Project # |
Project Title |
Responsible Assistant |
Responsible Project Coordinator |
Related Topics |
1 |
A java based network intrusion detection system (IDS) |
Elif Gül |
Dr.Baha ŞEN |
Data Mining, Artificial Intelligence, Network Security. |
2 |
SCIP (Secure Communication Interoperability protocol) |
Elif Gül |
Dr.Baha ŞEN |
Secure Communication |
3 |
Generation of 3D Retinal Model using OCT Images |
Melih Üçer |
Dr.Baha ŞEN |
Medical Imaging, Computer Graphics |
4 |
Three Level Password Authentication System |
Elif Yayla |
Dr.Baha ŞEN |
Identification Management Systems |
5 |
VR to Socialize Autistic Kids |
Ömer Mintemur |
Dr. Özkan Kılıç |
Android App Development, 3D Image Processing, Sound Processing, Computational Geometry |
6 |
VoiceMate |
Yusuf Şevki Günaydın |
Dr. Özkan Kılıç |
Voice Processing, Machine Learning, Natural Language Processing. Signal Processing |
7 |
GazeNet |
Yusuf Şevki Günaydın |
Dr. Özkan Kılıç |
Eye Tracking, NodeJS, Networking, Web Programming |
8 |
StudyBuddy |
İbrahim Atlı |
Dr. Özkan Kılıç |
Mobile Programming, Web Programming, Database Management |
9 |
TrWordToVec |
Ömer Mintemur |
Dr. Özkan Kılıç |
Natural Language Processing, Machine Learning, Linguistics |
10 |
EyeLexia |
İbrahim Atlı |
Dr. Özkan Kılıç |
Eye tracking, Web Programming, Psychology, Machine Learning |
11 |
TV content Restriction |
Ayşe Arslan |
Dr. Hilal Kaya |
Data- Mining, Machine Learning |
12 |
Voice Control of Computer mouse |
Ayşe Arslan |
Dr. Hilal Kaya |
Speech processing, signal processing |
13 |
Body Simulation |
Ayşe Arslan |
Dr. Hilal Kaya |
Graphical User İnterface, text processing |
14 |
Smart Class Attendance |
Melih Üçer |
Dr. Shafqat Rehman |
NFC/FRID, Algorithms, data management |
15 |
Flow Classification and Traffic Engineering (TE) in cloud networks using SDN (Software Defined Networking) |
Fatma Küçük |
Dr. Shafqat Rehman |
Computer Networking, Traffic Engineering,, Distributed Systems |
16 |
Intrusion Detection System (IDS) using SDN (Softwar Defined Networking) |
Fatma Küçük |
Dr. Shafqat Rehman |
Network Security, Software Defined Networking, Protocols, Distributed Systems, Operating Systems, Algorithms |
17 |
Simulating Packet Routing in Communication Networks |
Fatma Küçük |
Dr. Shafqat Rehman |
Computer Networking, Distributed Algorithms, Data Visualization |
18 |
Aerial Surveillance using Unmanned Aerial Vehicle (UAV) |
Hatice Çataloluk |
Dr. Shafqat Rehman |
Wireless Networking, IoT, Algorithms, Distributed Systems |
19 |
Smart/Intelligent Home |
Yusuf Sevki Günaydın |
Dr. Tarek Najjar |
Embedded Systems, Mobile Application, Windows |
20 |
Object Searching Robot |
Yusuf Sevki Günaydın |
Dr. Tarek Najjar |
Embedded Systems, Image Processing |
21 |
Product Evaluation |
Yusuf Sevki Günaydın |
Dr. Rahime Belen Sağlam |
Data Mining, Text Mining, Artificial Intelligence, Machine Learning |
22 |
Implementation a Semantic Web Service by Using Open-Source Technologies |
Ömer Mintemur |
Asst. Prof. Mustafa Yeniad |
Service-Oriented Architecture, Semantic Web, Open-Source Technologies. |
23 |
Network Log Management and Analysis with ElasticSearch Technology |
Ömer Mintemur |
Asst. Prof. Mustafa Yeniad |
Log Analysis, Elastic Search, Open-Source Technologies. |
24 |
Implementing a Network Monitoring Service by Using Open Source Technologies |
Ömer Mintemur |
Asst. Prof. Mustafa Yeniad |
Network Monitoring, |
25 |
Attendance Management System With Real Time Face Recognition |
Hatice Çataloluk |
Dr. Osman Serdar Gedik |
Embedded Software Development, Pattern Recognition |
26 |
Course and Exam Timetable Software using an Optimization Algorithm |
Hatice Çataloluk |
Dr. Özkan Kılıç |
Artificial Intelligence, Optimization |
27 |
Online Examination System |
Hatice Çataloluk |
Dr. Hilal Kaya |
Web Programming, Database management |
28 |
Automatic classification of hacker/cyber professional accounts on Twitter |
Çağrı Burak Aslan |
Dr. Rahime Belen Sağlam |
Text Mining, Machine Learning, Natural Language Processing |
29 |
3D Reconstruction of a/an room/office/place from multiple 2D images |
İbrahim ATLI |
Dr. Osman Serdar Gedik |
Image Processing, Computer Vision, Robotics, Machine Intelligence |
30 |
Tourist Guide Application |
İbrahim ATLI |
Dr. Abdullah Bülbül |
Web application/Android, Information Retrieval, Text2Voice |
31 |
Face Swapping |
İbrahim ATLI |
Dr. Abdullah Bülbül |
Android, Image Processing, Computer Vision |
32 |
Information Designer |
Çağrı Aslan |
Dr. Rahime Belen Sağlam |
Information Retrieval, Data Mining |
33 |
Cyber attack detection using social media
|
Çağrı Aslan |
Dr. Rahime Belen Sağlam |
Text Mining, Machine Learning, Natural Language Processing |
34 |
Automated Hate Speech Recognition |
Çağrı Aslan |
Dr. Rahime Belen Sağlam |
Text Mining, Opinion Mining |
35 |
VR Reader for Islamic Calligraphies |
Elif Yayla |
Dr. M. Abdullah Bülbül |
Image Processing, Machine Learning, Mobile Programming |
36 |
Jigsaw Puzzle Solver |
Elif Gül |
Dr. M. Abdullah Bülbül |
Image Processing, Algorithms |
37 |
Repository for Historic Buildings |
Elif Yayla |
Dr. M. Abdullah Bülbül |
Computer Graphics, Databases, Image Processing |
38 |
FPGA Implementation of ARM7TDMI Microprocessor |
H. Gökçe Bilgiç |
Dr. Tarek Najjar |
FPGA.SoC, Microprocessor Systems |
39 |
HDL-based Modeling of Memory Hierarchy System |
Melih Üçer |
Dr. Tarek Najjar |
Computer Architecture, Hardware Description Languages, Simulation |
40 |
Interactive Visual Simulation of Supervised Neural Networks |
Melih Üçer |
Dr. Tarek Najjar |
Simulation, Neural Networks. Machine Learning |
41 |
Clustering on Cloud |
Elif Gül |
Dr. Ahmet Ercan Topçu |
|
42 |
Weather Data Search Engine using Deep Learning |
Fatma Küçük |
Dr. Ahmet Ercan Topçu |
|
43 |
Cloud Services for Internet Documentation for the publications |
Elif Yayla |
Dr. Ahmet Ercan Topçu |
|
44 |
Flow –based system implementation for Student Registration Systems. |
H. Gökçe Bilgiç |
Dr. Ahmet Ercan Topçu |
|
Project # |
Description |
1 |
In this project, we designed and built an Intrusion Detection System (IDS) that implements pre-defined algorithms for identifying the attacks over a network. The Java programming language is used to develop the system, JPCap must be used to provide access to the winPcap. The packets in the network are captured online i.e., as they come on the interface of the network. The IDS are designed to provide the basic detection techniques to secure the systems present in the networks that are directly or indirectly connected to the internet. |
2 |
The Secure Communication Interoperability Protocol (SCIP) is a communications standard developed by the National Security Agency (NSA) to enable interoperable secure communications among allies and partners around the globe. The SCIP-210 Signaling Plan is the specification that defines the application layer signaling used to negotiate a secure end-to-end session between two communication devices, independent of network transport. SCIP negotiates the operational mode (e.g., voice, data, etc.), the cryptographic algorithm suite (e.g., Suite A, Suite B, etc), and the traffic encryption key used for each secure session. It also provides capabilities for cryptographic synchronization and operational mode control between communicating end-point devices. SCIP is designed to operate over any network and is currently utilized in devices operating on a wide variety of networks including PSTN, ISDN, CDMA, GSM, IP, and satellite. |
3 |
Human Eye is the most complex sensory organ comprising of a multitude of substructures. Retina, a mere set of tissues and one third of a millimeter in width, consists 10 layers. The deformities in these retinal layers account for many diseases related to vision such as retinopathy, age related macular degeneration, eye caner, retinal detachment and inherited retinal degenerations. Two major type of imaging techniques which are being used for analysis of retina are digital fundus images and Optical coherence tomography (OCT). OCT scan is a mean of extracting the information about the inner retinal layers non-invasively. OCT scans provided a video with multiple frames, each of which corresponds to a slice of eye (retina). The purpose of this project is to make a 3D model of retinal layers captured through OCT scans to provide a better visualization of retina to ophthalmologists. There are tow main parts of project which include image processing module and graphics. The frames gathered from OCT scans are processed using image processing techniques to extract the details of the layer sin the form of coordinates. Once the coordinates of all the points are extracted a point cloud is formed. Using this point cloud, we regenerated a three dimensional model using these points |
4 |
The project is an authentication system that validates user for accessing the system only when they have input correct password. The project involves three levels of user authentication. There are varieties of password systems available, many of which have failed due to bot attacks while few have sustained it but to a limit. In short, almost all the passwords available today can be broken to a limit. Hence this project is aimed to achieve the highest security in authenticating users. |
5 |
It is known that autistic children have very little or no social interaction skills which worsens their cognitive development. It is also shown that they have affinity for computers, artificial environments and electronics. This project aims to create a virtual reality environment to help autistic kids to learn how to interact with artificial faces. The project requires Android app development skills. The 3D glasses will be provided by the professor. |
6 |
Biometric methods for improved computer security have gained great importance. With introduction of smart phones and household devices, it is important to distinguish identity of a speaker. This project involves using voice processing and machine learning techniques to identify a speaker from a voice signal. It also involves noise reduction and signal processing. MatLab knowledge is suggested. |
7 |
Eye trackers are widely used by tech companies. Smart phones and computer will be enriched with eye trackers. This project aims to construct an online platform which enables multiple computers with eye trackers to be connected in a server-client architecture. The project involves web programming and NodeJS knowledge. The platform will enable psychologists upload and perform their custom experiments with multiple eye-trackers. The trackers will be provided by the processor. |
8 |
College students have hard time organizing their schedule and workload. This mobile app is a smart calendar helping students to organize their workload, manage it and promote group study and get consultation if necessary. |
9 |
Deep Learning architecture makes use of large set of data to learn a distributed semantic representation of a concept. This distributed representation can be used to distinguish inflections from derivations, synonyms etc. This project aims to learn vector representation of Turkish words from a large corpus. The corpus will be provided by the professor. |
10 |
Diagnosis of dyslexia at early age is not easy. Yet, it is confused with low intelligence. It is known that dyslexic children display erratic gaze movements. This project aims develop a testing environment enriched with eye-trackers to detect early dyslexia. It requires Web Programming and Machine Learning knowledge. The eye trackers will be provided by the professor. |
11 |
Children spend much time in watching TV, they may watch all contents of TV that is irrelevant for them such as political programs, discussion programs and some sports programs etc. Our project aim is to restrict irrelevant contents. It is correlated with data mining and machine learning techniques. Program must determine whether content is harmful for children or not. If it is irrelevant, program must shut down the program. |
12 |
The purpose of this project is to understand the preprocessing techniques for voice signal and signal processing techniques. As a social purpose of this project, we are aiming to help arm-disabled people. The students will design a system for computer mouse control through the recognition of simple speech commands from human voice by using a microphone. The system will allow arm disabled people to use their computer mouse through voice commands for various movement directions and specific tasks like “click” and “double-click”. Matlab with signal processing toolbox can help to acquire the requirements. |
13 |
Because the patient story files differ according to each hospital, it is intended to put these reports in a specific form. Body simulation project aims to simulate parts of human body. Students will create a body simulation, user must choose a part of body and program can ask some questions about the complaints to the user. According to the answers, program will create a patient file that is belong to sick person with using text processing. So that, patient story files will be put in a standard form. |
14 |
The goal of this project is to automate the manual class attendance process. Using this system, Instructor will be able to mark the class attendance by scanning the NFC or RFID devices (e.g., smart phones) carried by the students. |
15 |
Students will implement a system to identify small (mouse) and large (elephant) flows and configure the network to meet the QoS requirements. |
16 |
We will implement following prominent intrusion detection algorithms using software deifned networking. 1. Threshold Random Walk with Credit Based Rate Limiting 2. Rate Limiting 3. Maximum Entropy Detector 4. NetAD The project requires background in computer networking, Distributed Systems, Operating systems and algorithms. |
17 |
A key function in computer networks is to route packets from source machine to the destination machine over the network. Routers use routing algorithms to decide which output line should be used to forward the packet. The goal of the project is to demonstrate and animate the working of a few core routing/switching algorithms. |
18 |
The goal of the project is to develop cost affective aerial surveillance system. The system will consist of UAV/quad-copter, smart phone, wireless communication system and camera. The system will enable real time data collection in the form of images, videos, etc. |
19 |
With using an electronic card like Arduino, Netduino, Raspberry Pi etc. an intelligent home automation will be developed. The devices which can be controlled in a home (light, door, electric, alarm etc.) will be controlled by using a mobile application or desktop application via Internet. Project can be constructed as a small prototype. |
20 |
A robot which tries to find a specific object in a limited area will be developed in this project. Firstly, an object will be shown to the robot then robot will search the object in a restricted area by using its camera, sensors and decide whether it finds the object or not. |
21 |
A program which evaluate a product by analyzing the comments will be developed. The program can use comments for some certain products which can be taken from Internet. Each comment will be analyzed and classified (example: out of 10). After certain number of comment analyzed program will decide the quality of the product (out of 10). |
22 |
A Service-Oriented Architecture (SOA) is essentially a collection of services and these services can communicate with each other. So, service-oriented computing has become one of the predominant factors in current IT research and development efforts over the last few years. Semantic Web Services infrastructure, aimed at eliminating human intervention and thus allowing for seamless integration of information systems. Future’s computer programs must be able to share and process data for automation, integration and reuse even databases used totally independently. This project should be focused on what kind of semantics is needed for semantic web services, where this semantics can come from, how this semantics can be added and what kind of open-source tools could support the semantic enrichment of web services descriptions. The final product will be a semantic web service implemented by using open-source technologies and should be integrated with a web based application and data stored on a semantic database (triple store). |
23 |
Log data is a definitive record of what’s happening in every business, organization or agency and it’s often an untapped resource when it comes to troubleshooting and supporting broader business objectives. To collect, store, index, search, correlate, visualize, analyze and report on any network / machine-generated data to identify and resolve operational and security issues in a faster, repeatable and more affordable is very important. Conventional database management systems aren’t really designed for full-text searches, and they certainly don’t perform well against loosely structured raw data that resides outside the database. Elasticsearch can scale up to thousands of servers and accommodate petabytes of data. Its enormous capacity results directly from its elaborate, distributed architecture. The final product will be a platform that provides collecting log data produced by servers or any network device and store on Elastic Stack. Also searching, diagnosing and reporting will be feasible. |
24 |
Network monitoring and analyzing the collected log data in real-time, meaning that if a failure or issue is detected, immediately producing alerts via methods such as email and SMS. This rapid relay of information means that system administrators can be informed about network problems and allowed to instantly take corrective action and minimize potential downtime. This provides security, troubleshooting, saving time and also money. The final product will be customizable network monitoring platform via using completely open-source tools. |
25 |
The aim of this roject to take the attendance of the students in the classroom automatically. Face recognition will be used to mark the attendance of the students. The Raspberry pi rojec is used for face detection & recognition. The camera will be connected to the Raspberry pi rojec. This raspberry pi rojec will be installed at the front side of class in such a way that we can capture entire class. Face detection and recognition rojec detects faces from the image captured by the camera, and the image of the face is cropped and stored. Using the stored database, absent students will be detected. |
26 |
The aim of this roject work is develop course and exam timetabling software that will be useful to our faculty, using artificial intelligence and optimization algorithms. The main challenge is to schedule courses and exams to timeslots and rooms over a specific period while satisfying a set of constraints. |
27 |
The aim of this roject is to design and implement an online computer based examination system roject courses in the university. This application will deal with question bank maintenance. In addition, the system will provide enhanced security features to avoid exam misprision, and real time processing of results for students. |
28
|
Aim of the study is the classification of hacker/cyber rojectrel accounts on Twitter. Given the seed accounts (like account of RedHack or Anonymous) accounts followed by these accounts and their tweets will be gathered. The accounts that follow these seed groups and their tweets will also be collected. Using Twitter API. Some features will be extracted out of these information and classification methods will be utilized to classify accounts as hacker/not-hacker
|
29 |
In this project, a 3D model of a closed-environment like office or room will be reconstructed from multiple 2D images. The final system can be a desktop application or a mobile application which takes a bunch of images and produces a 3D model file such as stl, ply etc. |
30 |
A mobile application roject tourists will be developed for providing information about the place they visit. The place can be a museum, an antique city or a palace. Depending on the GPS data, a place of interest will be automatically detected and information related to this place will presented in a text form. The application should be capable of reading the information too. A final system should have user-friendly interface and use a web-service for retrieving data from a host/website. |
31 |
In this application, user can replace their face with celebrity’s. It can be even a photo or a video. It should have a user-friendly interface and produced photo can be shared via Instagram or a Facebook account. |
32 |
The goal of the study is to help everyone make better clearer more informed decisions about herbal remedies by visualizing the facts about solid scientific evidence for extra health benefits of certain foods. Given the research papers about several health conditions and the herbal remedies; the tool will be able to identify the relationships between the remedies and the health conditions and visualize the power of each remedy on a selected health condition. The roject is inspired from http://www.informationisbeautiful.net/visualizations/snake-oil-superfoods/
|
33
|
Security analysts gather essential information about cyber attacks, exploits, vulnerabilities, and victims by manually searching social media sites. This effort can be dramatically reduced using natural language and machine learning techniques. Aim of the study is to detect cyber-attacks using Twitter. The main steps can be summarized as follows; · extraction of cyber attack related keywords ranked by TFIDF. · Filtering tweets that contain at least one matching term from the list. · Clustering tweets and extract exemplars that are representatives of clusters. Each exemplar will be annotated to a cyberattack type by computing the cosine similarity and seed queries provided before.
|
34 |
Hateful content published and propagated via the World Wide Web has the potential to cause harm and suffering on an individual basis, and lead to social tension and disorder beyond cyber space. To support the automatic detection of cyber hate online, specifically on Twitter, it is planned to build multiple individual models to classify cyber hate for some characteristics including race, disability and sex. |
35 |
In this Project, the aim is using a mobile phone for reading Islamic Calligraphies that are usually difficult to read even by the eye. The advantage is that these writings are not random, usually are verses from Quran. So understanding a portion of it can be sufficient. The end product will roj the writings in latin on top of the camera image. In order to train the system, Machine Learning methods will be used. |
36 |
Solving a jigsaw puzzle is a challenge. Here our aim is to help solving them using computers. This Project was also given last year but this year the aim is a little different. You need to solve real puzzles that are over a surface. First, you will take a photo of this puzzle, recognize the pieces and lead them to their correct positions. You can use reference image to maket he challenge simpler. The difficulties are occlusions, backsides of the pieces etc. |
37 |
In this Project, Computer Graphics methods and already available software will be utilized for generating 3D models of historic buildings from their images. Also, they will be stored in a database and will be shown to users in a nice user interface. Historic buildings need to be categorized and users need to be able to give queries to see the buildings/monuments they are interested in. The system should be robust, there are thousands of historic monuments and the system needs to be responsive to user queries even when there tens of thousands of models in the database. |
38 |
using FPGA programmable chips; the goal of the project is to implement the entire architecture of ARM7TDMI microprocessor using VHDL programming language then to synthesize the code into the chip |
39 |
to model the work and data movement through memory hierarchy system starting from secondary storage until cache memory by using hardware discretion languages and graphical visualization of activity shifts between the mentioned hierarchy |
40 |
real-time graphical visualization of functional simulation of any supervised neural network, where the simulator must enable the user to enter all the required parameters for the desired network then the network is generated and by applying data sets it would be visually possible to monitor the activity of various nodes within the network |
41 |
Clustering is a way of grouping a set of objects that are close to each other and is a well studied problem in literature. Today, these algorithms are used in many fields including machine learning, pattern recognition, bioinformatics, and information retrieval. However, with recent developments in technology, we are living in an information age and classical clustering algorithms don’t work well for large scale data and there is need to implement those algorithms to work in distributed ways. In this project: you will read papers and books about map reduce, spark and other different clustering algorithms. In the end, you will provide an easy to use API that will take input data, run clustering algorithms on cloud and will give clusters as output. |
42 |
With the widespread use of weather data for weather simulation and prediction model, The organizations need fast and efficient model to predict weather pattern using deep learning Using these techniques, scientist can search the weather data to extract meaning and predicting the weather patterns effectively. |
43 |
Lots of data generated rapidly and management is an issue to find the latest version of updated data. Scholary publication data is critical for scientist to find related information for their research. Cloud based systems that provides services for publications to manage data is important for finding related metadata. In this project, using web services data will be collected from different environment and build a search model to extract related publication data.
|
44 |
Flow –based system implementation for Student Registration Systems. |
IMPORTANT NOTES
· You can get more information about the projects from the assistants and the coordinators via email.
· If you have your own project idea, please contact the coordinator that you would like to work with.
· Responsible assistants for the projects may change due to the workload.