• Sonuç bulunamadı

Deep Learning

N/A
N/A
Protected

Academic year: 2022

Share "Deep Learning"

Copied!
139
0
0

Yükleniyor.... (view fulltext now)

Tam metin

(1)

Deep Learning

Aleyna Işıkdağlılar 152120171057 Sina Kuşoğlu 152120171039 Mislina Çetiner 152120171005

What is AI?

Artificial intelligence can be considered the all- encompassing umbrella. It refers to computer

1

(2)

AI-Machine Learning-Deep

Learning

In the Google Trends graph above, you can see that AI was the more popular search term until machine learning passed it for good around September 2015. Machine learning has become one of – if not the – main applications of artificial intelligence.

Deep Learning

The expression “deep learning”

was first used when talking about Artificial Neural Networks (ANNs) by Igor Aizenberg and colleagues in or around 2000.

In a nutshell, deep learning is a way to achieve machine learning. As ANNs became more powerful and complex – and literally deeper with many layers and neurons – the ability for deep learning to facilitate robust machine learning and produce AI increased.

3

4

(3)

What Are The Areas For Using Of Deep Learning?

Face recognition

Voice recognition 5

(4)

What Do Famous People Think About AI?

7

8

(5)

https://experiments.withgoogle.com/collection/ai 9

(6)

References

https://www.import.io/post/history-of-deep-learning/

https://www.habertekno.com/

Nvidia

https://experiments.withgoogle.com/

*Aslı Çalışkan 152120161030

*Doğukan Kahveci 152120131102

*Alperen Çetin 152120161023

Introduction to Computer Engineering

11

12

(7)

Subtitles

Classical Logic

Fuzzy Logic

Diffrences Between Classical and Fuzzy Logic

Questions About Topic

References

13

(8)

Some mammals are carnivores; all mammals are animals; therefore, some animals are carnivores.

15

16

(9)

17

(10)

Diffrences Between

19

20

(11)

Question 1

The truth values of traditional set theory is ____________ and that of fuzzy set is __________

a) Either 0 or 1, between 0 & 1 b) Between 0 & 1, either 0 or 1 21

(12)

Answer 1

A

Explanation: Refer the definition of Fuzzy set and Crisp set.

Question 2

The room temperature is hot. Here the hot (use of linguistic variable is used) can be represented by _______

a) Fuzzy Set

b) Crisp Set

c) Fuzzy & Crisp Set

d) None of the mentioned 23

24

(13)

Answer 2

A

Explanation: Fuzzy logic deals with linguistic variables.

Question 3

Fuzzy logic is usually represented as

a) IF-THEN-ELSE rules b) IF-THEN rules 25

(14)

Answer 3

B

Explanation: Fuzzy set theory defines fuzzy operators on fuzzy sets. The problem in applying this is that the appropriate fuzzy operator may not be known. For this reason, fuzzy logic usually uses IF-THEN rules, or constructs that are equivalent, such as fuzzy associative matrices.

Rules are usually expressed in the form:

IF variable IS property THEN action

References

https://www.dersimiz.com

https://www.sanfoundry.com

Brighterion.com

Mathworks.com

Slideshare.net

https://www.doc.ic.ac.uk 27

28

(15)

ONUR AKKEPENEK 152120171023 ECE MELİS BOZDAĞ

152120171055 BERKAY HÜSEYİNOĞLU

152120171032

INTRODUCTION TO COMPUTER ENGINEERING

CONTENTS

• Definition of artificial intelligence

• The main artificial intelligence methods

• Artificial intelligence applications in medicine

• The Articles Published

29

(16)

Artificial intelligence applications and methods in medicine

“The science and engineering of making intelligent machines”.

31

32

(17)

The main artificial intelligence methods :

✓Expert systems

✓Fuzzy logic

✓Genetic algorithm

✓ Artificial neural networks

• Expert systems are computer systems which are capable of modeling reasoning and

decision-making that can be done by a person skilled in the art.

33

(18)

• Genetic algorithms are searches and optimization

methods that works in a way which is similar to the

evolutionary process observed in nature.

• These systems are acting on the principle of survival

of the best.

Unclear medical conditions can be defined by fuzzy sets.

• Fuzzy logic proposes methods of generating solutions with approximate results.

• Each entity in the fuzzy set has a membership degree. According to these values, it takes the one tone of gray.

35

36

(19)

• ANN simulates the operation of a simple biological nervous system.

• ANN is capable of

learning, memorizing and

37

(20)

• In order to show the desired behavior, it must be adjusted accordingly , in other words , it must be educated.

• ANN is one of the most important tools used in modeling and decision making.

39

40

(21)

Artificial intelligence applications in medicine

Evaluation of results.

Survival rates Classification

of diseases

Artificial neural networks-Fuzzy logic Analysis

Modeling Be understandable

41

(22)

• Heart diseases

• Determination of growth and development period

• Liver diseases

• Detection of nodules in lung tomography images and characterization of

nodules by artificial intelligence

43

44

(23)

The Articles Published

• Artificial Intelligence in Medicine

• Computers in Biology and Medicine

• Computer Methods and Programs in Biomedicine

• Medical & Biological Engineering & Computing

REFERENCES

• Turkiye Klinikleri J Med Sci 2009;29(2):314-20

http://www.yogunbakimdergisi.org/managete/fu_folder/2010- 01/html/2010-9-1-031-041.htm)

• https://fikirjeneratoru.com/cesitli-yapay-zeka-tekniklerinin- 45

(24)

Question 1

Who talked about artificial intelligence for the first time?

A)John McCarthy B)Alex De Souza C)Tom Hardy D)Aristo

Question 2

• Which is not the main artificial intelligence method?

A) Expert systems B)Fuzzy logic

C)Genetic algorithm D) Fibonacci array

47

48

(25)

ONUR AKKEPENEK 152120171023 ECE MELİS BOZDAĞ

152120171055 BERKAY HÜSEYİNOĞLU

152120171032

INTRODUCTION TO COMPUTER ENGINEERING

CONTENTS

• Definition of artificial intelligence

• The main artificial intelligence methods

• Artificial intelligence applications in medicine

• The Articles Published

49

(26)

Artificial intelligence applications and methods in medicine

“The science and engineering of making intelligent machines”.

51

52

(27)

The main artificial intelligence methods :

✓Expert systems

✓Fuzzy logic

✓Genetic algorithm

✓ Artificial neural networks

• Expert systems are computer systems which are capable of modeling reasoning and

decision-making that can be done by a person skilled in the art.

53

(28)

• Genetic algorithms are searches and optimization

methods that works in a way which is similar to the

evolutionary process observed in nature.

• These systems are acting on the principle of survival

of the best.

Unclear medical conditions can be defined by fuzzy sets.

• Fuzzy logic proposes methods of generating solutions with approximate results.

• Each entity in the fuzzy set has a membership degree. According to these values, it takes the one tone of gray.

55

56

(29)

• ANN simulates the operation of a simple biological nervous system.

• ANN is capable of

learning, memorizing and

57

(30)

• In order to show the desired behavior, it must be adjusted accordingly , in other words , it must be educated.

• ANN is one of the most important tools used in modeling and decision making.

59

60

(31)

Artificial intelligence applications in medicine

Evaluation of results.

Survival rates Classification

of diseases

Artificial neural networks-Fuzzy logic Analysis

Modeling Be understandable

61

(32)

• Heart diseases

• Determination of growth and development period

• Liver diseases

• Detection of nodules in lung tomography images and characterization of

nodules by artificial intelligence

63

64

(33)

The Articles Published

• Artificial Intelligence in Medicine

• Computers in Biology and Medicine

• Computer Methods and Programs in Biomedicine

• Medical & Biological Engineering & Computing

REFERENCES

• Turkiye Klinikleri J Med Sci 2009;29(2):314-20

http://www.yogunbakimdergisi.org/managete/fu_folder/2010- 01/html/2010-9-1-031-041.htm)

• https://fikirjeneratoru.com/cesitli-yapay-zeka-tekniklerinin- 65

(34)

Question 1

Who talked about artificial intelligence for the first time?

A)John McCarthy B)Alex De Souza C)Tom Hardy D)Aristo

Question 2

• Which is not the main artificial intelligence method?

A) Expert systems B)Fuzzy logic

C)Genetic algorithm D) Fibonacci array

67

68

(35)

Cloud Computing

Ahmad Zaidan Kumbukani Kamanga

Boburshoh Abdulov

What is Cloud Computing

• Cloud computing is simply accessing all computer services like storage, processing and security on different digital platforms from any remote location using the internet

• The word cloud is used because of the analogy between the property of rain clouds and the way the cloud computing is designed

69

(36)

History of Cloud Computing

• The idea originally came after the DARPA (the Defense Advanced Research Projects Agency), presented MIT with $2 million for Project MAC.

The MAC project was one that allowed multiple users to use the same computer simultaneously

• Then the concept of virtualization began to get popular which led to the development of modern cloud computing.

• In the late 1990s it gained a lot of popularity since people started getting better understanding of what cloud computing is.

71

72

(37)

How Does Cloud Computing Work?

A lot of us actually use cloud computing in our daily lives. If you have used the email then you have used cloud computing. What you are loading on your machine is only an application, you only log into a web service and all the data and applications needed to run this service are on a device in a different location.

By adopting the cloud, companies are relying on an automated decision making system t o reduce the number of the staff they need to perform complex calculations, analysis, a nd to actually maintain the system.

73

(38)

• Cost effective

• Easy to implement

• Secure and reliable

• You can access it anytime and anywhere

• Flexible and scalable

Risks of Using Cloud Computing

• Loss or theft of data stored on the cloud

• Loss of control over end user actions

• Spreading of malware through the cloud that do planned attacks

• Loss of customer trust due to data breaches

75

76

(39)

What is the Cloud Made of?

• The cloud can be divided broadly into two layers – the front end and back end.

• On the front end of the cloud there is the things that can be seen by the user.

• On the back end of the cloud there are the things that run the system.

Types of Cloud

Based on a Deploymen t Model

Based on Service

Public Cloud

IaaS

Private Cloud

PaaS

77

(40)

Based on a Deployment Model

• Public Cloud:

1. The whole computing infrastructure is not located in the same location as the customer 2. Excel in performance but vulnerable to attacks

3. Customer has no control on the physical infrastructure

• Private Cloud:

1. Provides same benefits just with dedicated private hardware 2. It’s not shared with anyone making it more secure

3. Can be on premises of the company or remotely located

• Hybrid Cloud:

Uses both private and public clouds depending on the purpose

• Community Cloud:

Implies an infrastructure that is shared between organizations for the reason of shared information between them.

Based on Service

79

80

(41)

Challenges Facing Cloud Computing

• Lack of Resources and Expertise

• Security

• Segmented usage and adoption

• Performance Dependency

Companies that Implemented Cloud Computing

• Netflix

• Xerox

• Instagram

81

(42)

Cloud Computing is the Future!

• Artificial Intelligence

• Internet of Everything

• Blockchain

• Autonomous Vehicles

Exam Questions

Which of the following is NOT a benefit of cloud computing?

a) You can access it anytime anywhere b) Loss or theft of data stored on the cloud c) Cost effective

d) Secure and reliable

83

84

(43)

Exam Questions

Which of the following is a type of cloud?

a) Mushroom cloud b) Cirrus cloud

c) Cumulonimbus cloud d) Private cloud

Resources

• http://insights.motherg.com/blog/blog/why-is-it-called-cloud-computing

• https://www.ibm.com/cloud/learn/what-is-cloud-computing

• https://www.smartdatacollective.com/7-well-known-companies-have-moved-cloud/

85

(44)

Thank You!

Introduction & History of Computers

Computer Engineering Department Introduction to Computer Engineering

Prepared by: Aysegul Kadem(152120171044) Hager Hamza(152120171075)

Belal Rahimi(152120171077)

07.12.2018 87

88

(45)

Contents

* What is a Computer?

* Data and Information

* Information Technology (IT)

* History of Computers

* Generations

* Two questions

* Summary

* References

What is a Computer?

Definition: A computer is a calculating machine that can perform arithmetic operation at a very high speed.

Or you can say computers are electronic devices that accept data(input), process them into information, produce outputand storethem.

89

(46)

Data and Information

Data: A collection of raw facts and figures is called data which may consist of numbers , characters, symbols etc.

Information: processed, organized and meaningful data is called information.

Information Technology

Information technology is the use of systems (especially computers and telecommunications) for storing and sending information.

Computeris a very important component of information technology. 91

92

(47)

History of Computers

First of all before computers people were doing the job.

Ancient Counting Machines: the Abacus(3000 BCE)

Oughtred’s(1621) and Schickard’s(1623) slide rule

93

(48)

Blaise Pascal’s Pascaline(1645)

Charles Babbage(1791-1871) The father of computers

Difference Engine Analytical Engine

95

96

(49)

ENIAC(Electronic Numerator Integrator Analyzer And Computer)

This huge machine was accepted as the first computer(1946)

Turing machine was used to crack German secret codes in second world war.

EDVAC(Electronic Discrete Variable Automatic Computer)

It was 10 times smaller and working 100 times faster than ENIAC.

97

(50)

IBM 700 series & UNIVAC

People started using computers with vacuum tubes after 1950 which IBM and UNIVAC are from this type of computers.

Intel 4004 Microprcessor

Words first microprocessor with 2300 transistors after 1970.

99

100

(51)

Apple (1977)

This pc was introduced by two university students which didn’t have keyboard and monitor. They were using it in a house garage.

The first Apple personal computer is Apple Macintosh.

IBM PC

The fist personal computer which was introduced in 1981 and it was running the Microsoft Disk Operating System(MS-DOS).

101

(52)

Generations

First generation-Vacuum Tubes:

1. From 1946-195

It can perform 2,000 to 16,000 additions per second

2.Used Vacuum tubes 3.Very large machines

Special rooms and special trained technicians

Second Generation - Transistors

1. From 1959 to around 1965

2.Smaller,faster,and more reliable Used transistors

6,000 to 3,00,000 operations

3. one-tenth the price of a 1st Generation

4.become common in larger businesses and universities 103

104

(53)

Third Generation – Integrated Circuits

1.Form 1965 to around 1972

2.Used integrated circuits- many transistors on one piece of silicon

3.Smaller,faster,more reliable,and lower in price

4.These Computers become very common in medium to large businesses

Fourth Generation - Microprocessors

1.From 1972 until now

2.Used large scale to very large scale integrated circuits

3.smaller,faster,more reliable, and lower in price

105

(54)

Two questions

1. Who was named the father of Computers?

A) Leo Messi B) Michael Jackson C) Bill gates D) Charles Babbage

2. Which computers were the biggest?

A) Second generation B) third generation C) first generation D) fourth generation

Summary

Computer definition

Data and information

The ancient machines

How computers found

The first PC

Dates and founder of computers

Generations of computers 107

108

(55)

References

Books:

Websites: Bilgisayar ve bilgisayarin tarihcesi.Retrieved October 5,2011,from https://atabilgisayardonanim.wordpress.com/2011/10/bilgisayar-ve- bilgisayarin-tarihcesi2.pdf

Bernard John Poole,A Brief history of computers,from www.pitt.edu/~super7/44011-45001/44911.ppt

109

(56)

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 111

Industrial Revolution

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 112

111

112

(57)

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 113

What is Industry 4.0 ¿

Industry 4.0 in general terms; Robotic production is taken over completely, development of artificial intelligence, production of three-dimensional printers from factories to homes, huge amounts of information by analyzing the data collected by data analysis and many other innovations can be examined.

113

(58)

INDUSTRY 4.0 DESIGN PRINCIPLES

The design principles allow manufacturers to investigate a potential transformation to Industry 4.0 technologies. These are the design principles:

Interoperability

Virtualization

➢Decentralization

➢Real-Time Capability

Service-Orientation

➢Modularity

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 115

Advantages of Industry 4.0

1. Efficiency

With fewer people and more automation, companies can make decisions more rapidly and keep efficiency high. Automation also tends to keep quality high, and that’s an area that further boosts

efficiency.

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 116

115

116

(59)

2. Agility

With a focus on high mix, small lots, and even one-off manufacturing, Industrie 4.0 brings agility to the next level. When products know their own specifications, it accelerates processes throughout production processes.

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 117

3. Innovation

Since Industrie 4.0 production lines are made to accommodate high mix and low volumes, they are ideally suited to new product introduction and experimentation in design.

4. Customer experience

The responsiveness and deep information availability available with Industry 4.0 mean manufacturers can give customers better service. In some cases, self-service views into the 117

(60)

5. Costs

While Industrie 4.0 will require initial investments, once the intelligence is built into products and processes, the costs will plummet. Fewer quality problems lead to less material waste, lower personnel and operating costs. The speed and ability to handle such a high mix seamlessly will also lower costs.

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 119

6. Revenues

With better quality, lower costs, higher mix, and the ability to serve customers well, Industrie 4.0 puts manufacturers on a path to be a preferred supplier to current customers. It also opens up ways to serve larger markets, offer

customized and thus higher-margin products, and with intelligent products and operations to offer services to accompany the products.

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 120

119

120

(61)

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 121

BIG DATA AND ANALYTICS

In an Industry 4.0 context, the collection and comprehensive evaluation of data from many different sources—production equipment and systems as well as enterprise- and customer-management systems—will become standard to support real-time decision making.

AUTONOMOUS ROBOTS

Robots will eventually interact with one another and work safely side by side with humans and learn from them. These robots will cost less and have a greater range of capabilities than those used in manufacturing today.

121

(62)

SIMULATION

Simulations will be used more extensively in plant operations to leverage real-time data and mirror the physical world in a virtual model, which can include machines, products, and humans.

THE INDUSTRIAL INTERNET OF THINGS

This will allow field devices to communicate and interact both with one another and with more centralized controllers, as necessary. It will also decentralize analytics and decision making, enabling real-time responses.

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 123

CYBERSECURITY

With the increased connectivity and use of standard

communications protocols that come with Industry 4.0, the need to protect critical industrial systems and manufacturing lines from cybersecurity threats increases dramatically. As a result, secure, reliable communications as well as sophisticated identity and access management of machines and users are essential.

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 124

123

124

(63)

ADDITIVE MANUFACTURING Companies have just begun to

adopt additive manufacturing, such as 3- D printing, which they use mostly to prototype and produce individual components. With Industry 4.0, these additive-manufacturing methods will be widely used to produce small batches of customized products that offer

construction advantages, such as complex, lightweight designs.

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 125

AUGMENTED REALITY Augmented-reality-based systems support a variety of services, such as selecting parts in a warehouse and sending repair instructions over mobile devices. These systems are currently in their infancy, but in the future, companies will make much broader use of 125

(64)

REFERENCES

https://www.endustri40.com/katmanli-uretimde-otonom-orumcek-robotlar/

https://www.endustri40.com/endustri-tarihine-kisa-bir-yolculuk/

https://www.bcg.com/capabilities/operations/embracing-industry-4.0-rediscovering- growth.aspx

https://youtu.be/c3kP-jjgx1E

ENES SOLAK ORHAN İNAÇ İBRAHİM ERTAN YILMAZ 127

iPhone/iPad Operating System (iOS)

Berkay Gönenç GÖKSAL 152120171016

Alihan DEMİRCİ 152120161004 127

128

(65)

Overview

• What is an Operating Sytsem?

• What is iOS?

• History of iOS

• iOS Jailbreaking

• Features

What is an Operating System?

A set of programs that Examples of the widely

129

(66)

What is iOS?

• Originally known as the iPhone OS, the name was changed with the introduction of the iPad.

• iOS is a mobile operating system for Apple-manufactured devices. iOS runs on the iPhone, iPad, iPod Touch and Apple TV.

Original iOS logo, used until 2013 (left) and logo used 2013–18 (right)

History of iOS

• The operating system was unveiled with the iPhone at the Macworld Conference &

Expo on January 9, 2007, and released in June of that year.

• At the time of its unveiling in January, Steve Jobs claimed: "iPhone runs OS X" and runs

"desktop applications", but at the time of the iPhone's release, the operating system was renamed "iPhone OS".

131

132

(67)

• Since its initial release, iOS has been subject to a variety of different hacks centered around adding functionality not allowed by Apple. Prior to the 2008 debut of Apple's native iOS App Store, the primary motive for jailbreaking was to bypass Apple's purchase mechanism for installing the App Store's native applications.

• In 2010, the Electronic Frontier Foundation (EFF) successfully convinced the U.S. Copyright Office to allow an exemption to the general prohibition on circumvention of copyright protection systems under the Digital Millennium Copyright Act (DMCA). The exemption allows jailbreaking of iPhones for the sole purpose of allowing legally obtained applications to be added to the iPhone

Features

29 June 2007 iPhone OS 1; Third-party native applications were not supported.

11 July 2008 17 June 2009

iPhone OS 3; It was the last version dropped the "iPhone OS" naming

convention.

133

(68)

Features

21 June 2010

iOS 4; The operating system added a multitasking feature, letting apps dealing

with internet calling, location and audio playback function in the background.

12 October 2011

iOS 5; Revamped notifications, the operating sytem also added iCloud and

iMessage. For the first time, system software updates can be installed

wirelessly. Siri introduced.

19 September 2012 iOS 6; added a new Apple Maps app and

a Passbook app, for managing different types of tickets. FaceTime was updated to work over a cellular connection.

Features

10 June 2013

iOS 7; The new look, featuring flatter icons, introduced AirDrop, CarPlay,

phone and car integration and automatic app updates in the App Store.

17 September 2014

iOS 8; updated keyboard with QuickType, app updates in the release

included the new Health app. Apple updated its Music app with a streaming

service called Apple Music. Siri has Turkish language option in 8.3 update.

16 September 2015 iOS 9; Apple added a Night Shift mode, brought new user experience functions, including Quick Actions, and Peek and

Pop, based on the touch-sensitive display technology in the iPhone 6S

135

136

(69)

Features

13 September 2016 iOS 10; Maps has a redesigned interface,

Photos has algorithmic search and categorization of media known as

"Memories". Native apps could be removed.

19 September 2017

iOS 11; Siri was updated to translate between languages, camera had new settings for improved portrait-mode

photos, operating system also introduced the ability to record the

screen.

17 September 2018

137

(70)

Thanks For Listening to Us

REFERENCES

• www.apple.com

• en.wikipedia.org/wiki/IOS

• shiftdelete.net 139

140

(71)

For the first time, which version of İos has Turkish language option for Siri?

A) 7.0 B) 8.3 C) 8.1.1 D) 9.1 E) 7.3.2

What does iOS mean?

A) Inspiration Operate System B) iPod Operate Systems C) Icarus Operating System

D) iPhone/iPad Operating System

141

(72)

Smart E-Commerce Systems

İNTRODUCTION to COMPUTER ENGİNEERİNG

İZZET ÇAKAR

ÖZHAN NEDİM EYÜPREİSOĞLU

What İs E-Commerce Systems ?

E-compare systems are the sofware that allows you to shop online from the internet.

You need to have a website to trade.

After your site is opened,virtual pos systems need to be integrated,then you can add your products to your site and start your trade

143

144

(73)

Using

There is a panel designed to easily manage your site

With this panel you can add and delete products to your site, You can change to publish announcements or orders

Free and paid softwares

There are free and paid ecommerce softwares.

However,paid softwares has more advantages.

145

(74)

Business to Consumer (B2C)

Companies sell products to consumers on website.

The using of this software is expected to increase.

Business to Business (B2B)

It is called inter-agency trade.

Companies enter to the international market with this softwares.

147

148

(75)

Business to Goverment (B2G)

Companies give less price for institutions.

Comsumer to Goverment (C2G)

The state receives certain fees on the internet from citizen.

149

(76)

Consumer to Consumer (C2C)

it is called the trade between consumers on the Internet

How many are e-commerce software modules?

a)1 b)2 c)3 d)4 e)5 151

152

(77)

Which one is example for costumer to costumer(C2C)

a)www.gittigidiyor.com b)www.teknosa.com c)www.vatanbilgisayar.com d)www.hepsiburada.com e)www.amazon.com

vIruses In programs

■ INTRODUCTION TO COMPUTER ENGINEERING

153

(78)

What Is The Computer Virus?

➢ Computer viruses are small software programs.

➢ A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents.

➢ Viruses often perform some type of harmful activity on infected hosts.

Types of Computer Virus

Boot Virus

➢Boot viruses infects the boot records of hard disk and floppy disks. Generally these are considered more dangerous than program viruses.

File Virus

➢These viruses infect program files, which have extensions such as .COM,.EXE.,SYS.,DLL,.OVL, or .SCR

Macro Virus

➢A macro virus is a computer virus that replaces a macro, which is what enables a program to work and instigates a designated group of actions and commands.

When these actions and commands are replaced by a virus, this can cause significant harm to a computer.

155

156

(79)

How Does Computer Virus Spread?

➢ E-mail attachments

➢ Downloads

➢ Shared files

➢ Cracked Softwares

➢ Fake Websites

➢ Networks

➢ From Mobile Devices

What Does a Computer Virus Do?

➢ A virus tries to take control of computer system it has infected at the first opportunity availible.It makes copies of itself and also try to carry harmful task written in its program. This process can happen so quickly that the user is not even aware of the presence of a virus in his/her computer.

➢ A virus might corrupt or delete data on your computer, use your e-mail 157

(80)

How to Identify Computer Viruses?

➢ Computer speaks to me.

➢ Computer running extremely slow.

➢ Applications won’t start.

➢ Can’t connect internet or internet slows.

➢ System memory and disk space is reduced.

➢ Error messages on regular basis.

Prevention from Computer Viruses

➢ Install reliable Anti-virus program

➢ Avoid opening suspicious websites

➢ Never opening attachment without scanning

➢ Set-up automatic scanning

➢ Know what to look

➢ Install a firewall (Screening) 159

160

(81)

Best Antivirus Softwares

➢ Norton antivirus

➢ MacAfee virus scan

➢ Kaspersky antivirus

References:

➢ http://www.antivirusworld.com/articles/history.php

http://www.articlesbase.com/information-technology- articles/antivirus-history- 277310.html

https://en.wikipedia.org/wiki/Computer_virus 161

(82)

Which of the following is NOT a harmful software?

A) Worms B) SpyWare C) Trojan Horses D) FireWall E) Rootkits

Which of the following is NOT a way to protect your computer from a virus?

A) Disable autorun

B) Use an anti-virus program.

C) Clear Internet cache and browsing history.

D) Be cautious with emails links.

E) Don’t sneeze to computer.

163

164

(83)

HISTORY OF INTERNET

FATİH ARSLAN152120161003 HASAN DALKILIÇ152120171004

T

HE HISTORY OF THE

I

NTERNET BEGINS WITH THE DEVELOPMENT OF ELECTRONIC COMPUTERS IN THE

1950

S

. I

NITIAL CONCEPTS OF

W

IDE AREA NETWORKING ORIGINATED IN

SEVERAL COMPUTER SCIENCE LABORATORIES IN THE

U

NITED

S

TATES

, U

NITED

K

INGDOM

,

AND

F

RANCE

.

A

RPANET WHICH FIRST USED NETWORK WAS DEVELOPED BY 165

(84)

THE FIRST MESSAGE WAS SENT OVER THE ARPANET IN 1969 FROM COMPUTER SCIENCE

PROFESSOR LEONARD KLEINROCK'S LABORATORY AT UNIVERSITY OF CALIFORNIA.

• D

ONALD DAVIES FOUNDED PACKET SWITCHING SUCH AS

ARPANET, NPL

NETWORK

, CYCLADES, M

ERIT

N

ETWORK

, T

YMNET IN

1967

AT THE NATINONAL PHYSICS LABORATORY IN THE

UK.

167

168

(85)

TCP/IP WAS DEVELOPED BYROBERT E.KHAN AND VINT CERF IN THE1970S AND BECAME THE STANDARD NETWORKING PROTOCOL ON THEARPANET.

THE NSF FUNDED THE ESTABLISHMENT FOR NATIONAL SUPERCOMPUTING CENTERS AT SEVERAL UNIVERSITIES

,

AND PROVIDED INTERCONNECTIVITY IN

1986

WITH

THE NSFNET

P

ROJECT

.

• C

OMMERCIAL INTERNET SERVİCE PROVIDERS

(ISP

S

)

BEGAN TO EMERGE IN THE VERY LATE

1980

S

.

IN THE

1980

S

,

TIM BERNERS

-

LEE RESULTED IN THE

W

ORLD WIDE WEB

(

WWW

),

LINKING HYPERTEXT DOCUMENTS INTO AN INFORMATION SYSTEM

,

ACCESSIBLE FROM ANY NODE ON THE NETWORK

.

169

(86)

• 1990

S

,

ARPANET AND NSFNET WERE ENDED

. S

O

,

THE

I

NTERNET HAS HAD A REVOLUTIONARY IMPACT ON CULTURE

,

COMMERCE

,

AND TECHNOLOGY SUCH AS ELECTRONIC MAIL

,

INSTANT MESSAGING

,

VOICE OVER INTERNET PROTOCOL

(V

O

IP)

TELEPHONE CALLS

,

TWO

-

WAY INTERACTIVE VIDEO CALLS

,

AND THE

W

ORLD WIDE WEB WITH ITS DISCUSSION

FORUM

,

BLOGS

,

SOCIAL NETWORKING

,

AND ONLINE SHOPPING SITES

.

• T

HE RESEARCH AND EDUCATION COMMUNITY CONTINUES TO DEVELOP AND USE ADVANCED NETWORKS SUCH AS

JANET

IN THE

U

NITED

K

INGDOM AND

I

NTERNET

2

IN THE

U

NITED

S

TATES

. I

NCREASING AMOUNTS OF DATA ARE TRANSMITTED AT HIGHER AND

HIGHER SPEEDS OVER FIBER OPTIC NETWORKS OPERATING AT

1 G

BIT

/

S

, 10 G

BIT

/

S

,

OR MORE

.

171

172

(87)

• T

HE

I

NTERNET

'

S TAKEOVER OF THE GLOBAL COMMUNICATION LANDSCAPE WAS ALMOST INSTANT IN HISTORICAL TERMS

:

IT ONLY COMMUNICATED

1%

OF THE INFORMATION FLOWING THROUGH TWO

-

WAY TELECOMMUNICATIONS NETWORKS IN THE YEAR

1993,

ALREADY

51%

BY

2000,

AND MORE THAN

97%

OF THE TELECOMMUNICATED INFORMATION BY

2007.

TODAY THE INTERNET CONTINUES TO GROW, DRIVEN BY EVER GREATER AMOUNTS OF ONLINE INFORMATION, COMMERCE, ENTERTAINMENT, AND SOCIAL NETWORKING. HOWEVER, THE

FUTURE OF THE GLOBAL INTERNET MAY BE SHAPED BY REGIONAL DIFFERENCES IN THE WORLD.

173

(88)

QUESTIONS 1: WHAT IS THE ‘WWW’?

A)WORLD WIRELESS WEB B)WORLD WIDE WEB C)WORLD WARE WEB D)WORLD WEAK WEB

QUESTION 2: WHO DID SEND THE FIRST MESSAGE OVER THE INTERNET?

A)BILL GATES B)STEVE JOBS

C)DONALD DAVIES D)CHARLES BABBAGE E)LEONARD KLEINROCK

175

176

(89)

REFERENCES:

HTTPS://EN.WİKİPEDİA.ORG/WİKİ/HİSTORY_OF_THE_INTERNET HTTPS://TR.WİKİPEDİA.ORG/WİKİ/%C4%B0NTERNET%27İN_TARİHİ HTTPS://TEKNOKOLİKER.COM/2014/01/İNTERNET-TARİHİ-VE- GECMİSTEN-GUNUMUZE-İNTERNETİN-GELİSİMİ.HTML

HTTPS://WWW.YENİSAFAK.COM/BİLGİ/TURKİYEDE-İNTERNETİN-KİSA- TARİHİ-3404209

HTTPS://WWW.LİVESCİENCE.COM/20727-İNTERNET-HİSTORY.HTML HTTPS://İNTERNET-MAP.NET/

INTRODUCTION TO COMPUTER ENGINEERING

177

(90)

Cyber is an abstract and broad infrastructure that works in the information systems infrastructure.

179

180

(91)

• Cybercrime

• Cyber ​​Terrorism

• State Supported Cyber ​​Attacks

Through informatics

systems crimes committed.

181

(92)

Cyber ​​terrorism is the action taken through computer systems to achieve a specific political goal.

183

184

(93)

The security of information and informatics systems is becoming part of national and

international security.

In the near future, inter-state fight will be concentrated in cyber space.

185

(94)

• Bacteria l

• Worm,

• Virus,

• Trojan horse,

• Logic bomb,

• Back door,

• Slave computers,

• Rootkit,

• Advanced Cyber

​​Threats,

• Attack kits.

187

188

(95)

• Authentication systems,

• The firewall,

• Antivirus,

• Data leakage prevention system,

• Network access control system,

• Content filter,

• Encryption Systems,

• Digital signature…

REFERENCES

● http://www.bilgesam.org/Images/Dokumanlar/0- 81-2014041721siberguvenlik.ppt

● http://www.istanbulsaglik.gov.tr/w/anasayfalinkler/

belge/siber_guvenlik_sunum.pdf

189

(96)

I.Worm II.Virus

III.Trojan horse

Which malicious software can be given as an example?

A) I-II B)I-III C)II-III D)I-II-III

191

192

(97)

LINUX

CONTENT PAGE

Free Software

Linux’s History

Features

Windows vs Linux

GNU/Linux Distributions

193

(98)

Free Software

Free Software is a concept related to the freedom of users to run, copy, distribute, work, modify and develop software.

Free software is a program used and distributed at no charge to the user.

Yasemin Gerboğa-152120171056/Eda Çam-152120171037

Free Software

Freedom to run the software for any purpose.(Freedom # 0)

Whatever you want it to learn how the program works and the freedom to change it.(Freedom #1)

Freedom to distribute copies.(Freedom #2)

Freedom to develop and publish the program so that the whole community can benefit.(Freedom #3)

Yasemin Gerboğa-152120171056/Eda Çam-152120171037 195

196

(99)

Free Software Applications

Photo editing: GIMP

Video player: VLC Media Player

Streaming audio: Spotify

Virtual machines: VirtualBox

LibreOffice

Firefox

7zip

FileZilla

Yasemin Gerboğa-152120171056/Eda Çam-152120171037

LINUX’S HISTORY

LINUX is a core of a Unix based operating system which is started to develop by a student (Linus Torvalds)of Computer at Helsinki

University to try the architecture of protectedmode of Intel’s new processor 80386.

197

(100)

LINUX’S HISTORY

It’s a open source free software that has been developed rapidly by the contribution of many software developers from all over the world after the announcement made on the Internet and it is still developing with the same support.

Yasemin Gerboğa-152120171056/Eda Çam-152120171037

FEATURES

Security vulnerabilities are less than other operating systems.

You have a very fast computer without worrying about your system.

Programs that are completely similar to an application that we purchase for a fee are free of charge.

Continuous update and long-term product support.

Yasemin Gerboğa-152120171056/Eda Çam-152120171037 199

200

(101)

FEATURES

From a crashed windows system, you can recover the data with linux.

You can use it without leaving a trace with Life run feature.

You can make changes with Linux. You can create panels and interfaces.

Yasemin Gerboğa-152120171056/Eda Çam-152120171037

WINDOWS VS LINUX

WINDOWS LINUX

Attack / Security More than 11000 to date malicious software was discovered.

Nearly 800 malware attacks have occurred.

Control Control operating system

hand is.

User-managed system.

Price from $ 45- $ 450 from $ 0 - $ 350

201

(102)

GNU/LINUX DISTRIBUTIONS

Linux distribution is a collection of free softwafe projects that have become a complete operating system.

Yasemin Gerboğa-152120171056/Eda Çam-152120171037

GNU/LINUX DISTRIBUTIONS

Yasemin Gerboğa-152120171056/Eda Çam-152120171037 203

204

(103)

GNU/LINUX DISTRIBUTIONS

Slackware Linux

Redhat

Fedora Core

Mandriva

SuSe(Software and System Development)

Debian

Ubuntu

Pardus

Yasemin Gerboğa-152120171056/Eda Çam-152120171037

PARDUS is an open source operating system based on Debian GNU/ Linux. It can be downloaded for free and easily installed over the Internet. In order to make Pardus a competitive and sustainable operating system

GNU/LINUX DISTRIBUTIONS

205

(104)

Why should I use linux?

To forget the virus word forever.

Because it's free.

Since you don't need to install more tools after installing the system.

To avoid dealing with drivers.

Update your software with a single click.

Yasemin Gerboğa-152120171056/Eda Çam-152120171037 207

208

(105)

Where is GNU/Linux used?

GNU/Linux;It is used in automation systems, servers,digital sensors of cars,operating systems of televisions, the majority of mobile devices, defense industry, aircraft software, radars,ships,banks and so on.

Yasemin Gerboğa-152120171056/Eda Çam-152120171037

Companies and Devices Running on GNU/Linux

209

(106)

Linux’s Commands

Pwd: If we want to know which file we're in, we write pwd.

Ls:"Ls" command is used to know which files in the current directory.

CD: " cd " is the command used to go to a directory.

mkdir & rmdir: " mkdir "command is used when you create a folder or directory. " Rmdir" can be used to delete an empty directory.

Yasemin Gerboğa-152120171056/Eda Çam-152120171037

Linux’s Commands

Man:The man command is used to learn more about and how to use a command.

Nano: " nano " is the text editor currently installed on the Linux command line.

gcc: GNU C compiler

Whoami:Tells who you are.

Sudo: " sudo " is a command commonly used in the Linux command line. Sudo comes from the word ”SuperUserDo Sud. We can use this command if we want to use root privileges in an operation or if an administrative structure is required.

Yasemin Gerboğa-152120171056/Eda Çam-152120171037 211

212

(107)

1)Which of the following is not a Linux distribution?

A)Ubuntu

B)Mandriva

C)Fedora

D)Unix

E) Debian

Yasemin Gerboğa-152120171056/Eda Çam-152120171037

2)What is the task of the mkdir command?

A) It is used to learn more about and how to use a command.

B) It is the text editor currently installed on the Linux command line.

C) It is used when you create a folder or directory.

213

(108)

RESOURCE

https://www.cloudeos.com/topluluk/hangi-isletim-sistemi-secmelisiniz https://linux.web.tr/blog/15/linux-dagitimi-secimi

https://xaphtrick.wordpress.com/2008/04/30/linux-uzerinde-gcc-kullanimi-c-kodlarini-derleme-ve- calistirma/

https://wiki.ubuntu-tr.net/index.php?title=Temel_Linux_komutları

https://aktif.net/tr/Aktif-Blog/Teknik-Makaleler/Yeni-Baslayanlar-icin-Basit-Linux-Komutlari https://fossbytes.com/windows-10-free-open-source-software-alternative/

https://www.pcgamer.com/the-best-free-pc-software/

https://www.gnu.org/philosophy/free-sw.tr.html

https://medium.com/türkiye/özgür-yazılım-ve-açık-kaynak-dünyası-1fe42df1591b https://www.profelis.com.tr/tr/blog/yazi/1808/linux-ve-windows-farki/

https://www.bilisimkonulari.com/windows-ile-linuxun-karsilastirilmasi.html https://www.technopat.net/sosyal/konu/linux-ve-windows-karsilastirilmasi.301904/

https://onedio.com/haber/ozgurluge-ve-ozgur-yazilima-destek-18-maddeyle-neden-windows-yerine- linux-kullanmaliyiz-717488

https://www.gnu.org/philosophy/categories.tr.html

https://bianet.org/bianet/kultur/13818-ozgur-yazilim-linux-windowsa-karsi https://www.pardus.org.tr

https://linux.org.tr/linux-nedir/

http://www.belgeler.org/lis/archive-tlkg-lis-1g.html

Yasemin Gerboğa-152120171056/Eda Çam-152120171037

Thanks for listening!

Eda Çam 152120171037

Yasemin Gerboğa 152120171056

215

216

(109)

217

(110)

A cryptocurrency is a digital or virtual currency that uses cryptography for security.

Cryptocurrencies are systems that allow for the secure payments of online transactions.

Cryptocurrencies are making it easier to transfer funds directly between two peers in a transaction, without the need for a trusted third party such as a bank or credit card company

219

220

(111)

❖Fast Transactions

❖Staying Anonymous While Transactions

❖No Third Party Expenses

❖Peer to Peer System

❖Blocks

❖Security Protoco

❖Mining and System Gifts

221

(112)

223

224

(113)

225

(114)

227

228

Referanslar

Benzer Belgeler

Use of the natural scale parameter on the appropriate spherical reference surface avoids shearing and thus keeps the number of samples equal to the true number of degrees of freedom

İradesini alan bu imam efendi Sultan Muradın dairesine gider; harem halkile beraber Sultan Murat ta namaza durur.. İmam efendi sabık hakanın ak­ lını, sıhhatini

Pertev Naili Boratav’ın çalışmalarının Türkiye’ye getirilmesi konusunun gündeme geleceği sem­ pozyumun ardından saat 20.30’da Truva Folklor

[r]

[r]

Advocates of the Aligarh Movement made efforts to regenerate the Muslims by imparting modern education along with traditional education and they adopted a policy of co- operation

Quantitative Analysis Methods are classified into two groups according to the method used and the substance to be analyzed.. *Quantitative Analysis Methods according to the

 At the eutectic point, three phases (liquid, solid salol, and solid thymol) coexist. The eutectic point therefore denotes an invariant system because, in a