DSpace@Çankaya

Yayın tarihi için Bilgisayar Mühendisliği Bölümü Tezleri listeleme

Yayın tarihi için Bilgisayar Mühendisliği Bölümü Tezleri listeleme

Sırala: Sıra: Sonuçlar:

  • Can, Barbaros (2002)
    1990'ların başından bu yana nesne-yönelimli programlama bilgisayar dünyasında oldukça popüler hale gelmiştir. Bu eğilimin etkisiyle, geleneksel veri tabanı sistemlerinin eksikliklerini gidermek amacıyla nesne-yönelimli ...
  • Yılmaz, Erdem Gökhan (2002)
    Application fields of remote control is enlarging, as cost effective and compact solutions are provided. Embedded Web Servers are one of these solutions that is recently introduced. PCs can be found everywhere and with the ...
  • Uğurlu, Taner (2002)
    Client - based Remote Oracle Database Server can be accessed by configuring Oracle Client's and Server's Listeners by Net8 Assistant, ODBC (Open Database Connectivity) Driver and BDE (Borland Database Engine) Administrator. ...
  • Özbay, Eylem (2002-01)
    Model Based Human Face Detection Using Skin Color Segmentation Özbay, Eylem Ms, Department of Computer Engineering Supervisor: Dr. Reza Hassanpour January 2005, 85 pages For identification of the people easiest way using ...
  • Uysal, Murat Paşa (2002-05)
    Distributed, Heterogenous and Multi Database Management Systems (DHMDBS) originated from the large organizations' needs for a centrally- controlled information management by special software and administrative procedures ...
  • Choupani, Roya (2002-07)
    The client server communication model has been used in remote controlling of devices. The main feature in this study is that the Internet has been used as the common media to transmit controlling data and receive information. ...
  • Buz, Ayşe Nurdan (2002-09)
    In today's world of computing, it is hardly possible to do without graphics, im ages and sound. Uncompressed data needs very large amount of physical storage space and transmission time. The availability of storage media ...
  • Bozkurt, Feridun (2003)
    The three-tier architecture is a high-level logical design model for enterprise application. It is introduced to overcome the deficiencies of the two-tier architecture. Three tiered Windows applications are component-based ...
  • Altay, Serap (2003)
    Performance Analysis of Mobile IPv4 With and Without Route Optimization Altay, Serap Ms, Department of Computer Engineering Supervisor: Asst. Prof. Gülsün Töreci May 2003, 92 pages The support of mobility in the modern ...
  • Dilek, Mustafa Hadi (2003-05)
    The bookmarks are the tools used by the Web users for revisiting the Web pages that they have visited before. But, the bookmak management approaches are not sufficient yet to use efficiently most of the facilities offered ...
  • Akıllı, Yücel (2003-06)
    Although machine learning may induce reliable diagnostic algorithms from the limited description of the patient, such diagnostic tools definitely cannot, and also are not intended to, replace the physicians, but should ...
  • Güler, Namık (2003-06)
    Here in this master thesis I am planning to explain and introduce artificial intelligence and search methods. You might be heard or read some papers or books about artificial intelligence, but also now you will have chance ...
  • Karakoç, İlkay (2003-06)
    Artificial Intelligence applications have been started in order to design computer programs that have human abilities. It has been thought that Artificial Intelligence applications will improve programs' abilities in the ...
  • Öztürk, Haluk (2003-09)
    Public-key cryptography is fast becoming the foundation for online commerce and other applications that require security and authentication in an open network. The widespread use of public-key cryptography requires a ...
  • Arpalı, Çağlar (2004)
    Architecture of New Generation Networks Arpali, Çağlar Ms, Department of Computer Engineering Supervisor: Asst. Prof. Dr. Halil T. Eyyuboğlu June 2004, 64 pages In this thesis, two macro cell propagation models for network ...
  • Fakılı, Defne (2004)
    Person identification from fingerprints is one of the most reliable techniques in identification systems the reason is that every person has got a unique fingerprint and it does not change with age. It preserves the same ...
  • Çelik, Sezai Gökçe (2004)
    oz BİLEŞEN YÖNELİMLİ YAZILIM MÜHENDİSLİĞİ MODELLEME ARACI Çelik, Sezai Gökçe Yüksek Lisans, Bilgisayar Mühendisliği Bölümü Tez Yöneticisi: Yrd. Doç. Dr. Gülsün TÖRECİ Eylül 2004, 71 sayfa Bileşen Yönelimli geliştirme yeniden ...
  • Fakılı, Defne (2004)
    öz Dijital resimlerde parmakizi saptanması Fakılı, Defne Yüksek Lisans, Bilgisayar Mühendisliği Tez Yöneticisi: Prof.Dr. Ziya Güvenç Haziran 2004, 65 sayfa Parmak izinden yola çıkarak kimlik belirlemesi, kimlik belirlemek ...
  • Aydın, Ayhan (2004-01)
    Smart sensors are taking a large part in the growing world. They have lots of application fields that we are using in our daily life. For example lots of heater or cooler have sensors and lots of home or office have sensor ...
  • Ergen, Mehmet Tunç (2004-02-01)
    XML is rapidly emerging as a standard for exchanging business data on the World Wide Web. From management systems to e-business application providers to pure development tools, XML has gone from newly underground technology ...