Browsing by Author "Aktas, A. Ziya"
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Item A Real-Time Strategy Game, ''GALLIPOLI WARS,'' as A Centennial Tribute to the Gallipoli Campaign (1915-2015)(2017) Aktas, A. Ziya; Orcun, Emre R.; 0000-0002-1829-7821The same authors had reported a review of game development processes and methodologies in an earlier paper. In that paper, game design elements, such as the players, story, rules, objectives, procedures, conflict, and challenge, and their effect over gameplay were treated. Technical components in that paper included the render engine and rendering pipeline (fixed function pipeline and flexible pipeline), physics engine and physics-related techniques (collision detection, raycasting, etc.), game codes (for game mechanics, artificial intelligence, scenario creation, and management) and artwork contents (game level, three-dimensional (3D) models, two-dimensional maps for shaders, skeletal animation, and audio assets) that form a game. Along with their development processes and approaches, all of these technical and artwork components are applied on a case problem and are summarized in this paper. The case problem considered is a small part of Gallipoli or Dardanelles Wars in Ottoman history, as a real-time 3D strategy game.Item A Review and Comparison of Renewable Energy Strategies or Policies of Some Countries(2015) Aktas, A. ZiyaStrategic decisions or policies in energy and environmental protection are very crucial for any country on the globe. The objective of this study had been to review energy policies or strategies as well as the environmental protection measures of some countries and present them in a tabular form for an easy comparison. The selected sample countries were: Australia, Brazil, China, EU, India, Japan, Russia, Turkey and the US.Item A Study on Cyber-Security Oo Autonomous and Unmanned Vehicles(2015) Yagdereli, Eray; Gemci, Cemal; Aktas, A. Ziya; 0000-0002-1829-7821; HGD-9745-2022Technological developments towards vehicle automation have been taking place for years. Satellite navigation, cruise control and anti-lock braking systems (ABS) are well-known examples of automation technology used in everyday cars. The trend of automation technology being used in vehicles is expected to move closer to full autonomy through technological advancements in robotics and artificial intelligence. As a result, our daily lives will become more and more dependent on digitally-controlled devices and vehicle systems (partially or highly automated). On the other hand, computing and digital systems also have a tendency to become more fragile and susceptible to faults and failures because of cyber-attacks and software and hardware defects, as well as accidental defects introduced by developers. Therefore, autonomous vehicle systems must be developed to bear such dangers in mind and must be equipped with defensive capabilities and measures such that they can be able to respond automatically and dynamically to both accidental and deliberate defects and attacks. In this study, autonomous and unmanned vehicle systems are examined for their cyber-security vulnerabilities. Threats and attacks exploiting these vulnerabilities are identified and classified. Development guidelines and a mitigation strategy to be used in the development of autonomous and unmanned vehicle systems are proposed and discussed in the final section.