{"title":"Small Object Detection and Tracking from Aerial Imagery","authors":"M. Aktaş, H. Ateş","doi":"10.1109/UBMK52708.2021.9558923","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558923","url":null,"abstract":"Object detection and tracking from airborne imagery draws attention to the parallel development of UAV systems and computer vision technologies. Aerial imagery has its own unique challenges that differ from the training set of modern-day object detectors, since it is made of images of larger areas compared to the regular datasets and the objects are very small on the contrary. These problems do not allow us to use common object detection models. The main purpose of this paper is to make modifications to the Faster-RCNN (FRCNN) model, then leverage it for small object detection and tracking from the aerial imagery. It is aimed to use both spatial and temporal information from the image sequence, as appearance information alone is insufficient. The anchors in the Region Proposal Network (RPN) stage will be adjusted for small objects. Also, intersection over union (IoU) is optimized for small objects. After improving detection performance, The DeepSORT algorithm is inserted right after the Region of Interest (ROI Head) to track the objects. The results show that the proposed model has good performance on the VisDrone-2019 dataset. Detection performance becomes considerably better than the original FRCNN and the algorithms that are evaluated in the VisDrone-2019 VID challenge. After completing the proposed modifications, the AP-AP50 values reached 14.07-29.41 from 8.08-18.70, which means approximately 75% improvement.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114723978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Benchmark Study on the Use of WebRTC Technology for Multimedia IoT","authors":"M. Seker, H. Kilinç","doi":"10.1109/UBMK52708.2021.9558980","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558980","url":null,"abstract":"The increase in Smart Things with video and audio features and multimedia traffic is expected to change the Internet of Things (IoT) architecture. Multimedia applications need high bandwidth and high CPU. WebRTC technology offers opportunities in this regard. In this study, the usability of WebRTC technology for multimedia applications on resource-constrained IoT devices is investigated. In this way, a benchmarking study is conducted to determine the requirements of IoT devices with audio and video capabilities. In the tests performed, the video quality and costs are investigated in low CPU and low bandwidth situations.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Navigation Patterns of a Hybrid Scanning Agent using Uninformed and Informed Search Algorithms for Reactive and Deliberative Behaviors","authors":"Hasibe Çoruh, İremnur Çivioğlu, Cevda Nur Öztürk","doi":"10.1109/UBMK52708.2021.9558897","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558897","url":null,"abstract":"Hybrid agent architectures enable effective control layering the agent functions according to the sophistication they require. In this study, assuming a partially observable and deterministic environment, reactive and deliberative behaviors of a hybrid scanning agent were controlled using some uninformed and informed search algorithms, respectively. As the reactive layer decided the agent actions online in an unknown environment, a map of the environment was constructed in parallel. When the reactive layer failed to find a proper action, the deliberative layer proposed a solution offline using the constructed map so that the agent could continue its scanning task. The navigation patterns that were produced with the adapted algorithms in the reactive and deliberative layers were analyzed. The results showed that depth-first search (DFS) and breadth-first search (BFS) algorithms can be used as reactive motion planners for scanning an environment in zigzag and spiral patterns. Simulations in 25 grid-based environments with different sizes and varying percentages of obstacles yielded that running A* algorithm as a deliberative planner, the agent could completely scan the environments with equal successes for all different modes of the developed scanning algorithms. The horizontal mode of the DFS-based scanning algorithm had the least rescan rate on average.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125061662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cavide Balkı Gemirter, Çağatay Şenturca, S. Baydere
{"title":"A Comparative Evaluation of AMQP, MQTT and HTTP Protocols Using Real-Time Public Smart City Data","authors":"Cavide Balkı Gemirter, Çağatay Şenturca, S. Baydere","doi":"10.1109/UBMK52708.2021.9559032","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559032","url":null,"abstract":"MQTT, AMQP and HTTP are messaging protocols that are commonly used for communicating with resource-constrained IoT devices. HTTP is the standard reference protocol for the REST transportation based on the request/response model, whereas both AMQP and MQTT are message-oriented protocols that use the publish/subscribe model. Message-oriented protocols enhance some of the shortcomings of the complex HTTP protocol by using asynchronous communication, changing the design from a document-centric to a data-centric approach and decreasing the header and message sizes. Although significant technical detail is present on these protocols, their real-time performance is insufficiently elaborated. In this paper, we present an experimental evaluation of these protocols conducted in a homogeneous IoT testbed using a real-time Smart City public data set. We provide the behavioral differences between messaging-based protocols and the REST-based HTTP protocol in terms of message latency and CPU usage for varying traffic loads and message sizes. The results showed that MQTT and AMQP are four times faster than HTTP protocol when comparing the message sent latencies. HTTP uses four times more CPU than the AMQP and MQTT protocols. In summary, message-oriented protocols give more stable and improved results as compared to the REST model-based HTTP protocol for all evaluation scenarios.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121945733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oğuz Emre Kural, Durmuş Özkan Şahin, S. Akleylek, E. Kılıç, Murat Ömüral
{"title":"Apk2Img4AndMal: Android Malware Detection Framework Based on Convolutional Neural Network","authors":"Oğuz Emre Kural, Durmuş Özkan Şahin, S. Akleylek, E. Kılıç, Murat Ömüral","doi":"10.1109/UBMK52708.2021.9558983","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558983","url":null,"abstract":"In this study, the Apk2Img4AndMal framework, which provides information about the application without the need for static or dynamic attributes, is recommended. The proposed framework reads APK files in binary format and converts them to grayscale images. In the classification phase of the framework, the convolutional neural network (CNN) is used, which gives successful results in image classification. In this way, the required features are obtained through a CNN. Therefore, there is also no feature extraction phase as other dynamic or static analysis-based frameworks. This property is the most important advantage of the Apk2Img4AndMal framework. The proposed framework is tested with 24588 Android malware and 3000 benign applications. The highest performance achieved in the study is up to 94%, according to the accuracy metric.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124099710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PSO based Blockchain Committee Member Selection","authors":"Marwan S. Jameel, Oguz Yayla","doi":"10.1109/UBMK52708.2021.9559004","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9559004","url":null,"abstract":"Implementing blockchain systems with less amount of decentralized computation power is a challenging task. One of the most essential solution in scaling the blockchain is selection of a trusted committee (TC). We intend to develop and apply a new method for selecting committee members depending on their reputation via particle swarm optimization (PSO) based update of the behavior of nodes. Indeed, this is the same concept as accumulating participants in the blockchain throughout the previous rounds of the consensus procedure.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"93 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129390336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of RepVGG on Small Sized Dandelion Images Dataset in terms of Transfer Learning, Regularization, Spatial Attention as well as Squeeze and Excitation Blocks","authors":"M. Nergiz","doi":"10.1109/UBMK52708.2021.9558941","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558941","url":null,"abstract":"The automated weed detection is an important research field in terms of agricultural productivity and economy. This study aims to apply RepVGG which is a new deep learning architecture developed on PyTorch framework and has promising results when trained and tested on ImageNet1K dataset. 920 images of the small sized Dandelion Images dataset is used for this study. Pretrained vanilla, pretrained and dropout regularized, squeeze and excitation block added and spatial attention block added versions of RepVGG are tested on the dataset. VGG16 method is also applied to the dataset and the results of the MobileNetV2 method is taken from the Kaggle Competition to get an insight about the baseline results of the classical state of the art models. The proposed RepVGG modifications could not outperform the state of the art methods on this dataset but the effect of the modifications are deeply analyzed and the best configuration is obtained by Squeeze and Excitation block added RepVGG-A0 architecture which is trained from scratch for 5 epochs and provided results of 0,875, 0,665, 0,89 and 0,74 for Accuracy, Recall, Precision and F1 metrics respectively.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130812776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Random Subspace Based Approach for Stress Classification from Smartphone Data","authors":"Ensar Arif Sağbaş, Serdar Çorukoğlu, Serkan Balli","doi":"10.1109/UBMK52708.2021.9558896","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558896","url":null,"abstract":"Stress is an important problem to deal with in today’s society. Thanks to the built-in sensors of smartphones, many operations can be performed unobtrusively. Accordingly, smartphones are among the indispensable data sources of research subjects. In this study, the problem of stress classification was discussed with the data obtained from smartphones. Sensor data were collected to examine users’ writing behavior. The features extracted from the obtained raw data were classified with the random subspace-based structures and their performances were compared. As a result of the study, it was observed that the stacking method showed promising results.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"94 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131025747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Approach to Use Modern Object Detection Methods More Efficiently on CCTV Systems","authors":"Oguzhan Can, Sezai Burak Kantarci, Gozde Unal","doi":"10.1109/UBMK52708.2021.9558899","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558899","url":null,"abstract":"DL architectures rely on extensive usage on powerful computer systems to operate in real-time. Therefore, cooperative and constructive optimizations should be made in both architecture and software parts of the related DL system. In this work, input system of the YOLO architecture is modified to accept several sources at the same time with two effective methods to increase the efficiency of the hardware system. First method is to design a scheduler which will allow YOLO architecture to process several input sources sequentially, allowing the architecture to use its full potential. Second method is to design a preprocessing algorithm to combine 4 or 9 input sources in a single input source as a 2x2 or 3x3 image matrix. In this way, YOLO architecture processes four or nine times more images in the same time, increasing its practical frame per second (FPS) value by four or nine folds. Experiment results on our machine show that the used YOLO architecture can process 3 input sources at the same time with only minimal loss of accuracy of 0.002 in terms of Mean Average Precision (mAP) while using the proposed scheduler. Additionally, using 4 inputs combined increases the practical FPS value from 31 to 120 and using 9 inputs increases the practical FPS value from 13 to 108, all while decreasing the mAP value by only 0.008 for 4 inputs and by only 0.034 for 9 inputs. Considering the obtained FPS values and achieved hardware efficiency, these minimal losses of mAP are easily acceptable.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128314310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Artificial Intelligence and Cyber Security","authors":"A. Okutan, Can Eyüpoğlu","doi":"10.1109/UBMK52708.2021.9558949","DOIUrl":"https://doi.org/10.1109/UBMK52708.2021.9558949","url":null,"abstract":"Cyber attacks are carried out by unauthorized access to a system connected to an internet network anywhere in the world or by taking control of this system. These attacks continue to increase exponentially with the introduction of artificial intelligence technology, which has been used effectively in the field of science and engineering. With the use of artificial intelligence in the cyber field, conventional cyber attacks have begun to emerge as smart cyber attacks. Software development with traditional algorithms is insufficient to defend against attacks. In this study, studies in the literature on artificial intelligence methods used in the field of cyber security were examined. On the subjects discussed from different perspectives, solutions in terms of defense and attack, the applications used, the contexts between different disciplines, analyzes and examples on the basis of countries will be presented.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}