Department of Information Systems and Technologies
Permanent URI for this community
Browse
Browsing Department of Information Systems and Technologies by Type "Conference Paper"
Now showing 1 - 20 of 29
Results Per Page
Sort Options
Item Open Access Analyzing Turkish e-government websites by eye tracking(IEEE, 2013) Albayrak, Duygu; Çaģiltay, K.Usability studies provide essential information about users' views and perceptions of efficiency, effectiveness and satisfaction of given online services. Nowadays, e-government web sites become popular. Therefore, there is a need for usability testing to specify the usability problems and to make the services of the e-government more usable. The purpose of this study is to investigate usability of some Turkish e-government services. The study examined usability of five Turkish e-government web sites: Ministry of National Education - Student Information System (eokul), Ministry of Justice - National Judicial Network Project (UYAP), Turkish National Police: Vehicle Search System, Social Security Institute: Service Details and General Directorate of Land Registry and Cadastre. It was conducted with nine participants. This study is a case study with mixed design methodology, in which both quantitative and qualitative approaches were employed and combined. Quantitative data were collected through an eye-tracker, a pre-test questionnaire of participants' demographics and previous utilization of egovernment web sites and a post-test questionnaire. Qualitative data were collected through both semi-structured individual interviews and observation during test. The study results identify the usability problems encountered while using government services. The study concludes with specific recommendations for improvement of e-government services in Turkey. © 2013 IEEE.Item Open Access Are software engineers' responses to incomplete requirements related to project characteristics?(IEEE, 2009) Albayrak, Özlem; Albayrak, Duygu; Kiliç, T.Software requirements quality affects software product quality. For high-quality software products, software requirements must be complete. When faced with incomplete requirements, software engineers attempt to fill the requirements' gaps differently, either by getting feedback from the user or by making assumptions. Assumptions may be explicit or implicit. Explicit assumptions are preferable to implicit assumptions as explicit assumptions can be validated. We conduct an empirical study to determine whether the number of explicit assumptions made by software engineers is related to a project's characteristics. Using data from two CMMI Level 3 companies and 16 projects, we investigated the responses of 92 software engineers to the same incomplete software requirement. Our findings show possible relationships between projects' characteristics and the number of explicit assumptions. ©2009 IEEE.Item Open Access Balancing energy loads in wireless sensor networks through uniformly quantized energy levels-based clustering(IEEE, 2010) Ali, Syed Amjad; Sevgi, Cüneyt; Kocyigit, A.Clustering is considered a common and an effective method to prolong the lifetime of a wireless sensor network. This paper provides a new insight into the cluster formation process based on uniformly quantizing the residual energy of the sensor nodes. The unified simulation framework provided herein, not only aids to reveal an optimum number of clusters but also the required number of quantization levels to maximize the network's lifetime by improving energy load balancing for both homogeneous and heterogeneous sensor networks. The provided simulation results clearly show that the uniformly quantized energy level-based clustering provides improved load balancing and hence, a longer network lifetime than existing methods. © 2010 IEEE.Item Open Access The best way to unblock the pipeline in CS is by getting everyone to code in schools. A debate(ACM, 2016) Craig, A.; Lang, C.; Egan, M. A.; Ayfer, ReyyanMany believe that the push to increase the number of skilled computer scientists must be a multi-pronged approach and be institutionalized at all levels of education. Some federal and local governments are requiring that all students become proficient in technical areas in primary and secondary schooling. Will the call for all schools to teach every student coding be the magic bullet that unblocks the computing pipeline? Is adding another core subject to an already crowded curricula the answer? Are schools ready? It is noted that there is no universal computer science/coding curriculum for teachers to follow, some teachers don't have the skills or the enthusiasm to do this, not all students can think logically so why try to force them? In the words of Einstein "Everybody is a genius. But if you judge a fish by its ability to climb a tree, it will live its whole life believing that it is stupid".Item Open Access Capitalizing the predictive potential of machine learning to detect various fire types using NASA's MODIS satellite data for the mediterranean basin(Association for Computing Machinery, 2024-01-22) Lassem, Nima Kamali; Gaafar, Obai Mohamed Hisham Abdelmohsen ; Ali, Seyid AmjadThis study investigates the realm of machine learning for the classification of different fire types using NASA's FIRMS MODIS satellite data for the Mediterranean basin. Concentrating on the Mediterranean basin and utilizing data spanning from 2019 to 2021 for model training, XGBoost and Random Forest models were subsequently validated for the 2022 data. The findings distinctly illustrate XGBoost's superior predictive precision as compared to Random Forest by showcasing an impressive overall F1 score surpassing 95% and 84% macro F1 score across various fire types. This study emphasizes the prospect of machine learning to improve worldwide wildfire monitoring and response by providing exact, real-time fire type forecasts.Item Open Access Effectiveness of information systems outsourcing: An exploratory case study(IADIS, 2012) Uçar, Erkan; Bilgen, S.The objective of this research is to construct an assessment model for measuring the effectiveness of Information Systems (IS) outsourcing. "Lack of expertise" and "cost effectiveness" constitute the major points of motivation for IS outsourcing. Although various decision models and analytical frameworks have been modeled before, the literature is not abundant on a complete qualitative model. In contrast with the decision models which are executed before an outsourcing engagement (a-priori), an effectiveness assessment model will be an a-posteriori guide which will enable the clients to measure their outsourcing performance and re-evaluate their business and management strategies. This paper examines the factors for outsourcing effectiveness through the framework of an exploratory case study for an IS developed by a major Turkish software house for a public organization. © 2012 IADIS.Item Open Access Energy load balancing for fixed clustering in wireless sensor networks(IEEE, 2012) Ali, Syed Amjad; Sevgi, C.Clustering can be used as an effective technique to achieve both energy load balancing and an extended lifetime for a wireless sensor network (WSN). This paper presents a novel approach that first creates energy balanced fixed/static clusters, and then, to attain energy load balancing within each fixed cluster, rotates the role of cluster head through uniformly quantized energy levels based approach to prolong the overall network lifetime. The method provided herein, not only provides near-dynamic clustering performance but also reduces the complexity due to the fact that cluster formation phase is implemented once. The presented simulation results clearly show the efficacy of this proposed algorithm and thus, it can be used as a practical approach to obtain maximized network lifetime for energy balanced clusters in fixed clustering environments. © 2012 IEEE.Item Open Access An experiment to observe the impact of UML diagrams on the effectiveness of software requirements inspections(IEEE, 2009) Albayrak, ÖzlemSoftware inspections aim to find defects early in the development process and studies have found them to be effective. However, there is almost no data available regarding the impact of UML diagram utilization in software requirements specification documents on inspection effectiveness. This paper addresses this issue by investigating whether inclusion of UML diagrams impacts the effectiveness of requirements inspection. We conducted an experiment in an academic environment with 35 subjects to empirically investigate the impact of UML diagram inclusion on requirements inspections' effectiveness and the number of reported defects. The results show that including UML diagrams in requirements specification document significantly impacts the number of reported defects, and there is no significant impact on the effectiveness of individual i nspections. © 2009 IEEE.Item Open Access Exploiting linearity of modular multiplication(Springer, 2020) Yıldırım, Hamdi MuratThe XOR Open image in new window and the addition ⊞⊞ operations have been widely used as building blocks for many cryptographic primitives. These operations and the multiplication ⊙⊙ operation are successively used in the design of IDEA and the MESH block ciphers. This work presents several interesting algebraic properties of the multiplication operation. By fixing one operand, we obtain vector valued function ggZggZ on Zn2Z2n, associated with ⊙⊙. In this paper we show that the nonlinearity of ggZggZ remains the same under some transformations of Z and moreover we give an upper bound for the nonlinearity of ggZggZ when Z is a power of 2. Under weak-key assumptions, we furthermore present a list of new linear relations for 1-round IDEA cipher, some of directly derived and others algorithmically generated using these relations and known ones. We extend the largest linear weak key class for IDEA cipher with size 223223 to derive such a class with sizes 224224. Under the independent key subblocks (subkeys) and weak-key assumptions we derive many linear relations for IDEA cipher using linear relations for 1-round IDEA cipher.Item Open Access How content management problem of a remote laboratory system can be handled by integrating an open source learning management system? Problems and solutions(IEEE, 2007) Özdoğru, Burcu; Cagıltay, N. E.This paper represents the design and implementation of the integration process of an open source learning management system (LMS) to the remote laboratory platform. The reason of using a learning management system is to prevent the problems which can be seen in the learner side of the remote laboratory systems. However, since using a learning management system such as Moodle can handle the learner problems, since it is a separate system, there are still other problems to be handled such as integrating it with the other parts of remote laboratory systems. This study explores the background information of LMS, the problems faced while integrating Moodle to remote laboratory applications, the chosen content management systems' architecture, our architecture for integrating Moodle with the remote laboratory system and the solutions we propose for the problems.Item Open Access Impact of maintainability defects on code inspections(ACM, 2010) Albayrak, Özlem; Davenport, DavidSoftware inspections are effective ways to detect defects early in the development process. In this paper, we analyze the impact of certain defect types on the effectiveness of code inspection. We conducted an experiment in an academic environment with 88 subjects to empirically investigate the effect of two maintainability defects, i.e., indentation and naming conventions, on the number of functional defects found, the effectiveness of functional defect detections, and the number of false positives reported during individual code inspections. Results show that in cases where both naming conventions and indentation defects exist, the participants found minimum number of defects and reported the highest number of false positives, as compared to the cases where either indentation or naming defects exist. Among maintainability defects, indentation seems to significantly impact the number of functional defects found by the inspector, while the presence of naming conventions defects seems to have no significant impact on the number of functional defects detected. The presence of maintainability defects significantly impacts the number of false positives reported. On the effectiveness of individual code inspectors we observed no significant impact originated from the presence of indentation or naming convention defects. © 2010 ACM.Item Open Access In their words: Student feedback on an international project collaboration(ACM, 2010) Chidanandan, A.; Russell-Dag, Lori; Laxer, C.; Ayfer, ReyyanIn this paper, we describe a collaborative course experience between students from universities in the USA and Turkey. Student teams worked together on a software engineering project for a non-profit organization based in Turkey. The students learned valuable skills in team-work, collaboration-facilitating software tools and working with peers from a different culture and a different time-zone. At the end of the course, in a focus group, students were asked for feedback regarding the course and its outcomes. In this paper, we describe the course from the student perspective. From this, and the instructor's experiences we provide a list of guidelines. Copyright 2010 ACM.Item Open Access Incomplete software requirements and assumptions made by software engineers(IEEE, 2009) Albayrak, Özlem; Kurtoǧlu, Hülya; Biçakçi, M.Many software engineers make implicit assumptions when working with incomplete software requirements. To study assumptions made by software engineers while converting incomplete requirements to software design or to implementation phase deliverables, we conducted an experiment with 251 software engineers from eight companies. The results of this empirical study showed that how software engineers responded (using source code, pseudo code, or prototype) to an incomplete requirement significantly impacted the number of explicit assumptions they made. We studied relationships between the number of explicit assumptions and the engineers' experience and educational backgrounds. On average, non-computer-background engineers made more explicit assumptions than computerbackground graduates. We found a significant relationship between the engineers' experience and the number of explicit assumptions made. We discuss the results and their implications. © 2009 IEEE.Item Open Access A locality preserving one-sided binary tree-Crossbar switch wiring design algorithm(IEEE, 2015) Şahin, DevrimOne-sided crossbar switches allow for a simple implementation of complete Kn graphs. However, designing these circuits is a cumbersome process and can be automated. We present an algorithm that allows designing automatic one-sided binary tree-crossbar switches which do not exceed & LeftFloor;n over 2⌋ columns, and achieves Kn graph without connecting any wires between any three adjacent blocks, thus preserving locality in connections. © 2015 IEEE.Item Open Access Managing international student collaborations: An experience report(IEEE, 2012) Cajander, A.; Daniels, M.; Kultur, Can; Dag, Lori Russell; Laxer, C.Knowledge and experience from working in international collaborative projects prepares engineering students for their future careers in a global market. Hence this is an important element in higher education, although seldom pr ovide d in the c urr ic ulu m. O ne r e as o n f or this la c k mi g ht be uncertainty in how to manage international collaborations and to create a good learning environment for the development of skills related to international collaborations. Therefore this article describes our experiences from managing international student collaborations including theoretical underpinning for our choices when relevant. Having given the context of, and the strategies for running our tw o collaborations, we provide an analysis of our experiences. This includes observations of differences in the two collaborations, both when due to use of different strategies and when due to different contexts, as well as observations of similarities. With this in mind, we present recommendations for running international student collaborations. © 2012 IEEE.Item Open Access On Lempel-Ziv complexity of sequences(Springer, Berlin, Heidelberg, 2006) Doǧanaksoy, A.; Göloǧlu, FarukWe derive recurrences for counting the number a(n, r) of sequences of length n with Lempel-Ziv complexity r, which has important applications, for instance testing randomness of binary sequences. We also give algorithms to compute these recurrences. We employed these algorithms to compute a(n, r) and expected value. EPn, of number of patterns of a sequence of length n, for relatively large n. We offer a randomness test based on the algorithms to be used for testing randomness of binary sequences. We give outputs of the algorithms for some n. We also provide results of the proposed test applied to the outputs of contestant stream ciphers of ECRYPT's eSTREAM. © Springer-Verlag Berlin Heidelberg 2006.Item Open Access On non-cooperative genomic privacy(Springer, Berlin, Heidelberg, 2015) Humbert, M.; Ayday, Erman; Hubaux J.-P.; Telenti, A.Over the last few years, the vast progress in genome sequencing has highly increased the availability of genomic data. Today, individuals can obtain their digital genomic sequences at reasonable prices from many online service providers. Individuals can store their data on personal devices, reveal it on public online databases, or share it with third parties. Yet, it has been shown that genomic data is very privacysensitive and highly correlated between relatives. Therefore, individuals’ decisions about how to manage and secure their genomic data are crucial. People of the same family might have very different opinions about (i) how to protect and (ii) whether or not to reveal their genome. We study this tension by using a game-theoretic approach. First, we model the interplay between two purely-selfish family members. We also analyze how the game evolves when relatives behave altruistically. We define closed-form Nash equilibria in different settings. We then extend the game to N players by means of multi-agent influence diagrams that enable us to efficiently compute Nash equilibria. Our results notably demonstrate that altruism does not always lead to a more efficient outcome in genomic-privacy games. They also show that, if the discrepancy between the genome-sharing benefits that players perceive is too high, they will follow opposite sharing strategies, which has a negative impact on the familial utility. © International Financial Cryptography Association 2015.Item Open Access An optimal network dimensioning and initial energy assignment minimizing the monetary cost of a heterogeneous WSN(IEEE, 2009) Sevgi, Cüneyt; Kocyigit, A.In this paper, a novel method is proposed to dimension a randomly deployed heterogeneous Wireless Sensor Network (WSN) of minimum monetary cost satisfying minimum coverage and minimum lifetime requirements. We consider WSNs consisting of two different types of nodes clusterheads and ordinary sensor nodes, randomly deployed over a sensing field. All devices are assumed to be stationary and have identical sensing capabilities. However, the clusterheads are more energetic and powerful in terms of processing and communication capabilities compared to sensor nodes. For such a network, finding minimum cost WSN problem is not a trivial one, since the distribution of the mixture of two different types of devices and the batteries with different initial energies in each type of device primarily determine the monetary cost of a WSN. Therefore, we formulated an optimization problem to minimize the monetary cost of a WSN for given coverage and lifetime requirements. The proposed optimization problem is solved for a certain scenario and the solution is validated by computer simulations. © 2009 IEEE.Item Open Access Ordinal covering using block designs(IEEE, 2010) Atmaca, Abdullah; Oruc, A.Y.A frequently encountered problem in peer review systems is to facilitate pairwise comparisons of a given set of documents by as few experts as possible. In [7], it was shown that, if each expert is assigned to review k documents then ⌈n(n-1)/k(k-1)⌉ experts are necessary and ⌈n(2n-k)/k 2⌉ experts are sufficient to cover all n(n-1)/2 pairs of n documents. In this paper, we show that, if √n ≤ k ≤ n/2 then the upper bound can be improved using a new assignnment method based on a particular family of balanced incomplete block designs. Specifically, the new method uses ⌈n(n+k)/k2⌉ experts where n/k is a prime power, n divides k2, and √n ≤ k ≤ n/2. When k = √n , this new method uses the minimum number of experts possible and for all other values of k, where √n < k ≤ n/2, the new upper bound is tighter than the general upper bound given in [7]. ©2010 IEEE.Item Open Access Ordinal evaluation and assignment problems(IEEE, 2010) Atmaca, Abdullah; Oruç, A. YavuzIn many assignment problems, a set of documents such as research proposals, promotion dossiers, resumes of job applicants is assigned to a set of experts for ordinal evaluation, ranking, and classification. A desirable condition for such assignments is that every pair of documents is compared and ordered by one or more experts. This condition was modeled as an optimization problem and the number of pairs of documents was maximized for a given incidence relation between a set of documents and a set of experts using a set covering integer programming method in the literature[5]. In this paper, we use a combinatorial approach to derive lower bounds on the number of experts needed to compare all pairs of documents and describe assignments that asymptotically match these bounds. These results are not only theoretically interesting but also have practical implications in obtaining optimal assignments without using complex optimization techniques. ©2010 IEEE.