Skip to main content

Departmental Research

TED University Software Engineering Department research interests mainly focus on artificial intelligence, machine learning, big data analytics, cloud computing, internet of things, software security, cyber security, database systems, distributed systems, software verification and testing, user experience and interface design, bioinformatics, game development and cognitive sciences. The table below shows the active research interests of our faculty members.

Faculty MemberActive Research Topics
Prof. Dr. Tansel DökeroğluParallel Computing, Discrete (Multi-Objective) Optimization, Metaheuristic Algorithms, Parallel Machine Learning Algorithms, Feature Selection, Big Data Analytics
Prof. Dr. Kasım Murat Karakaya Natural Language Processing, Image Processing, Optimization, Machine Learning, and Natural Computing Algorithms
Dr. Öğr. Üyesi Özlem AlbayrakSoftware, Software Engineering
Dr. Öğr. Üyesi Emin KuğuComputer Science, Information Security and Reliability, Cryptology, Software Security, Computer Networks, Communication and Network Protocols, Database and Data Structures, Fuzzy Sets and Systems, Neural Networks, Software Engineering
Dr. Öğr. Üyesi Ulaş GüleçAugmented Reality, Virtual Reality
Dr. Elif Kurtaran Özbudak 
Artificial Intelligence, Machine Learning, Deep Learning, Natural Language Processing
yapay zeka

 

Artificial Intelligence (AI) and Machine Learning (ML) are among the pioneers of modern technology, revolutionizing various fields. These two domains enable computer systems to learn from data, make predictions, and solve complex problems.

Artificial Intelligence (AI): AI aims to make machines exhibit human-like intelligence. It encompasses various subfields, including natural language processing, image recognition, robotics, and decision-making systems. AI applications are increasingly integrated into daily life, driving innovations in industries such as healthcare, education, entertainment, and manufacturing. For instance, in the healthcare sector, AI is utilized for early disease diagnosis, optimization of treatment plans, and enhancement of patient care.

Machine Learning (ML): ML enables computers to learn from experience and improve their performance without explicit programming. It is particularly powerful in big data analytics, predictive modeling, and pattern recognition. This technology is widely applied in sectors ranging from fraud detection in finance to customer behavior analysis in retail. Additionally, ML plays a crucial role in the development of autonomous vehicles and personalized recommendation systems.

Deep Learning: A subfield of machine learning, deep learning is highly effective in solving problems that require large amounts of data and high computational power. Leveraging artificial neural networks, deep learning has achieved groundbreaking results in areas such as image and speech recognition, natural language processing, and autonomous systems.

Natural Language Processing (NLP): Natural language processing enables computers to understand and process human language. NLP is used in applications such as language translation, sentiment analysis, chatbots, and text summarization. This technology provides significant advantages in areas such as customer service, content management, and information retrieval.

Image Processing: Image processing focuses on the analysis and manipulation of digital images. It is widely utilized in medical imaging, facial recognition, industrial automation, and security systems. This technology enables precise and rapid analysis, often surpassing human capabilities in accuracy and efficiency.

These fields, empowered by the vast potential of AI and ML, are transforming both daily life and industrial processes. As these technologies continue to advance, we can expect the emergence of smarter, more efficient, and user-friendly systems in the future.

Researchers: Prof. Dr. Tansel Dökeroğlu, Prof. Dr. Kasım Murat Karakaya

Relevant Courses:

 
AAugmented Reality, Virtual Reality
gerçeklik

Augmented Reality (AR) and Virtual Reality (VR) are innovative technologies that transcend the boundaries of the digital world, redefining our perception of reality. These technologies provide immersive and interactive experiences by extending beyond the physical world.

Augmented Reality (AR)
AR enhances the real world by overlaying digital information onto physical environments, creating enriched user experiences. AR applications, accessible through smartphones, tablets, and smart glasses, integrate additional information, graphics, or interactive elements into the user's field of vision. This allows users to explore their surroundings more deeply and access information seamlessly.

Virtual Reality (VR)
VR, on the other hand, immerses users in a completely virtual environment. Using VR headsets and other specialized devices, individuals are transported into computer-generated worlds, offering a fully interactive experience independent of the real world. This enables users to explore different locations, engage in interactive games, and participate in educational simulations.

Applications
AR and VR are utilized across various fields. In education, they facilitate interactive and engaging learning experiences, while in business, they enhance training and simulation-based applications to optimize workflows. In the entertainment industry, VR gaming and immersive experiences are becoming increasingly popular, whereas in retail, AR is revolutionizing the shopping experience by enabling virtual try-ons and interactive product visualization.

A Future Beyond Reality
By pushing the limits of the digital world, AR and VR allow users to go beyond traditional perceptions of reality. As these technologies become more widespread and accessible, individuals will have greater opportunities to experience the digital realm and explore new possibilities in both personal and professional domains.

Researchers: Dr. Öğr. Üyesi Ulaş Güleç

Relevant Courses:

 
 
Network Security, Cybersecurity, Computer Networks
network security

Network security is a critical component of the modern digital world, encompassing various technologies and practices to ensure data integrity, confidentiality, and availability. This field aims to protect individuals and organizations from cyber threats by developing defense mechanisms against unauthorized access and malicious activities.

Network Security
Network security safeguards computer networks against unauthorized access, malware, and data breaches. It utilizes technologies such as firewalls, intrusion detection systems (IDS), and virtual private networks (VPN) to enhance security. Network security practices are vital across multiple industries, including finance, healthcare, education, and manufacturing.

Cybersecurity
As a broader concept encompassing network security, cybersecurity focuses on protecting computer systems and networks from cyberattacks. This field involves strategies for threat detection, mitigation, and response. Cybersecurity professionals work to counter threats such as ransomware, phishing attacks, and distributed denial-of-service (DDoS) attacks.

Encryption
Encryption is a crucial technique for securing data against unauthorized access. By implementing encryption algorithms, sensitive information can be securely transmitted and stored. This technology is widely used in banking, e-commerce, and communication services to protect confidential data.

Firewalls
Firewalls act as security barriers that monitor and control network traffic, preventing unauthorized access. Available as both hardware and software solutions, firewalls are fundamental components of network security strategies. They analyze inbound and outbound traffic to detect and mitigate potential threats.

Intrusion Detection and Prevention Systems (IDS/IPS)
IDS and IPS play a crucial role in monitoring network activities and identifying abnormal behaviors. While IDS detects potential threats, IPS actively blocks malicious activities in real time. These systems serve as proactive security measures, strengthening overall network defense.

Virtualization and Cloud Security
With the rise of virtualization and cloud computing, securing virtual environments has become essential. Cloud security focuses on protecting data exchanged between cloud service providers and users. Ensuring the security of virtual machines and cloud-based applications is an integral part of modern network security strategies.

Malware Analysis and Prevention
Malware analysis involves detecting and neutralizing malicious software to prevent potential cyber threats. Antivirus software and advanced malware prevention systems are continuously updated to safeguard computer networks. These technologies help maintain the stability and security of digital infrastructures.

These aspects highlight the broad scope and significance of network security. A secure network infrastructure is the foundation of the digital world, requiring advanced technologies and evolving strategies to counter emerging cyber threats. As technology progresses, future developments in network security will lead to more resilient and robust digital systems.

Researchers: Dr. Öğr. Üyesi Emin Kuğu

Relevant Courses:

 
 
Big Data Analytics
big data

In the rapidly expanding ocean of data in the digital era, rather than getting lost, big data analytics serves as a guiding light, transforming raw data into valuable insights. This powerful tool enables the identification of patterns, trends, and meaningful information within massive datasets. These analyses help businesses make strategic decisions, facilitate groundbreaking discoveries in scientific research, and contribute to societal well-being.

Definition of Big Data Analytics
Big data analytics is the process of analyzing large and complex datasets to extract meaningful insights. This process involves several stages, including data collection, cleansing, storage, analysis, and interpretation. Various techniques such as machine learning, artificial intelligence, and statistical methods are employed to derive valuable conclusions from vast amounts of data.

Applications
Big data analytics is utilized across various fields:

Business: Helps analyze customer behavior, optimize marketing strategies, enhance operational efficiency, and gain a competitive advantage.
Healthcare: Aids in disease prevention, diagnosis, and the development of advanced treatment methods.
Education: Enhances student performance and optimizes educational programs through data-driven insights.
Future Perspectives
Big data analytics has become an indispensable part of the digital age and will continue to gain significance in the future. By strengthening data-driven decision-making processes, this technology will enable businesses to maintain a competitive edge, foster groundbreaking scientific discoveries, and contribute to building a better future for societies.

Researchers:  Prof. Dr. Tansel Dökeroğlu

Relevant Courses: 

 
 

 

Software, Software Engineering
yazılım

Software engineering plays a crucial role in ensuring software quality, which directly impacts performance, reliability, and user satisfaction. Software quality processes involve various methodologies and practices applied throughout the software development lifecycle to maintain high standards.

Requirements Analysis
The first phase of software development, requirements analysis, ensures that user needs and system specifications are accurately identified. During this stage, the software’s objectives, functions, and constraints are defined in detail. Effective requirements analysis guarantees that the final product meets desired specifications and user expectations.

Design
Software design outlines the overall structure and components of the software. This stage is critical in ensuring modularity, flexibility, and maintainability. It involves creating detailed plans for system architecture, data flow, and component interactions, ensuring an efficient and scalable software solution.

Coding
The coding phase involves translating the design into actual software components. Developers follow best coding practices and standards to produce high-quality, maintainable code. The choice of programming languages and development tools directly impacts the software's performance and maintainability.

Testing
Software testing is a vital process that verifies whether the software functions correctly and meets specified requirements. Various testing techniques and strategies are employed to detect and fix errors and deficiencies. Key testing levels include:

Unit Testing – Verifies individual components.
Integration Testing – Ensures that different modules work together correctly.
System Testing – Evaluates the entire system's functionality.
Acceptance Testing – Confirms that the software meets business requirements.
Release and Deployment
The release and deployment phase involves delivering the software to end users while ensuring it is configured and installed correctly. This stage includes version management, deployment automation, and ensuring seamless user adoption. Tools for release management and automated deployment enhance efficiency and reliability.

Maintenance and Support
Throughout the software lifecycle, maintenance and support ensure that the software remains up-to-date, secure, and fully functional. This phase includes:

Bug Fixes – Addressing software defects.
Performance Enhancements – Optimizing system efficiency.
Feature Updates – Adding new functionalities based on user feedback.


Software Quality Assurance (QA)
Software Quality Assurance (QA) involves systematic approaches to ensure that software meets predefined quality standards. QA processes span the entire software development lifecycle, focusing on planning, monitoring, and evaluating to minimize defects, improve efficiency, and enhance user satisfaction.

Continuous Integration and Continuous Deployment (CI/CD)
CI/CD is a modern approach to accelerating software development, testing, and deployment.

Continuous Integration (CI): Ensures developers integrate code changes frequently, maintaining software consistency.
Continuous Deployment (CD): Automates software testing and deployment, enabling rapid and reliable updates.
CI/CD practices enhance development speed, detect errors early, and provide fast feedback to improve software quality.

These processes help maintain high-quality standards in software engineering, ensuring sustainable and efficient software solutions. By integrating quality assurance measures, software meets user expectations, remains reliable, and performs optimally. As technology advances, software engineering processes will continue to evolve, leading to enhanced quality and efficiency in software development.

Researchers: Dr. Öğr. Üyesi Özlem Albayrak

Relevant Courses: