{"title":"Smart pregnancy tracker system using social knowledge networks for women","authors":"Yunus Santur, Sinem Güven Santur, Mehmet Karaköse","doi":"10.1109/UBMK.2017.8093503","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093503","url":null,"abstract":"Today, people use the internet extensively to meet their information needs, to socialize, to communicate, to handle formal and informal processes. The web-based information networks established for this purpose are growing day by day and reach a larger audience. Facebook, the world's largest social network, has reached 2 billion users. There are social information networks established for different purposes as well. In this study, it was aimed to construct a social information network specific to women. It is to create a social information network specific to women targeted for work. In web-based network working with membership logic, members can access informative contents such as follow-up of processes such as period, pregnancy, baby vaccination schedule, body mass index, calculators such as baby percentile, tests, articles and visual aided trainings.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-stream word-based compression algorithm","authors":"Emir Öztürk Altan Mesut, B. Diri","doi":"10.1109/UBMK.2017.8093552","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093552","url":null,"abstract":"In this article, we present a novel word-based lossless compression algorithm for text files which uses a semi-static model. We named our algorithm as Multi-stream Word-based Compression Algorithm (MWCA), because it stores the compressed forms of the words in three individual streams depending on their frequencies in the text. It also stores two dictionaries and a bit vector as a side information. In our experiments MWCA obtains compression ratio over 3,23 bpc on average and 2,88 bpc on files larger than 50 MB. If a variable length encoder like Huffman Coding is used after MWCA, given ratios will reduce to 2,63 and 2,44 bpc respectively. With the advantage of its multi-stream structure MWCA could become a good solution especially for storing and searching big text data.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133503392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optik karakter tanıma yöntemi ile otomatik tabela okuyucu","authors":"Tuğba Saray, Ali Çeti̇nkaya, A. Okatan","doi":"10.1109/UBMK.2017.8093466","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093466","url":null,"abstract":"In this work, An automatic recognition system designed to be used while travelling in a coutry whose language is not known to the traveler. The system reads the traffic sign boards by using a camera. Then software of the system gives the meanings of the signs in known language in the computer screen attached to the car dash. OCR system in fact takes the information for the camera as an image. Then, the program translates the information in the form of letters and symbols. System uses Emgu CV tesseract OCR Motor.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133711586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A firewall application on SOHO networks with Raspberry Pi and snort","authors":"Mustafa Cosar, Suikum Karasartova","doi":"10.1109/UBMK.2017.8093414","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093414","url":null,"abstract":"In small and home office (SOHO) computer networks, an intrusion detection system can be activated to intercept the possible attack. Network traffic analysis is the basis of attack detection methods. In the intrusion detection process, both hardware and software solutions are available, as well as in systems that are bundled together. Hosting these systems in SOHO networks is usually negligible because it is considered a costly and laborious investment. In order to overcome this disadvantage open source code Intrusion Detection Systems (IDS) such as snort and strata can be used together with raspberry pi computers. In this study, a raspberry pi device was prepared on a small scale network and a network traffic analysis application was performed with the snort IDS module installed on it. It has been determined that some of the malicious traffic on the network by activated developing system.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134155146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An extended syllogistic logic for automated reasoning","authors":"Ersin Çine, Bora I. Kumova","doi":"10.1109/UBMK.2017.8093522","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093522","url":null,"abstract":"In this work, we generalise the categorical syllogistic logic in several dimensions to a relatively expressive logic that is sufficiently powerful to encompass a wider range of linguistic semantics. The generalisation is necessary in order to eliminate the existential ambiguity of the quantifiers and to increase expressiveness, practicality, and adaptivity of the syllogisms. The extended semantics is expressed in an extended syntax such that an algorithmic solution of the extended syllogisms can be processed. Our algorithmic approach for deduction in this logic allows for automated reasoning directly with quantified propositions, without reduction of quantifiers.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134482929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Similar words in Turkic languages","authors":"Muratoglu Orhun","doi":"10.1109/UBMK.2017.8093556","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093556","url":null,"abstract":"Detecting and analyzing similar words are an important component of natural language processing tasks such as information retrieval, document clustering, making dialog systems, word-sense disambiguation, text summarization and machine translation systems etc. Similar words have notable effect on machine translation. Especially, close languages such as Uyghur, Uzbek, Turkmen, Kazakh, Kyrgyz, Tatar, Azeri and Turkish that belong to the Turkic languages family. There are a huge number of similar words, and these similar words affect the quality of translations. In this article, computer-based methods were suggested to detect similar words in Turkic languages and proposed method has been tested to find similar words in Uzbek and Uyghur.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133121550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency difference based DNA encoding methods in human splice site recognition","authors":"Elham Pashaei, N. Aydin","doi":"10.1109/UBMK.2017.8093471","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093471","url":null,"abstract":"Identifying structure of genes in Human genomes highly depends upon accurate recognition of boundaries between exons and introns, i.e. splice sites. Hence, development of new methods for effective detection of splice sites is essential. DNA encoding approaches are used for feature extraction from gene sequences, while machine learning methods are used for classification of splice sites using those extracted features. This paper presents a new DNA encoding method based on triplet nucleotide encoding with the frequency difference between true and false splice site sequences (TN-FDTF). Then, Support Vector Machine (SVM), Artificial Neural Network (NN), Random Forest (RF) and AdaBoost classifiers are used for prediction of splice sites. The performance of the proposed method was assessed on Homo Sapiens Splice Site Dataset (HS3D) using 10 fold cross validation. The results showed that the AdaBoost outperformed all the considered classifiers. In addition, the proposed method achieved higher prediction accuracy than most of the current existing state of the art methods. It is believed that the proposed method can help to achieve better results in Human splice site recognition and eukaryotic gene detection.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115047714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The importance of standardization in biometric data for digital forensics","authors":"Semih Ulupinar, S. Dogan, Erhan Akbal, T. Tuncer","doi":"10.1109/UBMK.2017.8093529","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093529","url":null,"abstract":"Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person have a large share in assessing cases in the field of digital forensics. In this paper, standardization process of biometric data is presented. At the same time, the standardization of biometric data has been examined in terms of digital forensics.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116058508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dark patches in clustering","authors":"Waqar Ishaq, Eliya Buyukkaya","doi":"10.1109/UBMK.2017.8093535","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093535","url":null,"abstract":"This survey highlights issues in clustering which hinder in achieving optimal solution or generates inconsistent outputs. We called such malignancies as dark patches. We focus on the issues relating to clustering rather than concepts and techniques of clustering. For better insight into the issues of clustering, we categorize dark patches into three classes and then compare various clustering methods to analyze distributed datasets with respect to classes of dark patches rather than conventional way of comparison by performance and accuracy criteria, because performance and accuracy may provide misleading conclusions due to lack of labeled data in unsupervised learning. To the best of our knowledge, this prime feature makes our survey paper unique from other clustering survey papers.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116080910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big data anonymization with spark","authors":"Yavuz Canbay, Ş. Sağiroğlu","doi":"10.1109/UBMK.2017.8093543","DOIUrl":"https://doi.org/10.1109/UBMK.2017.8093543","url":null,"abstract":"Privacy is an important issue for big data including sensitive attributes. In the case of directly sharing or publishing these data, privacy breach occurs. In order to overcome this problem, previous studies were focused on developing big data anonymization techniques on Hadoop environment. When compared to Hadoop, Spark facilitates to develop faster applications with the help of keeping data in memory instead of hard disk. Despite a number of projects were developed on Hadoop, now this trend is shifting to Spark. In addition, the problem of anonymizing big data streams for real-time applications can be solved with Spark technology. Hence to sum up, Spark is the main technology facilitates developing both faster anonymization applications and big data stream anonymization solutions. In this study, anonymization techniques, big data technologies and privacy preserving big data publishing was reviewed and a big data anonymization model based on Spark was proposed for the first time. It is expected that the proposed model might help to researchers to solve big data privacy issues and also provide solutions for new generation privacy violations problems.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121069992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}