Bölüm "Bilgisayar Mühendisliği" için listeleme
Toplam kayıt 228, listelenen: 101-120
-
Extensive Cryptanalysis of Authenticated Encryption With Associated Data Algorithm Colm
(Fen Bilimleri Enstitüsü, 2023-07-04)The main objective of an Authenticated Encryption with Associated Data (AEAD) algorithm is to keep the encrypted plaintext secret until its tag is validated. There are two main methods related to the cryptanalysis of AEAD ... -
Flight Maneuver Classification Using Artificial Neural Networks
(Fen Bilimleri Enstitüsü, 2023)There are globally known basic flight maneuvers performed by fighter and aerobatics pilots with agile aircraft. These basic flight maneuvers have strict rules that the pilots should follow to complete the maneuver and ... -
FPGA tabanlı otomatik kontrol sistemleri geliştirme
(Fen Bilimleri Enstitüsü, 2016-05)In this thesis, controller design is studied on a Field Programmable Gate Array (FPGA), which has the capabilities of reprogrammability and parallel processing. The PID and SMC have been chosen as controllers in this study ... -
Fractıonal Order Feedback Control of Nonlınear Aerıal Systems
(Fen Bilimleri Enstitüsü, 2019-11-12)In this dissertation, a system of Fractional Order Proportional Integral Derivative controller is introduced and implemented to a radar guided missile in order to track a high-speed flying target. Many novel intelligent ... -
Gelişmiş Sinyal İşleme için Verimli Heterojen Paralel Hesaplama
(Fen Bilimleri Enstitüsü, 2022)In this thesis, power-efficient, real-time, parallel applications are designed which aims to reduce increased computational overhead of advanced signal processing algorithms compared to conventional signal processing ... -
Generating Illustrations for Children Books Using Generative Adversarial Networks
(Fen Bilimleri Enstitüsü, 2022)This thesis presents a very first method to create children illustration book images. Our method takes edge maps or sketches as input and generates images and/or videos stylized by the selected illustrator. To achieve this, ... -
Generatıng Storıes From Large Scale Image Collectıons
(Fen Bilimleri Enstitüsü, 2020)Making sense of ever-growing amount of visual data that is available on the web is one of the biggest challenges we face today. As a step towards this goal, this study tackles a relatively less-studied topic in the literature, ... -
Görüntü Bölütleme ve Görüntü Benzetimi Yöntemleri Yardımı ile Hastalığın Teşhis ve Tedavi Sonrası Süreçlerinin Desteklenmesi: Keratokonus Örneği
(Gazi Univ, Fac Engineering Architecture, 2016)A supporting application for field experts on diagnosing Keratoconus disease and monitoring the healing stage after treatment by a unified system of image segmentation and image simulation processes of corneal images was ... -
Göz İzleme Donanımı Kullanılarak Web Uygulamalarının Kullanılabı̇lirlik Testlerı̇ İçin İçerı̇k Duyarlı YaklaşIm
(Fen Bilimleri Enstitüsü, 2018)Eye tracking technology provides eye movement details by tracking movements of pupil of the eye. Eye tracking devices use infrared sensors and specialized cameras to track movements of the pupil. This technology is developed ... -
Güvenilirlik Odaklı Tümleşik Sistem Tasarım Yöntemi
(Fen Bilimleri Enstitüsü, 2017-06-01)Combinational circuits have become more vulnerable to soft errors (SEs) in each CMOS technology generation. Most of the prior studies use hardware redundancy in an attempt to harden the circuits against errors. However, ... -
Hibrit Analiz Kullanarak Android Kötücül Yazılım Aile Sınıflandırması
(Fen Bilimleri Enstitüsü, 2021-12-31)With the developments in mobile and wireless technology, mobile devices have become an important part of our lives. While Android is the leading operating system in the market share, it is also the most targeted platform ... -
Highly-Cited Papers In Software Engineering: The Top-100
(Elsevier, 2016)Context: According to the search reported in this paper, as of this writing (May 2015), a very large number of papers (more than 70,000) have been published in the area of Software Engineering (SE) since its inception in ... -
Identifying Criminal Organizations From Their Social Network Structures
(2019)Identification of criminal structures within very large social networks is an essential security feat. By identifying such structures, it may be possible to track, neutralize, and terminate the corresponding criminal ... -
Image Collection Summarization With Intrinsic Properties
(Fen Bilimleri Enstitüsü, 2018)Visual summarization is an inherently complex process as its definition has some subjectivity in itself that there is nothing like a single perfect summary. In general, a good summary consists of two main properties which ... -
Integration Testing Maturity Assessment for Safety Critical Avionics Software
(Fen Bilimleri Enstitüsü, 2023)Safety-critical software failures lead to serious results such as loss of live or damage to the environment; therefore, safety-critical software verification requires special attention. Avionics system software is one type ... -
İkili Arka Plan Destekli Yazar - Bağımsız Yazarlık Doğrulama Sistemi
(Fen Bilimleri Enstitüsü, 2020)Authorship verification is a decision problem that tries to find out whether the text of an unknown author belongs to a suspicious author. The problem is the fundamental one of the studies in authorship analysis that has ... -
İnandırıcı Kalabalık Benzetiminde Birey Sayısı ve Hareket Çeşitliliği Araştırması
(Fen Bilimleri Enstitüsü, 2017)Nowadays, computer games and movies, which constitute a significant part of the entertainment industry, are among the main application areas that use crowd simulations extensively. In the majority of such entertainment ... -
İnsansız Hava Araçlarında Bulunan Kameralar Kullanılarak Orman Yangınlarının Tespit Edilmesi
(Fen Bilimleri Enstitüsü, 2023)Unmanned aerial vehicles(UAVs) are invaluable technologies thanks to their remote control and monitoring capabilities. Operational forces and firefighters use UAVs in wildfire detection missions. Due to their high pattern ... -
KALABALIK GÖZETLEME ORTAMLARINDA ANOMALİ TESPİTİ
(Fen Bilimleri Enstitüsü, 2017)Camera survaillance systems are effective security methods with a wide range of uses. Videos obtained from these systems are examined by the security personnel in order to determine the dangerous situations and take the ...