Computer Engineering / Bilgisayar Mühendisliği
Permanent URI for this collectionhttps://hdl.handle.net/11147/10
Browse
25 results
Search Results
Article Yazılım Ürün Hatlarında Tam Üründen Özellik Eksiltme Yoluyla Frklı Ürün Yapılandırmalarını Otomatik Üretme Yöntemi(2023) Öztürk Kaya, Dilek; Tuğlular, TuğkanYazılım ürün hattı (YÜH) karmaşık, büyük ölçekli ve ürün yapılandırması bakımından zengin yazılım sistemleri geliştirmek için gelelecek vadeden bir yaklaşımdır. Yazılım ürün hattındaki sayısı çok fazla olabilen ürün yapılandırmalarına ait modellerin otomatik elde edilmesi zaman ve maliyet kısıtları açısından oldukça önemlidir. Bu çalışmada, ürün modellerini daha üretken ve etkili şekilde elde edebilmek için, tam ürün modelinden, özellik eksiltme yoluyla farklı ürün yapılandırmalarına ait modelleri otomatik olarak elde etmeyi sağlayan bir yaklaşım önerdik. Önerilen yaklaşımı İçecek Otomatı YÜH, Banka Hesabı YÜH ve Öğrenci Yoklama Sistemi YÜH isimli üç farklı vaka çalışması üzerinde denedik. Özellik-bağımlılık ağacı ve dinamik kenar eşleme algoritması bu çalışmada önerilen özgün kavramlardır.Editorial Message From the Symposium Chairs: Isssr 2022(IEEE, 2022) Wong, W. Eric; Wotawa, Franz; Zheng, Liwei; Tuğlular, TuğkanSecurity, safety, and reliability are the three most important attributes of a system. This is especially the case for mission-critical and life-threatening systems. As the complexity of many systems continues to grow, ensuring security, safety, and reliability has become very critical. Not only does existing technology and tool support need to be enhanced, but we also need new strategies and approaches to satisfy more strict requirements on system security, safety, and reliability. In response to this challenge, the Steering Committee of ISSSR has decided to change its conference name from International Symposium on System and Software Reliability to International Symposium on System Security, Safety, and Reliability. The acronym ISSSR is still the same, but the full name has been slightly modified to emphasize the importance of security, safety, and reliability of many systems.Conference Object Citation - WoS: 3Citation - Scopus: 3Assessment of Human-Robot Interaction Between Householders and Robotic Vacuum Cleaners(IEEE, 2022) Yapıcı, Nur Beril; Tuğlular, Tuğkan; Başoğlu, Ahmet NuriThe study presented in this paper investigates the application of the Hybrid Model, which is the combination of the two strategies of the Built-to-Order Model and the Dynamic Eco-strategy Explorer Model, to robotic vacuum cleaners. The Hybrid Model aims to switch the market power from seller-driven perception to buyer-driven one by creating an individual perspective from the eye of users rather than traditional customer segmentation. The human-centered approach established theoretically has been tested with a determined procedure that includes prototyping, testing, and evaluating the proposed customization system for robotic vacuum cleaners to increase the interaction degree with purchasers. In this case, robotic vacuum cleaners have been chosen to implement and assess the hypothesis. Firstly, the successful prototyping of the Hybrid Model requires well customer analysis and habits determination to build well-constructed and coherent interaction between the purchaser and the robot. We utilized a content analysis of robotic vacuum cleaners and elaborative, conventional interviews with early adopters and early majority of this technology in Turkey to establish credible scenarios and product options during the phases of the Hybrid Model practice. The results of the interview were discussed, and the evaluations have been reported.Conference Object Citation - WoS: 3Citation - Scopus: 2Heterogeneous Modeling and Testing of Software Product Lines(IEEE, 2021) Belli, Fevzi; Tuğlular, Tuğkan; Ufuktepe, EkincanSoftware product line (SPL) engineering is a widely accepted approach to systematically realizing software reuse in an industrial environment. Feature models, a centerpiece of most SPL engineering techniques, are appropriate to model the variability and the structure of SPLs, but not their behavior. This paper uses the idea to link feature modeling to model-based behavior modeling and to determine the test direction (top-down or bottom-up) based on the variability binding. This heterogeneous modeling enables a holistic system testing for validating both desirable (positive) and undesirable (negative) properties of the SPL and variants. The proposed approach is validated by a non-trivial example and evaluated by comparison.Conference Object Coverage Guided Multiple Base Choice Testing(IEEE, 2020) Tuğlular, Tuğkan; Leblebici, OnurA coverage guided input domain testing approach is presented with a feedback loop-controlled testing workflow and a tool is developed to support this workflow. Multiple base choices coverage criterion (MBCC) is chosen for systematic unit test generation in the proposed approach and branch coverage information is utilized as feedback to improve selection of bases, which results in improved branch coverage. The proposed workflow is supported with the tool designed and developed for coverage guided MBCC-based unit testing.Conference Object Citation - WoS: 4Citation - Scopus: 5Code Change Sniffer: Predicting Future Code Changes With Markov Chain(Institute of Electrical and Electronics Engineers, 2021) Ufuktepe, Ekincan; Tuğlular, TuğkanCode changes are one of the essential processes of software evolution. These changes are performed to fix bugs, improve quality of software, and provide a better user experience. However, such changes made in code could lead to ripple effects that can cause unwanted behavior. To prevent such issues occurring after code changes, code change prediction, change impact analysis techniques are used. The proposed approach uses static call information, forward slicing, and method change information to build a Markov chain, which provides a prediction for code changes in the near future commits. For static call information, we utilized and compared call graph and effect graph. We performed an evaluation on five open-source projects from GitHub that varies between 5K-26K lines of code. To measure the effectiveness of our proposed approach, recall, precision, and f-measure metrics have been used on five open-source projects. The results show that the Markov chain that is based on call graph can have higher precision compared to effect graph. On the other hand, for small number of cases higher recall values are obtained with effect graph compared to call graph. With a Markov chain model based on call graph and effect graph, we can achieve recall values between 98%-100%. © 2021 IEEE.Article Bağlamsal Doğrulama için Bir Yazılım Tasarım Şablonu(Dokuz Eylül Üniversitesi, 2017) Tuğlular, TuğkanYazılım tasarım şablonları, tekrar eden yazılım tasarım problemleri için hazır çözümler sunar. Model-Görünüm-Denetçi (İng. MVC) gibi bileşik tasarım şablonları ise, var olan tasarım şablonlarının biraraya getirilmesi ile daha büyük ölçekli problemleri çözmek için geliştirilmektedir. Bu çalışmada bağlamsal doğrulama problemi için bir bileşik tasarım şablonu geliştirilmiştir. Bağlamsal doğrulama, bir işlem gerçekleş- tirilmeden önce o işlem için gerekli tüm nesnelerin gerekli koşulları sağladığının doğrulanması anlamına gelmektedir. Bileşik tasarım şablonu geliştirme yöntemi ile ortaya konan bağlamsal doğrulama tasarım şablonu; tek sorumluluk, açık-kapalı ve bağımlılığı tersine çevirme nesne temelli tasarım ilkelerine göre geliştirilmiştir. Geliştirilen bağlamsal doğrulama tasarım şablonu bünyesinde Ziyaretçi, Strateji, Dekoratör ve Bildirim tasarım şablonlarını barındırmaktadır. Ortaya konan bağlamsal doğrulama tasarım şablonu, kullanım şekli itibariyle iki örnek uygulama üzerinde tartışılmıştır.Conference Object Citation - WoS: 1Automatic Enforcement of Location Aware User Based Network Access Control Policies(World Scientific and Engineering Academy and Society, 2008) Tuğlular, TuğkanMultiple interconnected network segments distributed across various locations, such as corporate networks, where users or employees constantly travel among segments and require to access servers, need to have network access control mechanisms that are able to adapt to these location changes. The idea of a firewall changing or adapting its rules depending on the location of users is presented by an architecture in this paper. This architecture proposes deployment of a policy server at the management level and policy agents at the firewall level, so that policy-driven network security management is enabled by specifying location aware user based network access control policies at the network security management and enforcing them at the managed firewalls. The architecture presented in this paper utilizes user VPN connection event triggers for dynamic policy configuration and automated policy deployment to firewalls. Location aware user based network access control policies, which are management level policies, are implemented using XACML. A network level policy is usually a configuration, or policy, file local to the firewall. The policy agent incorporated into the firewall performs the mapping from management level policy to firewall policy.Conference Object Belge Sorumluluk İş-birliği Modelleme Yöntemi ile Otomatik Kod Üretimi(IEEE, 2020) Tuğlular, Tuğkan; Leblebici, OnurUML is highly preferred for design in current software development approaches. However, the conceptual gap between entities in business processes and classes in UML designs is not small. To reduce this gap, this paper proposes using documents that are vital to every business. The proposed new method called Document Responsibility Collaboration puts the concept of documents at the center. In the proposed method, documents are meta-models of classes in terms of programming, and at the same time, they are meta-models of relationships in terms of permanence. The proposed Document Responsibility Collaboration method uses the domain concept in which domains are made up of documents, and a document defined in a domain can work with another document in any domain to fulfill its responsibility. Document Responsibility Collaboration method defines a process, which starts at the transition from analysis to design phase and continues to the code generation phase. An example from the order management domain is provided to validate the recommended method. © 2020 IEEE.Conference Object Citation - WoS: 1Citation - Scopus: 1Mutation Operators for Decision Table-Based Contracts Used in Software Testing(Institute of Electrical and Electronics Engineers, 2020) Khalilov, Abbas; Tuğlular, Tuğkan; Belli, FevziThe Design by Contract technique allows developers to improve source code with contracts, and testing using contracts helps to identify faults. However, the source code of the program under test is not always available. With black-box testing, it is possible to generate contracts from specifications of the software. In this paper, we apply mutation analysis on a model of a given specifications, where mutants are initially gained by applying proposed in this paper certain mutation operators on corresponding model, and then mutated specifications are examined. © 2020 IEEE.
- «
- 1 (current)
- 2
- 3
- »
