2021 6th International Conference on Computer Science and Engineering (UBMK)最新文献

筛选
英文 中文
Small Object Detection and Tracking from Aerial Imagery 基于航空图像的小目标检测与跟踪
2021 6th International Conference on Computer Science and Engineering (UBMK) Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558923
M. Aktaş, H. Ateş
{"title":"Small Object Detection and Tracking from Aerial Imagery","authors":"M. Aktaş, H. Ateş","doi":"10.1109/UBMK52708.2021.9558923","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558923","url":null,"abstract":"Object detection and tracking from airborne imagery draws attention to the parallel development of UAV systems and computer vision technologies. Aerial imagery has its own unique challenges that differ from the training set of modern-day object detectors, since it is made of images of larger areas compared to the regular datasets and the objects are very small on the contrary. These problems do not allow us to use common object detection models. The main purpose of this paper is to make modifications to the Faster-RCNN (FRCNN) model, then leverage it for small object detection and tracking from the aerial imagery. It is aimed to use both spatial and temporal information from the image sequence, as appearance information alone is insufficient. The anchors in the Region Proposal Network (RPN) stage will be adjusted for small objects. Also, intersection over union (IoU) is optimized for small objects. After improving detection performance, The DeepSORT algorithm is inserted right after the Region of Interest (ROI Head) to track the objects. The results show that the proposed model has good performance on the VisDrone-2019 dataset. Detection performance becomes considerably better than the original FRCNN and the algorithms that are evaluated in the VisDrone-2019 VID challenge. After completing the proposed modifications, the AP-AP50 values reached 14.07-29.41 from 8.08-18.70, which means approximately 75% improvement.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114723978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Benchmark Study on the Use of WebRTC Technology for Multimedia IoT 多媒体物联网中使用WebRTC技术的基准研究
2021 6th International Conference on Computer Science and Engineering (UBMK) Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558980
M. Seker, H. Kilinç
{"title":"A Benchmark Study on the Use of WebRTC Technology for Multimedia IoT","authors":"M. Seker, H. Kilinç","doi":"10.1109/UBMK52708.2021.9558980","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558980","url":null,"abstract":"The increase in Smart Things with video and audio features and multimedia traffic is expected to change the Internet of Things (IoT) architecture. Multimedia applications need high bandwidth and high CPU. WebRTC technology offers opportunities in this regard. In this study, the usability of WebRTC technology for multimedia applications on resource-constrained IoT devices is investigated. In this way, a benchmarking study is conducted to determine the requirements of IoT devices with audio and video capabilities. In the tests performed, the video quality and costs are investigated in low CPU and low bandwidth situations.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Navigation Patterns of a Hybrid Scanning Agent using Uninformed and Informed Search Algorithms for Reactive and Deliberative Behaviors 基于非知情和知情搜索算法的混合扫描代理的导航模式
2021 6th International Conference on Computer Science and Engineering (UBMK) Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558897
Hasibe Çoruh, İremnur Çivioğlu, Cevda Nur Öztürk
{"title":"Navigation Patterns of a Hybrid Scanning Agent using Uninformed and Informed Search Algorithms for Reactive and Deliberative Behaviors","authors":"Hasibe Çoruh, İremnur Çivioğlu, Cevda Nur Öztürk","doi":"10.1109/UBMK52708.2021.9558897","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558897","url":null,"abstract":"Hybrid agent architectures enable effective control layering the agent functions according to the sophistication they require. In this study, assuming a partially observable and deterministic environment, reactive and deliberative behaviors of a hybrid scanning agent were controlled using some uninformed and informed search algorithms, respectively. As the reactive layer decided the agent actions online in an unknown environment, a map of the environment was constructed in parallel. When the reactive layer failed to find a proper action, the deliberative layer proposed a solution offline using the constructed map so that the agent could continue its scanning task. The navigation patterns that were produced with the adapted algorithms in the reactive and deliberative layers were analyzed. The results showed that depth-first search (DFS) and breadth-first search (BFS) algorithms can be used as reactive motion planners for scanning an environment in zigzag and spiral patterns. Simulations in 25 grid-based environments with different sizes and varying percentages of obstacles yielded that running A* algorithm as a deliberative planner, the agent could completely scan the environments with equal successes for all different modes of the developed scanning algorithms. The horizontal mode of the DFS-based scanning algorithm had the least rescan rate on average.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125061662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Evaluation of AMQP, MQTT and HTTP Protocols Using Real-Time Public Smart City Data 基于实时公共智慧城市数据的AMQP、MQTT和HTTP协议的比较评估
2021 6th International Conference on Computer Science and Engineering (UBMK) Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9559032
Cavide Balkı Gemirter, Çağatay Şenturca, S. Baydere
{"title":"A Comparative Evaluation of AMQP, MQTT and HTTP Protocols Using Real-Time Public Smart City Data","authors":"Cavide Balkı Gemirter, Çağatay Şenturca, S. Baydere","doi":"10.1109/UBMK52708.2021.9559032","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559032","url":null,"abstract":"MQTT, AMQP and HTTP are messaging protocols that are commonly used for communicating with resource-constrained IoT devices. HTTP is the standard reference protocol for the REST transportation based on the request/response model, whereas both AMQP and MQTT are message-oriented protocols that use the publish/subscribe model. Message-oriented protocols enhance some of the shortcomings of the complex HTTP protocol by using asynchronous communication, changing the design from a document-centric to a data-centric approach and decreasing the header and message sizes. Although significant technical detail is present on these protocols, their real-time performance is insufficiently elaborated. In this paper, we present an experimental evaluation of these protocols conducted in a homogeneous IoT testbed using a real-time Smart City public data set. We provide the behavioral differences between messaging-based protocols and the REST-based HTTP protocol in terms of message latency and CPU usage for varying traffic loads and message sizes. The results showed that MQTT and AMQP are four times faster than HTTP protocol when comparing the message sent latencies. HTTP uses four times more CPU than the AMQP and MQTT protocols. In summary, message-oriented protocols give more stable and improved results as compared to the REST model-based HTTP protocol for all evaluation scenarios.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121945733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network Apk2Img4AndMal:基于卷积神经网络的Android恶意软件检测框架
2021 6th International Conference on Computer Science and Engineering (UBMK) Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558983
Oğuz Emre Kural, Durmuş Özkan Şahin, S. Akleylek, E. Kılıç, Murat Ömüral
{"title":"Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network","authors":"Oğuz Emre Kural, Durmuş Özkan Şahin, S. Akleylek, E. Kılıç, Murat Ömüral","doi":"10.1109/UBMK52708.2021.9558983","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558983","url":null,"abstract":"In this study, the Apk2Img4AndMal framework, which provides information about the application without the need for static or dynamic attributes, is recommended. The proposed framework reads APK files in binary format and converts them to grayscale images. In the classification phase of the framework, the convolutional neural network (CNN) is used, which gives successful results in image classification. In this way, the required features are obtained through a CNN. Therefore, there is also no feature extraction phase as other dynamic or static analysis-based frameworks. This property is the most important advantage of the Apk2Img4AndMal framework. The proposed framework is tested with 24588 Android malware and 3000 benign applications. The highest performance achieved in the study is up to 94%, according to the accuracy metric.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124099710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PSO based Blockchain Committee Member Selection 基于PSO的区块链委员会成员选择
2021 6th International Conference on Computer Science and Engineering (UBMK) Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9559004
Marwan S. Jameel, Oguz Yayla
{"title":"PSO based Blockchain Committee Member Selection","authors":"Marwan S. Jameel, Oguz Yayla","doi":"10.1109/UBMK52708.2021.9559004","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559004","url":null,"abstract":"Implementing blockchain systems with less amount of decentralized computation power is a challenging task. One of the most essential solution in scaling the blockchain is selection of a trusted committee (TC). We intend to develop and apply a new method for selecting committee members depending on their reputation via particle swarm optimization (PSO) based update of the behavior of nodes. Indeed, this is the same concept as accumulating participants in the blockchain throughout the previous rounds of the consensus procedure.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"93 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129390336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of RepVGG on Small Sized Dandelion Images Dataset in terms of Transfer Learning, Regularization, Spatial Attention as well as Squeeze and Excitation Blocks 基于小型蒲公英图像数据集的RepVGG迁移学习、正则化、空间注意、挤压块和激励块分析
2021 6th International Conference on Computer Science and Engineering (UBMK) Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558941
M. Nergiz
{"title":"Analysis of RepVGG on Small Sized Dandelion Images Dataset in terms of Transfer Learning, Regularization, Spatial Attention as well as Squeeze and Excitation Blocks","authors":"M. Nergiz","doi":"10.1109/UBMK52708.2021.9558941","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558941","url":null,"abstract":"The automated weed detection is an important research field in terms of agricultural productivity and economy. This study aims to apply RepVGG which is a new deep learning architecture developed on PyTorch framework and has promising results when trained and tested on ImageNet1K dataset. 920 images of the small sized Dandelion Images dataset is used for this study. Pretrained vanilla, pretrained and dropout regularized, squeeze and excitation block added and spatial attention block added versions of RepVGG are tested on the dataset. VGG16 method is also applied to the dataset and the results of the MobileNetV2 method is taken from the Kaggle Competition to get an insight about the baseline results of the classical state of the art models. The proposed RepVGG modifications could not outperform the state of the art methods on this dataset but the effect of the modifications are deeply analyzed and the best configuration is obtained by Squeeze and Excitation block added RepVGG-A0 architecture which is trained from scratch for 5 epochs and provided results of 0,875, 0,665, 0,89 and 0,74 for Accuracy, Recall, Precision and F1 metrics respectively.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130812776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Random Subspace Based Approach for Stress Classification from Smartphone Data 基于随机子空间的智能手机应力分类方法
2021 6th International Conference on Computer Science and Engineering (UBMK) Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558896
Ensar Arif Sağbaş, Serdar Çorukoğlu, Serkan Balli
{"title":"A Random Subspace Based Approach for Stress Classification from Smartphone Data","authors":"Ensar Arif Sağbaş, Serdar Çorukoğlu, Serkan Balli","doi":"10.1109/UBMK52708.2021.9558896","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558896","url":null,"abstract":"Stress is an important problem to deal with in today’s society. Thanks to the built-in sensors of smartphones, many operations can be performed unobtrusively. Accordingly, smartphones are among the indispensable data sources of research subjects. In this study, the problem of stress classification was discussed with the data obtained from smartphones. Sensor data were collected to examine users’ writing behavior. The features extracted from the obtained raw data were classified with the random subspace-based structures and their performances were compared. As a result of the study, it was observed that the stacking method showed promising results.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"94 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131025747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach to Use Modern Object Detection Methods More Efficiently on CCTV Systems 在闭路电视系统中更有效地利用现代目标检测方法的新途径
2021 6th International Conference on Computer Science and Engineering (UBMK) Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558899
Oguzhan Can, Sezai Burak Kantarci, Gozde Unal
{"title":"A New Approach to Use Modern Object Detection Methods More Efficiently on CCTV Systems","authors":"Oguzhan Can, Sezai Burak Kantarci, Gozde Unal","doi":"10.1109/UBMK52708.2021.9558899","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558899","url":null,"abstract":"DL architectures rely on extensive usage on powerful computer systems to operate in real-time. Therefore, cooperative and constructive optimizations should be made in both architecture and software parts of the related DL system. In this work, input system of the YOLO architecture is modified to accept several sources at the same time with two effective methods to increase the efficiency of the hardware system. First method is to design a scheduler which will allow YOLO architecture to process several input sources sequentially, allowing the architecture to use its full potential. Second method is to design a preprocessing algorithm to combine 4 or 9 input sources in a single input source as a 2x2 or 3x3 image matrix. In this way, YOLO architecture processes four or nine times more images in the same time, increasing its practical frame per second (FPS) value by four or nine folds. Experiment results on our machine show that the used YOLO architecture can process 3 input sources at the same time with only minimal loss of accuracy of 0.002 in terms of Mean Average Precision (mAP) while using the proposed scheduler. Additionally, using 4 inputs combined increases the practical FPS value from 31 to 120 and using 9 inputs increases the practical FPS value from 13 to 108, all while decreasing the mAP value by only 0.008 for 4 inputs and by only 0.034 for 9 inputs. Considering the obtained FPS values and achieved hardware efficiency, these minimal losses of mAP are easily acceptable.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128314310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Artificial Intelligence and Cyber Security 人工智能与网络安全综述
2021 6th International Conference on Computer Science and Engineering (UBMK) Pub Date : 2021-09-15 DOI: 10.1109/UBMK52708.2021.9558949
A. Okutan, Can Eyüpoğlu
{"title":"A Review on Artificial Intelligence and Cyber Security","authors":"A. Okutan, Can Eyüpoğlu","doi":"10.1109/UBMK52708.2021.9558949","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558949","url":null,"abstract":"Cyber attacks are carried out by unauthorized access to a system connected to an internet network anywhere in the world or by taking control of this system. These attacks continue to increase exponentially with the introduction of artificial intelligence technology, which has been used effectively in the field of science and engineering. With the use of artificial intelligence in the cyber field, conventional cyber attacks have begun to emerge as smart cyber attacks. Software development with traditional algorithms is insufficient to defend against attacks. In this study, studies in the literature on artificial intelligence methods used in the field of cyber security were examined. On the subjects discussed from different perspectives, solutions in terms of defense and attack, the applications used, the contexts between different disciplines, analyzes and examples on the basis of countries will be presented.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信