Computer Engineering / Bilgisayar Mühendisliği

Permanent URI for this collectionhttps://hdl.handle.net/11147/10

Browse

Search Results

Now showing 1 - 10 of 294
  • Conference Object
    Enhancing genomic data sharing with blockchain-enabled dynamic consent in beacon V2
    (Springernature, 2024) Binokay, Leman; Celik, Hamit Mervan; Gurdal, Gultekin; Ayav, Tolga; Tuglular, Tugkan; Oktay, Yavuz; Karakulah, Gokhan
  • Conference Object
    A News Chain Evaluation Methodology Along With a Lattice-Based Approach for News Chain Construction
    (Association for Computational Linguistics (ACL), 2017) Toprak, Mustafa; Özkahraman,Ö.; Tekir, Selma
    Chain construction is an important requirement for understanding news and establishing the context. A news chain can be defined as a coherent set of articles that explains an event or a story. There's a lack of well-established methods in this area. In this work, we propose a methodology to evaluate the "goodness" of a given news chain and implement a concept latticebased news chain construction method by Hossain et al. The methodology part is vital as it directly affects the growth of research in this area. Our proposed methodology consists of collected news chains from different studies and two "goodness" metrics, minedge and dispersion coefficient respectively. We assess the utility of the lattice-based news chain construction method by our proposed methodology. © EMNLP 2017.All right reserved.
  • Conference Object
    Size Measurement and Effort Estimation in Microservicebased Projects: Results From Pakistan
    (CEUR-WS, 2023) Soylu, Görkem Kılınç; Ünlü, Hüseyin; Ahmad, Isra Shafique; Demirörs, Onur
    During the last decade, microservice-based software architecture has been a common design paradigm in the industry and has been successfully utilized by organizations. Microservice-based software architecture, specifically in the form of reactive systems, has substantial differences from the more conventional design paradigms, such as the object-oriented paradigm. The architecture moved away from being data-driven and evolved into a behavior-oriented structure. The usage of a single database is replaced by the structures in which each microservice is developed independently and has its own database. Therefore, adaptation demands software organizations to transform their culture. In this study, we aimed to get an insight into how Pakistani software organizations perform size measurement and effort estimation in their software projects which embrace the microservice-based software architecture paradigm. For this purpose, we surveyed 49 Pakistani participants from different agile organizations over different roles and domains to collect information on their experience in microservice-based projects. Our results reveal that although Pakistani organizations face challenges, they continue using familiar subjective size measurement and effort estimation approaches that they have used for traditional architectures. © 2023 Copyright for this paper by its authors.
  • Article
    Citation - WoS: 1
    Citation - Scopus: 3
    Automatic Test Sequence Generation and Functional Coverage Measurement From Uml Sequence Diagrams
    (Igi Global, 2023) Ekici, Nazim Umut; Tuglular, Tugkan
    Sequence diagrams define functional requirements through use cases. However, their visual form limits their usability in the later stages of the development life cycle. This work proposes a method to transform sequence diagrams into graph-based event sequence graphs, allowing the application of graph analysis methods and defining graph-based coverage criteria. This work explores these newfound abilities in two directions. The first is to use coverage criteria along with existing tests to measure their coverage levels, providing a metric of how well they address the scenarios defined in sequence diagrams. The second is to use coverage criteria to automatically generate effective and efficient acceptance test cases based on the scenarios defined in sequence diagrams. The transformation method is validated with over eighty non-trivial projects. The complete method is validated through a non-trivial example. The results show that the test cases generated with the proposed method are more effective at exposing faults and more efficient in test input size than user-generated test cases.
  • Article
    Link Prediction for Completing Graphical Software Models Using Neural Networks
    (IEEE, 2023) Leblebici, Onur; Tuğlular, Tuğkan; Belli, Fevzi
    Deficiencies and inconsistencies introduced during the modeling of software systems may result in high costs and negatively impact the quality of all developments performed using these models. Therefore, developing more accurate models will aid software architects in developing software systems that match and exceed expectations. This paper proposes a graph neural network (GNN) method for predicting missing connections, or links, in graphical models, which are widely employed in modeling software systems. The proposed method utilizes graphs as allegedly incomplete, primitive graphical models of the system under consideration (SUC) as input and proposes links between its elements through the following steps: (i) transform the models into graph-structured data and extract features from the nodes, (ii) train the GNN model, and (iii) evaluate the performance of the trained model. Two GNN models based on SEAL and DeepLinker are evaluated using three performance metrics, namely cross-entropy loss, area under curve, and accuracy. Event sequence graphs (ESGs) are used as an example of applying the approach to an event-based behavioral modeling technique. Examining the results of experiments conducted on various datasets and variations of GNN reveals that missing connections between events in an ESG can be predicted even with relatively small datasets generated from ESG models. Author
  • Conference Object
    Citation - Scopus: 1
    A Lightweight and Energy Efficient Secrecy Outage Probability-Based Friendly Jamming
    (IEEE, 2023) Yaman, Okan; Ayav, Tolga; Erten, Yusuf Murat
    Third parties and legitimate entities can reach and process users' private data through most wireless networks. However, attackers such as intruders and eavesdroppers may also try to exploit this property in communication. Hence, wireless networks are intrinsically more vulnerable to threats, unlike their wired alternatives. Cryptographic techniques are the conventional approaches to deal with that weakness. Nevertheless, they still need to meet the requirements of contemporary technologies, including IoT nodes with energy and processing power constraints. In that respect, friendly jamming (FJ) is one of the encouraging countermeasures to overcome the mentioned susceptibility since it has an energy-efficient and computation-friendly nature. However, that promising approach brings another challenge, applicability. Although various models exist against this issue, a lightweight scheme compliant with novel technologies is needed. Hence, we propose a more straightforward FJ model evaluated on cellular network-based simulations in this study. Moreover, introducing a lightweight secrecy outage probability definition increases robustness and energy efficiency. © 2023 IEEE.
  • Article
    Citation - WoS: 3
    Citation - Scopus: 4
    Application of the Law of Minimum and Dissimilarity Analysis To Regression Test Case Prioritization
    (IEEE, 2023) Ufuktepe, Ekincan; Tuğlular, Tuğkan
    Regression testing is one of the most expensive processes in testing. Prioritizing test cases in regression testing is critical for the goal of detecting the faults sooner within a large set of test cases. We propose a test case prioritization (TCP) technique for regression testing called LoM-Score inspired by the Law of Minimum (LoM) from biology. This technique calculates the impact probabilities of methods calculated by change impact analysis with forward slicing and orders test cases according to LoM. However, this ordering doesn't consider the possibility that consecutive test cases may be covering the same methods repeatedly. Thereby, such ordering can delay the time of revealing faults that exist in other methods. To solve this problem, we enhance the LoM-Score TCP technique with an adaptive approach, namely with a dissimilarity-based coordinate analysis approach. The dissimilarity-based coordinate analysis uses Jaccard Similarity for calculating the similarity coefficients between test cases in terms of covered methods and the enhanced technique called Dissimilarity-LoM-Score (Dis-LoM-Score) applies a penalty with respective on the ordered test cases. We performed our case study on 10 open-source Java projects from Defects4J, which is a dataset of real bugs and an infrastructure for controlled experiments provided for software engineering researchers. Then, we hand-seeded multiple mutants generated by Major, which is a mutation testing tool. Then we compared our TCP techniques LoM-Score and Dis-LoM-Score with the four traditional TCP techniques based on their Average Percentage of Faults Detected (APFD) results.
  • Data Paper
    Citation - WoS: 15
    Citation - Scopus: 20
    Database Covering the Prayer Movements Which Were Not Available Previously
    (Nature Publishing Group, 2023) Mihçin, Şenay; Şahin, Ahmet Mert; Yılmaz, Mehmet; Alpkaya, Alican Tuncay; Tuna, Merve; Akdeniz, Sevinç; Can, Nuray Korkmaz; Tosun, Aliye; Şahin, Serap
    Lower body implants are designed according to the boundary conditions of gait data and tested against. However, due to diversity in cultural backgrounds, religious rituals might cause different ranges of motion and different loading patterns. Especially in the Eastern part of the world, diverse Activities of Daily Living (ADL) consist of salat, yoga rituals, and different style sitting postures. A database covering these diverse activities of the Eastern world is non-existent. This study focuses on data collection protocol and the creation of an online database of previously excluded ADL activities, targeting 200 healthy subjects via Qualisys and IMU motion capture systems, and force plates, from West and Middle East Asian populations with a special focus on the lower body joints. The current version of the database covers 50 volunteers for 13 different activities. The tasks are defined and listed in a table to create a database to search based on age, gender, BMI, type of activity, and motion capture system. The collected data is to be used for designing implants to allow these sorts of activities to be performed.
  • Data Paper
    Database Covering the Previously Excluded Daily Life Activities
    (2023) Mihçin, Şenay; Şahin, Ahmet Mert; Yılmaz, Mehmet; Alpkaya, Alican Tuncay; Tuna, Merve; Can, Nuray Korkmaz; Şahin, Serap; Akdeniz, Sevinç; Tosun, Aliye
    In biomedical engineering, implants are designed according to the boundary conditions of gait data and tested against. However, due to diversity in cultural backgrounds, religious rituals might cause different ranges of motion and different loading patterns. Especially in the Eastern part of the world, diverse Activities of Daily Living (ADL) consist of salat, yoga rituals, and different style sitting postures. Although databases cover ADL for the Western population, a database covering these diverse activities of the Eastern world, specific to these populations is non-existent. To include previously excluded ADL is a key step in understanding the kinematics and kinetics of these activities. By means of developments in motion capture technologies, excluded ADL data are captured to obtain the coordinate values to calculate the range of motion and the joint reaction forces. This study focuses on data collection protocol and the creation of an online database of previously excluded ADL activities, targeting 200 healthy subjects via Qualisys and IMU motion capture systems, and force plates, from West and Middle East Asian populations. Anthropometrics are known to affect kinematics and kinetics which are also included in the collected data. The current version of the database covers 50 volunteers for 12 different activities, the database aims for 100- male and 100- female healthy volunteers as the final target including C3D and BVH file types. The tasks are defined and listed in a table to create a database to make a query based on age, gender, BMI, type of activity and motion capture system. The data is collected only from a healthy population to understand healthy motion patterns during these previously excluded ADLs. The collected data is to be used for designing implants to allow these sorts of activities to be performed without compromising the quality of life of patients performing these activities in the future.
  • Conference Object
    Citation - WoS: 2
    Citation - Scopus: 2
    Effort Prediction With Limited Data: a Case Study for Data Warehouse Projects
    (IEEE, 2022) Unlu, Huseyin; Yildiz, Ali; Demirors, Onur
    Organizations may create a sustainable competitive advantage against competitors by using data warehouse systems with which they can assess the current status of their operations at any moment. They can analyze trends and connections using up-to-date data. However, data warehouse projects tend to fail more often than other projects as it can be tough to estimate the effort required to build a data warehouse system. Functional size measurement is one of the methods used as an input for estimating the amount of work in a software project. In this study, we formed a measurement basis for DWH projects in an organization based on the COSMIC Functional Size Measurement Method. We mapped COSMIC rules on two different architectures used for DWH projects in the organization and measured the size of the projects. We calculated the productivity of the projects and compared them with the organization's previous projects and DWH projects in the ISBSG repository. We could not create an organization-wide effort estimation model as we had a limited number of projects. As an alternative, we evaluated the success of effort estimation using DWH projects in the ISBSG repository. We also reported the challenges we faced during the size measurement process.