Browsing by Department Thesis (Master)--İzmir Institute of Technology, Computer Engineering

Showing results 1 to 100 of 172  next >
Issue DateTitleAuthor(s)
20063D reconstruction using a spherical spiral scan cameraVatansever, Mustafa
2008Access monitoring system for distributed firewall policiesÇakı, Oğuzhan
Jul-2018Analysing the encrypted search algorithms on encrypted dataTekin, Leyla
Dec-2017Analysis of feature pattern mining approaches on social network: A case study on FacebookÖztürk, Elif
Mar-2022Analysis of fingerprint matching performance with deep neural networksGöçen, Alper
Dec-2017An analysis of information spreading and privacy issues on social networksSayin, Burcu 
2004Analysis of intrusion prevention methodsSemerci, Hakan
2005An analysis of key generation efficiency of RSA cryptosystem in distributed environmentsÇağrıcı, Gökhan
Jul-2018Analyzing social media data by frequent pattern mining methodsGüvenoğlu, Büşra
2009Anomaly detection using network traffic characterizationYarımtepe, Oğuz
Jun-2018Application development for improving website usability by web mining methodsTüker, Merve Ceren
Dec-2020Application of graph neural networks on software modelingLeblebici, Onur Yusuf
1999An approch to the security problems in the TCP/IP protocol suite for a network security monitor designMutaf, Pars
Jul-2018Assessment and certification of safety critical softwareUzun Yenigün, Bengisu
Jul-2018Automatic question generation using natural language processing techniquesKeklik, Onur
Dec-2022Automatic quote detection from literary workGüzel Altıntaş, Aybüke
Jul-2019Automatic story construction from news articles in an online fashionCan, Özgür
2006An automatic vision guided position controller in a conveyor belt pick and place systemÇelikdemir, Özgür
2007Basic key exchange protocols for secret key cryptosystems under CRYMPIX libraryUslu, Sevgi
2005A basic web-based distance education modelTuranlı, Dehan
Dec-2020Blackhole attacks in IoT networksSokat, Barış 
Dec-2019Block-chain based remote update for embedded devicesKaptan, Melike
Jul-2022A blockchain application for payment and traffic management in smart vehiclesYiğitbaşı, Boğaçhan
Apr-2020Blockchain application on loyalty cardSönmeztürk, Osman
Mar-2022Blockchain based context aware access control structure implementation for security of internet of things systemKul, Aslı 
Jul-2013Business activity monitoring for logistics management systemsTitiz, Dilek
2011Campus network topology discovery and distributed firewall policy generationÇalışkan, Ezgi
2004Categorization of web sites in Turkey with SVMŞimşek, Kadir
Jun-2016Classification and tracking of vehicles with hybrid camera systemsBarış, İpek
Dec-2020Classification of contradictory opinions in text using deep learning methodsOğul, İskender Ülgen 
2006A cluster based communication architecture for distributed applications in mobile ad hoc networksDağdeviren, Orhan 
Jun-2015Collection and classification of JavaScript libraries included in websiteAtıcı, İrem
Dec-2012A common representation, standardization, analysis for de novo sequencing resultsTakan, Savaş 
2007The comparative performance analysis of lattice based NTRU cryptosystem with other asymmetrical cryptosystemsMersin, Ali
Jul-2020Comparison of classification algorithms in pitch type prediction problemTürkmen, Fatih
2003Comparison of different algorithms for exploting the hidden trends in data sourcesÖzsevim, Emrah
Jul-2015Comparison of document classification approaches for Turkish textsÇobanoğlu, Özlem Ece
2012Comparison of dynamic rule mining algorithmsShariff, Karunda
2002Comparison of recovery requirements with investigation requirements for intrusion management systemsArpaçay Tapucu, Dilek
Jun-2022Compiler-managed fault tolerance techniques for general purpose graphics processing unitsKaya, Ercüment
Jun-2019Container damage detection and classification using container imagesİmamoğlu, Zeynep
Dec-2018Context aware role based access control model for internet of things applicationsGenç, Didem
1999Craniofacial computer assisted surgical planning and simulationEkin, Emine
Jul-2019A dedicated server design for physical web applicationsAbdennebi, Anes
Jul-2020Deep learning in fingerprint analysisİrtem, Pelin
2006Defining a sample template for governmental procurements of cryptographic productsTaş, Levent
2005The design and development of a data warehouse using sales database and requirements of a retail groupGüratan, Işıl
Jul-2022Design and implementation of a domain specific language for event sequence graphsKalecik, Mert
2010Designing programmable logic controller for data acquisition and controlGözütok, Mehmet Emre
2009A detection and correction approach for overflow vulnerabilities in graphical user interfacesMüftüoğlu, Can Arda
Jul-2019Detection and localization of motorway overhead directional signs by convolutional neural networks trained with synthetic imagesHekimgil, Hakan
Jul-2016Develepment of framework for frequent itemset mining under multiple support thresholdsDarrab, Sadeq Hussein Saleh
2006Developing a security mechanism for software agentsTekbacak, Fatih
2008Development of a distributed firewall administration toolErdoğan, Yunus
Dec-2022Development of a machine learning platform for analysis of mitochondrial features in live-cell imagesTarkan, Yalçın
2002Development of a quality assurance prototype for intrusion detection systemsYüksel, Ulaş
2009The development of a social network analysis software toolSoydan, Cansoy
2010Development of a static analysis tool to find securty vulnerabilities in java applicationsTopuz, Bertan
2008Development of a web services security archhitecture based on .net frameworkBacı, Recep
Jul-2016Development of an application for dynamic itemset mining under multiple support thresholdsAbuzayed, Nourhan
Jul-2022Development of co-evolution tracker tool for software with acceptance criteriaYalçın, Ali Görkem
2010Development of fuzzy syllogistic algorithms and applications distributed reasoning approachesÇakır, Hüseyin
Jul-2019Digital font generation using long short-term memory networksTemizkan, Onur
Jul-2014A direct approach for object detection with omnidirectional camerasÇınaroğlu, İbrahim
2012Distinct encoded records join operator for distributed query processingÖztürk, Ahmet Cumhur
2005A distributed multiprecision cryptographic library designHışıl, Hüseyin
May-2019Domain-specific modeling based feature-oriented automatic test generation methodology for software product linesŞensülün, Sercan
2007A dominating set based communication architecture for distributed applications in mobile Ad hoc networksÇokuslu, Deniz 
2012Dynamic frequent itemset mining based on Matrix Appriori algorithmOğuz, Damla 
2001An education environment for web based trainingKılınç, Hacı Hakan
Jul-2019Effectiveness of using clustering for test case prioritizationGünel, Can
Dec-2018Elimination of useless images from raw camera-trap dataTekeli, Ulaş
2001Empirical computation of absorbed radiation in medium like human body and graphical representation of dose distributionGökçe, Tuncay Cemil
2004End-to-end security for mobile devicesKayayurt, Barış
Jul-2020Enriching contextual word embeddings with character informationPolatbilek, Ozan
Jul-2023Enrichment of Turkish Question Answering systems using knowledge graphsÇiftçi, Okan
Jun-2019Estimation of low sucrose concentrations and classification of bacteria concentrations with machine learning on spectroscopic dataMezgil, Bahadır
Jul-2023Evaluating impacts of micro-architectural metrics on error resilience and performance of general purpose GPU applicationsTopçu, Burak 
Aug-2020Evaluation of scheduling architectures for OSEK/VDX compliant hard real-time operating systemsSaydam, Berkay
2014An event-based Hidden Makrov Model approach to news classification and sequencingÇavuş, Engin
2014An exact approach with minimum side-effects for association rule hidingLeloğlu, Engin
Jun-2019Extended topology analysis of a detection mechanism implementation against Botnet Based DDoS flooding attack in SDNKarakış, Emre
2013A feedback-based testing methodology for network security softwareGerçek, Gürcan
2002Finding and evaluating patterns in Web repository using database technology and data mining algorithmsÖzakar, Belgin 
Sep-2015Finding out subject-matter experts and research trends using bibliographic dataKarataş, Arzum 
2001A firewall design for academic environmentsTok, Metin
2005Firewall monitoring using intrusion detection systemsAsarcıklı, Şükran
Jul-2018A framework for generalized syllogismsÇine, Ersin
Jul-2015Fuzzy-syllogistic reasoningZarechnev, Mikhail
1999A genetic algorithmic approach to the differential and linear cryptanalysisEminağaoğlu, Mete
2013Group key establishment protocols: Pairing cryptography and verifiable secret sharing schemeAslanoğlu, Rabia
2003Heuristic container placement algorithmsAslan, Burak Galip 
Mar-2022Hierarchical image classification with self-supervised vision transformer featuresKaragüler, Caner
Dec-2018Identifying communities using collaboration and word association networks in Turkish social mediaAtay, Abdullah Asil
1997Image classifcation by means of pattern recognition techniquesGüzel, Cumhur
2010Impacts of frequent itemset hiding algorithms on privacy preserving data miningYıldız, Barış
Sep-2019Implementation and performance analysis of contex-aware role-based access controls for cloud-based IoT platformDöşemeci, Mete Merthan
2004An implementation model for open sources evaluationTekir, Selma 
Jul-2021Improvement on motion-guided siamese object tracking networks using prioritized windowsÜnlü, Ünver Can 
2004Improvements in K-means algorithm to execute on large amounts of dataSülün, Erhan