29.12.2018

1

2

1 29.12.2018

3

4

2 29.12.2018

5

6

3 29.12.2018

7

8

4 29.12.2018

9

10

5 29.12.2018

11

12

6 29.12.2018

13

14

7 29.12.2018

QUANTUM COMPUTER

15

QUANTUM COMPUTING

 WHAT IS QUANTUM

 BRANCHES OF QUANTUM AND A BRIEF EXPLANATION OF THE BRANCHES

 HISTORY OF QUANTUM COMPUTERS

 WHAT IS A QUANTUM COMPUTER

 SUPERPOSITION

 QUANTUM ENTANGLEMENT

 THE DIFFERENCES BETWEEN Q. COMPUTERS AND HOME COMPUTERSs

 ADVANTEGES AND DISADVANTEGES OF QUANTUM COMPUTING

16

8 29.12.2018

WHAT IS QUANTUM

 Quantum (plural: quanta) is the Latin word for amount. In our current era it is also called the smallest discrete unit of any physical property. For example, matter, photons and etc..

 Quanta was first theorized by Max Planck. He was born in Kiel, Germany. Whilst he was very successful as a student and was a very talented musician, he devoted his life to physics. Planck's constant is used to calculate the energy of quanta.

17

BRANCHES OF QUANTUM

 QUANTUM MECHANICS Quantum mechanics is the science of studying matter and atoms and their behaviour.

 QUANTUM CRYPTOGRAPHY Quantum cryptography is the science of using quantum mechanical properties to perform cryptography.

 QUANTUM GEOMETRY In theoretical physics, quantum geometry is used to describe physical phenomena at very large scales. At this distance quantum mechanics has mysterious effects on physical phenomenon.

18

9 29.12.2018

HISTORY OF QUANTUM COMPUTERS

 Usage of quanta calculations in computers rose up in late 80’s by Yuri Manin and Richard Faynman.

 David deutsch, introduced quantum computers working mechanism as a chain that can calculate. Acording to his shematics, first qubits are used to take the perimeters. After, using its logical operations, converts the data in a manner that it can understand. Qubits are used for transfer.

 To this point scientist around the world have been working hard on creating a quantum computer. Although there have been many studies done on this subject its imporvements are not supassing quantum theories.

19

THE DIFFERENCES BETWEEN Q. COMPUTERS AND HOME COMPUTERS

 The main difference between these two computers is that, while current computers act on only 0 or 1 (both are called BIT) and eight of them aranged give us 1 byte quantum computers have the thing called Qubits. Similar to normal computers qubits consist of 1s and 0s. However, qubits can also be either between 0 and 1 (0.2, 0.7 e.c.), they can also be both at the same time. Also more the quanta inside the computer the quicker it will solve a problem.

20

10 29.12.2018

Quantum computer algorithym Clasical computer algorithym Diagram. Diagram.

21

WHAT IS A QUANTUM COMPUTER

 Quantum computer in its most basic form is the ability to use matter at an atomic scale such as photons to process and get a solution to a very difficult problem. However, as stated before, currently the only thing that quantum computers can be used for is to calculate troublesome equations.  The idea of quantum computing is to be able to do things quickly and more precise than our current era computers. Quantum computers’ work mechanism can also be described as light. In some instances light behaves like an actual particle and other cases have shown that light can also behave like waves. This is called the wave-particle duality, which also has a different name called superposition. Quantum particles also behave according to quantum entanglement.

22

11 29.12.2018

SUPERPOSITION

 Superposition is the state where a particle is in two different states at the same time. One notible example is the Schörinders’ cat. Briefly summirised, a cat is placed inside a closed box. İnside the box there is a machine that has a chance to break the glass which has radioactive matter inside it. After an hour there are two possibilities. One of them, the cat is alive, the other one being, the cat is dead. Before opening the box the cat is considered dead and alive,since we can’t actaully see it. Once the boxes is opened the superposition is broken and we see if the cat is dead or alive.

23

QUANTUM ENTANGLEMENT

 Entaglement is the connection between quantum particles. The connection of quantum particles are so powerful that no matter the distance their bond will not break. İf either one shall change than the other shall too. This strange behaviour has been called quantum entanglement by Albert Einstein himself.

24

12 29.12.2018

ADVANTAGES AND DISADVANTAGES OF QUANTUM COMPUTING

 ADVANTAGES 1. Quantum computing is faster to solve problems. 2. There are many ways that it could be used if improved (health, industry, architecture and many more.) 3. It uses way less energy than that of our current computers. 4. In theory quantum computers can perform any task that a classical computer can do.

25

ADVANTAGES AND DISADVANTAGES OF QUANTUM COMPUTING

 DISADVANTAGES 1. With current technology a perfect one can't be built. 2. It is not certain if quantum computing can be used in anything other than mathematical problems. 3. Currently normal computers exceed quantum computer's limitations and there may not be any need for quantum computers in the near future. 4. A small change in the environment even the change of light can ruin the algorithyms it wants to follow. 5. It requires new algorithym system to work, otherwise it would work just like a classical computer does.

26

13 29.12.2018

27

REFERENCES

 whatis.techtarget.com/definition/quantum  www.factmonster.com/dk/encyclopedia/science-and- technology/quantum-theory www.google.com (Google's definition of computer and all of the images)  www.computerhope.com/issues/ch001263.htm  www.explainthatstuff.com/quantum-computing.html  www.Quora.com/What-are-the-advantages-and-disadvantages-of- quantum-computin g Thanks to IBM for sharing the picture of how quantum computers work!  https://www.youtube.com/watch?v=2B680d-qvhI

28

14 29.12.2018

PRESENTATION BY

YAVUZ UÇARKUŞ 152120171006 ERSAN TZAMPAZ CHATİP 152120181094

29

ORIGIN & EVOLUTION OF THE INTERNET

MEHMET FATİH GEYLAN 152120171024 YUNUS EMRE KILIÇ 152120171012 İNTRODUCTİON TO COMPUTER ENGİNEERİNG PROJECT

30

15 29.12.2018

 Origin of the internet  Packet Switching Theory  ARPANET & IMP  TCP/IP  WWW Protocol  Recent History

31

 Leonard Kleinrock made the first description of the internet by his paper named ‘Information Flow In Large Communication Nets’.

32

16 29.12.2018

 In 1962 J.C.R Licklider discussed his ‘Galactic Network’ concept in MIT.

33

 Leonard Kleinrock at MIT published the first paper on packet switching theory in July 1961 and the first book on the subject in 1964.  In 1965 working with Thomas Merrill, Lawrence G. Roberts connected the TX-2 computer in Mass. to the Q-32 in California with a low speed dial-up telephone line creating the first (however small) wide-area computer network ever built.

34

17 29.12.2018

 In the summer of 1968 Network Working Group had their first meeting under Elmer Shapiro’s leadership.  In December 1968 Stanford Research Institute (SRI) and Elmer Shapiro developed the Interface Message Processor (IMP) and sent it to California University.

35

 In October 29 of 1969, the first internet message is sent from California University to SRI with IMP using by Leonard Kleinrock.

 The message was ‘LOGIN’ but system had crashed and only the first 2 letter delivered successfully. That was the first internet error.

36

18 29.12.2018

37

 In late seventies, Vinton Cerf developed the TCP/IP protocol (Transmission Control Protocol / Internet Protocol).

 He used the term ‘Internet’ for the first time in history.

38

19 29.12.2018

 The first domain name is taken by Symbolics Corporation symbolics.com  Today, there are 150.000.000 web sites that have domain name.

39

 In July 1990 ARPANET has completely shut down.  In 1991 Berners-Lee developed the WWW protocol.  Lee developed HTML for the WEB.

40

20 29.12.2018

 In 1993 Web has presented to public.  In the same year first graphical interfaced web browser ‘Mosaic’ had developed.

41

 In 10 March 2000 dot.com bubble failed.  In 2004 a group of computer sciencists developed Web 2.0 and it allowed the creation of social network. (Facebook, Twitter, Youtube, etc.)  Today, there are 4.02 billion users in global.

42

21 29.12.2018

 internetsociety.org

 beybut.com

 webtekno.com

 aktuelbilgiler.com

 dijilopedi.com

 bilgisayarkurtu.com

 armadigital.net

 turkcebilgiler.net

 internetarsivi.metu.edu.tr

 circlelove.co

 teknokoliker.com

 nurnetwork.com

43

 Who made the first description of the internet?

 A)Vinton Cerf

 B)Berners-Lee

 C)Leonard Kleinrock

 D)J.C.R Licklider

 D)Elmer Shapiro

44

22 29.12.2018

 What is the first graphical interfaced web browser?

 A)Internet Explorer

 B)Mosaic

 C)Yahoo

 D)Google

 E)Mozilla Firefox

45

 What was the first message sent on the internet?

 A)HELLO WORLD

 B)HI

 C)INPUT

 D)LOGIN

 E)I LOVE YOU

46

23 29.12.2018

CLOUD COMPUTING YİĞİT AKKAŞ - 152120171042

.

47

What’s Cloud Computing ?

❑ Cloud computing is a service that makes us able to reach all the data,program and application that we reserve on internet at anywhere with our device that is connected to internet.

48

24 29.12.2018

How it Got Into Our Lives

 Amazon played a key role by modernizing data centers and making the first real cloud computing service “Amazon S3” come into service in 2006.

 It’s been widely used in world since the year 2008.

49

Why Do We Need it?

 By making software,hardware and data hosting services gather together,it becomes a solution partner for companies.

 Customers and employees can reach datas at the same time and it makes the operation goes much faster.

50

25 29.12.2018

What Are Its Advantages

 Makes the users’ life easier and saves them from lack of hardware

 Lowers the cost.

 Annihilates the chaos of substructure

 Protects the data.

51

What Are Its Advantages

 Makes you able to reach the information from any platform anytime.

 Widens the working area

52

26 29.12.2018

What Are Its Advantages

 Because the companies that services cloud computing take security measures and protects the servers that the datas are being hold,it is safer than host computer.

 Shortly,cloud computing is a service that supports you to work everywhere for cheaper and without any setup.

53

What Are Its Disadvantages

 Because it is used by a lot of users,by result of any attack to it might cause takeover of special and private datas of users.

 To reach the data that is stored,you’ll need internet connection. Also if you have a bad connection with low speed,your downloading and uploading will be slow.

54

27 29.12.2018

What Are Its Disadvantages

 In case of a service shedding on a cloud computing service provider,all the companies that use this service will effect badly from that and until it ends,the company won’t be able to serve for their clients.

55

Types of Cloud

There are 4 types:

❑ Public Cloud

❑ Private Cloud

 Hybrid Cloud

 Community Cloud

56

28 29.12.2018

Types of Cloud

Public Cloud

 Service is provided from a cloud computing company.They are most vulnerable to various attacks.

 Small and medium scaled companies mostly use it.

57

Types of Cloud

Private Cloud

 It’s used by large scaled companies that has more important data.

 Private cloud is safe and the data is under your control,but it is more expensive then public cloud.

58

29 29.12.2018

Types of Cloud

Hybrid Cloud

 Hybrid cloud means using both private and public clouds, depending on their purpose.

❑ Public cloud can be used to interact with customers, while keeping their data secured through a private cloud.

59

Types of Cloud

Community Cloud

 Implies an infrastructure that is shared between organizations, usually with the shared data and data management concerns.

 For example, a community cloud can belong to a government of a single country.

60

30 29.12.2018

Cloud Computing Services

Some platforms that provide service of cloud:

➢ Dropbox

➢ Google Drive

➢ iCloud

➢ Yandex.Disk

➢ SkyDrive

61

References

 https://tr.wikipedia.org/wiki/Bulut_bilişim  https://docs.microsoft.com/en- us/learn/modules/principles-cloud-computing/  https://www.endustri40.com/bulut-bilisim-cloud- computing-nedir

 https://www.dia.com.tr/neden-bulut-bilisim-farki-ne- ayricaligi-ne/

 https://blog.natro.com/bulut-teknolojisi-nedir/  http://ozlempalta.blogspot.com/2014/04/bulut- bilisim-yararlar.html

 https://www.globaldots.com/cloud-computing-types-of- cloud

62

31 29.12.2018

SMART HOME SYSTEMS

152120171048 152120171031 Elif AKAY Bahar Eda SARAN

63

Smart home systems are systems covering multiple sensors, garden irrigation, air conditioning, fire alarm, lighting, security, smart sockets, television and smartphones.

64

32 29.12.2018

• Z-Wave, • EnOcean, • x10 • 6loWPAN • and zigbee are the most widely used wireless smart home communication networks in home automation systems.

65

Your home plants and garden can be irrigated automatically or remotely.

When you're on holiday, you can connect from your smartphone and give your pets water and food.

66

33 29.12.2018

Working Principle of Smart Home Systems

The control of all the equipment in the house is in the hands of the owner with a single control.

67

Instead of separate running devices, a smart home combines multiple subsystems controlled by a main home automation controller.

• TIMES ADJUSTED EVENTS

• TRIGGERING EVENTS

68

34 29.12.2018

Remote Control:

Clicking the Turn on audio button on the remote control will cause the sound on circuit board to be completed. The integrated circuit detects this.

The integrated circuit binary sends the voice command in the system to the LEDs on the front of the remote control.

The LED in the binary system sends a series of light pulses corresponding to the voice-on command.

69

Sony control-s

70

35 29.12.2018

Smart Home Automation has both advantages and disadvantages like each system.

71

Advantages of smart home automation:

72

36 29.12.2018

Smart homes include advanced security systems with cameras, motion sensors connected to the local police station or a private security company.

It enables the physically disabled patients to live more comfortably.

73

Saves time and energy The lights can be switched off automatically when there is no one in the room, and the thermostat can be set to allow the indoor temperature to fall just before the interior reaches evening hours. All these automated tasks, combined with modern energy-saving appliances, combine to save electricity, water and natural gas, reducing pressure on natural resources.

74

37 29.12.2018

Almost all smart home products can be loaded without much difficulty.

75

Disadvantages of smart home automation:

76

38 29.12.2018

After a while it is comfortable to use and makes people lazy.

Increases unemployment.

77

A smart home will be highly dependent on your internet connection. If you lose your connection, you will stay with many smart products that won't work.

Other people entering the system because of remote control can create negative results.

78

39 29.12.2018

What does ABB do about improving security?

Industrial developments intensified cybercrime. In order to increase security and robustness in its solutions, ABB officially established the cyber security test as part of the product development process.

79

Turkey's first smart home

• Sinpaş • IBM Global Services • Arçelik • Beko • Apple-Bilkom • Compaq • Digiturk • Turk.Net

80

40 29.12.2018

Artificial Intelligence and Algorithms

•neural network •fuzzy logic •support vector machines •hidden markov model •Deep learning

81

Which is not one of the most widely used wireless smart home communication networks in home automation systems?

A)Z-Wave, B)EnOcean C) X10 D)X-Wave A) zigbee

82

41 29.12.2018

Answer=

D)X-Wave

83

Which is not an artificial intelligence algorithm used in academic studies? A)neural network B)fuzzy logic C)support fuzzy model D)hidden markov model E)Deep learning

84

42 29.12.2018

Answer=

C)support fuzzy model

85

86

43 29.12.2018

HISTORY OF GRAPHICS CARD

87

• IBM released their first two graphics cards in 1981 • The Monochrome Display Adapter (MDA) and Color Graphics Adapter (CGA)

GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

88

44 29.12.2018

• Van Suwannukul , founder of Hercules Computer Technology developed the first popular none IBM graphics card, the Hercules Graphics Card.

GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

89

MDA(Monochrome Display Adapter)

HERCULES GRAPHICS CARD

GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

90

45 29.12.2018

• In the year 1984, Professional Graphics Controller (PGC) and Enhanced Graphics Adapter (EGA) were introduced by IBM.

• Then by 1987, came Video Graphics Array (VGA) .

• 2D and 3D cards were first released to the public in 1995.

• 3dfx Voodoo Graphics 3D chipsets developed by Interactive in 1996.

• By then since 2003, ATI video card market has been reined by ATI and NVIDIA with their Radeon and GeForce lines respectively. GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

91

What is the Graphic Card?

The video card is an important component of the computer and provides the monitor with an image.

GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

92

46 29.12.2018

How Does a Graphic Card Work? CPU Video Ram GPU

Ramdac Video Ram

Monitor

GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

93

1. CPU (Processor): The processor orders the Graphics Processing Unit (GPU).

2. GPU (Graphics Progress Unit): A graphics processor that executes commands on the display card. The goal is to lighten the CPU's load.

GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

94

47 29.12.2018

3. Video RAM: The graphics processor uses the memory on the Video Card as a memory when creating the image. The goal is to use the main memory only by the CPU and increase performance.

4. RAMDAC: The video enables the conversion of "0" and "1" from the memory, ie the digital system, to Analoga for the provision of the image.

GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

95

For fast-paced games, the computer has to go through this process about sixty times per second. Without a graphics card to perform the necessary calculations, the workload GÖKHAN SAMET ALBAYRAK would be too much for the computer to İSMAİL DEMİRCAN handle. MUSTAFA BATUHAN BAYOĞLU 96

48 29.12.2018

Nowadays used in video cards and features

GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

97

Gigabyte GeForce Aorus RTX 2080 Ti

GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

98

49 29.12.2018

General information • 1.NUMBER OF TRANSISTORS :18600 million • 2.THERMAL DESIGN POWER (TDP):250W • 3.IS DUAL-GPU: İNCLUDE Performance • PIXEL RATE: 149.2 Pixel/s • GPU MEMORY SPEED:1750 Mhz • FLOATING-POINT PERFORMANCE :14.75 TFLOPS • GPU CLOCK SPEED: 1350 Mhz • 6.SHADING UNITS :4352 GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

99

MEMORY • MAXIMUM MEMORY BAND WIDTH:616GB/S • MEMORY BUS WIDTH :352 BİT • EFFECTIVE MEMORY SPEED :14000MHz • RAM:11GB PORT • HAS A HDMI OUTPUT: YES • DISPLAYPORT OUTPUTS: 3 • HDMI PORTS: 3 • USB PORTS: 1 GÖKHAN SAMET ALBAYRAK • HAS USB TYPE-C: İNCLUDE İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

100

50 29.12.2018

Features

OPENGL VERSION: 4.5 DIRECTX VERSION: 12 OPENCL VERSION: 2 SUPPORTS 4K RESOLUTION: YES SUPPORTS MULTI-DISPLAY TECHNOLOGY: YES SUPPORTS 3D:YES

GÖKHAN SAMET ALBAYRAK İSMAİL DEMİRCAN MUSTAFA BATUHAN BAYOĞLU

101

Thank you for listen to our presentation

102

51 29.12.2018

YAĞIZ CAN MERMERCİ 152120171047

AYDIN CESUR 152120171022

103

CODING LANGUAGES AND HISTORY

A programming language is a computer language engineered to create a standard form of commands. These commands can be interpreted into a code understood by a machine. Programs are created through programming languages to control the behavior and output of a machine through accurate algorithms, similar to the human communication process.

104

52 29.12.2018

Before 1940 In 1837, Charles Babbage, a British professor created a command set to multipurpose calculator. Although it is not widely used for political, economic and legal reasons, it is considered as the first programming language.

105

1940s “ENIAC Coding System” was developed in 1943 for Electronic Numerical Integrator and Computer (ENIAC) , one of the first electronic digital computers. 1943 - Plankalkül (Konrad Zuse) 1943 - ENIAC coding system 1949 - C-10

106

53 29.12.2018

1950s and 1960s These years have been the foundations of modern programming languages. • 1951 - Regional Assembly Language • 1952 - Autocode • 1954 - FORTRAN (FORmula TRANslator) • 1958 - LISP (LISt Processor) • 1958 - ALGOL (ALGOrithmic Language) • 1959 - COBOL (COmmon Business Oriented Language) • 1962 - APL (A Programming Language) • 1962 - Simula • 1964 - BASIC (Beginner's All-purpose Symbolic Instruction Code) • 1964 - PL/I (Programming Language One)

107

1970s • In these years, programming languages begin to diversify, and develop structured programming languages. • 1970 – PascaL • 1972 - C • 1972 - Smalltalk • 1972 - Prolog • 1973 - ML • 1978 – SQL

108

54 29.12.2018

PASCAL

• Most of the first Macintosh operating system, and TeX, was written with Pascal. • Computer scientist Niklaus Wirth developed Pascal in 1970 to make structured programming easier for compilers.

109

C

AT & T Bell is a B language-based structured programming language in order to develop the UNIX Operating System by Ken Thompson and Dennis Ritchie.

110

55 29.12.2018

Today, up to 95% of all operating systems (Microsoft Windows, GNU / Linux, * BSD, Minix) have been used. It is still quite common that more systems, driver software, operating system modules, and speeds are used wherever they need.

111

1980s The 1980s are the years when languages have been able to develop scalable applications for larger systems. These years were years of object-oriented programming. 1983 - Ada 1983 - C++ 1985 - Eiffel 1987 - Perl 1989 - FL (Function Level)

112

56 29.12.2018

1990s With the spread of the Internet, it was the years when the Java language was developed and expanded in a very serious way.

1990 - Haskell 1990 - Python 1991 - Java 1993 - Ruby 1995 - PHP 1995 - Delphi 2000 - C#

113

PYTHON Python is an object-oriented, interpretive, modular and interactive high- level programming language. The modular structure supports the class string (system) and any data field input. Can work on almost any platform. (Unix, Linux, Mac, Windows, Amiga, Symbian).

114

57 29.12.2018

JAVA

Java is an open-source, object-oriented, ground-independent, high- efficiency, multifunctional, high-level, step-by-step language that has been developed by James Gosling, a Sun Microsystems engineer.

115

Classification of Programming Languages

Programming languages are classed among themselves. Languages that are close to machine codes such as 1100101, which are the most difficult to learn and understand, are the lowest level programming languages.

116

58 29.12.2018

First Generation Programming Languages - Machine Languages • • ARM • • Intel 80x86 • • IBM 360 • • MIPS R2000|R3000 • • MOS Tech 6502 • • Motorola 680x • • Power Architecture - (POWER and PowerPC) • • StrongARM • • Sun SPARC, UltraSPARC

117

Second Generation Programming Languages - Assembly Languages • • ASEM-51 [1] • • BAL (Basic AssembLer) • • COMPASS (COMPrehensive ASSembler) • • Emu8086 • • FAP (FORTRAN Assembly Program) • • FASM (Flat Assembler; IA-32, IA-64) • • GAS (GNU Assembler) • • HLA (High Level Assembly)

118

59 29.12.2018

Third Generation Programming Languages • • Fortran • • ALGOL • • COBOL • • BASIC • • C • • C++ • • Delphi • • Java

119

Fourth Generation Programming Languages • • Informix-4GL • • Progress 4GL • • SQL • • Oracle Forms /Reports • • PostScript • • RPG-II • • Gauss • • ABAP • • Mathematica

120

60 29.12.2018

Fifth Generation Programming Languages

• Prolog • OPS5 • Mercury

121

CLASSIFICATION OF PROGRAMS BY USAGE AREA. • 1.In the field of Scientific and Engineering • 2.In Database Usage • 3.In System Programming • 4.General Purpose use • 5.In Artificial Intelligence Use

122

61 29.12.2018

REFENSECES • http://algoritma-programlama.blogspot.com/2013/11/programlama- dilleri.html • https://tr.wikipedia-on- ipfs.org/wiki/Pascal_yaz%C4%B1l%C4%B1mlama_dili.html • http://www.wikizeroo.net/index.php?q=aHR0cHM6Ly90ci53aWtpcGVka WEub3JnL3dpa2kvQ18ocHJvZ3JhbWxhbWFfZGlsaSk • https://www.chip.com.tr/blog/kadircamoglu/Gecmisten-Gunumuze- Programlama-Dilleri_1846.html

123

Virtual Reality and VR/AR

Alperen Aygün - 152120171014 Yusuf Celil Alak - 152120181016

124

62 29.12.2018

- What is VR? () - Virtual Reality Types - History of Virtual Reality - Applications of VR Contents - What is AR? (Augmented Reality) - Augmented Reality Types - History of Augmented Reality - Applications of AR - References

125

Virtual Reality is the use of computer modeling and simulation through several What is VR technologies that simulate a user’s physical presence in a virtual or (Virtual Reality) ? imaginary environment.

126

63 29.12.2018

VR needs to be…

- Believable

What is VR - Interactive (Virtual Reality) ? - Explorable

- Immersive

127

Virtual Reality Types

1) Non- 2) Fully 3) Immersive Immersive Collaborative

128

64 29.12.2018

Non-Immersive:

The viewer becomes partly but not fully immersed in this environment. One of Virtual Reality the example is flight simulator. The viewers does not need to wear virtual Types reality gear such as a data glove or head mounted display (HMD) in this simulator and they are still aware of the real world outside of the virtual environment.

129

Fully Immersive:

This type should be plausible, and richly Virtual Reality detailed to explore for the best experience. Therefore, it comes Types with powerful computers which must be able to detect sounds, sight, and even the slightest movement.

130

65 29.12.2018

Collaborative:

Collaborative reality is usually in the form Virtual Reality of virtual reality games and they are not fully immersive. One can share Types an experience in a virtual world with other people.

131

1929 –The First Flight Simulator In 1929 Edward Link created the “Link trainer” (patented 1931) probably the first example of a commercial flight simulator, which was entirely electromechanical. History of Virtual Reality

Edward Link The Link Trainer

132

66 29.12.2018

1950s – Morton Heilig’s :

In the mid 1950s cinematographer Morton Heilig developed the Sensorama (patented 1962) which was an arcade-style theatre cabinet that would stimulate all the senses, not just sight and sound. It featured stereo History of speakers, a stereoscopic 3D display, fans, Virtual Reality smell generators and a vibrating chair.

133

1968 – Sword of Damocles:

In 1968 Ivan Sutherland and his student Bob Sproull created the first VR / AR head mounted display (Sword of Damocles) that was connected to a computer and not a camera. The computer generated graphics History of were very primitive wireframe rooms and Virtual Reality objects.

134

67 29.12.2018

1987 – Virtual reality the name was born:

History of Jaron Lanier, founder of the visual programming lab (VPL), coined (or Virtual Reality according to some popularised) the term “virtual reality” in 1987.

135

1995 – Nintendo :

The Nintendo Virtual Boy (originally known as VR-32) was a 3D gaming console that was hyped to be the first ever portable console that could display true 3D graphics but it was a commercial failure despite low price History of Virtual because it was unpractical. Reality

136

68 29.12.2018

Virtual reality in the 21st century:

Old gadgets were impractical, uncomfortable and too complex. They were quite expensive too. But History of in these days, technology Virtual Reality developed so much. For this reason, VR devices become smaller and more practical. Also they are cheaper.

137

Today’s Some VR Gadgets

- RIFT History of - SONY – PLAYSTATION VR - HTC VIVE Virtual Reality - SAMSUNG GEAR VR - CONTROL VR -

138

69 29.12.2018

- Healthcare/surgery - Military - Architecture Applications of - Entertainment VR - Education - Business - Rehabilitation/treatment of phobias

139

Augmented reality is the technology that expands our physical world, adding layers of digital information onto it. Unlike What is AR Virtual Reality (VR), AR does not create the whole artificial environments to (Augmented replace real with a virtual one. AR appears in direct view of an existing Reality) ? environment and adds sounds, videos, graphics to it.

140

70 29.12.2018

Cameras and sensors: Collecting data about user’s interactions and sending it for processing. Cameras on devices are scanning the surroundings and with this info, a device locates physical objects and generates 3D models. It may be How does special duty cameras. Processing: Augmented AR devices eventually should act like little computers, something modern smartphones Reality work? already do. In the same manner, they require a CPU, a GPU, flash memory, RAM, Bluetooth/WiFi, a GPS, etc. to be able to measure speed, angle, direction, orientation in space, and so on.

141

Projection: This refers to a miniature projector on AR headsets, which takes data from sensors and projects digital content (result of processing) onto a surface to view. In fact, the use of projections in AR has not been fully invented yet How does to use it in commercial products or services. Augmented Reflection: Some AR devices have mirrors to assist human Reality work? eyes to view virtual images. Some have an “array of small curved mirrors” and some have a double-sided mirror to reflect light to a camera and to a user’s eye. The goal of such reflection paths is to perform a proper image alignment.

142

71 29.12.2018

Marker Based Augmented Reality:

Marker-based augmented reality uses a camera and some type of visual marker, such as a QR/2D code, to produce a result only when the marker is sensed by a reader. The AR device calculates the position and orientation of a marker to position the content, in some cases. Thus, a marker initiates digital animations for users to Augmented view. Reality Types

143

Markerless Augmented Reality:

Markerless augmented reality (also called location-based or position- based) uses a GPS, digital compass, velocity meter, or Augmented accelerometer which is embedded in the device to provide data based Reality Types on your location. With the availability of smartphones this type of AR typically produces maps and directions, nearby businesses info.

144

72 29.12.2018

Projection Based Augmented Reality: Projecting synthetic light to physical surfaces, and in some cases allows to interact with it. It detects user interaction with a projection by its alterations. Augmented Reality Types

145

Superimposition Based Augmented Reality: Superimposition based augmented reality either partially or fully replaces the original view of an object with a newly augmented view of that same object. Object recognition plays a key role, without it the whole concept Augmented is simply impossible. Reality Types

146

73 29.12.2018

Myron Krueger created Videoplace – an artificial reality laboratory. The scientist envisioned the interaction with digital stuff by human movements. This concept later was used for certain projectors, video cameras, and onscreen silhouettes. -1975

History of AR Steve Mann developed a first portable computer called EyeTap, designed to be worn in front of the eye. -1980

Dan Reitan brought interactive AR system for broadcasters, AR is seen on TV for the first time. -1982

147

The term 'Augmented Reality' is attributed to Thomas P. Caudell, a former Boeing researcher. - 1990

Louis Rosenberg develops one of the first functioning AR systems, called Virtual Fixtures, at the U.S. Air Force Research Laboratory. -1992 History of AR A group of scientists led by Frank Delgado and Mike Abernathy tested new navigation software, which generated runways and streets data from a helicopter video. -1999

Japanese scientist Hirokazu Kato developed and published ARToolKit – an open-source software development kit. -2000

148

74 29.12.2018

Google announced an open beta test of its augmented reality glass. -2013

Microsoft announced Windows History of AR Holographic and the HoloLens augmented reality head. -2015

Niantic launched Pokemon Go game for mobile devices. -2016

149

Augmented Reality Devices:

- Mobile devices

- Special AR devices

History of AR - AR glasses (or smart glasses)

- AR contact lenses (or smart lenses)

- Virtual retinal displays (VRD)

150

75 29.12.2018

- Education: interactive models for learning and training purposes, from mathematics to chemistry.

Applications of - Medicine/healthcare: to help diagnose, monitor, train, localize, AR etc.

- Military: for advanced navigation, marking objects in real time.

151

- Art / installations / visual arts / music

- Tourism: data on destinations, sightseeing objects, navigation, and directions. Applications of - Broadcasting: enhancing live events AR and event streaming by overlaying content.

- Industrial design: to visualize, calculate or model.

152

76 29.12.2018

Which of this is not a real VR headset? a) HTC Vive Question b) Samsung Gear VR c) Sony Playstation VR d) Xbox VR

153

What is A.R. ? a) Artificial Reality Question b) Augmented Reality c) Attractive Reality d) Active Reality

154

77 29.12.2018

https://www.explainthatstuff.com/vir tualreality.html

https://www.britannica.com/technol ogy/virtual-reality

https://www.ispringsolutions.com/bl og/vr-made-easy-create-virtual- References reality-without-breaking-the-bank/

https://www.vrs.org.uk/

http://www.teknolo.com/sanal- gerceklik-nedir/

155

http://www.sweethaven02.com/P DF_Lifelong/Augmented%20reality. pdf

https://thinkmobiles.com/blog/wh References at-is-augmented-reality/

https://www.realitytechnologies.co m/augmented-reality/

156

78 29.12.2018

Aybala Yaren TAĞ Oğuzhan OKUR Erkut KAYA 152120171010 152120171015 152120171040

157

 Cybercrime is a bigger threat than ever before, now that more and more people are connected to the Internet via laptops, smartphones and tablets, and is one of the most profitable ways to make money in the criminal world.

158

79 29.12.2018

A cybercriminal may use a device to access a user’s personal information, confidential business information, government information, or disable a device.

159

160

80 29.12.2018

This kind of cybercrime involves online harassment where the user is subjected to a plethora of online messages and emails. Typically cyberstalkers use social media, websites and search engines to intimidate a user and instill fear. Usually, the cyberstalker knows their victim and makes the person feel afraid or concerned for their safety.

161

This cybercrime occurs when a criminal gains access to a user’s personal information to steal funds, access confidential information, or participate in tax or health insurance fraud. They can also open a phone/internet account in your name, use your name to plan a criminal activity and claim government benefits in your name. They may do this by finding out user’s passwords through hacking, retrieving personal information from social media, or sending phishing emails.

162

81 29.12.2018

Social engineering involves criminals making direct contact with you usually by phone or email. They want to gain your confidence and usually pose as a customer service agent so you’ll give the necessary information needed. This is typically a password, the company you work for, or bank information. Cybercriminals will find out what they can about you on the internet and then attempt to add you as a friend on social accounts. Once they gain access to an account, they can sell your information or secure accounts in your name

163

These are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources. Large networks of infected devices known as Botnets are created by depositing malware on users’ computers. The hacker then hacks into the system once the network is down.

164

82 29.12.2018

Botnets are networks from compromised computers that are controlled externally by remote hackers. The remote hackers then send spam or attack other computers through these botnets. Botnets can also be used to act as malware and perform malicious tasks.

165

PUPS or Potentially Unwanted Programs are less threatening than other cybercrimes, but are a type of malware. They uninstall necessary software in your system including search engines and pre- downloaded apps. They can include spyware or adware, so it’s a good idea to install an antivirus software to avoid the malicious download.

166

83 29.12.2018

This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer. Cybercriminals are becoming more established and many of these emails are not flagged as spam. Users are tricked into emails claiming they need to change their password or update their billing information, giving criminals access.

167

This cybercrime involves criminals sharing and distributing inappropriate content that can be considered highly distressing and offensive. Offensive content can include, but is not limited to, sexual activity between adults, videos with intense violent and videos of criminal activity. Illegal content includes materials advocating terrorism-related acts and child exploitation material. This type of content exists both on the everyday internet and on the dark web, an anonymous network.

168

84 29.12.2018

These are usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic amounts of money. Online scams include enticing offers that are “too good to be true” and when clicked on can cause malware to interfere and compromise information.

169

 Don’t download anything from unknown sources  Don’t click on links embedded in emails from people you don’t know  Don’t ever give out your password or personal data  Ensure websites are safe before entering credentials.  Keep antivirus/application systems up to date.  Use strong passwords with 14+ characters.

170

85 29.12.2018

People who commit these crimes are punished with money or imprisonment.

171

172

86 29.12.2018

A seminal figure in American hacking. In 1981, he was charged with stealing computer manuals from Pacific Bell. In 1982 he hacked the North American Defense Command (NORAD), which inspired the 1983 film "War Games." In 1989, he hacked Digital Equipment Corporation's (DEC) network and made copies of their software

173

He eventually became active on criminal commerce site Shadowcrew.com and was considered one of its best hackers and moderators. At 22, Gonzalez was arrested in New York for debit card fraud related to stealing data from millions of card accounts.

174

87 29.12.2018

Using the alias comrade, Jonathan James hacked into several companies. But according to the New York Times,what really earned him attention was his hack into the computers of the United States Department of Defense. What was all the more startling was that James was only 15 at the time.

175

176

88 29.12.2018

https://www.erdemakcay.av.tr/siber-suc-nedir/

https://wmaraci.com/nedir/siber-suc

https://www.bilgitor.com/bilisim-suclari-nedir-siber-suclar-ve-yasal-onlemler/

https://en.wikipedia.org/wiki/Cybercrime

https://tr.wikipedia.org/wiki/Bili%C5%9Fim_su%C3%A7lar%C4%B1

https://www.pandasecurity.com/mediacenter/panda-security/types-of-cybercrime

https://usa.kaspersky.com/resource-center/threats/top-ten-greatest-hackers

Video https://www.youtube.com/watch?v=dRKMlG0KTkY

177

COMPUTER GRAPHICS

MAHMUT KILIÇ RENAT AGHASIYEV

178

89 29.12.2018

GRAPHIC & VISUALIZE

Graphic: • A graphic is an image or visual representation of an object.

Visualize: To form a picture of someone or something in your mind, in order to imagine or remember him, her, or it.

179

GRAPHS

In 2017, dolphins’ population is higher than whales and bears. Then, dolphins population will decrease.At the same time, bears rise up like a mountain but whales’ steps will be useless. …..

180

90 29.12.2018

FLOWCHART

Periodic Table

181

COMPUTER GRAPHICS

• Computer graphics is an art of drawing pictures on computer screens with the help of programming. • It involves computations, creation, and manipulation of data.

182

91 29.12.2018

A FEW USES OF COMPUTER GRAPHICS

• User Interfaces • Interactive plotting in business,science and technology • Cartography • Computer-aided drafting and design • Simulation • Entertainment

183

GUI-GRAPHICAL USER INTERFACE CLI-COMMAND-LINE INTERFACE

• GUI is an interface that uses icons or other visual indicators to interact with electronic devices, rather than only text via a command line. • CLI is a user interface that is navigated by typing commands at prompts, instead of using the mouse.

184

92 29.12.2018

COMPUTER-AIDED DESIGN

• CAD, is the 2D or 3D modeling of physical structures and material properties, using specialized software on a computer.

185

CARTOGRAPHY

• Cartography is the study and practice of making maps.

186

93 29.12.2018

SIMULATION

• Simulation is an imitation of the operation of a real-world process or system.

187

ENTARTAINMENT & ART

188

94 29.12.2018

CRT-LCD

• There are two primary types of computer monitors in use today: LCD monitors and CRT monitors.

SIZE LCD WEIGHT LCD POWER LCD DEAD PIXELS CRT PRICE CRT

189

PIXEL/VECTORIAL DEPT OF COLOUR SOLUBILITY CONCEPTS COMPUTER IMAGE FORMAT & AREAS OF USE

190

95 29.12.2018

PIXEL

191

VECTORIAL

192

96 29.12.2018

BITMAP

193

PICTURE COMPRESSION

194

97 29.12.2018

RASTER

195

LAYER

196

98 29.12.2018

IMAGE FORMAT

197

QUESTION-1

1. CRT’s are cheaper than LCD’s 2. AutoCAD works only in 3D 3. GUI is faster than CLI Which of these are true? a. Only 2 b. 1-3 c. 1-2 d. 1,2 and 3

198

99 29.12.2018

QUESTION-2

What is Cartography?

a. Cartography is the study and practice of making maps. b. Cartography is the study and practice of coloring pixels. c. Cartography is the study and practice of creating simulations. d. Cartography is the study and practice of drawing graphs.

199

QUESTION-3

• Which graphic type has the same quality when they grow and shrink? a. BITMAP b. PNG c. PSD d. VECTORIAL e. TIFF

200

100 29.12.2018

QUESTION-4

Which file compresssion is safer? a. FLIF b. LZW c. DICM d. FPIX

201

REFERENCES

• https://www.computerhope.com/jargon/c/cad.htm • https://www.tutorialspoint.com/computer_graphics/ • https://www.explainthatstuff.com/computer-graphics.html • https://www.geeksforgeeks.org/vector-vs-raster-graphics/ SOURCES • James D. Foley, Andries van Dam, Steven K. Feiner, John F. Hughes, Richard L. Phillips(1993) - Introduction to Computer Graphics-(Addison-Wesley Professional), 10-1

202

101 29.12.2018

Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078

203

Cryptography 1.Introduction to cryptography • Cipher • Encryption & Decryption • Permutation Ciphers and Substitution Ciphers • CAESAR’s Cipher

2.Enigma Machine 3.Modern Cryptography

Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018

204

102 29.12.2018

1. Introduction to Cryptography

➢ CRYPTO +GRAPHY= secret writing (derived from the Greek)

➢ Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.

➢ The origin of cryptography is dated from about 2000 B.C.

➢ Cryptography was used for hiding different secrets during its history, controlled by governments, applied in wars, in diplomacy and used for espionage.

Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018

205

➢ CIPHER – is an algorithm that converts plain text into CIPHERTEXT, which is a gibberish unless you have a key to undo the Cipher.

➢ ENCRYPTION & DECRYPTION The process of making the text secret is called Encryption, and the reverse process is called Decryption.

➢ PERMUTATION CIPHERS The fundamental class of cipher techniques are Permutation ciphers, and here we have an example called columnar transposition cipher.

Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018

206

103 29.12.2018

➢ SUBSTITUTION CIPHERS

• Substitution cipher is another class of techniques and works out such as shifting letters in alphabet for a given number, and the best example is the Caesar’s cipher.

• A big disadvantage of basic substitution ciphers is that the letter frequencies are preserved. • For example, E is the most common letter in English, so if your cipher translates E to H, then H will come up the most frequently in the cipher text so we can easy notice that the alphabet is shifted three places forward.

Dinara JUMAYEVA 152120171074 29/12/2018 Nora ISENI 152120171078

207

The Julius CAESAR cipher

The Caesar cipher, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.

Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018

208

104 29.12.2018

The Julius Caesar’s cipher

Every letter in the alphabet is shifted for 3 places. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on.

Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018

209

The Enigma Machine

By the 1900s, cryptography was mechanized in the form of encryption machines. The most famous was the German Enigma, used by the Nazis to encrypt their war-time communications. The Enigma machines are a series of electro-mechanical rotor cipher machines, it’s type writer- like machine, with a keyboard and lamp board, both showing the full alphabet.

Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018

210

105 29.12.2018

Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018

211

Here is given one rotor of Enigma machine, where we can see how it works.

These are 3 rotors of enigma machine, each of them could be rotated into 26 different starting positions. Reflector connected every pin to another. Plugboard which swapped every coming letter to another and adding another level of complexity.

29/12/2018 Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078

212

106 29.12.2018

Alan Turing (1912-1954)

Alan Turing designed a machine called “The Bomb” to smash the German Enigma code. The Bomb machine was designed to perform a sweep of the milliard ways in which the enigma machine could have been set up. His machine could crack the enigma machine’s code in 15 minutes.

Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018

213

3. Modern Cryptography

• Modern cryptography is based heavily on mathematics. • The math is hard.

There are three types of cryptography which are used to build the Modern Cryptography: 1. Secret Key Cryptography (Symmetric) 2. Public Key Cryptography (Asymmetric) 3. Message Digest (Hashing)

Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018

214

107 29.12.2018

Resources

• http://www.wikizeroo.net/index.php?q=aHR0cHM6Ly9lbi53aWtpcGVkaWEub3JnL3dpa2kvQ3J5cHRvZ3JhcGh5 • http://www.wikizeroo.net/index.php?q=aHR0cHM6Ly9lbi53aWtpcGVkaWEub3JnL3dpa2kvQWxhbl9UdXJpbmc • https://www.youtube.com/watch?v=ASfAPOiq_eQ&t=84s

Dinara JUMAYEVA 152120171074 Nora ISENI 152120171078 29/12/2018

215

Thanks for listening!

216

108

• Which company is provides funds for Kali Linux ? a)Offensive Security b)Cyber Security c)Defensive Security d)Private Security

Answer: (A) • Who is the creator of Kali Linux ? a)Steve Jobs b)Bill Gates c)Elon Musk d)Linus Torvalds

Answer: (D) Kaynakça: • https://alisahinkaya.com/linux/kali‐linux‐nedir‐kali‐linux‐kullanimi/ • https://alisahinkaya.com/linux/linux‐nedir‐linux‐ne‐ise‐yarar‐linux‐indir/ • http://www.getgnu.org/gnulinux/gnulinux‐ipuclari/gnu‐nedir.html • https://www.karel.com.tr/blog/ozgur‐yazilim • https://tr.wikipedia.org/wiki/Kali_Linux 12/31/2018

Machine Learning Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104)

1

What is Machine Learning?

• Machine learning is a way of pushing a large amount of data into a system and getting out a model that you can then apply to more data. • It is , the tool and technology that you can utilize to answer question with your data. • Early definition of machine learning by Arthur Samuel: "Field of study that gives computers the ability to learn without being explicitly programmed."(1959)

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 2

2

1 12/31/2018

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 3

3

How does it work?

In a machine learning approach, the idea is that to give the computer output and examples of what I want the program to do. And the machine learning algortihm actually proudeces a program.

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 4

4

2 12/31/2018

Usages of Machine Learning

Assisted Driving Face Detection Voice Assistants

Search Engines Character Recognotion Recommendation Systems

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 5

5

Google search result of java, if the person is interested in coffee.

Google search result of java, if the person is interested in programming.

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 6

6

3 12/31/2018

Recommendation Systems Cancer Diagnosis

Neural Color Transfer Between Images

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 7

7

Why is Machine Learning Important?

It can solve complicated real-world tasks in a scalable way We have always had problems that we’ve either solved badly or had to have a human personally do, that are now becoming solvable via machine learning.

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 8

8

4 12/31/2018

How are things learned?

• Memorization: o Accumaltion of inividual facts Declarative Knowledge o Limited by time and memory

• Generalization o Make new facts from old facts Imperative Knowledge o Limited by accuracy of deduction process It can also extend to programs that can infer useful information From implicit patterns in data

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 9

9

How are things learned?

By observing set of examples (training data). Infer something about to process that generated that data. Make predictions to unseen data (test data). Variations on paradigm: Supervised: Given a set of feature/label pairs, find a rule that predicts the label associated with a previously unseen input. Unsupervised: Given a set of feature vectors without labels group them into natural clusters.

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 10

10

5 12/31/2018

An Example

Name Egg-laying Scales Poisonous Cold- Number of Reptile blooded legs Rattlesnake True True True True 0 YES

Inıtıal Model: 1. Egg laying 2. Is poisonus 3. Has Scales 4. Cold Blooded 5. No legs

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 11

11

Name Egg-laying Scales Poisonous Cold- Number of Reptile blooded legs Rattlesnake True True True True 0 YES Anaconda False True False True 0 YES

Current model: 1. Has scales The model needs a change 2. Cold blooded because anaconda is labeled as a 3. No legs non-reptile in previous model.

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 12

12

6 12/31/2018

Name Egg-laying Scales Poisonous Cold- Number of Reptile blooded legs Rattlesnake True True True True 0 YES Anaconda False True False True 0 YES Chicken True True False False 2 NO

Current model: 1. Has scales 2. Cold blooded 3. No legs

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 13

13

Name Egg-laying Scales Poisonous Cold- Number of Reptile blooded legs Rattlesnake True True True True 0 YES Anaconda False True False True 0 YES Chicken True True False False 2 NO Alligator True True False True 4 YES

Current model: As reptiles can have legs the 1. Has scales model needs a change. 2. Cold Blooded

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 14

14

7 12/31/2018

Name Egg-laying Scales Poisonous Cold- Number of Reptile blooded legs Rattlesnake True True True True 0 YES Anaconda False True False True 0 YES Chicken True True False False 2 NO Alligator True True False True 4 YES Sheep False False False False 4 NO Dart Frog True False True False 4 NO Swordfish True True False True 0 NO Python False True False True 0 YES

Good model: While not perfect, this model labels all reptiles to 1. Has scales reptiles, but for many problems there is no perfect 2. Cold Blooded way to seperate data.

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 15

15

How to make this model better?

• We need to measeure distances between features. • We need to decide which features to add or remove. • We can convert examples to 5 feature vectors: Rattlesnake = [1,1,1,1,0] Dart frog = [1,0,1,0,4] Anaconda = [0,1,0,1,0] Alligator = [1,1,0,1,4]

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 16

16

8 12/31/2018

Euclidian vs Manhattan Distance

Minkowski Metric

For Euclidian Distance: Distance to + is 2.8 Distance to * is 3

For Manhattan Distance: Distance to + is 4 Distance to * is 3

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 17

17

• With Eucladian distance:

Rattlesnake Anaconda Dart Frog Alligator Rattlesnake ------1.414 4.243 4.123 Anaconda 1.414 ------4.472 4.123 Dart Frog 4.243 4.472 ------1.732 Alligator 4.123 4.123 1.732 ------

• Alligator should be closer to snakes than dart frog because alligator and snakes are both reptiles.

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 18

18

9 12/31/2018

With Manhattan Distance:

Rattlesnake Anaconda Dart Frog Alligator Rattlesnake ------1.414 1.732 1.414 Anaconda 1.414 ------2.236 1.414 Dart Frog 1.732 2.236 ------1.732 Alligator 1.414 1.414 1.732 ------

Rattlesnake = [1,1,1,1,0] Anaconda = [0,1,0,1,0] Dart frog = [1,0,1,0,4] Alligator = [1,1,0,1,4]

It makes more sense and it is a nicer model this way.

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 19

19

References

• https://towardsdatascience.com/what-is-machine-learning-8c6871016736 • https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-0002- introduction-to-computational-thinking-and-data-science-fall-2016/ • Google Developers-Machine Learning recipes • Jing Liao, Yuan Yao, Lu Yuan, Gang Hua, and Sing Bing Kang. Visual attribute transfer through deep image analogy. arXiv preprint arXiv:1705.01088, 2017. • Fujun Luan, Sylvain Paris, Eli Shechtman, and Kavita Bala. Deep photo style transfer. arXiv preprint arXiv:1703.07511, 2017.

Ercan ÖZTÜRK (152120181041) | Ahmet ÖZCAN (152120151104) 20

20

10 12/31/2018

COMPUTER GRAPHICS

MAHMUT KILIÇ RENAT AGHASIYEV

21

GRAPHIC & VISUALIZE

Graphic: • A graphic is an image or visual representation of an object.

Visualize: To form a picture of someone or something in your mind, in order to imagine or remember him, her, or it.

22

11 12/31/2018

GRAPHS

In 2017, dolphins’ population is higher than whales and bears. Then, dolphins population will decrease.At the same time, bears rise up like a mountain but whales’ steps will be useless. …..

23

FLOWCHART

Periodic Table

24

12 12/31/2018

COMPUTER GRAPHICS

• Computer graphics is an art of drawing pictures on computer screens with the help of programming. • It involves computations, creation, and manipulation of data.

25

A FEW USES OF COMPUTER GRAPHICS

• User Interfaces • Interactive plotting in business,science and technology • Cartography • Computer-aided drafting and design • Simulation • Entertainment

26

13 12/31/2018

GUI-GRAPHICAL USER INTERFACE CLI-COMMAND-LINE INTERFACE

• GUI is an interface that uses icons or other visual indicators to interact with electronic devices, rather than only text via a command line. • CLI is a user interface that is navigated by typing commands at prompts, instead of using the mouse.

27

COMPUTER-AIDED DESIGN

• CAD, is the 2D or 3D modeling of physical structures and material properties, using specialized software on a computer.

28

14 12/31/2018

CARTOGRAPHY

• Cartography is the study and practice of making maps.

29

SIMULATION

• Simulation is an imitation of the operation of a real-world process or system.

30

15 12/31/2018

ENTARTAINMENT & ART

31

CRT-LCD

• There are two primary types of computer monitors in use today: LCD monitors and CRT monitors.

SIZE LCD WEIGHT LCD POWER LCD DEAD PIXELS CRT PRICE CRT

32

16 12/31/2018

PIXEL/VECTORIAL DEPT OF COLOUR SOLUBILITY CONCEPTS COMPUTER IMAGE FORMAT & AREAS OF USE

33

PIXEL

34

17 12/31/2018

VECTORIAL

35

BITMAP

36

18 12/31/2018

PICTURE COMPRESSION

37

RASTER

38

19 12/31/2018

LAYER

39

IMAGE FORMAT

40

20 12/31/2018

QUESTION-1

1. CRT’s are cheaper than LCD’s 2. AutoCAD works only in 3D 3. GUI is faster than CLI Which of these are true? a. Only 2 b. 1-3 c. 1-2 d. 1,2 and 3

41

QUESTION-2

What is Cartography?

a. Cartography is the study and practice of making maps. b. Cartography is the study and practice of coloring pixels. c. Cartography is the study and practice of creating simulations. d. Cartography is the study and practice of drawing graphs.

42

21 12/31/2018

QUESTION-3

• Which graphic type has the same quality when they grow and shrink? a. BITMAP b. PNG c. PSD d. VECTORIAL e. TIFF

43

QUESTION-4

Which file compresssion is safer? a. FLIF b. LZW c. DICM d. FPIX

44

22 12/31/2018

REFERENCES

• https://www.computerhope.com/jargon/c/cad.htm • https://www.tutorialspoint.com/computer_graphics/ • https://www.explainthatstuff.com/computer-graphics.html • https://www.geeksforgeeks.org/vector-vs-raster-graphics/ SOURCES • James D. Foley, Andries van Dam, Steven K. Feiner, John F. Hughes, Richard L. Phillips(1993) - Introduction to Computer Graphics-(Addison-Wesley Professional), 10-1

45

ARTIFICAL INTELLIGENCE IN DEFENCE INDUSTRY

46

23 12/31/2018

CONTENTS

- What is artificial intelligence? - Goals of AI - Applications of AI - Role of AI in Military - Military Applications of AI - Advantages of AI

47

What is Artificial Intelligence

According to the father of Artificial Intelligence,John McCharty, It is ‘’The science and engineering of making intelligent machines , especially intelligent computer programs’’.

48

24 12/31/2018

Artificial intelligence is a branch of science which deals with helping machines find solutions to complex problems in a more human like fashion.

Artificial intelligence is generally associated with computer science, but it has many important links with other field such as maths, psychology, cognition, biology and philosophy, among many others.

49

50

25 12/31/2018

Goals of AI

To create Expert Systems

To implement Human Intelligence in Machines

51

Applications of AI

-> Robotics

-> Expert System

-> Natural language process

-> Neural network

-> Fuzzy logic

52

26 12/31/2018

Role of AI in Military

- The future of military may be focused on AI, that could improve cyber security, precision weaponry and other military functions.

- AI could be used in training systems. For example, it could provide unpredictable and adaptive adversaries for training fighter pilots.

- Computer vision, the ability of software to understand photos and videos.

53

- Neuro Linguistic Programming, used by systems such as Amazon’s Alexa, enables systems to interact with humans using natural language.

- NLP could enable systems to take orders without using keyboards.

- NLP also can translate documents and could serve as a translator in the future.

- Some applications of artificial intelligence are provided.

54

27 12/31/2018

Military Applications of AI

55

Unmanned underwater vehicle (UUV)

- An UUV, sometimes known as underwater drones, are any vehicles that are able to operate underwater without a human occupant.

- These vehicles may be divided into two categories.

- Remotely operated underwater (ROVs), which are controlled by a remote human operator.

- Autonomous underwater vehicles (AUVs),which operate independently of direct human input.

56

28 12/31/2018

UUV

57

Unmanned aerial vehicle(uav)

- An UAV also known as Drone, is an aircraft without a human pilot.

- Drone stands for Dynamic Remotely Operated Navigation Equipment.

- Controlled autonomously by computers or under the remote control of pilot on the ground.

58

29 12/31/2018

Unmanned Ground Vehicle

- An UGV, is a vehicle that operates while in contact with the ground and without an onboard human presence.

- UGVs can be used for many applications where it may be inconvenient, dangerous, or impossible to have a human operator present.

- Have a set of sensors to observe the environment.

59

Military Robots

- Autonomous robots or remote- controlled mobile robots

- Designed for military applications, from transport to search & rescue and attack.

- This military robots include robotic soldiers used in place of a human

60

30 12/31/2018

61

Advantages of artificial intelligence

- It can help to improve our way of life.

- Mental alertness and decision making capabilities.

- Use robots for heavy construction, military benefits, or even for personal assistance at private homes.

62

31 12/31/2018

- There will be less injuries and stress to human beings.

- Many of our health problems now having possible solutions with the use of artificial intelligence.

63

References

1. https://www.heryerdeyazilim.com/yapay-zeka-ve-savunma-sanayi/ 2. https://www.mediaclick.com.tr/blog/yapay-zeka-nedir 3. https://www.webtekno.com/bilim-haberleri/yapay-zeka-robot- asker-h6025.html 4. https://tr.wikipedia.org/wiki/Yapay_zek%C3%A2 5. https://ab.org.tr/ab14/bildiri/75.pdf

64

32 12/31/2018

ÖZKAN ARSLAN

Umut BİRİNCİ

İsmail KILIÇ

65

33