Browsing by Author "Yazici,A."
Now showing 1 - 20 of 23
- Results Per Page
- Sort Options
Article Citation Count: 0An adaptive element division algorithm for accurate evaluation of singular and near singular integrals in 3D(Turkiye Klinikleri, 2021) Yazıcı, Ali; Baranoğlu,B.; Baranoğlu, Besim; Software Engineering; Manufacturing EngineeringAn adaptive algorithm for evaluation of singular and near singular integrals in 3D is presented. The algorithm is based on successive adaptive/selective subdivisions of the element until a prescribed error criteria is met. For evaluating the integrals in each subdivision, Gauss quadrature is applied. The method is computationally simple, memory efficient and can be applied for both triangular and quadrilateral elements, including the elements with nonplanar and/or curved surfaces. To assess the method, several examples are discussed. It has shown that the algorithm performs well for singular and near-singular integral examples presented in the paper and evaluates the integrals with very high accuracy. © TÜBİTAKConference Object Citation Count: 6A casestudy of data models in data warehousing(2008) Yazıcı, Ali; Yazici,A.; Mıshra, Deepti; Software Engineering; Computer EngineeringData warehousing (DW) provides an excellent approach in transforming operational data into useful and reliable information to support the decision making process in any organization. In this paper, a case study is performed to implement a DW. This case-study is used to describe and compare various conceptual and logical design models for data warehousing. This comparison is done to find which of the conceptual and logical data models are more appropriate for implementing data warehouse for sales and shipping system. ©2008 IEEE.Conference Object Citation Count: 22A Comparison of Stream Processing Frameworks(Institute of Electrical and Electronics Engineers Inc., 2017) Yazıcı, Ali; Yazici,A.; Karakaya, Ziya; Software Engineering; Computer EngineeringThis study compares the performance of Big Data Stream Processing frameworks including Apache Spark, Flink, and Storm. Also, it measures the resource usage and performance scalability of the frameworks against a varying number of cluster sizes. It has been observed that, Flink outperforms both Spark and Storm under equal constraints. However, Spark can be optimized to provide the higher throughput than Flink with the cost of higher latency. © 2017 IEEE.Conference Object Citation Count: 22A Comparison of Stream Processing Frameworks(Institute of Electrical and Electronics Engineers Inc., 2017) Yazıcı, Ali; Yazici,A.; Karakaya, Ziya; Software Engineering; Computer EngineeringThis study compares the performance of Big Data Stream Processing frameworks including Apache Spark, Flink, and Storm. Also, it measures the resource usage and performance scalability of the frameworks against a varying number of cluster sizes. It has been observed that, Flink outperforms both Spark and Storm under equal constraints. However, Spark can be optimized to provide the higher throughput than Flink with the cost of higher latency. © 2017 IEEE.Conference Object Citation Count: 11A Decentralized Application for Secure Messaging in a Trustless Environment(Institute of Electrical and Electronics Engineers Inc., 2019) Yazıcı, Ali; Culha,D.; Çulha, Davut; Software EngineeringBlockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol. © 2018 IEEE.Conference Object Citation Count: 11A Decentralized Application for Secure Messaging in a Trustless Environment(Institute of Electrical and Electronics Engineers Inc., 2019) Yazıcı, Ali; Culha,D.; Çulha, Davut; Software EngineeringBlockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol. © 2018 IEEE.Conference Object Citation Count: 3Flexible content extraction and querying for videos(2011) Yazıcı, Ali; Koyuncu,M.; Koyuncu, Murat; Yilmaz,T.; Sert,M.; Software Engineering; Information Systems EngineeringIn this study, a multimedia database system which includes a semantic content extractor, a high-dimensional index structure and an intelligent fuzzy object-oriented database component is proposed. The proposed system is realized by following a component-oriented approach. It supports different flexible query capabilities for the requirements of video users, which is the main focus of this paper. The query performance of the system (including automatic semantic content extraction) is tested and analyzed in terms of speed and accuracy. © 2011 Springer-Verlag.Conference Object Citation Count: 1A framework for fuzzy video content extraction, storage and retrieval(2010) Yazıcı, Ali; Yilmaz,T.; Koyuncu, Murat; Yazici,A.; Software Engineering; Information Systems EngineeringThis study presents a new comprehensive framework for semantic content extraction from raw video, storage of the extracted data and retrieval of the stored data. Objects, spatial relations between objects, events and temporal relations between events, which are considered as semantic contents of the video, are extracted automatically to a certain extend with the developed approach. Extraction process is supported by manual annotation when automatic extraction is not satisfactory. The extracted information is stored in an intelligent fuzzy object-oriented database in which the database is enhanced with a fuzzy knowledge-based system. Domain specific deduction rules can be defined to derive new information about semantic contents of the video. The database is also supported by an access structure to increase retrieval efficiency. The proposed framework is capable of handling uncertain data arising from annotation process or video nature. © 2010 IEEE.Conference Object Citation Count: 0Informatics Engineering Education in Turkey and Expectations of Software Industry;(Institute of Electrical and Electronics Engineers Inc., 2018) Yazıcı, Ali; Mishra,A.; Karakaya, Ziya; Üstünkök, Tolga; Mıshra, Alok; Software Engineering; Computer EngineeringIn this study, using the ÖSYM data, the number of intakes in Informatics Engineering programs in Turkey, accreditation data and the medium of instruction of the program are summarized for the years 2016 and 2017. In addition, the software sector's expectations from the informatics engineering graduates are reassessed based on the academic studies. The developed knowledge-skill gap set was used to evaluate the situation in Turkish informatics engineering programs. Sector expectations are discussed in the context of 2017-2019 Turkey Software Sector Strategy and Action Plan prepared by the Ministry of Science, Industry and Technology of Turkey and some proposals are made for the academia. As a result, it was observed that the expectations of the software industry were similar in all studies. Additionally, the expectations were changed in the direction of developing technologies and this change should be reflected in the informatics engineering programs. © 2018 IEEE.Conference Object Citation Count: 11JMathNorm: A database normalization tool using mathematica(Springer Verlag, 2007) Yazıcı, Ali; Karakaya,Z.; Karakaya, Ziya; Software Engineering; Computer EngineeringThis paper is about designing a complete interactive tool, named JMathNorm, for relational database (RDB) normalization using Mathematica. It is an extension of the prototype developed by the same authors [1] with the inclusion of Second Normal Form (2NF), and Boyce-Codd Normal Form (BCNF) in addition to the existing Third normal Form (3NF) module. The tool developed in this study is complete and can be used for real-time database design as well as an aid in teaching fundamental concepts of DB normalization to students with limited mathematical background. JMathNorm also supports interactive use of modules for experimenting the fundamental set operations such as closure, and full closure together with modules to obtain the minimal cover of the functional dependency set and testing an attribute for a candidate key. JMathNorm's GUI interface is written in Java and utilizes Mathematica's JLink facility to drive the Mathematica kernel. © Springer-Verlag Berlin Heidelberg 2007.Conference Object Citation Count: 11JMathNorm: A database normalization tool using mathematica(Springer Verlag, 2007) Yazıcı, Ali; Karakaya,Z.; Karakaya, Ziya; Software Engineering; Computer EngineeringThis paper is about designing a complete interactive tool, named JMathNorm, for relational database (RDB) normalization using Mathematica. It is an extension of the prototype developed by the same authors [1] with the inclusion of Second Normal Form (2NF), and Boyce-Codd Normal Form (BCNF) in addition to the existing Third normal Form (3NF) module. The tool developed in this study is complete and can be used for real-time database design as well as an aid in teaching fundamental concepts of DB normalization to students with limited mathematical background. JMathNorm also supports interactive use of modules for experimenting the fundamental set operations such as closure, and full closure together with modules to obtain the minimal cover of the functional dependency set and testing an attribute for a candidate key. JMathNorm's GUI interface is written in Java and utilizes Mathematica's JLink facility to drive the Mathematica kernel. © Springer-Verlag Berlin Heidelberg 2007.Conference Object Citation Count: 1METU-MMDS: An intelligent multimedia database system for multimodal content extraction and querying(Springer Verlag, 2016) Yazıcı, Ali; Sattari,S.; Koyuncu, Murat; Sert,M.; Koyuncu,M.; Gulen,E.; Software Engineering; Information Systems EngineeringManaging a large volume of multimedia data, which contain various modalities (visual, audio, and text), reveals the need for a specialized multimedia database system (MMDS) to efficiently model, process, store and retrieve video shots based on their semantic content. This demo introduces METU-MMDS, an intelligent MMDS which employs both machine learning and database techniques. The system extracts semantic content automatically by using visual, audio and textual data, stores the extracted content in an appropriate format and uses this content to efficiently retrieve video shots. The system architecture supports various multimedia query types including unimodal querying, multimodal querying, query-by-concept, query-by-example, and utilizes a multimedia index structure for efficiently querying multi-dimensional multimedia data. We demonstrate METU-MMDS for semantic data extraction from videos and complex multimedia querying by considering content and concept-based queries containing all modalities. © Springer International Publishing Switzerland 2016.Conference Object Citation Count: 7Normalizing relational database schemas using mathematica(Springer Verlag, 2006) Yazıcı, Ali; Karakaya,Z.; Karakaya, Ziya; Software Engineering; Computer EngineeringIn this paper, basic relational database (DB) normalization algorithms are implemented efficiently as Mathematica modules. It was observed that, Mathematica provided a straightforward platform as opposed to previous ones, mainly Prolog based tools which required complex data structures such as linked list representations with pointers. A Java user interface called JMath-Norm was designed to execute the Mathematica modules in a systematic way. For this purpose, Mathematical Java link facility (JLink) is utilized to drive the Mathematica kernel. JMath-Norm provides an effective interactive tool in an educational setting for teaching DB normalization theory. © Springer-Verlag Berlin Heidelberg 2006.Conference Object Citation Count: 0Perceptions, Expectations and Implementations of Big Data in Public Sector : Kamuda Buÿük Veri: Alglar, Beklentiler ve Uygulamalar(Institute of Electrical and Electronics Engineers Inc., 2018) Yazıcı, Ali; Ozbayoglu,M.; Karakaya, Ziya; Karakaya,Z.; Software Engineering; Computer EngineeringBig Data is one of the most commonly encountered buzzwords among IT professionals nowadays. Technological advancements in data acquisition, storage, telecommunications, embedded systems and sensor technologies resulted in huge inflows of streaming data coming from variety of sources, ranging from financial streaming data to social media tweets, or wearable health gadgets to drone flight logs. The processing and analysis of such data is a difficult task, but as appointed by many IT experts, it is crucial to have a Big Data Implementation plan in today's challenging industry standards. In this study, we performed a survey among IT professionals working in the public sector and tried to address some of their implementation issues and their perception of Big Data today and their expectations about how the industry will evolve. The results indicate that most of the public sector professionals are aware of the current Big Data requirements, embrace the Big Data challenge and are optimistic about the future. © 2018 IEEE.Article Citation Count: 0Romberg integration: A symbolic approach with mathematica(Springer Verlag, 2003) Yazıcı, Ali; Ergenç, Tanıl; Altas,I.; Mathematics; Software EngineeringHigher order approximations of an integral can be obtained from lower order ones in a systematic way. For 1-D integrals Romberg Integration is an example which is based upon the composite trapezoidal rule and the well-known Euler-Maclaurin expansion of the error. In this work, Mathematica is utilized to illustrate the method and the underlying theory in a symbolic fashion. This approach seems plausible for discussing integration in a numerical computing laboratory environment. © Springer-Verlag Berlin Heidelberg 2003.Conference Object Citation Count: 0The Romberg-like parallel numerical integration on a cluster system(2009) Yazıcı, Ali; Software EngineeringIn this paper, an approximation of a double integral over a triangular region using a Romberg-like buffered extrapolation technique is considered. A master-worker algorithm organization was developed and implemented using the Message Passing Interface (MPI) paradigm which aims at computing the function f(x, y) at the nodes of the triangle by the worker processes in parallel. The algorithm is implemented on a Sun Cluster consisting of 8xX2200 Sun Fire dual core processors using Sun's OpenMPI message passing environment. Here, the Sun Studio Performance Analyzer is utilized to display the runtime behavior of the processes and CPU's involved in the computations. A simple model is developed to predict the speed-up factor. © 2009 IEEE.Conference Object Citation Count: 7Slim-Tree and BitMatrix index structures in image retrieval system using MPEG-7 Descriptors(2008) Yazıcı, Ali; Arslan,S.; Arslan, Sarper; Koyuncu, Murat; Software Engineering; Avionics; Information Systems EngineeringContent-based retrieval of multimedia data has still been an active research area. The efficient retrieval in natural images has been proven a difficult task for content-based image retrieval systems. In this paper, we present a system that adapts two different index structures, namely Slim-Tree and BitMatrix, for efficient retrieval of images based on multidimensional low-level features such as color, texture and shape. These index structures also use metric space. We use MPEG-7 Descriptors extracted from images to represent these features and store them in a native XML database. The low-level features; Color Layout (CL), Dominant Color (DC), Edge Histogram (EH) and Region Shape (RS) are used in Slim-Tree and BitMatrix and aggregated by Ordered Weighted Averaging (OWA) method to find final similarity between any two objects. The experiments included in the paper are in the subject of index construction and update, query response time and retrieval effectiveness using ANMRR performance metric and precision/recall scores. The experimental results strengthen the case that uses BitMatrix along with Ordered Weighted Averaging method in content-based image retrieval systems. ©2008 IEEE.Conference Object Citation Count: 7Slim-Tree and BitMatrix index structures in image retrieval system using MPEG-7 Descriptors(2008) Yazıcı, Ali; Arslan,S.; Arslan, Sarper; Koyuncu, Murat; Software Engineering; Avionics; Information Systems EngineeringContent-based retrieval of multimedia data has still been an active research area. The efficient retrieval in natural images has been proven a difficult task for content-based image retrieval systems. In this paper, we present a system that adapts two different index structures, namely Slim-Tree and BitMatrix, for efficient retrieval of images based on multidimensional low-level features such as color, texture and shape. These index structures also use metric space. We use MPEG-7 Descriptors extracted from images to represent these features and store them in a native XML database. The low-level features; Color Layout (CL), Dominant Color (DC), Edge Histogram (EH) and Region Shape (RS) are used in Slim-Tree and BitMatrix and aggregated by Ordered Weighted Averaging (OWA) method to find final similarity between any two objects. The experiments included in the paper are in the subject of index construction and update, query response time and retrieval effectiveness using ANMRR performance metric and precision/recall scores. The experimental results strengthen the case that uses BitMatrix along with Ordered Weighted Averaging method in content-based image retrieval systems. ©2008 IEEE.Article Citation Count: 0Study on cloud computing perception of Turkish IT sector;(Strojarski Facultet, 2016) Yazıcı, Ali; Hacaloglu,T.; Hacaloğlu, Tuna; Software Engineering; Information Systems EngineeringIn this paper an empirical study was carried out to study the Cloud Computing (CC) perception in Turkey. To this extent this study intends to determine the perception of Information Technology decision makers such as Chief Executive Officers and Chief Information Officers by means of a survey by questionnaire approach to explore 98 both public and private IT executives’ understandings and concerns about CC. The survey aims to determine how CC is perceived by public or private organizations that are already involved in the e-transformation process. Major results of the study are as follows: both public and private sector executives have positive perception over adoption of CC, participants think that especially web, e-mail, data storage and process management applications are adequate for CC. Lack of well-educated and experienced staff is found to be the common barrier on adopting CC by both public and private sector participants. © 2016, Strojarski Facultet. All rights reserved.Conference Object Citation Count: 53Successful requirement elicitation by combining requirement engineering techniques(2008) Yazıcı, Ali; Mishra,A.; Mıshra, Deepti; Mıshra, Alok; Software Engineering; Computer EngineeringThe role of customers and other stakeholders is becoming increasingly significant during requirement engineering activities. Methods of eliciting requirements are now more co-operative. There are many techniques to obtain requirements from customers. Selecting the right techniques according to the characteristics of the project is very important. In some complex problems, combination of requirement engineering techniques should be applied for efficient and successful requirement engineering process. In this paper, we have presented the application of combination of requirement engineering techniques for a real life complex project (Supply Chain Management) with higher requirements volatility developed in a small scale software development organization.This will help in understanding requirements elicitation for such kind of complex software and facilitate in selecting the appropriate techniques towards getting the consistent and complete requirements. ©2008 IEEE.