Computer Engineering / Bilgisayar Mühendisliği
Permanent URI for this collectionhttps://hdl.handle.net/11147/10
Browse
7 results
Search Results
Now showing 1 - 7 of 7
Conference Object Citation - Scopus: 12Incremental Itemset Mining Based on Matrix Apriori Algorithm(Springer Verlag, 2012) Oğuz, Damla; Ergenç, BelginDatabases are updated continuously with increments and re-running the frequent itemset mining algorithms with every update is inefficient. Studies addressing incremental update problem generally propose incremental itemset mining methods based on Apriori and FP-Growth algorithms. Besides inheriting the disadvantages of base algorithms, incremental itemset mining has challenges such as handling i) increments without re-running the algorithm, ii) support changes, iii) new items and iv) addition/deletions in increments. In this paper, we focus on the solution of incremental update problem by proposing the Incremental Matrix Apriori Algorithm. It scans only new transactions, allows the change of minimum support and handles new items in the increments. The base algorithm Matrix Apriori works without candidate generation, scans database only twice and brings additional advantages. Performance studies show that Incremental Matrix Apriori provides speed-up between 41% and 92% while increment size is varied between 5% and 100%.Conference Object Citation - Scopus: 6A Comprehensive Evaluation of Agile Maturity Self-Assessment Surveys(Springer Verlag, 2018) Yürüm, Ozan Raşit; Demirörs, Onur; Rabhi, FethiAgile methodologies are adapted by growing number of software organizations. Agile maturity (also called agility) assessment is a way to ascertain the degree of this adoption and determine a course of action to improve agile maturity. There are a number of agile maturity assessment surveys in order to assess team or organization agility and many of them require no guidance. However, the usability of these surveys are not widely studied. The purpose of this study is to determine available agile maturity self-assessment surveys and evaluate their strengths and weaknesses for agile maturity assessment. An extensive case study is conducted to measure the sufficiency of 22 available agile maturity self-assessment surveys according to the seven expected features: comprehensiveness, fitness for purpose, discriminativeness, objectivity, conciseness, generalizability, and suitability for multiple assessment. Our case study results show that they do not satisfy all of the expected features fully but are helpful in some degree based on the purpose of usage.Conference Object Citation - Scopus: 2Adapting Spice for Development of a Reference Model for Building Information Modeling - Bim-Carem(Springer Verlag, 2018) Yılmaz, Gökçen; Akçamete, Aslı; Demirörs, OnurBuilding Information Modelling (BIM) is highly adopted by Architecture, Engineering, Construction and Facilities Management (AEC/FM) companies around the world due to its benefits such as improving collaboration of stakeholders in projects. Effective implementation of BIM in organizations requires assessment of existing BIM performances of AEC/FM processes. We developed a reference model for BIM capability assessments based on the meta-model of the ISO/IEC 330xx (the most recent version of SPICE) family of standards. BIM-CAREM can be used for identifying the BIM capabilities of the AEC/FM processes. The model was updated iteratively based on the expert reviews and an exploratory case study, and was evaluated via four explanatory case studies. The assessment results showed that the BIM-CAREM is capable of identifying BIM capabilities of specific processes. In this paper, we present how we utilized ISO/IEC 330xx for developing BIM-CAREM as well as the iterations of the model and one of the explanatory case studies as an example.Conference Object Citation - Scopus: 14Systematic Mapping Study on Process Mining in Agile Software Development(Springer Verlag, 2018) Erdem, Sezen; Demirörs, Onur; Rabhi, FethiProcess mining is a process management technique that allows for the analysis of business processes based on the event logs and its aim is to discover, monitor and improve executed processes by extracting knowledge from event logs readily available in information systems. The popularity of agile software development methods has been increasing in the software development field over the last two decades and many software organizations develop software using agile methods. Process mining can provide complementary tools to Agile organizations for process management. Process mining can be used to discover agile processes followed by agile teams to establish the baselines and to determine the fidelity or they can be used to obtain feedback to improve agility. Despite the potential benefit of using process mining for agile software development, there is a lack of research that systematically analyzes the usage of process mining in agile software development. This paper presents a systematic mapping study on usage of process mining in agile software development approaches. The aim is to find out the usage areas of process mining in agile software development, explore commonly used algorithms, data sources, data collection mechanisms, analysis techniques and tools. The study has shown us that process mining is used in Agile software development especially for the purpose of process discovery from task tracking applications. We also observed that source code repositories are main data sources for process mining, a diversity of algorithms are used for analysis of collected data and ProM is the most widely used analysis tool for process mining.Conference Object Citation - Scopus: 1Measuring Change in Software Projects Through an Earned Value Lens(Springer Verlag, 2018) Efe, Pınar; Demirörs, Onur; Benetallah, BoualemEarned Value Management (EVM) is a common performance management tool for project management. EVM enables depicting the project progress in terms of scope, cost and schedule and provides future predictions based on trends and patterns. Even though EVM is widely used in various disciplines like manufacturing and construction, it is not common in software industry. One reason for this underutilization is the mismatch of an inherent nature of the software projects and the traditional EVM. Traditional EVM ignores change effort but it is predominant in software projects. We have developed cEVM as an extension to the traditional EVM to incorporate change and subsequent rework and evolution costs to measure earned value in software development projects more accurately. In this study, we focus on two applications of cEVM we performed to explore the usability of cEVM and to compare cEVM with traditional EVM. This paper discusses the results of the case studies as well as benefits and difficulties of cEVM.Conference Object Model Checker-Based Delay Fault Testing of Sequential Circuits(Springer Verlag, 2015) Takan, Savaş; Güler, Berkin; Ayav, TolgaThis paper applies model checker-based testing, a well-known method from software engineering, to the delay fault testing of synchronous sequential logic circuits. We first model the circuit as timed automata to reveal its timing characteristics. The model is repeatedly mutated by injecting the delay faults under a certain fault assumption and all the mutant models are checked against the given properties by exploiting a model checker. Counterexamples returned from the model checker form the basis of test input sequences. Finally, the test suite minimization is defined as an integer programming problem.Article Citation - WoS: 4Citation - Scopus: 9End-To Security Implementation for Mobile Devices Using Tls Protocol(Springer Verlag, 2006) Kayayurt, Barış; Tuğlular, TuğkanEnd-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used on the Internet, together with its predecessor, SSL protocol. By implementing TLS protocol in the mobile world, the advantage of the proven security model of this protocol can be utilized. The main design goals of mobile end-to-end security protocol are maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object oriented architecture of proposed end-to-end security protocol implementation makes the replacement of this library with another cryptography package easier. The implementation has been experimented with different cases, which represent use of different cryptographic algorithms.
