{"title":"An overview of Internet of things and wireless communications","authors":"Umit Deniz Ulusar, F. Al-turjman, Gurkan Celik","doi":"10.1109/UBMK.2017.8093446","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093446","url":null,"abstract":"Innovations in technology that have enabled efficient wireless tiny devices propelled the concept of Internet of Things. It is expected that mobile data traffic will experience 8-fold growth between 2015 and 2020 and the number of mobile connected devices will reach 11.6 billion by 2020. Main factors of this exponential growth and wide acceptance are the integration of several technologies and communications solutions such as wired and wireless sensor and actuator networks, next generation communication protocols, identification technologies, and artificial intelligence for smart objects. In this work, we explore the role of the IoT in various fields, consider technological aspects, and examine the challenges and opportunities the IoT offers.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129564101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using cyber threat intelligence in SDN security","authors":"Özgür Yürekten, Mehmet C. Demirci","doi":"10.1109/UBMK.2017.8093415","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093415","url":null,"abstract":"As the number and variety of cyber threats increase, it becomes more critical to share intelligence information in a fast and efficient manner. However, current cyber threat intelligence data do not contain sufficient information about how to specify countermeasures or how institutions should apply countermeasures automatically on their networks. A flexible and agile network architecture is required in order to determine and deploy countermeasures quickly. Software-defined networks facilitate timely application of cyber security measures thanks to their programmability. In this work, we propose a novel model for producing software-defined networking-based solutions against cyber threats and configuring networks automatically using risk analysis. We have developed a prototype implementation of the proposed model and demonstrated the applicability of the model. Furthermore, we have identified and presented future research directions in this area.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129589164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Turkish question answering application with course-grained semantic matrix representation of sentences","authors":"Ilknur Dönmez, E. Adali","doi":"10.1109/UBMK.2017.8093464","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093464","url":null,"abstract":"In this paper a novel powerful method for Information Retrieval based Factoid Question Answering system is proposed. A factoid question has exactly one correct answer, and the answer is mostly a named entity like person, date, location etc. A rule-based method for question classification, query formulation and answer processing methods are explored based on our coarse-grained semantic representation for Turkish sentences. “HazırCevap” Question Answering Application which is intended for high-school students to support their education is used to evaluate the proposed method. Testing with a set of questions of HazırCevap dataset, the proposed Question Answering system scored 7.6% for Top5 accuracy, 12.6% for Top10 accuracy and 7.4% for Top20 accuracy which is minimum 7% higher than previ2ous state of the art method.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"95 S2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The stability and fragility of biological networks: Eukaryotic model organism Saccharomyces cerevisiae","authors":"Volkan Altuntas, Murat Gök","doi":"10.1109/UBMK.2017.8093575","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093575","url":null,"abstract":"Recent studies of biological networks show that these networks are robust against the random or selective deletion of network nodes and / or edges. Ability to maintain performance of network under mutations is a key feature of live systems that has long been recognized. However, the molecular and cellular basis of this stability has just begun to be understood. Robustness is a key to understanding cellular complexity, illuminating design principles, and encouraging closer interaction between experiment and theory. A biological network mutation can be defined as the creation of a new network with k allowed network change operations for a given G network. While mutating the network, our goal is to observe the change in the measured distance estimate value after k changes of the defined distance measurement method M. In this study, the effects of edge deletion and edge insertion mutations on network topology and diffusion-based function estimation algorithms are investigated by using random mutation model on the protein-protein interaction network of eukaryote Saccharomyces cerevisiae yeast, containing 5936 nodes and 65139 edges. Experimental results shows that Saccharomyces cerevisiae protein-protein interaction network has high robustness against random mutations and that the generated mutations have no significant effect on network topology and estimation techniques.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121452329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart mirror applications with raspberry Pi","authors":"Fatma Ok, Murat Can, Hakan Üçgün, Uğur Yüzgeç","doi":"10.1109/UBMK.2017.8093566","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093566","url":null,"abstract":"Intelligent mirrors, which continue the works today and will take its place in the future technology, provide both mirror and computer aided information services to its users. Thanks to the microcontroller cards onboard, these systems, which can connect to the internet and take data from the internet, can show this information on the places located on the mirror. In the scope of the study, the developed intelligent mirror system includes the weather information, time and location information, current event information, user information, and camera image taken from web services using Raspberry Pi 3 microcontroller card. Some equipment can be controlled by voice commands via the microphone on the smart mirror.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121644997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Student attedance system based on fingerprint","authors":"Zekeriya Turan, C. Karakuzu","doi":"10.1109/UBMK.2017.8093395","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093395","url":null,"abstract":"In this study, it is aimed to solve problem of polling that teachers constantly have problems with the fingerprint polling system. With the use of the system, time used for polling can be used for learning, teaching and time will be avoided. The problem of signing students instead of other students will also be removed with this system.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122537468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved antlion optimization algorithm","authors":"Haydar Kiliç, Uğur Yüzgeç","doi":"10.1109/UBMK.2017.8093562","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093562","url":null,"abstract":"In this study, improved antlion optimization algo-rithm (IALO) is presented. The antlion optimization algorithm (ALO) is an heuristic optimization algorithm based on modeling random walks of ants and hunting ants by antlions. The random walk model of ALO and the IALO revealed by improvements in the selection method have been tested with benchmark functions with different characteristics from the literature. The proposed algorithm is compared with different metrics (accuracy, optimality, best average solution, CPU time, etc.) with particle swarm optimization (PSO), artificial bee colony (ABC) and ant lion optimization algorithm (ALO). The IALO algorithm has an optimal result in a shorter time than the ALO, and it is understood that it is more successful than the ALO in the tests for high dimensional benchmark functions.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131601159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach for creation and implementation of national cyber security strategy","authors":"Mustafa Senol","doi":"10.1109/UBMK.2017.8093373","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093373","url":null,"abstract":"In this study, it is aimed to demonstrate how to develop a strategy in order to ensure effective cyber security of the assets owned, information and communication systems and infrastructures in cyberspace and to be a powerful force in cyber warfare and deterrence in a country. In this context, an approach is established for the creation and implementation of a national cyber security strategy required related the subject, opinions are revealed and evaluations are made.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126848650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IBitABC: Improved binary artificial bee colony algorithm with local search","authors":"Zeynep Banu Özger, B. Bolat, B. Diri","doi":"10.1109/UBMK.2017.8093589","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093589","url":null,"abstract":"Feature selection is a process of selecting a subset of features that is highly distinguishable from the data set to obtain better or at least equivalent success rates. Artificial Bee Colony (ABC) Algorithm is a intelligence algorithm that model the behavior of honey bees in the nature of food seeking behavior and has been developed to produce a solution at continuous space. BitABC is a bitwise operator based binary ABC algorithm that can produce fast results in binary space. In this study, BitABC was improved to increase the local search capacity and adapted to the feature selection problem to measure the success of the proposed method. The results obtained using 10 data sets from UCI Machine Learning Repository indicate the success of the proposed method.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126849964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Migrating Birds Optimization (MBO) algorithm to solve 0-1 multidimensional knapsack problem","authors":"Vahit Tongur, Erkan Ülker","doi":"10.1109/UBMK.2017.8093530","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093530","url":null,"abstract":"This study presents Migrating Birds Optimization (MBO) which is a novel meta-heuristic algorithm for the solution of 0-1 multidimensional knapsack problem. In the study, the basic migrating birds optimization algorithm is used and change is made to the only neighborhood structure of this algorithm for adapting to the addressed problem. The performance of the algorithm is examined on the test problems that selected from OR-library. The obtained results show that the migrating birds optimization algorithm has achieved successful results in 0-1 multidimensional backpack problems.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125412279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}