Browsing by Author "KOYUNCU, Murat"
Now showing 1 - 11 of 11
Results Per Page
Sort Options
Item A Comprehensive Assessment Plan for Accreditation in Engineering Education: A Case Study in Turkey(International Journal of Engineering Education, 2015-08-02) TURHAN, Çiğdem; ŞENGÜL, Gökhan; KOYUNCU, MuratThis paper describes the procedure followed by Computer Engineering and Software Engineering programs at Atilim University, Ankara, Turkey, which led to the granting of five years of accreditation by MUDEK, the local accreditation body authorized by The European Network for Accreditation of Engineering Education (ENAEE) to award the EUR ACE label, and a full member signatory ofWashington Accord of International Engineering Alliance (IEA). It explains the organizational structure established for preparation, determination and measurement of the educational objectives, program outcomes, course outcomes, and the continuous improvement cycle carried out during the preparation period. The aim of the paper is to share methods and experiences which may be beneficial for the other programs that are intended for accreditation.Item A LITERATURE SURVEY ABOUT VERTICAL AND HORIZONTAL SCALABILITY IN CLOUD COMPUTING(2022-02-14) TAYEB, Abdulsalam Salim Tayeb; KOYUNCU, MuratCloud computing has gained popularity in the industry due to the expansion of data generation from various domains such as physics, sciences, business and so on. Scalability can play an essential role in clouds and can improve their performance. The importance of scalability lies in its ability to cope with the increasing workloads by adding additional resources when demand increases. Typically, there are two types of scalability, namely horizontal scalability and vertical scalability. Hence, there are different classifications of scalability in the literature. This thesis is intended to be a comprehensive survey covering all available scalability techniques in cloud including different classifications based on different criteria. This study basically investigated vertical and horizontal scalability methods. In addition, it explores the used technologies for both of them. Moreover, it determines the amount of research publications related to scalability from different perspectives. To reach the specified goal, a systematic mapping study has been done about scalability.Item A SYSTEM PROPOSAL FOR COUNTING THE NUMBER OF PEOPLE IN STILL IMAGES(2017-01-07) AL-ZUBAIDI, Waleed; KOYUNCU, Murat; information technologyCounting people in images is a challenging task in the computer vison. This thesis targets to estimate the number of people in images accurately. Our focus is on implementing a robust counting algorithm that depends on different approaches together to detect humans having different appearances in images. Three different approaches are taken as the base of the proposed people counting method. These approaches are frontal face detection, human whole body detection, and people head detection. The main contribution of this thesis is using different approaches together for counting people in still images. We have done that by using Viola-Jones algorithm for face detection, the HOG features and SVM classifier for human body detection, and Hough transform and morphological image processing for head detection in crowded images. Any image is processed by three detectors in parallel and detected people are counted. Then, their results are combined for a final decision. The proposed method is implemented in the C++ language with the help of the OpenCV image processing library. The proposed method is tested and compared with some other approaches. The experimental results show that the proposed method achieves more successful results compared to other approaches when test dataset includes various image categories.Item ANALYSIS OF FILTERING AND QUANTIZATION PREPROCESSING STEPS IN IMAGE SEGMENTATION(2013-08-14) ÇALAMAN, Seda; KOYUNCU, MuratThere is a series of processes to extract semantic information from an image and one of them is the image segmentation. Image segmentation splits the image into smaller parts (segments) such that each segment has similar features such as similar colors or textures. In this thesis, the effects of preprocessing methods on image segmentation process are analyzed from different perspectives. Firstly, Peer Group Filtering, which is one of the preprocessing methods used before image segmentation, is applied on the images and its effect on image segmentation is analyzed. Peer Group Filtering algorithm is used to eliminate noises and to smooth color changes on images. Secondly, Lloyd’s quantization algorithm, which is another preprocessing method used before image segmentation, is applied and its contribution on image segmentation is investigated. Lloyd’s quantization algorithm reduces the number of colors in images. Finally, two different segmentation algorithms (fast scanning algorithm and JSEG algorithm) are compared using preprocessed images. Natural and synthetic images have been experimentally tested in this study. The results obviously indicate that after Peer Group Filtering preprocessing, segmentation achievement increases while run time of the segmentation decreases. On the other hand, the experiments related with the quantization show that, selected quantization level is very important to get benefit from Lloyd’s quantization algorithm. If correct quantization level is selected, then quantization helps segmentation process.Item COMPARISON OF QUALITY OF SERVICE (QoS) SUPPORTS IN IPV4 AND IPV6(2015-06-25) AL-FAYYADH, Hayder; KOYUNCU, MuratProviding guaranteed services in the current Internet has become extremely essential to fulfill the requirements of Internet users. With an increase in the number of users and demand for multimedia applications like video streaming, VoIP and video conferencing, larger bandwidth requirement increases drastically since such applications are very sensitive to delay, packet loss, and jitter. However, it is not feasible to provide enough bandwidth to satisfy such a high demand. Quality of Service (QoS) is an important network performance parameter having a significant impact on multimedia applications. IPv6 was designed to improve QoS supported by IPv4, as well as other improvements. In this thesis, we discuss quality of service and various parameters affecting it on the Internet. We compare IPv4 and IPv6 protocols in terms of their performance for multimedia applications. In this scope, various queuing algorithms (First in First Out FIFO, Priority Queuing-PQ, and Weighted Fair Queuing-WFQ), which are typical scheduling algorithms used by routers, are examined to see their effects for multimedia applications in IPv4 and IPv6 environments. In addition, integrated services (IntServ) and differentiated services (DiffServ), which are two important techniques developed to provide QoS on the Internet, are elaborated again in IPv4 and IPv6 environments. For comparisons, a simulation framework based on OPNET Modeler is used for modeling, simulating and analyzing network behaviors. The results obtained from the simulations clearly show that the use of IPv6 with different QoS techniques has better performance in terms of jitter and delay compared to IPv4 protocol.Item COMPARISON OF VARIOUS TRANSITION MECHANISMS FROM IPv4 TO IPv6(2015-06-25) AL-FAYYADH, Faris; KOYUNCU, MuratIPv4 which is the old version of Internet Protocol has a new successor named IP Next Generation (IPng) or IPv6 developed by IETF. This new version is developed especially to resolve some issues of IPv4 like scalability, performance and reliability. Although new version is ready for usage, it is obvious that it will take years to transit fully from IPv4 to IPv6. We have to use these two versions together for a long time. Therefore, we have to investigate and know transition mechanisms that we can use during transition period to achieve a transition with minimum problem. This thesis analyzes present IP transition techniques. Here an attempt has also been made to make empirical evaluation of the three most generally used transition mechanisms which are Automatic 6to4 Tunneling, Manual 6in4 Tunneling and Dual Stack. The obtained test results are also compared with the results of native IPv6 and native IPv4 environments. Empirical evaluation is based on simulations which are carried out using OPNET simulation framework. The outcomes of the thesis are important for providing an insight for choosing an appropriate transition technique, an idea about network capacity planning and migration.Item INVESTIGATING CONFORMANCE OF E-GOVERNMENT WEB SITES IN LIBYA TO W3C ACCESSIBILITY STANDARDS(2022-02-25) ALGHOUL, Haifa; KOYUNCU, MuratToday's people cannot bear a life without the Internet. It provides access to many things like news, email, shopping, and entertainment, at anytime and anywhere. Governments around the world have adopted the Internet as a channel to introduce their information and services to citizens, businesses and other government sectors. The government websites work as an interface between the government and the citizens. E-government applications utilizes web technology for making information accessible online to as many people as possible regardless of their disabilities. Accessibility is essential for governments that want to create high quality websites and web tools, and not exclude citizens from using their services. This thesis investigates the status of current government websites in Libya in terms of accessibility, which is one of the World Wide Web Consortium (W3C) criteria to develop high quality web sites. It tries to find out whether e-government websites comply with the guidelines developed by W3C. In this study, several web diagnostic tools are used for investigation. Several suggestions are offered based on the results of the research.Item INVESTIGATING THE USAGE OF MOBILE APPLICATIONS VERSUS WEB BROWSERS FOR SMARTPHONES(2022-02-28) OTHMAN, Safa; KOYUNCU, MuratThe utilization of mobile applications and services by the smartphone users is ever increasing over the last two decades. A considerable amount of research work has been done in this field with different aims and objectives. The aim of the work done in this thesis is to understand the preferences of smartphone users regarding the usage of the Internet in their devices either by mobile applications or via mobile websites. Our findings will be useful for mobile application developers to understand the main aspects of the average Turkish consumers and what they expect from their mobile usage experience. The study was conducted in two phases. In the first phase, a survey was conducted with 158 participants from Atilim University, Ankara. In the second phase, interviews were conducted with 30 participants based on testing two implemented applications (a native mobile application and a mobile website). The collected data is analyzed using different statistical methods such as One Way ANOVA. Obtained results show that mobile applications are mostly preferred, especially for the most common and frequently used applications among users. Moreover, respondents find that mobile applications are better in most aspects. However, we cannot ignore the proportion of participants who make their preferences according to sites.Item PERFORMANCE COMPARISON OF VANET PROTOCOLS(2022-02-28) ALQRGHOLEI, SAFA ABDULRIDHA ABDULJALEEL; KOYUNCU, MuratThe use of devices with wireless technologies such as laptops and mobile phones are very popular. These devices influence the use of wireless networks such as ad hoc networks. Mobile ad hoc network (MANET) is a group of devices that are connected to each other by wireless links without any centralized controlling or infrastructure. Nodes (devices) of this network change their locations, and also the number of nodes may change during the time. Therefore, the topology type of this network is known as dynamic. Nodes in a dynamic topology communicate with each other using routing protocols. Routing protocols are responsible for finding a path between nodes. These protocols have a significant role for the total performance of the ad hoc networks. Routing protocols of ad-hoc networks are divided into the following; proactive, reactive and hybrid routing protocols. Different types of routing protocols for ad-hoc networks are proposed by network designers and researchers to enhance the performance of ad hoc networks by finding the shortest and efficient route establishment between two nodes for message delivery. To evaluate and compare the performance of routing protocols, a number of performance metrics are used. Each of these methods has its own properties and is suitable for a specific application type. In this study, five well-known ad hoc routing protocols (OLSR, AODV, TORA, DSR, and GRP) are analyzed and compared according to their performance using FTP (low, high) and HTTP (light, heavy) applications. Routing protocols are analyzed with respect to the following metrics; the number of nodes and mobility speed. For comparison among the mentioned protocols, end-to-end delay and throughput are measured and used. OPNET simulator version 14.5 is used to model and simulate ad hoc networks. The results of experimental simulations show that OLSR has better performance than the other protocols. With OLSR protocol, the time that is required to transfer a packet from source to destination is less than the time taken by AODV, TORA, DSR, and GRP. AODV is better than OLSR in low-density networks and low mobility speed in some cases. AODV is again better when a few nodes are communicating. On the other hand, normalized routing load of OLSR is getting up compared with AODV when the numbers of communicating nodes are increasing with all mobility speed.Item UNDERSTANDING THE KEY SKILLS FOR INFORMATION SECURITY MANAGERS A DELPHI METHOD STUDY(2022-02-25) HAQAF, Husam; KOYUNCU, MuratInformation Security Management (ISM) is a necessity for all institutions and enterprises that consider their information as valuable assets. Therefore, developing, auditing and managing information security is dependent on professional talent that could achieve the required information security governance. The research seeks the key skills for information security managers that are required to maintain competency in the domain, as well as methods to acquire these skills through professional certifications. The study adopts a Delphi method, which requires building a set of items through a literature survey and involves experts with minimum expertise to modify the list until a consensus on less than 20% of the items is reached. After performing a literature survey of the Information Security’s standards, frameworks and studies, in addition to a data collection round by the experts, a total of 82 skills under 5 categories were compiled. The results of the study shortlisted 19.51% of the items with minimum mean score of 3.25 on a 7-point Likert scale through relevance and ranking rounds, as recommended by studies on the Delphi method. Moreover, 43.75% of the final items are core information security skills, and certifications including CISSP, CISA and CISM are recommended to acquire them.Item UNIVERSITY STUDENTS’ ATTITUDES TOWARDS CAPTCHA USE(2022-02-15) ELATRESH, Khalid; KOYUNCU, MuratCompletely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a type of techniques that is utilized in order to be able to distinguish the actual human users from bots or for determining the users that are authorized to access a website or a file on the Internet. This thesis aims at determining attitudes of Libyan students towards different types of CAPTCHA in WWW environment. It also analyzes user attitudes according to demographic and Internet usage information including gender, age, education level, for how many years they have been using the Internet, and how often they use the Internet. To fulfill the purpose of the study, a questionnaire was prepared and Libyan students studying in different levels and departments answered to the questionnaire that is published through the Internet. The data obtained is processed using SPSS 18.0 software package. The obtained results reflect that the participants are familiar with all of types of CAPTCHA since they use them every day through navigating in the Web for books or scientific articles. However, user familiarity for text-based CAPTCHA is higher than the others. The No CAPTCHA reCAPTCHA type is the most favored one from different perspectives including error freeness, easiness, and security. Therefore, we conclude that the No CAPTCHA reCAPTCHA type is the most preferred type by users.