Master Degree / Yüksek Lisans Tezleri

Permanent URI for this collectionhttps://hdl.handle.net/11147/3008

Browse

Search Results

Now showing 1 - 10 of 26
  • Master Thesis
    Container Damage Detection and Classification Using Container Images
    (Izmir Institute of Technology, 2019) İmamoğlu, Zeynep; Tuğlular, Tuğkan; Baştanlar, Yalın
    In the logistics sector, digital transformation is of great importance in terms of competition. In the present case, container warehouse entry / exit operations are carried out manually by the logistics personnel including container damage detection. During container warehouse entry / exit process, the process of detecting damaged containers is carried out by the personnel and several minutes are required to upload to the system. The aim of this thesis is to automate detection of damaged containers. This way, the mistakes made by the personnel in this stage will be eliminated and the process will be accelerated. In this thesis, we propose a machine learning method which detects damaged containers using the container images to perform statistical damaged / undamaged estimation. We modeled the problem as a binary classification problem, which considers a container as damaged or undamaged. The result obtained from the undertaken studies shows that there is no single best method for visual classification. It is shown how the dataset was created and how the parameters used in the layered structure impact the most suitable model could be created for this study.
  • Master Thesis
    Tag Based Storage and Retrieval System for Organization Related News
    (Izmir Institute of Technology, 2019) Parkın, Kübra; Tuğlular, Tuğkan
    For corporate organizations, it becomes more and more important to gather information about opponents or partners, or any kind of information that can be related to the organization. In a rapidly changing world, ensuring competitiveness for organizations and making consistent strategic decisions are becoming increasingly difficult. Gathering news about the business has an undeniable effect on the decisions of companies. It is essential to keep up with this race in order not to get out of the race. Therefore, what corporate companies need is to have a retrieval system that collects and evaluates information that is relevant to the organization. However, it can be difficult to make use of large amounts of information. What needed is to store that information based on a pattern and make it easy to analyses.
  • Master Thesis
    Domain-Specific Modeling Based Feature-Oriented Automatic Test Generation Methodology for Software Product Lines
    (Izmir Institute of Technology, 2019) Şensülün, Sercan; Tuğlular, Tuğkan
    Cloud platforms are transforming to software product lines (SPLs) and testing of the customer-selected products are becoming increasingly important with this transformation. Acceptance Test (AT) is a testing variety to check acceptability of the software based on user requirements. While user requirements or customer’s selection are changing during the development cycle, cost of ATs generation is also increasing. In this study, a feature-oriented testing approach is proposed with a novel extension to Gherkin called SPL-AT Gherkin and a novel automatic test method generation technique that uses Test Next Generation (TestNG) framework. Applicability of the proposed approach is demonstrated with a case study that has different user interface (UI) components such as Page, Button, Text View and Edit Text in mobile application platform. Moreover, results for case study is presented. The proposed approach is open for improvement throughout any application that has UI components such as Web, Mobile with any testing framework.
  • Master Thesis
    Automatic Question Generation Using Natural Language Processing Techniques
    (Izmir Institute of Technology, 2018) Keklik, Onur; Tuğlular, Tuğkan; Tekir, Selma
    This thesis proposes a new rule based approach to automatic question generation. The proposed approach focuses on analysis of both syntactic and semantic structure of a sentence. The design and implementation of the proposed approach are also explained in detail. Although the primary objective of the designed system is question generation from sentences, automatic evaluation results shows that, it also achieves great performance on reading comprehension datasets, which focus on question generation from paragraphs. With respect to human evaluations, the designed system significantly outperforms all other systems and generated the most natural (human-like) questions.
  • Master Thesis
    Tag-Based Dynamic Ranking System for Organization Related News
    (Izmir Institute of Technology, 2018) Özkan, Mustafa Tunahan; Tuğlular, Tuğkan
    In information systems, tags are keywords or terms, which represent a piece of information. They provide to define an item and help it to be found again through searching or browsing. Tags have gained popularity due to the growth of social sharing, social bookmarking, organization network and social network websites. In addition, tags are also used to express prominent events and noticeable topics in the news. In this thesis, we propose a tag-based statistical learning approach to predict the shareability of news in an organization network. We represented features with tags by using different methods and adopted several classifiers to predict the shareability of news. We model this problem with a binary classification problem, where shareable news are considered as the positive and non-shareable news are considered as the negative class. The experimental results indicate that there is no general best classifier for the study of shareability prediction for organization related news but depending on the dataset and represented features we can adopt an optimal classifier.
  • Master Thesis
    Collection and Classification of Javascript Libraries Included in Website
    (Izmir Institute of Technology, 2015) Atıcı, İrem; Tuğlular, Tuğkan
    Over the past years, web development processes have been improved incredibly with the fact that websites and web applications became extremely useful and beneficial in several different areas such as business, education, e-commerce, entertainment etc. At the same time, web development tools and technologies have been improved to be able to develop more creative and interactive websites and web applications. Therefore, a wide variety of methods, tools and languages for developing websites and web applications are available for the web developers nowadays. In this thesis, JavaScript among all of the web development technologies is analyzed with the hope of contributing web development processes. A prototype named JS_Librarian has been developed for this thesis with the purpose of collection and classification of JavaScript libraries included in websites. The application accepts website URLs as input. After it receives URLs, it makes request to the webpages of the website and retrieves the HTML code. Then JavaScript code is extracted from the HTML code, so the basic process of information retrieval is achieved in this way. After the information retrieval process, JavaScript codes are analyzed and selected classification methods are applied to the URLs that are residing in the system. At the end of the study, JavaScript libraries have been classified based on specified website categories and the retrieval reports from the application represents that class of JavaScript libraries used in websites may vary according to categories of websites.
  • Master Thesis
    Measurement of Javascript Applications' Readiness To Untrusted Data Using Bayesian Networks
    (Izmir Institute of Technology, 2014) Ufuktepe, Ekincan; Tuğlular, Tuğkan
    Web applications have become an integral part of our daily lives. People mostly provide their important needs, such as people keep their private data, do their banking transactions, shopping etc. through web applications. Therefore, web applications have been an attractive target to malicious individuals and organizations. The usage of JavaScript language by web application developers is increasing very fast, especially after JavaScript started to service back-end developers as well. Therefore, JavaScript has incorporated both front-end and back-end developers. Concurrently, due to flexibility and its most popular library called jQuery, JavaScript has become an attractive to web application developers. OWASP updates the top 25 security vulnerabilities regularly. According the results, SQL Injection (CWE-89) and Operating System Command Injection (CWE-78) has taken the 1st place and Cross-Site Scripting (XSS) (CWE-79) has taken the 3rd place. The results shows that three input validation based vulnerabilities appear in the top three; therefore, it can be said that input validation vulnerabilities have become critical vulnerabilities of web applications. However, developers still fail to validate the inputs or use libraries to protect their web applications against input validation vulnerabilities. In this thesis, JavaScript application’s functions are analyzed to determine if their parameters are validated or not. Then, according to the invalidated inputs, a Bayesian Network to measure its readiness to input validation vulnerabilities is generated.
  • Master Thesis
    Access Monitoring System for Distributed Firewall Policies
    (Izmir Institute of Technology, 2008) Çakı, Oğuzhan; Tuğlular, Tuğkan
    Internet has provided several benefits in terms of information sharing. However, Internet is an insecure environment that can cause threats to private networks. As a result, network security becomes a critical issue. One of the important tools used in network security is firewall. Firewalls protect a private network from external threats by restricting network traffic according to predefined security rules. Basically, firewalls apply these rules to each packet that passes over them. Distributed firewalls are a new approach to firewall to overcome some drawbacks of traditional firewalls. Distributed firewall design is based on the idea of enforcing the policy rules at the endpoints rather than a single entry point to network. Management of policy rules is a critical issue in both traditional and distributed firewalls. We propose a monitoring application for distributed firewall policies to keep track of actions (create, read. update, delete) performed on policy rule set. The resulting data produced by the monitoring application will be very helpful in policy management process.
  • Master Thesis
    Standards and Practices Necessary To Implement a Successful Security Review Program for Intrusion Management Systems
    (Izmir Institute of Technology, 2002) Doruk, Alpay; Tuğlular, Tuğkan; Tuğlular, Tuğkan
    Intrusion Management Systems are being used to prevent the information systems from successful intrusions and their consequences. They also have detection features. They try to detect intrusions, which have passed the implemented measures. Also the recovery of the system after a successful intrusion is made by the Intrusion Management Systems. The investigation of the intrusion is made by Intrusion Management Systems also. These functions can be existent in an intrusion management system model, which has a four layers architecture. The layers of the model are avoidance, assurance, detection and recovery. At the avoidance layer necessary policies, standards and practices are implemented to prevent the information system from successful intrusions. At the avoidance layer, the effectiveness of implemented measures are measured by some test and reviews. At the detection layer the identification of an intrusion or intrusion attempt is made in the real time. The recovery layer is responsible from restoring the information system after a successful intrusion. It has also functions to investigate the intrusion. Intrusion Management Systems are used to protect information and computer assets from intrusions. An organization aiming to protect its assets must use such a system. After the implementation of the system, continuous reviews must be conducted in order to ensure the effectiveness of the measures taken. Such a review can achieve its goal by using principles and standards. In this thesis, the principles necessary to implement a successful review program for Intrusion Management Systems have been developed in the guidance of Generally Accepted System Security Principles (GASSP). These example principles are developed for tools of each Intrusion Management System layer. These tools are firewalls for avoidance layer, vulnerability scanners for assurance layer, intrusion detection systems for detection layer and integrity checkers for recovery layer of Intrusion Management Systems.
  • Master Thesis
    Analysis of Intrusion Prevention Methods
    (Izmir Institute of Technology, 2004) Semerci, Hakan; Tuğlular, Tuğkan
    Today, the pace of the technological development and improvements has compelled the development of new and more complex applications. The obligatory of application development in a short time to rapidly changing requirements causes skipping of some stages, mostly the testing stage, in the software development cycle thus, leads to the production of applications with defects. These defects are, later, discovered by intruders to be used to penetrate into computer systems. Current security technologies, such as firewalls, intrusion detection systems, honeypots, network-based antivirus systems, are insufficient to protect systems against those, continuously increasing and rapid-spreading attacks. Intrusion Prevention System (IPS) is a new technology developed to block today.s application-specific, data-driven attacks that spread in the speed of communication. IPS is the evolved and integrated state of the existing technologies; it is not a new approach to network security. In this thesis, IPS products of various computer security appliance developer companies have been analyzed in details. At the end of these analyses, the requirements of network-based IPSs have been identified and an architecture that fits those requirements has been proposed. Also, a sample network-based IPS has been developed by modifying the open source application Snort.