Department of Software Engineering

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 20 of 52
  • Item
    IMPLEMENTATION OF MACHINE LEARNING METHODS TO UNDERSTAND SURGICAL RESIDENTS' SKILL LEVELS THROUGH THEIR HAND MOVEMENTS GENERATED BY COMPUTER-BASED SIMULATION TRAINING ENVIRONMENTS
    (2023-07) TONBUL, Gökçen; ÇAĞILTAY, Nergiz; TOPALLI, DAMLA
    Medical disciplines have been experiencing big challenges in its existing complex nature, parallel with the development of the new technologies. Classical approaches evolve into modern solutions in the adaptation process even some are becoming completely obsolete. The natural complications of an ordinary open surgery directed this evolution towards the term minimally invasive operations. Minimally invasive surgery (MIS), as a general term, uses or creates cavity in the body to reach the desired body part by using necessary tools. The aim is to give less pain to the patient by keeping less incision and tissue damage. However, there are still several problems for the education programs of related surgical procedures. For instance, defining and objectively measuring the surgical skill levels is a challenging process. In this regard, first a systematic review study is conducted to better understand the surgical skill level classification approaches. Afterwards, it is aimed to classify intermediate and novice surgical skills with higher accuracy compared to the previous classification efforts using any possible hand movement-oriented data gathered through virtual reality environments in an experimental study. The results show that it is possible to improve the classification more using different data engineering techniques based on a reproducible adapted framework. It is believed that, in the future, it is possible to adapt this research study effort to any virtual environment with a proper set of tools, the applicable software engineering efforts on top of data science discernment, as well as possible innovative machine learning approximations.
  • Item
    A STUDY OF DEVOPS ADOPTION IN SOFTWARE DEVELOPMENT ORGANIZATIONS: QUALITY, PRODUCTIVITY, AND SECURITY PERSPECTIVE
    (2023-01-30) OTAIWI, Ziadoon Abdullah; YAZICI, Ali; MISHRA, Alok
    These days, many software organizations are competing with each other to rapidly develop and deliver high-quality, reliable software. DevOps is the Development (Dev) and Operation (Ops) methodology in software development organizations and has become one of the favored methodologies in many leading companies; consequently, many organizations want to adopt this methodology. However, adopting DevOps in the software industry is a big challenge because it requires new tools, technologies, methods, culture, and experienced work teams to design reliable and deployable applications. Most of the current academic research surrounding DevOps seeks answers for how to adapt to this new methodology and how to improve performance in the organization; its focus is on velocity, quality, and productivity to produce these applications. This study aims to conduct an empirical study to fill the research gaps related to quality, productivity, and security issues in implementing the DevOps methodology in organizations. This quantitative study found that software quality, productivity, and security are improved when DevOps was adopted following the CALMS (Culture, Automation, Lean, Measurement, and Sharing) framework. However, according to quantitative data collected, there are some challenges and negative impacts on security when DevOps is adopted. This study also proposes the development of best practices, recommendations, and a model to facilitate the adoption of DevOps in organizations.
  • Item
    CLOUD COMPUTING SECURITY ISSUES AND SELECTION OF DEPLOYMENT MODEL AND SERVICE MODEL ACCORDING TO SECURITY REQUIREMENTS
    (2015-01-31) SEZEN, Arda; YAZICI, Ali; BOSTAN, Atila
    This thesis reviews the necessity of X.800 Recommendation service categories for different cloud service models and cloud deployment models together with some security solution approaches in cloud computing. The thesis evaluates the solution approaches to show that technical and non-technical approaches need to be handled together to produce comprehensive solutions. Six technical solution approach have been included to evaluate the fulfilment of X.800 Recommendation service categories. Eventually, twelve hypotheses have been formulated, tested, and accepted based on the survey data to understand the necessity of X.800 Recommendation service categories for different cloud service models and cloud deployment models.
  • Item
    AUTOMATED FUNCTIONAL SIZE MEASUREMENT FOR MULTI-TIER OBJECT RELATIONAL MAPPING ARCHITECTURES
    (2015-10-25) DEMİREL, Hamdi; ÖZKAN, Barış
    Software Functional Size Measurement methods are generic, and additional rules and concept mappings are required for specific software settings in order to improve the measurement objectivity and consistency. Although some operational definitions have been made for specific architectural style measurement procedures, there are still opportunities to improve measurement objectivity and consistency. These opportunities can be achieved through automation by minimizing measurer errors, time/effort costs and dependence to the development environment. In this study, a functional size measurement approach for Three-Tier Object Relational Mapping Business Application is proposed, and a prototype measurement tool and its results for validation are presented in case studies.
  • Item
    MAXIMIZING TARGET COVERAGE OF UNMANNED AERIAL VEHICLE CARRIED ON MOBILE PLATFORM
    (2015-12) SAVURAN, Halil; KARAKAYA, Murat
    This thesis proposes a solution approach for target mazimization problem for a range constrained unmanned aerial vehicle (UAV) carried on mobile platform. The problem is modeled with extending the Vehicle Routing Problem (VRP) with the constraints of range capacity and depot mobility and this novel extension is termed Capacitated Mobile Depot VRP (C-MoDVRP) throughout this study. Requirement of a novel solution approach dictated by the nature of this problem is satisfied by adapting a genetic algorithm (GA-CMoD) for the problem specific constraints. The motivation, problem definition, and development of the proposed solution along with its implementation are given in the thesis. Moreover, the performance of the proposed GA-CMoD is observed by extensive simulation tests under different problem constraints. The quality of the produced routes is compared with that of the alternative solution methods. The experiment test results indicate the success of the proposed solution over the alternative ones clearly.
  • Item
    A STUDY OF PARALLEL SORTING ALGORITHMS USING CUDA AND OpenMP
    (2015-10-23) GÖKAHMETOĞLU, Hakan
    This thesis reviews the parallel languages according to their computational complexities, in terms of time, while using sorting algorithms coded in CUDA and OpenMP. The thesis evaluates the solution for parallelism at a maintainable cost of money and other efforts, for achieving acceptable results of timing when compared to parallel languages together, as well as the sequential execution. The detailed timetables comparing timings from CUDA, OpenMP and sequential code, are present in related chapters. Eventually, the findings are examined to find the benefits of the parallel languages. The findings from the Chapter “Test and Comparisons” indicate that refactoring an algorithm to OpenMP language is easier when compared to CUDA language. However, results from comparing time values indicate that it is always the design of the algorithms, which makes it possible to achieve the performance that is expected of using the parallel languages.
  • Item
    THE ONLINE DIGITAL LIBRARY: A PROPOSED APPLICATION PLATFORM: MY LIBRARY
    (2016-12-17) Emusatar, Izdhar; Ertürk, Korhan Levent
    The libraries and information centers are characterized by continuous changes and the successive development. One of the most notably of them is the emergence of digital library which was the inevitable result to the development of information and communication. That was led to radical changes in the means of storing and processing the information and in the media that transmit them. Also, it has changes in the forms of organizing and exchanging the information. Thus, that has the positive effects in providing suitable and developed information services to the beneficiaries. As well as, the digital libraries give services which was not possible to provide with the traditional libraries according to the characteristics of the digital libraries which increase the importance of their services for beneficiaries, librarians and publishers alike. The study discusses the researches results and the debate about the digital libraries in terms of concept, developing, importance, the basic contents, the steps to transform to digital libraries, the services provided, the role of the digital library librarian and his skills and the design of comprehensive digital library with services that almost the same services provided by the existence digital libraries in order to access to results which may put the model to create an optimal digital library to meet the information needs of the academic society and support the educational process. The study includes four sections introduction, digital library infrastructure, a review on My Library project that been designed and conclusion and discussion.
  • Item
    A PROGRAMMING LANGUAGE FOR COMPONENT-BASED SOFTWARE DEVELOPMENT
    (2017-01-07) Delikelli, Ahmet; Çetinkaya, Deniz
    In this thesis, it is aimed to develop a programming language in which components are defined in the component-based software development process. It is provided that a component is appropriate for reuse and has a specific behavior by taking into account component based software engineering (CBSD). This programming language has been developed as a domain specific language (DSL). During the language development process, Xtext framework which works on Eclipse software development kit (SDK) has been used. The language is Java based and grammar of the programming language, syntax validation and translation into Java language has been implemented with Xtext framework. The proposed programming language has the most common features that a programming language should have. A case study has been implemented in order to show how the features of the language are used. The evaluation of the language is done by the case study and several examples that illustrate the usage of the language.
  • Item
    SCALABILITY ISSUES IN BIG DATA ON CLOUD: A COMPARISON OF VIRTUAL MACHINES AND LINUX CONTAINERS
    (2017-01-07) Gökhan, Cansu; Karakaya, Ziya; Yazıcı, Ali
    In recent years, Big Data and Cloud Computing are gained importance in IT and business. These two technologies are becoming as the complementing technologies in a way that the former requires performance scalability, huge amount of storage and the huge computation power, which are the key enabler technologies of Big Data Analytic, and the latter, Cloud Computing, brings the opportunity to scale the infrastructure on-demand, helps in utilizing computation resources and provides huge amount of storage space. Until the recent years, the only technique used in computation resource utilization was based on the hypervisor aided virtualization technique, which is used to create Virtual Machine (VM). Nowadays, another technique, which is faster and better in resource utilization, called container is getting its popularity. In this thesis, the CPU, memory, disk I/O and network performance of VM and container are compared in big data on cloud with using HiBench benchmarks. In addition, scalability ratios were evaluated by testing on different number of nodes. The results show that the containers have better performance and better scalability.
  • Item
    VEHICLE LOGO RECOGNITION USING IMAGE PROCESSING METHODS
    (2017-01-07) Albera, Sumia; Şengül, Gökhan
    Vehicle logo recognition is the ability to recognize and classify the vehicle logos in different conditions with high accuracy. This system plays significant role in monitoring systems, security and surveillance systems, such as the control system in government buildings and military camps. Vehicle logo recognition starts with reading the logo as an image, goes on analyzing and classifying of the logo. The goal of this study is to compare the performance of three methods used for vehicle logo recognition and determine the accuracy of each method in noisy environments and from images captured from different directions. The main methods used for vehicle logo recognition in this thesis are: SURF algorithm, LBP and GLCM. In addition, KNN is used as a classifier with LBP and GLCM features. These methods are tested on the data sets collected in two ways: gathering logo images from the website of the manufacturers and capturing logo images by a standard camera. Best result in this thesis for vehicle logo recognition was achieved by the SURF algorithm.
  • Item
    ASTUDY ON INTEGRATION OF AGILE WITH STRUCTURED SOFTWARE DEVELOPMENT PROCESSES
    (2017-01-07) Nura, Abdelmagid; Mishra, Alok
    Nowadays, Agile methodologies (AMs) have interred SDLC in all companies. Many organizations have used AMs and traditional methods to enhance öethodologies as an optimal solution in the business area. First, thinks about changes during SDLC; also customer may change his mind. So here is a need for the combination methodologies. Second, in spite of the fact that AMs can be beneficial to organizations, there is a need for traditional methodologies in some phases of the SDLC as a mixed framework.
  • Item
    A COMPONENT BASED MODEL DRIVEN SOFTWARE DEVELOPMENT FRAMEWORK FOR WEB-BASED APPLICATIONS
    (2017-01-07) Alrubaee, Afrah; Çetinkaya, Deniz
    Developing a high quality, cost effective, reliable and on time software systems is a challenging task due to the large size and complexity of these systems. Traditional developing approaches that are concerned with constructing software systems from scratch cannot be suitable for dealing with this challenge. For that reason several approaches have been introduced to increase the productivity of the development. Two of these approaches are component based software engineering and model driven software development. Component based software engineering (CBSE) has been introduced as a solution for software reusability problem by using reusable software components to build new software system. Model driven development (MDD) is another approach in software development that was introduced to increase productivity and decrease the cost and effort. MDD aims to face the challenges of software development process through representing the essential aspects of the required system as models and generating the final source code from these models. The aim of this work is proposing a software development framework that combines MDD and CBSE approaches for merging the advantages and features of these approaches to facilitate software development. The framework is used successfully to develop an e-learning system as a case study. The framework was evaluated by making a comparison between existing component based software development process models and our framework.
  • Item
    OBSERVATIONS ON EVOLUTION OF LEAN SOFTWARE DEVELOPMENT
    (2017-01-04) FARAJ, LLAHM OMAR; Mishra, Alok; Yazıcı, Ali
    This thesis reviews the observaitons on evolution of lean software development (LSD) and introduces Lena Method in detail. An observaiton on evalution of Lean Spftware development is presented and the method involving experimental authors who described the methodology in many phases. LSD is one of the powerful, agile software development (ASD). The objective of LSD is to create customer value and deliver fast within budget. LSD can improve business domain by adopting Lps according to the business need.
  • Item
    A MODEL FOR EVALUATION OF USER TRUST TO CLOUD SERVICE PROVIDERS
    (2017-04-02) İnceler, Deniz Koray; Bostan, Atila; Turhan, Çiğdem
    This thesis reviews the trust on the cloud computing environment from the viewpoint of cloud service users by developing a multiview metric to evaluate diverse cloud service providers. The approaches to user trust concept are studied to show that evaluation of trust necessitates both technical and non-technical approaches that need to be assessed together to obtain an all-in exclusive solution. Trust has been studied in six different domain approaches to fulfill the requirements of cloud users. The motivation in this study is to develop a trust-scale that consists of metrics which are based on observable facts. Such a trust-scale is expected to help cloud users in their trust evaluation of different cloud service providers. Ultimately, the trust-scale is formed with its metrics and subparts and fine-tuned by using the survey data as to map the expert point of view. The proposed evaluation methodology and scale helps cloud users in their trust assessment of diverse cloud service providers using observable and quantifiable metrics. As a result, the accuracy tests of the metric that is developed in this study resulted as %95 accurate with the expert point-of-view. This accuracy test result points out that the trust scale is capable to evaluate trust at a sufficient level of trust.
  • Item
    COMPUTER VISION AND MACHINE LEARNING BASED ADAPTABLE CONVERSION METHOD FOR ANY LIGHT MICROSCOPE TO AUTOMATED CELL COUNTER BY TRYPAN BLUE DYE-EXCLUSION
    (2017-07-02) Özkan, Akın; İşgör, Sultan Belgin; Şengül, Gökhan
    Almost all of the cell biology experiments involve counting of cells regularly to monitor cell proliferation and viability. Knowledge of the cell quantity and quality are important parameters for the experimental standardization and toxicity impact estimation. There are two different approaches to count the cells, such as, hemocytometer-based manual counting, and usage of an automated cell counter. Either of the methods have their advantages and disadvantages. High investment and operational cost limit the wide range usage of automated cell counters. On the other hand, manual cell counting based on hemocytometer has various limitations by the fact that reliability of cell counting highly depends on operator’s experience. Moreover, high estimation time requirement and human labor are two more drawbacks of the manual process. This thesis proposes state-of-the-art alternative method (i.e. framework) for the cell counting by defining computer vision and machine learning based conversion methodology. The basis of the proposed method is the adaptation of hemocytomer-based manual counting to automated procedure by adding middleware decision software to reduce its shortcomings. In addition, two novel data sets are collected to test our proposed method in terms of cell counting (i.e non-stained) and cell viability analysis (i.e. stained). The datasets are available for non-profit public usage from “biochem.atilim.edu.tr/datasets/” which will be baseline to future studies on this research domain. Both datasets contain two different types of cancer cell images, namely, caucasian promyelocytic leukemia (HL60), and chronic myelogenous leukemia (K562). From our experimental results, our method reaches up to 92% and 74% in terms of recall scores for HL60 and K562 cancer cells, respectively, with the high precision. The experimental results also validate that the proposed method can be a powerful alternative to the current cell counting approaches.
  • Item
    A COMPARATIVE STUDY OF E-GOVERNMENT EVOLUTION IN AFRICA
    (2022-03-01) El-Asheibi, Nagat; Mishra, Alok
    States are constantly striving to improve their services to their citizens, trying to reach them through the Internet in order to be able to explain their policies and be effective. The delivery of public information and services to citizens through the Internet channel is considered e-government. The e-government uses information technology to serve citizens, businesses and institutions. There are various factors that affect e-government. In general, researchers have examined e-government studies that have been put into practice by various African countries. The purpose of this study is to explore the possibilities offered by e-Government in Africa by documenting few initiatives on the continent that have developed innovative models that contribute to governments through the implementation. To achieve the aim of the thesis, we present former works and e-government evolution in Africa with discussion on the evolution of e-government in different African countries (Libya, Egypt, Botswana, Sudan, South Africa, Nigeria, Gambia, Ghana, Uganda, Kenya, and Mauritius).
  • Item
    AN INTELLIGENT SYSTEM FOR EXERCISE PLANNING AND PHYSICAL ACTIVITY RECOGNITION USING MOBILE TECHNOLOGIES
    (2022-02-28) Kalem, Güler; Turhan, Çiğdem
    Intelligent guidance in the healthcare domain using mobile technologies is an important development since users can benefit from the individual exercise plans that are specifically designed for their purpose, demographic information and health background. Furthermore, with the system continuously tracking their activities, the users are motivated and guided to complete their daily specified exercises. The developed system determines the specific exercise program suitable to the user with case-based reasoning. With the help of the accelerometer and gyroscope facilities of a mobile phone, users' activities are recognized and classified using KNN (K-Nearest Neighbors) algorithm. Based on their individual exercise routine and the performed activities in the current day, the rest of the exercises are calculated and presented to the user as a message to guide and encourage them. For the evaluation, the system is tested by users, and a questionnaire is conducted. The results show that the system is found to be beneficial and effective by all the participants.
  • Item
    DEVELOPMENT OF A PARALLEL-EXTENSIBLE GENERIC BOUNDARY ELEMENT METHOD APPLICATION FRAMEWORK
    (2022-02-28) Bayındır, Hakan; Yazıcı, Ali; Baranoğlu, Besim
    A new framework for the solution of engineering problems using Boundary Element Method is presented. The developed framework presents a new programming model which provides complete problem solutions called Flows, and ways to extend a sci entific computing framework, the addition of new capabilities or tuning for special problems are easier by providing programming units to build customized Flows. Pre sented framework makes implementation of high performance and parallel algorithms easier by introducing a layered and modularized structure. The framework is tested by implementing two Flows for elastostatic and Laplace problems, and the frame work achieved its goals by solving the problems accurately, using parallel algorithms and with minimum effort.
  • Item
    THE OBSTACLES FACING THE IMPLEMENTATION OF E-GOVERNMENT SERVICES : AN EMPIRICAL STUDY FOR LIBYA
    (2022-02-28) Elsteel, Nouryah Omar Salim; YAZICI, Ali
    This study focuses on the rise of e-government services, specifically considers Libya as an example on its efforts and challenges with respect to implementing of an e-government services initiative. E-government services represent a fundamental transfer in the design and methods of government efficiency, responsibility and commitment. However, Libya in particular seems to face steep and unique challenges when it comes to the implementation of e-government services. The country often seems to lack sufficient resources, infrastructure, and know how to implement a large scale e-government services project.Furthermore, a large number of the Libyan population often have little contact with computers and the internet , and may be distrustful of technology and their government. Primarily, this study aims to clarify the challenges and suggest strategies to overcome them.
  • Item
    MONITORING THROUGH EYE-MOVEMENT DATA IN CONTEXT AWARE ADAPTIVE SOFTWARE SYSTEMS: A CASE STUDY ON ENDO NEUROSURGERY TRAINING PROGRAM
    (2022-02-25) Menekşe Dalveren, Gonca Gökçe; Çağıltay, Nergiz Ercil
    Today, modern software is becoming very complex which needs to be compatible with constant changes in the environment. They required to support autonomic behaviors by monitoring the relevant phenomena of the environment and analyzing the collected data to better understand the possible consequences of the changes in the environment. In other words, by monitoring the relevant phenomena of the environment and analyzing the collected data to better understand the possible consequences of the changes in the environment, these type of software adapt themselves to the environment. Context defined as anything that can be observed by the software system including end-user, computing, and primary features of identity, location, time, and physical conditions at runtime. Hence, Context aware adaptive software (CAASS) architecture can be implemented at different levels for different purposes by monitoring a wide range of data. However, currently there is no conceptual framework showing the level and scope of the adaptation performed by these systems. Accordingly, in this study, first the related literature is examined to investigate the main dimensions of CAASS. Afterwards, a conceptual framework is proposed to address the level and scope of adaptation performed by a specific CAASS. The proposed framework has three dimensions namely the definition of the context of the adaptation, definition of the event that is planned to be adapted and finally the plan showing how the adaptation aimed to be performed. Additionally, a case study is also conducted for endo-neurosurgery education programs through the proposed conceptual framework. Results showed that by monitoring eye-movement events of the surgeons, their skill levels can be estimated with a high precision (91.3%). Accordingly, for this specific case, it is shown that, through the eye-movement events of surgeons, the content can be adapted according to the behaviors of the surgeons. The results of this study show evidences that, by regularly assessing their skill levels and evaluating the difficulty levels of each computer-based simulation scenario through eye movement events of the trainees, order of these scenarios in the curriculum can be adapted to the user skill levels and behaviors under different hand conditions. This will help to create a specific curriculum for each trainee that is adapted dynamically to their skill and knowledge. This study has two main contributions. First it proposes a conceptual model that can be used to evaluate the scope and the level of adaptation for CAASS. This information may help the researchers and the developers to better evaluate and compare the CAASS. The second contribution of this thesis study is the implementation of the proposed model on endo-neurosurgery domain. The field of endo-neurosurgery education programs have several problems. The main problem of these programs is the skill-based training opportunities. As the training and skill development had to be provided in the operating room, there are several drawbacks of these education programs such as the ethical considerations from the patients’ perspective, limited time and cases as well as the risk of patient safety. Currently, there are not many alternative training opportunities for the surgical training programs. As the skill improvement is very critical for these programs, the individual skill-based training opportunities are required. Even there are some examples of computer-based simulations for supporting surgical training programs, there are very limited examples of curriculum integrated models. Additionally, there is no instructional model of CAASS for the surgical education programs especially in the endo-neurosurgery education programs. We believe that, because of its very nature, CAASS approach may provide several benefits for the endo-neurosurgery education programs. However, as the process of creating CAASS for the field of endo-neurosurgery education programs is a very complex, in this thesis study a level of CAASS conceptual model is proposed. The findings of this thesis study is aimed to help future studies to better build CAASS for the field of endo-neurosurgery education programs and to better integrate these systems into the current educational programs.