2017 International Conference on Computer Science and Engineering (UBMK)最新文献

筛选
英文 中文
Smart pregnancy tracker system using social knowledge networks for women 智能孕期跟踪系统,利用社会知识网络为女性服务
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093503
Yunus Santur, Sinem Güven Santur, Mehmet Karaköse
{"title":"Smart pregnancy tracker system using social knowledge networks for women","authors":"Yunus Santur, Sinem Güven Santur, Mehmet Karaköse","doi":"10.1109/UBMK.2017.8093503","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093503","url":null,"abstract":"Today, people use the internet extensively to meet their information needs, to socialize, to communicate, to handle formal and informal processes. The web-based information networks established for this purpose are growing day by day and reach a larger audience. Facebook, the world's largest social network, has reached 2 billion users. There are social information networks established for different purposes as well. In this study, it was aimed to construct a social information network specific to women. It is to create a social information network specific to women targeted for work. In web-based network working with membership logic, members can access informative contents such as follow-up of processes such as period, pregnancy, baby vaccination schedule, body mass index, calculators such as baby percentile, tests, articles and visual aided trainings.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-stream word-based compression algorithm 多流字压缩算法
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093552
Emir Öztürk Altan Mesut, B. Diri
{"title":"Multi-stream word-based compression algorithm","authors":"Emir Öztürk Altan Mesut, B. Diri","doi":"10.1109/UBMK.2017.8093552","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093552","url":null,"abstract":"In this article, we present a novel word-based lossless compression algorithm for text files which uses a semi-static model. We named our algorithm as Multi-stream Word-based Compression Algorithm (MWCA), because it stores the compressed forms of the words in three individual streams depending on their frequencies in the text. It also stores two dictionaries and a bit vector as a side information. In our experiments MWCA obtains compression ratio over 3,23 bpc on average and 2,88 bpc on files larger than 50 MB. If a variable length encoder like Huffman Coding is used after MWCA, given ratios will reduce to 2,63 and 2,44 bpc respectively. With the advantage of its multi-stream structure MWCA could become a good solution especially for storing and searching big text data.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133503392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optik karakter tanıma yöntemi ile otomatik tabela okuyucu
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093466
Tuğba Saray, Ali Çeti̇nkaya, A. Okatan
{"title":"Optik karakter tanıma yöntemi ile otomatik tabela okuyucu","authors":"Tuğba Saray, Ali Çeti̇nkaya, A. Okatan","doi":"10.1109/UBMK.2017.8093466","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093466","url":null,"abstract":"In this work, An automatic recognition system designed to be used while travelling in a coutry whose language is not known to the traveler. The system reads the traffic sign boards by using a camera. Then software of the system gives the meanings of the signs in known language in the computer screen attached to the car dash. OCR system in fact takes the information for the camera as an image. Then, the program translates the information in the form of letters and symbols. System uses Emgu CV tesseract OCR Motor.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133711586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A firewall application on SOHO networks with Raspberry Pi and snort 一个防火墙应用程序在SOHO网络与树莓派和snort
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093414
Mustafa Cosar, Suikum Karasartova
{"title":"A firewall application on SOHO networks with Raspberry Pi and snort","authors":"Mustafa Cosar, Suikum Karasartova","doi":"10.1109/UBMK.2017.8093414","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093414","url":null,"abstract":"In small and home office (SOHO) computer networks, an intrusion detection system can be activated to intercept the possible attack. Network traffic analysis is the basis of attack detection methods. In the intrusion detection process, both hardware and software solutions are available, as well as in systems that are bundled together. Hosting these systems in SOHO networks is usually negligible because it is considered a costly and laborious investment. In order to overcome this disadvantage open source code Intrusion Detection Systems (IDS) such as snort and strata can be used together with raspberry pi computers. In this study, a raspberry pi device was prepared on a small scale network and a network traffic analysis application was performed with the snort IDS module installed on it. It has been determined that some of the malicious traffic on the network by activated developing system.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134155146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An extended syllogistic logic for automated reasoning 用于自动推理的扩展三段论逻辑
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093522
Ersin Çine, Bora I. Kumova
{"title":"An extended syllogistic logic for automated reasoning","authors":"Ersin Çine, Bora I. Kumova","doi":"10.1109/UBMK.2017.8093522","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093522","url":null,"abstract":"In this work, we generalise the categorical syllogistic logic in several dimensions to a relatively expressive logic that is sufficiently powerful to encompass a wider range of linguistic semantics. The generalisation is necessary in order to eliminate the existential ambiguity of the quantifiers and to increase expressiveness, practicality, and adaptivity of the syllogisms. The extended semantics is expressed in an extended syntax such that an algorithmic solution of the extended syllogisms can be processed. Our algorithmic approach for deduction in this logic allows for automated reasoning directly with quantified propositions, without reduction of quantifiers.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134482929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Similar words in Turkic languages 突厥语中类似的词
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093556
Muratoglu Orhun
{"title":"Similar words in Turkic languages","authors":"Muratoglu Orhun","doi":"10.1109/UBMK.2017.8093556","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093556","url":null,"abstract":"Detecting and analyzing similar words are an important component of natural language processing tasks such as information retrieval, document clustering, making dialog systems, word-sense disambiguation, text summarization and machine translation systems etc. Similar words have notable effect on machine translation. Especially, close languages such as Uyghur, Uzbek, Turkmen, Kazakh, Kyrgyz, Tatar, Azeri and Turkish that belong to the Turkic languages family. There are a huge number of similar words, and these similar words affect the quality of translations. In this article, computer-based methods were suggested to detect similar words in Turkic languages and proposed method has been tested to find similar words in Uzbek and Uyghur.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133121550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frequency difference based DNA encoding methods in human splice site recognition 基于频率差的DNA编码方法在人类剪接位点识别中的应用
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093471
Elham Pashaei, N. Aydin
{"title":"Frequency difference based DNA encoding methods in human splice site recognition","authors":"Elham Pashaei, N. Aydin","doi":"10.1109/UBMK.2017.8093471","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093471","url":null,"abstract":"Identifying structure of genes in Human genomes highly depends upon accurate recognition of boundaries between exons and introns, i.e. splice sites. Hence, development of new methods for effective detection of splice sites is essential. DNA encoding approaches are used for feature extraction from gene sequences, while machine learning methods are used for classification of splice sites using those extracted features. This paper presents a new DNA encoding method based on triplet nucleotide encoding with the frequency difference between true and false splice site sequences (TN-FDTF). Then, Support Vector Machine (SVM), Artificial Neural Network (NN), Random Forest (RF) and AdaBoost classifiers are used for prediction of splice sites. The performance of the proposed method was assessed on Homo Sapiens Splice Site Dataset (HS3D) using 10 fold cross validation. The results showed that the AdaBoost outperformed all the considered classifiers. In addition, the proposed method achieved higher prediction accuracy than most of the current existing state of the art methods. It is believed that the proposed method can help to achieve better results in Human splice site recognition and eukaryotic gene detection.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115047714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The importance of standardization in biometric data for digital forensics 生物特征数据标准化对数字取证的重要性
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093529
Semih Ulupinar, S. Dogan, Erhan Akbal, T. Tuncer
{"title":"The importance of standardization in biometric data for digital forensics","authors":"Semih Ulupinar, S. Dogan, Erhan Akbal, T. Tuncer","doi":"10.1109/UBMK.2017.8093529","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093529","url":null,"abstract":"Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person have a large share in assessing cases in the field of digital forensics. In this paper, standardization process of biometric data is presented. At the same time, the standardization of biometric data has been examined in terms of digital forensics.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116058508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dark patches in clustering 聚类中的暗斑
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093535
Waqar Ishaq, Eliya Buyukkaya
{"title":"Dark patches in clustering","authors":"Waqar Ishaq, Eliya Buyukkaya","doi":"10.1109/UBMK.2017.8093535","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093535","url":null,"abstract":"This survey highlights issues in clustering which hinder in achieving optimal solution or generates inconsistent outputs. We called such malignancies as dark patches. We focus on the issues relating to clustering rather than concepts and techniques of clustering. For better insight into the issues of clustering, we categorize dark patches into three classes and then compare various clustering methods to analyze distributed datasets with respect to classes of dark patches rather than conventional way of comparison by performance and accuracy criteria, because performance and accuracy may provide misleading conclusions due to lack of labeled data in unsupervised learning. To the best of our knowledge, this prime feature makes our survey paper unique from other clustering survey papers.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116080910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big data anonymization with spark 使用spark实现大数据匿名化
2017 International Conference on Computer Science and Engineering (UBMK) Pub Date : 2017-10-01 DOI: 10.1109/UBMK.2017.8093543
Yavuz Canbay, Ş. Sağiroğlu
{"title":"Big data anonymization with spark","authors":"Yavuz Canbay, Ş. Sağiroğlu","doi":"10.1109/UBMK.2017.8093543","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093543","url":null,"abstract":"Privacy is an important issue for big data including sensitive attributes. In the case of directly sharing or publishing these data, privacy breach occurs. In order to overcome this problem, previous studies were focused on developing big data anonymization techniques on Hadoop environment. When compared to Hadoop, Spark facilitates to develop faster applications with the help of keeping data in memory instead of hard disk. Despite a number of projects were developed on Hadoop, now this trend is shifting to Spark. In addition, the problem of anonymizing big data streams for real-time applications can be solved with Spark technology. Hence to sum up, Spark is the main technology facilitates developing both faster anonymization applications and big data stream anonymization solutions. In this study, anonymization techniques, big data technologies and privacy preserving big data publishing was reviewed and a big data anonymization model based on Spark was proposed for the first time. It is expected that the proposed model might help to researchers to solve big data privacy issues and also provide solutions for new generation privacy violations problems.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121069992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信