Yüksek Lisans & Doktora
Permanent URI for this communityhttp://acikerisim.bau.edu.tr:4000/handle/123456789/11
Browse
Item 2004 - 2023 İstanbul Büyükşehir Belediyesi ulaştırma yatırımlarının İstanbul’a etkileri : raylı sistemler, 4. Levent - Hacıosman örneği(Bahçeşehir Üniversitesi Fen Bilimleri Enstitüsü, 2010) Topaloğlu, Hacı Mehmet; Gürsoy,MustafaItem 4734 sayılı Kamu İhale Kanunu kapsamında doğrudan temin ile yapılacak alımlardaki uygulamaların analizi(Bahçeşehir Üniversitesi Fen Bilimleri Enstitüsü, 2009) Atılbaz, Yıldıray; Bozbura, F. TunçItem 5393 ve 6360 sayılı kanunların Avrupa yerel yönetimler özerklik şartı kapsamında değerlendirilmesi(Bahçeşehir Üniversitesi Fen Bilimleri Enstitüsü, 2014-04) Gözüaçık, Halil; Turgut, SırmaÖzerklik, bir topluluğun veya bir kuruluşun ayrı bir yasaya bağlı olarak kendi kendini yönetmesidir. Yerel yönetimler açısından özerklik, anayasa ve kanunlarla belirlenmiş kamu hizmetlerinin bir kısmının vatandaş yararı düşünülerek, yerel yönetimlerin sorumluluğunda yerine getirilmesi yetkisidir. Yerel özerklik önemi nedeniyle başta Birleşmiş Milletler olmak üzere uluslar arası örgütlerin sürekli gündeminde olmuş, hazırlanan uluslar arası belgelerde özerklik birçok açıdan değerlendirilerek tüm dünyada uygulama birliği sağlanmaya çalışılmıştır. Bu konu Avrupa Konseyi tarafından da ele alınarak, bir taraftan Avrupa’nın ekonomik ve siyasal açıdan bütünleşmesini, diğer taraftan bölgesel ve yerel kimliklerin güçlenmesi sonucunda merkezi idarenin bazı yetkilerin yerel birimlere devredilebilmesi için 1985 yılında Avrupa Yerel Yönetimler Özerklik Şartı oluşturulmuştur. Türkiye, 1988 tarihinde Özerklik Şartı’nın bazı maddelerine çekince koyarak imzalamış olmasına rağmen, 1992 tarihinde yürürlüğe koyarak Türkiye’de yerel demokrasinin gelişmesi adına umut verici bir adım atılmaktadır. Son dönemde Türkiye, Avrupa Birliği mevzuatı çerçevesinde yerel yönetimlerin idari ve mali açıdan daha özerk bir yapıya kavuşturulması için birçok yasal düzenlemeler yapmıştır. Bu çalışmada; merkezden yönetim, yerel yönetim ve özerklik kavramlarına kapsamlı bir şekilde değinilmektedir. Ayrıca Özerklik Şartı’nın ortaya çıkış süreci, kapsamı, ilkeleri ve Türkiye’nin Şartı kabulü geniş şekilde ele alınmaktadır. Son olarak, yerel yönetimler hakkında ciddi düzenlemeler içeren 5393 ve 6360 sayılı Kanunların Özerklik Şartı kapsamında değerlendirilmesi yapılarak, yapılan düzenlemelerle yerel özerkliğin ne kadar gerçekleştirilebildiği ortaya konulmaya çalışılmıştır.Item 6098 sayılı Türk borçlar kanunu’nda bina ve yapı eserlerinden doğan sorumluluk (TBK md. 69-BK m.58)(2011) Baş, Ece; Seliçi, ÖzerItem 6102 sayılı Ticaret Kanuna göre anonim şirketlerde kuruluştan doğan sorumluluk(2013) Şahinkuşu, Gözde Sert; Kahyaoğlu, Emin CemItem 6102 sayılı Türk ticaret kanunu bakımından anonim ortaklıklarda yönetim kurulu üyelerinin ibrası(2012) Sever, Rabia; Kahyaoğlu, Emin CemItem 6570 sayılı kanuna tabi taşınmazlar açısından kira sözleşmesinin sona erme nedenleri(Bahçeşehir Üniversitesi Sosyal Bilimler Enstitüsü, 2010) Uluçay, Aslı; Makaracı, AslıItem A cloud-based application design and development for in-memory data grids(Bahçeşehir Üniversitesi Fen Bilimleri Enstitüsü, 2013-06) Şimşek, Murat Yıldırım; Güngör, V. ÇağrıCloud computing is defined as the use of computing resources (hardware, software, storage) over a network. It is a service that combines hardware, storage and interface (software) and is supplied for an end-user over the internet. With the help of this infrastructure that consists of strong components, end-users can easily realize the relevant operations on the internet. In this respect, cloud computing can be viewed as the next step for the internet development. Internet and web technologies change and develop rapidly with each passing day. Also, the demands of end-users increase at the same velocity as these advances. End-users want to do their operations in a fast, reliable and consistent web environment. The establishment of such a web environment is impossible without technological infrastructure. For this reason, many big companies invest on large service infrastructures in order to meet the demands of end-users. In addition, it is required to make changes in the infrastructure because of the constantly increasing number of endusers. The establishment of an infrastructure that develops in accordance with the number of its users and meets all demands of end-users creates difficulties in terms of both cost and management. However, cloud computing with Oracle Coherence provides low-cost solutions because it is flexible, scalable and high performance. In this study, three cloud-based applications that combine SaaS and PaaS models were developed by using Oracle Weblogic Server, Oracle Coherence and Hazelcast. With the help of the cloud-based architecture and applications, it was demonstrated that websites can work faster, more reliably and consistently. Performance results indicated that Oracle Coherence applications, are superior over the traditional database and the other in-memory data grid, Hazelcast, in terms of the response time, cpu use and memory usage.Item A comparative analysis of the concepts of holy war and the idealized topos of holy warrior in medieval Anatolian and European sources(Bahçeşehir Üniversitesi, 2014) Çıkın Sungur, Ceren; Koçkar, Aylin İldenItem A framework for developing online multiple kinect interactions(Bahçeşehir Üniversitesi Fen Bilimleri Enstitüsü, 2013-12) Akkoyun, Muhammed Emre; Öztürk, ÖvgüThis study deals with the Microsoft kinect camera data streaming over internet. Accessing a kinect camera over internet is so popular nowadays. Many developer and research company are working on this hot topic and find several solutions. Most of this applications have some avantages and disadvantages. The main disadvantage of this applications is consuming network bandwidth heavily when transferring kinect data over internet. Because transferring whole of kinect data binds heavily mass of data to the network, so the developers of kinect applications should consider about this topic and should mine and comb out the unnecessary kinect data. This applications also directly access the kinect device from javascript and this approach only works for local applications and not support multiple kinecting display on one browser. There is no best case solutions for this kind of problems. In this study solutions have been found for this problems and disadvantages. Briefly ; for network bandwidth problems kinect data has been mined and unnnecesarry kinect data combed out and the necessary data converted in json format before streaming over network, and for multiple kinect support; application divided into two parts which are server side application and client side application and with the help of this approach some performance problems cleared and network bandwith problem also cleared before network streaming and also with this approach more than one kinect cameras data could streamed over network and displayed on a single web page. On the other hand; with the approach which is used at this study can be implemented for other depth streaming devices with just making modifications on server side application.Item A fuzzy multi-attribute decision making model proposal to select clinical chief of surgery(Bahçeşehir Üniversitesi Fen Bilimleri Enstitüsü, 2012-06) Aksu, İpek Nur; Beşkese, AhmetGünümüzde her firma, bireysel ve kurumsal verimliliği ve etkinliği arttırmayı amaçlayan çalışmalarda bulunmaktadır, şirketlerin sektörel anlamda başarılı olabilmeleri için geçerli ve uygulanabilir bir performans yönetim sisteminin kurulmasını ve işletilmesini sağlamaları gerekmektedir. Rekabet koşullarının giderek arttığı bu dönemde, şirketlerin personel performanslarının değerlendirilmesi geçmişe yönelik performans seviyesini gösterirken, geleceğe yönelik potansiyel performansı belirlemede ve performans arttırma çalışmalarında yeni bir bakış açısı sağlamaktadır. Bu çalışmanın amacı sağlık personelinin özellikle cerrahların işe alım kriterlerini belirlemektir. Çalışma, ilgili iş için 3 adayı ve yıllardır sağlık sektöründe kariyer sahibi olan 2 uzman ile gerçekleştirilmiştir. Bu çalışmada, kar amacı gözetmeyen kuruluşlarda personel performans değerlendirme sistemi, performans değerlendirme kriterlerinin belirlenmesi ve bu kriterlerin kurum açısından önem derecelerinin belirlenmesi için ağırlıklandırılması yer almaktadır. Çalışma iki bölümden oluşmaktadır, birinci bölüm İstanbul’da özel hastanelerde çalışan uzmanlardan alınan bazı bilgilerle işe alım kriterlerinin belirlenmesi ve sonrasında bütün bilgilerin bir araya getirilip işe alım kriterlerinin hiyerarşik yapısını olusturmaktır. Bulanık ortamda, kriterler Analitik Hiyerarşik Süreç ile sıralanmış ve önem dereceleri belirlenmiştir. İkinci bölüm ise pozisyon için uygun adayın TOPSIS methodu ile seçilmesidir. Sonuç olarak, işe alım kriterleri, işe alım sürecini değerlendirme çeşitli methodlar kullanılarak belirlenmiştir. Bu veriler kullanılırak uygun adaya karar verilmiştir.Item A Hardware implementation of true-motion estimation with 3-D recursive search block matching algorithm(Institute of Science, 2008) Dedeoğlu, SonerItem A Hardware implementation of true-motion estimation with 3-D recursive search block matching algorithm(Bahcesehir University Institute of Science, 2008) Dedeoğlu, Soner; Uğurdağ, Hasan FatihMotion estimation, in video processing, is a technique for describing a frame in terms of translated blocks of another reference frame. This technique increases the ratio of video compression by the efficient use of redundancy information between frames. The Block Matching based motion estimation methods, based on dividing frames into blocks and calculating a motion vector for each block, are accepted as motion estimation standards in video encoding systems by international enterprises, such as MPEG, ATSC, DVB and ITU. In this thesis study, a hardware implementation of 3-D Recursive Search Block Matching Algorithm for the motion estimation levels, global and local motion estimations, is presented.Item A method for managing the risk : a hybrid approach to FMEA(Bahçeşehir Üniversitesi Fen Bilimleri Enstitüsü, 2014-06) Pastırmacı, Ali Kaan; Beşkese, AhmetIn today’s competitive business world, companies from all sectors are aiming maximum profit with minimum effort. In order to accomplish this goal, companies can ignore or do not give importance to the potential failures that may give devastating harm to their reputation. These potential failure modes do not only endangering the health/safety of workers and their working conditions but also the reputation of the company. Therefore, companies should also take precautions for potential failure mode to fulfill the obligations of occupational health and safety (OHS) and maintain the reputation of the company. OHS concept requires a detailed and renewable risk analysis methodology. A risk analysis methodology that is used for eliminating the risk related to OHS concept should be simple, straightforward and easy to apply. Indeed, a vast majority of these failure modes can be prevented in advance. A risk analysis methodology which is suitable to the characteristic of the company may help. Risk analysis should be applied by experienced and knowledgeable analysts. In this thesis, one of the most widely used risk analysis methodologies, Failure Mode and Effect Analysis, is proposed. Failure mode and effects analysis is a widely used engineering technique for designing, identifying and eliminating known and/or potential failures, problems, errors and so on from system, design, process, and/or service before they reach the costumer (Schneider & Stamatis 1996). Unfortunately, traditional FMEA methodology has several shortcomings. This work has been planned to eliminate these shortcomings with the help of Fuzzy Analytical Hierarchy Process (Fuzzy AHP) and Grey Relational Analysis (GRA). Fuzzy AHP method is used to determine the importance weights for Decision Makers (DMs) and to calculate the criteria weights of decision factors both for First Risk Priority Number (RPN1) and Second Risk Priority Number (RPN2). RPN1 is calculated by using decision factors, occurrence, severity and detectability (O, S and D) with the help of GRA methodology. According to RPN1 values, FMEA team prioritizes the failure modes and determines the proper corrective actions. The team also determines the threshold intervals for corrective actions to make the work more realistic. Then, RPN2 is calculated by means of five additional decision factors (criteria). Criteria consider the cost, time, regulatory obligations, prevention policy of company, and reputation of company. Thanks to RPN2, a contribution to the literature is made. After that, RPN3 is obtained from the summation of RPN1 and RPN2 that are multiplied with their corresponding coefficients. Finally, FMEA team reprioritizes the corrective actions according to RPN3 values and the corrective actions are performed according to this prioritization. To demonstrate the effectiveness of the proposed methodology, a case study is applied in a yarn manufacturing company from Turkey.Item A new carry save tree algorithm(Bahçeşehir Üniversitesi Sosyal Bilimler Enstitüsü, 2010) Keskin, Okan; Uğurdağ, FatihItem A Novel generelized matual information approach and ıts use ın feature selection(Institute of Science, 2008) Şakar, Cem OkanItem A novel recommender engine(Bahçeşehir Üniversitesi Fen Bilimleri Enstitüsü, 2014-04) Tüfek, Alper; Mimaroğlu, Selim NecdetRecommender systems are software tools and techniques that help users to find products/items which are of interest, from large catalogs. Available options extremely differ both in number and attributes depending on the domain, that is, the type of object/item needed to be selected. Recommender systems can be classified broadly into three categories: content-based, collaborative filtering based and hybrid systems. Content-based systems generate recommendations based on descriptions or content of items. The user will be recommended items similar to the ones the user preferred in the past. The biggest limitation of content-based techniques is that extracting features associated with items to be recommended is usually a costly process. The content must either be in a form that can be parsed automatically (e.g., text) or the features should be assigned to items manually. Collaborative filtering is the most popular technique for recommender systems. Recommender systems of this group simulate taking recommendations from friends with similar tastes. In this thesis, a novel recommender system based on collaborative filtering is designed which can be easily applied to many different domains. The main advantage of the new system is its ability to use both implicit and explicit information which considerably increases recommendation coverage. Also an asymmetric approach is proposed for similarity calculations during nearest neighbor selection procedure. Another objective that is aimed to observe is to be better at differentiating especially liked items from disliked ones. In this respect, a penalization scheme is incorporated to lower down the scores for items with low ratings whereas highlighting items with high ratings.Item A Password based key establishment protocol with symmetric key cryptography(Bahcesehir University Institute of Science, 2008) Gökçeli, Recep; Anarım, EminIn 2005, Laih, Ding and Huang proposed a password-based key establishment protocol such that a user and a server can authenticate each other and generate a strong session key by their shared weak password within a symmetric cipher in an insecure channel. In this protocol, a special function, which is a combination of a picture function and a distortion function, is combined to authenticate the user and protect the password from the dictionary attacks that are major threats for most of the weak password-based protocols. They claim that the proposed protocol is secure against some well known attacks. However, Tang and Mitchell show that the protocol suffers from an offline dictionary attack requiring a machine based search of size 223 which takes only about 2.3 hours. So designing such a protocol with providing practical security against offline attack is still an open problem. In this study, a password-based authenticated key establishment protocol is proposed that provides practical security against offline dictionary attacks by only using symmetric cryptography.Item A Password based key establishment protocol with symmetric key cryptography(Institute of Science, 2008) Gökçeli, RecepItem A polynomial modeling based algorithm in Top-N recommendation(Bahçeşehir University Graduate School of Natural and Applied Sciences, 2018) Yücel Kasap, Özge; Tunga, M. Alper