Güncel Gönderiler: Bilgisayar Mühendisliği Bölümü Tezleri

  • Türkarslan, Umut (2005-06)
    The purpose of this study is to solve maze path finding problem by using genetic algorithm. An artificial agent supposed to be an autonomous mobile robot randomly tries to find a valid path between two specified locations ...
  • Aydın, Ayhan (2004-01)
    Smart sensors are taking a large part in the growing world. They have lots of application fields that we are using in our daily life. For example lots of heater or cooler have sensors and lots of home or office have sensor ...
  • Yüzbaşoğlu, Fırat (2004-04)
    This study describes the design and implementation of multi-master software PC bus on Zilog's z8 microcontrollers. PC bus is developed to support a com- munication integrated circuits (ICs) and microcontrollers on the same ...
  • Rapaka, Rajesh (2004-09)
    The growing need for computer graphics applications demands flexible and powerful libraries. However, the available libraries are not easy - to - use software systems. The main reason is that these systems have been developed ...
  • Rapaka, Manoj (2004-09)
    Solid objects in the real world do not pass through each other when they collide. Enforcing this property of "solidnesf' is important in many interactive graphics applications and using solidness makes the virtual environment ...
  • Bal, Muammer (2004-08)
    This thesis presents a 3D Graphics Engine design which includes geometrical methods, graphics pipeline, collision detection, animation of characters, geometric level of detail, terrain, and special effect parts. The quality ...
  • Demirol, Mehmet Özgür (2004-05)
    In order to implement the subject software suited to a distributed database system management is developed for a real life problem solution. The implementation of the software in a distributed database environment makes ...
  • Öcal, Uğur (2004-06)
    The fuzzy logic theory, which has been applied since 1 970 in order to approach to the human mechanism of decision making, is used today in many industrial products. New intermediary values have been added to the "yes" and ...
  • Akın, Hasan Hüseyin (2004-06)
    Dramatic changes have been occuring in the lifestyles of the IT users, with every innovation in communications technology. Today, wireless communications technology will gradually and inevitably be part of our lives. While, ...
  • Dayanır, Mahmut Mert (2004-05)
    E-mail is one of the most well established, standardized and widely used communication methods available on the Internet. The 60% of all the messaging systems depend on e-mail systems. Linux as we all know is the free and ...
  • Faraj, Aqeel (2004-06)
    This thesis discusses about simulation of collision rate in Ethernet (local area network) by using CSMA/CD (carrier sense multiple access /collision detection). We try to simulate this network by introducing five different ...
  • Yeniaras, Erol (2004-05)
    As a vibration of ground, earthquake results in a time-dependent displacement on the bases of the buildings and creates a dynamic effect. Especially, in the countries in which eartquakes take place more frequently and more ...
  • Küçükçongar, Abdullah (2004-07)
    This thesis describes a microcontroller based closed loop control system. In this study several control algorithms have been implemented into the microcontroller and then the system performance have been evaluated by ...
  • Preveze, Barbaros (2004-06)
    Simulation on efficiency of IP protocol in networks Preveze, Barbaros Ms, Department of Computer Engineering Supervisor: Asst. Prof. Dr. Halil T. Eyyuboğlu June 2004, 53 pages This thesis presents the results of a computer ...
  • Dilek, Mustafa Hadi (2003-05)
    The bookmarks are the tools used by the Web users for revisiting the Web pages that they have visited before. But, the bookmak management approaches are not sufficient yet to use efficiently most of the facilities offered ...
  • Güler, Namık (2003-06)
    Here in this master thesis I am planning to explain and introduce artificial intelligence and search methods. You might be heard or read some papers or books about artificial intelligence, but also now you will have chance ...
  • Karakoç, İlkay (2003-06)
    Artificial Intelligence applications have been started in order to design computer programs that have human abilities. It has been thought that Artificial Intelligence applications will improve programs' abilities in the ...
  • Öztürk, Haluk (2003-09)
    Public-key cryptography is fast becoming the foundation for online commerce and other applications that require security and authentication in an open network. The widespread use of public-key cryptography requires a ...
  • Akıllı, Yücel (2003-06)
    Although machine learning may induce reliable diagnostic algorithms from the limited description of the patient, such diagnostic tools definitely cannot, and also are not intended to, replace the physicians, but should ...
  • Bozkurt, Feridun (2003)
    The three-tier architecture is a high-level logical design model for enterprise application. It is introduced to overcome the deficiencies of the two-tier architecture. Three tiered Windows applications are component-based ...