Now showing items 1-20 of 27

    • 3D forest fire propagation simulation 

      Köse K.; Grammalidis, N.; Yilmaz, E.; Çetin, E. (2008)
      The increase in the number of forest fires in the last few years dispatch governments to take precautions. Besides prevention, early intervention is also very important in fire fighting. If the firefighters know where the ...
    • Animation of boiling phenomena 

      Bulbul, A.; Kucuktunc, O.; Ozguc, B. (2008)
      Phenomenon of boiling is a challenging topic for computer graphics due to its complex hydrodynamics and formulation. Realistic fluid animations require very heavy three-dimensional fluid flow calculations, and surface ...
    • BilKristal 4.0: A tool for crystal parameters extraction and defect quantification 

      Okuyan, E.; Okuyan, C. (Elsevier, 2015)
      In this paper, we present a revised version of BilKristal 3.0 tool. Raycast screenshot functionality is added to provide improved visual analysis. We added atomic distance analysis functionality to assess crystalline ...
    • Camera tamper detection using wavelet analysis for video surveillance 

      Aksay, A.; Temizel, A.; Çetin, A. E. (2007)
      It is generally accepted that video surveillance system operators lose their concentration after a short period of time and may miss important events taking place. In addition, many surveillance systems are frequently left ...
    • Characterizing Gnutella network properties for peer-to-peer network simulation 

      Ciraci, S.; Korpeoglu, I.; Ulusoy, Ö. (Springer, 2005)
      A P2P network that is overlayed over Internet can consist of thousands, or even millions of nodes. To analyze the performance of a P2P network, or an algorithm or protocol designed for a P2P network, simulation studies ...
    • Design and implementation of a DMD based volumetric 3D display 

      Yücesoy V.; Tunaoǧlu, D.; Kovachev, M.; Ilieva, R.; Onural, L. (2008)
      A real image swept-volume volumetric display is developed. A piston type moving screen is used to obtain the desired volume. A commercially available DMD device is used to project 2D slices of a 3D frame. There is a varying ...
    • A distributed and measurement-based framework against free riding in peer-to-peer networks 

      Karakaya, M.; Korpeoglu, I.; Ulusoy, Ö. (2004)
      In this paper, we propose a distributed and measurement-based method to reduce the degree of free riding in P2P networks. We primarily focus on developing schemes to locate free riders and on determining policies that can ...
    • Distributed construction and maintenance of bandwidth-efficient bluetooth scatternets 

      Tekkalmaz, M.; Sözer H.; Körpeoǧlu I. (2005)
      Bluetooth networks can be constructed as piconets or scatternets depending on the number of nodes in the network. Although piconet construction is a well-defined process specified in Bluetooth standards, scatternet ...
    • Dynamic congestion control in interconnected computer networks 

      Ulusoy, Ö.; Baray, M. (Publ by IEEE, Piscataway, NJ, United States, 1988)
      In interconnected networks, the performance of a network is affected heavily by the traffic transmitted from other networks. A network may become subject to congestion when the internetwork traffic increases rapidly. It ...
    • An evaluation of a client-server real-time database system 

      Ulusoy, Ö. (ACM (Association for Computing Machinery), 1996)
      A real-time database system (RTDBS) can be defined as a database system where transactions are associated with real-time constraints. In this paper, we investigate various performance issues in a RTDBS constructed on a ...
    • Mesh topology design in overlay virtual private networks 

      Karasan, E.; Ekin-Karasan, O.; Akar, N.; Pinar, M. C. (IET, 2002)
      The mesh topology design problem in overlay virtual private networks is studied. Given a set of customer nodes and an associated traffic matrix, tunnels that connect node pairs through a service provider network are ...
    • Model-free adaptive hysteresis for dynamic bandwidth reservation 

      Akar, N. (2007)
      Dynamic bandwidth reservation refers to the process of dynamically updating the bandwidth allocation to a connection between two network end points on the basis of actual aggregate traffic demand of the connection. We ...
    • Moderating effects of climate and external support on transformational leadership and technological innovation: An investigation in creative ventures in Turkey 

      Gumusluoglu L.T.; Ilsev, A. (2006)
      The purpose of this study was to investigate the influence of transformational leadership on technological innovation at the organizational level. Specifically, it was proposed that transformational leadership would have ...
    • Negative refraction and subwavelength focusing using left-handed composite metamaterials 

      Ozbay, E.; Aydin, K. (2008)
      We review experimental studies performed on left-handed metamaterials (LHM) at microwave frequencies. The metamaterial structure is composed of periodic arrays of split-ring resonators and wire meshes and exhibits a ...
    • A peer-to-peer file search and download protocol for wireless ad-hoc networks 

      Sözer, H.; Tekkalmaz, M.; Korpeoglu, I. (Elsevier BV, 2009-01)
      Deployment of traditional peer-to-peer file sharing systems on a wireless ad-hoc network introduces several challenges. Information and workload distribution as well as routing are major problems for members of a wireless ...
    • Pole-zero computation in microwave circuits using multipoint Padé approximation 

      Celik, M.; Ocali, O.; Tan, M. A.; Atalar, Abdullah (Institute of Electrical and Electronics Engineers, 1995-01)
      A new method is proposed for dominant pole- zero (or pole-residue) analysis of large linear microwave circuits containing both lumped and distributed elements. The method is based on a multipoint Padé approximation. It ...
    • Privacy threats and practical solutions for genetic risk tests 

      Barman, L.; Elgraini, M.-T.; Raisaro, J. L.; Hubaux, J. -P.; Ayday, E. (Institute of Electrical and Electronics Engineers Inc., 2015)
      Recently, several solutions have been proposed to address the complex challenge of protecting individuals' genetic data during personalized medicine tests. In this short paper, we analyze different privacy threats and ...
    • Reducing Router-Crossings in a Mobile Intranet 

      Korpeoglu, I.; Dube, R.; Tripathi, S. K. (Springer, 1998)
      Current general purpose mobility solutions like Mobile-IP involve multiple router-crossings even when the mobile host moves within an intranet from one subnet of a router to another. An environment consisting of a large ...
    • A reputation-based trust management system for P2P networks 

      Selçuk, A. A.; Uzun, E.; Pariente, M. R. (IEEE, 2004)
      The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we describe a reputation-based trust management protocol for P2P networks where users rate ...
    • rtPS uplink scheduling algorithms for IEEE 802.16 networks 

      Erturk, M.C.; Akar, N. (2008)
      IEEE 802.16 MAC provides flexible bandwidth allocation and QoS mechanisms for users with different requirements. However, QoS scheduling is not specified by the 802.16 standard and is thus left open for vendors' implementation. ...