Güzel Sanatlar Tasarım ve Mimarlık Fakültesi / Faculty of Fine Arts, Design and Architecture

Permanent URI for this collectionhttps://hdl.handle.net/11727/1397

Browse

Search Results

Now showing 1 - 3 of 3
  • Thumbnail Image
    Item
    Distributed Database Design: A Case Study
    (2014) Tosun, Umut
    Data Allocation is an important problem in Distributed Database Design. Generally, evolutionary algorithms are used to determine the assignments of fragments to sites. Data Allocation Algorithms should handle replication, query frequencies, quality of service (QoS), cite capacities, table update costs, selection and projection costs. Most of the algorithms in the literature attack one or few components of the problem. In this paper, we present a case study considering all of these features. The proposed model uses Integer Linear Programming for the formulation of the problem. (C) 2014 The Authors. Published by Elsevier B.V.
  • Thumbnail Image
    Item
    Policy Misuse Detection in Communication Networks with Hidden Markov Models
    (2014) Tosun, Umut
    With the recent advances in computer networking applications, Intrusion Detection Systems (IDS) are widely used to detect the malicious connections in computer networks. IDS provide a high level security between organizations while preventing misuses and intrusions in data communication through internet or any other network. Adherence to network usage policies is crucial since a system or network administrator needs to be informed whether the information is compromised, if the resources are appropriately used or if an attacker exploits a comprised service. Server flow authentication via protocol detection analyzes penetrations to a communication network. Generally, port numbers in the packet headers are used to detect the protocols. However, it is easy to re-map port numbers via proxies and changing the port number via compromised host services. Using port numbers may be misleading for a system administrator to understand the natural flow of communications through network. It is also difficult to understand the user behavior when the traffic is encrypted since there is only packet level information to be considered. In this paper, we present a novel approach via Hidden Markov Models to detect user behavior in network traffic. We perform the detection process on timing measures of packets. The results are promising and we obtained classification accuracies between %70 and %100. (C) 2014 Published by Elsevier B.V.
  • Thumbnail Image
    Item
    A New Recombination Operator for the Genetic Algorithm Solution of the Quadratic Assignment Problem
    (2014) Tosun, Umut
    The Quadratic Assignment Problem (QAP) is a well known combinatorial optimization problem with a diverse set of applications. It can be transformed into many problems such as the travelling salesman, weapon target assignment, and query optimization in distributed databases. Exhaustive search methods are inadequate to solve large data sets. Genetic algorithms and tabu search meta-heuristics may provide near optimal solutions for large QAP instances taking a reasonable time to complete. In this paper, we present a new recombination operator based on Order-1 crossover algorithm. The suggested approach runs quick sort partitioning algorithm to generate different chromosomes from partitions. The minimum cost partition produces offsprings with the other chromosome. The proposed approach shows outstanding performance especially for instance sizes smaller than 50 with respect to the optimal results proposed in QAPLIB. (C) 2014 Published by Elsevier B.V.