Fatih Başçiftçi | Selcuk University (Selçuk Üniversitesi) (original) (raw)

Papers by Fatih Başçiftçi

Research paper thumbnail of Programming of Transformations Used in Geodesy

Selcuk University Journal of Engineering Science and Technology, Jan 2, 2013

Research paper thumbnail of Web Tasarımında Flat Tekniğinin Kullanılmasıyla Mobil Etkilerinin İncelenmesi

International Symposium Innovative Technologies Engineering and Science, Sep 29, 2017

In today's world of technology, internet sites are a part of our daily life. Especially with the ... more In today's world of technology, internet sites are a part of our daily life. Especially with the presence of mobile devices, used by people ranging in age from 7 to 70, technology is with us at every moment and everywhere. As the screen sizes of these devices shrink, web design techniques must adapt to accommodate the new styles. Elaborate, appealing and complicated designs, however, are difficult to render on shrinking screens. The flat design techniques have emerged to address this matter. With this design-style, particular importance is given to special-effect free simplicity, neatness, flatness and ease of understanding in interface design. In this study, two different web pages, one prepared by flatdesign and one by skeuomorphism-design techniques, were compared in terms of speed and usage. The results give clues into why flat design has emerged as the design technique of choice and why today's web designs should be plain.

Research paper thumbnail of Analysis and Modeling of Android Software Vulnerabilities: A Numerical Approach

Research Square (Research Square), Jan 3, 2023

A software security vulnerability is a mistake or violation of the security policy that occurs du... more A software security vulnerability is a mistake or violation of the security policy that occurs during the creation or development of the software. A vulnerability discovery model is a structure enabling the prediction of software security vulnerabilities that might occur after the software is released. In a more general sense, modeling is the method that allows us to analyze a phenomenon in detail and make accurate predictions for the future. The model must be able to explain the target environment in the best way possible and make the best predictions possible. Recently, there have been many studies on the subject of modeling security vulnerabilities. Most of these studies are concerned with desktop operating systems and internet browsers. Although there are studies based on the most popular mobile operating system, Android, there has never been a study that investigates different statistical distributions to find the most suitable one. The most popular model for vulnerability prediction is the Alhazmi-Malaiya Logistic (AML) model. This model has been observed to achieve better performance than other models in modeling security vulnerabilities. The AML model is similar to a logistic distribution, which has a symmetrical structure. In this study, certain aspects of Android security vulnerabilities were investigated using some symmetric and asymmetric distributions that are close to the AML distribution. The data used in this study was obtained from the National Vulnerability Database (NVD) by filtering Android vulnerabilities from 2016 to 2018, a time interval in which monthly information was continuously available. Furthermore, with the 0 to 10 scoring data obtained from the Common Vulnerability Scoring System (CVSS), the average monthly impact values of vulnerabilities have also been modeled. Logistic, Weibull, Normal, Nakagami, Gamma, and Log-logistic distributions were used to model the average monthly impact values of vulnerabilities, and the Logistic, Weibull, Nakagami, Gamma, and Log-logistic distributions were used to model the monthly vulnerability count. From the goodness-of-fit tests, which are methods to establish how well sample data matches the expected distribution values, Kolmogorov-Smirnov, Anderson-Darling, and Cramer-von Mises tests were applied. Akaike and Bayesian Information Criteria and Log-likelihood were used to see how robust the models were. As a result, the average monthly impact value and the monthly vulnerability count were observed to be best modeled by the Logistic and Nakagami distributions, respectively. Vulnerability detection models help us forecast software vulnerabilities and enable the necessary precautions to be taken, such as planning the generation of a patch. With suitable distributions, it has been shown that Android vulnerabilities can be modeled and forecasts can be made.

Research paper thumbnail of Selçuk Ünyversytesy Teknyk E?Ytym Fakültesy Ö?Rencylerynyn Benlyk Ve Mesleky Benlyk Saygilarinin Yncelenmesy

Education Sciences, May 1, 2010

Research paper thumbnail of Kenar Bulma Algoritmaları Kullanarak Diş Röntgen Görüntülerinden Yaş ve Cinsiyet Belirleme

El-cezeri, Jan 31, 2020

Age determination in forensic medicine is a very important issue in terms of criminal and law. In... more Age determination in forensic medicine is a very important issue in terms of criminal and law. In case of any disaster or unlawfulness, identification may be required. In such cases, the competent authorities ask the forensic medicine institution for determining the age. Forensic medicines must make the most accurate process of determining the age. In this study, a database was created manually with a total of 1313 teeth images to determine age and gender. Images in this database are pre-processed with image processing techniques. Numerical data were obtained according to the tanimoto similarity rates of images. This numerical data is saved in the XML file. Comparing is done with the data on this XML file. In addition to the age determination process, gender determination process was also carried out. Age determination was performed with +-0 error. The application was developed in C # programming language.

Research paper thumbnail of Multi-objective artificial bee colony algorithm to estimate transformer equivalent circuit parameters

Periodicals of Engineering and Natural Sciences (PEN), Oct 18, 2017

Real world problems such as scientific, engineering, industrial problems are in the form of the m... more Real world problems such as scientific, engineering, industrial problems are in the form of the multi-objective optimization problems. In order to achieve optimum solutions of such problems, multi-objective optimization algorithms are utilized. In this study, the problem is estimation of single-phase transformer parameters which is one of the engineering problems. This estimation is provided by artificial bee colony (ABC) algorithm. ABC is developed as a metaheuristic method and simulates foraging of bees. Since the problem is a multi-objective optimization problem, multi-objective ABC (MOABC) is proposed to estimate parameters in the study. This study aims to estimate equivalent circuit parameters using current and voltage values at any known load. Through algorithm, difference between actual and estimated parameter values that is the error has been tried to minimize. The successful results show that the proposed method can be used for a single-phase transformer parameters estimation.

Research paper thumbnail of A Genetic Algorithm Approach For Integrating Awacs Flight Training Programs Into Crew Schedules

DergiPark (Istanbul University), Dec 4, 2018

Today, Air Force is the most effective element in defense and military organizations of the count... more Today, Air Force is the most effective element in defense and military organizations of the countries. In parallel with the technological developments in the defense industry, military combat aircraft and other air support elements contribute significantly to the success of the operations. The training of flying personnel using advanced technology and high capability weapons and equipment is getting more and more important every day. Individuals, who fly on high-cost platforms such as combat pilots and AWACS controllers are required to go through long and intensive training in order to achieve combat-ready status. Given the high costs of actual flights for training, a rigorous planning and scheduling activity is carried out to ensure that resources are used effectively and expenditures are minimized. In this paper, genetic algorithms were utilized for integrating AWACS flight training programs into crew schedules. The criteria which affect the scheduling were mathematically modeled and fitness function of the existing AWACS Crew Scheduling algorithm was revised. In order to measure the performance of the designed model, crew scheduling was carried out through a notional flight schedule of an artificial AWACS squadron similar to real-world examples. Genetic algorithms have been applied through a novel software developed as a test bed. As a result of the experiements, the algorithm was able to schedule all individuals based on the relevant criteria outlined in the guidelines, assigning students to flights with correct student-intructor pairings and complying with priorities selected by user while reaching the optimum solution in a reasonable time.

Research paper thumbnail of Introducing Motherboard Components Using Virtual Reality

Europan journal of science and technology, Sep 13, 2021

The study aims to introduce the main component of computers, the main component of the computer, ... more The study aims to introduce the main component of computers, the main component of the computer, and the sockets where these components need to be installed, firstly to secondary school, high school, and university students and then to every user who installs the application by using virtual reality technology. With the online publication and use of the application, the motherboard that needs to be learned, which will be shown to the application, but not available and only photographed, is recognized and all components on the motherboard will be learned. In addition, by showing the sockets where the components need to be installed, anyone with the application will be able to easily remove and reattach all components in their computer. The application was carried out using the 3DQR program because it allows the visuals to be displayed and processed in 3 dimensions. In the written article, virtual reality technology will be mentioned, then 3DQR Studio software will be introduced in the application used in the application and will be finalized by explaining it with the visuals presented.

Research paper thumbnail of An Empirical Comparison of Machine Learning Algorithms for Predicting Breast Cancer

According to recent statistics, breast cancer is one of the most prevalent cancers among women in... more According to recent statistics, breast cancer is one of the most prevalent cancers among women in the world. It represents the majority of new cancer cases and cancer-related deaths. Early diagnosis is very important, as it becomes fatal unless detected and treated in early stages. With the latest advances in artificial intelligence and machine learning (ML), there is a great potential to diagnose breast cancer by using structured data. In this paper, we conduct an empirical comparison of 10 popular machine learning models for the prediction of breast cancer. We used well known Wisconsin Breast Cancer Dataset (WBCD) to train the models and employed advanced accuracy metrics for comparison. Experimental results show that all models demonstrate superior accuracy, while Support Vector Machines (SVM) had slightly better performance than other methods. Logistic Regression, K-Nearest Neighbors and Neural Networks also proved to be strong classifiers for predicting breast cancer.

Research paper thumbnail of Selçuk Üni̇versi̇tesi̇ Tekni̇k Eği̇ti̇m Fakültesi̇ Öğrenci̇leri̇ni̇n Benli̇k Ve Mesleki̇ Benli̇k Saygilarinin İncelenmesi̇

Education Sciences, 2010

The purpose of this study is to reveal the relationship between professional self-esteem and self... more The purpose of this study is to reveal the relationship between professional self-esteem and self-esteem of adolescent individuals. Collecting information about students' self-esteem, attitudes of students toward their departments in the faculty, whether a difference between their self-esteem with their respect for the profession that they will have in future was investigated as sub-problems. A research on teacher candidates studying at Konya Selcuk University, Faculty of Technical Education was done and self-esteem according to the age difference and attitudes toward the profession observed in this study which is conducted on students aged between 18-28. 693 students of Faculty of Technical Education consisting of 106 female and 587 male was participated in the research. A questionnaire is prepared for students under this research. Questions about self-esteem and professional self-esteem are included separately in the survey. According to the results of the survey Professional self-esteem and self-esteem of students were examined in accordance with certain variables.

Research paper thumbnail of Comparison of Personality and Self-Esteem for Career at Selcuk University Faculty of Technical Education

Research paper thumbnail of Evolutionary design of neural network architectures: a review of three decades of research

Artificial Intelligence Review, Jul 27, 2021

We present a comprehensive review of the evolutionary design of neural network architectures. Thi... more We present a comprehensive review of the evolutionary design of neural network architectures. This work is motivated by the fact that the success of an Artificial Neural Network (ANN) highly depends on its architecture and among many approaches Evolutionary Computation, which is a set of global-search methods inspired by biological evolution has been proved to be an efficient approach for optimizing neural network structures. Initial attempts for automating architecture design by applying evolutionary approaches start in the late 1980s and have attracted significant interest until today. In this context, we examined the historical progress and analyzed all relevant scientific papers with a special emphasis on how evolutionary computation techniques were adopted and various encoding strategies proposed. We summarized key aspects of methodology, discussed common challenges, and investigated the works in chronological order by dividing the entire timeframe into three periods. The first period covers early works focusing on the optimization of simple ANN architectures with a variety of solutions proposed on chromosome representation. In the second period, the rise of more powerful methods and hybrid approaches were surveyed. In parallel with the recent advances, the last period covers the Deep Learning Era, in which research direction is shifted towards configuring advanced models of deep neural networks. Finally, we propose open problems for future research in the field of neural architecture search and provide insights for fully automated machine learning. Our aim is to provide a complete reference of works in this subject and guide researchers towards promising directions.

Research paper thumbnail of A reduced rule-based expert system by the simplification of logic functions for determining the life expectancy of intensive care patients

World Journal of Engineering, Dec 4, 2017

Purpose Specialist physicians, specialist nurses and personnel in the intensive care unit (ICU) w... more Purpose Specialist physicians, specialist nurses and personnel in the intensive care unit (ICU) work to treat patients. Compared with other hospital units, ICUs are full-fledged and provide 24-h services. However, patients are admitted to this unit because of conditions such as severe trauma, organ failure or dysfunction and poisoning. The life expectancy of such patients is considerably low. Design/methodology/approach This study developed a reduced rule-based expert system to determine life expectancy. The purpose of this study is to determine the life expectancy of patients using ten variables. The rules were determined by evaluating 210 = 1,024 results. These rules were minimized using Boolean rules for simplification. Findings Conclusions were drawn by evaluating the minimized cases rather than evaluating 1,024 different cases. ICU patients were evaluated using this method, and the mean success rate was 63.75 per cent. Originality/value No rule-based expert system has been designed to determine the death risks of patients in the ICU.

Research paper thumbnail of Anahtarlama Fonksi̇yonlari İçi̇n Yeni̇ Yakin Mi̇ni̇mum Sadeleşti̇rme Algori̇tmasi

DergiPark (Istanbul University), Feb 15, 2013

Anahtarlama fonksiyonlarının sadeleştirilmesi tasarımcılara daha kısa zaman süresinde, daha sade ... more Anahtarlama fonksiyonlarının sadeleştirilmesi tasarımcılara daha kısa zaman süresinde, daha sade lojik devreler tasarlama imkanı sağlamaktadır. Sadeleştirilmiş olan bir fonksiyon daha az güç tüketimi, daha az hacim ve daha az maliyet gerektirir. Bu konu ile ilgili olarak geliştirilen yöntemlerin çoğu iki ana adımda gerçekleştirilir. Birinci adımda, asal çarpım terimlerinin tümü belirlenir. İkinci adımda fonksiyonu sadeleşmiş olarak örtecek, esas asal çarpım terimler kümesi belirlenir. Anahtarlama fonksiyonlarını sadeleştirecek algoritmaların tümü O(2 n) karmaşıklığına sahiptirler. Araştırmalar göstermiştir ki n'in çok yüksek değerlerinde esas asal çarpım terimlerin tam kümesini belirleme yöntemi pratik olarak gerçekleştirilemez duruma gelmektedir. Bu yüzden bu çalışmada, asal çarpım terimlerin belli kıstaslara cevap verecek alt kümeleri oluşturularak, doğrudan örtme prensibine dayanan yakın minimum sadeleştirme algoritması geliştirilmiştir. Geliştirilen algoritma çeşitli problemler üzerinde test edilmiş ve dünyaca örnek olarak kabul edilen ESPRESSO algoritması ile karşılaştırılmıştır. Karşılaştırma kıstasları olarak algoritmaların; çözüm sonucunda buldukları çarpım terimlerinin toplam ifadelerinin sayısı, çözüme ulaşma süreleri ve çözüme ulaşırken kullandıkları bellek kapasitesi alınmıştır. Karşılaştırma sonuçlarına göre geliştirilen algoritmanın başarılı sonuçlar verdiği görülmüştür.

Research paper thumbnail of Design of Saving Circuit with Fuzzy Logic Control for Residences and Small Scale Enterprises

Advances in Electrical and Computer Engineering, 2010

... [14] N. Barsoum, "Programming of PIC Micro-Controller for Power Factor Correction",... more ... [14] N. Barsoum, "Programming of PIC Micro-Controller for Power Factor Correction", First Asia International Conference on Modelling&Simulation, pp. 19-25, 2007. ... [17] P. Kumar, "Development of Power Factor Controller using PIC Microcontroller", Master Thesis ...

Research paper thumbnail of Electroencephalographic Signaling Approach in Detecting Moods of People

International Symposium Innovative Technologies Engineering and Science, Sep 29, 2017

The brain is the control center of the human body. The working structure of the brain is provided... more The brain is the control center of the human body. The working structure of the brain is provided by communication between neurons. The electrical movements of neurons are called "brain waves". Brain waves can be recorded by Electroencephalography (EEG). With the analysis of brain waves recorded with EEG, changes in the emotional states of people can be analyzed. In this study, the emotional changes of colors and shapes of people of different ages and sexes are analyzed.

Research paper thumbnail of IoT Based Library Management Automation System Using RFID

Nowadays our life is becoming smart and simple with the help of smart and intelligent systems. Th... more Nowadays our life is becoming smart and simple with the help of smart and intelligent systems. The Internet of Things concept is enabling most digital devices to work cooperatively. In this article, we proposed a Library Management Automation system that is based on the Radio Frequency Identification (RFID) technology. The books and Students ID have RFID tags that are attached to them and hold information about books and students respectively. RFID readers used to read RFID tags attached to the books and students' IDs to do all tasks like the efficient and proper theft-controlled operation of libraries. This system will be connected to an RFID reader and printer. The main task of this system is to make work easy for users and librarians. Moreover, this system will be more user-friendly and easy. The proposed system reduces time and labor approximately from 70-80% after implementation.

Research paper thumbnail of Optimization of Quadrotor Route Planning with Time and Energy Priority in Windy Environments

The International Arab Journal of Information Technology, 2023

The Software industry's rapid growth contributes to the need for new technologies. PRICE software... more The Software industry's rapid growth contributes to the need for new technologies. PRICE software system uses Predictive Object Point (POP) as a size measure to estimate Effort and cost. A refined POP metric value for object-oriented software written in Java can be calculated using the Automated POP Analysis tool. This research used 25 open-source Java projects. The refined POP metric improves the drawbacks of the PRICE system and gives a more accurate size measure of software. This paper uses refined POP metrics with curve-fitting neural networks and multi-layer perceptron neural networkbased deep learning to estimate the software development effort. Results show that this approach gives an effort estimate closer to the actual Effort obtained through Constructive Cost Estimation Model (COCOMO) estimation models and thus validates refined POP as a better size measure of object-oriented software than POP. Therefore we consider the MLP approach to help construct the metric for the scale of the Object-Oriented (OO) model system.

Research paper thumbnail of Selçuk weather station and web-mobile applications

International Journal of Applied Mathematics, Electronics and Computers, Jun 30, 2022

In this paper, a system for reading meteorological data like temperature, humidity, air pressure,... more In this paper, a system for reading meteorological data like temperature, humidity, air pressure, wind speed, wind direction, and rainfall at regular intervals, deployed in Selçuk University Alaeddin Keykubat Campus. The system also provides real-time images and video time-lapses of the campus sky. These data are made available to university people via a website and mobile applications for both iOS and Android. The website and mobile applications provide a clear experience for the users, also explaining the icons and terms used on the website. Users can access the system archive in graphical ways.

Research paper thumbnail of Introducing Motherboard Components Using Virtual Reality Technology

The study aims to introduce the main component of computers, the main component of the computer, ... more The study aims to introduce the main component of computers, the main component of the computer, and the sockets where these components need to be installed, firstly to secondary school, high school, and university students and then to every user who installs the application by using virtual reality technology. With the online publication and use of the application, the motherboard that needs to be learned, which will be shown to the application, but not available and only photographed, is recognized and all components on the motherboard will be learned. In addition, by showing the sockets where the components need to be installed, anyone with the application will be able to easily remove and reattach all components in their computer. The application was carried out using the 3DQR program because it allows the visuals to be displayed and processed in 3 dimensions. In the written article, virtual reality technology will be mentioned, then 3DQR Studio software will be introduced in the application used in the application and will be finalized by explaining it with the visuals presented.

Research paper thumbnail of Programming of Transformations Used in Geodesy

Selcuk University Journal of Engineering Science and Technology, Jan 2, 2013

Research paper thumbnail of Web Tasarımında Flat Tekniğinin Kullanılmasıyla Mobil Etkilerinin İncelenmesi

International Symposium Innovative Technologies Engineering and Science, Sep 29, 2017

In today's world of technology, internet sites are a part of our daily life. Especially with the ... more In today's world of technology, internet sites are a part of our daily life. Especially with the presence of mobile devices, used by people ranging in age from 7 to 70, technology is with us at every moment and everywhere. As the screen sizes of these devices shrink, web design techniques must adapt to accommodate the new styles. Elaborate, appealing and complicated designs, however, are difficult to render on shrinking screens. The flat design techniques have emerged to address this matter. With this design-style, particular importance is given to special-effect free simplicity, neatness, flatness and ease of understanding in interface design. In this study, two different web pages, one prepared by flatdesign and one by skeuomorphism-design techniques, were compared in terms of speed and usage. The results give clues into why flat design has emerged as the design technique of choice and why today's web designs should be plain.

Research paper thumbnail of Analysis and Modeling of Android Software Vulnerabilities: A Numerical Approach

Research Square (Research Square), Jan 3, 2023

A software security vulnerability is a mistake or violation of the security policy that occurs du... more A software security vulnerability is a mistake or violation of the security policy that occurs during the creation or development of the software. A vulnerability discovery model is a structure enabling the prediction of software security vulnerabilities that might occur after the software is released. In a more general sense, modeling is the method that allows us to analyze a phenomenon in detail and make accurate predictions for the future. The model must be able to explain the target environment in the best way possible and make the best predictions possible. Recently, there have been many studies on the subject of modeling security vulnerabilities. Most of these studies are concerned with desktop operating systems and internet browsers. Although there are studies based on the most popular mobile operating system, Android, there has never been a study that investigates different statistical distributions to find the most suitable one. The most popular model for vulnerability prediction is the Alhazmi-Malaiya Logistic (AML) model. This model has been observed to achieve better performance than other models in modeling security vulnerabilities. The AML model is similar to a logistic distribution, which has a symmetrical structure. In this study, certain aspects of Android security vulnerabilities were investigated using some symmetric and asymmetric distributions that are close to the AML distribution. The data used in this study was obtained from the National Vulnerability Database (NVD) by filtering Android vulnerabilities from 2016 to 2018, a time interval in which monthly information was continuously available. Furthermore, with the 0 to 10 scoring data obtained from the Common Vulnerability Scoring System (CVSS), the average monthly impact values of vulnerabilities have also been modeled. Logistic, Weibull, Normal, Nakagami, Gamma, and Log-logistic distributions were used to model the average monthly impact values of vulnerabilities, and the Logistic, Weibull, Nakagami, Gamma, and Log-logistic distributions were used to model the monthly vulnerability count. From the goodness-of-fit tests, which are methods to establish how well sample data matches the expected distribution values, Kolmogorov-Smirnov, Anderson-Darling, and Cramer-von Mises tests were applied. Akaike and Bayesian Information Criteria and Log-likelihood were used to see how robust the models were. As a result, the average monthly impact value and the monthly vulnerability count were observed to be best modeled by the Logistic and Nakagami distributions, respectively. Vulnerability detection models help us forecast software vulnerabilities and enable the necessary precautions to be taken, such as planning the generation of a patch. With suitable distributions, it has been shown that Android vulnerabilities can be modeled and forecasts can be made.

Research paper thumbnail of Selçuk Ünyversytesy Teknyk E?Ytym Fakültesy Ö?Rencylerynyn Benlyk Ve Mesleky Benlyk Saygilarinin Yncelenmesy

Education Sciences, May 1, 2010

Research paper thumbnail of Kenar Bulma Algoritmaları Kullanarak Diş Röntgen Görüntülerinden Yaş ve Cinsiyet Belirleme

El-cezeri, Jan 31, 2020

Age determination in forensic medicine is a very important issue in terms of criminal and law. In... more Age determination in forensic medicine is a very important issue in terms of criminal and law. In case of any disaster or unlawfulness, identification may be required. In such cases, the competent authorities ask the forensic medicine institution for determining the age. Forensic medicines must make the most accurate process of determining the age. In this study, a database was created manually with a total of 1313 teeth images to determine age and gender. Images in this database are pre-processed with image processing techniques. Numerical data were obtained according to the tanimoto similarity rates of images. This numerical data is saved in the XML file. Comparing is done with the data on this XML file. In addition to the age determination process, gender determination process was also carried out. Age determination was performed with +-0 error. The application was developed in C # programming language.

Research paper thumbnail of Multi-objective artificial bee colony algorithm to estimate transformer equivalent circuit parameters

Periodicals of Engineering and Natural Sciences (PEN), Oct 18, 2017

Real world problems such as scientific, engineering, industrial problems are in the form of the m... more Real world problems such as scientific, engineering, industrial problems are in the form of the multi-objective optimization problems. In order to achieve optimum solutions of such problems, multi-objective optimization algorithms are utilized. In this study, the problem is estimation of single-phase transformer parameters which is one of the engineering problems. This estimation is provided by artificial bee colony (ABC) algorithm. ABC is developed as a metaheuristic method and simulates foraging of bees. Since the problem is a multi-objective optimization problem, multi-objective ABC (MOABC) is proposed to estimate parameters in the study. This study aims to estimate equivalent circuit parameters using current and voltage values at any known load. Through algorithm, difference between actual and estimated parameter values that is the error has been tried to minimize. The successful results show that the proposed method can be used for a single-phase transformer parameters estimation.

Research paper thumbnail of A Genetic Algorithm Approach For Integrating Awacs Flight Training Programs Into Crew Schedules

DergiPark (Istanbul University), Dec 4, 2018

Today, Air Force is the most effective element in defense and military organizations of the count... more Today, Air Force is the most effective element in defense and military organizations of the countries. In parallel with the technological developments in the defense industry, military combat aircraft and other air support elements contribute significantly to the success of the operations. The training of flying personnel using advanced technology and high capability weapons and equipment is getting more and more important every day. Individuals, who fly on high-cost platforms such as combat pilots and AWACS controllers are required to go through long and intensive training in order to achieve combat-ready status. Given the high costs of actual flights for training, a rigorous planning and scheduling activity is carried out to ensure that resources are used effectively and expenditures are minimized. In this paper, genetic algorithms were utilized for integrating AWACS flight training programs into crew schedules. The criteria which affect the scheduling were mathematically modeled and fitness function of the existing AWACS Crew Scheduling algorithm was revised. In order to measure the performance of the designed model, crew scheduling was carried out through a notional flight schedule of an artificial AWACS squadron similar to real-world examples. Genetic algorithms have been applied through a novel software developed as a test bed. As a result of the experiements, the algorithm was able to schedule all individuals based on the relevant criteria outlined in the guidelines, assigning students to flights with correct student-intructor pairings and complying with priorities selected by user while reaching the optimum solution in a reasonable time.

Research paper thumbnail of Introducing Motherboard Components Using Virtual Reality

Europan journal of science and technology, Sep 13, 2021

The study aims to introduce the main component of computers, the main component of the computer, ... more The study aims to introduce the main component of computers, the main component of the computer, and the sockets where these components need to be installed, firstly to secondary school, high school, and university students and then to every user who installs the application by using virtual reality technology. With the online publication and use of the application, the motherboard that needs to be learned, which will be shown to the application, but not available and only photographed, is recognized and all components on the motherboard will be learned. In addition, by showing the sockets where the components need to be installed, anyone with the application will be able to easily remove and reattach all components in their computer. The application was carried out using the 3DQR program because it allows the visuals to be displayed and processed in 3 dimensions. In the written article, virtual reality technology will be mentioned, then 3DQR Studio software will be introduced in the application used in the application and will be finalized by explaining it with the visuals presented.

Research paper thumbnail of An Empirical Comparison of Machine Learning Algorithms for Predicting Breast Cancer

According to recent statistics, breast cancer is one of the most prevalent cancers among women in... more According to recent statistics, breast cancer is one of the most prevalent cancers among women in the world. It represents the majority of new cancer cases and cancer-related deaths. Early diagnosis is very important, as it becomes fatal unless detected and treated in early stages. With the latest advances in artificial intelligence and machine learning (ML), there is a great potential to diagnose breast cancer by using structured data. In this paper, we conduct an empirical comparison of 10 popular machine learning models for the prediction of breast cancer. We used well known Wisconsin Breast Cancer Dataset (WBCD) to train the models and employed advanced accuracy metrics for comparison. Experimental results show that all models demonstrate superior accuracy, while Support Vector Machines (SVM) had slightly better performance than other methods. Logistic Regression, K-Nearest Neighbors and Neural Networks also proved to be strong classifiers for predicting breast cancer.

Research paper thumbnail of Selçuk Üni̇versi̇tesi̇ Tekni̇k Eği̇ti̇m Fakültesi̇ Öğrenci̇leri̇ni̇n Benli̇k Ve Mesleki̇ Benli̇k Saygilarinin İncelenmesi̇

Education Sciences, 2010

The purpose of this study is to reveal the relationship between professional self-esteem and self... more The purpose of this study is to reveal the relationship between professional self-esteem and self-esteem of adolescent individuals. Collecting information about students' self-esteem, attitudes of students toward their departments in the faculty, whether a difference between their self-esteem with their respect for the profession that they will have in future was investigated as sub-problems. A research on teacher candidates studying at Konya Selcuk University, Faculty of Technical Education was done and self-esteem according to the age difference and attitudes toward the profession observed in this study which is conducted on students aged between 18-28. 693 students of Faculty of Technical Education consisting of 106 female and 587 male was participated in the research. A questionnaire is prepared for students under this research. Questions about self-esteem and professional self-esteem are included separately in the survey. According to the results of the survey Professional self-esteem and self-esteem of students were examined in accordance with certain variables.

Research paper thumbnail of Comparison of Personality and Self-Esteem for Career at Selcuk University Faculty of Technical Education

Research paper thumbnail of Evolutionary design of neural network architectures: a review of three decades of research

Artificial Intelligence Review, Jul 27, 2021

We present a comprehensive review of the evolutionary design of neural network architectures. Thi... more We present a comprehensive review of the evolutionary design of neural network architectures. This work is motivated by the fact that the success of an Artificial Neural Network (ANN) highly depends on its architecture and among many approaches Evolutionary Computation, which is a set of global-search methods inspired by biological evolution has been proved to be an efficient approach for optimizing neural network structures. Initial attempts for automating architecture design by applying evolutionary approaches start in the late 1980s and have attracted significant interest until today. In this context, we examined the historical progress and analyzed all relevant scientific papers with a special emphasis on how evolutionary computation techniques were adopted and various encoding strategies proposed. We summarized key aspects of methodology, discussed common challenges, and investigated the works in chronological order by dividing the entire timeframe into three periods. The first period covers early works focusing on the optimization of simple ANN architectures with a variety of solutions proposed on chromosome representation. In the second period, the rise of more powerful methods and hybrid approaches were surveyed. In parallel with the recent advances, the last period covers the Deep Learning Era, in which research direction is shifted towards configuring advanced models of deep neural networks. Finally, we propose open problems for future research in the field of neural architecture search and provide insights for fully automated machine learning. Our aim is to provide a complete reference of works in this subject and guide researchers towards promising directions.

Research paper thumbnail of A reduced rule-based expert system by the simplification of logic functions for determining the life expectancy of intensive care patients

World Journal of Engineering, Dec 4, 2017

Purpose Specialist physicians, specialist nurses and personnel in the intensive care unit (ICU) w... more Purpose Specialist physicians, specialist nurses and personnel in the intensive care unit (ICU) work to treat patients. Compared with other hospital units, ICUs are full-fledged and provide 24-h services. However, patients are admitted to this unit because of conditions such as severe trauma, organ failure or dysfunction and poisoning. The life expectancy of such patients is considerably low. Design/methodology/approach This study developed a reduced rule-based expert system to determine life expectancy. The purpose of this study is to determine the life expectancy of patients using ten variables. The rules were determined by evaluating 210 = 1,024 results. These rules were minimized using Boolean rules for simplification. Findings Conclusions were drawn by evaluating the minimized cases rather than evaluating 1,024 different cases. ICU patients were evaluated using this method, and the mean success rate was 63.75 per cent. Originality/value No rule-based expert system has been designed to determine the death risks of patients in the ICU.

Research paper thumbnail of Anahtarlama Fonksi̇yonlari İçi̇n Yeni̇ Yakin Mi̇ni̇mum Sadeleşti̇rme Algori̇tmasi

DergiPark (Istanbul University), Feb 15, 2013

Anahtarlama fonksiyonlarının sadeleştirilmesi tasarımcılara daha kısa zaman süresinde, daha sade ... more Anahtarlama fonksiyonlarının sadeleştirilmesi tasarımcılara daha kısa zaman süresinde, daha sade lojik devreler tasarlama imkanı sağlamaktadır. Sadeleştirilmiş olan bir fonksiyon daha az güç tüketimi, daha az hacim ve daha az maliyet gerektirir. Bu konu ile ilgili olarak geliştirilen yöntemlerin çoğu iki ana adımda gerçekleştirilir. Birinci adımda, asal çarpım terimlerinin tümü belirlenir. İkinci adımda fonksiyonu sadeleşmiş olarak örtecek, esas asal çarpım terimler kümesi belirlenir. Anahtarlama fonksiyonlarını sadeleştirecek algoritmaların tümü O(2 n) karmaşıklığına sahiptirler. Araştırmalar göstermiştir ki n'in çok yüksek değerlerinde esas asal çarpım terimlerin tam kümesini belirleme yöntemi pratik olarak gerçekleştirilemez duruma gelmektedir. Bu yüzden bu çalışmada, asal çarpım terimlerin belli kıstaslara cevap verecek alt kümeleri oluşturularak, doğrudan örtme prensibine dayanan yakın minimum sadeleştirme algoritması geliştirilmiştir. Geliştirilen algoritma çeşitli problemler üzerinde test edilmiş ve dünyaca örnek olarak kabul edilen ESPRESSO algoritması ile karşılaştırılmıştır. Karşılaştırma kıstasları olarak algoritmaların; çözüm sonucunda buldukları çarpım terimlerinin toplam ifadelerinin sayısı, çözüme ulaşma süreleri ve çözüme ulaşırken kullandıkları bellek kapasitesi alınmıştır. Karşılaştırma sonuçlarına göre geliştirilen algoritmanın başarılı sonuçlar verdiği görülmüştür.

Research paper thumbnail of Design of Saving Circuit with Fuzzy Logic Control for Residences and Small Scale Enterprises

Advances in Electrical and Computer Engineering, 2010

... [14] N. Barsoum, "Programming of PIC Micro-Controller for Power Factor Correction",... more ... [14] N. Barsoum, "Programming of PIC Micro-Controller for Power Factor Correction", First Asia International Conference on Modelling&Simulation, pp. 19-25, 2007. ... [17] P. Kumar, "Development of Power Factor Controller using PIC Microcontroller", Master Thesis ...

Research paper thumbnail of Electroencephalographic Signaling Approach in Detecting Moods of People

International Symposium Innovative Technologies Engineering and Science, Sep 29, 2017

The brain is the control center of the human body. The working structure of the brain is provided... more The brain is the control center of the human body. The working structure of the brain is provided by communication between neurons. The electrical movements of neurons are called "brain waves". Brain waves can be recorded by Electroencephalography (EEG). With the analysis of brain waves recorded with EEG, changes in the emotional states of people can be analyzed. In this study, the emotional changes of colors and shapes of people of different ages and sexes are analyzed.

Research paper thumbnail of IoT Based Library Management Automation System Using RFID

Nowadays our life is becoming smart and simple with the help of smart and intelligent systems. Th... more Nowadays our life is becoming smart and simple with the help of smart and intelligent systems. The Internet of Things concept is enabling most digital devices to work cooperatively. In this article, we proposed a Library Management Automation system that is based on the Radio Frequency Identification (RFID) technology. The books and Students ID have RFID tags that are attached to them and hold information about books and students respectively. RFID readers used to read RFID tags attached to the books and students' IDs to do all tasks like the efficient and proper theft-controlled operation of libraries. This system will be connected to an RFID reader and printer. The main task of this system is to make work easy for users and librarians. Moreover, this system will be more user-friendly and easy. The proposed system reduces time and labor approximately from 70-80% after implementation.

Research paper thumbnail of Optimization of Quadrotor Route Planning with Time and Energy Priority in Windy Environments

The International Arab Journal of Information Technology, 2023

The Software industry's rapid growth contributes to the need for new technologies. PRICE software... more The Software industry's rapid growth contributes to the need for new technologies. PRICE software system uses Predictive Object Point (POP) as a size measure to estimate Effort and cost. A refined POP metric value for object-oriented software written in Java can be calculated using the Automated POP Analysis tool. This research used 25 open-source Java projects. The refined POP metric improves the drawbacks of the PRICE system and gives a more accurate size measure of software. This paper uses refined POP metrics with curve-fitting neural networks and multi-layer perceptron neural networkbased deep learning to estimate the software development effort. Results show that this approach gives an effort estimate closer to the actual Effort obtained through Constructive Cost Estimation Model (COCOMO) estimation models and thus validates refined POP as a better size measure of object-oriented software than POP. Therefore we consider the MLP approach to help construct the metric for the scale of the Object-Oriented (OO) model system.

Research paper thumbnail of Selçuk weather station and web-mobile applications

International Journal of Applied Mathematics, Electronics and Computers, Jun 30, 2022

In this paper, a system for reading meteorological data like temperature, humidity, air pressure,... more In this paper, a system for reading meteorological data like temperature, humidity, air pressure, wind speed, wind direction, and rainfall at regular intervals, deployed in Selçuk University Alaeddin Keykubat Campus. The system also provides real-time images and video time-lapses of the campus sky. These data are made available to university people via a website and mobile applications for both iOS and Android. The website and mobile applications provide a clear experience for the users, also explaining the icons and terms used on the website. Users can access the system archive in graphical ways.

Research paper thumbnail of Introducing Motherboard Components Using Virtual Reality Technology

The study aims to introduce the main component of computers, the main component of the computer, ... more The study aims to introduce the main component of computers, the main component of the computer, and the sockets where these components need to be installed, firstly to secondary school, high school, and university students and then to every user who installs the application by using virtual reality technology. With the online publication and use of the application, the motherboard that needs to be learned, which will be shown to the application, but not available and only photographed, is recognized and all components on the motherboard will be learned. In addition, by showing the sockets where the components need to be installed, anyone with the application will be able to easily remove and reattach all components in their computer. The application was carried out using the 3DQR program because it allows the visuals to be displayed and processed in 3 dimensions. In the written article, virtual reality technology will be mentioned, then 3DQR Studio software will be introduced in the application used in the application and will be finalized by explaining it with the visuals presented.