27 results
Search Results
Now showing 1 - 10 of 27
Conference Object Citation - Scopus: 2Personality Type Indicator Models in Serious Games: a Case Study in a Surgical Navigation Game(Institute of Electrical and Electronics Engineers Inc., 2015) Menekse,G.G.; Cagiltay,N.E.; Ozcelik,E.Serious games are a popular concept in both the research and commercial areas. It is agreed that the concept refers to the use of computer games without the main purpose of pure entertainment. In addition to being entertaining, they have some additional educational or training objectives as well. Serious games are used in different areas such as military, government, educational, corporate, and healthcare. However, according to their individual differences, it is not always possible to provide such an educational environment that fits expectations and preferences of all audience. Hence, personalization is becoming an essential issue in serious game environments, which focus on a human-centered paradigm aiming to provide adaptive and personalized services to the users according to the context. However, how such a personalization should be affectively implemented in the design of serious games is a challenge. This study aims to better understand the affect of personality types on game play. For this purpose, a game-based simulation environment which also records all details of the player during the performance of several tasks in the game play was used. Twenty nine students were asked to play the simulation game. Additionally, their personality types were collected based on the theory of psychological types by Carl Jung, the Myers-Briggs Type Indicator (MBTI) which measures personality preferences as defined by Four Dichotomous pairs of mental functions or attitudes. The correlation between these personality types and individual performance measures of players during the game play was analyzed. However no significant correlation between game parameters and the players' personality types has been recorded. This may be because of the limited number of participants that need to be examined in the future studies. © 2015 IEEE.Conference Object Technology Enhanced Surgery Education Environments: Requirements and System Models(Caltek s.r.l., 2013) Cereci,I.; Cagiltay,N.E.; Berker,M.Minimal invasive surgery (MIS), performed by techniques such as laparoscopic and endoscopic approaches are becoming very popular because of their minimum damage on patient and improved success rates. Since those operations have some limited access to the operational area, the surgeons who are expected to perform those operations need some specific skills and they have to go through an exhaustive training process. Today, MIS education and training programs are faced with serious problems. In this study first problems of those programs are be discussed. Then the technological solutions to address those problems are discussed and analyzed. This study aims to help the educators in this field to address right technology to improve their educational environments and the technical people to better address problems of those educational environments and develop enhanced and integrated solutions specific to this field.Conference Object Citation - Scopus: 1How Engineers Understand Entity Relationship Diagrams (erd): Insights From Eye Tracker Data(IADIS, 2012) Tokdemir,G.; Cagiltay,N.E.; Kilic,O.Entity Relationship Diagram (ERD) is one of the main tools used in software design process. This representation enables software engineers to understand system data requirements at a more comprehensive level. Designing and understanding of ERD and hence system data requirements is a critical issue for the success of software projects. In this study we are introducing an experiment environment which would be used to understand the behaviors of software engineers during designing and understanding these representations. This experimental setting is planned to be used to measure the software engineers' performance during ERD defect detection process. We believe such an environment can be used to develop some reviewing guidelines for the software engineers to improve their reviewing process in ERD which in turn will provide some tools for the educators to improve design and review skills of future software engineers. The results of this study would also provide recommendations for the researchers in similar experiments. © 2012 IADIS.Conference Object Multimodal Interaction Flow Representation for Ubiquitous Environments - Mif: a Case Study in Surgical Navigation Interface Design(Springer Verlag, 2015) Tokdemir,G.; Altun,G.; Cagiltay,N.E.; Maras,H.H.; Borcek,A.O.With the advent of technology, new interaction modalities became available which augmented the system interaction. Even though there are vast amount of applications for the ubiquitous devices like mobile agents, smart glasses and wearable technologies, many of them are hardly preferred by users. The success of those systems is highly dependent on the quality of the interaction design. Moreover, domain specific applications developed for these ubiquitous devices involve detailed domain knowledge which normally IT professionals do not have, which may involve a substantial lack of quality in the services provided. Hence, effective and high quality domain specific applications developed for these ubiquitous devices require significant collaboration of domain experts and IT professionals during the development process. Accordingly, tools to provide common communication medium between domain experts and IT professionals would provide necessary medium for communication. In this study, a new modelling tool for interaction design of ubiquitous devices like mobile agents, wearable devices is proposed which includes different interaction modalities. In order to better understand the effectiveness of this newly proposed design tool, an experimental study is conducted with 11 undergraduate students (novices) and 15 graduate students (experienced) of Computer Engineering Department for evaluating defect detection performance for the defects seeded into the interface design of a neuronavigation device. Results show that the defects were realized as more difficult for the novices and their performance was lower compared to experienced ones. Considering the defect types, wrong information and wrong button type of defects were recognized as more difficult. The results of this study aimed to provide insights for the system designers to better represent the interaction design details and to improve the communication level of IT professionals and the domain experts. © Springer International Publishing Switzerland 2015.Conference Object Developing a Data Warehouse for Distance Remote Laboratory(2007) Turkmen,G.; Cagiltay,N.E.Data warehouse is an important contemporary issue for many organizations and is relatively a new field in the realm of information technology. As data warehousing, e-learning is also a new field. Little research has been done regarding the special considerations and characteristics of academic data and the complexity of analyzing such data. Educational institutions measure success very differently from business-oriented organizations and the analyses that are meaningful in such environments cause unique problems in data warehousing. Especially for the educational purposes, data warehouses offer several benefits. This paper discusses the use of Data Warehouse and Decision Support resources to aid in the assessment of Distance Remote Laboratory Environment.Conference Object Citation - Scopus: 12A Concept Map Approach for Introduction To Computer Engineering Course Curriculum(2010) Tokdemir,G.; Cagiltay,N.E.As in any discipline, in Computer Engineering, students start learning the basic concepts of the discipline in their first year through an Introduction to Computer Engineering course. The topics toughed in this course can be grouped into two. The first group includes simple concepts like binary numbering system, hard disk, memory, and I/O devices. In the second group, an introduction to the courses that they will take in the next semesters of the program which includes programming, networking, software engineering, artificial intelligence and database systems. The main objective of this course is to give an introduction about the general concepts of the field to the first year Computer Engineering students and prepare them to understand the connections between them for their future studies. However, students and instructors face with many problems in this course. First, because of the diversity of the concepts given in the course, it is very difficult for the students to see the big picture of the Computer Engineering domain. Similarly, it is difficult for the instructors to prepare the course content in an integrated manner at the students' level. Additionally, the perception of the theory and practice behind the hardware and software topics and their connections is not an easy task for the beginners. Moreover, the topics are mostly abstract topics, which do not allow application of any laboratory sessions. Students usually find this course difficult to understand, which decreases their motivation about the department and success of the course. This study is established to propose a concept map approach to better visualize and discover all the connections between the concepts of Computer Engineering field which can be used in the curriculum of the programs and introductory courses of the field addressing the above problems. The proposed concept map helps to visualize the general picture of the field. © 2010 IEEE.Conference Object Citation - Scopus: 4Quantum Machine Learning in Intrusion Detection Systems: a Systematic Mapping Study(Springer Science and Business Media Deutschland GmbH, 2024) Faker,O.; Cagiltay,N.E.The integration between quantum computing (QC) and machine learning algorithms (ML) aims to speed up computing processes and increase model accuracy rates, and this is what led developers and researchers to exploit this feature to study improving the performance of intrusion detection systems (IDSs). In this work, we present a systematic mapping review (SMR) of the most important works in the field of using quantum machine learning (QML) to increase the efficiency of anomaly detection techniques, which depend mainly on ML. After defining and applying the research methodology, the preliminary search results amounted to 240 studies from four databases. According to the exclusion and inclusion reports, we obtained 21 main studies. After reviewing and analyzing the results, the four research questions were answered. The review focused on the development of integration of intrusion detection systems with QML, the characteristics of such integration, increasing the efficiency of ML algorithms, and future research opportunities in this field. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.Conference Object Citation - Scopus: 4Analysis of B2c Mobile Application Characteristics and Quality Factors Based on Iso 25010 Quality Model(Springer Verlag, 2014) Yildiz,E.; Bilgen,S.; Tokdemir,G.; Cagiltay,N.E.; Erturan,Y.N.The number of mobile applications in mobile market has rapidly increased as new technology and new devices are emerging at remarkable speed which shows mobile applications have an important role in every field of our life. Among those, even some of the mobile applications have a long time life as end-users use those effectively, some of them fail to do so that prevents the companies to reach from their aim. The main reason of that problem results from the quality of the mobile applications. Although there are some methods and metrics to analyze the quality of mobile applications, they have lack of criteria since they are mostly based on ISO 9126 quality model factors which are invalid anymore. This study aims to analyze both mobile commerce applications' characteristics and quality factors and sub-factors based on ISO 25010 product quality model. Accordingly a quality model is proposed by analysis performed by a group of experts from the mobile software development area. The results of this study aims to help developing more qualified and effective mobile applications from developer perspective. © 2014 Springer International Publishing.Article Citation - Scopus: 1A User Task Design Notation for Improved Software Design(PeerJ Inc., 2021) Ozcan,E.; Topalli,D.; Tokdemir,G.; Cagiltay,N.E.System design is recognized as one of the most critical components of a software system that bridges system requirements and coding. System design also has a significant impact on testing and maintenance activities, and on further improvements during the lifespan of the software system. Software design should reflect all necessary components of the requirements in a clear and understandable manner by all stakeholders of the software system. To distinguish system elements, separation of concerns in software design is suggested. In this respect, identification of the user tasks, i.e., the tasks that need to be performed by the user, is not currently reflected explicitly in system design documents. Our main assumption in this study is that software quality can be improved significantly by clearly identifying the user tasks from those that need to be performed by the computer system itself. Additionally, what we propose has the potential to better reflect the user requirements and main objectives of the system on the software design and thereby to improve software quality. The main aim of this study is to introduce a novel notation for software developers in the frame of UML Activity Diagram (UMLAD) that enables designers to identify the user tasks and define them separately from the system tasks. For this purpose, an extension of UML-AD, named UML-ADE (UML-Activity Diagram Extended) was proposed. Afterwards, it was implemented in a serious game case for which the specification of user tasks is extremely important. Finally, its effectiveness was analyzed and compared to UML-AD experimentally with 72 participants. The defect detection performance of the participants on both diagrams with two real-life serious game scenarios was evaluated. Results show a higher level of understandability for those using UML-ADE, which in turn may indicate a better design and higher software quality. The results encourage researchers to develop specific design representations dedicated to task design to improve system quality and to conduct further evaluations of the impact of these design on each of the above mentioned potential benefits for the software systems. © Copyright 2021 Ozcan et al.Conference Object Citation - Scopus: 2Insights From Eye-Movement Events in an Educational Computer-Based Environment (ece) for Endo-Neurosurgery Training Considering Gender, Hand Condition and Scenario Effects(Institute of Electrical and Electronics Engineers Inc., 2018) Dalveren,G.G.M.; Cagiltay,N.E.Surgical residents of endo-neurosurgery are required to develop several surgical skills such as eye-hand coordination, ability to use both hand coordination, and depth perception. During the process of gaining these skills, there are several effective factors on the individual performance such as gender, nature of the scenarios and hand condition that can be important to better organize appropriate training programs. Earlier studies show that, surgeons' mental workload show differences according to the difficulty levels of the tasks and hand conditions during the operations. Also there are some evidences showing that male surgeons performing the surgical tasks with a better performance compared to the females. However, in the literature there are not many studies conducted to better understand these effects by analyzing the eye-movements on simulation-based surgical training environments. This study aims to understand the mental workload and gender differences from fixation number and fixation duration eye-movement events. In this study four different computer-based-simulation scenarios which are developed for an Educational Computer-based-simulation Environment (ECE) for endo-neurosurgery training have been performed by 23 (3 female) surgical residents. Participants have performed each scenario in different hand conditions (dominant, non-dominant and both hand). While surgical residents were performing the scenarios their eye-movements were recorded by an eye-tracker. The Binocular Individual Threshold (BIT) classification algorithm was used for eye-movement event classification. According to the results of fixation number and fixation duration events in these four scenarios, hand conditions, scenario fidelity levels and gender are found to be important factors that make changes on mental workload of surgical residents. It can be concluded that, in non-dominant and both hand conditions mental workload increases according to the dominant hand condition. Additionally results show that scenario fidelity levels and gender have an effect on the eye-movements of surgical residents. © 2018 IEEE.
- «
- 1 (current)
- 2
- 3
- »

