Computer Engineering / Bilgisayar Mühendisliği

Permanent URI for this collectionhttps://hdl.handle.net/11147/10

Browse

Search Results

Now showing 1 - 10 of 21
  • Article
    Citation - WoS: 4
    Citation - Scopus: 5
    Query optimization: Mobile agents versus accuracy of the cost estimation
    (CRL Publishing, 2005) Özakar, Belgin; Morvan, F.; Hameurlaint, A.
    Since an increasing number of diverse sources of data and information become available through World Wide Web, the field of distributed heterogeneous query processing attracts attention of the researchers. One of the main concerns is to reduce the amount of communication and the volume of data transferred in terms of query optimization where it is a real challenge to have the statistics of the resources predictable and up-to-date. Autonomy, proactivity and mobility features of mobile agents seem promising under some conditions. In this paper we are interested in the study of the efficiency of the mobile agents in relation with the approach of the cost model used during the optimization process. We present an execution model based on mobile agents. Performance evaluation shows the efficiency intervals of the execution model according to the estimation errors and the current state of the system. The major contribution of this paper is to point out the effective use of an execution model based on mobile agents in relation with the approach of the cost model and with the query type. © 2005 CRL Publishing Ltd.
  • Article
    Citation - WoS: 3
    Citation - Scopus: 4
    Affordable person detection in omnidirectional cameras using radial integral channel features
    (Springer Verlag, 2019) Demiröz, Barış Evrim; Salah, Albert Ali; Baştanlar, Yalın; Akarun, Lale
    Omnidirectional cameras cover more ground than perspective cameras, at the expense of resolution. Their comprehensive field of view makes omnidirectional cameras appealing for security and ambient intelligence applications. Person detection is usually a core part of such applications. Conventional methods fail for omnidirectional images due to different image geometry and formation. In this study, we propose a method for person detection in omnidirectional images, which is based on the integral channel features approach. Features are extracted from various channels, such as LUV and gradient magnitude, and classified using boosted decision trees. Features are pixel sums inside annular sectors (doughnut slice shapes) contained by the detection window. We also propose a novel data structure called radial integral image that allows to calculate sums inside annular sectors efficiently. We have shown with experiments that our method outperforms the previous state of the art and uses significantly less computational resources.
  • Article
    Citation - WoS: 1
    Citation - Scopus: 1
    A User-Assisted Thread-Level Vulnerability Assessment Tool
    (Wiley, 2019) Öz, Işıl; Topçuoğlu, Haluk Rahmi; Tosun, Oğuz
    The system reliability becomes a critical concern in modern architectures with the scale down of circuits. To deal with soft errors, the replication of system resources has been used at both hardware and software levels. Since the redundancy causes performance degradation, it is required to explore partial redundancy techniques that replicate the most vulnerable parts of the code. The redundancy level of user applications depends on user preferences and may be different for the users with different requirements. In this work, we propose a user-assisted reliability assessment tool based on critical thread analysis for redundancy in parallel architectures. Our analysis evaluates the application threads of a parallel program by considering their criticality in the execution and selects the most critical thread or threads to be replicated. Moreover, we extend our analysis by exploring critical regions of individual threads and execute redundantly only those regions to reduce redundancy overhead. Our experimental evaluation indicates that the replication of the most critical thread improves the system reliability more (up to 10% for blackscholes application) than the replication of any other thread. The partial thread replication based on critical region analysis also reduces the vulnerability of the system by considering a fine-grained approach.
  • Article
    Citation - WoS: 9
    Citation - Scopus: 11
    A Qualitative Survey on Frequent Subgraph Mining
    (De Gruyter, 2018) Güvenoğlu, Büşra; Ergenç Bostanoğlu, Belgin
    Data mining is a popular research area that has been studied by many researchers and focuses on finding unforeseen and important information in large databases. One of the popular data structures used to represent large heterogeneous data in the field of data mining is graphs. So, graph mining is one of the most popular subdivisions of data mining. Subgraphs that are more frequently encountered than the user-defined threshold in a database are called frequent subgraphs. Frequent subgraphs in a database can give important information about this database. Using this information, data can be classified, clustered and indexed. The purpose of this survey is to examine frequent subgraph mining algorithms (i) in terms of frequent subgraph discovery process phases such as candidate generation and frequency calculation, (ii) categorize the algorithms according to their general attributes such as input type, dynamicity of graphs, result type, algorithmic approach they are based on, algorithmic design and graph representation as well as (iii) to discuss the performance of algorithms in comparison to each other and the challenges faced by the algorithms recently.
  • Correction
    Citation - WoS: 1
    Citation - Scopus: 1
    Correction To: Detection and Classifcation of Vehicles From Omnidirectional Videos Using Multiple Silhouettes
    (Springer, 2018) Karaimer, Hakkı Can; Barış, İpek; Baştanlar, Yalın
    An acknowledgements section was missing in this paper. It should read as follows:.
  • Article
    Citation - WoS: 3
    Citation - Scopus: 3
    Elimination of Useless Images From Raw Camera-Trap Data
    (Türkiye Klinikleri Journal of Medical Sciences, 2019) Tekeli, Ulaş; Baştanlar, Yalın
    Camera-traps are motion triggered cameras that are used to observe animals in nature. The number of images collected from camera-traps has increased significantly with the widening use of camera-traps thanks to advances in digital technology. A great workload is required for wild-life researchers to group and label these images. We propose a system to decrease the amount of time spent by the researchers by eliminating useless images from raw camera-trap data. These images are too bright, too dark, blurred, or they contain no animals To eliminate bright, dark, and blurred images we employ techniques based on image histograms and fast Fourier transform. To eliminate the images without animals, we propose a system combining convolutional neural networks and background subtraction. We experimentally show that the proposed approach keeps 99% of photos with animals while eliminating more than 50% of photos without animals. We also present a software prototype that employs developed algorithms to eliminate useless images.
  • Article
    Citation - WoS: 2
    Privacy Issues in Post Dissemination on Facebook
    (Türkiye Klinikleri Journal of Medical Sciences, 2019) Sayın, Burcu; Şahin, Serap; Kogias, Dimitrios G.; Patrikakis, Charalampos Z.
    With social networks (SNs) being populated by a still increasing numbers of people who take advantage of the communication and collaboration capabilities that they offer, the probability of the exposure of people's personal moments to a wider than expected audience is also increasing. By studying the functionalities and characteristics that modern SNs offer, along with the people's habits and common behaviors in them, it is easy to understand that several privacy risks may exist, many of which people may be unaware of. In this paper, we focus on users' interactions with posts in a social network (SN), using Facebook as our research domain, and we emphasize some privacy leakages currently existing in Facebook's privacy policy. We also propose a solution to detected privacy issues, featuring a reference implementation of a tool based on a simulation, which visualizes the effect of potential privacy risks on Facebook and directs users to control their privacy. The proposed and simulated tool allows a post owner to observe the spreading area of his or her post depending on the selected privacy settings. Moreover, it provides preliminary feedback for all Facebook users that have interacted with this post, to make them aware of the possible privacy changes, aiming to give them a chance to protect the privacy of their interaction on this post by deleting it when an unwanted privacy change takes place. Finally, an online survey to increase privacy awareness in Facebook usage with over 500 volunteer participants has illuminated the need for such a tool or solution.
  • Article
    Citation - WoS: 22
    Citation - Scopus: 40
    Correlation of Critical Success Factors With Success of Software Projects: an Empirical Investigation
    (Springer Verlag, 2019) Garousi, Vahid; Tarhan, Ayça; Pfahl, Dietmar; Coşkunçay, Ahmet; Demirörs, Onur
    Software engineering researchers have, over the years, proposed different critical success factors (CSFs) which are believed to be critically correlated with the success of software projects. To conduct an empirical investigation into the correlation of CSFs with success of software projects, we adapt and extend in this work an existing contingency fit model of CSFs. To archive the above objective, we designed an online survey and gathered CSF-related data for 101 software projects in the Turkish software industry. Among our findings is that the top three CSFs having the most significant associations with project success were: (1) team experience with the software development methodologies, (2) team's expertise with the task, and (3) project monitoring and controlling. A comprehensive correlation analysis between the CSFs and project success indicates positive associations between the majority of the factors and variables, however, in most of the cases at non-significant levels. By adding to the body of evidence in this field, the results of the study will be useful for a wide audience. Software managers can use the results to prioritize the improvement opportunities in their organizations w.r.t. the discussed CSFs. Software engineers might use the results to improve their skills in different dimensions, and researchers might use the results to prioritize and conduct follow-up in-depth studies on those factors.
  • Article
    Citation - WoS: 6
    Citation - Scopus: 6
    Estimating Software Robustness in Relation To Input Validation Vulnerabilities Using Bayesian Networks
    (Springer Verlag, 2018) Ufuktepe, Ekincan; Tuğlular, Tuğkan
    Estimating the robustness of software in the presence of invalid inputs has long been a challenging task owing to the fact that developers usually fail to take the necessary action to validate inputs during the design and implementation of software. We propose a method for estimating the robustness of software in relation to input validation vulnerabilities using Bayesian networks. The proposed method runs on all program functions and/or methods. It calculates a robustness value using information on the existence of input validation code in the functions and utilizing common weakness scores of known input validation vulnerabilities. In the case study, ten well-known software libraries implemented in the JavaScript language, which are chosen because of their increasing popularity among software developers, are evaluated. Using our method, software development teams can track changes made to software to deal with invalid inputs.
  • Article
    Citation - WoS: 15
    Citation - Scopus: 21
    Tracking Fast Moving Targets in Wireless Sensor Networks
    (Institution of Electronics and Telecommunication Engineers, 2010) Alaybeyoğlu, Ayşegül; Erciyeş, Kayhan; Kantarcı, Aylin; Dağdeviren, Orhan
    We propose a dynamic distributed algorithm for tracking objects that move fast in a sensor network. In the earlier efforts in tracking moving targets, the current leader node at time t predicts the location only for time t + 1 and if the target moves in high speed, it can pass by a group of nodes very fast without being detected. Therefore, as the target increases its speed, the probability of missing that target also increases. In this study, we propose a target tracking system that predicts future k locations of the target and awakens the -corresponding leader nodes so that the nodes along the trajectory self organize to form the clusters to collect data related to the target in advance and thus reduce the target misses. The algorithm first -provides detection of the target and forms a cluster with the neighboring nodes around it. After the selection of the cluster leader, the coordinates of the target is estimated using localization methods and cooperation -between the cluster nodes under the control of the leader node. The coordinates and the speed of the target are then used to estimate its trajectory. This information in turn provides the location of the nodes along the estimated trajectory which can be awaken, hence providing tracking of the moving object. We describe the algorithm, analyze its efficiency and show by simulations that it performs well to track very fast moving objects with speeds much higher than reported in literature.