Yayın tarihi için FBE - Tez Koleksiyonu | Bilgisayar Mühendisliği / Computer Engineering listeleme
Toplam kayıt 73, listelenen: 21-40
-
An industrial application using blackboard architecture
(Işık Üniversitesi, 2006)This thesis implements control architecture for goal-driven blackboard systems. The architecture is based on searching a general goal tree by diminishing into sub-goal trees. The aim is to develop a problem solving ... -
A software process assessment model and a tool for XP@SCRUM agile method
(Işık Üniversitesi, 2006)In today's fast and competitive world, Agile Methods has become popular by software producers because for their high-speed, flexibility and responding to change quickly. These methods have been criticized as undisciplined ... -
Learning web modeling language using moodle
(Işık Üniversitesi, 2006)In this thesis, objectives, basic elements, applications developed and the future of Web Modeling Language - new method for designing data-intensive web applications - are taught by using Moodle Learning Management System. ... -
Data access layer code generator
(Işık Üniversitesi, 2006)Layering techniques are commonly used in order to supply the operational requirements of today's complex enterprise applications. The codes developed for the Data Access Layer (DAL), which is the foundation of most layered ... -
A new priority based packet scheduler with deadline considerations
(Işık Üniversitesi, 2006)Quality of Services (QoS) issues have become a focus point of research on Next Generation Networks (NGNs). In order to supply the various QoS requirements for different kinds of applications, new packet scheduling policies ... -
An infrastructure and a methodology for business process management
(Işık Üniversitesi, 2006-03)This thesis explains in detail an infrastructure and a methodology for business process management as BPM requires much more of a partnership between business and IT. With the proper methodology the business will get the ... -
Performance and security issues in e-payment systems: pay on-line case
(Işık Üniversitesi, 2006-06)In this thesis, we report an experience on Performance and Security issues in E-Payment systems. We develop an E-Payment system which covers all introduced performance and security measures written in this thesis. We also ... -
Database design and implementation issues in library domain
(Işık Üniversitesi, 2006-07)In this thesis, we study the design and implementation issues in library management systems. Depending heavily on data, library management systems should have effective means to access and store data. We propose a novel ... -
Driver recognition and driver verification using data mining technigues
(Işık Üniversitesi, 2007-09-25)In this thesis we present our research in driver recognition and driver verification. The goal of this study is to investigate the affect of different classifier fusion techniques on the performance of driver recognition ... -
Security of chaotic cryptosystems
(Işık Üniversitesi, 2008)In this thesis, we tried to show the weaknesses of chaotic cryptosystems. We break four chaos-based cryptosystems and proved our attacks. In our first cryptanalysis, we broke a cryptosystem based on two dimensional chaotic ... -
Usability analysis of Campus ONLINE, a web-based course registration system
(Işık Üniversitesi, 2008)In this thesis we present our research in usability analysis of a web-based course registration system of our university which is Campus ONLINE, with using a proxy based user interaction and activity tracking system. The ... -
Soa based form development framework with web 2.0
(Işık Üniversitesi, 2008)Enterprise companies require central, web based, performance proved robust applications. There are different types of frameworks and design patterns to fulfill this requirement. The author of this thesis and a team of ... -
Secure SMS using simplified PGP
(Işık Üniversitesi, 2008)While communicating with your partner, the ability to communicate in a secure way is a fundamental and important requirement for information security. Security of communication requires identification and verification of ... -
Cost sensitive learning algorithms
(Işık Üniversitesi, 2008)This thesis studies the cost sensitive learning algorithms that calculate the class learning algorithms errors and costs. Data mining is the automated extraction of hidden predictive information from databases that can be ... -
A learning object harvesting model and a sample application
(Işık Üniversitesi, 2008-03-06)The aim of this thesis is to enable harvesting of Learning Objects which are embedded in web pages. Two main challenges have been identified which are interoperability and semantics. For this purpose, several learning ... -
A framework for developing RDP Applications for IPTV
(Işık Üniversitesi, 2008-04-21)In this thesis a framework for RDP applications for IPTV is described. The goal is to develop applications easily by using the framework. Microsoft IPTV Edition Content Development Kid is used as a simulator of Microsoft ... -
A model for corporate e-learning: Learnomotive
(Işık Üniversitesi, 2008-09-17)Enterprises with dynamic business processes have training needs that should be addressed innovatively. Depending on the business process, new tasks may be constructed. The competence level differences between workers may ... -
Interoperability and e-government services: an example
(Işık Üniversitesi, 2009)Interoperability is a key concept to the understanding of the changes in progress in e-government. These changes are made gradually and with a phased implementation. The thesis aims to define the interoperability and its ... -
Robust localization framework for wireless sensor networks
(Işık Üniversitesi, 2009-01-07)In this thesis we try to construct a robust localization framework for wireless sensor networks and sample algorithms which uses our robust localization framework. In order to handle noise in distance measurements, our ... -
Distributed iterative cluster localization in wireless sensor networks
(Işık Üniversitesi, 2009-01-07)We designed a distributed algorithm for iterative cluster localization. Because this algorithm is especially designed for large scale networks, increase in the number of sensor nodes has no ine ciency e ect on sensor node ...