Güncel Gönderiler: Fen Bilimleri Enstitüsü

  • Akın, Hasan Hüseyin (2004-06)
    Dramatic changes have been occuring in the lifestyles of the IT users, with every innovation in communications technology. Today, wireless communications technology will gradually and inevitably be part of our lives. While, ...
  • Dayanır, Mahmut Mert (2004-05)
    E-mail is one of the most well established, standardized and widely used communication methods available on the Internet. The 60% of all the messaging systems depend on e-mail systems. Linux as we all know is the free and ...
  • Faraj, Aqeel (2004-06)
    This thesis discusses about simulation of collision rate in Ethernet (local area network) by using CSMA/CD (carrier sense multiple access /collision detection). We try to simulate this network by introducing five different ...
  • Yeniaras, Erol (2004-05)
    As a vibration of ground, earthquake results in a time-dependent displacement on the bases of the buildings and creates a dynamic effect. Especially, in the countries in which eartquakes take place more frequently and more ...
  • Küçükçongar, Abdullah (2004-07)
    This thesis describes a microcontroller based closed loop control system. In this study several control algorithms have been implemented into the microcontroller and then the system performance have been evaluated by ...
  • Preveze, Barbaros (2004-06)
    Simulation on efficiency of IP protocol in networks Preveze, Barbaros Ms, Department of Computer Engineering Supervisor: Asst. Prof. Dr. Halil T. Eyyuboğlu June 2004, 53 pages This thesis presents the results of a computer ...
  • Dilek, Mustafa Hadi (2003-05)
    The bookmarks are the tools used by the Web users for revisiting the Web pages that they have visited before. But, the bookmak management approaches are not sufficient yet to use efficiently most of the facilities offered ...
  • Güler, Namık (2003-06)
    Here in this master thesis I am planning to explain and introduce artificial intelligence and search methods. You might be heard or read some papers or books about artificial intelligence, but also now you will have chance ...
  • Karakoç, İlkay (2003-06)
    Artificial Intelligence applications have been started in order to design computer programs that have human abilities. It has been thought that Artificial Intelligence applications will improve programs' abilities in the ...
  • Öztürk, Haluk (2003-09)
    Public-key cryptography is fast becoming the foundation for online commerce and other applications that require security and authentication in an open network. The widespread use of public-key cryptography requires a ...
  • Akıllı, Yücel (2003-06)
    Although machine learning may induce reliable diagnostic algorithms from the limited description of the patient, such diagnostic tools definitely cannot, and also are not intended to, replace the physicians, but should ...
  • Bozkurt, Feridun (2003)
    The three-tier architecture is a high-level logical design model for enterprise application. It is introduced to overcome the deficiencies of the two-tier architecture. Three tiered Windows applications are component-based ...
  • Buz, Ayşe Nurdan (2002-09)
    In today's world of computing, it is hardly possible to do without graphics, im ages and sound. Uncompressed data needs very large amount of physical storage space and transmission time. The availability of storage media ...
  • Yılmaz, Erdem Gökhan (2002)
    Application fields of remote control is enlarging, as cost effective and compact solutions are provided. Embedded Web Servers are one of these solutions that is recently introduced. PCs can be found everywhere and with the ...
  • Choupani, Roya (2002-07)
    The client server communication model has been used in remote controlling of devices. The main feature in this study is that the Internet has been used as the common media to transmit controlling data and receive information. ...
  • Uysal, Murat Paşa (2002-05)
    Distributed, Heterogenous and Multi Database Management Systems (DHMDBS) originated from the large organizations' needs for a centrally- controlled information management by special software and administrative procedures ...
  • Uğurlu, Taner (2002)
    Client - based Remote Oracle Database Server can be accessed by configuring Oracle Client's and Server's Listeners by Net8 Assistant, ODBC (Open Database Connectivity) Driver and BDE (Borland Database Engine) Administrator. ...
  • Demirel, K. Volkan (2009-06-17)
    LEDS are conventionally used as indicators in control panels, and also for light sources in low power optic communication applications. Recently, high power and more efficient LEDs have appeared on the market. This study ...
  • Sönmez, Arzu Burçak (2008-06-18)
    The aim of this study is to construct a system which recognizes specified objects from video sequences. First the moving foreground objects are separated from the background by object segmentation. Then an object template ...
  • Al-Taei, Ali (2015-01)
    In recent years, there has been an increasing interest in Massive Open Online Courses (MOOCs). This interest highlights the importance of understanding behavior, traits, and preferences of individuals. Developing such ...