Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
A simulation approach to office and classroom illumination
Download
173773.pdf
Date
1978
Author
Şen, Tayyar Durmuş
Metadata
Show full item record
Item Usage Stats
43
views
39
downloads
Cite This
URI
https://hdl.handle.net/11511/5645
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
A layered approach to learning coordination knowledge in multiagent environments
Erus, Guray; Polat, Faruk (2007-12-01)
Multiagent learning involves acquisition of cooperative behavior among intelligent agents in order to satisfy the joint goals. Reinforcement Learning (RL) is a promising unsupervised machine learning technique inspired from the earlier studies in animal learning. In this paper, we propose a new RL technique called the Two Level Reinforcement Learning with Communication (2LRL) method to provide cooperative action selection in a multiagent environment. In 2LRL, learning takes place in two hierarchical levels;...
A Deep reinforcement learning approach to network intrusion detection
Gülmez, Halim Görkem; Angın, Pelin; Department of Computer Engineering (2019)
Intrusion detection is one of the most important problems in today’s world. Every daynew attacks are being used in order to breach the security of systems and signature-based security systems fail to detect these zero-day attacks. An anomaly-basedintrusion detection system, particularly one that utilizes a machine learning approach,is needed to effectively handle these kinds of attacks. With the advancements in bigdata technologies, storing and handling data became easier, therefore big dataanalytics has be...
A Petri net approach to behavioural simulation of design artefacts with application to mechatronic design
Erden, Z; Erden, A; Erkmen, Aydan Müşerref (2003-02-01)
A Petri net-based design inference network (PNDN) architecture is presented in this paper. The network models the logical behaviour of any design artefact developed by designers at the conceptual design level by representing the subfunctions and their inter-relationships to perform a required overall function. The theoretical framework in developing the PNDN is based on the improved theory of Petri nets and hybrid automata. The theoretical PNDN architecture was implemented in a C++ based software called the...
A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing
Bhargava, Bharat; Angın, Pelin; Ranchal, Rohit; Lingayat, Sunil (2015-01-01)
The past decade has witnessed immense developments in the field of network computing thanks to the rise of the cloud computing paradigm, which enables shared access to a wealth of computing and storage resources without needing to own them. While cloud computing facilitates on-demand deployment, mobility and collaboration of services, mechanisms for enforcing security and performance constraints when accessing cloud services are still at an immature state. The highly dynamic nature of networks and clouds ma...
A Big Data Analytical Approach to Cloud Intrusion Detection
Gulmez, Halim Gorkem; Tuncel, Emrah; Angın, Pelin (null; 2018-06-30)
Advances in cloud computing in the past decade have made it a feasible option for the high performance computing and mass storage needs of many enterprises due to the low startup and management costs. Due to this prevalent use, cloud systems have become hot targets for attackers aiming to disrupt reliable operation of large enterprise systems. The variety of attacks launched on cloud systems, including zero-day attacks that these systems are not prepared for, call for a unified approach for real-time detect...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
T. D. Şen, “A simulation approach to office and classroom illumination,” Middle East Technical University, 1978.