Browsing by Author "Koyuncu, Murat"
Now showing 1 - 20 of 87
- Results Per Page
- Sort Options
Article A Comprehensive Assessment Plan for Accreditation in Engineering Education: A Case Study in Turkey(International Journal of Engineering Education, 2015) Turhan, Çiğdem; Şengül, Gökhan; Koyuncu, Murat; Information Systems Engineering; Software Engineering; Computer EngineeringThis paper describes the procedure followed by Computer Engineering and Software Engineering programs at Atilim University, Ankara, Turkey, which led to the granting of five years of accreditation by MUDEK, the local accreditation body authorized by The European Network for Accreditation of Engineering Education (ENAEE) to award the EUR ACE label, and a full member signatory ofWashington Accord of International Engineering Alliance (IEA). It explains the organizational structure established for preparation, determination and measurement of the educational objectives, program outcomes, course outcomes, and the continuous improvement cycle carried out during the preparation period. The aim of the paper is to share methods and experiences which may be beneficial for the other programs that are intended for accreditation.Master Thesis Akıllı telefonlar için mobil uygulama ve web tarayıcı kullanımınının araştırılması(2017) Othman, Safa; Koyuncu, Murat; Information Systems EngineeringMobil uygulama ve hizmetlerinin akıllı telefon kullanıcıları tarafından kullanımı son yirmi yıldır sürekli artış göstermektedir. Farklı amaçlar ve hedefler doğrultusunda bu alanda farklı amaçlarla çalışmalar yapılmıştır. Bu tez kapsamında yapılan çalışmanın amacı; akıllı telefon kullanıcılarının cihazlarında farklı internet erişim ihtiyaçları için mobil uygulama veya mobil web siteleri tercihlerini anlamaya yöneliktir. Bulgularımız mobil uygulama geliştiricilerinin, Türk tüketicisinin ortalama temel özeliklerini ve Türk tüketicisinin mobil kullanım beklentilerini anlamaları bakımından yararlı olacaktır. Çalışma iki evrede yürütülmüştür. Birinci evrede, Atılım Üniversitesi'nden 158 katılımcı ile bir anket çalışması yapılmıştır. İkinci evrede ise gerçekleştirilmiş iki uygulamanın (bir yerel mobil uygulaması ve bir mobil web sitesi) test edilmesine dayalı 30 katılımcı ile görüşmeler düzenlenmiştir. Toplanmış veri farklı istatiksel metotlar kullanılarak analiz edilmiştir. Elde edilen sonuçlar; özellikle yaygın ve sık kullanılan uygulamalar açısından mobil uygulamaların daha çok tercih edildiğini göstermiştir. Bunun yanı sıra katılımcılar mobil uygulamaları çoğu yönden daha iyi bulmuşlardır. Yine de tercihini mobil web sitelerden yana yapan katılımcıların oranı da göz ardı edilemeyecek seviyededir.Article Citation Count: 3APPLICATION OF FNBDT/SCIP PROTOCOL ON LOCAL AREA NETWORK AND DETERMINATION OF LIMIT VALUES(Gazi Univ, Fac Engineering Architecture, 2010) Dilli, Orkun; Akcam, Nursel; Koyuncu, Murat; Information Systems EngineeringFast progress in technologies affects all the domains as well as the communication systems. Different types of systems or devices are developed and given to the services without losing time. Although these progresses, in general, have positive effects sometimes they may cause some problems. One of these problems is that the different terminal devices based on ISDN, PSTN and IP cannot communicate end-to-end with each other in a seamless secure way. In this study, FNBDT (Future Narrow Band Digital Terminal)/SCIP (Secure Communication Interoperability Protocol) protocol, which is developed for end-to-end secure communication of different terminal devices communicating on different networks, is tested from different perspectives using terminal emulator on IP Networks. These types of study have great importance in terms of providing some feedbacks to the development of FNBDT/SCIP and, as one of the initial work on this topic, this study will contribute to the future works in the area.Article Citation Count: 3Application of FNBDT/SCIP protocol on local area network and determination of limit values;(2010) Dilli,O.; Akçam,N.; Koyuncu,M.; Information Systems EngineeringFast progress in technologies affects all the domains as well as the communication systems. Different types of systems or devices are developed and given to the services without losing time. Although these progresses, in general, have positive effects sometimes they may cause some problems. One of these problems is that the different terminal devices based on ISDN, PSTN and IP cannot communicate end-to-end with each other in a seamless secure way. In this study, FNBDT (Future Narrow Band Digital Terminal)/SCIP (Secure Communication Interoperability Protocol) protocol, which is developed for end-to-end secure communication of different terminal devices communicating on different networks, is tested from different perspectives using terminal emulator on IP Networks. These types of study have great importance in terms of providing some feedbacks to the development of FNBDT/SCIP and, as one of the initial work on this topic, this study will contribute to the future works in the area.Master Thesis Bilgi güvenlik yöneticileri için anahtar yeterlikleri anlamak: Bir Delphi yöntem çalışması(2017) Haqaf, Husam; Koyuncu, Murat; Information Systems EngineeringBilgi Güvenliği Yönetimi (ISM), bilgilerini değerli varlıkları olarak düşünen tüm kurum ve kuruluşlar için bir zorunluluktur. Bu nedenle, bilgi güvenliğinin geliştirilmesi, denetlenmesi ve yönetilmesi, gerekli bilgi güvenliği yönetişimini gerçekleştirebilecek mesleki yeteneğe bağlıdır. Bu araştırma, alanındaki yeterliliği koruması gereken bilgi güvenliği yöneticileri için en önemli becerileri ve mesleki sertifikalar yoluyla bu becerileri kazanma yöntemlerini ortaya çıkarmayı amaçlamaktadır. Çalışma, literatür taraması ile bir liste yeterlik oluşturulması ve asgari uzmanlığa sahip uzmanlar tarafından listenin %20'sinden azında bir fikir birliğine ulaşılıncaya kadar listenin değiştirilmesini içeren bir Delphi yöntemini kullanmaktadır. Bilgi Güvenliği standartları, çerçeveleri ve çalışmaları hakkında bir literatür araştırması yapılarak ve uzmanlardan bir veri toplama turu yapılarak, 5 kategori altında toplam 82 beceri derlenmiştir. Delphi metodu ile yapılan çalışmalarda tavsiye edildiği gibi, uygunluk ve sıralama turları sonrasında, 7 puanlık bir Likert ölçeğinde en az 3.25 ortalama puan alan ve tüm listenin %19,51'ini oluşturan yeterlikler alınmıştır. Elde edilen nihai yeterliklerin %43,75'i temel bilgi güvenliği becerilerini içermektedir ve bu becerileri edinmek için CISSP, CISA ve CISM gibi sertifikalar önerilmektedir.Master Thesis Bilgi ve iletişim teknolojileri ile ters tedarik zinciri yönetimi geliştirilmesi(2015) Germiyanoğlu, Sercan Noyan; Koyuncu, Murat; Information Systems EngineeringA SCM system having RSCM capabilities is modeled giving special focus on the usage of ICT. Three different RSCM processes (Customer Return, Out-of-product Return and Repair and Non-Repair Situation Return) are modeled separately using sequence diagram of UML and ICT usage is analyzed in each one to improve the process. These modeled processes are compared with the RSCM model of a company to determine its applicability in real life. The aim of the study is to show how the RSCM processes can be improved by efficient usage of ICT. Companies that can achieve this can gain competitive advantages over their competitors. This study is important to alleviate the lack of studies in this field and may help to companies having intension to improve their RSCM.Master Thesis Bulut bilişimde dikey ve yatay ölçeklenebilirlik konusunda bir literatür taraması(2019) Tayeb, Abdulsalam Salım Tayeb; Koyuncu, Murat; Information Systems EngineeringBulut bilişim, fizik, bilim, işletme ve benzeri çeşitli alanlarda veri üretiminin genişlemesi nedeniyle sektörde popülerlik kazanmıştır. Ölçeklenebilirlik bulutlarda önemli bir rol oynayabilir ve performanslarını artırabilir. Ölçeklenebilirliğin önemi, talep arttığında ek kaynaklar ekleyerek artan iş yükleriyle başa çıkma kabiliyetinde yatmaktadır. Genellikle, iki tür ölçeklenebilirlik vardır: yatay ölçeklenebilirlik ve dikey ölçeklenebilirlik. Dolayısıyla literatürde farklı ölçeklenebilirlik sınıflamaları vardır. Bu tez, farklı ölçütlere dayanan farklı sınıflandırmalar dahil olmak üzere buluttaki mevcut tüm ölçeklenebilirlik tekniklerini inceleyen kapsamlı bir araştırma olarak tasarlanmıştır. Bu çalışmada temel olarak dikey ve yatay ölçeklenebilirlik yöntemleri incelenmiştir. Ek olarak, her ikisi için de kullanılan teknolojiler araştırılmıştır. Ayrıca, ölçeklenebilirlik ile ilgili araştırma yayınları farklı açılardan değerlendirilmiştir. Belirlenen hedefe ulaşmak için ölçeklenebilirlik konusunda sistematik bir haritalama çalışması yapılmıştır.Conference Object Citation Count: 9A Case Study on Measuring the Size of Microservices(Springer international Publishing Ag, 2018) Vural, Hulya; Koyuncu, Murat; Misra, Sanjay; Information Systems Engineering; Computer EngineeringIn cloud computing, the microservices has become the mostly used architectural style. However, there is still an ongoing debate about how big a microservice should be. In this case study, a monolith application is measured using Common Software Measurement International Consortium (COSMIC) Function Points. The same application is divided into pieces by following the Domain Driven Design (DDD) principles. The resulting cloud friendly microservices are measured again using COSMIC Function Points and the obtained results are compared.Master Thesis Çoklu erişim noktası bulunan ortamlarda bant genişliği kullanımını artırmaya yönelik bir öneri(2009) Gerçek, Mehmet Kazım; Koyuncu, Murat; Information Systems EngineeringKesintisiz Internet erişimine duyulan talep doğrultusunda kablosuz iletişimin popülaritesi de artmaktadır. Ancak, kablosuz iletişimin klasik kablolu iletişime göre bazı sorunları olduğu bilinmektedir. Geniş uygulama alanı bulunan kablosuz yerel alan ağı uygulamalarında, mevut erişim noktaları arasında yük dağılımı konusu özel bir önem arz etmektedir. Kablosuz bilgisayarların, klasik yaklaşım olan alınan sinyal gücü endeksi (RSSI) ve gürültü oranını (SNR) dikkate alarak erişim noktalarına bağlandığı durumlarda yük dağılımının sağlanması mümkün olmamaktadır. Geçmişte, merkezi bir sunucu üzerinden, belirli bir model kablosuz erişim noktası kullanarak veya protokol değişiklikleri ile yük dağılımı dengeleme çözümleri önerilmiş, ancak genel kabul görmüş bir çözüme ulaşılamamıştır.Bu çalışmada, merkezi bir sunucu istemeyen ve mevcut altyapıda hiçbir değişiklik gerektirmeyen bir çözüm önerisinde bulunulmuştur. Önerilen model, tüm kablosuz bilgisayarlar üzerinde bağımsız olarak çalışan bir uygulamanın dinamik olarak en az yüklü erişim noktasını tespit ederek ona bağlanmasını ve böylece yük dağılımını ve sonrasında toplam bant genişliği kullanımını artırmayı hedeflemektedir.Conference Object Citation Count: 0Comparison of QoS Architectures for VoIP Traffics in IPv4 and IPv6(Ieee, 2016) AL-Fayyadh, Hayder; Koyuncu, Murat; Information Systems EngineeringThe Internet has become an integral part of human's life with an ever increasing number of applications and services that it provides to its customers. Both the numbers of Internet users and services provided by the Internet continue to rise tremendously. Quality of Service (QoS) is the ability of a network to provide better services for the users to divide the bandwidth according to the needs of different applications. With an increase in demand for multimedia applications like video streaming, VoIP and video conferencing, larger bandwidth requirement increases drastically since such applications are very sensitive to delay, packet loss, and jitter. IPv6 has new features which are designed to improve QoS supported by IPv4, as well as other improvements. This paper gives a comparative analysis of QoS architectures, namely Integrated Services (IntServ) and Differentiated Services (DiffServ), which are examined to see their effects for Voice over IP (VoIP) in IPv4 and IPv6 environments. For comparisons, OPNET Modeler is used for network modeling and testing. The obtained test results show the importance of IPv6 to support multimedia applications on the Internet.Conference Object Citation Count: 2Comparison of QoS architectures for VoIP traffics in IPv4 and IPv6(Institute of Electrical and Electronics Engineers Inc., 2017) Al-Fayyadh,H.; Koyuncu,M.; Information Systems EngineeringThe Internet has become an integral part of human's life with an ever increasing number of applications and services that it provides to its customers. Both the numbers of Internet users and services provided by the Internet continue to rise tremendously. Quality of Service (QoS) is the ability of a network to provide better services for the users to divide the bandwidth according to the needs of different applications. With an increase in demand for multimedia applications like video streaming, VoIP and video conferencing, larger bandwidth requirement increases drastically since such applications are very sensitive to delay, packet loss, and jitter. IPv6 has new features which are designed to improve QoS supported by IPv4, as well as other improvements. This paper gives a comparative analysis of QoS architectures, namely Integrated Services (IntServ) and Differentiated Services (DiffServ), which are examined to see their effects for Voice over IP (VoIP) in IPv4 and IPv6 environments. For comparisons, OPNET Modeler is used for network modeling and testing. The obtained test results show the importance of IPv6 to support multimedia applications on the Internet. © 2016 IEEE.Conference Object Citation Count: 1Comparison of scheduling algorithms for multimedia applications in IPv4 and IPv6(Institute of Electrical and Electronics Engineers Inc., 2015) Koyuncu,M.; Al-Fayyadh,H.; Information Systems EngineeringProviding guaranteed services in the Internet has become extremely essential to fulfill the requirements of the Internet users. With an increase in the number of users and demand for multimedia applications like video streaming, VoIP and video conferencing, larger bandwidth requirement increases drastically since such applications are very sensitive to delay, packet loss, and jitter. In such an environment, Quality of Service (QoS) is an important network performance parameter having a significant impact on multimedia applications. Besides other improvements, IPv6 was designed to improve QoS supported by IPv4. This paper gives a comparative analysis of three well-known queuing algorithms (First-in, First-Out-FIFO, Priority Queuing-PQ and Weighted-Fair Queuing-WFQ) which are examined to see their effects for multimedia applications in the IPv4 and IPv6 networks. OPNET is used for modeling, simulation and analyzing. Although IPv6 with PQ provides best performance for multimedia applications, IPv6 with WFQ is more appropriate when low priority traffic is also available. © 2015 IEEE.Conference Object Citation Count: 0Comparison of Scheduling Algorithms for Multimedia Applications in IPv4 and IPv6(Ieee, 2015) Koyuncu, Murat; AL-Fayyadh, Hayder; Information Systems EngineeringProviding guaranteed services in the Internet has become extremely essential to fulfill the requirements of the Internet users. With an increase in the number of users and demand for multimedia applications like video streaming, VoIP and video conferencing, larger bandwidth requirement increases drastically since such applications are very sensitive to delay, packet loss, and jitter. In such an environment, Quality of Service (QoS) is an important network performance parameter having a significant impact on multimedia applications. Besides other improvements, IPv6 was designed to improve QoS supported by IPv4. This paper gives a comparative analysis of three well-known queuing algorithms (First-in, First-Out-FIFO, Priority Queuing-PQ and Weighted-Fair Queuing-WFQ) which are examined to see their effects for multimedia applications in the IPv4 and IPv6 networks. OPNET is used for modeling, simulation and analyzing. Although IPv6 with PQ provides best performance for multimedia applications, IPv6 with WFQ is more appropriate when low priority traffic is also available.Conference Object Citation Count: 0A component-based object detection method extended with a fuzzy inference engine(Institute of Electrical and Electronics Engineers Inc., 2015) Koyuncu,M.; Cetinkaya,B.; Information Systems EngineeringIn this paper, we propose a component-based object detection method extended with the fuzzy inference technique. The proposed method detects constituent components of a complex object instead of a whole object in images. For component detection, multiple multi-class support vector machines (SVM) are used in parallel. Each SVM classifies the candidate component using a different low-level image feature. The obtained results are fused to reach a decision about the component. Then, a fuzzy object extractor determines the whole object considering the detected components and their geometric configurations. The fuzzy object extractor is a fuzzy inference engine which tests various combinations of detected components and their fuzzified directions and distances. The initial tests yield promising results and encourage further studies to extend proposed method. © 2015 IEEE.Conference Object Citation Count: 0A Component-Based Object Detection Method Extended with a Fuzzy Inference Engine(Ieee, 2015) Koyuncu, Murat; Cetinkaya, Basar; Information Systems EngineeringIn this paper, we propose a component-based object detection method extended with the fuzzy inference technique. The proposed method detects constituent components of a complex object instead of a whole object in images. For component detection, multiple multi-class support vector machines (SVM) are used in parallel. Each SVM classifies the candidate component using a different low-level image feature. The obtained results are fused to reach a decision about the component. Then, a fuzzy object extractor determines the whole object considering the detected components and their geometric configurations. The fuzzy object extractor is a fuzzy inference engine which tests various combinations of detected components and their fuzzified directions and distances. The initial tests yield promising results and encourage further studies to extend proposed method.Article Citation Count: 8A Comprehensive Assessment Plan for Accreditation in Engineering Education: A Case Study in Turkey(Tempus Publications, 2015) Turhan, Cigdem; Sengul, Gokhan; Koyuncu, Murat; Information Systems Engineering; Software Engineering; Computer EngineeringThis paper describes the procedure followed by Computer Engineering and Software Engineering programs at Atilim University, Ankara, Turkey, which led to the granting of five years of accreditation by MUDEK, the local accreditation body authorized by The European Network for Accreditation of Engineering Education (ENAEE) to award the EUR-ACElabel, and a full member signatory of Washington Accord of International Engineering Alliance (IEA). It explains the organizational structure established for preparation, determination and measurement of the educational objectives, program outcomes, course outcomes, and the continuous improvement cycle carried out during the preparation period. The aim of the paper is to share methods and experiences which may be beneficial for the other programs that are intended for accreditation.Article Citation Count: 10A comprehensive assessment plan for accreditation in engineering education: A case study in Turkey(Tempus Publications, 2015) Turhan,C.; Sengul,G.; Koyuncu,M.; Energy Systems Engineering; Information Systems Engineering; Computer EngineeringThis paper describes the procedure followed by Computer Engineering and Software Engineering programs at Atilim University, Ankara, Turkey, which led to the granting of five years of accreditation by MUDEK, the local accreditation body authorized by The European Network for Accreditation of Engineering Education (ENAEE) to award the EUR-ACElabel, and a full member signatory of Washington Accord of International Engineering Alliance(IEA). It explains the organizational structure established for preparation, determination and measurement of the educational objectives, program outcomes, course outcomes, and the continuous improvement cycle carried out during the preparation period. The aim of the paper is to share methods and experiences which may be beneficial for the other programs that are intended for accreditation. © 2015 TEMPUS Publications.Review Citation Count: 5Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study(Taylor & Francis inc, 2022) Barik, Kousik; Misra, Sanjay; Konar, Karabi; Fernandez-Sanz, Luis; Murat, Koyuncu; Information Systems Engineering; Computer EngineeringCyber attacks are increasing rapidly due to advanced digital technologies used by hackers. In addition, cybercriminals are conducting cyber attacks, making cyber security a rapidly growing field. Although machine learning techniques worked well in solving large-scale cybersecurity problems, an emerging concept of deep learning (DL) that caught on during this period caused information security specialists to improvise the result. The deep learning techniques analyzed in this study are convolution neural networks, recurrent neural networks, and deep neural networks in the context of cybersecurity.A framework is proposed, and a real-time laboratory setup is performed to capture network packets and examine this captured data using various DL techniques. A comparable interpretation is presented under the DL techniques with essential parameters, particularly accuracy, false alarm rate, precision, and detection rate. The DL techniques experimental output projects improvise the performance of various real-time cybersecurity applications on a real-time dataset. CNN model provides the highest accuracy of 98.64% with a precision of 98% with binary class. The RNN model offers the second-highest accuracy of 97.75%. CNN model provides the highest accuracy of 98.42 with multiclass class. The study shows that DL techniques can be effectively used in cybersecurity applications. Future research areas are being elaborated, including the potential research topics to improve several DL methodologies for cybersecurity applications.Article Citation Count: 3A Deep Neural Network-Based Advisory Framework for Attainment of Sustainable Development Goals 1-6(Mdpi, 2020) Emmanuel, Okewu; Ananya, M.; Misra, Sanjay; Koyuncu, Murat; Information Systems Engineering; Computer EngineeringResearch in sustainable development, program design and monitoring, and evaluation requires data analytics for the Sustainable Developments Goals (SDGs) not to suffer the same fate as the Millennium Development Goals (MDGs). The MDGs were poorly implemented, particularly in developing countries. In the SDGs dispensation, there is a huge amount of development-related data that needs to be harnessed using predictive analytics models such as deep neural networks for timely and unbiased information. The SDGs aim at improving the lives of citizens globally. However, the first six SDGs (SDGs 1-6) are more relevant to developing economies than developed economies. This is because low-resourced countries are still battling with extreme poverty and unacceptable levels of illiteracy occasioned by corruption and poor leadership. Inclusive innovation is a philosophy of SDGs as no one should be left behind in the global economy. The focus of this study is the implementation of SDGs 1-6 in less developed countries. Given their peculiar socio-economic challenges, we proposed a design for a low-budget deep neural network-based sustainable development goals 1-6 (DNNSDGs 1-6) system. The aim is to empower actors implementing SDGs in developing countries with data-based information for robust decision making.Article Citation Count: 3Designing Senior Graduation Project Course for Computing Curricula: An Active Learning Approach(Tempus Publications, 2010) Kilic, Hurevren; Koyuncu, Murat; Rehan, Mohammad; Computer Engineering; Information Systems EngineeringThis paper proposes an active learning-based design approach to senior graduation project courses for computing curricula. The proposed approach focuses mainly on course requirements including increasing the interaction between instructor and project team members; providing better and fair student/team performance assessment; encouraging students to practise life-cycle driven development; preparing students for role-based team-working; motivating students to communicate with experts from industry and supporting cooperation between students. It is observed that implementation of the proposed approach increases the student course satisfaction level while higher quality student projects are achieved.