29.12.2018
1
2
1 29.12.2018
3
4
2 29.12.2018
5
6
3 29.12.2018
7
8
4 29.12.2018
9
10
5 29.12.2018
11
12
6 29.12.2018
13
14
7 29.12.2018
QUANTUM COMPUTER
15
QUANTUM COMPUTING
WHAT IS QUANTUM
BRANCHES OF QUANTUM AND A BRIEF EXPLANATION OF THE BRANCHES
HISTORY OF QUANTUM COMPUTERS
WHAT IS A QUANTUM COMPUTER
SUPERPOSITION
QUANTUM ENTANGLEMENT
THE DIFFERENCES BETWEEN Q. COMPUTERS AND HOME COMPUTERSs
ADVANTEGES AND DISADVANTEGES OF QUANTUM COMPUTING
16
8 29.12.2018
WHAT IS QUANTUM
Quantum (plural: quanta) is the Latin word for amount. In our current era it is also called the smallest discrete unit of any physical property. For example, matter, photons and etc..
Quanta was first theorized by Max Planck. He was born in Kiel, Germany. Whilst he was very successful as a student and was a very talented musician, he devoted his life to physics. Planck's constant is used to calculate the energy of quanta.
17
BRANCHES OF QUANTUM
QUANTUM MECHANICS Quantum mechanics is the science of studying matter and atoms and their behaviour.
QUANTUM CRYPTOGRAPHY Quantum cryptography is the science of using quantum mechanical properties to perform cryptography.
QUANTUM GEOMETRY In theoretical physics, quantum geometry is used to describe physical phenomena at very large scales. At this distance quantum mechanics has mysterious effects on physical phenomenon.
18
9 29.12.2018
HISTORY OF QUANTUM COMPUTERS
Usage of quanta calculations in computers rose up in late 80’s by Yuri Manin and Richard Faynman.
David deutsch, introduced quantum computers working mechanism as a chain that can calculate. Acording to his shematics, first qubits are used to take the perimeters. After, using its logical operations, converts the data in a manner that it can understand. Qubits are used for transfer.
To this point scientist around the world have been working hard on creating a quantum computer. Although there have been many studies done on this subject its imporvements are not supassing quantum theories.
19
THE DIFFERENCES BETWEEN Q. COMPUTERS AND HOME COMPUTERS
The main difference between these two computers is that, while current computers act on only 0 or 1 (both are called BIT) and eight of them aranged give us 1 byte quantum computers have the thing called Qubits. Similar to normal computers qubits consist of 1s and 0s. However, qubits can also be either between 0 and 1 (0.2, 0.7 e.c.), they can also be both at the same time. Also more the quanta inside the computer the quicker it will solve a problem.
20
10 29.12.2018
Quantum computer algorithym Clasical computer algorithym Diagram. Diagram.
21
WHAT IS A QUANTUM COMPUTER
Quantum computer in its most basic form is the ability to use matter at an atomic scale such as photons to process and get a solution to a very difficult problem. However, as stated before, currently the only thing that quantum computers can be used for is to calculate troublesome equations. The idea of quantum computing is to be able to do things quickly and more precise than our current era computers. Quantum computers’ work mechanism can also be described as light. In some instances light behaves like an actual particle and other cases have shown that light can also behave like waves. This is called the wave-particle duality, which also has a different name called superposition. Quantum particles also behave according to quantum entanglement.
22
11 29.12.2018
SUPERPOSITION
Superposition is the state where a particle is in two different states at the same time. One notible example is the Schörinders’ cat. Briefly summirised, a cat is placed inside a closed box. İnside the box there is a machine that has a chance to break the glass which has radioactive matter inside it. After an hour there are two possibilities. One of them, the cat is alive, the other one being, the cat is dead. Before opening the box the cat is considered dead and alive,since we can’t actaully see it. Once the boxes is opened the superposition is broken and we see if the cat is dead or alive.
23
QUANTUM ENTANGLEMENT
Entaglement is the connection between quantum particles. The connection of quantum particles are so powerful that no matter the distance their bond will not break. İf either one shall change than the other shall too. This strange behaviour has been called quantum entanglement by Albert Einstein himself.
24
12 29.12.2018
ADVANTAGES AND DISADVANTAGES OF QUANTUM COMPUTING
ADVANTAGES 1. Quantum computing is faster to solve problems. 2. There are many ways that it could be used if improved (health, industry, architecture and many more.) 3. It uses way less energy than that of our current computers. 4. In theory quantum computers can perform any task that a classical computer can do.
25
ADVANTAGES AND DISADVANTAGES OF QUANTUM COMPUTING
DISADVANTAGES 1. With current technology a perfect one can't be built. 2. It is not certain if quantum computing can be used in anything other than mathematical problems. 3. Currently normal computers exceed quantum computer's limitations and there may not be any need for quantum computers in the near future. 4. A small change in the environment even the change of light can ruin the algorithyms it wants to follow. 5. It requires new algorithym system to work, otherwise it would work just like a classical computer does.
26
13 29.12.2018
27
REFERENCES
whatis.techtarget.com/definition/quantum www.factmonster.com/dk/encyclopedia/science-and- technology/quantum-theory www.google.com (Google's definition of computer and all of the images) www.computerhope.com/issues/ch001263.htm www.explainthatstuff.com/quantum-computing.html www.Quora.com/What-are-the-advantages-and-disadvantages-of- quantum-computin g Thanks to IBM for sharing the picture of how quantum computers work! https://www.youtube.com/watch?v=2B680d-qvhI
28
14 29.12.2018
PRESENTATION BY
YAVUZ UÇARKUŞ 152120171006 ERSAN TZAMPAZ CHATİP 152120181094
29
ORIGIN & EVOLUTION OF THE INTERNET
MEHMET FATİH GEYLAN 152120171024 YUNUS EMRE KILIÇ 152120171012 İNTRODUCTİON TO COMPUTER ENGİNEERİNG PROJECT
30
15 29.12.2018
Origin of the internet Packet Switching Theory ARPANET & IMP TCP/IP WWW Protocol Recent History
31
Leonard Kleinrock made the first description of the internet by his paper named ‘Information Flow In Large Communication Nets’.
32
16 29.12.2018
In 1962 J.C.R Licklider discussed his ‘Galactic Network’ concept in MIT.
33
Leonard Kleinrock at MIT published the first paper on packet switching theory in July 1961 and the first book on the subject in 1964. In 1965 working with Thomas Merrill, Lawrence G. Roberts connected the TX-2 computer in Mass. to the Q-32 in California with a low speed dial-up telephone line creating the first (however small) wide-area computer network ever built.
34
17 29.12.2018
In the summer of 1968 Network Working Group had their first meeting under Elmer Shapiro’s leadership. In December 1968 Stanford Research Institute (SRI) and Elmer Shapiro developed the Interface Message Processor (IMP) and sent it to California University.
35
In October 29 of 1969, the first internet message is sent from California University to SRI with IMP using by Leonard Kleinrock.
The message was ‘LOGIN’ but system had crashed and only the first 2 letter delivered successfully. That was the first internet error.
36
18 29.12.2018
37
In late seventies, Vinton Cerf developed the TCP/IP protocol (Transmission Control Protocol / Internet Protocol).
He used the term ‘Internet’ for the first time in history.
38
19 29.12.2018
The first domain name is taken by Symbolics Corporation symbolics.com Today, there are 150.000.000 web sites that have domain name.
39
In July 1990 ARPANET has completely shut down. In 1991 Berners-Lee developed the WWW protocol. Lee developed HTML for the WEB.
40
20 29.12.2018
In 1993 Web has presented to public. In the same year first graphical interfaced web browser ‘Mosaic’ had developed.
41
In 10 March 2000 dot.com bubble failed. In 2004 a group of computer sciencists developed Web 2.0 and it allowed the creation of social network. (Facebook, Twitter, Youtube, etc.) Today, there are 4.02 billion users in global.
42
21 29.12.2018
internetsociety.org
beybut.com
webtekno.com
aktuelbilgiler.com
dijilopedi.com
bilgisayarkurtu.com
armadigital.net
turkcebilgiler.net
internetarsivi.metu.edu.tr
circlelove.co
teknokoliker.com
nurnetwork.com
43
Who made the first description of the internet?
A)Vinton Cerf
B)Berners-Lee
C)Leonard Kleinrock
D)J.C.R Licklider
D)Elmer Shapiro
44
22 29.12.2018
What is the first graphical interfaced web browser?
A)Internet Explorer
B)Mosaic
C)Yahoo
D)Google
E)Mozilla Firefox
45
What was the first message sent on the internet?
A)HELLO WORLD
B)HI
C)INPUT
D)LOGIN
E)I LOVE YOU
46
23 29.12.2018
CLOUD COMPUTING YİĞİT AKKAŞ - 152120171042
.
47
What’s Cloud Computing ?
❑ Cloud computing is a service that makes us able to reach all the data,program and application that we reserve on internet at anywhere with our device that is connected to internet.
48
24 29.12.2018
How it Got Into Our Lives
Amazon played a key role by modernizing data centers and making the first real cloud computing service “Amazon S3” come into service in 2006.
It’s been widely used in world since the year 2008.
49
Why Do We Need it?
By making software,hardware and data hosting services gather together,it becomes a solution partner for companies.
Customers and employees can reach datas at the same time and it makes the operation goes much faster.
50
25 29.12.2018
What Are Its Advantages
Makes the users’ life easier and saves them from lack of hardware
Lowers the cost.
Annihilates the chaos of substructure
Protects the data.
51
What Are Its Advantages
Makes you able to reach the information from any platform anytime.
Widens the working area
52
26 29.12.2018
What Are Its Advantages
Because the companies that services cloud computing take security measures and protects the servers that the datas are being hold,it is safer than host computer.
Shortly,cloud computing is a service that supports you to work everywhere for cheaper and without any setup.
53
What Are Its Disadvantages
Because it is used by a lot of users,by result of any attack to it might cause takeover of special and private datas of users.
To reach the data that is stored,you’ll need internet connection. Also if you have a bad connection with low speed,your downloading and uploading will be slow.
54
27 29.12.2018
What Are Its Disadvantages
In case of a service shedding on a cloud computing service provider,all the companies that use this service will effect badly from that and until it ends,the company won’t be able to serve for their clients.
55
Types of Cloud
There are 4 types:
❑ Public Cloud
❑ Private Cloud
Hybrid Cloud
Community Cloud
56
28 29.12.2018
Types of Cloud
Public Cloud
Service is provided from a cloud computing company.They are most vulnerable to various attacks.
Small and medium scaled companies mostly use it.
57
Types of Cloud
Private Cloud
It’s used by large scaled companies that has more important data.
Private cloud is safe and the data is under your control,but it is more expensive then public cloud.
58
29 29.12.2018
Types of Cloud
Hybrid Cloud
Hybrid cloud means using both private and public clouds, depending on their purpose.
❑ Public cloud can be used to interact with customers, while keeping their data secured through a private cloud.
59
Types of Cloud
Community Cloud
Implies an infrastructure that is shared between organizations, usually with the shared data and data management concerns.
For example, a community cloud can belong to a government of a single country.
60
30 29.12.2018
Cloud Computing Services
Some platforms that provide service of cloud:
➢ Dropbox
➢ Google Drive
➢ iCloud
➢ Yandex.Disk
➢ SkyDrive
61
References
https://tr.wikipedia.org/wiki/Bulut_bilişim https://docs.microsoft.com/en- us/learn/modules/principles-cloud-computing/ https://www.endustri40.com/bulut-bilisim-cloud- computing-nedir
https://www.dia.com.tr/neden-bulut-bilisim-farki-ne- ayricaligi-ne/
https://blog.natro.com/bulut-teknolojisi-nedir/ http://ozlempalta.blogspot.com/2014/04/bulut- bilisim-yararlar.html
https://www.globaldots.com/cloud-computing-types-of- cloud
62
31 29.12.2018
SMART HOME SYSTEMS
152120171048 152120171031 Elif AKAY Bahar Eda SARAN
63
Smart home systems are systems covering multiple sensors, garden irrigation, air conditioning, fire alarm, lighting, security, smart sockets, television and smartphones.
64
32 29.12.2018
• Z-Wave, • EnOcean, • x10 • 6loWPAN • and zigbee are the most widely used wireless smart home communication networks in home automation systems.
65
Your home plants and garden can be irrigated automatically or remotely.
When you're on holiday, you can connect from your smartphone and give your pets water and food.
66
33 29.12.2018
Working Principle of Smart Home Systems
The control of all the equipment in the house is in the hands of the owner with a single control.
67
Instead of separate running devices, a smart home combines multiple subsystems controlled by a main home automation controller.
• TIMES ADJUSTED EVENTS
• TRIGGERING EVENTS
68
34 29.12.2018
Remote Control:
Clicking the Turn on audio button on the remote control will cause the sound on circuit board to be completed. The integrated circuit detects this.
The integrated circuit binary sends the voice command in the system to the LEDs on the front of the remote control.
The LED in the binary system sends a series of light pulses corresponding to the voice-on command.
69
Sony control-s
70
35 29.12.2018
Smart Home Automation has both advantages and disadvantages like each system.
71
Advantages of smart home automation:
72
36 29.12.2018
Smart homes include advanced security systems with cameras, motion sensors connected to the local police station or a private security company.
It enables the physically disabled patients to live more comfortably.
73
Saves time and energy The lights can be switched off automatically when there is no one in the room, and the thermostat can be set to allow the indoor temperature to fall just before the interior reaches evening hours. All these automated tasks, combined with modern energy-saving appliances, combine to save electricity, water and natural gas, reducing pressure on natural resources.
74
37 29.12.2018
Almost all smart home products can be loaded without much difficulty.
75
Disadvantages of smart home automation:
76
38 29.12.2018
After a while it is comfortable to use and makes people lazy.
Increases unemployment.
77
A smart home will be highly dependent on your internet connection. If you lose your connection, you will stay with many smart products that won't work.
Other people entering the system because of remote control can create negative results.
78
39 29.12.2018
What does ABB do about improving security?
Industrial developments intensified cybercrime. In order to increase security and robustness in its solutions, ABB officially established the cyber security test as part of the product development process.
79
Turkey's first smart home
• Sinpaş • IBM Global Services • Arçelik • Beko • Apple-Bilkom • Compaq • Digiturk • Turk.Net
80
40 29.12.2018
Artificial Intelligence and Algorithms
•neural network •fuzzy logic •support vector machines •hidden markov model •Deep learning
81
Which is not one of the most widely used wireless smart home communication networks in home automation systems?
A)Z-Wave, B)EnOcean C) X10 D)X-Wave A) zigbee
82
41 29.12.2018
Answer=
D)X-Wave
83
Which is not an artificial intelligence algorithm used in academic studies? A)neural network B)fuzzy logic C)support fuzzy model D)hidden markov model E)Deep learning
84
42 29.12.2018
Answer=
C)support fuzzy model
85
86
43 29.12.2018
HISTORY OF GRAPHICS CARD
87
• IBM released their first two graphics cards in 1981 • The Monochrome Display Adapter (MDA) and Color Graphics Adapter (CGA)
GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
88
44 29.12.2018
• Van Suwannukul , founder of Hercules Computer Technology developed the first popular none IBM graphics card, the Hercules Graphics Card.
GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
89
MDA(Monochrome Display Adapter)
HERCULES GRAPHICS CARD
GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
90
45 29.12.2018
• In the year 1984, Professional Graphics Controller (PGC) and Enhanced Graphics Adapter (EGA) were introduced by IBM.
• Then by 1987, came Video Graphics Array (VGA) .
• 2D and 3D cards were first released to the public in 1995.
• 3dfx Voodoo Graphics 3D chipsets developed by Interactive in 1996.
• By then since 2003, ATI video card market has been reined by ATI and NVIDIA with their Radeon and GeForce lines respectively. GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
91
What is the Graphic Card?
The video card is an important component of the computer and provides the monitor with an image.
GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
92
46 29.12.2018
How Does a Graphic Card Work? CPU Video Ram GPU
Ramdac Video Ram
Monitor
GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
93
1. CPU (Processor): The processor orders the Graphics Processing Unit (GPU).
2. GPU (Graphics Progress Unit): A graphics processor that executes commands on the display card. The goal is to lighten the CPU's load.
GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
94
47 29.12.2018
3. Video RAM: The graphics processor uses the memory on the Video Card as a memory when creating the image. The goal is to use the main memory only by the CPU and increase performance.
4. RAMDAC: The video enables the conversion of "0" and "1" from the memory, ie the digital system, to Analoga for the provision of the image.
GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
95
For fast-paced games, the computer has to go through this process about sixty times per second. Without a graphics card to perform the necessary calculations, the workload GÖKHAN SAMET ALBAYRAK would be too much for the computer to İSMAİL DEMİRCAN handle. MUSTAFA BATUHAN BAYOĞLU 96
48 29.12.2018
Nowadays used in video cards and features
GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
97
Gigabyte GeForce Aorus RTX 2080 Ti
GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
98
49 29.12.2018
General information • 1.NUMBER OF TRANSISTORS :18600 million • 2.THERMAL DESIGN POWER (TDP):250W • 3.IS DUAL-GPU: İNCLUDE Performance • PIXEL RATE: 149.2 Pixel/s • GPU MEMORY SPEED:1750 Mhz • FLOATING-POINT PERFORMANCE :14.75 TFLOPS • GPU CLOCK SPEED: 1350 Mhz • 6.SHADING UNITS :4352 GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
99
MEMORY • MAXIMUM MEMORY BAND WIDTH:616GB/S • MEMORY BUS WIDTH :352 BİT • EFFECTIVE MEMORY SPEED :14000MHz • RAM:11GB PORT • HAS A HDMI OUTPUT: YES • DISPLAYPORT OUTPUTS: 3 • HDMI PORTS: 3 • USB PORTS: 1 GÖKHAN SAMET ALBAYRAK • HAS USB TYPE-C: İNCLUDE İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
100
50 29.12.2018
Features
OPENGL VERSION: 4.5 DIRECTX VERSION: 12 OPENCL VERSION: 2 SUPPORTS 4K RESOLUTION: YES SUPPORTS MULTI-DISPLAY TECHNOLOGY: YES SUPPORTS 3D:YES
GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU
101
Thank you for listen to our presentation
102
51 29.12.2018
YAĞIZ CAN MERMERCİ 152120171047
AYDIN CESUR 152120171022
103
CODING LANGUAGES AND HISTORY
A programming language is a computer language engineered to create a standard form of commands. These commands can be interpreted into a code understood by a machine. Programs are created through programming languages to control the behavior and output of a machine through accurate algorithms, similar to the human communication process.
104
52 29.12.2018
Before 1940 In 1837, Charles Babbage, a British professor created a command set to multipurpose calculator. Although it is not widely used for political, economic and legal reasons, it is considered as the first programming language.
105
1940s “ENIAC Coding System” was developed in 1943 for Electronic Numerical Integrator and Computer (ENIAC) , one of the first electronic digital computers. 1943 - Plankalkül (Konrad Zuse) 1943 - ENIAC coding system 1949 - C-10
106
53 29.12.2018
1950s and 1960s These years have been the foundations of modern programming languages. • 1951 - Regional Assembly Language • 1952 - Autocode • 1954 - FORTRAN (FORmula TRANslator) • 1958 - LISP (LISt Processor) • 1958 - ALGOL (ALGOrithmic Language) • 1959 - COBOL (COmmon Business Oriented Language) • 1962 - APL (A Programming Language) • 1962 - Simula • 1964 - BASIC (Beginner's All-purpose Symbolic Instruction Code) • 1964 - PL/I (Programming Language One)
107
1970s • In these years, programming languages begin to diversify, and develop structured programming languages. • 1970 – PascaL • 1972 - C • 1972 - Smalltalk • 1972 - Prolog • 1973 - ML • 1978 – SQL
108
54 29.12.2018
PASCAL
• Most of the first Macintosh operating system, and TeX, was written with Pascal. • Computer scientist Niklaus Wirth developed Pascal in 1970 to make structured programming easier for compilers.
109
C
AT & T Bell is a B language-based structured programming language in order to develop the UNIX Operating System by Ken Thompson and Dennis Ritchie.
110
55 29.12.2018
Today, up to 95% of all operating systems (Microsoft Windows, GNU / Linux, * BSD, Minix) have been used. It is still quite common that more systems, driver software, operating system modules, and speeds are used wherever they need.
111
1980s The 1980s are the years when languages have been able to develop scalable applications for larger systems. These years were years of object-oriented programming. 1983 - Ada 1983 - C++ 1985 - Eiffel 1987 - Perl 1989 - FL (Function Level)
112
56 29.12.2018
1990s With the spread of the Internet, it was the years when the Java language was developed and expanded in a very serious way.
1990 - Haskell 1990 - Python 1991 - Java 1993 - Ruby 1995 - PHP 1995 - Delphi 2000 - C#
113
PYTHON Python is an object-oriented, interpretive, modular and interactive high- level programming language. The modular structure supports the class string (system) and any data field input. Can work on almost any platform. (Unix, Linux, Mac, Windows, Amiga, Symbian).
114
57 29.12.2018
JAVA
Java is an open-source, object-oriented, ground-independent, high- efficiency, multifunctional, high-level, step-by-step language that has been developed by James Gosling, a Sun Microsystems engineer.
115
Classification of Programming Languages
Programming languages are classed among themselves. Languages that are close to machine codes such as 1100101, which are the most difficult to learn and understand, are the lowest level programming languages.
116
58 29.12.2018
First Generation Programming Languages - Machine Languages • • ARM • • Intel 80x86 • • IBM 360 • • MIPS R2000|R3000 • • MOS Tech 6502 • • Motorola 680x • • Power Architecture - (POWER and PowerPC) • • StrongARM • • Sun SPARC, UltraSPARC
117
Second Generation Programming Languages - Assembly Languages • • ASEM-51 [1] • • BAL (Basic AssembLer) • • COMPASS (COMPrehensive ASSembler) • • Emu8086 • • FAP (FORTRAN Assembly Program) • • FASM (Flat Assembler; IA-32, IA-64) • • GAS (GNU Assembler) • • HLA (High Level Assembly)
118
59 29.12.2018
Third Generation Programming Languages • • Fortran • • ALGOL • • COBOL • • BASIC • • C • • C++ • • Delphi • • Java
119
Fourth Generation Programming Languages • • Informix-4GL • • Progress 4GL • • SQL • • Oracle Forms /Reports • • PostScript • • RPG-II • • Gauss • • ABAP • • Mathematica
120
60 29.12.2018
Fifth Generation Programming Languages
• Prolog • OPS5 • Mercury
121
CLASSIFICATION OF PROGRAMS BY USAGE AREA. • 1.In the field of Scientific and Engineering • 2.In Database Usage • 3.In System Programming • 4.General Purpose use • 5.In Artificial Intelligence Use
122
61 29.12.2018
REFENSECES • http://algoritma-programlama.blogspot.com/2013/11/programlama- dilleri.html • https://tr.wikipedia-on- ipfs.org/wiki/Pascal_yaz%C4%B1l%C4%B1mlama_dili.html • http://www.wikizeroo.net/index.php?q=aHR0cHM6Ly90ci53aWtpcGVka WEub3JnL3dpa2kvQ18ocHJvZ3JhbWxhbWFfZGlsaSk • https://www.chip.com.tr/blog/kadircamoglu/Gecmisten-Gunumuze- Programlama-Dilleri_1846.html
123
Virtual Reality and Augmented Reality VR/AR
Alperen Aygün - 152120171014 Yusuf Celil Alak - 152120181016
124
62 29.12.2018
- What is VR? (Virtual Reality) - Virtual Reality Types - History of Virtual Reality - Applications of VR Contents - What is AR? (Augmented Reality) - Augmented Reality Types - History of Augmented Reality - Applications of AR - References
125
Virtual Reality is the use of computer modeling and simulation through several What is VR technologies that simulate a user’s physical presence in a virtual or (Virtual Reality) ? imaginary environment.
126
63 29.12.2018
VR needs to be…
- Believable
What is VR - Interactive (Virtual Reality) ? - Explorable
- Immersive
127
Virtual Reality Types
1) Non- 2) Fully 3) Immersive Immersive Collaborative
128
64 29.12.2018
Non-Immersive:
The viewer becomes partly but not fully immersed in this environment. One of Virtual Reality the example is flight simulator. The viewers does not need to wear virtual Types reality gear such as a data glove or head mounted display (HMD) in this simulator and they are still aware of the real world outside of the virtual environment.
129
Fully Immersive:
This type should be plausible, and richly Virtual Reality detailed virtual world to explore for the best experience. Therefore, it comes Types with powerful computers which must be able to detect sounds, sight, and even the slightest movement.
130
65 29.12.2018
Collaborative:
Collaborative reality is usually in the form Virtual Reality of virtual reality games and they are not fully immersive. One can share Types an experience in a virtual world with other people.
131
1929 –The First Flight Simulator In 1929 Edward Link created the “Link trainer” (patented 1931) probably the first example of a commercial flight simulator, which was entirely electromechanical. History of Virtual Reality
Edward Link The Link Trainer
132
66 29.12.2018
1950s – Morton Heilig’s Sensorama:
In the mid 1950s cinematographer Morton Heilig developed the Sensorama (patented 1962) which was an arcade-style theatre cabinet that would stimulate all the senses, not just sight and sound. It featured stereo History of speakers, a stereoscopic 3D display, fans, Virtual Reality smell generators and a vibrating chair.
133
1968 – Sword of Damocles:
In 1968 Ivan Sutherland and his student Bob Sproull created the first VR / AR head mounted display (Sword of Damocles) that was connected to a computer and not a camera. The computer generated graphics History of were very primitive wireframe rooms and Virtual Reality objects.
134
67 29.12.2018
1987 – Virtual reality the name was born:
History of Jaron Lanier, founder of the visual programming lab (VPL), coined (or Virtual Reality according to some popularised) the term “virtual reality” in 1987.
135
1995 – Nintendo Virtual Boy:
The Nintendo Virtual Boy (originally known as VR-32) was a 3D gaming console that was hyped to be the first ever portable console that could display true 3D graphics but it was a commercial failure despite low price History of Virtual because it was unpractical. Reality
136
68 29.12.2018
Virtual reality in the 21st century:
Old gadgets were impractical, uncomfortable and too complex. They were quite expensive too. But History of in these days, technology Virtual Reality developed so much. For this reason, VR devices become smaller and more practical. Also they are cheaper.
137
Today’s Some VR Gadgets
- OCULUS RIFT History of - SONY – PLAYSTATION VR - HTC VIVE Virtual Reality - SAMSUNG GEAR VR - CONTROL VR - VIRTUIX OMNI
138
69 29.12.2018
- Healthcare/surgery - Military - Architecture Applications of - Entertainment VR - Education - Business - Rehabilitation/treatment of phobias
139
Augmented reality is the technology that expands our physical world, adding layers of digital information onto it. Unlike What is AR Virtual Reality (VR), AR does not create the whole artificial environments to (Augmented replace real with a virtual one. AR appears in direct view of an existing Reality) ? environment and adds sounds, videos, graphics to it.
140
70 29.12.2018
Cameras and sensors: Collecting data about user’s interactions and sending it for processing. Cameras on devices are scanning the surroundings and with this info, a device locates physical objects and generates 3D models. It may be How does special duty cameras. Processing: Augmented AR devices eventually should act like little computers, something modern smartphones Reality work? already do. In the same manner, they require a CPU, a GPU, flash memory, RAM, Bluetooth/WiFi, a GPS, etc. to be able to measure speed, angle, direction, orientation in space, and so on.
141
Projection: This refers to a miniature projector on AR headsets, which takes data from sensors and projects digital content (result of processing) onto a surface to view. In fact, the use of projections in AR has not been fully invented yet How does to use it in commercial products or services. Augmented Reflection: Some AR devices have mirrors to assist human Reality work? eyes to view virtual images. Some have an “array of small curved mirrors” and some have a double-sided mirror to reflect light to a camera and to a user’s eye. The goal of such reflection paths is to perform a proper image alignment.
142
71 29.12.2018
Marker Based Augmented Reality:
Marker-based augmented reality uses a camera and some type of visual marker, such as a QR/2D code, to produce a result only when the marker is sensed by a reader. The AR device calculates the position and orientation of a marker to position the content, in some cases. Thus, a marker initiates digital animations for users to Augmented view. Reality Types
143
Markerless Augmented Reality:
Markerless augmented reality (also called location-based or position- based) uses a GPS, digital compass, velocity meter, or Augmented accelerometer which is embedded in the device to provide data based Reality Types on your location. With the availability of smartphones this type of AR typically produces maps and directions, nearby businesses info.
144
72 29.12.2018
Projection Based Augmented Reality: Projecting synthetic light to physical surfaces, and in some cases allows to interact with it. It detects user interaction with a projection by its alterations. Augmented Reality Types
145
Superimposition Based Augmented Reality: Superimposition based augmented reality either partially or fully replaces the original view of an object with a newly augmented view of that same object. Object recognition plays a key role, without it the whole concept Augmented is simply impossible. Reality Types
146
73 29.12.2018
Myron Krueger created Videoplace – an artificial reality laboratory. The scientist envisioned the interaction with digital stuff by human movements. This concept later was used for certain projectors, video cameras, and onscreen silhouettes. -1975
History of AR Steve Mann developed a first portable computer called EyeTap, designed to be worn in front of the eye. -1980
Dan Reitan brought interactive AR system for broadcasters, AR is seen on TV for the first time. -1982
147
The term 'Augmented Reality' is attributed to Thomas P. Caudell, a former Boeing researcher. - 1990
Louis Rosenberg develops one of the first functioning AR systems, called Virtual Fixtures, at the U.S. Air Force Research Laboratory. -1992 History of AR A group of scientists led by Frank Delgado and Mike Abernathy tested new navigation software, which generated runways and streets data from a helicopter video. -1999
Japanese scientist Hirokazu Kato developed and published ARToolKit – an open-source software development kit. -2000
148
74 29.12.2018
Google announced an open beta test of its Google Glass augmented reality glass. -2013
Microsoft announced Windows History of AR Holographic and the HoloLens augmented reality head. -2015
Niantic launched Pokemon Go game for mobile devices. -2016
149
Augmented Reality Devices:
- Mobile devices
- Special AR devices
History of AR - AR glasses (or smart glasses)
- AR contact lenses (or smart lenses)
- Virtual retinal displays (VRD)
150
75 29.12.2018
- Education: interactive models for learning and training purposes, from mathematics to chemistry.
Applications of - Medicine/healthcare: to help diagnose, monitor, train, localize, AR etc.
- Military: for advanced navigation, marking objects in real time.
151
- Art / installations / visual arts / music
- Tourism: data on destinations, sightseeing objects, navigation, and directions. Applications of - Broadcasting: enhancing live events AR and event streaming by overlaying content.
- Industrial design: to visualize, calculate or model.
152
76 29.12.2018
Which of this is not a real VR headset? a) HTC Vive Question b) Samsung Gear VR c) Sony Playstation VR d) Xbox VR
153
What is A.R. ? a) Artificial Reality Question b) Augmented Reality c) Attractive Reality d) Active Reality
154
77 29.12.2018
https://www.explainthatstuff.com/vir tualreality.html
https://www.britannica.com/technol ogy/virtual-reality
https://www.ispringsolutions.com/bl og/vr-made-easy-create-virtual- References reality-without-breaking-the-bank/
https://www.vrs.org.uk/
http://www.teknolo.com/sanal- gerceklik-nedir/
155
http://www.sweethaven02.com/P DF_Lifelong/Augmented%20reality. pdf
https://thinkmobiles.com/blog/wh References at-is-augmented-reality/
https://www.realitytechnologies.co m/augmented-reality/
156
78 29.12.2018
Aybala Yaren TAĞ Oğuzhan OKUR Erkut KAYA 152120171010 152120171015 152120171040
157
Cybercrime is a bigger threat than ever before, now that more and more people are connected to the Internet via laptops, smartphones and tablets, and is one of the most profitable ways to make money in the criminal world.
158
79 29.12.2018
A cybercriminal may use a device to access a user’s personal information, confidential business information, government information, or disable a device.
159
160
80 29.12.2018
This kind of cybercrime involves online harassment where the user is subjected to a plethora of online messages and emails. Typically cyberstalkers use social media, websites and search engines to intimidate a user and instill fear. Usually, the cyberstalker knows their victim and makes the person feel afraid or concerned for their safety.
161
This cybercrime occurs when a criminal gains access to a user’s personal information to steal funds, access confidential information, or participate in tax or health insurance fraud. They can also open a phone/internet account in your name, use your name to plan a criminal activity and claim government benefits in your name. They may do this by finding out user’s passwords through hacking, retrieving personal information from social media, or sending phishing emails.
162
81 29.12.2018
Social engineering involves criminals making direct contact with you usually by phone or email. They want to gain your confidence and usually pose as a customer service agent so you’ll give the necessary information needed. This is typically a password, the company you work for, or bank information. Cybercriminals will find out what they can about you on the internet and then attempt to add you as a friend on social accounts. Once they gain access to an account, they can sell your information or secure accounts in your name
163
These are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources. Large networks of infected devices known as Botnets are created by depositing malware on users’ computers. The hacker then hacks into the system once the network is down.
164
82 29.12.2018
Botnets are networks from compromised computers that are controlled externally by remote hackers. The remote hackers then send spam or attack other computers through these botnets. Botnets can also be used to act as malware and perform malicious tasks.
165
PUPS or Potentially Unwanted Programs are less threatening than other cybercrimes, but are a type of malware. They uninstall necessary software in your system including search engines and pre- downloaded apps. They can include spyware or adware, so it’s a good idea to install an antivirus software to avoid the malicious download.
166
83 29.12.2018
This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer. Cybercriminals are becoming more established and many of these emails are not flagged as spam. Users are tricked into emails claiming they need to change their password or update their billing information, giving criminals access.
167
This cybercrime involves criminals sharing and distributing inappropriate content that can be considered highly distressing and offensive. Offensive content can include, but is not limited to, sexual activity between adults, videos with intense violent and videos of criminal activity. Illegal content includes materials advocating terrorism-related acts and child exploitation material. This type of content exists both on the everyday internet and on the dark web, an anonymous network.
168
84 29.12.2018
These are usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic amounts of money. Online scams include enticing offers that are “too good to be true” and when clicked on can cause malware to interfere and compromise information.
169
Don’t download anything from unknown sources Don’t click on links embedded in emails from people you don’t know Don’t ever give out your password or personal data Ensure websites are safe before entering credentials. Keep antivirus/application systems up to date. Use strong passwords with 14+ characters.
170
85 29.12.2018
People who commit these crimes are punished with money or imprisonment.
171
172
86 29.12.2018
A seminal figure in American hacking. In 1981, he was charged with stealing computer manuals from Pacific Bell. In 1982 he hacked the North American Defense Command (NORAD), which inspired the 1983 film "War Games." In 1989, he hacked Digital Equipment Corporation's (DEC) network and made copies of their software
173
He eventually became active on criminal commerce site Shadowcrew.com and was considered one of its best hackers and moderators. At 22, Gonzalez was arrested in New York for debit card fraud related to stealing data from millions of card accounts.
174
87 29.12.2018
Using the alias comrade, Jonathan James hacked into several companies. But according to the New York Times,what really earned him attention was his hack into the computers of the United States Department of Defense. What was all the more startling was that James was only 15 at the time.
175
176
88 29.12.2018
https://www.erdemakcay.av.tr/siber-suc-nedir/
https://wmaraci.com/nedir/siber-suc
https://www.bilgitor.com/bilisim-suclari-nedir-siber-suclar-ve-yasal-onlemler/
https://en.wikipedia.org/wiki/Cybercrime
https://tr.wikipedia.org/wiki/Bili%C5%9Fim_su%C3%A7lar%C4%B1
https://www.pandasecurity.com/mediacenter/panda-security/types-of-cybercrime
https://usa.kaspersky.com/resource-center/threats/top-ten-greatest-hackers
Video https://www.youtube.com/watch?v=dRKMlG0KTkY
177
COMPUTER GRAPHICS
MAHMUT KILIÇ RENAT AGHASIYEV
178
89 29.12.2018
GRAPHIC & VISUALIZE
Graphic: • A graphic is an image or visual representation of an object.
Visualize: To form a picture of someone or something in your mind, in order to imagine or remember him, her, or it.
179
GRAPHS
In 2017, dolphins’ population is higher than whales and bears. Then, dolphins population will decrease.At the same time, bears rise up like a mountain but whales’ steps will be useless. …..
180
90 29.12.2018
FLOWCHART
Periodic Table
181
COMPUTER GRAPHICS
• Computer graphics is an art of drawing pictures on computer screens with the help of programming. • It involves computations, creation, and manipulation of data.
182
91 29.12.2018
A FEW USES OF COMPUTER GRAPHICS
• User Interfaces • Interactive plotting in business,science and technology • Cartography • Computer-aided drafting and design • Simulation • Entertainment
183
GUI-GRAPHICAL USER INTERFACE CLI-COMMAND-LINE INTERFACE
• GUI is an interface that uses icons or other visual indicators to interact with electronic devices, rather than only text via a command line. • CLI is a user interface that is navigated by typing commands at prompts, instead of using the mouse.
184
92 29.12.2018
COMPUTER-AIDED DESIGN
• CAD, is the 2D or 3D modeling of physical structures and material properties, using specialized software on a computer.
185
CARTOGRAPHY
• Cartography is the study and practice of making maps.
186
93 29.12.2018
SIMULATION
• Simulation is an imitation of the operation of a real-world process or system.
187
ENTARTAINMENT & ART
188
94 29.12.2018
CRT-LCD
• There are two primary types of computer monitors in use today: LCD monitors and CRT monitors.
SIZE LCD WEIGHT LCD POWER LCD DEAD PIXELS CRT PRICE CRT
189
PIXEL/VECTORIAL DEPT OF COLOUR SOLUBILITY CONCEPTS COMPUTER IMAGE FORMAT & AREAS OF USE
190
95 29.12.2018
PIXEL
191
VECTORIAL
192
96 29.12.2018
BITMAP
193
PICTURE COMPRESSION
194
97 29.12.2018
RASTER
195
LAYER
196
98 29.12.2018
IMAGE FORMAT
197
QUESTION-1
1. CRT’s are cheaper than LCD’s 2. AutoCAD works only in 3D 3. GUI is faster than CLI Which of these are true? a. Only 2 b. 1-3 c. 1-2 d. 1,2 and 3
198
99 29.12.2018
QUESTION-2
What is Cartography?
a. Cartography is the study and practice of making maps. b. Cartography is the study and practice of coloring pixels. c. Cartography is the study and practice of creating simulations. d. Cartography is the study and practice of drawing graphs.
199
QUESTION-3
• Which graphic type has the same quality when they grow and shrink? a. BITMAP b. PNG c. PSD d. VECTORIAL e. TIFF
200
100 29.12.2018
QUESTION-4
Which file compresssion is safer? a. FLIF b. LZW c. DICM d. FPIX
201
REFERENCES
• https://www.computerhope.com/jargon/c/cad.htm • https://www.tutorialspoint.com/computer_graphics/ • https://www.explainthatstuff.com/computer-graphics.html • https://www.geeksforgeeks.org/vector-vs-raster-graphics/ SOURCES • James D. Foley, Andries van Dam, Steven K. Feiner, John F. Hughes, Richard L. Phillips(1993) - Introduction to Computer Graphics-(Addison-Wesley Professional), 10-1
202
101 29.12.2018
Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078
203
Cryptography 1.Introduction to cryptography • Cipher • Encryption & Decryption • Permutation Ciphers and Substitution Ciphers • CAESAR’s Cipher
2.Enigma Machine 3.Modern Cryptography
Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018
204
102 29.12.2018
1. Introduction to Cryptography
➢ CRYPTO +GRAPHY= secret writing (derived from the Greek)
➢ Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.
➢ The origin of cryptography is dated from about 2000 B.C.
➢ Cryptography was used for hiding different secrets during its history, controlled by governments, applied in wars, in diplomacy and used for espionage.
Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018
205
➢ CIPHER – is an algorithm that converts plain text into CIPHERTEXT, which is a gibberish unless you have a key to undo the Cipher.
➢ ENCRYPTION & DECRYPTION The process of making the text secret is called Encryption, and the reverse process is called Decryption.
➢ PERMUTATION CIPHERS The fundamental class of cipher techniques are Permutation ciphers, and here we have an example called columnar transposition cipher.
Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018
206
103 29.12.2018
➢ SUBSTITUTION CIPHERS
• Substitution cipher is another class of techniques and works out such as shifting letters in alphabet for a given number, and the best example is the Caesar’s cipher.
• A big disadvantage of basic substitution ciphers is that the letter frequencies are preserved. • For example, E is the most common letter in English, so if your cipher translates E to H, then H will come up the most frequently in the cipher text so we can easy notice that the alphabet is shifted three places forward.
Dinara JUMAYEVA 152120171074 29/12/2018 Nora ISENI 152120171078
207
The Julius CAESAR cipher
The Caesar cipher, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.
Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018
208
104 29.12.2018
The Julius Caesar’s cipher
Every letter in the alphabet is shifted for 3 places. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on.
Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018
209
The Enigma Machine
By the 1900s, cryptography was mechanized in the form of encryption machines. The most famous was the German Enigma, used by the Nazis to encrypt their war-time communications. The Enigma machines are a series of electro-mechanical rotor cipher machines, it’s type writer- like machine, with a keyboard and lamp board, both showing the full alphabet.
Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018
210
105 29.12.2018
Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018
211
Here is given one rotor of Enigma machine, where we can see how it works.
These are 3 rotors of enigma machine, each of them could be rotated into 26 different starting positions. Reflector connected every pin to another. Plugboard which swapped every coming letter to another and adding another level of complexity.
29/12/2018 Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078
212
106 29.12.2018
Alan Turing (1912-1954)
Alan Turing designed a machine called “The Bomb” to smash the German Enigma code. The Bomb machine was designed to perform a sweep of the milliard ways in which the enigma machine could have been set up. His machine could crack the enigma machine’s code in 15 minutes.
Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018
213
3. Modern Cryptography
• Modern cryptography is based heavily on mathematics. • The math is hard.
There are three types of cryptography which are used to build the Modern Cryptography: 1. Secret Key Cryptography (Symmetric) 2. Public Key Cryptography (Asymmetric) 3. Message Digest (Hashing)
Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018
214
107 29.12.2018
Resources
• http://www.wikizeroo.net/index.php?q=aHR0cHM6Ly9lbi53aWtpcGVkaWEub3JnL3dpa2kvQ3J5cHRvZ3JhcGh5 • http://www.wikizeroo.net/index.php?q=aHR0cHM6Ly9lbi53aWtpcGVkaWEub3JnL3dpa2kvQWxhbl9UdXJpbmc • https://www.youtube.com/watch?v=ASfAPOiq_eQ&t=84s
Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018
215
Thanks for listening!
216
108
• Which company is provides funds for Kali Linux ? a)Offensive Security b)Cyber Security c)Defensive Security d)Private Security
Answer: (A) • Who is the creator of Kali Linux ? a)Steve Jobs b)Bill Gates c)Elon Musk d)Linus Torvalds
Answer: (D) Kaynakça: • https://alisahinkaya.com/linux/kali‐linux‐nedir‐kali‐linux‐kullanimi/ • https://alisahinkaya.com/linux/linux‐nedir‐linux‐ne‐ise‐yarar‐linux‐indir/ • http://www.getgnu.org/gnulinux/gnulinux‐ipuclari/gnu‐nedir.html • https://www.karel.com.tr/blog/ozgur‐yazilim • https://tr.wikipedia.org/wiki/Kali_Linux 12/31/2018
Machine Learning Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104)
1
What is Machine Learning?
• Machine learning is a way of pushing a large amount of data into a system and getting out a model that you can then apply to more data. • It is , the tool and technology that you can utilize to answer question with your data. • Early definition of machine learning by Arthur Samuel: "Field of study that gives computers the ability to learn without being explicitly programmed."(1959)
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 2
2
1 12/31/2018
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 3
3
How does it work?
In a machine learning approach, the idea is that to give the computer output and examples of what I want the program to do. And the machine learning algortihm actually proudeces a program.
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 4
4
2 12/31/2018
Usages of Machine Learning
Assisted Driving Face Detection Voice Assistants
Search Engines Character Recognotion Recommendation Systems
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 5
5
Google search result of java, if the person is interested in coffee.
Google search result of java, if the person is interested in programming.
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 6
6
3 12/31/2018
Recommendation Systems Cancer Diagnosis
Neural Color Transfer Between Images
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 7
7
Why is Machine Learning Important?
It can solve complicated real-world tasks in a scalable way We have always had problems that we’ve either solved badly or had to have a human personally do, that are now becoming solvable via machine learning.
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 8
8
4 12/31/2018
How are things learned?
• Memorization: o Accumaltion of inividual facts Declarative Knowledge o Limited by time and memory
• Generalization o Make new facts from old facts Imperative Knowledge o Limited by accuracy of deduction process It can also extend to programs that can infer useful information From implicit patterns in data
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 9
9
How are things learned?
By observing set of examples (training data). Infer something about to process that generated that data. Make predictions to unseen data (test data). Variations on paradigm: Supervised: Given a set of feature/label pairs, find a rule that predicts the label associated with a previously unseen input. Unsupervised: Given a set of feature vectors without labels group them into natural clusters.
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 10
10
5 12/31/2018
An Example
Name Egg-laying Scales Poisonous Cold- Number of Reptile blooded legs Rattlesnake True True True True 0 YES
Inıtıal Model: 1. Egg laying 2. Is poisonus 3. Has Scales 4. Cold Blooded 5. No legs
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 11
11
Name Egg-laying Scales Poisonous Cold- Number of Reptile blooded legs Rattlesnake True True True True 0 YES Anaconda False True False True 0 YES
Current model: 1. Has scales The model needs a change 2. Cold blooded because anaconda is labeled as a 3. No legs non-reptile in previous model.
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 12
12
6 12/31/2018
Name Egg-laying Scales Poisonous Cold- Number of Reptile blooded legs Rattlesnake True True True True 0 YES Anaconda False True False True 0 YES Chicken True True False False 2 NO
Current model: 1. Has scales 2. Cold blooded 3. No legs
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 13
13
Name Egg-laying Scales Poisonous Cold- Number of Reptile blooded legs Rattlesnake True True True True 0 YES Anaconda False True False True 0 YES Chicken True True False False 2 NO Alligator True True False True 4 YES
Current model: As reptiles can have legs the 1. Has scales model needs a change. 2. Cold Blooded
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 14
14
7 12/31/2018
Name Egg-laying Scales Poisonous Cold- Number of Reptile blooded legs Rattlesnake True True True True 0 YES Anaconda False True False True 0 YES Chicken True True False False 2 NO Alligator True True False True 4 YES Sheep False False False False 4 NO Dart Frog True False True False 4 NO Swordfish True True False True 0 NO Python False True False True 0 YES
Good model: While not perfect, this model labels all reptiles to 1. Has scales reptiles, but for many problems there is no perfect 2. Cold Blooded way to seperate data.
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 15
15
How to make this model better?
• We need to measeure distances between features. • We need to decide which features to add or remove. • We can convert examples to 5 feature vectors: Rattlesnake = [1,1,1,1,0] Dart frog = [1,0,1,0,4] Anaconda = [0,1,0,1,0] Alligator = [1,1,0,1,4]
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 16
16
8 12/31/2018
Euclidian vs Manhattan Distance
Minkowski Metric
For Euclidian Distance: Distance to + is 2.8 Distance to * is 3
For Manhattan Distance: Distance to + is 4 Distance to * is 3
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 17
17
• With Eucladian distance:
Rattlesnake Anaconda Dart Frog Alligator Rattlesnake ------1.414 4.243 4.123 Anaconda 1.414 ------4.472 4.123 Dart Frog 4.243 4.472 ------1.732 Alligator 4.123 4.123 1.732 ------
• Alligator should be closer to snakes than dart frog because alligator and snakes are both reptiles.
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 18
18
9 12/31/2018
With Manhattan Distance:
Rattlesnake Anaconda Dart Frog Alligator Rattlesnake ------1.414 1.732 1.414 Anaconda 1.414 ------2.236 1.414 Dart Frog 1.732 2.236 ------1.732 Alligator 1.414 1.414 1.732 ------
Rattlesnake = [1,1,1,1,0] Anaconda = [0,1,0,1,0] Dart frog = [1,0,1,0,4] Alligator = [1,1,0,1,4]
It makes more sense and it is a nicer model this way.
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 19
19
References
• https://towardsdatascience.com/what-is-machine-learning-8c6871016736 • https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-0002- introduction-to-computational-thinking-and-data-science-fall-2016/ • Google Developers-Machine Learning recipes • Jing Liao, Yuan Yao, Lu Yuan, Gang Hua, and Sing Bing Kang. Visual attribute transfer through deep image analogy. arXiv preprint arXiv:1705.01088, 2017. • Fujun Luan, Sylvain Paris, Eli Shechtman, and Kavita Bala. Deep photo style transfer. arXiv preprint arXiv:1703.07511, 2017.
Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 20
20
10 12/31/2018
COMPUTER GRAPHICS
MAHMUT KILIÇ RENAT AGHASIYEV
21
GRAPHIC & VISUALIZE
Graphic: • A graphic is an image or visual representation of an object.
Visualize: To form a picture of someone or something in your mind, in order to imagine or remember him, her, or it.
22
11 12/31/2018
GRAPHS
In 2017, dolphins’ population is higher than whales and bears. Then, dolphins population will decrease.At the same time, bears rise up like a mountain but whales’ steps will be useless. …..
23
FLOWCHART
Periodic Table
24
12 12/31/2018
COMPUTER GRAPHICS
• Computer graphics is an art of drawing pictures on computer screens with the help of programming. • It involves computations, creation, and manipulation of data.
25
A FEW USES OF COMPUTER GRAPHICS
• User Interfaces • Interactive plotting in business,science and technology • Cartography • Computer-aided drafting and design • Simulation • Entertainment
26
13 12/31/2018
GUI-GRAPHICAL USER INTERFACE CLI-COMMAND-LINE INTERFACE
• GUI is an interface that uses icons or other visual indicators to interact with electronic devices, rather than only text via a command line. • CLI is a user interface that is navigated by typing commands at prompts, instead of using the mouse.
27
COMPUTER-AIDED DESIGN
• CAD, is the 2D or 3D modeling of physical structures and material properties, using specialized software on a computer.
28
14 12/31/2018
CARTOGRAPHY
• Cartography is the study and practice of making maps.
29
SIMULATION
• Simulation is an imitation of the operation of a real-world process or system.
30
15 12/31/2018
ENTARTAINMENT & ART
31
CRT-LCD
• There are two primary types of computer monitors in use today: LCD monitors and CRT monitors.
SIZE LCD WEIGHT LCD POWER LCD DEAD PIXELS CRT PRICE CRT
32
16 12/31/2018
PIXEL/VECTORIAL DEPT OF COLOUR SOLUBILITY CONCEPTS COMPUTER IMAGE FORMAT & AREAS OF USE
33
PIXEL
34
17 12/31/2018
VECTORIAL
35
BITMAP
36
18 12/31/2018
PICTURE COMPRESSION
37
RASTER
38
19 12/31/2018
LAYER
39
IMAGE FORMAT
40
20 12/31/2018
QUESTION-1
1. CRT’s are cheaper than LCD’s 2. AutoCAD works only in 3D 3. GUI is faster than CLI Which of these are true? a. Only 2 b. 1-3 c. 1-2 d. 1,2 and 3
41
QUESTION-2
What is Cartography?
a. Cartography is the study and practice of making maps. b. Cartography is the study and practice of coloring pixels. c. Cartography is the study and practice of creating simulations. d. Cartography is the study and practice of drawing graphs.
42
21 12/31/2018
QUESTION-3
• Which graphic type has the same quality when they grow and shrink? a. BITMAP b. PNG c. PSD d. VECTORIAL e. TIFF
43
QUESTION-4
Which file compresssion is safer? a. FLIF b. LZW c. DICM d. FPIX
44
22 12/31/2018
REFERENCES
• https://www.computerhope.com/jargon/c/cad.htm • https://www.tutorialspoint.com/computer_graphics/ • https://www.explainthatstuff.com/computer-graphics.html • https://www.geeksforgeeks.org/vector-vs-raster-graphics/ SOURCES • James D. Foley, Andries van Dam, Steven K. Feiner, John F. Hughes, Richard L. Phillips(1993) - Introduction to Computer Graphics-(Addison-Wesley Professional), 10-1
45
ARTIFICAL INTELLIGENCE IN DEFENCE INDUSTRY
46
23 12/31/2018
CONTENTS
- What is artificial intelligence? - Goals of AI - Applications of AI - Role of AI in Military - Military Applications of AI - Advantages of AI
47
What is Artificial Intelligence
According to the father of Artificial Intelligence,John McCharty, It is ‘’The science and engineering of making intelligent machines , especially intelligent computer programs’’.
48
24 12/31/2018
Artificial intelligence is a branch of science which deals with helping machines find solutions to complex problems in a more human like fashion.
Artificial intelligence is generally associated with computer science, but it has many important links with other field such as maths, psychology, cognition, biology and philosophy, among many others.
49
50
25 12/31/2018
Goals of AI
To create Expert Systems
To implement Human Intelligence in Machines
51
Applications of AI
-> Robotics
-> Expert System
-> Natural language process
-> Neural network
-> Fuzzy logic
52
26 12/31/2018
Role of AI in Military
- The future of military may be focused on AI, that could improve cyber security, precision weaponry and other military functions.
- AI could be used in training systems. For example, it could provide unpredictable and adaptive adversaries for training fighter pilots.
- Computer vision, the ability of software to understand photos and videos.
53
- Neuro Linguistic Programming, used by systems such as Amazon’s Alexa, enables systems to interact with humans using natural language.
- NLP could enable systems to take orders without using keyboards.
- NLP also can translate documents and could serve as a translator in the future.
- Some applications of artificial intelligence are provided.
54
27 12/31/2018
Military Applications of AI
55
Unmanned underwater vehicle (UUV)
- An UUV, sometimes known as underwater drones, are any vehicles that are able to operate underwater without a human occupant.
- These vehicles may be divided into two categories.
- Remotely operated underwater (ROVs), which are controlled by a remote human operator.
- Autonomous underwater vehicles (AUVs),which operate independently of direct human input.
56
28 12/31/2018
UUV
57
Unmanned aerial vehicle(uav)
- An UAV also known as Drone, is an aircraft without a human pilot.
- Drone stands for Dynamic Remotely Operated Navigation Equipment.
- Controlled autonomously by computers or under the remote control of pilot on the ground.
58
29 12/31/2018
Unmanned Ground Vehicle
- An UGV, is a vehicle that operates while in contact with the ground and without an onboard human presence.
- UGVs can be used for many applications where it may be inconvenient, dangerous, or impossible to have a human operator present.
- Have a set of sensors to observe the environment.
59
Military Robots
- Autonomous robots or remote- controlled mobile robots
- Designed for military applications, from transport to search & rescue and attack.
- This military robots include robotic soldiers used in place of a human
60
30 12/31/2018
61
Advantages of artificial intelligence
- It can help to improve our way of life.
- Mental alertness and decision making capabilities.
- Use robots for heavy construction, military benefits, or even for personal assistance at private homes.
62
31 12/31/2018
- There will be less injuries and stress to human beings.
- Many of our health problems now having possible solutions with the use of artificial intelligence.
63
References
1. https://www.heryerdeyazilim.com/yapay-zeka-ve-savunma-sanayi/ 2. https://www.mediaclick.com.tr/blog/yapay-zeka-nedir 3. https://www.webtekno.com/bilim-haberleri/yapay-zeka-robot- asker-h6025.html 4. https://tr.wikipedia.org/wiki/Yapay_zek%C3%A2 5. https://ab.org.tr/ab14/bildiri/75.pdf
64
32 12/31/2018
ÖZKAN ARSLAN
Umut BİRİNCİ
İsmail KILIÇ
65
33