Master Degree / Yüksek Lisans Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/11147/3008
Browse
22 results
Search Results
Master Thesis A Blockchain Application for Payment and Traffic Management in Smart Vehicles(Izmir Institute of Technology, 2022) Yiğitbaşı, Boğaçhan; Ayav, Tolga; Ayav, TolgaThe proposed solution offers an alternative way to our current retail shopping of fuel fees. It can be applied to any retail shopping process but this phase of the project is considered an initiation of upcoming. The next phases of the project, include full integration with smart cars in order to handle all procedures automatically. In the traditional way, when you buy some gas from a station with your credit card, the station owner pays some fee to his bank and it has to wait for some time to be able to get that money. You as an individual have to expose your identity so they can track your shopping habits and follow your expenses. Sometimes they may offer some loyalty discounts or gifts but with really ridiculous rates. Our system offers a digital payment system based on the Ethereum blockchain. It has its own token called TRANT (Transport Token) and by this token, any client with a digital wallet (Metamask) is able to pay their gas fees without exposing their real identity -only their wallet address-, and get some rewards in terms of TRANT for their loyalties and using our DEX (Decentralized Exchange) exchange them into the ether which can be converted into real fiat money easily. On the other hand, the proposed solution also has some advantages for the other party in this equation such as gas station owners, they immediately get their money at that very first moment without any remittance.Master Thesis Blackhole Attacks in Iot Networks(01. Izmir Institute of Technology, 2020) Sokat, Barış; Ayav, Tolga; Erten, Yusuf MuratIoT technologies are very popular today, and they are used in almost every field. Therefore, the number of IoT devices used is increasing day by day. Like every field in computer networks, security is quite important in IoT networks. However, the resource-constrained nature of IoT devices makes the study of security measures for IoT networks very challenging. In the literature research conducted before this thesis study, it was seen that it can perform a wide variety of RPL-based attacks on IoT networks. One of these attacks is the blackhole attack. Although the black hole attack is functionally simple, the damage it causes in the network can be extremely destructive. As far as it is known, in addition to the limited number of studies in this field of attack, the black hole attack used in the studies in this field has also basic features. The basic feature mentioned here is that the attacker node that will perform a black hole attack drops all the packets that come to it. When the attacker node drops all incoming packets, it causes the topology to change in the network, the number of control messages to increase and the attacker node to be isolated from the network in a short time. However, blackhole attack can be combined with different attacks. Therefore, in this thesis, the node that will perform the black hole attack is designed to allow control messages to pass, while dropping all other packets. Here, it is aimed that the attacker node remains on the network for a longer time. As a result, as long as the attacker node is active, it will be able to drop more packets and the number of control messages in the network will be controlled since the topology does not change. With the black hole attack developed as a result of the simulation tests, the number of control messages released in the network was taken under control and it was observed that the attacker node could remain in the network throughout the simulation period. Thus, the effect of different types of black hole attacks on the network that can be developed has been revealed.Master Thesis Predictive Maintenance for Smart Industry(01. Izmir Institute of Technology, 2020) Asadzade, Asad; Ayav, TolgaAfter the internet of things developed rapidly, it started to be used in many several industrial areas. Thanks to IoT, data that affect the health of any equipment or other important systems are collected. When these data are processed correctly, important information about the production process is obtained. For example, thanks to this data, systems based on machine learning are created to predict when various components will fail. Thus, maintenance operations are carried out before the component's breakdown, and replacement operations are performed if necessary. This strategy, called predictive maintenance, provides industries with advantages such as maximizing the life of components, reducing extra costs, and time saving. In this study, we applied ARF method, which is based on stream learning, on Turbofan Engine Degradation Simulation Datasets which are provided by NASA to estimate the remaining useful lifetime of jet engines. As a result, we mentioned about the advantages of streaming learning over batch learning and compared our results with other batch learning based studies which are applied on the same datasets.Master Thesis Evaluation of Scheduling Architectures for Osek/Vdx Compliant Hard Real-Time Operating Systems(Izmir Institute of Technology, 2020) Saydam, Berkay; Ayav, TolgaTechnological advancements are reflected to the vehicles as well, but it brings the challenge of adding new functionalities to vehicles without compromising safety. Tasks are used to provide functionalities which are used in car. These tasks have different characterictics. Safety and performance are two main criteria to determine characterictic of tasks. Characteristics of tasks can be classified according to their safety levels which are known as Automotive Safety Integrity Levels. Designing of hardware and software and also testing them is a long progress in automotive industry. Any changes on the design of hardware is quite costly when an ECU began to be used in field. According to my hypothesis, scheduling algorithms which are used by Central Processing Unit to determine sequences of task executions, should be well known. Besides, designing of hardware and software should be done according to these characteristics and algorithms. If not, tasks will cause serious problem like missing deadline for safety-critical component. In this thesis, the scheduling architectures are evaluated and they are determined which scheduling architectures should be used for which purpose. Besides, the advantages and disadvantages are explained.Master Thesis Internet of things simulation using cisco packet tracer(01. Izmir Institute of Technology, 2020) Thera, David; Ayav, Tolga; Erten, Yusuf MuratNowadays, the term IoT (internet of things) have become extremely important in our life. This technology is used in many fields such as education, health, industries, agriculture and infrastructures. In order to learn and understand how this technology works, many practical learning tools are used. The aim of the thesis is to introduce a iot simulation tool, where student can simulate or build and manage the systems for better understanding of the philosophy behind iot networks. The tool used is Cisco packet tracer which is a software developed by Cisco that is used to create and simulate a virtual network, basically a wireless network, without the need for any network hardware. The tool is free of charge, and suitable to work with almost all the operating systems. Cisco packet tracer allows users to have a practical networking technology knowledge. In this thesis, "Cisco packet tracer" is used to design an internet-based home automation system or smart home.Master Thesis Blockchain Application on Loyalty Card(Izmir Institute of Technology, 2020) Sönmeztürk, Osman; Ayav, Tolga; Erten, Yusuf MuratToday, traditional loyalty systems are insufficient to meet the needs of users. The users need to stay within the loyalty system for a long time and accumulate points in order to win prizes and besides, the rewards they receive may be out of their interest. In addition, users usually forget the awards they have won in traditional loyalty systems and have difficulty in following up rewards. In addition to that, users usually do not prefer to share their personal information to join loyalty systems due to privacy concerns. Therefore, the number of customers in the loyalty systems is decreasing day by day. The designed loyalty program mentioned in this thesis works with IZTECH Tokens, which works on the Ethereum chain and are created by following ERC20 standards. Thanks to the new generation loyalty system, users can convert their earned tokens to Ethereum on the stock exchange without accumulating them or can receive services or products with the accumulated tokens according to their interests from a market that has been contracted by the manufacturer. Additionally, users in the designed system do not need to carry many cards, it is adequate to have only one Ethereum wallet. Furthermore, users do not need to share any personal data to join the loyalty system. Markets can request Ether from the manufacturer according to the number of tokens they have accumulated. The loyalty system mentioned in this thesis not only aims to establish a win-win relationship between the manufacturer, market, and client but also to find solutions to the customer problems mentioned above.Master Thesis Block-Chain Based Remote Update for Embedded Devices(Izmir Institute of Technology, 2019) Kaptan, Melike; Ayav, Tolga; Erten, Yusuf MuratThis research work is an attempt to devise a platform to send automatic remote updates for embedded devices. In this scenario there are Original Equipment Manufacturers (OEMs), Software suppliers, Block-Chain nodes, Gateways and embedded devices. OEMs and software suppliers are there to keep their software on IPFS (Inter Planetary File System) and send the meta-data and hashes of their software to the Block-Chain nodes in order to keep this information distributed and ready to be requested and used. There are also gateways which are also the members of the Block-Chain and IPFS network. Gateways are responsible for asking for a specific update for specific devices from IPFS database using the meta-data standing on the Block-Chain. And they will send those hashed secure updates to the devices. In order to provide a traceable data keeping platform gateway update operations are handled as a transactions in the second block-chain network which is the clock-chain of the gateways. In this study implementation of the two block chain shows us that, even though the calculation overhead of the member devices, with regulations specific to the applications block-chains provide applicable platforms.Master Thesis Implementation and Performance Analysis of Contex-Aware Role-Based Access Controls for Cloud-Based Iot Platform(Izmir Institute of Technology, 2019) Döşemeci, Mete Merthan; Ayav, TolgaIoT has received substantial attention in both industry and the scholarly world in the recent years. The main idea is to interconnect the physical world with the digital world. Sensors read physical world and present processible data. This data needs to be secured. Currently, most of the cloud based IoT platforms use some sort of Role-Based Access Control (RBAC) , which is one of the approaches to control access to the devices, hence the data. In some cases RBAC is insufficient for fulfilling constantly changing requirements of IoT. ABAC (Attribute Based Access Control) can be flexible enough for fulfilling. However ABAC requires higher level of maintenance. We wanted to implement a access control method that uses both RBAC’s and ABAC’s advantages. We called it OBAC(Operation Based Access Control). Authorization is being implemented in a plug and play manner. We implemented that way because; It is designed for cloud platforms and we wanted to switch between access control methods easily. The results of the experiment shows that proposed access control(OBAC) had minimum latency and management steps across other access control methods.Master Thesis Effectiveness of Using Clustering for Test Case Prioritization(Izmir Institute of Technology, 2019) Günel, Can; Ayav, Tolga; Ayav, TolgaSoftware testing is one of the most important processes in the software development life cycle. As software evolves, previous test cases need to be re-executed to make sure that there is no new bugs introduced and nothing is broken in the existing behaviours. However, re-execution of all test cases could be expensive. That is why, test case prioritization method can be used to detect faults earlier by prioritizing the test cases which could have the higher possibility than others to find faults. Studying different approaches, implementing different techniques or putting these techniques to test on different programs could make it easier to answer which technique should be used for which kind of programs or faults. We address this issue, focusing on selecting different test case prioritization approaches and calculating the average fault detection ratios of prioritized test suites. As a novelty, we propose to perform an optimization algorithm on one of the approaches called `Clustering` to increase its efficiency. To do that, our main objective is determined as maximizing the distance between each clusters by using the coverage information. The distance is measured as the difference of covered functions of test cases in a test suite. In the end, this study will give a hint about selection of test case prioritization technique to be used by checking the empirical results of the experiments.Master Thesis A Learning-Based Demand Classification Service With Using Xgboost in Institutional Area(Izmir Institute of Technology, 2019) Gürakın, Çağrı; Ayav, TolgaThis study, purposes to explain the development stages and methodology of data classification service that has a text-based adaptable programming interface. One of the successful classification algorithms, XGBoost, was preferred in the study. The dataset that is used in the study obtained by 'Digital Business Tracking Application' of a name anonymized company. The dataset is tested by using different classification algorithms and detailed performance evaluation was conducted. As a result, highest accuracy rate is obtained with 'Data Classification Service' which was developed by using XGBoost algorithm.
- «
- 1 (current)
- 2
- 3
- »
