Repository logoGCRIS
  • English
  • Türkçe
  • Русский
Log In
New user? Click here to register. Have you forgotten your password?
Home
Communities
Browse GCRIS
Entities
Overview
GCRIS Guide
  1. Home
  2. Browse by Author

Browsing by Author "Zincir, Ibrahim"

Filter results by typing the first few letters
Now showing 1 - 14 of 14
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - WoS: 2
    Citation - Scopus: 3
    A novel approach to e-learning: Yasar university e-Learning system (YES)
    (Academic Conferences Limited info@academic-conferences.org, 2013) Ibrahim Zincir; Melih Zeytinoǧlu; Tohid Ahmed Rana; Samsun Mustafa Basarici; Basarici, Samsun; Zincir, Ibrahim; Rana, Ahmed; Zeytinoglu, Melih
    Since 2009 every student who attends Yasar University (Izmir Turkey) regardless of their department has to take part in seven courses (Human Sciences Research Culture Design Culture Aesthetic Culture Ethic Culture Project Culture and a Social Responsibilities Project) defined as University Foundation Courses (UFND). These courses are part of the university's effort to graduate students who are not only hard-working and respectable but also who are responsible and beneficent to society and the environment that they are living in. Approximately 4000 students attend these courses every term which in return results in certain challenges. One of the more pressing challenges is shortage of lecturers and classrooms which is the root of a more visible problem, the complexity and difficulty of the timetable for the whole university. Hence in January 2012 it was decided that a new approach was needed. At the start of the 2012-2013 academic year a novel E-learning system was introduced to offer these seven courses online. Yasar University E-Learning System (YES) differs from its peers in one important aspect: YES assesses the students continuously. YES does this by not only monitoring but also by encouraging them to get involved in the courses much more actively than any other system. In addition to the assessment of the students continuously the new system evaluates the effectiveness of the users of the system by requiring them to attend the offered forums and live discussions with lecturers at least two times a week. This paper discusses the structure and the implementation of YES and the experiences so far. Furthermore the paper draws some comparisons between YES and other popular E-learning systems. © 2014 Elsevier B.V. All rights reserved.
  • Loading...
    Thumbnail Image
    Conference Object
    A Novel Face Identification Implementation for Class Attendance Monitoring
    (Institute of Electrical and Electronics Engineers Inc., 2019) Hayriye Donmez; Sena Yagmur Sen; Nedim Orta; Atakan Aylanc; Ibrahim Zincir; Donmez, Hayriye; Sen, Sena Yagmur; Zincir, Ibrahim; Orta, Nedim; Aylanc, Atakan
    Face identification has become more significant and relevant in the recent years. It is widely used for security purposes in enterprises and state-owned business since it has many advantages and benefits compared to other state of the art security applications. Previous face identification implementations inherited many different approaches and algorithms in order to overcome the challenges of recognizing an individual from a variety of angles and heights but none of them were completely successful. The main goal of this research is to demonstrate a novel face identification framework for an autonomous class attendance monitoring system implementing SIFT (Scale Invariant Feature Transform) algorithm. An image dataset generated with the participation of 20 volunteers that were photographed from a variety of different angles and heights was tested with the proposed system and achieved successful results in general with reasonable accuracy rates. © 2020 Elsevier B.V. All rights reserved.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - Scopus: 4
    A preliminary investigation on the identification of peer to peer network applications
    (Association for Computing Machinery Inc acmhelp@acm.org, 2015) Can Bozdogan; Yasemin Gokcen; Ibrahim Zincir; Bozdodan, Can; Zincir, Ibrahim; Gokcen, Yasemin; S. Silva
    Identification of P2P (peer to peer) applications inside network traffic plays an important role for route provisioning traffic policing flow prioritization network service pricing network capacity planning and network resource management. Inspecting and identifying the P2P applications is one of the most important tasks to have a network that runs efficiently. In this paper we focus on identification of different P2P applications. To this end we explore four commonly used supervised machine learning algorithms as C4.5 Ripper SVM(Support Vector Machines) Naïve Bayesian and well known unsupervised machine learning algorithm K-Means on four different datasets. We evaluate their performances to identify the P2P applications that each traffic flow belongs to. Evaluations show that Ripper algorithm gives better results than the others. © 2017 Elsevier B.V. All rights reserved.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - WoS: 2
    Citation - Scopus: 2
    A Proposal for a Novel e-Learning System for the Visually Impaired
    (ACAD CONFERENCES LTD, 2014) Ahmed Rana; Ibrahim Zincir; Samsun Basarici; Basarici, Samsun; Rana, Ahmed; Zincir, Ibrahim; R Orngreen; KT Levinsen
    According to World Health Organization (WHO) 285 million people are estimated to be visually impaired worldwide: 39 million are blind and 246 million have low vision. It is a well-known fact that for the visually impaired it is not possible to access the information via drawings and figures as there is no interpretation. In addition it is not easy to search through a passage for the relevant information as Braille takes much more time to read and finally a lot of memorization is necessary in order to achieve success in life. As standard procedures and systems for education are not sufficient for these people a novel approach is necessary. The recent advances in information and communication technologies (ICTs) have placed e-learning at the front row of education methodologies for the disabled. E-learning applications and websites specifically designed for accessibility help to improve the quality of the education without undermining the functionality and the usability. This paper first outlines the challenges and the shortcomings of e-learning schemas for the visually impaired and then proposes a novel touch screen application implemented via an effective and interactive user-friendly e-learning system.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - WoS: 1
    A Proposal for Turkish/German Cross-Language Q&A System
    (ACAD CONFERENCES LTD, 2012) Samsun Basarici; Ibrahim Zincir; Sabah Balta; Tohid Ahmed Rana; Basarici, Samsun; Zincir, Ibrahim; Balta, Sabah; Rana, Tohid Ahmed; M Gasco
    Over the last decade many approaches have been introduced about Q&A (Question & Answer) Systems. The problem with many of these works is that they mainly implement English as the underlying language. With the tremendous growth of computer usage in daily life and implementation ofe-government systems the need for cross-language Q&A Systems increased enormously especially for immigration countries such as Germany. Beside of Turkey and Turkish speaking countries the biggest Turkish population in Europe is living in Germany. Over the last decade the communication between the administration and this minority has not always been easy. The main approach of the German administration is enforcing this minority to gain the same language skills like the native speakers (which is not a feasible solution aspast experiences showed). This paper introduces an onlineconcept for cross-language Q&A System which accepts both Turkish and German as the underlying languages to guide the community members to the appropriate person inside the e-government systems.
  • Loading...
    Thumbnail Image
    Conference Object
    Analysis of e-Learning outcomes at higher education: A case study
    (Academic Conferences Limited info@academic-conferences.org, 2014) Ibrahim Zincir; Tohid Ahmed Rana; Samsun Mustafa Basarici; Sabah Balta; Basarici, Samsun; Zincir, Ibrahim; Balta, Sabah; Rana, Tohid Ahmed; K.T. Levinsen , R. Orngreen
    As explained in our paper "A Novel Approach To E-Learning: Yasar University E-Learning System (YES)" (Zincir et al. 2013) since 2009 every student who attends Yasar University (Izmir Turkey) regardless of their department has to take part in seven courses defined as University Foundation Courses (UFND). These courses are part of the university's effort to graduate students who are not only hard-working and respectable but also who are responsible and beneficent to society and the environment that they are living in. Since approximately 4000 students attend these courses every term in academic year 2012-2013 an E-learning system called Yasar University E-Learning System (YES) was introduced to take these courses online. It was a novel approach that encourages the students to get involved in the courses much more actively since it grades them according to their learning behaviors. Basically YES monitors all the activities of the students all the time once they are connected to the system. These activities include how and when they access the information supplied materials forums and chat rooms. This paper discusses the outcomes & the outputs of YES by presenting a brief insight into the behavior of the students inside an e-learning environment and by analyzing the correlation between the success of the students and the way they interact with YES. © 2017 Elsevier B.V. All rights reserved.
  • Loading...
    Thumbnail Image
    Article
    Citation - WoS: 2
    Citation - Scopus: 2
    Architectural space classification considering topological and 3D visual spatial relations using machine learning techniques
    (Routledge, 2024) Berfin Yıldız; Gulen Cagdas; Ibrahim Zincir; Yildiz, Berfin; Cagdas, Guelen; Zincir, Ibrahim
    The paper presents a novel method for classifying architectural spaces in terms of topological and visual relationships required by the functions of the spaces (where spaces such as bedrooms and bathrooms have less visual and physical relationships due to the privacy while common spaces such as living rooms have higher visual relationship and physical accessibility) through machine learning (ML). The proposed model was applied to single and two-storey residential plans from the leading architects of the 20th century Among the five different ML models whose performances were evaluated comparatively the best results were obtained with Cascade Forward Neural Networks (CFNN) and the average model success was calculated as 93%. The features affecting the classification models were examined based on SHAP values and revealed that width control 3D visibility and 3D natural daylight luminance were among the most influential. The results of five different ML models indicated that the use of topological and 3D visual relationship features in the automated classification of architectural space function can report very high levels of classification accuracy. The findings show that the classification model can be an important part of developing more efficient and adaptive floor plan design building management and effective reuse strategies. © 2024 Elsevier B.V. All rights reserved.
  • Loading...
    Thumbnail Image
    Conference Object
    Automated Two-Story Housing Floor Plan Generation Using Generative Adversarial Networks
    (Springer International Publishing AG, 2025) Yildiz, Berfin; Cagda, Gillen; Zincir, Ibrahim
    Automating the generation of two-story housing floor plans has emerged as a significant area of focus in architectural design research, driven by the need to enhance efficiency, creativity, and functionality in the design process. This study introduces a GAN-based framework for the automated generation of two-story housing layouts, incorporating architectural constraints such as functional zoning, multi-level connectivity, open-plan configurations, and visual relationships. By leveraging advanced deep learning techniques, the proposed framework achieves a balance between design creativity and practical functionality, addressing the unique challenges posed by multi-level spatial arrangements. The results demonstrate the model's ability to generate diverse and coherent floor plans that effectively meet the complexities of two-story layouts. This research underscores the transformative potential of deep learning models in architectural design, while acknowledging existing limitations in managing multi-level spatial relationships and user interaction. With continued advancements, AI has the potential to play a pivotal role in supporting architects-optimizing workflows, enabling creative exploration, and fostering user-centered, innovative designs. Ultimately, this work sets the stage for further progress in automated multi-story housing design, paving the way for a more collaborative and technology-driven architectural future.
  • Loading...
    Thumbnail Image
    Conference Object
    ELCARE: A Novel Approach for Educating Caretakers of Elderly
    (ACAD CONFERENCES LTD, 2015) Ibrahim Zincir; Samsun Basarici; Ahmed Rana; Fisun Senuzun; Basarici, Samsun; Zincir, Ibrahim; Senuzun, Fisun; Rana, Ahmed; A Jefferies; M Cubric
    Elderly care or simply eldercare is the fulfillment of the special needs and requirements that are unique to senior citizens. Elderly care emphasizes the social and personal requirements of senior citizens who need some assistance for daily activities and health care but who desire to age with dignity. With the improvements made in health technologies the life expectancy in EU is increasing and more than 80 million people are aged over 60 in Europe today. Experts believe that the increasing number of elderly people who need help with basic tasks but have been left to struggle by an unprecedented withdrawal of state-funded social care create a huge problem, lack of nurses/caretakers for the elderly. This paper discusses an e-learning system for elderly care that simply educates/trains the people who want to take care of the elderly, either those who want to become professional caretakers or those who are volunteers or social workers. The novel system inherits web and mobile apps and will be deployed multilingual. The main goal of the system is to increase the social intellectual and cognitive abilities of the target group like increasing the patience devotion physical endurance etc. The system is buildup of modules that have a linear character i.e. user has to pass a module successfully in order to proceed to the next one.
  • Loading...
    Thumbnail Image
    Article
    Citation - WoS: 1
    Citation - Scopus: 1
    EMITS: An Experience Management System for IT Management Support
    (WORLD SCIENTIFIC PUBL CO PTE LTD, 2015) Can Bozdogan; A. Nur Zincir-Heywood; Ibrahim Zincir; Zincir-Heywood, A. Nur; Bozdogan, Can; Zincir, Ibrahim
    This research focuses on the identification of relevant experience required for solving IT (Information Technology) problems in small-to medium-sized enterprises. To achieve this we integrated information retrieval techniques with clustering and optimization techniques to design and develop a custom-built Experience Management system for IT management support. We have built and evaluated our system on three different publicly available data sets: Princeton Parallels and GoDaddy. Results support that it is possible to provide the right mix of automation and manual activity for IT experience management while achieving a high accuracy.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - WoS: 5
    Citation - Scopus: 18
    Exploring NAT Detection and Host Identification Using Machine Learning
    (Institute of Electrical and Electronics Engineers Inc., 2019) Ali Safari Khatouni; Lan Zhang; Khurram Aziz; Ibrahim Zincir; Zhang, Lan; Zincir, Ibrahim; Khatouni, Ali Safari; Aziz, Khurram; Zincir-Heywood, Nur; H. Lutfiyya , Y. Diao , N. Zincir-Heywood , R. Badonnel , E. Madeira
    The usage of Network Address Translation (NAT) devices is common among end users organizations and Internet Service Providers. NAT provides anonymity for users within an organization by replacing their internal IP addresses with a single external wide area network address. While such anonymity provides an added measure of security for legitimate users it can also be taken advantage of by malicious users hiding behind NAT devices. Thus identifying NAT devices and hosts behind them is essential to detect malicious behaviors in traffic and application usage. In this paper we propose a machine learning based solution to detect hosts behind NAT devices by using flow level statistics (excluding IP addresses port numbers and application layer information) from passive traffic measurements. We capture a large dataset and perform an extensive evaluation of our proposed approach with four existing approaches from the literature. Our results show that the proposed approach could identify NAT behaviors and hosts not only with higher accuracy but also demonstrates the impact of parameter sensitivity of the proposed approach. © 2020 Elsevier B.V. All rights reserved.
  • Loading...
    Thumbnail Image
    Article
    Citation - WoS: 55
    Citation - Scopus: 79
    Implementation of machine learning algorithms for gait recognition
    (ELSEVIER - DIVISION REED ELSEVIER INDIA PVT LTD, 2020) Aybuke Kececi; Armagan Yildirak; Kaan Ozyazici; Gulsen Ayluctarhan; Onur Agbulut; Ibrahim Zincir; Ozyazici, Kaan; Kececi, Aybuke; Ayluctarhan, Gulsen; Zincir, Ibrahim; Yildirak, Armagan; Agbulut, Onur
    The basis of biometric authentication is that each person's physical and behavioural characteristics can be accurately defined. Many authentication techniques were developed over the years. Human gait recognition is one of these techniques. This article explores machine learning techniques for user authentication on HugaDB database which is a human gait data collection for analysis and activity recognition (Chereshnev and Kertesz-Farkas 2017). The activities recorded in this dataset are walking running sitting and standing. The data were collected with devices such as wearable accelerometer and gyroscope. In total the data describe 18 individuals thus we considered each individual as a different class. 10 commonly used machine learning algorithms have been implemented over the HugaDB. The proposed system achieved more than 99% in accuracy via IB1 Random Forest and Bayesian Net algorithms. (C) 2020 Karabuk University. Publishing services by Elsevier B.V.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - WoS: 1
    Improving Employee Performance Using Web-Based Application for Public Services
    (ACAD CONFERENCES LTD, 2012) Tohid Ahmed Rana; Sabah Balta; Ibrahim Zincir; Samsun Basarici; Basarici, Samsun; Zincir, Ibrahim; Balta, Sabah; Rana, Tohid Ahmed; M Gasco
    One of the vital problems of public services is the deficiency of well-educated and highly motivated employees. The attitudes and performance of public servants have a crucial importance on the satisfaction of the customer relationships where in this context customers are the citizens. Thus well-trained and highly motivated employees are indispensable elements of governmental services as a priority. Therefore controlling public servants' professional improvements performances and their vocational capacities are the key factors to provide high quality services. Consequently a good training and tracking system for employees can provide useful data about current level of employee performance to the state and the data produced by the system can be used to promote employees. Current online training systems do not monitor their members continuously but only evaluate them for that specific instance which in return does not help much in improving employee performance. In this paper we propose an eLearning system to improve performance of public servants. The system combines exterior website and interior management systems to provide complete and effective information and service.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - WoS: 5
    Citation - Scopus: 5
    The Security and the Credibility Challenges in e-Voting Systems
    (ACAD CONFERENCES LTD, 2015) Ahmed Rana; Ibrahim Zincir; Samsun Basarici; Basarici, Samsun; Rana, Ahmed; Zincir, Ibrahim; N Abouzakhar
    E-voting is one of the most emerging social innovations of the 21st century which is being adopted by many countries since it represents the peak of e-government solutions and also enables an easier way to vote for their citizens and expatriates. In addition e-voting systems will not only increase the amount of voters' participation but also will decrease the total cost of electoral process. The main concern with the e-voting system is security. Unlike any other offence it is first difficult to observe ambiguities in voting and also it is much more difficult to locate the lost or to detect the rigged votes. Challenges such as how to authenticate the voter how to securely cast his/her vote and then how to store and to count these votes without outside influence generate whole scrutiny over the e-voting systems. This paper first discusses these challenges and then proposes a unique approach to ensure public confidence and credibility over the electoral systems. This proposal inherits 2 independent modules, first module to verify authentication by implementing an e-government application and smartphone to identify a registered voter. After the completion of successful validation the second module that provides anonymity to the voter similar to TOR (The Onion Router) will be activated to cast the e-ballot.
Repository logo
Collections
  • Scopus Collection
  • WoS Collection
  • TrDizin Collection
  • PubMed Collection
Entities
  • Research Outputs
  • Organizations
  • Researchers
  • Projects
  • Awards
  • Equipments
  • Events
About
  • Contact
  • GCRIS
  • Research Ecosystems
  • Feedback
  • OAI-PMH

Log in to GCRIS Dashboard

GCRIS Mobile

Download GCRIS Mobile on the App StoreGet GCRIS Mobile on Google Play

Powered by Research Ecosystems

  • Privacy policy
  • End User Agreement
  • Feedback