This is a Demo Server. Data inside this system is only for test purpose.
 

Tuğlular, Tuğkan

Loading...
Profile Picture
Name Variants
Tuğkan Tuğlular
Tuǧlular, T.
Tuglular, Tugkan
Tuglular, T.
Tuğlular, Tuğkan
Tuglular, Tugkan
Job Title
Assoc. Prof. Dr.
Email Address
tugkantuglular@iyte.edu.tr
Main Affiliation
Bilgisayar Mühendisliği Bölümü
Status
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

SDG data could not be loaded because of an error. Please refresh the page or try again later.
Scholarly Output

110

Articles

19

Citation Count

0

Supervised Theses

34

Scholarly Output Search Results

Now showing 1 - 10 of 108
  • Master Thesis
    Policy anomaly reporting for distributed firewalls
    (Izmir Institute of Technology, 2007) Çetin, Füsun; Tuğlular, Tuğkan
    Firewall is a protective device which is installed between two networks.Firewall functionality depends on the filtering rules and their order. All rule relations must be considered in order to determine correct rule order. In this thesis, anomaly discovery algorithms are implemented for single and distributed firewall environments in a software tool called .Policy Anomaly Checker.. A number of tests are performed using different policies and network topologies in order to obtain operational values of these algorithms.
  • Master Thesis
    Tag-based dynamic ranking system for organization related news
    (Izmir Institute of Technology, 2018-05) Özkan, Mustafa Tunahan; Tuğlular, Tuğkan
    In information systems, tags are keywords or terms, which represent a piece of information. They provide to define an item and help it to be found again through searching or browsing. Tags have gained popularity due to the growth of social sharing, social bookmarking, organization network and social network websites. In addition, tags are also used to express prominent events and noticeable topics in the news. In this thesis, we propose a tag-based statistical learning approach to predict the shareability of news in an organization network. We represented features with tags by using different methods and adopted several classifiers to predict the shareability of news. We model this problem with a binary classification problem, where shareable news are considered as the positive and non-shareable news are considered as the negative class. The experimental results indicate that there is no general best classifier for the study of shareability prediction for organization related news but depending on the dataset and represented features we can adopt an optimal classifier.
  • Master Thesis
    Application of graph neural networks on software modeling
    (01. Izmir Institute of Technology, 2020-12) Leblebici, Onur Yusuf; Tuğlular, Tuğkan; Belli, Fevzi
    Deficiencies and inconsistencies introduced during the modeling of software systems can cause undesirable consequences that may result in high costs and negatively affect the quality of all developments made using these models. Therefore, creating better models will help the software engineers to build better software systems that meet expectations. One of the software modelling methods used for analysis of graphical user interfaces is Event Sequence Graphs (ESG). The goal of this thesis is to propose a method that predicts missing or forgotten links between events defined in an ESG via Graph Neural Networks (GNN). A five-step process consisting of the following steps is proposed: (i) data collection from ESG model, (ii) dataset transformation, (iii) GNN model training, (iv) validation of trained model and (v) testing the model on unseen data. Three performance metrics, namely cross entropy loss, area under curve and accuracy, were used to measure the performance of the GNN models. Examining the results of the experiments performed on different datasets and different variations of GNN, shows that even with relatively small datasets prepared from ESG models, predicts missing or forgotten links between events defined in an ESG can be achieved.
  • Article
    Bağlamsal Doğrulama için Bir Yazılım Tasarım Şablonu
    (2017) Tuğlular,Tuğkan
    Yazılım tasarım şablonları, tekrar eden yazılım tasarım problemleri için hazır çözümler sunar. Model-Görünüm-Denetçi (İng. MVC) gibi bileşik tasarım şablonları ise, var olan tasarım şablonlarının biraraya getirilmesi ile daha büyük ölçekli problemleri çözmek için geliştirilmektedir. Bu çalışmada bağlamsal doğrulama problemi için bir bileşik tasarım şablonu geliştirilmiştir. Bağlamsal doğrulama, bir işlem gerçekleş- tirilmeden önce o işlem için gerekli tüm nesnelerin gerekli koşulları sağladığının doğrulanması anlamına gelmektedir. Bileşik tasarım şablonu geliştirme yöntemi ile ortaya konan bağlamsal doğrulama tasarım şablonu; tek sorumluluk, açık-kapalı ve bağımlılığı tersine çevirme nesne temelli tasarım ilkelerine göre geliştirilmiştir. Geliştirilen bağlamsal doğrulama tasarım şablonu bünyesinde Ziyaretçi, Strateji, Dekoratör ve Bildirim tasarım şablonlarını barındırmaktadır. Ortaya konan bağlamsal doğrulama tasarım şablonu, kullanım şekli itibariyle iki örnek uygulama üzerinde tartışılmıştır.
  • Article
    Rule-Based Automatic Question Generation Using Semantic Role Labeling
    (Ieice-inst Electronics information Communication Engineers, 2019) Keklik, Onur; Tuglular, Tugkan; Tekir, Selma
    This paper proposes a new rule-based approach to automatic question generation. The proposed approach focuses on analysis of both syntactic and semantic structure of a sentence. Although the primary objective of the designed system is question generation from sentences, automatic evaluation results shows that, it also achieves great performance on reading comprehension datasets, which focus on question generation from paragraphs. Especially, with respect to METEOR metric, the designed system significantly outperforms all other systems in automatic evaluation. As for human evaluation, the designed system exhibits similar performance by generating the most natural (human-like) questions.
  • Conference Object
    Towards test case generation for synthesizable VHDL programs using model checker
    (2010) Ayav, T.; Tuglular, T.; Belli, F.
    VHDL programs are often tested by means of simulations, relying on test benches written intuitively. In this paper, we propose a formal approach to construct test benches from system specification. To consider the real-time properties of VHDL programs, we first transform them to timed automata and then perform model checking against the properties designated from the specification. Counterexamples returned from the model checker serve as a basis of test cases, i.e., they are used to form a test bench. The approach is demonstrated and complemented by a simple case study. © 2010 IEEE.
  • Article
    Input Contract Testing of Graphical User Interfaces
    (World Scientific Publ Co Pte Ltd, 2016) Tuglular, Tugkan; Belli, Fevzi; Linschulte, Michael
    User inputs are critical for the security, safety, and reliability of software systems. This paper proposes a new concept called user input contracts, which is an integral part of a design-by-contract supplemented development process, and a model-based testing approach to detect violations of user input contracts. The approach generates test cases from an input contract integrated with graph-based model of user interface specification and applies them to the system under consideration. The paper presents a proof-of-concept tool that has been developed and used to validate the approach by experiments. The experiments are conducted on a web-based system for marketing tourist services to analyze input robustness of system under consideration with respect to user input contracts.
  • Conference Object
    Container Damage Detection and Classification Using Container Images
    (Ieee, 2020) Imamoglu, Zeynep Ekici; Tuglular, Tugkan; Bastanlar, Yalin
    In the logistics sector, digital transformation is of great importance in terms of competition. In the present case, container warehouse entry / exit operations are carried out manually by the logistics personnel including container damage detection. During container warehouse entry / exit process, the process of detecting damaged containers is carried out by the personnel and several minutes are required to upload to the IT system. The aim of our work is to automate the detection of damaged containers. This way, the mistakes made by the personnel will be eliminated and the process will be accelerated. In this work, we propose to use a convolutional neural network (CNN) that takes the container images and classify them as damaged or undamaged. We modeled the problem as a binary classification and employed different CNN models. The result we obtained shows that there is no single best method for the classification. It is shown how the dataset was created and how the parameters used in the layered structures affect the models employed in this study.
  • Master Thesis
    Campus network topology discovery and distributed firewall policy generation
    (Izmir Institute of Technology, 2011) Çalışkan, Ezgi; Tuğlular, Tuğkan
    The change in technology of network components has enabled more complex and dynamic computer networks to occur. At present, most network components can easily be attached to or removed from computer networks. This situation causes the static prevention techniques to be inadequate. In static prevention, any situation which is different than expected ones occurs, the default rule is taken granted for it. Detecting unpredictable situations and finding out solutions for them takes time. There are some network systems, which control network parameters dynamically, such as intrusion detection systems integrated firewalls. However, even if these systems control traffic parameters, they can only alert when the parameter values are not in the given range. They may not be successful to determine well-designed attacks or even if the system determines the attack, it takes time to interfere. Instead of static approaches, a dynamic network security system, which is compatible with dynamic network topology and can update the security issues according to changes in network, is needed. To achieve this dynamic nature, the network must be monitored. Then controlling and managing new components could be easier and more secure. New security rules must be created for the newly attached network components or security rules must be removed for removed network components. In this thesis, an approach to monitor a campus area network and dynamically update firewall rules according to monitoring results is proposed. The implemented approach is validated through a case study.
  • Master Thesis
    Traffic generator for firewall testing
    (Izmir Institute of Technology, 2009) Kaya, Özgür; Tuğlular, Tuğkan
    Firewalls lead at the front line of a computer network to restrict unauthorized access. The desired security level is determined by a policy and implemented by a firewall which not only has to be effective but also stable and reliable service is expected. In order to verify the level of security of the system, testing is required. The objective of this thesis is to test a firewall with software testing techniques taking into consideration the nominated policy and the firewall. Iptables software was examined and tested by two different algorithms that were modified according to software testing techniques, and the results were observed. Packets sent through the Firewall Under Test (FUT) are compared to packets passed through the FUT and test results were observed. The security performance of the modified algorithms proved to be successful.