Bildiri Koleksiyonu
Bu koleksiyon için kalıcı URI
Güncel Gönderiler
Öğe Medical Device Tracking via QR Code and Efficiency Analyze(Ieee, 2016) Tiryakioğlu, Burak; Kayakutlu, Gülgün; Düzdar, İremAnesthetic gases called Desflurane supplied by distributor Company to the hospitals. These anesthetic gases transferred to the patients in a controlled manner via medical devices named Vaporizer (VAP) which are integrated to the anesthesia devices; used especially in operating rooms. Updated hospital VAP inventories are reported to the head office by the sales team on a monthly basis. By tracking the monthly gas consumption of the VAP's, we are calculating the efficiency of devices per hospital. Thus, the performance metrics of the sales team can be evaluated. Which device; belongs to which hospital and under whose responsibility, device manufacturing date etc. can he easily observed at first look. However, missing/false statements have a huge negative impact on inventory, efficiency and performance indicators. The newly established tracking and analysis system, at the base of Clustering Method, comes with Quick Response (QR) Barcode systems which will he scanned via smartphones or tablets. The sales team easily share VAP's; current GPS Coordinates, correct inventory list and device data, responsible person etc. Analyzing and evaluation of inventory, efficiency and performance will be done clearly, trustable and easily. This will he an useful application, for such an integrated system already does not exist.Öğe Comparing of Results and Implemantation of Clustering Methods of Data Mining Software with a Data Set(Ieee, 2017) Argun, İrem Düzdar; Temür, GünayIn data mining, the process of grouping similar data among each other in an evaluation made by the same kind of data is called clustering. Clusters are usually computed by algorithms that take advantage of relational or remote neighborhood relations to each other. A large number of clustering methods are used in practice. In this study, the differences between open source software used in data mining and results obtained by clustering methods of Oracle, Knime, Weka and RapidMiner programs are tabulated. As a source for this study, clustering analysis based article presentations by M. Turanli, U.H. Ozden and S. Turedi have been handled. For the evaluation, in 2006, economic similarities of 29 countries from candidate and member countries from the EU in terms of proprtion of inflation, Gross National Product, Internet Usage, Unemployment, Lifetime Education Indicators and Imports and Exports were tried to be clustered. Clustering operations were performed separately as 2-3-4 clusters in each program. In the clustering process, the euclidean distance is set for calculation and the number of iterations is 99 in each program. The obtained results were written in tabular form and the results were interpreted.Öğe Risk analysis of the autonomous vehicle driving systems by using pythagorean fuzzy AHP(Springer Verlag, 2020) Karaşan, Ali; Kaya, İhsan; Erdoğan, Melike; Budak, AyşenurAutonomous driving system (ADS) is a combination of different components those can be composed as operations of the automobile and decision making mechanisms both in regular time and unexpected situations. These operations are performed by a virtual driver to carry out the objectives that are determined by the users. The main advantages of ADS are to free the drivers from attention states which are presented by American Automobile Association Foundation (AAAF). At the same time, there are some safety risks for these systems those need to be tested and solved. In this paper, we analyzed ADS to prioritize risks by using Pythagorean fuzzy sets (PFSs) that can be used to represent uncertainty in decision process. For this aim, a methodology based on Pythagorean analytic hierarchy process (PAHP) has been suggested. By the way, the Hazard Analysis and Risks Assessment introduced in the ISO 26262 standards are taken as a basis for risk evaluation. © 2020, Springer Nature Switzerland AG.Öğe Evaluation of defense strategies by using a MCDM methodology based on neutrosophic sets: A case study for Turkey(Springer Verlag, 2020) Karaşan, Ali; Kaya, İhsan; Erdoğan, Melike; Özkan, Betül; Çolak, MuratMilitary operations are vital activities that are involving many risks from different perspectives. Although these operations are carried out for multiple purposes which can be classified as the minimum damage that is taken and the maximum damage that is given. The officers who are responsible for the strategy determination for the operations are one of the most effective factors of the results. Since the system has multi experts, multi criteria and many alternatives, it is suitable to apply a multi criteria decision making (MCDM) methodology for the decision-making process. In this study, defence strategies are evaluated with respect to the determined criteria based on the decision makers’ judgements by using CODAS method based on Neutrosophic Sets that can be able to manage both qualitative and quantitative data. © 2020, Springer Nature Switzerland AG.Öğe Evaluating blockchain risks by using a MCDM methodology based on pythagorean fuzzy sets(Springer Verlag, 2020) Özkan, Betül; Kaya, İhsan; Erdoğan, Melike; Karaşan, AliUsing blockchain technology (BT) in companies has become more common nowadays. But implementing a new BT contains many risk factors from different perspectives. Some of these risks can be critical for companies’ processes. These risks should be carefully identified and analyzed to minimize the negative effects of them. Evaluation of the risks can be considered as a multi criteria decision making (MCDM) problem. In this study, the risks that can occur when implementing BT are evaluated by using a MCDM methodology based on Pythagorean fuzzy analytic hierarchy process (PF-AHP). By using Delphi method, the risks are determined and the problem is constructed as a hierarchical form. After that, the risks are prioritized by using PF-AHP and the most important risks are obtained. The main aim of this paper is to help companies to determine which risks are more critical and to which of them should be given more priority during BT implementation. © 2020, Springer Nature Switzerland AG.Öğe A fuzzy based MCDM methodology for risk evaluation of cyber security technologies(Springer Verlag, 2020) Erdoğan, Melike; Karaşan, Ali; Kaya, İhsan; Budak, Ayşenur; Çolak, MuratCyber security that also known as information technology security is to protect computers, mobile devices, servers, electronic systems and networks from malicious digital attacks. In recent years, cyber security threats have been a growing problem for any critical digital infrastructure and various cyber-attacks created over the Internet are also becoming a big issue for the society. Therefore, the use of technologies developed to provide cyber security is very important. However, the risks of cyber security technologies should be taken into account when choosing among cyber security technologies. For this aim, we have proposed a multi-criteria decision making (MCDM) methodology based on hesitant fuzzy sets (HFSs) that gives experts extra flexibility in using linguistic terms to evaluate the criteria and alternatives to determine the best cyber security technology. For this aim, a study has also been discussed which deals with risk factors in the selection of cyber security technologies via fuzzy MCDM process. © 2020, Springer Nature Switzerland AG.