Browsing Fakülteler by Author "Dağ, Tamer"
Now showing items 1-20 of 26
-
Dynamic Multi Threshold Priority Packet Scheduling Algorithms
Dağ, Tamer; Uzungenç, Sezer (EDP Sciences, 2015)Packet scheduling algorithms are developed in order to use shared transmission resources efficiently. Various application packets such as real and non-real time packets might have different QoS requirements and traditional ... -
Dynamic Priority Packet Scheduler with Deadline Considerations (DPD)
Dağ, Tamer (INT INST Informatics & Systemics, 2010)Providing quality of service (QoS) to applications with different traffic characteristics based on their needs is an important research area for today's and tomorrow's high speed networks. Various techniques have been ... -
Energy Aware Multi-Hop Routing Protocol for WSNs
Cengiz, Korhan; Dağ, Tamer (IEEE, 2018)In this paper we propose an energy-efficient multi-hop routing protocol for wireless sensor networks (WSNs). The nature of sensor nodes with limited batteries and inefficient protocols are the key limiting factors of the ... -
An energy efficient routing algorithm (X-Centric routing) for sensor networks
Ataç, Göktuğ; Dağ, Tamer (INT INST Informatics & Systemics, 2011)Recent developments in wireless communications and electronics technologies have enabled the progress in low cost sensor networks. Sensor networks differ from traditional networks in several ways such as the severe energy ... -
Extending the lifetime of WSNs with Maximum Energy Selection Algorithm (MESA)
Cengiz, Korhan; Dağ, Tamer (Institute of Electrical and Electronics Engineers Inc., 2017)The limited battery supply of a sensor node is one of the most important factors that limit the lifetime of the WSNs. As a consequence increasing the lifetime of WSNs through energy efficient mechanisms has become a ... -
Implementation of a SDN (Software defined network)
Ergen, Mithat Sinan; Kutlan, Sarp; Dağ, Tamer; Dağ, Hasan (International Institute of Informatics and Systemics IIIS, 2014)Improving resource efficiency enhancing network security and achieving simpler network management have become the main goals for networking in the previous years. To accomplish these ideas an efficient routing traffic ... -
Importance of Regional Differences in Brain Throughout Aging for Down Syndrome
Kulan, Handan; Dağ, Tamer (Association for Computing Machinery, 2018)Down syndrome (DS) which affects approximately one in 700 live births is caused by an extra copy of the long arm of human chromosome 21 (HSA21). Statistical analysis has been done for understanding the protein expression ... -
Improving Energy-Efficiency of WSNs through LEFCA
Cengiz, Korhan; Dağ, Tamer (Sage Publications Inc, 2016)Wireless sensor networks (WSNs) have become an important part of our lives as they can be used in vast application areas from disaster relief to health care. As a consequence the life span and the energy consumption of a ... -
In silico identification of critical proteins associated with learning process and immune system for Down syndrome
Kulan, Handan; Dağ, Tamer (Public Library Science, 2019)Understanding expression levels of proteins and their interactions is a key factor to diagnose and explain the Down syndrome which can be considered as the most prevalent reason of intellectual disability in human beings. ... -
Low Energy Fixed Clustering Algorithm (LEFCA) for Wireless Sensor Networks
Cengiz, Korhan; Dağ, Tamer (IEEE, 2015)Wireless sensor networks (WSNs) have become an important part of our lives as they can be used in vast application areas from disaster relief to health care. As a consequence the life span and the energy consumption of a ... -
LSB Image Steganography Based on Blocks Matrix Determinant Method
Shehzad, Danish; Dağ, Tamer (KSII-KOR SOC Internet Information, 2019)Image steganography is one of the key types of steganography where a message to be sent is hidden inside the cover image. The most commonly used techniques for image steganography rely on LSB steganography. In this paper, ... -
Max-pivot routing for opportunistic networks
Dağ, Tamer (2013)Opportunistic networks are challenging types of networks where network connections are imminent. Network topologies are dynamic and can rapidly change. A path between a source node and a destination node may or may not ... -
Multi-hop low energy fixed clustering algorithm (M-LEFCA) for WSNs
Cengiz, Korhan; Dağ, Tamer (Institute of Electrical and Electronics Engineers Inc., 2017)The limited battery supply of sensor nodes is one of the most important factors which restrict the lifetime of the wireless sensor networks (WSNs). As a consequence the wide deployment of WSNs in the recent years led to ... -
Nearest Fixed Clustering Algorithm (NFCA) for Wireless Sensor Networks
Cengiz, Korhan; Dağ, Tamer (Institute of Electrical and Electronics Engineers Inc., 2016)The objective of reducing energy consumption at the sensor nodes has become a key research area for wireless sensor networks (WSNs) in recent years. With the steady increase in the cost of energy the existing algorithms ... -
Non-preemptive priority scheduler with multiple thresholds for network routers
Dağ, Tamer (Pamukkale Univ, 2018)The vast variety of applications available and being developed for computer networks have different quality of service requirements. One of the most significant ways to satisfy the needs of the applications is the packet ... -
Novel Application Software for the Semi-Automated Analysis of Infrared Meibography Images
Purpose: To develop semi-automated application software that quickly analyzes infrared meibography images taken with the CSO Sirius Topographer (CSO, Italy) and to compare them to the manual analysis system on the device ... -
A Novel Image Steganography Technique based on Similarity of Bits Pairs
Shehzad, Danish; Dağ, Tamer (IEEE, 2017)Steganography is one of the most important information hiding mechanism which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text image audio and video ... -
Performance Improvement of Threshold Based Audio Steganography Using Parallel Computation
Shoaib, Muhammad; Shehzad, Danish; Umar, Arif Iqbal; Khan, Zakir; Dağ, Tamer; Ul Amin, Noor (Science & Information SAI Organization Ltd, 2016)Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security ... -
The Performance of the RSS-Based Lateration Algorithm for Indoor Localization
Barodi, Lubana; Dağ, Tamer (Institute of Electrical and Electronics Engineers Inc., 2019)Localization methods have evolved over the years and led the invention of the Global Positioning System for outdoor localization. In time, the need for indoor localization has also arisen and research on indoor positioning ... -
Received signal strength based least squares lateration algorithm for indoor localization
Dağ, Tamer; Arsan, Taner (Pergamon-Elsevier Science Ltd, 2018)Following the success of accurate location estimation for outdoor environments locating targets in indoor environments has become an important research area. Accurate location estimation of targets for indoor environments ...