıştırmak gibi tedbirler geliştirmiştir. Ancak Direnişçiler de bu tedbirlere karşılık vererek uzaktan patlatmada kullanılan teknikleri hızlıca değiştirip çeşitlendirmişlerdir.