Güncel Gönderiler: Bilgisayar Mühendisliği Bölümü Tezleri

  • Dulaimi, Nadia Ibrahim Nife (2015-05)
    With the increasing data stored in files and databases, it is important to develop strong tools for analysis data like data mining. The major goal of data mining is to discover knowledge of the data and obtain beneficial ...
  • Hussein, Taha Darwassh Hanawy (2015-08)
    An efficient emergency ambulance service must be provided in order to reach injured persons and transport them to the nearest hospital as rapidly as possible. To do so, the ambulance driver must select the shortest road ...
  • Hancı, Fırnas (2015-01)
    Keyphrases are very important tools for summarizing, clustering, indexing and searching documents. Many academic journals request from article authors a list of keyphrases summarizing their research articles. Despite the ...
  • Tilki, Özcan (2014-01)
    Face recognition is one of the most important problems of the computer based systems. In literature, there are several methods used for face recognition such as holistic, local or hybrid methods. On the other hand, recent ...
  • Khalaf, Abdulrahman Zaidan (2014-09)
    In this thesis, the energy efficient and connectivity problem in wireless sensor networks (WSNs) is presented. There are more difference between energy levels of near nodes and far nodes of cluster heads. This problem ...
  • Mustafa, Mohammed Sulaiman (2014-10)
    In this thesis, we try to come up and build a robot platform with multifunction capabilities, easy to add, modify and delete those functions without redesigning, by using easy use technology that can create a suitable ...
  • Hazzaa, Omar (2014-10-10)
    This thesis deals with estimating position and orientation in real time, using visual measurements. A system has been developed with which to solve this problem for unprepared environments, assuming that a map or scene ...
  • Mohammed, Ahmed (2014-02-21)
    Digital watermarks have recently emerged as a possible solution for protecting the copyright of digital materials. The work presented in this thesis is concerned with the Discrete Wavelet Transform DWT based digital ...
  • Aslan, Alper (2014)
    This thesis focuses on the performance stability score (PSS) of the Web-Based Application Workflow (WBAW) and gathers the automated virtual user response times, repeated with scheduled periods, to calculate the best ...
  • Özçetin, Mustafa (2013)
    Geographic Information Systems (GIS) have a lot of applications that are getting more and more importance in our daily life. One of the hot and crucial application areas of GIS is crime mapping. Nowadays, crime rates tend ...
  • Yenice, Merve (2012-09)
    In this thesis, how to find a human being’s ethnical identity from his/her face is analyzed. Parts of the face like eyes, nose, mouth, skin colour are used for defining the face. In addition to this, some programs like C# ...
  • Mozaffer, Ahmad Karim (2012-06)
    In this thesis, an expert system that evaluates the Software Development for Blood Disease is studied. The system asks some critical questions about the blood tests after answers these questions the system concludes the ...
  • İssam, Yaser (2012-09)
    Over the past two decades, the emergence of numerous new communication technologies has been witnessed. Among these, networking, optics, infrared, bluetooth are some. Many researchers have been focusing on this matter ...
  • Yıldırım, Ahmet Artu (, 2011-01-27)
    Parallel clustering algorithm implementations concerning message passing interface (MPI) and compute unified device architecture (CUDA) model with their applications to very large datasets have been presented in the thesis. ...
  • Medeni, İhsan Tolga (2008-09)
    The drastic developments in computer, information and communications technologies during the second half of the last century have resulted an explosion together with the name of ‘internet’. It soon became clear, however, ...
  • Ülküderner, Çağlar (2007-09)
    This thesis includes a comparative study on wireless network security issues. Thesis also introduces a new method using a GSM operator which can control the internet accesses with improved security. By this method, mobile ...
  • Birdal, Ahmet (2007-06-18)
    Evolution of user interfaces shapes the change in the human-computer interaction devices. As three-dimensional (3-D) applications take place, the need for a new type of interaction device arises since traditional devices ...
  • Özkan, Uğraş (2007-01-18)
    Mobile systems are becoming more dominant in usage according to their abilities and they are offering a considerable market opportunity for software. Artificial Intelligence technologies offer the potential to create ...
  • Tarıyan, Sibel (2007-02-08)
    RSVP allows Internet real-time applications to request a specific end-to-end QoS for data stream before they start transmitting data. In this report firstly an overview of RSVP is presented. After that the different quality ...
  • Battal, Fulya (2007-07-26)
    In this thesis, an expert system that evaluates the risk of damage of buildings during an earthquake is studied. The system asks some critical questions about the ground type and structural properties of the buildings. The ...