2017 International Conference on Computer Science and Engineering (UBMK)最新文献

筛选
英文 中文
An overview of Internet of things and wireless communications 物联网与无线通信概述
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093446
Umit Deniz Ulusar, F. Al-turjman, Gurkan Celik
{"title":"An overview of Internet of things and wireless communications","authors":"Umit Deniz Ulusar, F. Al-turjman, Gurkan Celik","doi":"10.1109/UBMK.2017.8093446","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093446","url":null,"abstract":"Innovations in technology that have enabled efficient wireless tiny devices propelled the concept of Internet of Things. It is expected that mobile data traffic will experience 8-fold growth between 2015 and 2020 and the number of mobile connected devices will reach 11.6 billion by 2020. Main factors of this exponential growth and wide acceptance are the integration of several technologies and communications solutions such as wired and wireless sensor and actuator networks, next generation communication protocols, identification technologies, and artificial intelligence for smart objects. In this work, we explore the role of the IoT in various fields, consider technological aspects, and examine the challenges and opportunities the IoT offers.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129564101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Using cyber threat intelligence in SDN security 在SDN安全中使用网络威胁情报
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093415
Özgür Yürekten, Mehmet C. Demirci
{"title":"Using cyber threat intelligence in SDN security","authors":"Özgür Yürekten, Mehmet C. Demirci","doi":"10.1109/UBMK.2017.8093415","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093415","url":null,"abstract":"As the number and variety of cyber threats increase, it becomes more critical to share intelligence information in a fast and efficient manner. However, current cyber threat intelligence data do not contain sufficient information about how to specify countermeasures or how institutions should apply countermeasures automatically on their networks. A flexible and agile network architecture is required in order to determine and deploy countermeasures quickly. Software-defined networks facilitate timely application of cyber security measures thanks to their programmability. In this work, we propose a novel model for producing software-defined networking-based solutions against cyber threats and configuring networks automatically using risk analysis. We have developed a prototype implementation of the proposed model and demonstrated the applicability of the model. Furthermore, we have identified and presented future research directions in this area.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129589164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Turkish question answering application with course-grained semantic matrix representation of sentences 用粗粒度语义矩阵表示句子的土耳其语问答应用
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093464
Ilknur Dönmez, E. Adali
{"title":"Turkish question answering application with course-grained semantic matrix representation of sentences","authors":"Ilknur Dönmez, E. Adali","doi":"10.1109/UBMK.2017.8093464","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093464","url":null,"abstract":"In this paper a novel powerful method for Information Retrieval based Factoid Question Answering system is proposed. A factoid question has exactly one correct answer, and the answer is mostly a named entity like person, date, location etc. A rule-based method for question classification, query formulation and answer processing methods are explored based on our coarse-grained semantic representation for Turkish sentences. “HazırCevap” Question Answering Application which is intended for high-school students to support their education is used to evaluate the proposed method. Testing with a set of questions of HazırCevap dataset, the proposed Question Answering system scored 7.6% for Top5 accuracy, 12.6% for Top10 accuracy and 7.4% for Top20 accuracy which is minimum 7% higher than previ2ous state of the art method.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"95 S2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The stability and fragility of biological networks: Eukaryotic model organism Saccharomyces cerevisiae 生物网络的稳定性和脆弱性:真核模式生物酿酒酵母
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093575
Volkan Altuntas, Murat Gök
{"title":"The stability and fragility of biological networks: Eukaryotic model organism Saccharomyces cerevisiae","authors":"Volkan Altuntas, Murat Gök","doi":"10.1109/UBMK.2017.8093575","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093575","url":null,"abstract":"Recent studies of biological networks show that these networks are robust against the random or selective deletion of network nodes and / or edges. Ability to maintain performance of network under mutations is a key feature of live systems that has long been recognized. However, the molecular and cellular basis of this stability has just begun to be understood. Robustness is a key to understanding cellular complexity, illuminating design principles, and encouraging closer interaction between experiment and theory. A biological network mutation can be defined as the creation of a new network with k allowed network change operations for a given G network. While mutating the network, our goal is to observe the change in the measured distance estimate value after k changes of the defined distance measurement method M. In this study, the effects of edge deletion and edge insertion mutations on network topology and diffusion-based function estimation algorithms are investigated by using random mutation model on the protein-protein interaction network of eukaryote Saccharomyces cerevisiae yeast, containing 5936 nodes and 65139 edges. Experimental results shows that Saccharomyces cerevisiae protein-protein interaction network has high robustness against random mutations and that the generated mutations have no significant effect on network topology and estimation techniques.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121452329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart mirror applications with raspberry Pi 智能镜像应用与树莓派
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093566
Fatma Ok, Murat Can, Hakan Üçgün, Uğur Yüzgeç
{"title":"Smart mirror applications with raspberry Pi","authors":"Fatma Ok, Murat Can, Hakan Üçgün, Uğur Yüzgeç","doi":"10.1109/UBMK.2017.8093566","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093566","url":null,"abstract":"Intelligent mirrors, which continue the works today and will take its place in the future technology, provide both mirror and computer aided information services to its users. Thanks to the microcontroller cards onboard, these systems, which can connect to the internet and take data from the internet, can show this information on the places located on the mirror. In the scope of the study, the developed intelligent mirror system includes the weather information, time and location information, current event information, user information, and camera image taken from web services using Raspberry Pi 3 microcontroller card. Some equipment can be controlled by voice commands via the microphone on the smart mirror.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121644997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Student attedance system based on fingerprint 基于指纹的学生考勤系统
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093395
Zekeriya Turan, C. Karakuzu
{"title":"Student attedance system based on fingerprint","authors":"Zekeriya Turan, C. Karakuzu","doi":"10.1109/UBMK.2017.8093395","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093395","url":null,"abstract":"In this study, it is aimed to solve problem of polling that teachers constantly have problems with the fingerprint polling system. With the use of the system, time used for polling can be used for learning, teaching and time will be avoided. The problem of signing students instead of other students will also be removed with this system.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122537468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved antlion optimization algorithm 改进的antlion优化算法
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093562
Haydar Kiliç, Uğur Yüzgeç
{"title":"Improved antlion optimization algorithm","authors":"Haydar Kiliç, Uğur Yüzgeç","doi":"10.1109/UBMK.2017.8093562","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093562","url":null,"abstract":"In this study, improved antlion optimization algo-rithm (IALO) is presented. The antlion optimization algorithm (ALO) is an heuristic optimization algorithm based on modeling random walks of ants and hunting ants by antlions. The random walk model of ALO and the IALO revealed by improvements in the selection method have been tested with benchmark functions with different characteristics from the literature. The proposed algorithm is compared with different metrics (accuracy, optimality, best average solution, CPU time, etc.) with particle swarm optimization (PSO), artificial bee colony (ABC) and ant lion optimization algorithm (ALO). The IALO algorithm has an optimal result in a shorter time than the ALO, and it is understood that it is more successful than the ALO in the tests for high dimensional benchmark functions.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131601159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An approach for creation and implementation of national cyber security strategy 国家网络安全战略的制定和实施方法
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093373
Mustafa Senol
{"title":"An approach for creation and implementation of national cyber security strategy","authors":"Mustafa Senol","doi":"10.1109/UBMK.2017.8093373","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093373","url":null,"abstract":"In this study, it is aimed to demonstrate how to develop a strategy in order to ensure effective cyber security of the assets owned, information and communication systems and infrastructures in cyberspace and to be a powerful force in cyber warfare and deterrence in a country. In this context, an approach is established for the creation and implementation of a national cyber security strategy required related the subject, opinions are revealed and evaluations are made.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126848650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IBitABC: Improved binary artificial bee colony algorithm with local search IBitABC:改进的局部搜索二进制人工蜂群算法
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093589
Zeynep Banu Özger, B. Bolat, B. Diri
{"title":"IBitABC: Improved binary artificial bee colony algorithm with local search","authors":"Zeynep Banu Özger, B. Bolat, B. Diri","doi":"10.1109/UBMK.2017.8093589","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093589","url":null,"abstract":"Feature selection is a process of selecting a subset of features that is highly distinguishable from the data set to obtain better or at least equivalent success rates. Artificial Bee Colony (ABC) Algorithm is a intelligence algorithm that model the behavior of honey bees in the nature of food seeking behavior and has been developed to produce a solution at continuous space. BitABC is a bitwise operator based binary ABC algorithm that can produce fast results in binary space. In this study, BitABC was improved to increase the local search capacity and adapted to the feature selection problem to measure the success of the proposed method. The results obtained using 10 data sets from UCI Machine Learning Repository indicate the success of the proposed method.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126849964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Migrating Birds Optimization (MBO) algorithm to solve 0-1 multidimensional knapsack problem 求解0-1多维背包问题的候鸟优化算法
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093530
Vahit Tongur, Erkan Ülker
{"title":"Migrating Birds Optimization (MBO) algorithm to solve 0-1 multidimensional knapsack problem","authors":"Vahit Tongur, Erkan Ülker","doi":"10.1109/UBMK.2017.8093530","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093530","url":null,"abstract":"This study presents Migrating Birds Optimization (MBO) which is a novel meta-heuristic algorithm for the solution of 0-1 multidimensional knapsack problem. In the study, the basic migrating birds optimization algorithm is used and change is made to the only neighborhood structure of this algorithm for adapting to the addressed problem. The performance of the algorithm is examined on the test problems that selected from OR-library. The obtained results show that the migrating birds optimization algorithm has achieved successful results in 0-1 multidimensional backpack problems.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125412279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信