Computer Engineering / Bilgisayar Mühendisliği
Permanent URI for this collectionhttps://hdl.handle.net/11147/10
Browse
61 results
Search Results
Conference Object Citation - WoS: 1On Defining Security Metrics for Information Systems(Brill Academic Publishers, 2005) Koltuksuz, Ahmet[No abstract available]Conference Object Citation - WoS: 37Graph Theoretic Clustering Algorithms in Mobile Ad Hoc Networks and Wireless Sensor Networks (survey)(Azerbaijan National Academy of Sciences, 2007) Erciyeş, Kayhan; Dağdeviren, Orhan; Çokuslu, Deniz; Özsoyeller, DenizClustering in mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) is an important method to ease topology management and routing in such networks. Once the clusters are formed, the leaders (coordinators) of the clusters may be used to form a backbone for efficient routing and communication purposes. A set of clusters may also provide the underlying physical structure for multicast communication for a higher level group communication module which may effectively be used for fault tolerance and key management for security purposes. We survey graph theoretic approaches for clustering in MANETs and WSNS and show that although there is a wide range of such algorithms, each may be suitable for a different cross-layer design objective.Conference Object Duyarga Ağları için Bir Γ Eşuyumcusu Tasarım ve Uygulaması(IEEE, 2008) Özsoyeller, Deniz; Erciyeş, Kayhan; Dağdeviren, OrhanImplementation of synchronous algorithms in distributed systems in general is less troublesome than the implementation of asynchronous algorithms. Synchronizers provide synchronous execution of an asynchronous algorithm in distributed systems. In this study, we propose a gamma synchronizer for Wireless Sensor Networks (WSNs). This synchronizer consists of a and beta synchronizers. In our work, the WSN is first divided into clusters and then these clusters are connected using a ring protocol. Synchronization is provided using the beta synchronizer in the cluster and a synchronizer among the clusters. We describe the clustering algorithm and the ring formation algorithm for the WSNs and give the results obtained so far.Conference Object Citation - Scopus: 15Gezgin Tasarsız Ağlar için Taşırma Tabanlı Yönlendirme Yordamı(IEEE, 2008) Çokuslu, Deniz; Erciyeş, KayhanMobile Ad Hoc Networks (MANETs) are videly in use in rescue, military operations, scientific and business areas. Many studies are addressed in MANETs because of their need to long lasting liveness, fault tolerance, dynamic addressing, collusion prevention, mobility management and security. Especially, self clustering, backbone construction and routing are the most interesting academic and industrial research areas in MANETs. A wide range of studies addressed the routing problem in MANETs. Many previous studies address the clustering and routing problems as seperate subjects. However, rowing approaches which are specific to the clustering methodologies may have many advantages in terms of efficiency and availability. In this study, a flooding based routing algorithm is proposed. First, a detailed description of the algorithm is explained, then the analysis and test results using the ns2 simulator are given which show that the designed algorithm is scalable and has favorable performance.Conference Object Citation - WoS: 1Automatic Enforcement of Location Aware User Based Network Access Control Policies(World Scientific and Engineering Academy and Society, 2008) Tuğlular, TuğkanMultiple interconnected network segments distributed across various locations, such as corporate networks, where users or employees constantly travel among segments and require to access servers, need to have network access control mechanisms that are able to adapt to these location changes. The idea of a firewall changing or adapting its rules depending on the location of users is presented by an architecture in this paper. This architecture proposes deployment of a policy server at the management level and policy agents at the firewall level, so that policy-driven network security management is enabled by specifying location aware user based network access control policies at the network security management and enforcing them at the managed firewalls. The architecture presented in this paper utilizes user VPN connection event triggers for dynamic policy configuration and automated policy deployment to firewalls. Location aware user based network access control policies, which are management level policies, are implemented using XACML. A network level policy is usually a configuration, or policy, file local to the firewall. The policy agent incorporated into the firewall performs the mapping from management level policy to firewall policy.Conference Object Citation - Scopus: 2Telsiz Duyarga Ağlarında Hızlı Hareket Eden Hedefler için Küme Tabanlı Hedef İzleme Algoritması(Institute of Electrical and Electronics Engineers Inc., 2009) Alaybeyoğlu, Ayşegül; Dağdeviren, Orhan; Kantarcı, Aylin; Erciyes, KayhanKablosuz iletişim teknolojilerindeki ilerlemelerle birlikte telsiz duyarga ağları (TDA) birçok sivil ve askeri uygulamalarda özellikle de hareketli hedefin takibi gibi konularda yaygın olarak kullanılmaya başlanmıştır. Bu çalışmada da TDA’da hızlı hareket eden nesneler için küme tabanlı bir hedef izleme algoritması önerilmiştir. Literatürde bulunan mevcut çalışmalarda lider düğüm, hedefin sadece t+1 anında yaklaşacağı konumu tahminleyerek bu konuma en yakın düğümü uyandırır. Hedefin çok hızlı hareket etmesi durumunda ise hedefin kısa süre içerisinde bir grup düğümün yakınlarından algılanmadan geçip gitmesi söz konusudur. Önermiş olduğumuz algoritma ile hedefin hızına bağlı olarak, hedefin tahmini gideceği yöndeki düğümler önceden uyandırılarak, kümeler önceden oluşturulmaktadır. Böylece hedefin ani hızlanması durumunda, önceden oluşturmuş olduğumuz kümeler sayesinde hedefin kaybolma riskini azaltmış bulunmaktayız.Conference Object Citation - Scopus: 1A Semantic Based Certification and Access Control Approach Using Security Patterns on Seagent(Knowledge Systems Institute, 2008) Tekbacak, Fatih; Tuğlular, Tuğkan; Dikenelli, OğuzIn this paper, we propose a security infrastructure for communication between agents adaptable to FIPA security specifications by employing security patterns and semantic based policy descriptions. Security patterns are used as a generalized approach for generating security based services. This paper analyzes the authentication and semantic based access control among agents by using the security patterns.Article Citation - WoS: 10Citation - Scopus: 26Mobile Join Operators for Restricted Sources(Hindawi Publishing Corporation, 2005) Özakar, Belgin; Morvan, Franck; Hameurlain, AbdelkaderWe consider the problem of query execution when there is limited access to the relations, i.e. when binding patterns require values to be specified in order to get data from the relation. This problem is common in virtual data integration systems where there are heterogeneous sources with various restricted access patterns and query capabilities. Another problem is the lack of the statistical information about the sources and occurrence of unpredictable events. We introduce two mobile join operators, MDJoin and SMDJoin which are designed for restricted sources and implemented using ‘mobile agents’ in order to benefit from their autonomous and reactive characteristics. Mobile operators of restricted sources are capable to deal with restricted sources and react to the variations between the compile-time estimations and run-time computations of data during query execution. The difference between the two new query operators lies in their level of adaptation ability to the execution environment. Performance results show that mobile agent-based approach at operator level can lead to a significant reduction in response time with restricted sources.Conference Object Citation - WoS: 11Citation - Scopus: 20Learning Styles Diagnosis Based on Learner Behaviors in Web Based Learning(Springer Verlag, 2009) Atman, Nilüfer; İnceoğlu, Mustafa Murat; Aslan, Burak GalipIndividuals have different backgrounds, motivation and preferences in their own learning processes. Web-based systems that ignore these differences have difficulty in meeting learners' needs effectively. One of these individual differences is the learning style. For providing adaptively incorporated learning styles, firstly learning styles of learners have to be identified. There are many different learning models in literature. This study is based on Felder and Silverman's Learning Styles Model and investigates only active/reflective and visual/verbal dimensions of this model. Instead of filling out a questionnaire, learner behaviors are analyzed with the help of literature-based approaches so that learning styles of learners can be detected.Conference Object Citation - Scopus: 5Metamodeling Approach To Preference Management in the Semantic Web(Association for the Advancement of Artificial Intelligence, 2008) Tapucu, Dilek; Can, Özgü; Bursa, Okan; Ünalır, Murat OsmanPreference is a superiority state to determine the preferable or the superior of one entity, property or constraint to another from a specified selection set. Preference issue is heavily studied in Semantic Web research area. The existing preference management approaches only consider the importance of concepts for capturing users' interests. This paper presents a metamodeling approach to preference management. Preference meta model consists of concepts and semantic relations to represent users' interests. Users may have the same type preferences in different domains. Thus, metamodeling must be used to define similar preferences for interoperability in different domains. In this paper, preference meta model defines a general storage structure to manage different types of preferences for personalized applications. Copyright © 2008, Association for the Advancement of Artificial Intelligence.
