Graduate School of Informatics, Term Project

Browse
Search within this collection:

Filters

Entity Type
Project (36)

Has File(s)
Yes (36)

Author
Akgündüz, Okan (1)
Aktaş, Utku (1)
Aktepe, Semih Can (1)
akçören, berkay (1)
Alzariqi, Abdullah Talat Ahmed Mohammed (1)

Subject
Blockchain (2)
Cyber Security (2)
Deep Learning, (2)
LLM (2)
Smart Contracts (2)

Date Issued
2021 - 2026 (36)

Item Type
Term Project (36)

Recent Submissions

Rooftop Identification and Classification from High-Resolution Aerial Imagery for Photovoltaic Potential Analysis Using Deep Learning
Ünal, Oğuz Kağan; Koçyiğit, Altan; Department of Information Systems (2026-1-29)
Accurate identification of roof areas and roof types is crucial for assessing solar photovoltaic (PV)potential. This study proposes a two-stage deep learning method for roof analysis using high-resolution aerial RGB images...
Early Detection of Alzheimer’s Disease Using a Shannon Information Source Model of the Brain
Şekerci, Esra; Yarman Vural, Fatoş Tunay; Department of Information Systems (2026-1-23)
Alzheimer’s disease is associated with progressive disruption of resting-state functional organization that is difficult to characterize reliably using correlation- and graph-based summaries alone. This study evaluates an ...
Automatic Layout and Visualization Tool for Electrical Substation Diagrams
Yılmaz, Ahmet Saim; Koçyiğit, Altan; Department of Information Systems (2026-1-23)
This report presents an automated web-based single-line diagram layout and visualization system for electrical substations. The proposed system seeks to remove the need for manually drafted, error prone layouts in order to...
A Web-Based Generative Modeling Platform for Building Layout Optimization
Yasavul, Halil; Koçyiğit, Altan; Department of Cognitive Sciences (2026-1-20)
In Architecture, Engineering and Construction (AEC) industry, adoption of web platforms for optimization and computational design tools is a major challenge. This study introduces Crafus, a web-based platform that runs ge...
Cost of Quality Analysis for an Embedded Communication Project
Kılınç, Engin; Özcan Top, Özden; Department of Information Systems (2026-1-16)
This report examines the use of Cost of Quality (CoQ) analysis in hardware–software integrated embedded systems, focusing on projects where detailed quantitative effort data is not available. The study is based on a single...
Impact of Mobility on GPSR and AODV Routing Performance in FANETs
Ünal, Salih Deniz; Koçyiğit, Altan; Department of Information Systems (2026-1-16)
Flying Ad Hoc Networks (FANETs) enable communication between Unmanned Aerial Vehicles (UAVs); however, their high speed and mobility create significant routing challenges. This study compares the performance of Greedy Peri...
A COMPARATIVE EVALUATION OF COMMERCIAL AND OPEN-SOURCE DYNAMIC APPLICATION SECURITY TESTING TOOLS
Şahin, Emre Can; Tezcan, Cihangir; Department of Cybersecurity (2026-1-09)
Web applications are central to our daily lives, used frequently in every aspect of our lives, from banking and shopping to public services and healthcare. However, their increasingly complex structures make them an attrac...
Comparative Analysis Of The Commonly Used Code Generated By Large Language Models For MISRA C Compliance
Öztop, Umut; Özkan Yıldırım, Sevgi; Department of Information Systems (2026-1)
This report presents whether Large Language Models (LLMs) like ChatGPT and Gemini can generate safety-critical C code compliant with MISRA C:2012. We tasked six models with implementing CRC16 and COBS algorithms, verifyi...
A PROOF OF CONCEPT FOR ML-DRIVEN PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) AUDIT SYSTEMS
AVCI, ZEYNEL ABIDIN; Tezcan, Cihangir; Department of Cybersecurity (2025-6-25)
Today, PCI DSS audits are mostly manual, which takes a lot of time and is often prone to mistakes. Problems like slow evidence collection, inconsistent policy reviews, and late threat detection can leave gaps in compliance...
A Comprehensive Survey on Password Storage Security
Oruntak, Murat Can; Tezcan, Cihangir; Department of Cybersecurity (2025-6-16)
Weak password storage practices still are a major vulnerability in modern systems. Despite the rise of alternative authentication methods, passwords remain the most dominant form of access control across various sectors wh...
ZERO TRUST ARCHITECTURE IN ENTERPRISE NETWORKS WITH SOCIO-TECHNICAL PERSPECTIVE
Demirkol, Jülide Nazlı; Özkan Yıldırım, Sevgi; Department of Cybersecurity (2025-6-12)
In enterprise organizations, network architecture is a key component. While traditional network architecture based on perimeters, it sees trusted inside of the castle and make it vulnerable to insider threats. Zero Trust A...
PROMPT INJECTION ATTACKS ON LARGE LANGUAGE MODELS: A SYSTEMATIC LITERATURE REVIEW
Bayhan, Fatih; Tezcan, Cihangir; Department of Cybersecurity (2025-6-11)
The use of Large Language Models has increased significantly after the release of ChatGPT in 2022. LLMs are used in various applications including chatbots and generative artificial intelligence applications. LLMs are inte...
A Review of LLM Security: Threats and Mitigations
Günay, Bengi; Tezcan, Cihangir; Department of Cybersecurity (2025-1-23)
Large Language Models (LLMs) are advanced AI systems trained on massive datasets to process and generate natural language. These models can understand, summarize, and create human-like text with remarkable accuracy. Sinc...
JAMMER DETECTION IN AUTONOMOUS VEHICLES WITH MACHINE LEARNING
Demiryürek, Mert; Taşkaya Temizel, Tuğba; Department of Information Systems (2025-1-23)
Wireless communication systems of autonomous vehicles may be vulnerable to threats such as jammer attacks. As a result of these attacks, operational failures and security problems may occur. This study aims to classify whi...
A SECURITY HARDENING SURVEY FOR MICROSOFT SQL SERVER DATABASE MANAGEMENT SYSTEM
Baş, Berk; Tezcan, Cihangir; Department of Cybersecurity (2025-1-16)
Database management systems are indispensable to almost every organization that maintains an IT infrastructure. For this reason, organizations need to ensure database management systems’ security and the security of data...
A Survey on Password-free Authentication Method: Passkey
Doğan, Sait Göktuğ; Tezcan, Cihangir; Department of Cybersecurity (2025-1-15)
When a need for to authenticate someone or something, the first answer that comes to mind is to use passwords. While implemented and used properly, passwords are more than enough to securely authenticate. But like everythi...
ASSESSING ADVANCED RETRIEVALAUGMENTED GENERATION TECHNIQUES FOR QUESTION ANSWERING: A CASE STUDY ON GOVERNMENTAL SERVICES
Alzariqi, Abdullah Talat Ahmed Mohammed; Taşkaya Temizel, Tuğba; Department of Information Systems (2025-1-15)
This case study evaluates advanced Retrieval-Augmented Generation (RAG) methods to enhance question answering in conversational AI for government services, focusing on data from the Ministry of Health and Prevention. It as...
Security Assessment of the Smartcard Systems at Middle East Technical University
akçören, berkay; Tezcan, Cihangir; Department of Cybersecurity (2025-1-10)
Smartcards are portable devices that can communicate wirelessly and contain microchips capable of transferring, processing or storing data. They serve practical and reliable solutions for everyday problems such as identifi...
API Security Guideline for Developers and Product Owners
Akgündüz, Okan; Tezcan, Cihangir; Department of Cognitive Sciences (2025-1-10)
This report provides a survey for security topics, practices, and recommendations to consider when designing, developing, and maintaining an API service. It is primarily intended for developers, product owners, and other s...
METATRANSCRIPTOMICS ANALYSIS USING MICROBIOME RNA-SEQ DATA
Köseoğlu, Aysu; Acar, Aybar Can; Department of Medical Informatics (2024-6-14)
This project aimed to understand Coprothermobacter proteolyticus and explore meta transcriptomics analysis using microbiome RNA sequencing (RNA-seq). Additionally, the project emphasized the importance of training data for...
Citation Formats