Graduate School of Informatics, Term Project

Browse
Search within this collection:

Filters

Entity Type
Project (13)

Has File(s)
Yes (13)

Author
Aktaş, Utku (1)
Aktepe, Semih Can (1)
Arıcı, İrem (1)
BEKTAŞ, Barış Cem (1)
Erdemir, Elifnur (1)

Subject
Blockchain (2)
Smart Contracts (2)
3D Conv LSTM (1)
ADNI Database (1)
Alzheimer's disease (1)

Date Issued
2021 - 2024 (13)

Item Type
Term Project (13)

Recent Submissions

PathFinder - An Intelligent Algorithm for MCDC Test-Path Generation
Şimşekoğlu, İsmail; Koçyiğit, Altan; Department of Software Management (2024-1-31)
Introducing Pathfinder, an innovative automated tool designed for generating comprehensive test cases in the realm of C language source codes. The primary objective is to fulfill Modified Condition/Decision Coverage (MC/DC...
Smart Contract Vulnerabilities
Özgen, Mustafa Uğur; Tezcan, Cihangir; Department of Cybersecurity (2024-1-26)
Various industries, particularly financial technologies, are adopting blockchain to create decentralized applications through smart contracts due to its popularity and features such as immutability, pseudo-anonymity, trans...
Predicting Alzheimer's Disease Stage Transformations 12 Months in Advance using 3D Convolutional LSTM based on 3D Magnetic Resonance Images
Erdemir, Elifnur; Aydın Son, Yeşim; Department of Medical Informatics (2024-1-25)
This study evaluates the ability to predict the transition from the healthy cognitive stage to the Alzheimer's stage using a 3D LSTM model. The model was trained on a data set created from MR images taken at different time...
Process, Technology and Human Aspects of a Security Operations Center
Erdıvan, Cem; Acar, Aybar Can; Department of Cybersecurity (2024-1-24)
This report presents the high level aspects of any security operations center and tries to define a baseline for SOC processes, technologies to be used and roles to be assigned for an effective and efficient service. This ...
A REFERENCE ARCHITECTURE FOR SIMULATION-BASED DIGITAL TWINS
Kandaz, Murat; Koçyiğit, Altan; Department of Software Management (2024-1-21)
Digital twins can be based on data, physics, rules, behaviors, and geometry models/features. Together with the conventional data-based approach that has been used for decades, other models that are generally based on engin...
Investigating Emotions over the Monetary Outcomes of Wheel-Spin Game using Bayesian Models
Arıcı, İrem; Yet, Barbaros; Department of Cognitive Sciences (2024-1-19)
This study investigates the relationship between emotions and outcomes of wheel-spin game with monetary reward. The inference of emotions by a probabilistic programming language account for both the overall emotional respo...
IDENTIFYING TECHNICAL DEBT AND TOOLS FOR TECHNICAL DEBT MANAGEMENT IN SOFTWARE DEVELOPMENT
Muratdağı, Tolga; Koçyiğit, Altan; Department of Software Management (2024-1-19)
This term project explores the concept of technical debt in software development, as initially articulated by Ward Cunningham in 1992. Technical debt is a multifaceted compromise that involves finding a balance between spe...
A Review of Cyber Security Maturity Assessment Models for OT Systems
Özkaya, Kamil Olcay; Tezcan, Cihangir; Department of Cybersecurity (2024-1-19)
Cyber security holds significant importance in today's interconnected and digitized industrial landscape. Devices ranging from printers to thermostats, washing machines, and cars are produced in a way that allows them to c...
Semantic Methods In Software Defect Prediction Techniques
Işıkoğlu, Şükrücan Taylan; Koçyiğit, Altan; Department of Software Management (2024-1-1)
The traditional methods in software defect prediction use software metrics that are collected from the source code. However these methods have an important shortcoming: it is possible that two source code segments, where o...
Vulnerability Detection on Solidity Smart Contracts by Using Convolutional Neural Networks
BEKTAŞ, Barış Cem; Acar, Aybar Can; Acar, Aybar Can; Department of Cybersecurity (2023-2-01)
Smart contracts, which are self executing contracts with the terms of the agreement between buyer and seller being directly written into lines of code, have the potential to revolutionize many industries by automating comp...
Vulnerabilities of Facial Recognition and Countermeasures
Aktaş, Utku; Tezcan, Cihangir; Department of Cybersecurity (2022-2-8)
Due to the developments in deep learning, the use of face recognition systems started to spread rapidly. Face recognition systems, which are used for purposes such as unlocking phones, entering our offices, or tracking cit...
Modelling of Learning Unnatural Language Quantifiers
Aktepe, Semih Can; Yet, Barbaros; Department of Cognitive Sciences (2022-2-2)
The fact that all natural language quantifiers are conservative brings out the question of whether people have a predisposition to learn the conservative quantifiers over the non-conservative quantifiers. Many developmenta...
Evaluation Of Emotional Conditions of Patients with Rheumatic Diseases Who Participated in Cognitive Exercise Therapy Approach Through Telerehabilitation with respect to the course of COVID-19 outbreak in Turkey
Taştekin, Elif; Yet, Barbaros; Department of Cognitive Sciences (2021-7-20)
Cognitive Exercise Therapy Approach (CETA) is an innovative exercise method that approaches patients from biological, social, and psychological perspectives. It takes advantage of physical exercises and cognitive therapy i...
Citation Formats